StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Impact of CCTV System in Curbing Theft - Research Paper Example

Cite this document
Summary
The paper “The Impact of CCTV System in Curbing Theft” looks at the United Nations Mission in Liberia (UNMIL), which was launched on September 19, 2003, by virtue of Resolution No. 1509 with a four-pronged goal. The 18,000-strong UNMIL makes up the second largest UN mission globally…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
The Impact of CCTV System in Curbing Theft
Read Text Preview

Extract of sample "The Impact of CCTV System in Curbing Theft"

 The Impact of CCTV System in Curbing Theft The Research Problem The United Nations Mission in Liberia (UNMIL) was launched on September 19, 2003 by virtue of Resolution No. 1509 with a four-pronged goal of: (1) supporting the ceasefire agreement and the subsequent peace process; (2) offering protection for UN staff, facilities and civilians in Liberia; (3) sustaining humanitarian and human rights projects; and (4) providing assistance in the reformation of Liberia’s national security efforts and policies, including training of the national police and restructuring of the military (UNMIL, 2009). The 18,000-strong UNMIL makes up the second largest UN mission globally, representing international and local personnel consisting of military, police and civilian staff. As of February, 2004, Liberia received over 500 million US dollars in pledges from international donors to help in the country’s reconstruction. Before 2004 ended, however, the volatile situation in Liberia once again challenged peace efforts when riots in Monrovia left 16 fatalities in clashes which the UN believes were instigated by the former combatants (British Broadcasting Corporation, 2009). Amidst the backdrop of riots, unstable peace and corruption, the UN mission struggled to performs its four major tasks. In essence, the UNMIL is an ambitious endeavor at peace-keeping requiring massive administrative support in terms of equipments, logistics, and management of the contingent with an authorized military strength of 15,000 (Furley and May, 2006). With an economy drained from two civil wars, theft was flagrant in Liberia even before the UNMIL was deployed. Relief goods and humanitarian supplies consisting of food, medicine, transport, communications equipment and money, were common and frequent targets for armed theft which prevailed throughout the 1990s. In Liberia alone, millions of dollars and hundreds of vehicles were stolen by armed rebels in 1996 (Howe, 2004). The UN mission was not, however, spared from such illicit activities. Financial difficulties and the availability of equipment and logistics in the mission headquarters provided a tempting environment for dishonest staff to steal, pilfer and misuse UN owned equipment and supplies. In the year 2006 alone, the UNMIL suffered losses due to stolen vehicles (seven vehicles), computers, computer accessories, supplies, and engineering equipment, spare parts for vehicles and aircrafts as well as information technology equipment (UNMIL Security Investigation Unit, 2006). This entailed massive financial implications to the mission’s budget and operational ability, forcing the concerned authorities to deal with exigency at hand using counter-measures to curb and eventually stop the occurrence of such losses. The Security Section considered a number of options until a consensus for the installation of closed circuit television (CCTV) was reached. The move to utilize CCTV within the UNMIL headquarters and its external perimeter seemed to be the most potent deterrent to theft and burglary and as a method of enhancing the security of equipment and logistics, as well as the safety of UN staff. The Security Section takes charge of safeguarding UN staff and properties. Considering the vastness of the UNMIL compound and facilities, however, the number of UN security personnel assigned to protect the mission and the resources required to uphold their charge, may not be totally adequate for such a gargantuan task. Compounding the disadvantages of the enormous area to be protected is the porous environment, the weak perimeter structures and a seemingly relaxed search and screening procedure, just to note a few, which causes a substantial strain on the physical security of UNMIL facilities and equipment. While Fischer and Green (2004) describes physical security as “the means why which a given facility protect itself against theft, sabotage, unauthorized entry, fires, accidents and natural disasters … [and that] old theories and devices may [still] be functional”, mere padlocks and burglar alarms may not anymore be the best choices for a good security program. Fisher and Green (2004) went on to underscore that good security systems integrate access control with sophisticated security technologies such as intrusion detection, video monitoring, smart cards, and biometrics (p. 147, 148). All four aforementioned technology may be connected with an organization’s computer system for what Fisher and Green (2004) referred to a total asset protection program. The general solution to the theft in the UNMIL facilities in Liberia presented initially, would be to work for the implementation of robust access and exit control measures manned 24 hours through three eight-hour shifts. From the perspective of the UNMIL security personnel, entrance and exit controls constitute the first and last line of defense against theft. However, the scheme is believed to be difficult to implement owing to the sensitive, multicultural, and multidimensional nature of the UNMIL structure. All UN staff and