Discuss About The Centric Privacy And Security In Biometrics.
Now these days, crimes are increasing rapidly. Simultaneously technologies are also developing by fast speed. In this scenario, people are adhering to use technology in crime management. There so many technologies are available with the help of which one can manager his/her organization in a proper manner. Security Management is also a significant factor of organization Management. Techniques such as “closed-circuit television” (herein after mentioned as “CCTV”) have developed in order to prevent crime but the same has some limitations, which are further mentioned in this discussion (Whatls.com, 2018).
As the general manager is the responsible person an organization’s overall management, similarly for the area of security and protection, security manager is the responsible one. These technologies in the security management area are uses for various purposes such as criminal identification and prevention of crime. It is not necessary that by using the techniques like CCTV camera protect someone’s organizations properly. Challenges are always there, but these advance techniques decrease human efforts up to a limit (Ismail, 2017). Not only the private sectors but government is also dependent on these security techniques. Now these days in very government offices, one may find CCTV camera for security purpose and technical devices such as bio metric for other managerial purposes. Further here this is also need to take into care that these technologies have their cost and a security manager must consider this factor also. There is no doubt in saying that CCTV controls the crime level by spreading fear among criminal yet this depends on criminals anyway. There are many types of criminals, who work according to their criminal theory (Criminal Justice, 2018). CCTV has and uniform structure and working styles, this is the reason that sometimes it prevents crime and sometimes become failing to do so. CCTV although is good feature in security control area yet it has some limitations. ,
In an organization, security manager plays very crucial role as he is the liable person for all the security hacks. In case of any crime, he is the answerable person. A security manager needs to develop and implement security plans and policies (Schweitzer, 2014). In addition to this he/she evaluate the requirements of security and protection and recruit and supervise the security officers and other related persons. Security Manager is the superior person in the area of security management in an organization. Being designated on this designation, he carries heavy responsibilities in respect to organization as well as employees. Such manager also plan and allocate budgets for the security Management (Gill, Howell, 2014). In the term of working definition a security manager can be software or a person who takes on Security Management activities.
In a literal mean technology is a structure of information and knowledge which is useful in creation of tools, processing tasks and extracting of materials. In a general meaning, one can understand the term technology as a helping tool. Technology brings ease in an action and processing (Kelly, 2010). Technology is a smart way of doing a task. There are so many sectors of a human life where the same uses technology at a sound level. These sectors are transportation, scaling business, security management and others. Technology is a dynamic element. It never can be static. On a daily basis it improves and keeps improving. Technology can be o so many kinds such as communication technology, construction technology, assistive technology, medical technology, information technology, security management technology and so on (Aunger, 2010).
As earlier discussed, technologies can be of various types. What will be the role and use of a technology completely depends on it is nature. In a general view it may state that technologies are here to help human beings. It makes procedures easy and reduces human efforts. At many of events it saves the time during a process. In the sector of security management there some basic technology are available (Schneier, 2018). Here, this discussion is focused on the fact that in what circumstances such technologies can be used.
In the area of security management, most frequently used devices are biometrics and CCTV (ifsecglobal, 2018). Biometric is a useful devices in that situation where in person verification is required. It can be used for marking the attendance of employees and to verify that who were presented at the time of crime. Whereas on the other side CCTV is useful in those circumstances, where culprit of a crime need to be identify. CCTV also helps to reduce crime in an organization as it record significant activities (Kore Solutions, 2018).
Crimes happen at workplace are known as “Business Crimes”. There are certain types of business crimes. Security management tools alike CCTV and biometrics are adhere to control these crimes (Ravelli, 2018). Before discussing effectiveness and other issues related to these technologies, it is hereby important to discuss that what kind of threats an organization faces on regular basis while working and why security management tools are required. Some of the important and frequent types of business crimes are mentioned hereunder:
This is also to be mention here that it is not necessary that always an insider person do crime at workplace, but the same can be an outsider also. Theft is the lead example of crime where outsider gets involved (Town of Salem New Hampshire, 2018).
Effectiveness of these technologies can be different from case to case. Such as, in some cases CCTV has proved a very effective tool in order to ensure security and has also prevented crimes. Whereas in some of the cases, the same could not help at all due to it is limitations of coverage and other issues (Ashby, 2017). Effectiveness of CCTV also depends on the nature of industry of an organization.
Further, biometrics has two major functions. One is identification and another is verification. In an organization, if it comes to security management, biometrics plays important role (Vielhauer, 2017). It identifies the person at a time who is in the premises and who is not. It allows access and also marks presence and absence at a particular time. Similarly as CCTV, biometrics also has some failures. In some of the circumstances it has noted that people do fraud in order to commit crime, if employees of an organization are not aware a responsible, this technology can be manipulated by marking false entries (Aitel, 2013).
This is important to study that what the forces who promote Crimes at workplace are. Why people commit crimes? In order to answer this it may state that in the subject of criminology there are theories are available. These theories define the motive and purpose behind commitment of crime. Criminological theories are basically the reason of commitment of a crime (Elias, 2013). These can be of various types according to the area of study. As this discussion is focused on the security issues at workplace, some important related theories and their application in this area are given as under:
How much a CCTV can be effective? It depends on the circumstances. Here are some case studies, by reviewing those results, this point may become clear.
Case Study 1.
In this case, 51 new cameras has installed in addition to existing 16 cameras in south city. Due to new cameras there was an extension of target area and they started to provide 72% coverage of the total target area. The new cameras has installed with the objectives to provide assistance to police, prevention of crime and to spread fear among public in relation to crime commitment. Later on it the study, it has noted that crime has reduced by 10% in target area and 12% as whole. But further, it also comes into light that such reduction was not the result of CCTV but the result of general trends. In this case CCTV has not proved a better technique to prevent the crime in a particular area (Home office, 2018).
Case study 2.
According to a survey done by Daily Telegraph, it has studies that in a year around 86 cases out of 90 were dependent on CCTV for their investigation purpose and senior officers said that CCTV helped to identify culprit in 65 cases.
Further in another case, Mr. Richard Whelan stabbed to death in 2005, while he was attempting to defend his girlfriend. The whole incident has recorded in a camera (The Telegraph, 2018).
By reviewing the aforesaid cases, it may state that giving any positive or negative comment about effectiveness of CCTV camera would be unfair. As in some circumstances it proved it is great significant whereas in some other the same has not been successful in prevention of crime.
Budget is also a factor for security management. Whenever a security manager make plans and policies for his sector i.e. security management, he/she need to keep the expenditure in consideration. As it is general that every new security management tool and application generates cost to organization, similarly CCTV also brings additional cost in an entity. This cost extended more in comparison when CCTV is dynamic rather than static. Here this is to understand that whether this addition cost actually provides extra security and benefit to an organization or not (Lawson, Rogerson and Barnacle, 2018). It may also state that a comparative analysis in between costs accrued to an organization due to CCTV and profits gained by the organization due to installation of the same is a necessary exercise which is required to be done.
Only installation of CCTV is not important, until unless the same is properly managed and operated (Cordery, 2015). Crime is a very quick activity. In most of the cases, it has observed that although CCTV was there but the same could not capture anything due to be in non-operating situation. In this context it may mention that CCTV has it is own requirements which generates high cost to an organization. In small size organization, it becomes more typical to afford CCTV. High cost of this advancement demotivates people to use CCTV (Stutzer and Zehnder, 2012). In addition to this as studied in aforesaid case, it has also come into knowledge that CCTV has not proved very effective in crime control. So, it is advisable for a security manager to check the viability of CCTV installation as a security management tool.
Use of CCTV is increasing day by day in order to maintain and ensure security management at workplace. It has noted in many of the cases that security manager is reliant on CCTV for the purpose of managing security at workplace up to a great extent. CCTV can be used for many of the purpose in an organization such as keep employees secure by preventing theft or other similar activities, to ensure that the procedures are following by the employees of organization, to prevent unfair activities such as harassment, theft and misconduct at workplace (ICAEW, 2018). Whenever a security manager develops policies in respect of security management, the same identify some security management tools, CCTV is one of them. It is not a natural guide, yet the same has it is own functions and positive aspects. In the present era where structures of organization are going wide and extend, it is not possible to maintain security via guard or other human resources. These are natural guide and have their own importance, but the same cannot use as security tools in a big size organizations (Government Europa, 2018). In these kind of entity, manager use CCTV as a guide. But as earlier discussed that the same some limitations and in most of the cases it has noted that CCTV has not fulfilled the requirements and expectations of security manager (Doctorow, 2018)
As CCTV is technological machinery, the same cannot do mistakes, results of CCTV are correct and appropriate in general. Further, as this is an advance technique, one can also review the past activities with the help of CCTV. This is the reason cause of which security manager rely upon CCTV. Many of the times, security managers does not employee any human resources to check out the activities, instead they put a CCTV in their organization. This reflects that up to what extent, security managers rely upon CCTV. Workplace is an area where liability of manager is limited somewhere. It is limited up to particular premises. Most of the organizations are close one and only employees have access to a particular zone, so one or two CCTV are sufficient. In general, securities of employees are the most important context, when it comes to security management at workplace (McEnery, 2015). How much a security manager is dependent on the CCTV for security purpose is depend on the certain factors such as size of organization, organizational culture, behavior of employees, entry frequency of outsiders and personal opinion and believe of manager. Further, budget is also a factor which influences the level of trust of manager over CCTV. In that organization where budget is an issue, manager has to reply upon CCTV only as he /she cannot hire natural guide over there in addition to CCTV (Granneman, 2018).
