This discussion assesses your ability to clarify the role of each legally mandated attendee on the Individualized Education Program team. This assessment also supports your achievement of Course Learning Outcome….
How does security team use mobile technology to communicate between teams, access inspection reports, and improve collaboration
Imagine that you are team leader of a security assessment team who has been hired to conduct a risk assessment for a research and development company with several government contracts. The organization has numerous buildings located across the city. Your team has identified communication and collaboration problems between team members when conducting security assessments. Team members state that the paper-based inspection checklists are hard to keep organized in the field when conducting inspections, and they would like to use an electronic version of the checklists. However, laptops are too bulky for field use. They state that team members are often located in different buildings and possibly different areas of a city when conducting assessments, and they would like to use a mobile technology that will allow them to communicate and collaborate with each other on security assessments. They would also like to have access to inspection reports located at the home office while conducting inspections in the field. Create a proposal that identifies two types of mobile technologies that utilize the Internet and the World Wide Web to improve the communication and collaboration efforts of the team. You may choose how to create your proposal but must get faculty approval for your method. If you choose a paper it must be 700 to 1,050 words. Answer the following questions in your proposal: •How will your security team use your proposed mobile technology to communicate between teams, access inspection reports, and improve collaboration? •How could this mobile technology positively and negatively affect the organization’s security? •In what ways might using mobile technology instead of paper-based checklists positively affect the process of completing a security assessment? In what ways might the process be negatively affected? •How might the use of the Internet and the World Wide Web on mobile devices affect information security in this organization?