Page 44 - SyI Quarterly - Q3 and Q4 Edition 2023
P. 44

Our  Membership















                       Effective Artificial Intelligence


                 implementation in the operational



                  security environment (Part 1 of 2)




                                          By Martin Lynch MSyI

















        This paper forms part one of a two-part discourse on how artificially
        intelligent security systems may influence physical security in the
        contemporary and the future. Part two will focus on the limitations
        and considerations for security professionals in the coming paradigm
        of machine learning, computer vision, and AI-enabled systems.



        Part 1

        Deus ex machina or God in the machine was used in Greek antiquity to find an easy fix for a troublesome
        theatrical plot, the scriptwriters would have the gods descend and put the world to rights, in a somewhat
        implausible manner. This seems to be a familiar theme when considering how the commercial sector
        would have us perceive artificially intelligent machines for our industry. We are, as security professionals,
        a gift horse for the glossy brochures and the fast-talking sales executives who may be offering a god-in-
        the-machine solution to our woes. These woes may be fiscal, human-centric or nebulous in nature, but
        they are there. Considering these thoughts, have you been asked by the CFO or CEO, ‘How might artificial
        intelligence (AI), better enable the delivery of the security department’s services to the populous or
        paymaster’? The offer of an easy fix is alluring. Can we as Security Managers garner these options to better
        suit the operation or pocket by reducing perhaps the manpower needed or can we reduce the ingress
        times for our patrons by utilising this technology? The recent adverse press for the Wimbledon queues
        may affect your venue too.  AI-enabled devices may offer solutions to a great many issues, satisfy the
        demands of the board, or cut queuing time and improve customer ingress experience. However, how do
        you as the expert, satisfy your own environment’s specific operational security needs with technology?

        It is my intention in these two essays to promote thought and discussion at The Security Institute and
        perhaps the greater security field. It is up to you: the security professional, to make an informed decision,





                                                          44
   39   40   41   42   43   44   45   46   47   48   49