Conclusion
In an organization, many of the criminal activities are happening these days. These activities can be done by internal persons of an organization such as employee and assistants or can be an outsider such as supplier, investor or other related person. People commit crime due to their criminological theory. Every criminal has his/her own reasons and perceptions but in case of crime an organization has -to suffer from loss. Such crimes also defame the reputation of an organization.
Security manager of an entity is the person who is responsible to maintain proper and secure atmosphere at workplace. CCTV is the one of the kind of security management tool. It is an artificial guide, which means it can only record the things and answer the query accordingly. CCTV is an effective tool in order to ensure security at workplace but it has some limitations. It has observed in some cases that CCTV has not proved effective as expected. Security manager is the most concerned person in field of security management and the same believe at CCTV for this purpose. After the required study of CCTV, it is features, positives and negative impacts, it may state here that CCTV is a good security management tool but it is effectiveness is influenced by some of the factors. It cannot prove more effective in the circumstances where natural guide is also available. CCTV has some limitations due to his machinery nature, so presence of nature guide can remove such limitations and can bring out more effective results. In the conclusion it may state that although CTV is an effective measure to control crimes and the same also does help in identification of criminal, yet the same has it is limitations also it is advisable for security manager to not to reply blindly on CCTV.
References
Ael, D. (2013) Column: Why fingerprints, other biometrics don’t work. [online] Available from: https://www.usatoday.com/story/cybertruth/2013/09/12/why-biometrics-dont-work/2802095/ [Accessed on 08/06/18]
Ashby, M. P. J. (2017) The value of CCTV Surveillance cameras as an Investigative Tool: An Empirical Analysis. European Journal on Criminal Policy and Research, 23(3), pp. 441-459
Aunger, R. (2010) Types of technology. Technological Forecasting and Social, 77(5), pp. 762-782.
Binde, P. (2016) Gambling-related embezzlement in the workplace: a qualitative study. International Gambling Studies, 16(3), pp. 391-407
Briggs, S. (2018) Important Theories In Criminology: Why People Commit Crime. [online] Available at: https://www.dummies.com/education/psychology/important-theories-in-criminology-why-people-commit-crime/ [Accessed on 08/06/18]
Cordery. (2015) The law on using CCTV on your premises. [online] Available at: https://www.corderycompliance.com/the-law-on-using-cctv-on-your-premises/ [Accessed on 11/06/18]
Criminal Justice. (2018) Criminology Theories. [online] Available at: https://criminal-justice.iresearchnet.com/criminology/theories/ [Accessed on 11/06/18]
Doctorow, C. (2018) Why CCTV has failed to deter criminals. [online] Available at: https://www.theguardian.com/technology/2011/aug/17/why-cctv-does-not-deter-crime [Accessed on 11/06/18]
Doyle, A. (2018) The Different Types of Harassment in the Workplace. [online] Available at: https://www.thebalancecareers.com/types-of-harassment-in-the-workplace-2060886 [Accessed on 11/06/18]
Elias, S. M. (2013) Deviant and Criminal Behavior in the Workplace. New York: NYU Press.
Giglio, D. (2013) 5 Types of Employee Theft & Crimes to Watch Out For. [online] Available from: https://pvteyes.com/5-types-employee-crimes-watch/ [Accessed on 08/06/18]
Gill, M., Howell, C. (2014) Policing Organisations: The Role of the Corporate Security Function and the Implications for Suppliers. International Journal of Police Science and Management,16(1), pp. 65-75.
Government Europa. (2018) Information security and privacy protection aspects of CCTV systems. [online] Available at: https://www.governmenteuropa.eu/information-security-cctv-systems/85930/ [Accessed on 11/06/18]
Granneman, J. (2018) What are the best approaches for security budgeting? [online] Available at: https://searchsecurity.techtarget.com/answer/What-are-the-best-approaches-for-security-budgeting [Accessed on 11/06/18]
Home office. (2018) The impact of CCTV: fourteen case studies. [online] Available from: https://webarchive.nationalarchives.gov.uk/20110218140110/https://rds.homeoffice.gov.uk/rds/pdfs05/rdsolr1505.pdf [Accessed on 12/06/18]
ICAEW. (2018) Using CCTV to monitor the workplace. [online] Available at: https://www.icaew.com/archive/library/subject-gateways/business-management/smes/small-business-update/2015-01/using-cctv-to-monitor-the-workplace [Accessed on 11/06/18]
Ifsecglobal. (2018) Biometric security systems: a guide to devices, fingerprint scanners and facial recognition access control. [online] Available at: https://www.ifsecglobal.com/biometric-security-systems-guide-devices-fingerprint-scanners-facial-recognition/ [Accessed on 11/06/18]
Ismail, N. (2017) Modern technology: advantages and disadvantages. [online] Available from: https://www.information-age.com/modern-technology-advantages-disadvantages-123465637/ [Accessed on 07/06/18]
Kelly, K. (2010) What Technology Wants. London: Penguin
Kore Solutions. (2018) CCTV in the workplace. [online] Available at: https://www.kore-solutions.co.uk/6-ways-cctv-can-be-used-in-the-workplace-and-the-regulations-you-must-follow.html [Accessed on 11/06/18]
Lawson, T., Rogerson, R. and Barnacle, M. (2018) A comparison between the cost effectiveness of CCTV and improved street lighting as a means of crime reduction. Computers, Environment and Urban Systems, 68, p.p. 17-25
Library Index. (2018) Types of Crime – Workplace Violence. [online] Available at: https://www.libraryindex.com/pages/440/Types-Crime-workplace-violence.html [Accessed on 11/06/18]
McEnery, C. (2015) The Use Of CCTV In The Workplace. [online] Available at: https://www.legal-island.ie/articles/ire/features/hr/2015/mar/the-use-of-cctv-in-the-workplace/ [Accessed on 11/06/18]
McLaughlin, H., Uggen, C. and Blackstone, A. (2012) Sexual Harassment, Workplace Authority, and the Paradox of Power. American Sociological Review. 77(4), pp. 625-647.
Ministry of Children and youth Services. (2018) Review of the Roots of Youth Violence: Literature Reviews. [online] Available at: https://www.children.gov.on.ca/htdocs/English/professionals/oyap/roots/volume5/chapter04_social_disorganization.aspx [Accessed on 11/06/18]
Ravelli, R. (2017) tackling business crime in your workplace. [online] Available at: https://www.rahmanravelli.co.uk/articles/tackling-business-crime-in-your-workplace/ [Accessed on 11/06/18]
Schneier, B. (2018) How Changing Technology Affects Security. [online] Available at: https://www.wired.com/insights/2014/02/changing-technology-affects-security/ [Accessed on 11/06/18]
Schweitzer, J.A. (2014) Computers, Business, and Security: The New Role for Security. United State of America: Butterworth-Heinemann publishers
Stutzer, A. and Zehnder, M. (2012) Is camera surveillance an effective measure of counterterrorism? Defence and Peace Economics, 24(1) pp. 1-14
The Telegraph. (2018) Seven of ten murders solved by CCT. [online] Available at: https://www.telegraph.co.uk/news/uknews/law-and-order/4060443/Seven-of-ten-murders-solved-by-CCTV.html
Town of Salem New Hampshire. (2018) Crime in the Workplace. [online] Available from: https://www.townofsalemnh.org/police-department/pages/crime-in-the-workplace [Accessed on 08/06/18]
Vielhauer, C. (2017) User-Centric Privacy and Security in Biometrics. Stevenage: Institution of Engineering and Technology
Whatls.com. (2018) CCTV (closed circuit television). [online] Available from: https://whatis.techtarget.com/definition/CCTV-closed-circuit-television [Accessed on 07/06/18]
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download