Search results

21 – 30 of over 1000
Article
Publication date: 1 October 1963

T.E.A.K. Jackson and R. Dickie

Circumstances more or less forced this College to take the plunge with CCTV though, as with many other colleges, they had already been interested in it. This makes their verdict…

Abstract

Circumstances more or less forced this College to take the plunge with CCTV though, as with many other colleges, they had already been interested in it. This makes their verdict after a year all the more interesting: “it has undoubtedly come to stay”. A second camera, more sets and a small studio are planned for the near future

Details

Education + Training, vol. 5 no. 10
Type: Research Article
ISSN: 0040-0912

Article
Publication date: 1 September 1988

Closed circuit TV can be used for the improvement of communications and not just as a means of security surveilance. A company's use of CCTV as a means of monitoring the loading…

Abstract

Closed circuit TV can be used for the improvement of communications and not just as a means of security surveilance. A company's use of CCTV as a means of monitoring the loading of goods for distribution is described. More users of CCTV, such as their use on critical sectors of the production process, are looked at. Through its employment the work‐load can be quantified, cost‐effectiveness can be monitored and incidents of breakdown can be examined. Employee opposition does not appear to be a huge problem. Some pointers to financing such acquisitions are given.

Details

Industrial Management & Data Systems, vol. 88 no. 9/10
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 1 August 1971

David McLelland

David McLelland outlines the way in which micro teaching by CCTV can be of help to the student teacher and his tutor in assessing progress in teaching practice.

Abstract

David McLelland outlines the way in which micro teaching by CCTV can be of help to the student teacher and his tutor in assessing progress in teaching practice.

Details

Education + Training, vol. 13 no. 8
Type: Research Article
ISSN: 0040-0912

Article
Publication date: 17 September 2019

Jeong Hoon Jo, Shailendra Rathore, Vincenzo Loia and Jong Hyuk Park

The purpose of this paper is to propose a trusted security zone architecture that uses a blockchain technology to provide secure sharing of data in the security zone while…

532

Abstract

Purpose

The purpose of this paper is to propose a trusted security zone architecture that uses a blockchain technology to provide secure sharing of data in the security zone while maintaining the integrity, confidentiality and availability of data. The blockchain uses a distributed network to ensure data availability and uses public ledgers to ensure the integrity and confidentiality of data.

Design/methodology/approach

The proposed architecture uses a blockchain technology to provide secure sharing of data in the security zone while maintaining the integrity, confidentiality and availability of data. The blockchain uses a distributed network to ensure data availability and uses public ledgers to ensure the integrity and confidentiality of data.

Findings

Analysis of the proposed architecture with a use case scenario demonstrates that it provides a robust security measure against unauthorized network intrusions.

Originality/value

Unlike the existing security zone, this paper adopts a method of storing data by using blockchain. It meets the need to study integrated authentication management methods of future research.

Details

The Electronic Library, vol. 37 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 3 April 2017

Qian Zhang, Chao Wu, Han Qiao and Shouyang Wang

This paper is dedicated to answer two questions: What is the business model of interactive television (iTV) ad at China’s Spring Festival Gala; and Why the business model of iTV…

Abstract

Purpose

This paper is dedicated to answer two questions: What is the business model of interactive television (iTV) ad at China’s Spring Festival Gala; and Why the business model of iTV ad creates different commercial values for different firms.

Design/methodology/approach

The two questions can be summarized as what and why problems; so, this paper adopts the method of the qualitative case study. For the first question, this paper uses the method of system activity diagram to design the business model. For the second question, this paper proposes a new analytical method – voice, incentive and convenience (VIC) model, which is used to analyze the commercial value of iTV ad. The proposal of VIC model is based on Wang et al.’s Iceberg theory.

Findings

The effect of interactive advertising is significantly better than that of traditional advertising, and interactive advertising is becoming the first choice for marketers. The business model innovation of iTV ad brings new business opportunities. In addition, the larger the area of the triangle surrounded by the three elements of VIC, the higher the commercial value of iTV ad.

Originality/value

Current business model studies focus on business model definitions and innovations, whereas the studies on business model evaluation and its influential factors are rare. A new analytical model named VIC is proposed. It explores the effect of VIC on the commercial value of iTV ad and provides a reference for the quantitative empirical analysis. The combination of activity system theory and VIC model contributes to the understanding of the explicit knowledge and tacit knowledge of iTV ad business model. This framework can be used to guide TV stations and stakeholders for business model innovations and optimizations.

Details

Chinese Management Studies, vol. 11 no. 1
Type: Research Article
ISSN: 1750-614X

Keywords

Article
Publication date: 1 May 1970

David McClelland

This article is intended to give would‐be purchasers or existing users of CCTV equipment some insight into the principles involved in the working of CCTV.

Abstract

This article is intended to give would‐be purchasers or existing users of CCTV equipment some insight into the principles involved in the working of CCTV.

