Introduction
Advances in technology and human innovativeness and creativeness have made dealing with security a difficult and complicated process. This has forced new trends to continuously emerge to deal with different security threats. Some of the current trends include: the use of technology in detecting security and countering security threats, improving monitoring processes, improving human integrity, developing escape strategies and strategic use of public relations experts in addressing security concerns. In researching about the security industry, I have used the NAIC code 561621 that deals with Security System Services.

Bibliography
Abraham, A., Muda, A. K., & Choo, Y. H. (2016). Pattern Analysis, Intelligent Security and the Internet of Things. Springer.
The authors use information from the Parallel Symposiums of the 4th World Congress on Information and Communication technology (WICT) in 2014. The work’s main purpose was to address the changing technological patterns in the world and the responses the world has generated to such changes. In summary, it details changes in the information and technology sector over the past century. As such, the book targets an audience in the current technological savvy generation that seeks to understand the history and impacts of technological changes on their jobs or businesses. In relation to the security industry topic, the authors particularly highlight technological advances in enhancing intelligent security. Some of the special and unique features about the book include the simplicity of language, the well organization of points in a systematic and easy to follow manner as well as clear and detailed discussion of the relevant issues. However, the weakness of the material is seen in the bias emphasis of ICT as the ‘only’ solution to security problems.

Ahmad, A., Maynard, S. B., & Shanks, G. (2015). A case analysis of information systems and security incident responses. International Journal of Information Management, 35(6), 717-723.
The purpose of the article is to identify the failures in security responses with the aims of recommending quicker responses and strategic security organization. In summary, the article gives examples of security failures and advances in criminal activities and creativity, hence demanding changes in the security industry in order to deal with emerging insecurity issues. The article is important to companies that need to understand ways in which they can adapt new security systems in preventing and eliminating any possible security breaches. It is also important for security firms that intend to improve their security management in order to gain more customer loyalty and build more trust. In relation to the topic, the article used weaknesses in security responses to new crime trends to show their impacts on the new trends and adaptation of new security management strategies. The paper uses thorough analysis of factual examples to show advances in crime hence the cause of new trends in security management. However, it fails to relate the findings to other security situations in different parts of the world, hence limiting to the Australian security environment.

Alves-Foss, J., Song, J., Kerr, L., & Steiner, S. (2015). Evaluating the use of security tags in security policy enforcement mechanisms. In System Sciences (HICSS), 2015 48th Hawaii International Conference on (pp. 5201-5210). IEEE. Security tagging schemes create great promise in dealing with future security problems using computer systems security features. The purpose of the articles is to examine and explain how the new technology in security tagging is improving security management and bound to revolutionize security intelligence in the near future. In summary, the article explains the technology behind security tags, how they function and how they are and will improve security. The information in the article is therefore meant for all security companies and businesses that aim at using new technology to improve security management and increased their competitive advantage. The article addresses the new trend in security management where technology is essential in dealing with security challenges, for instance, by using security tags for access control. The article uses clear and well elaborated explanations to explain the concept behind the functioning of the security tags and explaining the benefits. Nevertheless, the article fails to provide the environments suitable to use security tags.

Biggs, A. T., & Mitroff, S. R. (2015). Improving the Efficacy of Security Screening Tasks: A Review of Visual Search Challenges and Ways to Mitigate Their Adverse Effects. Applied Cognitive Psychology, 29(1), 142-148.
The purpose of the article is to explain how security screening at checkpoints is important in improving security management and the role of human watchfulness and integrity in advancing security. In summary, the article explains in details the activities that traditionally occur in most security checkpoints and any security failures that may result due to human errors in watchfulness and integrity. The authors recommend solutions to these errors by suggesting ways of improving watchfulness and integrity, common trends in security management. The article is thus meant for companies that intend to improve their security management and businesses that provide security management services. In relation to the topic, the article addresses the new trends in security management aimed at reducing human errors by improving watchfulness and integrity at checkpoints. The authors use simple language that is easy to follow and understand. However, it is evident that the authors fail to provide tangible or a more practical solution on how human integrity at checkpoints can be monitored and improved.

Dhillon, G., Syed, R., & Pedron, C. (2016). Interpreting information security culture: An organizational transformation case study. Computers & Security, 56, 63-69.
The purpose of the article is to explain the implications of security culture to security management in businesses and organizations. The article summarizes the security culture of various companies and how the culture governs and controls the security requirements and needs, hence determining the strategic decisions on the security mechanisms to use and the security companies to contract. The article would be useful to security providing firms as it provides insights into the current trends in company’s security culture and their needs in improving their security management. In relation to the topic, the article explains the current trends in security management that influence the security culture, hence impacting on the security needs. Some of the main issues raised in the article include the need for good security surveillance and monitoring, security training on how to deal with different security situations and how to use Public Relations experts to communicate about security. The strength of the article is in its comprehensiveness and thorough research into the topic. However, the authors assume that all companies have similar security needs that govern their security culture.

Kyriakides, E., & Polycarpou, M. (Eds.). (2015). Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems. Springer.
The purpose of the book is to explain the use of complex engineering and technological systems in intelligent monitoring and security management. These systems are the ones referred to as critical infrastructure systems. In summary, the article explains the importance of critical infrastructure systems in security management and the new developments in the use of these systems. As such, the book is relevant to an audience of security providing firms and companies and other companies that intend to improve their security management processes based on recent trends. In relation to the topic, the book addresses the changes that have transpired in critical infrastructure system in the recent years and the new technological advances that improve security management. The book clearly details the recent changes in critical infrastructure systems and gives details about the preference for more updated systems and the benefits of having updated systems. However, the book only addresses trends in security systems only and ignores other trends in security management.