TLMT 602 AMU Glock Firearm Company: RFID Technology Implementation Plan Paper

User Generated

oenavnp1267

Business Finance

TLMT 602

American Military University

TLMT

Description

Develop a Term Project Paper that is a detailed design of an implementation plan to incorporate RFID technology as part of the Glock firearm company. The timeframe is the current year and out to the next three years. Term Project Outline:


Unformatted Attachment Preview

1 The implementation of RFID Tracking Mechanisms in all Glock manufactured Firearms. Herman J. Bardouille Jr. American Military University TLMT 602: RFID Uses in Logistics Dr. Wyatt May 08, 2022 2 The implementation of RFID tracking mechanisms in all Glock manufactured firearms. Introduction Security refers to the sense of being safe; this can mean safety from physical harm, the safety of someone's property from theft, misuse, or vandalism, ability to move freely and interact freely without having the constant urge to look over the shoulder (What Does Security Mean? n.d.). Private security can be seen starting from the medieval ages, where knights traveled and protected lords and the ladies against threats of being attacked or robbed. From history, traces of security can also be witnessed long ago when colonies used to form armies of well-trained soldiers who were used as sentries to stand watch and protect their communities against threats of invasion from rival communities or other natural disasters such as fires. Other early cases of security include the evolution of the Washington brink company, which provided armored vehicles services as early as 1891, the formation of the Special Weapons and Tactics (SWAT) in 1899, and the rangers unit, which used to work on horsebacks to chase and hunt down train robbers (The Evolution of Security, n.d.) However, with technological evolution, times have changed; we now live in an age where a whole city block could get wiped out with the press of a button, times where weapons of mass destruction are powered by nuclear, which gives them the ability to cruise from one end of the globe and wreak havoc to the other end. This technology has become a double-edged sword cutting both ways. The ability to defend systems has been rivaled by the ability to offend these same systems. Some time back, as long as something is behind a locked door, it could have been termed safe, but with modern technology, something could be miles away from where it is supposed to be without the owner's knowledge. The challenge experienced today is the complexity and rate at which threats are evolving, making it difficult to nail a method that effectively counters these vectors (May 19 & Minutes, n.d.) 3 Concerning technology advancement in these modern days, where something could get stolen and disappear without a trace, we now have Radio Frequency Identification (RFID). The RFID is a simple, effective, and cheap way to track your inventories, equipment, exercise control, and personnel tracking. This technology has been embraced and incorporated in several companies for car keys, security access badges, highway toll cards, and employee identification cards. The biggest advantage of radio frequency identification is that it does not require body contact with the item being tracked or a line of sight. The RFID can read tags from a long-distance contact void (Health, 2019). The RFID uses electromagnetic waves to read tags. It is a wireless system comprised of tags and readers. The reader system dispatches radio waves through antennae and receives signals back from the tags. These tags communicate their identity and other relevant information, either active or passive. The only difference is that active tags must be powered by batteries, while passive tags do not require powered up since the readers already power them. RFID tags come with ease of use since they can be mobile and carried by hand, built into wall cabinets, and store large amounts of data (Health, 2019). Apart from mobility, RFID comes with several other advantages; • Reduced expenses and wages on labor: Expenses that would have been used to employ and pay staff to keep physical tabs on inventory and equipment control can now be achieved by just one person since RFID readers can read more than one tag at a time. Alternatively, staff could use that time to venture into more productive work other than checking on inventory. • Reliability: Correct operation of the readers has been perceived to have a near hundred percent detection rate. This means that theft and vandalism do not have to be a challenge to deal with using RFID technology (Advantages and Disadvantages of RFID in Libraries, 2021). Using RFID tracking technology, an organization can track and stop illegal activity 4 long before starting. For example, most mass shootings have been done using guns that have been stolen or lost by their owners. • Appearance on the property: This does not have to be a matter of concern since tags do not alter the appearance of the objects in any way. The property gets to maintain its outward look and style and still afford the luxury of being secure. RFID tags can be incorporated as the new cutting-edge anti-theft technology (Advantages and Disadvantages of RFID in Libraries, 2021). In the case study, RFID tags do not change the firearm's appearance, nor do they add more weight or imbalance to the firearm. Implementation Outline The only way a company in the security sector can survive the constantly evolving risk factors is by evolving to meet the challenges. This need to evolve has created the urge to constantly monitor, assess and evaluate risk factors to adjust or try to manipulate existing systems to match the current needs of the security sector. Strategy implementation refers to turning plans of action into actual strategies that can assure a desired outcome for the Company. This is the primary support beam upon which every Company or organization stands, the ability to initiate and implement decisions that stand to execute important processes such as efficiency, effectiveness, and consistency when mitigating risk factors. After developing a strategy, this paper addresses ways and steps to follow for the successful incorporation of the strategy; a) Set realistic goals and define core variables: This should be the first step and straightforward and clear. Under this step, you should identify a goal that is understandably easy to achieve and realistic enough such that the organization can achieve the strategy without strain or undergoing too many expenses. Without an elucidated plan, it will be almost impossible to achieve the strategy. The unrealistic strategy will mostly put pressure on the staff working on the project, translating to 5 burnout and low motivation. To set realistic goals, you can check for other strategies that have been successfully implemented and use the timeframe and resource as an example. b) Establish Roles and Responsibilities: After establishing clear goals and the purpose of your strategy, you should fully account for and document the resources at your disposal to empower you to reach your goal. These resources include employees and teams allocated to pursue this course, departments available to offer