Academic literature on the topic 'Closed-Circuit Television (CCTV) Surveillance Systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Closed-Circuit Television (CCTV) Surveillance Systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Closed-Circuit Television (CCTV) Surveillance Systems"

1

Gim, U.-Ju, Jae-Jun Lee, Jeong-Hun Kim, Young-Ho Park, and Aziz Nasridinov. "An Automatic Shoplifting Detection from Surveillance Videos (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 10 (2020): 13795–96. http://dx.doi.org/10.1609/aaai.v34i10.7169.

Full text
Abstract:
The use of closed circuit television (CCTV) surveillance devices is increasing every year to prevent abnormal behaviors, including shoplifting. However, damage from shoplifting is also increasing every year. Thus, there is a need for intelligent CCTV surveillance systems that ensure the integrity of shops, despite workforce shortages. In this study, we propose an automatic detection system of shoplifting behaviors from surveillance videos. Instead of extracting features from the whole frame, we use the Region of Interest (ROI) optical-flow fusion network to highlight the necessary features more accurately.
APA, Harvard, Vancouver, ISO, and other styles
2

Vachon, François, Benoît R. Vallières, Joel Suss, Jean-Denis Thériault, and Sébastien Tremblay. "The CSSS Microworld." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (2016): 265–69. http://dx.doi.org/10.1177/1541931213601061.

Full text
Abstract:
The CSSS microworld simulates the task of a closed-circuit television (CCTV) operator responsible for monitoring multiple CCTV feeds in the context of security surveillance. Operators must manage the display of multiple CCTV feeds, monitor the feeds for critical incidents, and then report detected incidents. The microworld can be used for human factors research, interface design, training and personnel selection, and systems engineering. We present a use case of the CSSS microworld to identify the best predictors of CCTV performance. Our results show that the Automated Operation Span and inattentional blindness tests can predict both CSSS detection rate and false alarms, suggesting that these instruments have the potential for quickly assessing the surveillance competency of candidates. This use case illustrates how the CSSS platform may prove to be useful in the selection of personnel for CCTV operator roles.
APA, Harvard, Vancouver, ISO, and other styles
3

Thanh Le, Tuan, JongBeom Jeong, and Eun-Seok Ryu. "Efficient Transcoding and Encryption for Live 360 CCTV System." Applied Sciences 9, no. 4 (2019): 760. http://dx.doi.org/10.3390/app9040760.

Full text
Abstract:
In recent years, the rapid development of surveillance information in closed-circuit television (CCTV) has become an indispensable element in security systems. Several CCTV systems designed for video compression and encryption need to improve for the best performance and different security levels. Specially, the advent of 360 video makes the CCTV promising for surveillance without any blind areas. Compared to current systems, 360 CCTV requires the large bandwidth with low latency to run smoothly. Therefore, to improve the system performance, it needs to be more robust to run smoothly. Video transmission and transcoding is an essential process in converting codecs, changing bitrates or resizing the resolution for 360 videos. High-performance transcoding is one of the key factors of real time CCTV stream. Additionally, the security of video streams from cameras to endpoints is also an important priority in CCTV research. In this paper, a real-time transcoding system designed with the ARIA block cipher encryption algorithm is presented. Experimental results show that the proposed method achieved approximately 200% speedup compared to libx265 FFmpeg in transcoding task, and it could handle multiple transcoding sessions simultaneously at high performance for both live 360 CCTV system and existing 2D/3D CCTV system.
APA, Harvard, Vancouver, ISO, and other styles
4

Ratcliffe, Jerry H., and Elizabeth R. Groff. "A Longitudinal Quasi-Experimental Study of Violence and Disorder Impacts of Urban CCTV Camera Clusters." Criminal Justice Review 44, no. 2 (2018): 148–64. http://dx.doi.org/10.1177/0734016818811917.

Full text
Abstract:
Methodological challenges have hampered a number of previous studies into the crime reduction effectiveness of closed-circuit television (CCTV) surveillance systems. These have included the use of arbitrary fixed distances to represent estimated camera deterrence areas and a lack of control for camera sites with overlapping surveillance areas. The current article overcomes the first of these challenges by using camera view areas individually constructed by researchers viewing and manipulating cameras to determine precise camera viewsheds. The second challenge is addressed by grouping cameras into clusters of combined viewshed areas. The longitudinal crime and disorder reduction effectiveness of these clusters of overlapping CCTV cameras is tested in Philadelphia, PA. Multilevel mixed-effects models with time-varying covariates and measures from a noncomparable control area are applied to 10 years of crime data (2003–2012) within the viewsheds of 86 CCTV cameras grouped into 13 clusters. Models applied across violent street felonies and disorder incidents find no significant impact associated with the introduction of CCTV surveillance. Potential reasons for this are discussed.
APA, Harvard, Vancouver, ISO, and other styles
5

Agrawal, Priyanka. "Smart Surveillance System using Face Tracking." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 2613–17. http://dx.doi.org/10.22214/ijraset.2021.35567.

Full text
Abstract:
The face is seen as a key component of the human body, and humans utilise it to identify one another. Face detection in video refers to the process of detecting a person's face from a video sequence, while face tracking refers to the process of tracking the person's face throughout the video. Face detection and tracking has become a widely researched issue due to applications such as video surveillance systems and identifying criminal activity. However, working with videos is tough due to problems such as bad illumination, low resolution, and atypical posture, among others. It is critical to produce a fair analysis of various tracking and detection strategies in order to fulfil the goal of video tracking and detection. Closed-circuit television (CCTV) technology had a significant impact on how crimes were investigated and solved. The material used to review crime scenes was CCTV footage. CCTV systems, on the other hand, just offer footage and do not have the ability to analyse it. In this research, we propose a system that can be integrated with the CCTV footage or any other video input like webcam to detect, recognise, and track a person of interest. Our system will follow people as they move through a space and will be able to detect and recognise human faces. It enables video analytics, allowing existing cameras to be combined with a system that will recognise individuals and track their activities over time. It may be used for remote surveillance and can be integrated into video analytics software and CCTV security solutions as a component. It may be used on college campuses, in offices, and in shopping malls, among other places.
APA, Harvard, Vancouver, ISO, and other styles
6

Saluky, Saluky. "Moving Object Detection on CCTV Surveillance Using the Frame Difference Method." ITEJ (Information Technology Engineering Journals) 4, no. 2 (2019): 114–22. http://dx.doi.org/10.24235/itej.v4i2.52.

Full text
Abstract:
In today's computer vision research, many build systems for observing humans and understanding their appearance, activities, and behaviour that provide sophisticated interfaces for interacting with humans, and create plausible human models for various purposes. This paper presents a simple algorithm for detecting moving objects from a static background based on frame differences. First, the first frame is captured via a static camera such as Closed Circuit Television (CCTV) after which a sequence of frames is taken periodically. Second, the absolute difference is calculated between successive frames and the difference in images is stored in the system. Third, the difference image is converted into a grey image and then translated into a binary image. Finally, morphological filtering is carried out to remove noise. In the last process, moving objects can be detected in conditions that do not change much apart from moving objects.
APA, Harvard, Vancouver, ISO, and other styles
7

Dąbrowski, Adam, Piotr Matczak, Andrzej Wójtowicz, and Michael Leitner. "Identification of Experimental and Control Areas for CCTV Effectiveness Assessment—The Issue of Spatially Aggregated Data." ISPRS International Journal of Geo-Information 7, no. 12 (2018): 471. http://dx.doi.org/10.3390/ijgi7120471.

Full text
Abstract:
Progress in surveillance technology has led to the development of Closed-Circuit Television (CCTV) systems in cities around the world. Cameras are considered instrumental in crime reduction, yet existing research does not unambiguously answer the question whether installing them affects the number of crimes committed. The quasi-experimental method usually applied to evaluate CCTV systems’ effectiveness faces difficulties with data quantity and quality. Data quantity has a bearing on the number of crimes that can be conclusively inferred using the experimental procedure. Data quality affects the level of crime data aggregation. The lack of the exact location of a crime incident in the form of a street address or geographic coordinates hinders the selection procedure of experimental and control areas. In this paper we propose an innovative method of dealing with data limitations in a quasi-experimental study on the effectiveness of CCTV systems in Poland. As police data on crime incidents are geocoded onto a neighborhood or a street, we designed a method to overcome this drawback by applying similarity measures to time series and landscape metrics. The method makes it possible to determine experimental (test) and control areas which are necessary to conduct the study.
APA, Harvard, Vancouver, ISO, and other styles
8

Birnhack, Michael, and Lotem Perry-Hazan. "School Surveillance in Context: High School Students’ Perspectives on CCTV, Privacy, and Security." Youth & Society 52, no. 7 (2020): 1312–30. http://dx.doi.org/10.1177/0044118x20916617.

Full text
Abstract:
This study examines high school students’ perceptions of school closed-circuit television systems (CCTVs). It draws on interviews conducted with 83 adolescents recruited from 10th- to 12th-grade classes at 39 Israeli schools. The findings indicate that students’ perceptions of CCTVs are embedded in their overall opinions about their school, particularly concerning relationships and trust between students and educators. The various metaphors that students used to describe their relational position regarding school CCTVs highlight that surveillance has become part of the organizational–educational experience. The findings also show that students’ scrutiny of school CCTVs reflects a conflict between privacy and security concerns. Students resolve this conflict by resorting to various balances, which echo general constitutional principles but were also anchored in the students’ personal schooling experiences. While building on Nissenbaum’s framework of contextual integrity for assessing privacy violations, we challenge its assumption of a uniform set of informational norms within a given context.
APA, Harvard, Vancouver, ISO, and other styles
9

Park, Jisoo, Jingdao Chen, Yong K. Cho, Dae Y. Kang, and Byung J. Son. "CNN-Based Person Detection Using Infrared Images for Night-Time Intrusion Warning Systems." Sensors 20, no. 1 (2019): 34. http://dx.doi.org/10.3390/s20010034.

Full text
Abstract:
Night-time surveillance is important for safety and security purposes. For this reason, several studies have attempted to automatically detect people intruding into restricted areas by using infrared cameras. However, detecting people from infrared CCTV (closed-circuit television) is challenging because they are usually installed in overhead locations and people only occupy small regions in the resulting image. Therefore, this study proposes an accurate and efficient method for detecting people in infrared CCTV images during the night-time. For this purpose, three different infrared image datasets were constructed; two obtained from an infrared CCTV installed on a public beach and another obtained from a forward looking infrared (FLIR) camera installed on a pedestrian bridge. Moreover, a convolution neural network (CNN)-based pixel-wise classifier for fine-grained person detection was implemented. The detection performance of the proposed method was compared against five conventional detection methods. The results demonstrate that the proposed CNN-based human detection approach outperforms conventional detection approaches in all datasets. Especially, the proposed method maintained F1 scores of above 80% in object-level detection for all datasets. By improving the performance of human detection from infrared images, we expect that this research will contribute to the safety and security of public areas during night-time.
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Jinsu, and Namje Park. "A Face Image Virtualization Mechanism for Privacy Intrusion Prevention in Healthcare Video Surveillance Systems." Symmetry 12, no. 6 (2020): 891. http://dx.doi.org/10.3390/sym12060891.

Full text
Abstract:
Closed-circuit television (CCTV) and video surveillance systems (VSSs) are becoming increasingly more common each year to help prevent incidents/accidents and ensure the security of public places and facilities. The increased presence of VSS is also increasing the number of per capita exposures to CCTV cameras. To help protect the privacy of the exposed objects, attention is being drawn to technologies that utilize intelligent video surveillance systems (IVSSs). IVSSs execute a wide range of surveillance duties—from simple identification of objects in the recorded video data, to understanding and identifying the behavioral patterns of objects and the situations at the incident/accident scenes, as well as the processing of video information to protect the privacy of the recorded objects against leakage. Besides, the recorded privacy information is encrypted and recorded using blockchain technology to prevent forgery of the image. The technology herein proposed (the “proposed mechanism”) is implemented to a VSS, where the mechanism converts the original visual information recorded on a VSS into a similarly constructed image information, so that the original information can be protected against leakage. The face area extracted from the image information is recorded in a separate database, allowing the creation of a restored image that is in perfect symmetry with the original image for images with virtualized face areas. Specifically, the main section of this study proposes an image modification mechanism that inserts a virtual face image that closely matches a predetermined similarity and uses a blockchain as the storage area.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Closed-Circuit Television (CCTV) Surveillance Systems"

1

Goold, B. J. "Public surveillance CCTV : aspects of its impact on policing in an English force." Thesis, University of Oxford, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.251453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Geleri, Aytekin. "An examination of public attitudes towards the use of closed circuit television in public places." Thesis, University of Exeter, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.307276.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Xiao Jun. "Understanding CCTV surveillance in China :A case study of Guangzhou." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3953603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Skinns, Christopher David. "Evaluating the impact of town centre closed circuit television surveillance systems." Thesis, University of Hull, 1998. http://hydra.hull.ac.uk/resources/hull:3890.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yeung, Alex Tak Lok. "A competitive analysis of digital video surveillance products' manufacturers in Asia Pacific region." access full-text access abstract and table of contents, 2005. http://libweb.cityu.edu.hk/cgi-bin/ezdb/dissert.pl?msc-meem-b1991300xa.pdf.

Full text
Abstract:
Thesis (M.Sc.)--City University of Hong Kong, 2005.<br>Title from title screen (viewed on Jan. 10, 2006) "A dissertation submitted in partial fulfillment of the requirements for the degree of Master of Science in Engineering Management." Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
6

Rossi, Rossi Carmelo II. "Criticality and Risk Assessment for Pipe Rehabilitation in the City of Santa Barbara Sewer System." DigitalCommons@CalPoly, 2015. https://digitalcommons.calpoly.edu/theses/1424.

Full text
Abstract:
Aging sewer infrastructure is posing greater and greater risk to the health and well-being of City residents. Issues can range from pipe blockages in sewer laterals to Sanitary Sewer Overflows. This thesis develops a risk analysis method that can be used by municipalities to maintain and rehabilitate sewer assets. Risk combines the effect of Likelihood of Failure (LOF) and Consequence of Failure (COF) to perform a complete two-dimensional analysis that allows for relative comparison between different pipes in the system. The LOF rating has been equated to pipe integrity while the COF rating was related to the environmental, economic, and social consequences to pipe failure. In order to estimate pipe integrity Closed Circuit Television (CCTV) scores from the City of Santa Barbara were used in combination with spatial and physical properties associated with each pipe. The CCTV scores were simply integer values between 0 and 5 based on the National Association of Sewer Services Company’s (NASSCO) Pipeline Assessment Certification Program (PACP) results. The quantitative parameters included pipe material and age, distance from restaurants, distance from any above ground water source, pipe depth below the ground surface, pipe length, and vehicular traffic volumes. The sensitivity analysis compared the given structural integrity scores with the predicted scores based on the weighted scoring method. It isolated four out of six of the parameters tested that affected the structural integrity of sewer pipes: material and age (45%), pipe depth (20%), Vehicular Traffic (10%), and distance from an above-ground water source (25%). A program was created in the C programming language that iteratively determined the percentage for each factor. These percentage factors are used to obtain the predicted structural integrity score for all the pipes. Like the LOF rating, the COF rating consisted of scores between 0 and 5. The COF rating used pipe diameter, distance from commercial zones, distance from critical infrastructure, and vehicular traffic volume as parameters for quantifying the environmental, economic, and social consequences. These factors were determined from review of past literature and given approximately equal weighting when determining the COF rating values. The environmental factor, pipe diameter, was given a percentage factor of 30%; the economic factor, distance to commercial zones, was given a percentage factor of 30%; and the social concerns, distance to critical infrastructure and vehicular traffic volume, were given percentage factors of 20% each. Finally, the risk for each pipe was determined in Geographic Information Systems (GIS) by combining the predicted structural integrity score or LOF rating and COF rating value for each pipe. This generated color-coded maps that showed distinct pipes that had the most critical predicted structural integrity scores, highest consequence, and the pipes with the most risk. This process could be used by any City to create a maintenance and rehabilitation schedule and plan for future CCTV inspections.
APA, Harvard, Vancouver, ISO, and other styles
7

Moyo, Sheperd. "Evaluating the use of CCTV surveillance systems for crime control and prevention : selected case studies from Johannesburg and Tshwane, Gauteng." Diss., 2019. http://hdl.handle.net/10500/26222.

Full text
Abstract:
This research evaluates crime prevention effects/impact of open-street closed circuit television (CCTV) surveillance systems as installed in the selected areas (research sites) of the cities of Johannesburg and Tshwane in the Gauteng Province of South Africa on crimes occurring in these surveilled areas. Currently, CCTV surveillance systems are a common sight in many of the urban areas of South Africa.The principal aim of this study was to explore the evaluation of CCTV for crime prevention, reduction and control. The results show that, despite a lack of empirical evidence as to the value of CCTV surveillance systems in preventing or reducing crime, there is strong public support for these systems and that the foundation for much of this support lies in the perceptions/feelings of members of the public of greater safety generated in areas with CCTV coverage. The method of sampling used was a purposive non-probability sampling approach. Participants were selected for interviews based on their knowledge and experience of CCTV systems. The results show that, despite this lack of empirical evidence, CCTV appears to be a viable option for crime prevention and control when integrated with evidence-based strategies rather than as a stand-alone tactic in order to achieve crime control benefits.<br>Criminology and Security Science<br>M. Tech. (Security Management)
APA, Harvard, Vancouver, ISO, and other styles
8

Walby, Kevin. "The rise of open-street CCTV surveillance in Canada." 2005. http://hdl.handle.net/1828/818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lo, Chung-Chiang, and 羅重江. "A Study on ROC''s Management Regulation of the Closed Circuit Television(CCTV) Systems-Take the Example of Kaohsiung City." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/v7jfyu.

Full text
Abstract:
碩士<br>國立中山大學<br>政治學研究所<br>102<br>“Justice”is the core value of human society, and“happiness”is the sureness derived from freedom from fear. The setting of video surveillance is hoping to give citizens the feeling of“justice”and“happiness”. With rapid changes of the politics, society and economic structures, the public security situation is increasingly complex, modus operandi and the level of victimization compare to the past have a dramatic change, and magnifies report by the media and far-reaching transmission of network, violent crime and other security problems. It is just like citizens’nightmare. Government units also recognize that the setting of video surveillance is conducive to investigate and prevent crime and save the cost of public security. It generally sets video surveillances at important intersections in major cities and blind spots of public security and expects to create a safe living environment for citizens. Kaohsiung City is in no way conceding, after the merger between county and city, it has both urban and rural development pattern. Explore and evaluate from the angle of the real pulsation of society, geographical environment and social control, has been completed 17,862 video surveillance cameras and are adding continually. However, it has no related supporting measures in response. Therefore, this research found that there are many substandard existing social conditions for the governance of video surveillance in our country and current Kaohsiung City, as well as expectations of the citizens, there are necessary to review and improve. Therefore, in this research, basic principles, administrative organization, limit of administrative rights, administrative relief and administrative surveillance of five structures of the Administrative Law are main research methods; it adopts literature review and historical induction, views the currently legal system and social status of video surveillance governance in our country, and then view the problems of video surveillance governance in current Kaohsiung City and makes recommendations. Expect it can be perfect by this research.
APA, Harvard, Vancouver, ISO, and other styles
10

Lin, Shao-Chun, and 林紹鈞. "A Study of Information Privacy in the Information Society— Focus on the Use of Closed Circuit Television (CCTV) Systems in Public Places." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/44367949289348617791.

Full text
Abstract:
碩士<br>淡江大學<br>公共行政學系公共政策碩士班<br>97<br>The phrase “Smile, You are on CCTV” brings out the issue that nowadays is an era of ubiquitous closed circuit television (CCTV) systems. No matter where people go, they will find pairs of electronic eyes monitoring and recording their behaviors 24 hours a day. Places such as the convenient stores, financial institutions, public transportation system, campus, parks, streets or alleys, and communities, are commonly installed with such devices. This phenomenon has been widely accepted by the public, which even becomes the political campaign or political performance from the candidates for public office. One of the major reasons for installing CCTV system is purported for law and order. In the incident where people are wrongfully harmed, video from CCTV systems can be accessed and served as evidence for protecting the victims. The thesis reviews on the existing literature for collation and analysis, in exploration of the development of surveillance society theories and the relationship between CCTV systems, information privacy and basic human rights. Subsequently, the thesis discusses the development and experiences from England, USA and Singapore in implementing CCTV systems, in addition to the issues arising from. Moreover, the thesis further studies on the current situations and issues between the implementation and information privacy of the domestic CCTV systems, through development and policy for promotion of our domestic CCTV systems, standards related to laws, in addition to conducting interview with the head of neighborhood, public and the human rights groups for their view and perspectives. The thesis has discovered the followings: 1.The management and maintenance of CCTV systems lacks adequate funding; 2.Incomplete laws and regulations. For example, is it not clearly stipulated in the authorization in Section 10 of Police Duties Enforcement Act and Computer-processed Data Protection Act on CCTV, and unclear authorization in the administrative rules of local governments; 3. The public does not consider installing CCTV systems in public places as an invasion to privacy, nonetheless their main concern emphasizes on the purpose of law and order.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Closed-Circuit Television (CCTV) Surveillance Systems"

