Call/WhatsApp: +1 914 416 5343

A firm’s resilience towards physical security threats.

Introduction

Background Information
Purpose: The information gathered through this questionnaire will be used as a part of empirical research into improving the physical security performance at ADNOC Refining in the Ruwais Refinery. This survey aims to get information about the current physical security performance at ADNOC Refinery as much as possible to help explore the possibility of integrating facial recognition technology with the existing physical security system at ADNOC Refining in the Ruwais Refinery.

Confidentiality: Please note that the responses you provide are completely anonymous and confidential. The research outcome and report will not include references to any individuals. The compiler of the questionnaire has sole ownership of the completed questionnaire, and the questionnaire will be destroyed after completion of the research. You can choose to withdraw your participation in this survey at any time.

Thank you for participating in our study. Please complete this survey by selecting your most accurate response to each question. All questions could take approximately 20 minutes to complete.

Definition of Terms Used
– Physical Security Culture : Refers to a system of technological, organizational, and human domains that predetermine a firm’s resilience towards physical security threats.
– Technological Domain : This refers to different physical components related to a firm’s physical security, such as technology, equipment, and materials.
– Organizational Domain : Refers to policies used by an organization to ensure a sufficient level of physical security and resources that a firm could use to prevent physical security threats.
– Human Domain : Refers to a variety of issues revolving around individuals and their behavior to ensure security.
– Facial Recognition Technology (FRT) : FRT is a technology that allows identifying a person on a video frame or a digital image by comparing to a set of pictures from a database.
– Intrusion Detection System : IDS refers to Physical security frameworks that protect a facility’s perimeter by equipping entry points with sensing devices and monitoring security personnel.
– External factors : Things outside a business that will have an impact on its success. Their impact can be positive or negative. A business cannot control external factors.
– Vignette Scenarios : Short stories describing key operational aspects of a real-life scenario.

Research Questionnaire
Section Two: Physical Security Culture Domains

Research Questionnaire
Section Three: Physical Security Performance

Research Questionnaire
Section Four: Facial Recognition Technology

Research Questionnaire
Section Five: Vignette Scenarios

In this section you will be present with short stories depicting real-life scenarios and you will be asked to give your opinions. Below the scenarios there will be another question to provide your rating.

No. Context Setting Scenario
1. Accessing Restricted Areas Facility Access FRT is being used to access the Main Control Room.
2. Tracking and Locating Individuals Emergency Response FRT is being used to locate a missing individual in a facility during an emergency.
3. Automated Attendance Workplace Attendance FRT is being used for automated attendance in the workplace.

Context 1: Accessing Restricted Areas
Mr. Kyle and Mr. Omar are co-workers and very close friends. They both work in the Budget, Accounts and Production department located in the Main Control Room. Mr. Kyle is an archivist, and Mr. Omar is a Senior Accountant. All the budget, account, and production reports are archived by Mr. Kyle, who has access to the Archive Room in Main Control Room. The Archive Room uses FRT, in conjunction with ACS and Lock & Key to open. In contrast, the entrance to the Main Control Room uses only FRT to open. Mr. Kyle and Mr. Omar go to work in the same car, driven by Mr. Omar. Unfortunately, Mr. Kyle was sick and did not go to work. Mr. Omar borrowed Mr. Kyle’s Access Card and Key for the Archive Room to get important reports. Mr. Omar did not know that the Archive Room uses FRT, in conjunction with ACS and Lock & Key to open, and Mr. Kyle forgot to give him this information. The Security Team noticed an unauthorized person was trying to access the Archive Room.

Facility Access:
Could you comment on using FRT alongside ACS and Lock & Keys to access the Archive Room in the Main Control Room?
Comments:
_____________________________________________________________________________________

How would you rate FRT being used to access the restricted areas?
Not effective
at all Slightly
effective Somewhat effective Very
effective Extremely effective

Context 2: Tracking and Locating Individuals
Individuals are granted electronic access cards to specific areas in the ADNOC Refining according to their work requirements. All individuals entering and exiting the facility must pass through the Security Gates to keep track of the traffic movement. A visitor was granted an electronic access card to the engineering and development building for a survey related to a future project. Excited to know the facility’s operations, the visitor, without authorization or reporting to the security, went to the Carbon Black Processing Plant. Unfortunately, there was an emergency at the Carbon Black Processing Plant, and the siren was activated. All individuals were asked to proceed to the nearest assembly point. The visitor, panicking due to the vast area of the facility, lost his way back. All the individuals reported to the nearest assembly point, except for the visitor. Since the visitor did not report to the Security Team when visiting the Carbon Black Processing Plant, it was challenging to track his location. Luckily, the reception area of the Carbon Black Processing Plant was equipped with FRT in one of the CCTVs focusing on the main entrance to the Carbon Black Processing Plant. The Emergency Response Team could locate the visitor’s location in the facility to save his life.

Emergency Response:
If you were asked to select between FRT, ACS, and CCTV technologies to locate an individual in a facility, which technology would you prefer? And why?
Comments: _____________________________________________________________________________________

In your opinion, how effective is FRT in locating and tracking a missing individual during an emergency?
Not effective
at all Slightly
effective Somewhat effective Very
effective Extremely effective

Context 3: Automated Attendance

Employees working at ADNOC Refining were required to use their fingerprint and access card alongside FRT to record their attendance at the facility. During rush hours, there has been congestion at the entrance while employees wait for their turn to use their fingerprint on the sensor and punching their access card. Since this was causing delays, the employees suggested that the management use only FRT to automate the attendance instead of multiple methods.

Workplace Attendance:
What do you think about the organization using only FRT to automate attendance in the workplace?
Comments: _____________________________________________________________________________________

How would you rate FRT being used for automated attendance in the workplace?
Not effective
at all Slightly
effective Somewhat effective Very
effective Extremely effective