Search results
21 – 30 of over 1000T.E.A.K. Jackson and R. Dickie
Circumstances more or less forced this College to take the plunge with CCTV though, as with many other colleges, they had already been interested in it. This makes their verdict…
Abstract
Circumstances more or less forced this College to take the plunge with CCTV though, as with many other colleges, they had already been interested in it. This makes their verdict after a year all the more interesting: “it has undoubtedly come to stay”. A second camera, more sets and a small studio are planned for the near future
Closed circuit TV can be used for the improvement of communications and not just as a means of security surveilance. A company's use of CCTV as a means of monitoring the loading…
Abstract
Closed circuit TV can be used for the improvement of communications and not just as a means of security surveilance. A company's use of CCTV as a means of monitoring the loading of goods for distribution is described. More users of CCTV, such as their use on critical sectors of the production process, are looked at. Through its employment the work‐load can be quantified, cost‐effectiveness can be monitored and incidents of breakdown can be examined. Employee opposition does not appear to be a huge problem. Some pointers to financing such acquisitions are given.
Details
Keywords
David McLelland outlines the way in which micro teaching by CCTV can be of help to the student teacher and his tutor in assessing progress in teaching practice.
Jeong Hoon Jo, Shailendra Rathore, Vincenzo Loia and Jong Hyuk Park
The purpose of this paper is to propose a trusted security zone architecture that uses a blockchain technology to provide secure sharing of data in the security zone while…
Abstract
Purpose
The purpose of this paper is to propose a trusted security zone architecture that uses a blockchain technology to provide secure sharing of data in the security zone while maintaining the integrity, confidentiality and availability of data. The blockchain uses a distributed network to ensure data availability and uses public ledgers to ensure the integrity and confidentiality of data.
Design/methodology/approach
The proposed architecture uses a blockchain technology to provide secure sharing of data in the security zone while maintaining the integrity, confidentiality and availability of data. The blockchain uses a distributed network to ensure data availability and uses public ledgers to ensure the integrity and confidentiality of data.
Findings
Analysis of the proposed architecture with a use case scenario demonstrates that it provides a robust security measure against unauthorized network intrusions.
Originality/value
Unlike the existing security zone, this paper adopts a method of storing data by using blockchain. It meets the need to study integrated authentication management methods of future research.
Details
Keywords
Qian Zhang, Chao Wu, Han Qiao and Shouyang Wang
This paper is dedicated to answer two questions: What is the business model of interactive television (iTV) ad at China’s Spring Festival Gala; and Why the business model of iTV…
Abstract
Purpose
This paper is dedicated to answer two questions: What is the business model of interactive television (iTV) ad at China’s Spring Festival Gala; and Why the business model of iTV ad creates different commercial values for different firms.
Design/methodology/approach
The two questions can be summarized as what and why problems; so, this paper adopts the method of the qualitative case study. For the first question, this paper uses the method of system activity diagram to design the business model. For the second question, this paper proposes a new analytical method – voice, incentive and convenience (VIC) model, which is used to analyze the commercial value of iTV ad. The proposal of VIC model is based on Wang et al.’s Iceberg theory.
Findings
The effect of interactive advertising is significantly better than that of traditional advertising, and interactive advertising is becoming the first choice for marketers. The business model innovation of iTV ad brings new business opportunities. In addition, the larger the area of the triangle surrounded by the three elements of VIC, the higher the commercial value of iTV ad.
Originality/value
Current business model studies focus on business model definitions and innovations, whereas the studies on business model evaluation and its influential factors are rare. A new analytical model named VIC is proposed. It explores the effect of VIC on the commercial value of iTV ad and provides a reference for the quantitative empirical analysis. The combination of activity system theory and VIC model contributes to the understanding of the explicit knowledge and tacit knowledge of iTV ad business model. This framework can be used to guide TV stations and stakeholders for business model innovations and optimizations.
Details
Keywords
This article is intended to give would‐be purchasers or existing users of CCTV equipment some insight into the principles involved in the working of CCTV.
Paul Michael Cozens, Greg Saville and David Hillier
The purpose of this paper is to critically review the core findings from recently published place‐based crime prevention research. The paper aims to critically evaluate the…
Abstract
Purpose
The purpose of this paper is to critically review the core findings from recently published place‐based crime prevention research. The paper aims to critically evaluate the available evidence on the contribution of crime prevention through environmental design as a crime prevention strategy.