their help, and other resources such as funding. After clearly documenting your resources, you should establish communication with the teams is critical to note that communication is key for the successful incorporation of a strategy; it should also help forge strong interpersonal and peer relationships among the team members to help foster the teamwork. c) Assign Tasks: Once goals are clear and teams are created, these goals are communicated to them, and tasks should be assigned. A clear image should be painted on the back of their heads of what the plan should look like once it is completed; since everyone will be working on a segment of the task, it could be challenging to see the finalized strategy without the other parts explained. d) Execute the Strategy, Monitor progress, and Performance, and Provide Continued Support: The next key step is executing the strategy and putting the plan into motion. As much as you should be focused on the project, you should try to avail yourself to the employees to answer their questions and address their concerns if they hit roadblocks that blur their insight on the project. You can create effective check-in status reports monitoring the progress and performance of the project. You can also seek insight from colleagues and peers about how they perceive the strategy. 6 e) Administer corrective action: Implementation is a continuous process; it does not stop at the execution stage. Depending on the progression and performance monitor results, you have to get back to the drawing board to check for the correct corrective plan. You could address issues that were unforeseen during the phase of setting goals. In this implementation phase, you can revise or adjust the original goals if needed. f) Review of the project: This is a critical process for implementing a plan. It is important to step back and ask questions like, was the goal achieved? If the answer is not, where did it go wrong, what steps can be taken next to avoid a negative outcome, what obstacles did the goal encounter, and how do we avoid them in the future? How did people react to the plan? Failure is not an option when implementing a plan; however, if you experience a slight setback, it is key to use it as an opportunity to learn what went wrong so that you can come out stronger and more positive to retry plan implementation again. The implementation of RFID tracking mechanisms in all Glock manufactured firearms. There are over eight million (8,000,000) new firearms each year, with approximately fifteen billion rounds of ammunition globally (Amnesty International, 2012). Glock is a firearms company that manufactures and distributes the popular handguns called Glock. The Company manufactures these handguns in various sizes, styles, and calibers. Guns are used in law enforcement agencies and the military; however, the law has also extended ownership to privately licensed individuals. This also increased the prevalence of gun violence. According to the National Crime Victimization Survey, 1999, out of the four million people who experienced violent crimes, an offender wielding a gun faced twenty-nine percent. In the twenty-first century, gun crimes have shot up; over one point four million causalities each year resulting from firearms, with forty-four percent of homicides involving guns globally (Amnesty International, 2012). 7 To address this rising concern of gun violence, this paper pursues the implementation of Radio Frequency Identification tracking mechanisms in all Glock manufactured firearms; this strategy will follow the following steps; ✓ Define the goal: one of the primary step in establishing a project is by defining the objective. This research paper aims to implement a strategy that will help reduce mortality rates through gun violence by ensuring all firearms can be tracked using real-time data. This strategy will aid the process of recovery for lost or stolen firearms. According to the Federal Bureau of Investigations national crime information center 1999, sixty percent of stolen handguns are used to commit violent crimes such as mass shootings. ✓ Establish Roles of the assigned teams: Opportunities that will be presented for the availed teams include teams to keep track of registered firearms and those that have been reported missing or stolen, recover and retrieve teams that will apprehend potential offenders and recover the firearms, a regulatory ethics team to address privacy violation claims from potential buyers, statistics and data control teams that will monitor the performance of this plan and help correlate to see if the cases of gun violence go down. ✓ Execute the plan and monitor progress: This plan will be set to move within a time frame of between the current years to three years, where it will be closely monitored to see if there is a positive impact on reducing gun violence. Data will be collected and analyzed for use in the corrective phase of the implementation stage. ✓ Corrective Action: In this phase, data analyzed during performance analysis will be used to determine the appropriate action plan. Information collected will gauge 8 whether adjustments, revisions, or reviews should be incorporated into the plan, plotting a chart on how the action plan is working. ✓ Reviewing the project: This will be the final stage of implementation. In this stage, the public's impact, reviews, and reactions will be used to gauge how the plan is working out. Reviews on gun usage and violence will also be used to make conclusions about the impact of RFID on gun control. Limitations This action plan will face a few obstacles when implemented, such as high costs and expenses incurred during the incorporation of the RFID technology, and collecting data for reviewing since an extra workforce will be required for this step. Another challenge to be anticipated will be grouped arguing against using the RFID technology based on privacy violations. 9 References Advantages and Disadvantages of RFID in Libraries. (2021). Umd.edu. https://terpconnect.umd.edu/~segloff/RFIDTest3/AdvantagesandDisadvantages.html Amnesty International. (2012). Gun Violence - Key Facts. Amnesty.org. https://www.amnesty.org/en/what-we-do/arms-control/gun-violence/ Health, C. for D. and R. (2019). Radio Frequency Identification (RFID). FDA. https://www.fda.gov/radiation-emitting-products/electromagnetic-compatibilityemc/radio-frequency-identificationrfid#:~:text=Radio%20Frequency%20Identification%20 (RFID) %20refers May 19, V. H., & Minutes, 2015 15. (n.d.). The Evolution of Security Technology. www. Banking security. Asia. Retrieved May 6, 2022, from https://www.bankinfosecurity.asia/interviews/evolution-security-technology-i-2702 Radio Frequency Identification (RFID): What is it? (2018, September 21). Department of Homeland Security. https://www.dhs.gov/radio-frequency-identification-rfid-what-it The evolution of security. (n.d.). IT PRO. Retrieved May 6, 2022, from https://www.itpro.co.uk/security/359618/the-evolution-of-security What Does Security Mean? (n.d.). Ccss.usc.edu. Retrieved May 6, 2022, from https://ccss.usc.edu/499/lecture1.html
Purchase answer to see full attachment
Explanation & Answer:
21 Pages
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.

