TITLE

Love Fest or Fist Fight?

AUTHOR(S)
Zalud, Bill
PUB. DATE
June 2011
SOURCE
Security: Solutions for Enterprise Security Leaders;Jun2011, Vol. 48 Issue 6, p74
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers information related to security management. It mentions three ways for organizations to handle security risks such as spending money for insurance and security investment to prevent or reduce organizational losses. It states Trend Micro Inc. launched a mobile security which protects digital file and banking transactions. It adds that city officials in Chicago, Illinois are experimenting on the use of recognition camera systems to street sweepers to catch traffic violators.
ACCESSION #
61442470

 

Related Articles

  • Honeycomb Projects: An Architectural Crime Problem.  // Quintessence International;Dec1980, Vol. 11 Issue 12, p86 

    The article reports on the failure of the various security devices which were equipped in a certain building at honeycomb projects in Los Angeles, California in preventing crime in the vicinity of the said building. It notes that said devices generally do nothing but hamper police access into...

  • Support Role for Winning VMS: It's the Camera.  // Security: Solutions for Enterprise Security Leaders;Mar2013, Vol. 50 Issue 3, p40 

    The article reports on several security cameras used at the Full Throttle Saloon in Sturgis, South Dakota to capture the real-life antics of the different events held at the area.

  • Megapixel Cameras Changing the Landscape of Surveillance. Elliott, David // Security: Solutions for Enterprise Security Leaders;May2010, Vol. 47 Issue 5, p54 

    The author discusses the impact of the megapixel cameras in the field of surveillance. He stresses the growing trends of high-definition television (HDTV) cameras in the mainstream surveillance systems due to its niche or one-off solution, image quality and more detailed view. Moreover, the...

  • 7 Signs it's Time to Upgrade Your Video System. Mesenbrink, John // Security: Solutions for Enterprise Security Leaders;Mar/Apr2002, Vol. 39 Issue 3/4, p16 

    Focuses on the modification of closed-circuit television (CCTV) system. Impact of security market growth on CCTV technology; Considerations in CCTV enhancement; Factors influencing preference for CCTV technology.

  • Big Brother cares. Horne, Fiona Russell // Builders Merchants Journal;Jan2002, p3 

    Comments on the Data Protection Act 1998 concerning the use of closed-circuit television (CCTV) systems in Great Britain for security purposes. Provisions of the act regarding the privacy and respect of an individual; Factors to consider in implementing CCTV systems; Sanctions for unlawful use...

  • Notes on CCTV. O'Mara, Deborah L. // Security: Solutions for Enterprise Security Leaders;Aug2000, Vol. 37 Issue 8, p39 

    Focuses on the scalability of closed-circuit television (CCTV) surveillance systems in the United States. Digitization of traditional security; Details on remote monitoring and control of CCTV; Advantages of digital video management and scalability; Impact of scalability on dealers and end-users.

  • Privacy-Preserving H.264 Video Encryption Scheme. SuGil Choi; Jong-Wook Han; Hyunsook Cho // ETRI Journal;Dec2011, Vol. 33 Issue 6, p935 

    As a growing number of individuals are exposed to surveillance cameras, the need to prevent captured videos from being used inappropriately has increased. Privacy-related information can be protected through video encryption during transmission or storage, and several algorithms have been...

  • Technology Transitions Security Systems from Reactive to Proactive. Adams, William // GEOWorld;Dec2010, Vol. 23 Issue 12, p22 

    The article focuses on the transition of geospatial technology from reactive to proactive. It states that sensor technology like cameras and perimeter intrusion-detection systems such as seismic, fire, and infrared cameras were used for facility and infrastructure surveillance. It adds that...

  • Strategies for Short-Term Surveillance. Morton, Jennie // Buildings;Jun2011, Vol. 105 Issue 6, p32 

    The article discusses temporary surveillance as a security measure. It highlights the importance of having a security protocol for incidents that do not often occur or for unique events. It provides guidelines on the setting up of temporary surveillance strategy which could include a mobile...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics