3,708 research outputs found

    Car Theft Prevention System

    Get PDF
    Car theft cases in Malaysia have been a threat to the government and the community as a whole. Increasing cases of car thefts in public areas, paid parking service, mall parking, and also in the neighborhood are the reasons why this project is initiated. The proposed system is a security system designed to collaborate with the existing security systems incar parks such as shopping mall car parks and hotel car parks. It also poses as a verification system for the car and its owner. This project is also initiated to create a low-cost but effective security system in car parks. Current systems adopt single authorization method for security purpose which is prone to security breakage and has a few flaws in its implementation. Therefore, this system is designed with two-factor verification which consists of car registration number (what you know) and MyKad (what you have). These two inputs or authentication elements are very important as they act as a "binder" between the car owner and its car thus becoming the verifier for this system. In developing this system, iterative development methodology is used and it is being modified to cater the need of this project. Iterative development methodology is suitable for this system based on its nature where analysis phase, design phase and implementation are being executed iteratively until a satisfied product is produced. It is also suitable to be used for projects with a small timeframe. Included in this report as well, is the technical configuration required during the product development which consists of system's configuration and database configuration. During the analysis part of this project, there has been a few interesting findings that supports the creation of this project. Among them is the adoption of two-factor authentication using password and token or smart card is proven to be cheaper yet effective compared to a single biometric authentication which is very expensive to be implemented. Besides that, privacy violation and identity theft becomes easierand more damaging whenbiometric system is adopted. Finally, smart card has been recognized as the future of better security due to its flexibility to collaborate with password authentication and biometric authentication which is currentl

    THE USE OF ICT FOR SECURITY AND THEFT PREVENTION IN TWO UNIVERSITY LIBRARIES IN NIGERIA

    Get PDF
    The study investigated the use of ICT for security and theft prevention in two university libraries in Nigeria. Population of the study is made up of 80 library staff of the two universities, 40 library staff from Umaru Musa Yar’adua University, Katsina and 40 library staff from Al-Qalam University Katsina. Five research questions guided the study. The data was analyzed with the use of simple statistical tools like frequencies and percentages. Findings of the study revealed that maximum security in the libraries will prevent theft mutilation. It also revealed that a video surveillance system working in conjunction with a barcode and magnetic book control system could help prevent book theft and monitor the move of books and other resources as it moves from one user to another. Lack of literate or skilled personnel: libraries and information Centre’s lack skilled personnel that can operate, teach and instruct the use of these telecommunication security systems even when they are made available in the library. Poor power supply: These telecommunication security systems or devices need electricity to power them and due to the poor power supply, these systems often time are not working and as such are incapable of performing their expected task of securing the library and its collection. Hardware and software failure: This is major threat to the use of telecommunication security system in the library. When there is software failure or hardware breakdown that may require the need for an engineer who may not be available to put them in place as at when due, then the library system and its collections is at risk. Based on the findings of the study, it was recommended that the librarian and information experts should take out time to educate their parent organization on the benefits associated with libraries and information Centre’s in the use of telecommunication security systems and devices so that the library parent body can release adequate fund which will be used for the purchase of telecommunication security devices in the librar

    Cyber-crime Science = Crime Science + Information Security

    Get PDF
    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empirically in the real world, and proposes improvements to these techniques based on this. Combining both approaches, Cyber-crime Science transfers and further develops Information Security techniques to prevent cyber-crime, and empirically studies the effectiveness of these techniques in the real world. In this paper we review the main contributions of Crime Science as of today, illustrate its application to a typical Information Security problem, namely phishing, explore the interdisciplinary structure of Cyber-crime Science, and present an agenda for research in Cyber-crime Science in the form of a set of suggested research questions

    WLAN Hot Spot services for the automotive and oil industries :a business analysis Or : "Refuel the car with petrol and information, both ways at the gas station"

    Get PDF
    While you refuel for gas ,why not refuel for information or download vehicle data ? This paper analyzes in extensive detail the user segmentation by vehicle usage , service offering , and full business models from WLAN hot spot services delivered to vehicles (private, professional , public) around gas stations . Are also analyzed the parties which play a role in such service authorization, provisioning and delivery , with all the dependencies modelled by attributed digraphs . Sevice planning is included as to WLAN base station capabilities . Five year financial models (CAPEX,OPEX) , and data pertain to two possible service suppliers : multi-service oil companies, and mobile service operators (or MVNO) . Model optimization on the return-on-investment (ROI) is carried out for different deployment scenarios ,geographical coverage assumptions, as well as tariff structures . Comparison is also being made with public GPRS data services ,as precursors for 3G services,and the effect of WLAN roaming is analyzed .Analysis shows that due to manpower costs and marketing costs , suitable ROI will not be achieved unless externalities are accounted for and innovative tariff structures are introduced . Open issues and further research are outlined . Further work is carried out,also with automotive electronics sector , wireless systems providers , wireless terminals platform suppliers , and vehicle manufacturers .WLAN services;WLAN;business models;fuel stations;mobile operator;oil company;professional vehicles

    Safety and security of consumers at retail stores in the Gauteng province : an assesment of security measures

    Get PDF
    Retail stores rely on consumers to maintain their businesses and growth. Much of their success depends on the safety and security of consumers. The more people come and buy the products, the more profitable the stores become. If the safety and security of consumers (or their perceptions thereof) at a shopping centre where a retail store is sited is in question, consumers may well stop frequenting such centres and do their shopping at other retail centres at which they perceive to be more safe and secure to do their shopping. Consumers’ ‘peace-of-mind’ plays a vital role in their selection of which retail store(s) to frequent and will often determine whether a repeat visit will occur. The extent of incidents of crime of whatever nature at a particular shopping centre will also impact negatively on shoppers’ perceptions of ‘how safe it is to shop’ at particular centres. Security measures differ from one retail store to another and also between the size and layout, as well as the location of the retail store. The rate at which criminal offences take place at retail stores is currently vague or unknown. Therefore, it is vital that specific risks confronting these retail stores should be identified and analysed with the intention of recommending specific security measures. Business crime and violence present significant threats to consumers’ safety and security in South Africa. High levels of business associated crimes have compelled communities and business bodies such as retail stores to provide their own security for the protection of their assets, as well as consumers. Effective security measures are a prerequisite at retail stores to ensure the safety and security of consumers whilst visiting retail stores. Precaution ought to be taken when dealing with any crime problem that affects consumers at any business environment, in this study more precisely: retail stores. The study explored the existing security measures at retail stores for the protection of consumers. The researcher employed qualitative methods: one-on-one interviews with participants and site observations at selected retail stores. There were 30 participants (20 consumers and 10 security officers). The study found the following: Retail stores were exposed to security risks such as theft; shoplifting; common robbery; armed robbery; fraud; arson and assaults (grievous bodily harm) and burglary. The security measures that are currently in place are not adequate to protect retail stores. These security measures differ from one retail store to the next. In order to improve safety and security at retail stores there should be a security standard that is applicable to the retail stores. Based on the findings, some of the recommendations were as follows: Retail stores should be protected in line with the level of risk of the area where the retail store is situated: low risk; medium risk; and high risk. Security managers should conduct security awareness regularly. Threat assessments should be conducted regularly as well. Consumers are encouraged to report to the Security manager at the retail store any suspicious actions; persons; objects; and vehicles.Criminology and Security ScienceM. Tech. (Security Management

    Annual report (Arizona. Department of Public Safety)

    Get PDF
    The Arizona Department of Public Safety became operational by the executive order of Governor Jack Williams on July 1, 1969. Governor Williams’ mandate consolidated the functions and responsibilities of the Arizona Highway Patrol, the Enforcement Division of the State Department of Liquor Licenses and Control and the Narcotics Division of the State Department of Law

    Commercial Utilization of Mobile RFID

    Get PDF

    Participatory Evaluation of the Tribal Victim Assistance Programs at the Lummi Nation and Passamaquoddy Tribe

    Full text link
    The high rate of crime in American Indian/Alaska Native (AI/AN) communities and/or against AI/AN people reflected in numerous studies in the last three decades, demonstrates the need for victim assistance programs in Indian Country to help victims cope with and heal from violent crime (Wolk 1982; Allen 1985; Sacred Shawl Women’s Society, no date; McIntire 1988; DeBruyn, Lujan & May 1995; Norton & Manson 1995; Fairchild et. al 1998; Greenfield & Smith 1999; Alba, Zieseniss, et al 2003; Perry 2004). The U.S. Department of Justice, Office for Victims of Crime (OVC) became aware of the lack of resources available to AI/AN crime victims living on Indian lands. OVC, acknowledging the intense and extensive need for culturally relevant resources on reservations, established the Victim Assistance in Indian Country (VAIC) Discretionary Program in 1988, which later became the Tribal Victim Assistance Program (TVA). OVC initiated this program to establish “on-reservation” victim assistance programs that would provide permanent, accessible, and responsive victim assistance services on tribal lands. Recognizing the need for evaluation of promising victim services programs operating in Indian Country, OVC, in collaboration with the USDOJ National Institute of Justice (NIJ) supported an evaluation of two TVA programs—the Lummi Victims of Crime (LVOC) Program in Washington and the Passamaquoddy Tribal Victim Outreach Advocate (TVOA) Program in Maine. This report summarizes the results of the participatory evaluation conducted at these two sites

    Self-checkout kiosk system with RFlllbased payment module

    Get PDF
    The Self-checkout kiosk system with RFID-based payment module (SCHECK) is to provide a convenient checkout alternative for customers in hypermarts to checkout their items. The system shall reduce the overall time taken for the whole checkout process and is specially addressed for the time-crunched individuals. The system will embodies the oonventional cheokout pnocess in hypermarts while enhancing the convenience for customers and speed the overall process. The author, inspired by the capabilities and potential in RFID technology has decided to embed the technology into his project. SCIIECK will use the RFID technology in its payment module in order to provide a speedy checkout elperience for customers in hypermarts. In fact, through SCIIECK, the author aspires to orpose the Malaysian community to the RFID based payment card technology; e.g. Touch n Go card and leverage the utilization of the technology in the couutry through the retail industry, Lastly, this project will also act as a platform to study the implementation of RFID based payment card technology in lvlalaysia and its acceptance rate among the Malaysian community
    • …
    corecore