Outline
Introduction
In the United States, the law has allowed most citizens to independently take care of their security.
One of the most effective ways to take care of personal security is to have personal firearms. Most
firearms are small pistols, with the Glock brand being one of the most common firearms used in
the United States. Glock is made by Glock firearm company, one of the country's leading firearm
industries (Flynn, 2014).
Glock Firearm Company
Organization Background
The Glock Ges. m.b.h is a virtually synonymous company known for the lightweight
pistol design established in the 1980s. Since the first designs in the early 1980s, the pistols from
Glock Ges. m.b.h have been used effectively in equipping various armies, making the company
the leading firearm producer in the law enforcement market. Glock Ges. m.b.h company is also
determined to manufacture other military equipment (McNab, 2015). The military equipment
manufacturing process has also seen the company fabricating multiple metals and plastic
products for various markets.
Products, Services, and Market
First of its kind, the Glock Firearm Company was awarded the tender to produce pistols for the
Australian law enforcement and military, which means it was necessary to be able to fire at a
moment's notice in risky life conditions. Therefore, the engineer had to establish one of the most
unique and safest pistols with various safeties. For instance, these pistols from Glock were created
with multiple internal securities, such as ensuring that the gun would be used consistently to offer
the necessary protection against the possible protection against accidental discharge (McNab,

