3,708 research outputs found
Car Theft Prevention System
Car theft cases in Malaysia have been a threat to the government and the
community as a whole. Increasing cases of car thefts in public areas, paid parking
service, mall parking, and also in the neighborhood are the reasons why this project is
initiated. The proposed system is a security system designed to collaborate with the
existing security systems incar parks such as shopping mall car parks and hotel car parks.
It also poses as a verification system for the car and its owner. This project is also
initiated to create a low-cost but effective security system in car parks. Current systems
adopt single authorization method for security purpose which is prone to security
breakage and has a few flaws in its implementation. Therefore, this system is designed
with two-factor verification which consists of car registration number (what you know)
and MyKad (what you have). These two inputs or authentication elements are very
important as they act as a "binder" between the car owner and its car thus becoming the
verifier for this system. In developing this system, iterative development methodology is
used and it is being modified to cater the need of this project. Iterative development
methodology is suitable for this system based on its nature where analysis phase, design
phase and implementation are being executed iteratively until a satisfied product is
produced. It is also suitable to be used for projects with a small timeframe. Included in
this report as well, is the technical configuration required during the product development
which consists of system's configuration and database configuration. During the analysis
part of this project, there has been a few interesting findings that supports the creation of
this project. Among them is the adoption of two-factor authentication using password and
token or smart card is proven to be cheaper yet effective compared to a single biometric
authentication which is very expensive to be implemented. Besides that, privacy violation
and identity theft becomes easierand more damaging whenbiometric system is adopted.
Finally, smart card has been recognized as the future of better security due to its
flexibility to collaborate with password authentication and biometric authentication
which is currentl
THE USE OF ICT FOR SECURITY AND THEFT PREVENTION IN TWO UNIVERSITY LIBRARIES IN NIGERIA
The study investigated the use of ICT for security and theft prevention in two university libraries in Nigeria. Population of the study is made up of 80 library staff of the two universities, 40 library staff from Umaru Musa Yarâadua University, Katsina and 40 library staff from Al-Qalam University Katsina. Five research questions guided the study. The data was analyzed with the use of simple statistical tools like frequencies and percentages. Findings of the study revealed that maximum security in the libraries will prevent theft mutilation. It also revealed that a video surveillance system working in conjunction with a barcode and magnetic book control system could help prevent book theft and monitor the move of books and other resources as it moves from one user to another. Lack of literate or skilled personnel: libraries and information Centreâs lack skilled personnel that can operate, teach and instruct the use of these telecommunication security systems even when they are made available in the library. Poor power supply: These telecommunication security systems or devices need electricity to power them and due to the poor power supply, these systems often time are not working and as such are incapable of performing their expected task of securing the library and its collection. Hardware and software failure: This is major threat to the use of telecommunication security system in the library. When there is software failure or hardware breakdown that may require the need for an engineer who may not be available to put them in place as at when due, then the library system and its collections is at risk. Based on the findings of the study, it was recommended that the librarian and information experts should take out time to educate their parent organization on the benefits associated with libraries and information Centreâs in the use of telecommunication security systems and devices so that the library parent body can release adequate fund which will be used for the purchase of telecommunication security devices in the librar
Cyber-crime Science = Crime Science + Information Security
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empirically in the real world, and proposes improvements to these techniques based on this. Combining both approaches, Cyber-crime Science transfers and further develops Information Security techniques to prevent cyber-crime, and empirically studies the effectiveness of these techniques in the real world. In this paper we review the main contributions of Crime Science as of today, illustrate its application to a typical Information Security problem, namely phishing, explore the interdisciplinary structure of Cyber-crime Science, and present an agenda for research in Cyber-crime Science in the form of a set of suggested research questions
WLAN Hot Spot services for the automotive and oil industries :a business analysis Or : "Refuel the car with petrol and information, both ways at the gas station"
While you refuel for gas ,why not refuel for information or download vehicle data ? This paper analyzes in extensive detail the user segmentation by vehicle usage , service offering , and full business models from WLAN hot spot services delivered to vehicles (private, professional , public) around gas stations . Are also analyzed the parties which play a role in such service authorization, provisioning and delivery , with all the dependencies modelled by attributed digraphs . Sevice planning is included as to WLAN base station capabilities . Five year financial models (CAPEX,OPEX) , and data pertain to two possible service suppliers : multi-service oil companies, and mobile service operators (or MVNO) . Model optimization on the return-on-investment (ROI) is carried out for different deployment scenarios ,geographical coverage assumptions, as well as tariff structures . Comparison is also being made with public GPRS data services ,as precursors for 3G services,and the effect of WLAN roaming is analyzed .Analysis shows that due to manpower costs and marketing costs , suitable ROI will not be achieved unless externalities are accounted for and innovative tariff structures are introduced . Open issues and further research are outlined . Further work is carried out,also with automotive electronics sector , wireless systems providers , wireless terminals platform suppliers , and vehicle manufacturers .WLAN services;WLAN;business models;fuel stations;mobile operator;oil company;professional vehicles
Safety and security of consumers at retail stores in the Gauteng province : an assesment of security measures
Retail stores rely on consumers to maintain their businesses and growth. Much of their success depends on the safety and security of consumers. The more people come and buy the products, the more profitable the stores become. If the safety and security of consumers (or their perceptions thereof) at a shopping centre where a retail store is sited is in question, consumers may well stop frequenting such centres and do their shopping at other retail centres at which they perceive to be more safe and secure to do their shopping.
Consumersâ âpeace-of-mindâ plays a vital role in their selection of which retail store(s) to frequent and will often determine whether a repeat visit will occur. The extent of incidents of crime of whatever nature at a particular shopping centre will also impact negatively on shoppersâ perceptions of âhow safe it is to shopâ at particular centres.
Security measures differ from one retail store to another and also between the size and layout, as well as the location of the retail store. The rate at which criminal offences take place at retail stores is currently vague or unknown. Therefore, it is vital that specific risks confronting these retail stores should be identified and analysed with the intention of recommending specific security measures.
Business crime and violence present significant threats to consumersâ safety and security in South Africa. High levels of business associated crimes have compelled communities and business bodies such as retail stores to provide their own security for the protection of their assets, as well as consumers.
Effective security measures are a prerequisite at retail stores to ensure the safety and security of consumers whilst visiting retail stores. Precaution ought to be taken when dealing with any crime problem that affects consumers at any business environment, in this study more precisely: retail stores.
The study explored the existing security measures at retail stores for the protection of consumers. The researcher employed qualitative methods: one-on-one interviews with participants and site observations at selected retail stores. There were 30 participants (20 consumers and 10 security officers).
The study found the following:
Retail stores were exposed to security risks such as theft; shoplifting; common robbery; armed robbery; fraud; arson and assaults (grievous bodily harm) and burglary.
The security measures that are currently in place are not adequate to protect retail stores. These security measures differ from one retail store to the next.
In order to improve safety and security at retail stores there should be a security standard that is applicable to the retail stores.
Based on the findings, some of the recommendations were as follows:
Retail stores should be protected in line with the level of risk of the area where the retail store is situated: low risk; medium risk; and high risk.
Security managers should conduct security awareness regularly.
Threat assessments should be conducted regularly as well.
Consumers are encouraged to report to the Security manager at the retail store any suspicious actions; persons; objects; and vehicles.Criminology and Security ScienceM. Tech. (Security Management
Annual report (Arizona. Department of Public Safety)
The Arizona Department of Public Safety became operational by the executive order of Governor Jack Williams on July 1, 1969. Governor Williamsâ mandate consolidated the functions and responsibilities of the Arizona Highway Patrol, the
Enforcement Division of the State Department of Liquor Licenses and Control and the Narcotics Division of the State Department of Law
Participatory Evaluation of the Tribal Victim Assistance Programs at the Lummi Nation and Passamaquoddy Tribe
The high rate of crime in American Indian/Alaska Native (AI/AN) communities and/or against AI/AN people reflected in numerous studies in the last three decades, demonstrates the need for victim assistance programs in Indian Country to help victims cope with and heal from violent crime (Wolk 1982; Allen 1985; Sacred Shawl Womenâs Society, no date; McIntire 1988; DeBruyn, Lujan & May 1995; Norton & Manson 1995; Fairchild et. al 1998; Greenfield & Smith 1999; Alba, Zieseniss, et al 2003; Perry 2004). The U.S. Department of Justice, Office for Victims of Crime (OVC) became aware of the lack of resources available to AI/AN crime victims living on Indian lands. OVC, acknowledging the intense and extensive need for culturally relevant resources on reservations, established the Victim Assistance in Indian Country (VAIC) Discretionary Program in 1988, which later became the Tribal Victim Assistance Program (TVA).
OVC initiated this program to establish âon-reservationâ victim assistance programs that would provide permanent, accessible, and responsive victim assistance services on tribal lands.
Recognizing the need for evaluation of promising victim services programs operating in Indian
Country, OVC, in collaboration with the USDOJ National Institute of Justice (NIJ) supported an evaluation of two TVA programsâthe Lummi Victims of Crime (LVOC) Program in Washington and the Passamaquoddy Tribal Victim Outreach Advocate (TVOA) Program in Maine. This report summarizes the results of the participatory evaluation conducted at these two sites
Self-checkout kiosk system with RFlllbased payment module
The Self-checkout kiosk system with RFID-based payment module (SCHECK) is to provide a convenient checkout alternative for customers in
hypermarts to checkout their items. The system shall reduce the overall time taken
for the whole checkout process and is specially addressed for the time-crunched
individuals. The system will embodies the oonventional cheokout pnocess in
hypermarts while enhancing the convenience for customers and speed the overall
process. The author, inspired by the capabilities and potential in RFID technology
has decided to embed the technology into his project. SCIIECK will use the RFID
technology in its payment module in order to provide a speedy checkout elperience
for customers in hypermarts. In fact, through SCIIECK, the author aspires to orpose
the Malaysian community to the RFID based payment card technology; e.g. Touch n
Go card and leverage the utilization of the technology in the couutry through the
retail industry, Lastly, this project will also act as a platform to study the
implementation of RFID based payment card technology in lvlalaysia and its
acceptance rate among the Malaysian community
- âŚ