TITLE

Al fresco Surveillance - Know Outdoor Dangers

PUB. DATE
April 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;Apr2007, Vol. 44 Issue 4, p62
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article provides information on the outdoor video surveillance for perimeter monitoring. According to a White Paper written by Warren Simonsen of Sandra Jones and Company, that putting the camera in a weatherproof enclosure does not solve all the problems for outdoor surveillance use. The White Paper lists outdoor video challenges that will make chief security officers and security directors more eager to use outdoor cameras. INSET: When You're Not Kidding Outside.
ACCESSION #
24829242

 

Related Articles

  • Locally Initiating Line-Based Object Association in Large Scale Multiple Cameras Environment. Shung Han Cho; Yunyoung Nam; Sangjin Hong; Weduke Cho // KSII Transactions on Internet & Information Systems;Jun2010, Vol. 4 Issue 3, p358 

    Multiple object association is an important capability in visual surveillance system with multiple cameras. In this paper, we introduce locally initiating line-based object association with the parallel projection camera model, which can be applicable to the situation without the common (ground)...

  • High-tech surveillance of employees can be full of expensive surprises.  // Business North Carolina;May2011, Vol. 31 Issue 5, p40 

    The article explains the legal implications of high-technology surveillance of employees in the U.S. It mentions that disclosing or using a secret recording of a conversation is a criminal violation. Also noted is the varied opinion of courts in cases of employees who accessed information for...

  • DMP's Clear Touch Keypad Meets UL Standards.  // SDM: Security Distributing & Marketing;Dec2005, Vol. 35 Issue 12, p16 

    The article informs about the Clear Touch keypad, model 7760, from Digital Monitoring Products, Missouri, meeting the UL safety standards to earn the laboratory's mark of approval. It offers audible and visual alarm notification and works for residential and commercial installations.

  • WHEN EMPLOYEES DO THE MONITORING. Steinert-Threlkeld, Tom // Baseline;Nov2003, Issue 24, p10 

    Comments on electronic surveillance of employees. Pros and cons of monitoring; Impact of disclosure on company policies; Recommendations for corporations.

  • 5 legal ways to monitor staff.  // Managing People at Work;11/15/2016, Vol. 3 Issue 22, p2 

    The article offers five steps including videotaping open work areas, searching lockers, and reviewing email, voice mail, and internet use, for a company's legal monitoring of its staff.

  • EYES ON YOU. Wang, Penelope // Money;Jul2005, Vol. 34 Issue 7, p28 

    Discusses several methods used by companies to monitor employees using corporate phones or computers. Assertion that companies monitor electronic mail messages and Internet activity; Use of GPS technology to track employees using cellular telephones when they are out of the office.

  • Office Spy Software Makes Boss Big Brother. Trembly, Ara C. // National Underwriter / P&C;9/25/2006, Vol. 110 Issue 36, p26 

    The article comments regarding the new software developed by SpectatorSoft Corp. that allows the firm to eavesdrop and record everything employees do on the Internet. According to the software provider, it is advisable to install the software in business enterprises because employees spend 75...

  • Watchful Eyes. Garry, Michael // SN: Supermarket News;2/25/2008, Vol. 56 Issue 8, p30 

    This article reveals that Hannaford Bros. and Pathmark are using intelligent systems that interpret video images to identify employee theft and shoplifting. Food retailers can hardly afford a full-time video surveillance team. For this reason they are increasingly turning to video systems that...

  • EXORCISING GHOST SIGNALS. Bleakley, Allan // SDM: Security Distributing & Marketing;Mar2005, Vol. 35 Issue 3, p83 

    Discusses the strategies in managing ghost signals, the alarm signals that come in on an unknown or different account within a signal automation software. Circumstance prompting the occurrence of ghost signals; Devices used in locating the ghost signal; Approaches in managing the situation.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics