Security Technology Essay example
Undergraduate
Essay
Design & Technology
Pages 8 (2008 words)
Download 0
Security technology is an important part of any business, enabling businesses to protect their assets while reducing the amount of physical labor and time that is required. This allows the business to reduce their costs, by requiring fewer employees. …

Introduction

Security cameras are one aspect of business security that is commonly used across many different business types. Often a number of video cameras transmit their signals to a specific point, frequently a set of monitors. This system is known as closed-circuit television (CCTV) the name derives from the fact that although a television signal is produced it is not transmitted openly, and as a consequence cannot be picked up by exterior parties (Levine, 2000). The term CCTV can be technically used to refer to most types of video cameras; however, it is generally used to apply to those that are involved in security applications (Introna, 2000). In retail stores, CCTV systems are often used for security, monitoring both consumers and employees with the aim of preventing crime from occurring and for catching and prosecuting those that are involved in criminal acts within the store.
I have worked at Best Buy since I was 17 years of age beginning in the sales department, and currently am the Security/Loss Prevention Manager for my store. This role comes with a high amount of responsibility and I take pride in doing my job well and ensuring that my staff do also. Throughout my career at Best Buy one aspect of technology which I have used extensively and consider crucial to my work is the CCTV network of security cameras which is present as part of our store security system. ...
Download paper
Not exactly what you need?

Related papers

RFID Technology
2.1.1 RFID Technology Deployment The DoD and Wal-Mart asked their suppliers to deploy RFID infrastructure in 2004. However, there were issues arising regarding labels, readers, and software in the pilot studies. Nevertheless, most suppliers were ready to beat the January 1 2005 deadline while others were in the pilot study stages (RFID). For Wal-Mart however, deployment was slow due to the…
GIS design and technology
For it to function it requires a vast amount of data hence making the projects which use GIS very expensive. Its data originate from images of satellites, maps, GPS data from survey an all other instruments which can attribute data. Before the development of Internet GIS large amount of data of different field like road networks, sewer lines, telecommunication lines and natural resources were…
Technology Implementation Paper
Implementation of the newly developed information system follows successful design and development of the system. This paper will therefore give details and recommendations on how the new technology system should be implemented. Being the manager in charge of implementing the new information system my main objective will be to ensure that the new system is efficient. In an organization, change is…
Researching and Exploiting an Emergent Multimedia Technology (Cloud Streaming Technology)
The short comings of these methods of storage called for better ways of data preservation hence the discovery of paper and later secret safes that were used to store classified information. Decades later, the world enjoys an unlimited number of technological options to choose from. Modern technology too has continued to grow in leaps and bounds with incremental and disruptive developments being…
Technology Support System For Homeland Security Program
Former Senator Rudman views the department to be a needed “formulation” in spite of the existing of great Army, Marine Corps and Air Force (2003). However, in assessing the organization and mission of the DHS, this proposal sees the agency to be wanting in resources and capacity along the aspects of independent mobilization and focus of initiatives. Organizationally, the DHS has to correlate…
Data Governance, Quality, Integration, and Security
Although these aspects are closely interrelated within a system, addressing and improving them independently results in better performance of the system as a whole (Arens, Chee, Hsu & Knoblock, 1993). Data Governance Data governance encompasses a set of procedures ensuring that important assets in data form are properly managed in all divisions of an enterprise (Abiteboul, Benjelloun & Milo,…
NFC Security Issues: A Case Study
Particularly, this form of technology is quite popular in advanced nations such as Japan (Gordon & British Computer Society, 2007). However, according to various studies that have been conducted into the technology, especially in the UK by a team of researchers from Surrey University, an alarm is fast being raised about the security risks involved with the same, particularly with regard to the…