We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Security Technology - Essay Example

Comments (1) Cite this document
Security technology is an important part of any business, enabling businesses to protect their assets while reducing the amount of physical labor and time that is required. This allows the business to reduce their costs, by requiring fewer employees. …
Download full paper
Security Technology
Read TextPreview

Extract of sample
Security Technology

Download file to see previous pages... Security cameras are one aspect of business security that is commonly used across many different business types. Often a number of video cameras transmit their signals to a specific point, frequently a set of monitors. This system is known as closed-circuit television (CCTV) the name derives from the fact that although a television signal is produced it is not transmitted openly, and as a consequence cannot be picked up by exterior parties (Levine, 2000). The term CCTV can be technically used to refer to most types of video cameras; however, it is generally used to apply to those that are involved in security applications (Introna, 2000). In retail stores, CCTV systems are often used for security, monitoring both consumers and employees with the aim of preventing crime from occurring and for catching and prosecuting those that are involved in criminal acts within the store.
I have worked at Best Buy since I was 17 years of age beginning in the sales department, and currently am the Security/Loss Prevention Manager for my store. This role comes with a high amount of responsibility and I take pride in doing my job well and ensuring that my staff do also. Throughout my career at Best Buy one aspect of technology which I have used extensively and consider crucial to my work is the CCTV network of security cameras which is present as part of our store security system. CCTV plays a significant role in maintaining the security of our store, and is helpful in a number of other aspects. Most importantly the CCTV system allows the monitoring of both consumers and employees behavior from a distance. Even though the presence of security cameras throughout the store is a well known fact, many people forget that the cameras are operating or hope that they are in a blind spot and act in a manner which they would not wish to be observed in. The most common example of this is theft. The CCTV network is very useful for determining when and where shoplifting or acts of fraud occur, and as the system records the footage, it can then play a role in identifying thieves, in proving that an individual stole from the store, as well as providing a key role in internal investigations into employee theft and dishonesty. However, the monitoring of theft and dishonest practice are not the only uses of this powerful technology, it is also used other purposes such as finding lost children, determine the locations of staff members during emergency drills as well as acting as a deterrent to theft. This essay will consider the technology involved in CCTV, its history and how it is used as well as the legal ramifications occur as a consequence, with particular emphasis on the role of CCTV in retail security. Finally I will discuss my own personal experience with CCTV and how it affects my role at Best Buy. History One of the early uses of CCTV occurred in London in 1961 at an underground railway station. The purpose of the system wasn’t security, but was to allow drivers to ensure that the doors of the railway car were clear before they departed the station (Keval & Sasse, 2006). However, CCTV cameras were in use as early as 1940 and the industry has been growing ever since (Mohammed, 2010). The use of CCTV as a means of surveillance for public areas as well as business has become commonplace, and there are many different purposes for CCTV systems. One common example is the use of CCTV as street surveillance, looking for drug related activity, for the identification of missing persons, as well as for identifying any criminal activity (Keval & Sasse, 2006). Within retail stores consumers are observed through CCTV in the in order to look for illegitimate activity or evidence of theft. Monitoring is not limited to ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Security Technology Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Retrieved de https://studentshare.org/design-technology/1392262-security-technology
(Security Technology Essay Example | Topics and Well Written Essays - 2000 Words)
“Security Technology Essay Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/design-technology/1392262-security-technology.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
abernathyjensen added comment 1 month ago
Student rated this paper as
The topic of "Security Technology" was tough to find. I spent ages to find it. Here at StudentShare, I got the best sample. Many thanks!
Technology of Information Security
The technique has been in existence for a long time but is not yet fully reliable thus posing a danger to all the information that is shared via the internet. Methods of encryption are on the rise because of the rapid growth in the technology sector all over the world.
3 Pages(750 words)Essay
Information Technology Security
The protection of such information as bank account statements, credit card numbers, personal information, government documents, and trade secrets remain a critical part of information security. Confidentiality of information relates to safeguarding of information from disclosure to unauthorized parties (Feruza and Kim 2007, pp.19).
3 Pages(750 words)Essay
The security technology of e-commerce
In today’s internet environment, the consumer faces a lot of risks while conducting business through the internet. Many financial crimes are being carried out on the internet such as frauds, identity thefts, cyber attacks, cyber Terrorism, cyber attacks during the war on terrorism, viruses and worms, hacking and malware techniques.
8 Pages(2000 words)Essay
National Security and Science and Technology policy
Extensive support has been given to the science and technology's research and development programs in order to find the best strategies against terrorists who are more than willing to destabilize the United States government. "The National Strategy for Homeland Security and the Homeland Security Act of 2002 served to mobilize and organize our nation to secure the homeland from terrorist attacks.
8 Pages(2000 words)Essay
Information Technology Security
Technology is shaping our world. It has become a part of everyone’s lives and it rules almost every action of ours. However, every new development has some merits and demerits. In this essay we
15 Pages(3750 words)Essay
VOIP security (information technology)
The five security threats are man in the middle attack, Phreaking, vishing, VoIP spam and distributed denial of service attack or simply DoS attack. VoIP network are vulnerable to MITM or man-in-the-middle attacks, this is due to insufficient verification of
3 Pages(750 words)Essay
Internet Technology, Marketing and Security
So, security policies and program tools designed to stop such breaches are an essential part of marketing strategies for any such company. Among the major corporations, that are using web for the marketing and sales of their
3 Pages(750 words)Essay
Technology of Information Security
On the other hand, some organizations prefer to store their data in the decentralized data storage system. In this scenario, each user is individually responsible for managing and updating his own data on his own computer. However, the most commonly used scenarios
2 Pages(500 words)Essay
Technology and civil security
There are however different ways to address this problem. This may include the establishment of regulations to authorization relating to the innovation and use of technological advancements. More so the federal government should seek
3 Pages(750 words)Essay
Information Technology Security
client personalities, access benefits for every framework and information gathering should be recognized, and access rights must be in accordance with characterized and reported business needs and it should reflect the ideas of minimum benefit and isolation of obligations
11 Pages(2750 words)Essay
Let us find you another Essay on topic Security Technology for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us