employees uphold the core values of integrity, professionalism and respect for diversity. In this respect, all UN personnel are expected to conduct themselves according to these core values (United Nations, 2006). Implementing strict screening measures at all UN installations tends to send off an impression that the UN personnel, consisting of international and local recruits, as well as Liberian civilians who have authorized and official business with the UNMIL, are people who can not be trusted. Stringent search and screening procedure upon entry and exit from the UNMIL premises is also believed to inflict stress on personnel who will always feel that their integrity is under question. Such stress from rigorous screening measures during entrance or exit may also affect personnel performance adversely. Diversity is also a major issue in the choice of the best security approach against theft. It should be also borne in mind that the UNMIL contingent comprises of civilian and military components with varied nationalities, cultures, character, and background. This hodgepodge of personalities, who also have different ways of thinking and understanding, work in a very difficult environment. Further, the complex structure of the UNMIL delegation may also be attributed to varying chain of commands and reporting procedures. All these factors contribute to additional hindrances in the implementation of appropriate security procedures. Theoretically, however, physical security does not only involve access and exit control at the gates or doors of the UNMIL facility. It also includes protection of the grounds around the building or facility; its perimeter; the interior of the building or facility and the contents of the building (Fisher and Green, 2006). Fortifying these four levels of protection entail logistical requirements and time-consuming methodology to execute a feasible and workable access and exit control mechanism for a fleet of about 1110 vehicles. UNMIL vehicles are being shared among personnel in the ratio of 1:3 or 1 vehicle for every three persons. In the capital city of Monrovia alone, there are around 1,500 staff working in the UN station (UNMIL, 2007). The aforementioned statistics provide a picture of the number of vehicles expected at the exit gate during peak hours. Should strict exit screening measures are exercised, an estimated minimum of two to three minutes per vehicle is required. Using simple arithmetic, it may be easily calculated that every tenth vehicle on the line needs to wait for thirty minutes before it is allowed out of the UN compound. From here, the picture does not look good anymore. The feasibility of rigorous exit screening procedures may very well be seen as something next to impossible, considering the following two scenarios: (1) if 50 percent of the 1500 vehicles exit the UN station gate during peak hours at 2 – 3 minutes per vehicle, it would take at the most 1665 minutes, equivalent to 28 hours, or at the least 1110 minutes, equivalent to 18 and a half hours; (2) if one third of the vehicles exit the station gates during peak hours it would take at the most 1110 minutes, equivalent to 18 and a half hours, or at the least 740 minutes, equivalent to 12 and one third hours. Additionally, questions about how, what and who should conduct the rigorous screening without offending anyone surfaced. Popular opinion among the top officials were divided on the argument that only locally recruited staff need be subjected to strict screening measures at the exit gate, as they are likely to be involved in acts of dishonesty. This would, however, constitute discrimination which the United Nations community will naturally object to be a supporting party. From the deliberations which ensued, internationally recruited security officers may be tapped to conduct routine security measures on the contention that international security practitioners are better prepared to handle the concerns at hand. If this option will, however, be implemented, the financial implications of recruiting international security officers, does not present a feasible option for UNMIL. In an effort to create job employment and simultaneously facilitate capacity building of the Liberian work force, the UNMIL management also engaged in sub-contracting. Among the services assigned to sub-contractors were exit and access control and perimeter patrolling of all UNMIL facilities, entrusted to the local security firm called InterCon. The measure was considered cost effective, yet sub-contracting the security of the UNMIL could arguably jeopardize the efficiency and effectiveness of such a service because the track record of the firm in terms of training, integrity and professionalism is unknown. It was also feared that as a consequence of the meagre salary being received by InterCon security personnel, the possibility of collusion for theft is not outwardly remote . One final consideration pertaining to security measures against theft at the UNMIL compound was the likelihood that only a small group of UNMIL staff are involved in such dishonest acts, as theft, pilferage or resource misuse. If this theory is accurate, there should be no reason for subjection of all staff members to rigorous exit screening procedures. It is believed that the stress, uneasiness, and embarrassment from strict exit control measures can eventually cause a negative impact on the performance of the staff. From informal discussions and from past experience, people readily embrace the rigors of being subjected to security and safety procedures if the exercise has something to do with their own security and safety, but are