LR CCTV

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

The Effectiveness of CCTV Control Access System

The literature review is to examine whether the CCTV Control Access System can be effective or ineffective. The popularity of CCTV Control Access System is due to largely to its inexpensive and practical nature. CCTV Control Access System not only captures the presence of a car but also can be as monitoring. CCTV also provides an excellent opportunity in providing evidence. The literature review discuss that CCTV operation may be subject to a lack of continuous human monitoring. Most CCTV Control Access System are self-operate in that cameras are left running while people might only watch CCTV coverage for short amount of time. This poses a problem because events of concern are not viewed as they happen, thus the response time and effort may be compromised. With regard lack of human monitoring, eight European countries found that the majority of CCTV system aim to prevent deviant behaviour by symbolic but more or less incompetent deterrence because cameras are highly visible but those under surveillance are hardly visible for an observer due to irregular monitoring, informational overkill or even the deployment of dummy cameras as stated by Hampel and Toper 2004, p.7. CCTV can be considering some as form of spying on individuals. In particular, camera accuracy may pose the problem of capturing low quality images that will prevent accuracy of image from happen. In relation to accuracy, Henderson, Bruce and Burton (2001) conducted a series of test that revealed that even under optimal condition, the accuracy of face matching techniques using CCTV, broadcast quality recording, and still photographic images was unreliable, not least due to the low quality images used. A concern that CCTV introduces is the regard of human monitoring and versus CCTV effectiveness. It is crucial that an effective CCTV Control Access System is safeguarded by a quick response effort. Due to CCTV video information might be sensitive and has to be kept confidential. There are malicious people hack such confidential video to leaked out the video to in public which in result have caused an big economic problem. The literature review promotes the idea that having CCTV presence for recording purposes is simply not effective. CCTV Control Access System has to be followed by a rapid security to protect the informational video.

The literature reviews also discuss how CCTV requires continuous power consumption is considerably a lot as the camera keeps recording non-stop. In terms of power consumption of using CCTV Control Access System is very high in cost and high in power consumption because of the number of camera used and the system need power to operate. This can include the introduction of advance system to control the power consumption by lowering the cost. The literature review also addresses the concern for privacy. Science fiction literature provides a characterization of the intrusion of state authorized privacy intrusion. There is also disagreement about the appropriateness of using CCTV can infected peoples privacy. McCahill and Norris (2002) has cite a range of papers that report negative effects on young people arising from CCTV usage, whether or not it is specially targeted at them. P.Coleman and Sim (2000, p.635) also stated that CCTV has been touted as promoting human freedom, and there has also been protestation that CCTV infringes on peoples freedom and privacy. However, privacy has been entrusted to the use of CCTV operators concern may arise if CCTV cameras become misused. The final conclusion of the literature review addresses some key issues that influenced this project. Technological evaluations have contributed to a greater public perception about CCTV Control Access System. Continuous live monitoring is essential to increase the efficiency of CCTV systems. Other factors may obvious contributing to deterrent effect of CCTV Control Access System. It is crucial that CCTV technology is properly observed and is carried out. CCTV Control Access System poses a perception to make the most people feel ease when they park their car and feel safe when CCTV can ensure the security. It makes lesser problems in parking cars and is more likely to be reduced by CCTV Control Access System. Most people query whether the CCTV is trespassing personal privacy and it has been shown that cameras are open to being improperly used or misused. This disturbing outcome may be further promoted with the use CCTV Control Access System. Many countries lack of understanding of law enforcement governing the use of CCTV Control Access System. It should be noted that CCTV camera is not just by detecting presence of car and automatically opens the gate the use may be an efficient method for monitoring too.

References 1. Vidhya, J., Deepika, V., & Singh, K. J. (2013). Intelligent Model for Video Survillance Security System. Journal of Engineering Science and Technology Review, 6(3), 119-121. 2. Lee, J. V., Chuah, Y. D., & Chai, C. T. (2013). A Multilevel Home Security System (MHSS). International Journal of Smart Home, 7(2). 3. Davies, A. C., & Velastin, S. A. (2005). A progress review of intelligent CCTV surveillance systems. Proc. IEEE IDAACS, 417-423. 4. Harris, V., & Harris, C. (2009). Information overload: CCTV, your networks, communities and crime. In 2nd Australian Security and Intelligence Conference (p. 10). 5. Ying, M., Jingjue, J., & Fulin, B. (2002). 3D-City model supporting for CCTV monitoring systems. In Symposium on geospatial theory, processing and application, Ottawa. 6. Prashyanusorn, V., Prashyanusorn, P., Kaviya, S., Fujii, Y., & Yupapin, P. P. (2011). The Use of Security Cameras with Privacy Protecting Ability. Procedia Engineering, 8, 301-307. 7. Yass, A. A., Yasin, N. M., Zaidan, B. B., & Zaidan, A. A. (2009). New design for intelligent parking system using the principles of management information system and image detection system. In Proceedings of International Conference on Computer Engineering and Applications (ICCEA 2009). 8. Sanderson, C., Bigdeli, A., Shan, T., Chen, S., Berglund, E., & Lovell, B. C. (2007). Intelligent CCTV for mass transport security: challenges and opportunities for video and face processing. Electronic Letters on Computer Vision and Image Analysis, 6(3), 30-41. 9. Smith, R. A., MacLennan-Brown, K., Tighe, J. F., Cohen, N., Triantaphillidou, S., & MacDonald, L. W. (2008, January). Colour analysis and verification of CCTV images under different lighting conditions. In Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series (Vol. 6808, p. 34). 10. Kumar, P. V., & Siddarth, T. S. A Prototype Parking System using Wireless Sensor Networks. In Proceedings of the International Joint Journal Conference on Engineering and Technology (IJJCET 2010).

You might also like