Design/methodology/approach
Large‐scale evaluations of crime prevention through environmental design (CPTED) are reviewed with a view to clarifying current knowledge on the evidence of crime prevention through environmental design.
Findings
The review concludes that there is a growing body of research that supports the assertion that crime prevention through environmental design is effective in reducing both crime and fear of crime in the community.
Research limitations/implications
Although the paper may not review all the evaluations of CPTED, it nonetheless provides a detailed compilation and overview of the most significant research in the area, including an extensive and modern bibliography on the subject. Research implications will be the subject of a forthcoming paper.
Practical implications
CPTED is an increasingly fashionable approach and is being implemented on a global scale. Additionally, individual components such as territoriality, surveillance, maintenance, access control, activity support and target‐hardening are being widely deployed. However, the evidence currently available is inconclusive and much criticised, which effectively prevents widespread intervention and investment by central government. The paper details the difficulties associated with demonstrating the effectiveness of CPTED.
Originality/value
The paper concludes that although empirical proof has not been definitively demonstrated, there is a large and growing body of research, which supports the assertion that crime prevention through environmental design is a pragmatic and effective crime prevention tool. This review provides an extensive bibliography of contemporary crime prevention through environmental design and a follow‐up paper will discuss the future research priorities for it.
Details
Keywords
K.C. Scott‐Brown and P.D.J. Cronin
The purpose of this paper is to outline a strategy for research development focused on addressing the neglected role of visual perception in real life tasks such as policing…
Abstract
Purpose
The purpose of this paper is to outline a strategy for research development focused on addressing the neglected role of visual perception in real life tasks such as policing surveillance and command and control settings.
Design/methodology/approach
The scale of surveillance task in modern control room is expanding as technology increases input capacity at an accelerating rate. The authors review recent literature highlighting the difficulties that apply to modern surveillance and give examples of how poor detection of the unexpected can be, and how surprising this deficit can be. Perceptual phenomena such as change blindness are linked to the perceptual processes undertaken by law‐enforcement personnel.
Findings
A scientific programme is outlined for how detection deficits can best be addressed in the context of a multidisciplinary collaborative agenda between researchers and practitioners. The development of a cognitive research field specifically examining the occurrence of perceptual “failures” provides an opportunity for policing agencies to relate laboratory findings in psychology to their own fields of day‐to‐day enquiry.
Originality/value
The paper shows, with examples, where interdisciplinary research may best be focussed on evaluating practical solutions and on generating useable guidelines on procedure and practice. It also argues that these processes should be investigated in real and simulated context‐specific studies to confirm the validity of the findings in these new applied scenarios.
Details
Keywords
Police technology fundamentally shapes the police role, and the adoption of technology is even linked to the success of police reforms. Police adoption of emerging technological…
Abstract
Police technology fundamentally shapes the police role, and the adoption of technology is even linked to the success of police reforms. Police adoption of emerging technological tools changes the way police interact with citizens. The change in police citizen interactions can then have serious implications for the social control that police have over citizens, the civil liberties citizens enjoy, police accountability, and the legitimacy that the police hold in contemporary American society.
While technology impacts these critical issues in policing, not all technology adopted by the police is likely to influence their relationship with the public. As such, this chapter closely examines the ways that several emerging technologies adopted by the police (i.e., body-worn cameras (BWC), aerial surveillance, visual surveillance, social media, mapping and crime prediction, and less lethal force technology) impact issues related to social control, accountability, and legitimacy. The current literature seems to indicate that some innovations such as BWCs enhance police accountability and legitimacy, and also expand social control. Other technologies such as aerial surveillance and conducted energy devices increase social control, and display a complicated or unclear influence over police legitimacy.
Details
Keywords
This paper presents an approach for developing critical skills necessary for competition in the future. The study combines the methodology of designing scenarios with the…
Abstract
This paper presents an approach for developing critical skills necessary for competition in the future. The study combines the methodology of designing scenarios with the methodology of defining competencies by a transition from future scenarios to skills, based on product scenarios. Product scenarios indicate concrete alternative future products that are key sources for identifying future skills. The approach has been applied to the security equipment sector in Turkey. The product, closed circuit television (CCTV) system is chosen to illustrate the process.