rather extremely annoyed if it is related to other reasons, such as suspicion of theft or pilferage. The foregoing discussion briefly traces the arguments and options presented during the deliberations pertaining to the choice of the most ideal security measure against theft of UNMIL equipment, supplies and other resources. Together with the developments, however, is the management dilemma, aggravated by doubts on the moral competence of some of the staff and non-cooperation of these same people regarding the past remedies implemented to curb the occurrence of theft. Irrespective of what measures are being discussed at the boardroom level, however, one fact remains indisputable - that the UNMIL continues to suffer financial loss due to large scale theft of equipment, logistics and other resources. There is a wide range of items both in terms of physical size and type of stolen objects, including but are not limited to vehicles, generators, supplies in bulk, as well as small items which can be easily concealed such as laptops, IT accessories, HF/VHF radios and spare parts for information technology devices. There is no denying the big possibility that the aforementioned stolen items leave the UNMIL facilities through the exit gate, either concealed or in the open , as in the case of smaller items, or vehicles and supplies in bulk, respectively. In the light of the advantages and the inevitable disadvantages of each of the options considered to address the flagrant theft of UNMIL equipment and other resources, the concerned UNMIL executives came to a consensus regarding the installation of CCTV systems to all places vulnerable to theft. CCTV systems were installed immediately in priority positions such as: all warehouses holding supplies, IT equipment and accessories; vehicle and aircraft spare parts; cash room; fuel depot and dispensing points; hall ways; aircraft hangars; and all entrance and exit gates. Installation of the CCTV is expected to achieve the following: (1) create an environment with enhanced deterrence to possible offenders, such as thieves and pilferers; (2) spot illicit activities (theft, pilferage and misuse of resources) and take action in a timely manner once an offence is committed, such that offenders are caught red-handed; and (3) keep and maintain electronic records, which are deemed as a more reliable basis for dismissal of corrupt and dishonest staff. Installation of the CCTV system started in December, 2006. The installation procedure was expedited following a theft of another vehicle in January, 2007 (UNMIL Security Investigation Unit, 2007). It should be made clear at this point that the installation of a CCTV system in the UNMIL station was a direct result of deliberations and the urgency of the problem. In these deliberations, however, no official study was undertaken to ascertain its usefulness and effectiveness in addressing the security problems. It is in this vein, that this research is timely and deemed beneficial to the organization. This research, therefore, seeks to investigate and determine the impact of CCTV systems in curbing theft of UNMIL equipment and other resources by UN staff during the period from June to December, 2007. The research focuses on one of the many problematic areas, the Transport Unit, which has been plagued by theft of vehicles and spare parts to tune of thousands of US dollars. The hub of the Transportation Unit, which includes the head office, workshop, and warehouse, is located in Monrovia, Liberia. The following specific problems will be addressed in this study in order to assess the effectiveness and reliability of CCTV in solving the security concerns of UNMIL. 1. Has the installation of CCTV system directly contributed to reducing theft of vehicles from the UNMIL compound? 2. Has the installation of the CCTV system contributed to reducing theft of vehicles spare parts from the UNMIL compound? 3. How significant were the following adjustable factors in optimizing the effectiveness of the CCTV system in addressing the UNMIL’s theft problems: 3.1. layout of the CCTV system 3.2. human monitoring factor 3.3. response mechanism, and 3.4. data storage and retrieval system? 4. How effective was the installation of the CCTV, so far, in performing the following tasks: 4.1. access control 4.2. deterrence 4.3. detection 4.4. validation 4.5. apprehension, and 4.6. investigation? 5. How pronounced were the following advantages of the CCTV system in your organization: 5.1. monitoring many locations simultaneously from the control room 5.2. early detection of intruders and/or thieves 5.3. savings from the use of technology instead of additional manpower 5.4. mitigation of human errors in the performance of security tasks 5.5. deterrence to crime 5.6. twenty-four hour coverage 5.7. provision of accurate visual/audio records for post-incident investigations? 6. How troublesome were the following disadvantages of the CCTV system in your organization: 61. expensive 6.2. complicated operation 6.3. need for considerable pre-installation time 6.4. presence of bugs/occurrence of glitches in the operation 6.5. performance/accuracy affected by extreme conditions? The answers to the above-mentioned questions are both important and critical for the UNMIL since findings of the study will be used to maximize the benefits from the CCTV system, particularly in safeguarding UNMIL property in the Transport Unit. Should the merits of having the system, in terms of enhanced security for UNMIL property, justify the costs of installing and operating the system, the prospects of extending the CCTV system may even be extended to other UN facilities in the outlying sectors. Installation and operation of the CCTV system in the UNMIL compound was effected as a situational crime prevention measure, specifically in creating deterrence to any dishonest staff, on time response by guard force unit and accurate detection. Findings of this study will, therefore, play a significant role in the ensuing analysis of whether the operation of the CCTV system actually did contribute to the minimization and eventual prevention of theft in the UNMIL compound. Hence, information which will be gained from this research study would be instrumental in providing sound advise as to the improvement of the design and implementation of CCTV system towards sustainable use by the UNMIL and perhaps in the near future, other UN facilities around the globe. Theoretical Perspectives The CCTV has now become an important crime prevention and security measure. Kruegle (2007) attributes the sudden increase in the utilization of CCTV as a security measure to the global increase in theft and terrorism and the corresponding need to safeguard people and other resources. Thus, Krugle (2007) considers that the use of CCTV as a timely and cost-effective means of implementing security and protection because of its utility in deterring crime, protecting assets, and apprehending and prosecuting offenders. Despite its popularity, however, there have been found significant differences in the the use of CCTV. For example, the CCTV is the highest funded crime prevention scheme in Great Britain. Yet, the Americans are more cautious in its usage of CCTVs, most probably because of the spectre of Big Brother watching (Welsh and Farrington, in Siegel, 2009). From a macro-perspective, Kruegle (2007) sees that “loss of assets and time due to theft is a growing cancer on our society that eats away at the profits of every organization or business, be it government, retail, service or manufacturing” (p. 1). Kruegle also believes that the size of an organization does not matter to thieves, but by experience, the larger an organization is, the larger the temptation for theft and the more probability that theft occurs. The tasks of today’s security personnel are multifaceted, and it is in this respect that a CCTV system plays a key role. The utility and cost-effectiveness of the CCTV is summed up in the following statement: “With today’s increasing labor costs and the need for each security officer to provide more functionality, video more than ever before is earning its place as a cost effective means for improving security and safety while reducing security budgets” (Kruegle, 2007, p. 2). The theory behind the utility of the CCTV is reduction of crime and reforming human behaviour based on several assumptions. First and foremost is deterrence, where a potential offender is made aware of the surveillance, ascertains the benefits and risks of performing an illicit activity and opts whether or not to push through with the offence. Another assumption is efficient deployment, where the person monitoring the system at the time of an illegal activity such as theft is able to effect appropriate judgement as to when to ask for police assistance or security personnel intervention. The third assumption is self discipline by the potential victim, where the CCTV cameras act as reminders of the risk of crime and the potential victim changes behaviour to avert the occurrence of crime. The fourth assumption is self discipline by the potential offenders, where the risk of being seen or recorded by surveillance cameras cause offenders or potential offenders to reform or refrain from committing a crime. The fifth assumption is presence of capable guardian, where the CCTV can act as the capable guardian to help reduce crime. The sixth assumption is detection, where recording of offences may facilitate in the identification, prosecution and punishment of the offender (Grolie, 2008). The CCTV is very useful as monitoring device for access control, but it can also be harnessed to perform a number tasks such as deterrence, detection, validation, apprehension and investigation. The task of deterrence is achieved when the presence and visibility of a CCTV discourages the commission of a crime in the location where video monitoring is implemented. On the other hand, detection is achieved when a security personnel sees on a CCTV monitor that an intrusion or crime in progress. In other circumstances when the CCTV is integrated with other security devices, the CCTV functions to confirm an event of security concern reported by an intruder detection or burglar alarm device, and this is referred to as validation. Once the intruder or thief seen and/or recorded on CCTV is taken into custody, the task of apprehension is achieved. Finally, the investigation goal of a CCTV system is achieved when a recording from the CCTV facilitates the identification of a suspect involved in a criminal act (Fay, 2006). Further, the deterrence effect of surveillance is believed to be grounded on the assumption that increased visibility and the risk of being caught on the CCTV camera inhibits a prospective offender from exhibiting deviant behaviour. If an offender is not deterred by merely being caught red-handed on video, surveillance also provides the probability of intervention by what Cohen and Felson (in Oc and Tiesdell, 1997) called as “capable guardian” (p. 132). The response time for the intervention needs to be reasonable so that the offence is averted. Needless to say, therefore, that there is a need to assess CCTV systems, not only for their deterrence effect, but also their effect in the areas of detection, apprehension and prosecution of the offenders. (Oc and Tiesdell, 1997). Fay (2006) also discussed the pros and cons of using the CCTV system for security purposes. The advantages of a CCTV system includes: (1) possibility of monitoring many locations simultaneously from the control room; (2) early detection of intruders and other criminal acts; (3) savings which may be obtained from the replacement of manpower with a relatively less expensive CCTV system; (4) mitigation of human errors in the performance of security tasks; (5) functions as a deterrent to crime when the CCTV system is readily seen by intruders and thieves; and (6) provision of advantage for post-incident investigation with visual records of incidents kept on storage either from overt or covert CCTV systems Oc and Tiesdell (1997) added the capability for a 24-hour coverage is also one advantage of CCTV systems for security. The disadvantages of CCTV systems, as enumerated by Fay (2006) are as follows: (1) may be expensive to purchase and involve complex operation; (2) need for substantial pre-installation time; (3) possibility of bugs and glitches during operation; (3) need for maintenance and calibration on a periodic basis during the economic life of the system; and (4) performance and accuracy may be affected by intense conditions such as extreme heat and cold, wind and sandstorms, flood and earthquakes. Finally, the CCTV has different effects on various crimes. Grolie (2008) revealed that although the CCTV has no effect on violent crime, the scheme is most effective when used in car parks. Use of CCTV surveillance helped minimise theft of vehicles, but not theft from vehicles. It was also found that the CCTV is effective in reducing burglary, but not crime in public transport. Generally, however, the CCTV has been effective in reducing property crime1, but not personal crime2. Research Methodology. To address the research questions, the researcher intends to utilize descriptive methodology employing quantitative techniques. Descriptive research describes the characteristics of a population or phenomenon primarily with the use of surveys, interviews and observations (Glatthorn and Joyner, 2005). Quantitative techniques, which involve the use of numbers and statistical procedures in seeking explanations, observing and measuring aspects of the phenomena being investigated, will be applied to produce generalizable results (Thomas, 2003). Data will be collected using a survey among security section personnel and the executives of UNMIL using the questionnaire as the main research instrument. Findings from the survey will be triangulated using: (1) semi-structured interviews conducted through an interview guide; and (2) and a combination of personal observation, review of related studies, and reports and documents from security, asset management and financial units by way of documentary analysis. The research design is deemed most appropriate in the conduct of the investigation, especially with the application of triangulation of data. From the quantitative data obtained from the survey, the researcher can address the research question posed; interpret and provide a broader perspective on the use of CCTV in UN installations; and verify such information by testing its validity through the process of triangulation. Womack (1990) maintained that triangulations is the process of blending research methodologies , measurement techniques and or data analysis procedures to verify and increase confidence in the results obtained. Researchers typically utilise triangulation on the assumption that no one method is best for a particular study. Participants in the study will include the following: (1) personnel at the policy making level such as the Director of the Mission Support, the Chief Transport Officer and the Chief Security Advisor; (2) personnel from the operational level, including the Workshop Managers, the Guard Force Commander and the In-Charge of Investigation Unit; and (3) personnel at the tactical or functional level, by a quota sampling from the operation and CCTV control room, duty officers and personnel directly involved in the operations, including IT staff who maintains the CCTV system, and interested local and international staff. The researcher plans to share the report / research findings with experienced work colleagues who specialize in security management of UN property, especially those in the field of CCTV and those from the UN headquarters in New York, since there are already CCTV cameras installed at the UN HQ in NY. The objective is to seek the opinion of these colleagues/experts as a form of peer review to determine whether or not and to what extent the experts agree or disagree with the researcher’s interpretation of data drawn. As part of the triangulation procedure, information would also be sourced from relevant security reports, investigation reports, and Transport and Supplies units’ monthly reports. The researcher is presently working in Liberia as a Regional Security Officer for almost four years. Working in the security section brings added advantage of a firsthand observation of outcome of the security measures being put in place. Anticipated Problems Large global organizations such as the United Nations are guided by stringent rules and regulations, and it is anticipated at this point that the researcher will have a difficult time convincing the UNMIL executives to approve the request for the authorisation of the conduct of this proposed study. Another concern is the possibility that disclosure of sensitive information such as losses and financial budget for the CCTV installation may not be easy to obtain. Other data which may also be difficult to request for authorized accessed are: (1) number and economic value of stolen items; (2) information pertaining to the decision of senior management to implement the CCTV system; (3) CCTV manning and maintenance procedures, including costs involved, and access to recorded footages if required. To overcome this foreseeable obstacle, the researcher will prepare a proposal, which details the benefits of the research investigation and how it would assist the UNMIL management in maximizing their use of the CCTV system. The availability and schedule of the survey and interview respondents may become a problem that will demand a longer time for the conduct of the research work. Different levels of Administration and Security management are to be interviewed, and it is anticipated that some difficulties and delays may be experienced in obtaining appointments or responses due to their unwillingness, tight schedule or other reasons. In this regard, the researcher would alternatively propose to email questions to interviewees for completion and return to researcher. The researcher is currently employed in the security section and deployed in a region which is approximately a ten-hour-drive to Monrovia where the research will be focused. This means that frequent travelling is required for follow up of questionnaires for retrieval and in the scheduling of one to one interviews. This poses a problem because all movement (including travel to the capital, Monrovia) requires prior approval. It is anticipated, therefore, formal requests might not be approved or approved with limitations, contributing to the delay of the research work. Instead, the option of telephone interview and email communications will also be considered for contingency. The fourth and final problem anticipated is the willingness of the research participants to cooperate for the purpose of this study. This is likely to affect the response distribution and, hence, require a follow up by communication through emails, telephone calls or personal visits to respondents. This is likely to cause serious delays and a problematic research work because of time constraint. The researcher plans to prepare a timetable and vigorously adhere to this timeframe for completion of the various phases of research process. A contingency plan for each phase of the research will also be developed to minimize delay in preparing the final draft of the study. References British Broadcasting Corporation. (2009). Timeline: Liberia. [online]. [Accessed 12th August 2009]. Available from the World Wide Web: http://news.bbc.co.uk/2/hi/africa/1043567.stm Fay, J. J. 2006. Contemporary security management. 2nd ed. Oxford: Elsevier Butterworth-Heinemann. Fischer, R. J. & Green, G. Eds. 2004. Introduction to security. Burlington, MA: Butterworth-Heinemann. Furley, O. & May, R. Eds. 2006. Ending Africa’s wars: progressing to peace Burlington, VT: Ashgate Publishing Company. Glatthorn, A. A. & JoynerR. L. 2005.Writing the winning thesis or dissertation: a step-by-step guide. Thousand Oaks, CA: Corwin Press. Grolie, S. 2008. CCTV to prevent crime? To what extent does CCTV prevent crime and how does it affect the life in our cities? Norderstedt, DE: GRIN Verlag.. Howe, H. M. 2004. Ambiguous order: military forces in African states. Boulder, CO: Lynne Rienner Publishers, Inc. Kruegle, H. 2007. CCTV surveillance: analog and digital video practices and technology. 2nd ed. Oxford: Elsevier Butterworth-Heinemann. Oc, T. & Tiesdell, S. 1997. Safer city centres: reviving the public realm. London: Paul Chapman Publishing, Ltd. Siegel, L. J. 2009. Criminology. Belmont, CA: Thomson Wadsworth. Thomas, R. M. 2003. Blending qualitative and quantitative research methods in theses and dissertations. Thousand Oaks, CA: Corwin Press. UNMIL Security Investigation Unit (Unpublished, 2006). Quarterly report, Report dated December 2006. UNMIL Security Investigation Unit (Unpublished, 2007). Quarterly report, Report dated March 2007. United Nations. 2009. Core Values and Code of Conduct Circular. New York: United Nations Secretariat. United Nations Mission in Liberia. 2007. Monrovia Evacuation Plan. United Nations Mission in Liberia. 2009. [online]. [Accessed 12th August 2009]. Available from the World Wide Web: Womack, D. F. 1990. Communication and negotiation. In D. O’ Hair & G. Kreps (eds.), Applied communication theory and research (pp. 77-102). Hillsdale, NJ: Lawrence Erlbaum Associates. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Impact of CCTV System in Curbing Theft Research Paper, n.d.)
The Impact of CCTV System in Curbing Theft Research Paper. Retrieved from https://studentshare.org/social-science/1726258-research-proposal-determining-the-impact-of-cctv-system-in-curbing-stealing-of-united-nations-owned-equipment-by-united-nations-staff-members-in-the-united-nations-installations-and-compounds
(The Impact of CCTV System in Curbing Theft Research Paper)
The Impact of CCTV System in Curbing Theft Research Paper. https://studentshare.org/social-science/1726258-research-proposal-determining-the-impact-of-cctv-system-in-curbing-stealing-of-united-nations-owned-equipment-by-united-nations-staff-members-in-the-united-nations-installations-and-compounds.
“The Impact of CCTV System in Curbing Theft Research Paper”, n.d. https://studentshare.org/social-science/1726258-research-proposal-determining-the-impact-of-cctv-system-in-curbing-stealing-of-united-nations-owned-equipment-by-united-nations-staff-members-in-the-united-nations-installations-and-compounds.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Impact of CCTV System in Curbing Theft

Impact of CCTV on Society

hellip; The major issues with the installation of cctv cameras are that it intrudes privacy.... (Macchet, 2003, 100) Before the advent of cctv cameras individuals particularly relied on human resource for their deterrence.... The major issues with the installation of cctv cameras are that it intrudes privacy.... (Macchet, 2003, 100) Before the advent of cctv cameras individuals particularly relied on human resource for their deterrence....
6 Pages (1500 words) Essay

Comparative Economic Systems

Comparative Economic Systems Abstract In 2007 to 2009, the US economy had to face the worst economic recession in the history.... The financial market crashed, housing debt increased, GDP fell and the unemployment rate also increased during that period, igniting a crisis situation within the economy....
11 Pages (2750 words) Essay

Aftermath of 9/11 in USA

The Broad measures were meant for the long term and included the waging of wars at any place from where supposed threats arise to the USA whereas the specific actions were meant to be implemented and have an impact on the short run.... The world over feelings of sympathies existed and were denounced by mainstream media and governments worldwide....
10 Pages (2500 words) Essay

The impact of law and legislation on Close Protection

(University of London External Programme) In the context of his/her responsibilities, it is essential for a CPO to understand the definition, nature and impact of several acts of crime like theft, burglary, aggravated burglary, and robbery.... A petty theft is less serious and a 'minor' crime, when compared to rape or murder.... This paper will focus on these legislations that impact the work of a CPO....
4 Pages (1000 words) Essay

The US Economy Through the Period of 2002-2004

Changes in the price levels through the impact on the amount of money in use also influence interest rates.... (Handa: 2000) Consumption is the most considerable part of the aggregate demand, and it is wise to start the discussion of the interest rates decrease with the impact it creates on consumption.... (Handa: 2000) However, interest rates also create another impact....
12 Pages (3000 words) Essay

Bank Data Center (Security)

The author includes the key security features such as appropriate location,  redundant facilities, wall construction, window avoidance and plenty of cctv cameras.... The bank's data center will be located approximately 20 miles from the bank premises and about 100 feet from the transport network system such as roads....
3 Pages (750 words) Assignment

Film Analysis: The Prestige

These magicians are rivals in performing magic and go to great lengths to preserve their respective statures and by outdo each other in the… In the course of the film, the rivalry, different skill sets, and deception involved in the magic leave a trail of disasters.... In the wake of the action, dominant themes emerge from the depiction of the two main characters....
8 Pages (2000 words) Essay

Creative Problem Solving

In the paper “Creative Problem Solving” the author analyzes Tesla Model S, an item of great innovation, which is launched by the Tesla Motors.... It is a ‘full-size luxury car' that works on electricity instead of gasoline.... This largely contributes to the conservation of the environment....
4 Pages (1000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us