1

Kruegle, Herman. CCTV surveillance: Video practices and technology. 2nd ed. Elsevier Butterworth Heinemann, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

CCTV surveillance: Video practices and technology. Butterworth-Heinemann, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

CCTV surveillance: Analog and digital video practices and technology. 2nd ed. Elsevier Butterworth Heinemann, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Birleşik krallıkta CCTV, Türkiye'de MOBESE: Caddelerde güvenlik nöbetindeki kameralar. Turhan Kitabevi Yayınları, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

CCTV and policing: Public area surveillance and police practices in Britain. Oxford University Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lund, Rolf. The CCTV Book: habilitation and rehabilitation with closed circuit television systems. Synsforum ans, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

lecturer, Armstrong Gary, ed. The maximum surveillance society: The rise of CCTV. Berg, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Short, Emma. Does closed circuit television prevent crime?: An evaluation of the use of CCTV surveillance cameras in Airdrie town centre. Scottish Office Central Research Unit, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Setting the watch: Privacy and the ethics of CCTV surveillance. Hart Pub., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Council, Edinburgh (Scotland) City. CCTV: Closed circuit television : code of practice : resource handbook for the City of Edinburgh Council. City of Edinburgh Council, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Closed-Circuit Television (CCTV) Surveillance Systems"

1

Botello, Nelson. "Urban Surveillance in Mexico." In ICTs for Mobile and Ubiquitous Urban Infrastructures. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-051-8.ch019.

Full text
Abstract:
In this chapter, the symbolic cultural dimension of technology and surveillance technologies in two cities and two commercial centers in central Mexico will be explored, especially the various Closed Circuit Television Systems (CCTV). This will allow the analysis of the way in which these technologies have made viable specific ways of sorting and governance of public and private spaces in the country. This document then examines the relationship established between the symbolic meanings given to these surveillance technologies in said urban spaces. Included is a series of observations and interviews of those in charge of these systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Walton, Abram L. J., Sharon A. DeVaney, and Darrel L. Sandall. "Graduate Students’ Perceptions of Privacy and Closed Circuit Television Systems in Public Settings." In User Perception and Influencing Factors of Technology in Everyday Life. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-1954-8.ch009.

Full text
Abstract:
This qualitative study used grounded theory to examine how university graduate students felt about closed circuit television (CCTV) as it relates to the privacy and safety of students on campuses. As a result of violence at a few universities, more administrators are considering the implementation of CCTV systems. Because graduate students are an important part of the university population, their views were solicited. A qualitative approach was used because of the lack of previous research on this particular topic. Themes that emerged from interviews with 10 graduate students at a large Midwestern land-grant university were identified as: right to safety, right to privacy, personal privacy responsibilities, post-CCTV sense of privacy, post-CCTV sense of safety, crime displacement, false sense of safety, and international perspectives. The findings provide insight into graduate students’ perceptions of a CCTV system and have implications for implementation decisions regarding such a system. Additionally, the findings were utilized to formulate hypotheses for a larger scale research project.
APA, Harvard, Vancouver, ISO, and other styles
3

Gallo, Jason. "From CCTV to Biometrics through Mobile Surveillance." In Mobile Computing. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-054-7.ch090.

Full text
Abstract:
Surveillance is the act or process of observing, tracking, or recording personal details for the purpose of exercising control over the individual or population being watched. Control in this context can mean many things, from directly influencing the behavior of the observed to the use of gathered information for the purpose of management or governance. Mobile surveillance can be defined as two distinct, yet related, practices. The first is the ability to observe the physical movement of an individual through space. This is most often accomplished through documenting their interaction with a surveillance network. The object of surveillance is tracked from one node of the network to another, providing a record of behavior. The second practice is often referred to as dataveillance, or the ability to monitor an individual’s behavior through studying a trail of personally identifiable data, including credit card purchases, mobile phone calls, and health records. Mobile surveillance employs an array of technologies including video and photography cameras, visual recognition software, radio frequency identification (RFID), global positioning receivers (GPS), information and communication technologies (ICTs), and biometrics. Examples of mobile surveillance networks include the dense deployment of closed-circuit television (CCTV), video, and photographic technologies in a distinct geographic space to monitor activity, the tracking of automobiles and mobile phones via GPS, and radio frequency sensing that records motion as identity chips pass through a distributed network of receivers. As these networks proliferate, individuals are the exposed to overlapping layers of surveillance. Although many of these surveillance networks are deployed for limited purposes, the increasing ability to save and store personally identifiable information in searchable databases, and the ability to mine information from multiple sources raises privacy concerns for the individual. This is especially true in advanced capitalist societies that rely on sophisticated data gathering to track, model, and predict consumer behavior, as well as for citizen management.
APA, Harvard, Vancouver, ISO, and other styles
4

Gallo, Jason. "From CCTV to Biometrics through Mobile Surveillance." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch079.