Details

Education + Training, vol. 12 no. 5
Type: Research Article
ISSN: 0040-0912

Article
Publication date: 1 December 2005

Paul Michael Cozens, Greg Saville and David Hillier

The purpose of this paper is to critically review the core findings from recently published place‐based crime prevention research. The paper aims to critically evaluate the…

35681

Abstract

Purpose

The purpose of this paper is to critically review the core findings from recently published place‐based crime prevention research. The paper aims to critically evaluate the available evidence on the contribution of crime prevention through environmental design as a crime prevention strategy.

Design/methodology/approach

Large‐scale evaluations of crime prevention through environmental design (CPTED) are reviewed with a view to clarifying current knowledge on the evidence of crime prevention through environmental design.

Findings

The review concludes that there is a growing body of research that supports the assertion that crime prevention through environmental design is effective in reducing both crime and fear of crime in the community.

Research limitations/implications

Although the paper may not review all the evaluations of CPTED, it nonetheless provides a detailed compilation and overview of the most significant research in the area, including an extensive and modern bibliography on the subject. Research implications will be the subject of a forthcoming paper.

Practical implications

CPTED is an increasingly fashionable approach and is being implemented on a global scale. Additionally, individual components such as territoriality, surveillance, maintenance, access control, activity support and target‐hardening are being widely deployed. However, the evidence currently available is inconclusive and much criticised, which effectively prevents widespread intervention and investment by central government. The paper details the difficulties associated with demonstrating the effectiveness of CPTED.

Originality/value

The paper concludes that although empirical proof has not been definitively demonstrated, there is a large and growing body of research, which supports the assertion that crime prevention through environmental design is a pragmatic and effective crime prevention tool. This review provides an extensive bibliography of contemporary crime prevention through environmental design and a follow‐up paper will discuss the future research priorities for it.

Details

Property Management, vol. 23 no. 5
Type: Research Article
ISSN: 0263-7472

Keywords

Article
Publication date: 20 August 2008

K.C. Scott‐Brown and P.D.J. Cronin

The purpose of this paper is to outline a strategy for research development focused on addressing the neglected role of visual perception in real life tasks such as policing…

1378

Abstract

Purpose

The purpose of this paper is to outline a strategy for research development focused on addressing the neglected role of visual perception in real life tasks such as policing surveillance and command and control settings.

Design/methodology/approach

The scale of surveillance task in modern control room is expanding as technology increases input capacity at an accelerating rate. The authors review recent literature highlighting the difficulties that apply to modern surveillance and give examples of how poor detection of the unexpected can be, and how surprising this deficit can be. Perceptual phenomena such as change blindness are linked to the perceptual processes undertaken by law‐enforcement personnel.

Findings

A scientific programme is outlined for how detection deficits can best be addressed in the context of a multidisciplinary collaborative agenda between researchers and practitioners. The development of a cognitive research field specifically examining the occurrence of perceptual “failures” provides an opportunity for policing agencies to relate laboratory findings in psychology to their own fields of day‐to‐day enquiry.

Originality/value

The paper shows, with examples, where interdisciplinary research may best be focussed on evaluating practical solutions and on generating useable guidelines on procedure and practice. It also argues that these processes should be investigated in real and simulated context‐specific studies to confirm the validity of the findings in these new applied scenarios.

Details

Policing: An International Journal of Police Strategies & Management, vol. 31 no. 3
Type: Research Article
ISSN: 1363-951X

Keywords

Book part
Publication date: 4 July 2019

Michael T. Rossler

Police technology fundamentally shapes the police role, and the adoption of technology is even linked to the success of police reforms. Police adoption of emerging technological…

Abstract

Police technology fundamentally shapes the police role, and the adoption of technology is even linked to the success of police reforms. Police adoption of emerging technological tools changes the way police interact with citizens. The change in police citizen interactions can then have serious implications for the social control that police have over citizens, the civil liberties citizens enjoy, police accountability, and the legitimacy that the police hold in contemporary American society.

While technology impacts these critical issues in policing, not all technology adopted by the police is likely to influence their relationship with the public. As such, this chapter closely examines the ways that several emerging technologies adopted by the police (i.e., body-worn cameras (BWC), aerial surveillance, visual surveillance, social media, mapping and crime prediction, and less lethal force technology) impact issues related to social control, accountability, and legitimacy. The current literature seems to indicate that some innovations such as BWCs enhance police accountability and legitimacy, and also expand social control. Other technologies such as aerial surveillance and conducted energy devices increase social control, and display a complicated or unclear influence over police legitimacy.

Details

Political Authority, Social Control and Public Policy
Type: Book
ISBN: 978-1-78756-049-9

Keywords

Book part
Publication date: 11 August 2005

Seçkin Polat and Umut Asan

This paper presents an approach for developing critical skills necessary for competition in the future. The study combines the methodology of designing scenarios with the…

Abstract

This paper presents an approach for developing critical skills necessary for competition in the future. The study combines the methodology of designing scenarios with the methodology of defining competencies by a transition from future scenarios to skills, based on product scenarios. Product scenarios indicate concrete alternative future products that are key sources for identifying future skills. The approach has been applied to the security equipment sector in Turkey. The product, closed circuit television (CCTV) system is chosen to illustrate the process.

Details

Competence Perspective on Managing Internal Process
Type: Book
ISBN: 978-1-84950-320-4

21 – 30 of over 1000