The National Association of Convenience Stores (1991) reported on two other interventions evaluated by Robert Figlio. The use of interactive CCTV (allowing communication between the clerk and the personnel in a remote location) reduced robberies in 189 stores by a statistically significant 31% in the first year following the installations. By the second year, the reduction had shrunk to 15%, which was not statistically significant. No control stores were used in the analysis. One chain of 81 stores installed color video monitors that were visible to patrons and staff. Robbery rates were reported to have declined by 53% a year after installation. Again, no control stores were used. (Eck, 2002, p. 256)
The statistics of this review show clearly that robbery reduction only occurred in certain conditions and that the reduction of such events did not always last, after the cameras became a fixed aspect of the known security measures in place. The following study, regarding a different type of business also shows the same trend of reduction of crime only for a short period after installation and more importantly shows that the more intensive the system and the more personal interaction that was seen between staff and technology and staff and patrons the more effective the equipment was.
British fashion retail chain studied three levels of CCTV to curb shoplifting (Beck and Willis, 1999). In three stores, high-level CCTV was used - multiple cameras, full-time watching by staff, monitors at all public entrances and recording capability. Six stores received a medium-level system - similar number of cameras watched by the store manager as time permitted, monitors at public entrances and recording capability. Six other stores received a low-level system - up to twelve of the cameras were dummies, monitors at all public entrances, but no capability to record. We can treat the low-level stores as controls and the other two types of stores as forms of treatment. Theft reduction was measured by inventory counts before installation and at 3- and 6-month intervals following installation. After 3 months, the number of items lost per week had declined by 40%, 17%, and 20% for the high-, medium- and low-level stores, respectively. After 6 months, the number of items lost per week had declined by 26% for the high-level store, but increased by 32% and 9% for the medium- and low-level stores, respectively (Beck and Willis, 1999). These results suggest that CCTV may curb retail theft, but staff monitoring may be critical to its success. (Eck, 2002, p. 259)
The results of these surveys indicate that the highest level systems are the most effective, but again do not discuss the role of such equipment in investigation. The following opening to an article associated with the effectiveness of surveillance, does not separate the prevention information from the utilization of video evidence as an investigative tool. The example is in fact resolute on the fact that though this individual crime did occur, the video was used not to stop it but as an alarm of its occurrence and as an investigative tool that ensured conviction of the perpetrator.
Malcolm Smith and David Lee, strangers until earlier that afternoon, descended into an underground walkway one evening in May 1993, shortly after leaving an English pub. Once out of public view, Lee grabbed Smith and threw him to the ground. Raining blows with his fists and feet, Lee knocked Smith unconscious, then began frantically searching for his wallet. Unbeknownst to Lee, the scene was being recorded by the powerful eye of a surveillance camera. Police responded quickly, racing to the scene and tackling Lee before he could escape with Smith's money. It took just two-and-a-half minutes from the start of the offense to the time of the arrest. Lee was convicted of assault and sent to prison for three months. (Poole & Williams, 1996, p. 28)
The point of this one anecdotal piece is that through such example sin police records a researcher should be able to demonstrate the effective use of video surveillance as an investigative tool. The prevention aspect of this scene is associated with the ability of the early response, which did not eliminate the risk to the victim but did eliminate the risk of escalation to a more serious crime and for at least three months prevented the perpetrator from victimizing anyone else in this or another manner. In fact in many cases the development of surveillance systems includes a level of secrecy, in that the idea of surveillance is eliminated from the mind of the criminal, as the surveillance is hidden from him or her, therefore eliminating the possibility that the criminal might not offend, at least in this...
Pervasive Video Games as Art The form and function of art has evolved and changed quite a bit over the years, decades and millennia. Paintings and sculpture have been artistic mainstays for much to most of the world of the civilized human race. However, with the technological revolution that has roared up over the last fifty years or so, new forms of art have bubbled to the proverbial surface. Digital technology
They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and
Shoplifting is currently one among the most prevalent of non-violent offenses in the U.S.A. Shoplifting refers to stealing property put forward for sale. It is a costly issue - U.S. businesses and consumers lose billions every year to shoplifting. The former have to bear the burden of security-related costs and that of lost merchandise, while the latter have to pay a larger amount as retail prices as sellers pass on
Leveraging Information Systems for Disaster Management In today's digital age, natural as well as man-made disaster management has become an easier task. Several IT features are at our disposal, which can help in both prevention and recovery from disaster. Information technology advances such as satellite communication, the Internet, remote sensing, geographic information system (GIS), etc. have proven extremely valuable in hazard reduction planning and execution processes (Vyas & Desai, 2007). IT
This category can further be divided into six subgroups namely; short-range, medium range, long-range, close range, endurance, Medium Altitude Long Endurance (MALE) Unmanned Aerial Vehicles (UAVs). The long-range UAVs are technologically more advanced as they use satellites in order to overcome the communication problem between the UAVs and the ground stations. This communication problem is generally caused by the curvature of the earth. The medium, short and close range
66). Furthermore, social software will only increase in importance in helping organizations maintain and manage their domains of knowledge and information. When networks are enabled and flourish, their value to all users and to the organization increases as well. That increase in value is typically nonlinear, where some additions yield more than proportionate values to the organization (McCluskey and Korobow, 2009). Some of the key characteristics of social software applications
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now