Full text
Abstract:
Surveillance is the act or process of observing, tracking, or recording personal details for the purpose of exercising control over the individual or population being watched. Control in this context can mean many things, from directly influencing the behavior of the observed to the use of gathered information for the purpose of management or governance. Mobile surveillance can be defined as two distinct, yet related, practices. The first is the ability to observe the physical movement of an individual through space. This is most often accomplished through documenting their interaction with a surveillance network. The object of surveillance is tracked from one node of the network to another, providing a record of behavior. The second practice is often referred to as dataveillance, or the ability to monitor an individual’s behavior through studying a trail of personally identifiable data, including credit card purchases, mobile phone calls, and health records. Mobile surveillance employs an array of technologies including video and photography cameras, visual recognition software, radio frequency identification (RFID), global positioning receivers (GPS), information and communication technologies (ICTs), and biometrics. Examples of mobile surveillance networks include the dense deployment of closed-circuit television (CCTV), video, and photographic technologies in a distinct geographic space to monitor activity, the tracking of automobiles and mobile phones via GPS, and radio frequency sensing that records motion as identity chips pass through a distributed network of receivers. As these networks proliferate, individuals are the exposed to overlapping layers of surveillance. Although many of these surveillance networks are deployed for limited purposes, the increasing ability to save and store personally identifiable information in searchable databases, and the ability to mine information from multiple sources raises privacy concerns for the individual. This is especially true in advanced capitalist societies that rely on sophisticated data gathering to track, model, and predict consumer behavior, as well as for citizen management.
APA, Harvard, Vancouver, ISO, and other styles
5

Hughes, Kit. "Frankly Boring and Agonizingly Slow: Television Moves to the Office." In Television at Work. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190855789.003.0004.

Full text
Abstract:
Using AT&amp;T as a case study, Chapter 3 (keyword: immediacy) follows a series of halting experiments surrounding live and near-live television that attended the medium’s move from the factory to the office. First, it describes companies’ adoption of theater television for live, city-spanning business meetings. Often understood as a site of tension between film and commercial broadcasting interests, theater television reached its apogee as a site of business experimentation with efficient and affective management. Second, it details companies’ use of early videotape systems for self-observation. Borrowing legitimacy from psychology’s use of “encounter groups,” self-observation required workers to tape themselves in various situations for immediate playback and intensified self-regulation. Third, and following from these experiments, it traces AT&amp;T’s installation of in-house closed-circuit television systems. In addition to distributing content, CCTV systems supported corporate imaginaries in which geographies were themselves subject to executive control and reorganization.
APA, Harvard, Vancouver, ISO, and other styles
6

Gavrovska, Ana, and Andreja Samčović. "Intelligent Automation Using Machine and Deep Learning in Cybersecurity of Industrial IoT." In Cyber Security of Industrial Control Systems in the Future Internet Environment. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2910-2.ch008.

Full text
Abstract:
Artificial intelligence is making significant changes in industrial internet of things (IIoT). Particularly, machine and deep learning architectures are now used for cybersecurity in smart factories, smart homes, and smart cities. Using advanced mathematical models and algorithms more intelligent protection strategies should be developed. Hacking of IP surveillance camera systems and Closed-Circuit TV (CCTV) vulnerabilities represent typical example where cyber attacks can make severe damage to physical and other Industrial Control Systems (ICS). This chapter analyzes the possibilities to provide better protection of video surveillance systems and communication networks. The authors review solutions related to migrating machine learning based inference towards edge and smart client devices, as well as methods for DDoS (Distributed Denial of Service) intelligent detection, where DDoS attack is recognized as one of the primary concerns in cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
7

Iqbal, Asifa. "Inclusive, Safe and Resilient Public Spaces: Gateway to Sustainable Cities?" In Urban Transition - Perspectives on Urban Systems and Environments [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.97353.

