Professional Documents
Culture Documents
LIST OF ABBREVATIONS
API: Application Programming Interface
INTRODUCTION
Video surveillance is often considered one of the first applications of pervasive computing . Its usage has
significantly increased over the last three decades, firstly due to continuously decreasing hardware costs
including camera, storage and networking and secondly due to the increased sense of insecurity caused by
incidents like 9/11 and the Madrid and London bombings. Traditional video surveillance systems are either
simple recording systems or are monitored by human observers without automated technological assistance.
This makes them very expensive in terms of installation and operation. They are mainly used as deterrents
and the recordings help investigation once an incident has occurred. Compared to these traditional solutions,
modern digital are less expensive while offering much better quality. Modern systems make use of
advanced techniques such as object detection notification, -tracking and event-detection, and exploiting
algorithms
THEORETICAL BACKGROUND
1.The theoretical framework of camera surveillance, physical security, deterance at the population
level,controle room operation,strategic intelligence sharing with partner,police involvement and business
continuity related literature including ISO standards and professional handbooks. Methods of the level of
security assessment,, and business impact analysis. These methods provided results, which enabled the
formation of a camera surveillance strategy. This strategy is written as a camera surveillance plan, The final
product will deliver an efficient camera surveillance strategy that the case company can utilize as such. The
product also demonstrates key risks that might affect the camera surveillance system itself making the whole
system more resilient. When the camera surveillance plan is used, the case company can ensure the level of
surveillance quality, resilience, and efficiency of the monitoring conducted with building cameras.
A CCTV camera system makes use of video cameras, also called surveillance cameras to keep
track of the interior and exterior of a property, transmit the signal to a monitor or set of monitors,
and give real-time 24/7 viewing access.
With all these benefits, a surveillance system has become a must in a society where there is an
increase in the crime rate. So when you decide which security system is best for your unique
necessities,
1. Camera If you’re building a CCTV Camera System, you have two camera options: Internet
Protocol (IP) or analog. IP is usually the preferred choice due to its compatibility with most
devices. Many different types of cameras can be installed, for example -dome cameras, bullet
cameras, covert cameras.
Depending on how many angles you want to cover, how many cameras you will need in that
specific area, how much resolution or detailing you require when you choose your preferred
cameras
2. Monitoring Station
A monitor arguably facilitates the most important function of a security camera: viewing recorded
images and footage. Deciding how many monitors you’ll need is dependent upon what, and which
area you are monitoring. You wouldn't need more than three to five screens if you aren't operating
in a large-scale facility. Although if your requirements change, you can easily add or remove
monitors anytime to match the compatibility of your camera.
Depending on the type of surveillance system, and cameras you choose, you will need supporting
technologies like cables, and routers to be integrated into your system for a seamless connection.
For example, wireless systems require a router, while wired versions do not.
Therefore, choose the cables, and wires after selecting your cameras, and monitors according to
your unique needs.
4. Video Recorders
The video recorder is the device where video recorded on the camera gets processed for storage &
viewing. There are two types of video recorders: DVR (Digital Video Recorders) and NVR (Network
Video Recorders).
5. Data Storage
Your CCTV security system is only as good as the hard disk backing it. The storage device for a
security camera system should be able to record, store and re-play videos non-stop from multiple
feeds. Regular hard drives that are used in PCs and Laptops are ill equipped to handle CCTV
storage needs. Hence, it is critical to choose a robust storage system for safe data storage
6 In our working definition, security threats and challenges are actions or events that put at risk the material
or identity basis upon which individuals, societies, states and perhaps even the planet have come to expect
or rely(TFE, 2018)
General objective
The general objective is to find out how intelligent video surveillance system monitoring and the security
challenges in an organization.
Specific objective
To analyse the effect of camera on security challenges
To evaluate the effect of monitoring on security challenges
To examine which type of cable and routers will be suitable for the cameras on security challenges
To determine which type of video recorder will be suitable on security challenges
To evaluate which type of component will be use for data storage on security challenges
Specific hypotheses
H1: There is a statistical relationship between cameras and security challenges
H3: there is a statistical relationship between data storage and security challenges
H0: there is no statistical relationship between data storage and security challenges
H4: there is a statistical relationship between data storage and security challenges
H0: there is no statistical relationship between data storage and security challenges
Research on the topic the effect of video surveillance system and security challenges have a major
significance to the community, and business organisations such as schools and hospitals .
Video surveillance involves the act of observing a scene or scenes and looking for specific behaviours
that are improper or that may indicate the emergence or existence of improper behaviour.
Common uses of video surveillance include observing the public at the entry to sports events, public
transportation (train platforms, airports, etc.), and business organisation around the perimeter of
secure facilities, especially those that are directly bounded by community spaces.
The video surveillance process includes the identification of areas of concern and the identification of
specific cameras or groups of cameras that may be able to view those areas. If it is possible to identify
schedules when security trends have occurred or may be likely to occur, that is also helpful to the
process. Then, by viewing the selected images at appropriate times, it is possible to determine if the
improper activity is occurring.
One such application is for business organisations. Following a series of reports of intimidating
behaviour at a particular time in different businesses, the use of video cameras and intercoms was
found to reduce the potential for such events as the perpetrators began to understand that their
behaviour could be recorded and used to identify them to police. Furthermore, the act of stealing and
bugling has deterred the police who use these images to track and apprehend the criminals. Word got
around and the behaviour was reduced dramatically. (TFE, 2018)
JUSTIFICATION OF THE STUDY.
To justify this study, the researcher will start by saying that from the significance of the study seen above the
effect of video surveillance cameras which help to keep checks on security challenges in an organization and
even in a small community for observation, organizations that fail to use intelligence video surveillance and
monitoring system are likely to be more vulnerable to security challenges Also what prompts the
researcher to work on this topic was the number of time theft bugle into the ETUOG-EBE BAPTIST
HOSPITAL within the period of internship bulk of images was to be analyzed with complex nature of
analogue images from analogue cameras it was difficult to track the cuprite hence giving security challenges
in this institution
TIME SCOPE
This study is aim at providing a realisable project that can help in reducing security challenges in most
organisations by using the right tools of video surveillance cameras that have about 85% of tracking action
and record desirable behaviour in the environment and can then be analysed by security expert this product
of research carried out in ETUOG-EBE BAPTIST HOSPITAL. took the researcher THREE months which
started from the 15 FEBRUARY TO THE 15 OF June 20222. This time was too small to carry out a
scientific work of this nature. So, all criticisms to strengthen the research are highly welcome. Also what
prompts the researcher to work on this topic was the number of bugling by theft in this short period of
internship giving a clow on what other organisations are going through as far as security is concerned within
the organisation and without so video surveillance and monitoring will help bridge this gap as far as
security challenges are concern.
GEOGRAPHICal SCOPE
The internship place is located at ETUOG-EBE IN THE BIYEM ASI NEIGHBOURHOOD in the political
capital YAOUNDE in the CENTRE REGION OF THE REPUBLIC OF CAMEROON.
CHAPTER TWO
LITERATURE REVIEW
Literature review talks about what other people have written in relation to the topic in question, This chapter
also includes the following; review by theories, review by concepts, review by context, review by objectives
and presentation of internship activities..
The detection theory: Camera tamper detection is the ability to detect faults and
operational failures in video surveillance cameras by analyzing the video. In this
research, a signal detection theory approach is proposed to quantitatively analyze the
information being captured by the camera and to detect tampers. Signal activity is used
as a feature to measure the amount of information in the image. The distribution of
features representing the normal operation of a camera is modeled as a Gaussian
mixture model (GMM). To reduce the effects of noise, a Kalman filter is used to model
changes in signal activity in the video.
Routine Activity Theory (RAT): RAT argues that when a crime occurs, three things happen at the same
time and in the same space:
A suitable target is available: There are three major categories of target. A target can either be: a person,
an object, or a place.
There is the lack of a suitable guardian to prevent the crime from happening: The second condition is
that a capable guardian whose presence would discourage a crime from taking place must be absent.
A capable guardian is anything, either a person or thing that discourages crime from taking place. These can
be formal or informal.
Some examples of capable guardians: Alarm Systems, Barriers, Close Circuit Television (CCTV) Systems,
Fences, Locks, Neighbors, Police Patrols, Security Guards and many more.
Likely Offenders: When a suitable target is unprotected by a capable guardian there is a chance that a crime
will take place. The final element in this picture is that a likely offender has to be present.
RAT looks at crime from an offender's point of view. A crime will only be committed if a likely offender
thinks that a target is suitable and a capable guardian is absent. It is their assessment of a situation that
determines whether a crime will take place.
Closed Circuit Television (CCTV) plays a vital role in protecting the public and assisting the law enforcement agencies
in the investigation of crime and apprehending of offenders. It is estimated that there are about five million CCTV
cameras in use today, and this number is likely to increase significantly in the future (Gill, 2006). Even though the
exact number of CCTV systems is unclear, "the extent of CCTV coverage and the government's funding of new
systems have increased dramatically over the last decade," (Armitage, 2002) yet there is little substantive research
evidence to show that CCTV works (Armitage, 2002). The research presented examines the social and technical
problems affecting CCTV performance, provides a framework for understanding the cause of problems, and guidance
on how to overcome them in practice. A CCTV security system is typically configured to record CCTV video footage of
people (targets) and their activities. In Britain today, it is impossible to avoid the vast amount of surveillance that
covers the country. Over the last 20 years, the dramatic increase in Closed Circuit Television cameras (CCTV) and
other forms of surveillance has meant that getting caught on camera is part of everyday life. There are also debates
discussing the different aims of CCTV and the impacts and effectiveness CCTV has on society. Therefore, there have
also been many theories and literature on surveillance introduced in the last decade in criminology; much of which
looks at CCTV as a crime prevention measure. Before looking at the most recent theories on surveillance, it is useful
to look at some traditional theorists and how their work relates to surveillance. Both Marx and Weber's theories give
reasons why they believe surveillance exists in the social world. “Karl Marx focuses special attention on surveillance
as an aspect of the struggle between labour and capital. Overseeing and monitoring workers is viewed here as a
means of maintaining managerial control on behalf of capital” (Lyon, 1994:7).This shows Marx's view that in a
capitalist society, workers in factories, for example, were watched for the factory owners toremain in control and
continue to make money."Max Weber, on the other hand, concentrates on the ways that all modern organizations
develop means of storing and retrieving data in the form of files as part of the quest of efficient practice within a
bureaucracy. Such files frequently contain personal information so that organizations, especially government
administrators can 'keep tabs' on populations" (Lyon, 1994:7). These past theories and conceptions are relevant as
they give us some history and background information. From this arguments it shows that these arguments that
surveillance has always existed as social control. We can also see how theories expand and develop as surveillance
does. I can now move on to look at how surveillance and CCTV is perceived in contemporary society and how it has
affected it. CCTV has dramatically risen in Britain and therefore has different areas of research surrounding this. For
example, fear of crime, public safety and crime prevention. Their main aim of the increase of CCTV in the UK was to
reduce crime and use it as an effective crime prevention method. Therefore in 1995: “the government announced
the establishment of a special fund, known as the ‘CCTV Challenge Competition’, to encourage local authorities to set
up and part fund surveillance schemes” and “in the three years to the end of 1997 the Home Office and local
authorities collectively invested £120 million in CCTV systems” (Guardian9.1.1998 cited in Crawford, 1998: 41). These
CCTV systems were put in place as a way of detecting and deterring crime, monitoring scenes and to cause self-
discipline. They also suggest that CCTV "may prevent crime because potential offenders are deterred by their
increased subjective probability of being detected" (Welsh &Farrington, 2009: 36). This is sometimes referred to as
situational crime prevention and shows
that the presence of CCTV could cause potential offenders not to commit a crime as the risk outweighs the benefits.
Therefore, CCTV reduces offenders' opportunities to commit crimes. It also links to the idea that CCTV is used to
produce self-discipline in victims and offenders. For potential victims CCTV is a “reminder of the ‘risk’ of crime,
therefore altering their behavior accordingly” (Armitage, 2002: 1) and controlling
CONCEPTUAL REVIEW
Under the review by concept, we are to explain in detail, all the concepts used in this research: looking at the
meaning of installation and configuration of surveillance cameras. In this case we will define what is mean
by installation and configuration of surveillance camera and equally security and monitoring, how it can
improve the performance and safety of an organization.
1. Camera
If you’re building a CCTV Camera System, you have two camera options: Internet Protocol (IP) or
analog. IP is usually the preferred choice due to its compatibility with most devices. Many different
types of cameras can be installed, for example -dome cameras, bullet cameras, covert cameras.
Depending on how many angles you want to cover, how many cameras you will need in that
specific area, how much resolution or detailing you require when you choose your preferred
cameras
2. Monitoring Station
A monitor arguably facilitates the most important function of a security camera: viewing recorded
images and footage. Deciding how many monitors you’ll need is dependent upon what, and which
area you are monitoring. You wouldn't need more than three to five screens if you aren't operating
in a large-scale facility. Although if your requirements change, you can easily add or remove
monitors anytime to match the compatibility of your camera.
Depending on the type of surveillance system, and cameras you choose, you will need supporting
technologies like cables, and routers to be integrated into your system for a seamless connection.
For example, wireless systems require a router, while wired versions do not.
Therefore, choose the cables and wires after selecting your cameras, and monitors according to
your unique needs.
4. Video Recorders
The video recorder is the device where video recorded on the camera gets processed for storage &
viewing. There are two types of video recorders: DVR (Digital Video Recorders) and NVR (Network
Video Recorders).
5. Data Storage
Your CCTV security system is only as good as the hard disk backing it. The storage device for a
security camera system should be able to record, store and re-play videos non-stop from multiple
feeds. Regular hard drives that are used in PCs and Laptops are ill equipped to handle CCTV
storage needs. Hence, it is critical to choose a robust storage system for safe data storage
INSTALLATION:
It is the setting up of hardware or software for it to carry out its normal function. In the aspect of
surveillance cameras, it is the positioning of the cameras and the connection of those cameras to a network
for proper monitoring. It also includes the installation of the software that came with those cameras so as to
enable proper configuration.
CONFIGURATION:
Configuration is the manner in which components are arranged to make up a system. Configuration consists
of both hardware and software components. Sometimes, people specifically point to hardware arrangement
as hardware configuration and to software components as software configuration. Understanding of
computer configuration is important as for certain hardware or software applications, a minimum
configuration is required.
SURVEILLANCE:
Surveillance is the monitoring of behavior, activities, or information for the purpose of information
gathering, influencing, managing or directing. This can include observation from a distance by means of
electronic equipment, such as closed-circuit television (CCTV),or interception of electronically transmitted
information, such as Internet traffic. It can also include simple technical methods such as human intelligence
gathering and postal interception(Graywalls, 2020).
SECURITY
Security is freedom from or resilience against potential harm (or other unwanted coercive change) caused by
others. Beneficiaries (technically referents) of security may be of persons and social groups, objects and
institutions, ecosystems or any other entity or phenomenon vulnerable to unwanted change. Security, in
information technology (IT), is the defense of digital information and IT assets against internal and external,
malicious and accidental threats. This defense includes detection, prevention and response to threats through
the use of security policies, software tools and IT services. Security is critical for enterprises and
organizations of all sizes and in all industries. Security can be physical or informational(Matthieu Petrigh,
2020).
Wired security cameras use cables to transmit footage and conduct video surveillance, but the signal can
weaken when the transmission range exceeds 300 meters. Using the appropriate networking cables,
switches, and signal boosters can help overcome this problem. Several cameras can be interconnected to a
single monitor located in a security room.
Analog cameras have been around for years and are still the most common type of CCTV camera installed
today. They have basic functionality and store video onsite.
IP (Internet protocol) cameras carry out the same functions as their analog counterparts, but with vastly
greater capabilities. IP cameras boast sharper, higher resolution images and more flexible features like
remote zoom and repositioning. They also give you the option to view footage on a web browser. This
makes it possible to receive notifications regarding anything peculiar your cameras record such as
movement inside your business at 3:00 am and view it live from anywhere via a computer or smartphone.
The major drawback of IP cameras is their higher price tag(SSI, 2019).
What Is Surveillance
IP-Surveillance is a term for a security system that gives users the ability to monitor and record video and/or
audio over an IP (Internet Protocol-based) computer network such as a local area network (LAN) or the
Internet. In a simple IP-Surveillance system, this involves the use of a network camera (or an analog camera
with a video encoder/video server), a network switch, a PC for viewing, managing and storing video, and
video management software(PSA,2006.).
While an analog video system is for the most part a one-directional signal carrier that ends at the recording
device, a network video system is bi-directional (allowing information to be sent and received) and can be
an integrated part of a larger, scalable system. A network camera, for instance, can send video, audio and
other data (e.g., SMS) to a user, as well as receive from the user audio and data instructions that could, for
example, activate doors or external alarms. In addition, a network video system can communicate with
several applications in parallel and perform various tasks such as detecting motion or sending different
streams of video. Such a system provides for greater performance possibilities and flexibility(PSA,2006).
2. DOME CAMERA
These Cameras are named after their shape and are they typically used for indoor security systems. The
dome shape of these cameras permits them not to be easily noticed because it is hard to tell the direction the
cameras are facing, however being still on the eyes. They are widely used in retail spaces. Some of these
cameras are designed with infrared illuminators which enables them to capture videos at low light
conditions.
Figure 3:Dome camera(LUO, 2018)
PURPOSE
Video surveillance in retail stores and offices
2) BULLET CAMERA
Cameras with a long and tapered cylindered like design that resembles an oversized ammo cartridge. Mostly
used outdoors, especially in areas where long viewing is necessary. However, they can be used indoors
where the long viewing is required like backyards and parking lots. They are installed inside protective
casings and are typically weatherproof. Most bullet cameras come with a fixed length that allows the angle
of view of up to 80degrees. This camera is usually fitted with a fixed focal lens.
PURPOSE
Long-distance surveillance up to 40Ft
Outdoors weatherproof surveillance
PURPOSE
For 24/7 surveillance
Often in low light conditions
PURPOSE
Expensive PTZ cameras are to achieve responsiveness
PURPOSE
At highly niche places HD CCTV cameras work well example casinos and banks
Casino manager often check if a player is counting cards or not through these cameras.
7) INFRARED /NIGHT VISION CCTV CAMERAS
When we need to see what’s happening the dark then a night –vision CCTV camera can help us. It is able to
see when lighting is poor or absolute darkness. The technology behind this is infrared LEDS.
A sample checklist containing some of the factors to consider during a site survey is provided in
the table below. This checklist can be used by the design team to record the number and type of
cameras, monitors, and housings as well as address connectivity requirements.
Table 2: Factors to consider during a site survey(Naval warfare,2013)
COMPONENTS OF CCTV SYSTEMS
CCTV uses components that are directly connected to generate, transmit, display, and store video
data. A CCTV system can be as simple as a camera purchased from a retail electronics store
connected to a video monitor. However, larger systems operated by professional security
personnel are comprised of a number of components falling into several basic categories:
• Cameras;
• Lenses;
• Housings and mounts;
• Monitors;
• Switchers and multiplexers; and
• Video recorders.
Many features exist within each of these categories that can satisfy an agency’s operational
requirements in the most challenging environments. The most complex CCTV systems may
incorporate hundreds of cameras and sensors integrated into one overall security network.
The figure below provides a CCTV component diagram example.
Figure 11 : CCTV Component Diagram(Naval warfare,2013).
Most new CCTV systems maximize the advantages of digital technologies by utilizing electronic
databases, compact components, and wireless transmission techniques. With larger quantities of
data being collected, it is essential that the system be capable of retaining data in accordance
with the organization’s policies and procedures.
Cameras
Cameras are an essential component of any CCTV system. Matching the right CCTV camera to
a particular application is increasingly complex due to rapid technological developments and a
greater range of applications. A system’s performance is affected by many factors beyond those
listed in the vendor data sheets. Effective camera selection requires detailed knowledge of the
camera, application, supporting architecture, and host environment.
All CCTV cameras include three basic elements:
• Lens–Gathers light reflected from a subject and focuses the light on the image sensor;
Image processing circuitry: Organizes, optimizes, and transmits video signals.
The type of camera best suited for a CCTV system depends on the operational environment and
how it will integrate into the system. The answers to the following questions may help
determine the best camera type:
There are many types of cameras designed to perform under specific environmental conditions
but cameras can be grouped into two primary categories: fixed and pan-tilt-zoom (PTZ). Fixed
cameras are intended to constantly view a single scene, while PTZ cameras are motor driven and
can pan left or right, tilt up or down, and zoom in or out to instantly customize the view as
needed. A combination of fixed and PTZ cameras are often used to provide the required
surveillance coverage.
The information to be gathered from an organization based on their security and monitoring can be gotten
through interviews, questionnaire, observation and brainstorming.
The installation of a surveillance camera is very important because the cost is cheaper as compared to the
cost of hiring a guardian and also for the fact that images can be watched at a distance.
This chapter emphasis on the various stages, and phases that, will give accurate description, explanation and
prediction to complete this chapter. This chapter consists of research design, sampling, data collection and
techniques, data analyzing instrument, validation and method of data presentation.
RESEARCH DESIGN
According to MEGENDA (1999), research design is the outline plan or scheme that is used to generate
answers to the research problem. It is basically the structure and plan investigation. The study used a
descriptive survey design. Descriptive research is used to obtain information concerning the current status of
the phenomena to describe ‘’ what exist’’ with respect to variables or conditions in a situation. The design
involves in depth study of budgetary control and it effect on financial performance.
SITE OF STUDY
This refers to where the researcher did his/her internship or carried out the study. The study was done at
ETOUG-EBE BAPTIST HOSPITAL AT THE BIYEM ASI NIEGBORHOOD YAOUNDE IN THE
CENTER REGION
POPULATION STUDY
This refers to that population to which a researcher wants to generalize the result of the study. The
population of the study consists of 22 staff of EBHY
TARGETED POPULATION
The targeted population here was the expected population the population that the researcher was to interview
or give questionnaires to. The targeted population here was 04 staff.
ACCESSIBLE POPULATION
The accessible population here is the population that the researcher was able to administer questionnaires to
and the population the researcher was able to interview.
SAMPLE SIZE
The sample size that was used to carry out this research was 4(made up of the founders, the secretary, and
the manager) workers were selected to represent the population.
SAMPLE TECHNIQUES
The stratified random sampling method was used in this study to select our workers. The researcher
decided to use this method because it is simple to administer and gives the respondent independent chance to
answer the questions.
SOURCES OF DATA COLLECTION
This talk of the different sources used for the collection of data. There are two main source of data
collection that is primary and secondary source. For this project the primary and secondary source were
used for the collection of data to come out with useful effect of video surveillance on security challenges in
an organization
PRIMARY SOURCES
This describes the means through which first –hand information is being collected. These sources include
questionnaire, interview and observation
QUESTIONNAIRE
This is a form consisting of inter-related questions prepared by the researcher about the research
problem under investigation, based on the objectives of the study. Considering the study, a questionnaire
was been carried out by the researcher on the effect of video surveillance on security challenges in an
organization. It is a very advantageous method of data collection as it is less consuming and the respondent
have the same question and answer options. It is also easy to administer.
OBSERVATION
This is equally the source of primary data which consist of two techniques which are mechanical and
personal observation. It is important source taken into consideration the fact that the researcher spent time in
EBHY before writing this piece of work.
INTERVIEW
Here the researcher prepares the series of questions which is disclosed through the use of questionnaire and
carries it to the respondents, to respond following their perception and experience in relation to the questions
posed. The researcher administered a face to face conversation with some staffs and customers. The
researcher subject matter of discussion was on the effect of video surveillance on security challenges in an
organization
SECONDARY SOURCE
The secondary source involves getting information from dictionary, document
(organizational handbooks), internet, text books or class notes.
CLASS NOTE
Information were gotten from class note which greatly help the researcher on her findings and research.
INTERNET
More of the researcher’s information were gotten from the internet in order to realize this project.
DATA ANALYSIS
The data collected through questionnaires were tabulated and analyzed and result tabulated and analyzed
using descriptive statistics. The data collected was the relation of one dependent variable to multiple
independent variables
CHAPTER FOUR
DATA PRESENTATION, ANALYSIS AND INTERPRETATION OF
FINDINGS
Here in this chapter we will talk on the presentation of the research using questionnaires and it will be
presented using tables and pie charts.
sex of workers
Table 1 show that the gender of the institution are un equally distributed that is the number of female not
equal to the number of male meaning that there are 12 male and 8 female giving us 60% of male as oppose
to 40% female in the organization
TABLE 2: AGE
Age
age of workers
From the table 2 above it shows that there are 13 employees with the age ranging from 21-28 years and there
are also 7 employees with age ranging from 28-35 years. That is 65 range from 21-28 and 35 range from 28-
35 there making a total of 100%
TABLE3: MARITAL STATUS
marital status
SECTION B: CAMERA
Here we will talk of question concerning camera and the respondents given by the employees.
TABLE 5:
Figure: 6 the reason for video surveillance is to reduce theft and insecurity in an
organization
From the above analysis it shows that 65% strongly agree that surveillance cameras help to reduce if not
completely deter steeling and bulkling of organization while 10% strongly disagree on the deterrence nature
of cameras in an organization
From the above analysis it shows that using SPSS 50% agree that explanation of how the budget support the
company’s mission, vision, goal and objectives and 50% strongly agree. This therefore implies that the
institution or company clearly state it mission, vision, goal and objectives to it employees
TABLE 11: expert are in charge of monitoring cameras to avoid footage been corrupt
the organization select expert to monitor the camera to avoid it been corrupt
Using SPSS it shows that 50% agree and 30% strongly agree that expert are inchage of monitoring and
interpreting the fottages from the cameras and only 5% disagree with that fact .
TABLE 12: computers in chage of monitoring are constanly connected to the network of the
organisation
The analysis above shows that 35% agree and 65% strongly agree that computers that are used for
monitoring is 100% connected to the network. This implies that the network of cameras are been monitor via
the computer 24/7 if need be
The analysis above shows that 45% strongly agree and 45% agree making the total of 90% that have accept
the fact that video footages require expert to analyze a scenario that occure in an organization as oppose by
just total of 10% of that.
TABLE 17: the best storage device for surveillance cameras is cloude
The analysis above shows that 45% strongly agree and 40% agree making a total of 85% of respondan
accepting that clouds is the best stoge device for video surveillance as oppose by just 20% of of the
respondent so there for we can conclude that clude is the best storage divice.
From the above analysis it shows that 10% strongly disagree and 45% disagree making a total of 55% as
oppose by 45% who thin storing data is complex and expensive. And from the above analysis we can say it
is easy and non complex to stored data .
the data stored can be corrupted if access is allow to everyone in the organization
data storage required a lot of space and is costly for the organization
From the above analysis it shows that 65% agree and 25% strongly agree making the total of 90% that
have accept that security cameras can act as a deterrence against theft and bulkers or terrorist activity in an
organization as oppose by just 10% giving access to everybody in an organization can lead to data been
corrupt and therefore no safety can be guarantee as oppose by just 40% of the respondent the for we can
conclude here that data need safety and as such need fewer hands
TABLE 25: security cameras as a preventive tool for attack or terror act in an organization
Figure 25: security cameras as a preventive tool for attack or terror act in an organization
From the table and the pie chat above analysis shows that 40% agree and 60% strongly agree that
security cameras can act as a preventive tool against theft and bulkers or terrorist activity in an organization
PRESENTATION OF INFERENTIAL STATISTICS
Chi-Square Tests
the value of the test statistic is 1.176 and the corresponding p – value of
the test statistic is p = 0.759
Decision rule
Following the hypothesis testing decision rule, with p value of 0.029 which is less than 0.05, we do reject
the null hypothesis meaning we accept the alternative hypothesis meaning there is a relationship between the
independence variable and the dependence variable. Therefore to conclude that an increase or decrease in
one will to lead to an increase or a decrease to another
Hypothesis two :( H2) There is a statistical relationship between monitoring of many surveillance camera at
the same time and tracking of unwanted action and behavior in an organization
TABLE 27
Chi-Square Tests
Decision rule
Following the hypothesis testing decision rule, with p value of 0.033 less than 0.05 indicate that there is a
strong relationship between the two variables the independent variable and the dependent variable and the
fact that the p value is lesser than our chosen significant value of 0.05 ,then we reject the null hypotheses in
favour of the alternate hypotheses wish is an indicator of a strong relationship Therefore to conclude that an
increase or decrease in one will lead to an increase or a decrease to another
HYPOTHESIS THREE (H3): There is a statistical relationship between access to stored data and an attact
or a terror act in an organization
TABLE 28:
Chi-Square Tests
from the table above we can see that the value of alpha is greater than the value of the test satistics ie the
value if p (0.542) and a relevant conclution can be made
Decision rule
Following the hypothesis testing decision rule, with p value of 0.542 greater than 0.05 indicate that that
there is a relationship between the two variables
Result from the tables above show that we will fail to reject the null hypotheses there by not accepting
the alternate hypotheses in this case the relationship is moderate .the hypotheses is were tested using the chi
squer to understand the relationship between access to stored data and a security challenge such as a terror
attack ,steeling and worker behavior at work
CHAPTER FIVE
DISCUSSION, RECOMMENDATIONS AND CONCLUSIONS
Here we will talk on the discussion, conclusion and recommendation based on the data analyzed in chapter
four
Discussions
This chapter is divided into three main sections, discussion, conclusion and recommendation
This piece of work entitle the effect of video surveillance cameras on security challenges in an organization
. In the opening chapter of this work , the following were presented: the background of the study , the
problem statement, objectives, research questions, scope and significant of the study, the next chapter that is
chapter two talk about all literature review, theories review, conceptual review and review of objectives. In
chapter three, the study present the research design, population of the study, sample size and sample method,
method of data collection and method of data analysis. From the demographic question from table 1 to 5, it
is discovered that workers were both female and male with majority being female. Form the respondents
there are married and single workers with majority being married. We can also observed that the secretary,
the ADMINISTRATOR of EBHY of the HOSPITAL are directly concern with this topic
From the results in chapter 4 of this work, discussions, conclusion and recommendations are made in order
to reinforce as well as develop and adopt new strategies that will help EBHY (Etoug Ebe Baptist Hospital)
improve on their security measures and monitoring and surveillance technique.
3. DISCUSSION
The result gotten from chapter four shows that the effect of video surveillance cameras minimize security
challenges At EBHY, which is one of the institutions of the Cameroon Baptist Convention Health services
was already having an IP CCTV put in place which was not a PoE, remote access, and motion detection was
not configured, and other institutions of this Cameroon Baptist Convention Health services was having
analogue CCTV cameras installed which was due to lack of a good network that this analogue camera was
installed. With these systems in place there were a lot of limitation to security which needed some
amelioration. This study enabled EBHY to envisage the amelioration of surveillance cameras in the
institution and the organization at large.
RECOMMENDATION
To keep your system or organization secured you will need to consider certain things. The following
document will enable enhance a good security and monitoring service in your institution it will equally
include the maintenance of the device which will enable the user get the best of security and monitoring
system.
One of the most important requirements or necessities in the aspect of electronic devices or security
monitoring devices is the aspect of maintenance. Carrying out preventive, curative and proactive
maintenance presents a lot of advantages over the care of the device and places ideas to the uses of the
device on how to effectively handle faults and equally prevent faults from taking place in the device. Like
educating the users on the disadvantage of dust to the device and the positioning of the device also what
device can be placed where and at what time. Telling the users at what time the camera best functions does it
have night vision ability? Such question enables users to know how the device better functions.
CONCLUSSION
At the end of our finding which focused on the effect of video surveillance cameras , the aspect of security
challenges in organizations and why it should be considered. It has become a point of interest in this century
and a lot of enterprises and organizations are considering the implementation of it. With the implementation
of this research work security methods will be enhanced and ameliorated in different enterprises and
organizations. And accurate results with respect to reports of crimes will be gotten equally and better means
of an all-round supervision method and system So on the basis of finding of this study as presented,
analyzed and interpret in chapter four, the conclusion is that there is an effect of video surveillance cameras
on security challenges in an organization.
Appendix
Tick on the space provided below the suitable answer which suit the statement provided below where by SD:
strongly disagree D: disagree A : agree SA: strongly agree
ITEM SD D A SA
5 Do you think it is easy to use surveillance camera
6 The reason for considering the addition of video surveillance is to
reduce theft in the company
7 Anyone can have to the video footage
8 Anyone can be engage in designing and installing camera systems
9 A professional is responsible for the ongoing maintenance of video
system in the organization
10 Cameras are installed in a way that it cannot be recognized or
noticed by anyone
13 The organization select a particular group of staff to monitor the camera so that nobody corrupt
it
14 Computers responsible to monitor all cameras in the organization are constantly connected
SECTION D: VIDEO RECORDER
15 The video recorder use by the organization is very costly to the organization