2015). The company also expanded its production and met the requirements of the Australian
military, awarded the company the tender to continue with the production of lightweight materials,
high-capacity magazines, hammer-forged barrels, and consistent trigger pull.
Radio Frequency Identification (RFID) Technologies
The idea of the Radio Frequency Identification technology describes the type of
technology that uses a wireless technique in matching and tracking an individual to their items.
The technology comprises two significant parts that include readers and tags. For instance, the
tag part uses radio waves to communicate the item's identification and other information. In
contrast, the reader part of this technology is instrumental in giving off the radio waves and
getting the signals back in return from the tag part (Lujan, 2018). Most smart guns in the current
market have adopted RFID technology to boost operations in general. It is mainly used to replace
the other gun safety measures, such as biometrics.
Outline of Proposed Plans
Apart from the initial idea from TrigerSmart, Glock Ges. m.b.h can also embrace the idea of
improving their firearms and maintaining a competitive firearm market by implementing the Radio
Frequency Identification technology in their guns. The development of the Radio Frequency
Identification technology can effectively promote the safety and visibility of the operations of the
firearm by tracking and activating it for function. The coordination between the reader and the tag
is more influential in ensuring only the owner wearing the ring or the bracelet can trigger the use
of the gun (Alsharif et al., 2019).
Detailed Outline of The RFID Implementation Plan
Generally, Glock Ges. m.b.h has always maintained the leading position in the firearm
manufacturing industry. The company has succeeded in various areas, such as establishing some

of the military's excellently performing and simple guns for over three decades since the US army's
adoption (Flynn, 2014). For instance, it has one of the simplest pistols that can shoot 10000 bullets
in five hours without wearing out. However, radio frequency identification has been approved to
be one of the leading concepts used in the company operations that needs to satisfy the general
interests and requirements of the firearm safety requirements away from the use of biometrics.
Project Scoping
In detail, this marks the beginning of implementing Radio Frequency Identification
technology in every company. A competent team of technical experts is established during the
project scoping stage. This being the case, the research and development team leader at Glock
Ges. m.b.h has the chance to create a group composed of competent professionals who would
help present and study the insights about the nature of the radio frequency identification
technology (McNab, 2015). The established team at the company can play a significant role in
outlining the unique limitations and advantages that should be expected in the implementation
process for the proposed RFID system.
Analyzing the Current System
Glock Ges. m.b.h has always led to establishing some of the most effective and convincing
technological approaches used to realize the systems' valuable operation. Using radio frequency
identification has also been common as part of ensuring simplicity and safety in firearm usage.
The technology has supported the effectiveness of using the company's firearms in several
instances. Therefore, these technological developments can be used as practical techniques to state
the need or reason why the radio frequency identification technology has always been used as a
leading approach to ensure the safety of the firearms (Alsharif e al., 2020).
System Design

The system design stage is the third phase of the implementation process of this new technology
implementation at Glock Ges. m.b.h. It involves establishing the right system to be used
throughout the process. For instance, this phrase means that the right hardware and software should
be selected for the implementation process. However, since it requires much expertise, various
engineers' and programmers' contributions and their know-how would be applicable in establishing
the most impressive stage of identifying the right system to be used (Youssef et al., 2018).
Prototype Testing
Previously in, the third stage, the stage was more essential since it is the most instrumental stage
in selecting the most effective system to implement the new technological concept. However, this
fourth step would also be instrumental since the chosen method must be tested to develop the most
instrumental plan to implement the radio frequency identification technology in firearms (Stone et
al., 2020). Therefore, depending on the role played by the radio frequency identification
technology, it would be ideal if the testing process is engaged to help capture the signals from the
chosen devices. During the prototype testing process, other issues such as tag collision,
duplications, and confusion should be monitored.
Implementation
After finishing the prototype testing stage and ascertaining that the technology is ready for
implementation with limited malfunctions, it would be ideal for moving to the next step, the
implementation phase. The implementation stage would be completed successfully with the
established team installing the necessary hardware and software systems into the guns. During the
implementation stage, change and training can be considered the most critical activities (Stone et
al., 2020). Change and critical would be necessary since they would help establish the best
outcome.

Continuous Improvement
At the first production phase, not everything would be perfect, thus the need for continued
improvement since this is a new technology being adopted by Glock Ges. m.b.h. The continuous
improvement stage is the last phase of implementing the latest radio frequency identification
technology in the smart-gun technology. The implemented system should be monitored and
assessed in the best way possible to identify gaps that might impact the effectiveness of the new
technology on the guns (Stone et al., 2020).
Using Theories and Change Models in Supporting the Detailed Implementation Process of
the Radio Frequency Identification Technology in Firearms
The proposed implementation process of the Radiofrequency Identification technology at Glock
Ges. m.b.h would be successful by relying on various change models and theories to guide the
implementation. For instance, in the world of innovation, one of the influential theories that have
been supported mainly by most scholars and experts is the diffusion theory. For example,
according to the ideas from the diffusion theory...


Anonymous
Really helped me to better understand my coursework. Super recommended.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Related Tags