Full text
Abstract:
The rapid urbanization process of cities is majorly coupled with extreme climate change, housing shortage and urban safety issues. These issues are raising new challenges to address the capability of urban resilience. Enhancing Urban Safety and Security is one of the major principles addressed by UN-Habitat in Sustainable Development Goal number 11. Making cities safe and sustainable means ensuring access to safe and affordable public spaces for all. This book chapter aims to highlight how do the city’s public spaces are linked and affected by crime and fear of crime? How do crime and fear of crime interconnect to the built environment in cities while promoting positive urban transitions in terms of safe and sustainable cities? This book chapter explores answers to these questions through the parks and public spaces of the city as a case study. In other words, the book chapter deals with the issue of safety and security by (1) showing links between parks and public spaces, and crime and fear of crime, (2) highlighting how different attributes in the built environment can affect people’s perception of safety, (3) understanding socio-technical perspectives i.e., how technological systems and equipment’s (such as lighting sensors, security alarms, security electronic devices, closed-circuit television (CCTV), smartphones or other technological instruments) are influencing safety/security and sustainability, (4) demonstrating the issues and challenges found in Stockholm, Sweden, and, (5) providing recommendations on how these places can be planned and designed to become more sustainable.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Closed-Circuit Television (CCTV) Surveillance Systems"

1

Soares, Pedro Gabriel Santos do Couto, Arnaldo Barros Da Silva, and Luis Filipe Alves Pereira. "An assault detection system based on human Pose Tracking for video surveillance." In XXXII Conference on Graphics, Patterns and Images. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sibgrapi.est.2019.8327.

Full text
Abstract:
The development of new technologies for video surveillance and automatic violence detection can bring more security to our daily lives. Solutions previously published in the state-of-the-art had presented techniques to detect violence at movie scenes, sports matches, or crowds. In this work, we propose a novel system architecture based on human Pose Track for detecting evidence of assaults in real-world videos from closed-circuit television (CCTV) of Brazilian lottery agencies. The results showed that our method can identify individuals with hands up and lying down with accuracy rates up to 85%. We believe that the detection of potentially risky situations in real-time is a crucial tool in the fighting against crime.
APA, Harvard, Vancouver, ISO, and other styles
2

Radulescu, Bogdan Alexandru, Adina Magda Florea, and Victorita Radulescu. "TCN Units, Solution in Recognition of Human Activities." In ASME 2021 30th Conference on Information Storage and Processing Systems. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/isps2021-65039.

Full text
Abstract:
Abstract Activities and human faces recognition infrastructure are used everywhere behavior analysis is required. Since a video approach is built over an already existing infrastructure comprised of CCTV-Closed Circuit Television and a central computer, it can be used in any space where actions’ monitoring is necessary. Main objective of this paper consists of building a reliable and lightweight human faces and actions’ recognition classifier, able to classify a large number of actions, lightweight enough that it can work in real time. It processes at least 30 frames per second, using of-the-shelf computer hardware, connected to a normal CCTV infrastructure. The temporal convolutional network - TCN represents a viable solution for a proposed problem. It classifies a large number of actions - 60, using only RGB (red-green-blue) images of fairly low resolution, in real time. Deciding which class of action belongs to should not be connected to environment, background, person, view angle, or other specific identifiers. This selection should be associated only with the person executing it and the spatial-temporal context of the person. As technology and processing power improve, the problem slightly shifts. When more processing power to a system is added, in this model is possible either to increase the number of frames per second or the number of cameras in the infrastructure, or to increase the quality of the images, resulting most likely higher accuracy of the predictions. This model can be extended to a larger number of classes, with a minimal impact on performance. The proposed model has a tested accuracy of 82% which can be attributed to the recurrent property of the network. The model performs close to the most performing existing solutions. The present TCN + 3D Convolution Model is built with the smaller TCN units. Its architecture uses an alternation of a Simple Unit and a Complex Unit, in order to maximize the diversity of features the model learns. This paper illustrates a deep learning classifier based on TCNs for human actions recognition. Is relatively lightweight compared to other methods, and performs very well, competing with the best architectures. Ideally, it is able to classify an action irrespective of the person executing it or the environment where it was executed. This is achieved as much as possible through a diverse dataset on which the model is trained and tested, namely NTU RGB+D. After a simple and a complex unit, an Average Pool 3D layer reduces at least one dimension to half.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography