You are on page 1of 55

1.

LIST OF ABBREVATIONS
API: Application Programming Interface

CBC: Cameroon Baptist Convention

CCTV: Closed-Circuit Television

CD: Compact Disk

DHCP: Dynamic Host Configuration Protocol

DVR: Digital Video Recorder

EBHY: Etoug Ebe Baptist Hospital Yaounde

FRU: Field Replaceable Unit

HD: High Definition

HTTP: Hypertext Transfer Protocol

HTTPS: Hypertext Transfer Protocol Secure

IEEE: Institute of Electrical and Electronic Engineers

IP: Internet Protocol

IPCAM: Internet Protocol Camera

IT: Information Technology

JVSG: joint Video Surveillance Group

LAN: Local Area Network

LCD: Liquid Crystal Display

LED: Light Emitting Diode

MAC: Media Access Control


NVR: Network Video Recorder

OS: Operating system

PC: Personal Computer

PoE: Power Over Ethernet

PSE: Power Sourcing Equipment

RAT: Routine Activity Theory

SNMP: Simple Network Management Protocol

SSID: Service Set Identifier

TCP/IP: Transmission Control Protocol/Internet Protocol

UPS: Uninterruptible Power Supply

VCR: Video cassette Recorder

WIFI: Wireless Fidelity

WPA: Wi-Fi Protected Access


CHAPTER ONE

INTRODUCTION
Video surveillance is often considered one of the first applications of pervasive computing . Its usage has
significantly increased over the last three decades, firstly due to continuously decreasing hardware costs
including camera, storage and networking and secondly due to the increased sense of insecurity caused by
incidents like 9/11 and the Madrid and London bombings. Traditional video surveillance systems are either
simple recording systems or are monitored by human observers without automated technological assistance.
This makes them very expensive in terms of installation and operation. They are mainly used as deterrents
and the recordings help investigation once an incident has occurred. Compared to these traditional solutions,
modern digital are less expensive while offering much better quality. Modern systems make use of
advanced techniques such as object detection notification, -tracking and event-detection, and exploiting
algorithms

THEORETICAL BACKGROUND

1.The theoretical framework of camera surveillance, physical security, deterance at the population
level,controle room operation,strategic intelligence sharing with partner,police involvement and business
continuity related literature including ISO standards and professional handbooks. Methods of the level of
security assessment,, and business impact analysis. These methods provided results, which enabled the
formation of a camera surveillance strategy. This strategy is written as a camera surveillance plan, The final
product will deliver an efficient camera surveillance strategy that the case company can utilize as such. The
product also demonstrates key risks that might affect the camera surveillance system itself making the whole
system more resilient. When the camera surveillance plan is used, the case company can ensure the level of
surveillance quality, resilience, and efficiency of the monitoring conducted with building cameras.

THE CONCEPTUAL BACKGROUND


Let us go step by step and see how you can deal with security challenges. We will be talking primarily about
video surveillance, but many of the same principles apply to monitoring, as well. And as always, before you
start messing around with these security challenges, especially anything involving the organization

A CCTV camera system makes use of video cameras, also called surveillance cameras to keep
track of the interior and exterior of a property, transmit the signal to a monitor or set of monitors,
and give real-time 24/7 viewing access.

With all these benefits, a surveillance system has become a must in a society where there is an
increase in the crime rate. So when you decide which security system is best for your unique
necessities,

1. Camera If you’re building a CCTV Camera System, you have two camera options: Internet
Protocol (IP) or analog. IP is usually the preferred choice due to its compatibility with most
devices. Many different types of cameras can be installed, for example -dome cameras, bullet
cameras, covert cameras.
Depending on how many angles you want to cover, how many cameras you will need in that
specific area, how much resolution or detailing you require when you choose your preferred
cameras

2. Monitoring Station

A monitor arguably facilitates the most important function of a security camera: viewing recorded
images and footage. Deciding how many monitors you’ll need is dependent upon what, and which
area you are monitoring. You wouldn't need more than three to five screens if you aren't operating
in a large-scale facility. Although if your requirements change, you can easily add or remove
monitors anytime to match the compatibility of your camera.

3 Cables & Routers

Depending on the type of surveillance system, and cameras you choose, you will need supporting
technologies like cables, and routers to be integrated into your system for a seamless connection.
For example, wireless systems require a router, while wired versions do not.

Therefore, choose the cables, and wires after selecting your cameras, and monitors according to
your unique needs.

4. Video Recorders

The video recorder is the device where video recorded on the camera gets processed for storage &
viewing. There are two types of video recorders: DVR (Digital Video Recorders) and NVR (Network
Video Recorders).

5. Data Storage

Your CCTV security system is only as good as the hard disk backing it. The storage device for a
security camera system should be able to record, store and re-play videos non-stop from multiple
feeds. Regular hard drives that are used in PCs and Laptops are ill equipped to handle CCTV
storage needs. Hence, it is critical to choose a robust storage system for safe data storage

6 In our working definition, security threats and challenges are actions or events that put at risk the material
or identity basis upon which individuals, societies, states and perhaps even the planet have come to expect
or rely(TFE, 2018)

THE HISTORICAL BACKGROUND


Here, we are going to see the historical background of the place of internship and that of video surveillance
monitoring and security challenges
HISTORICAL BACKDROP
Historical Background The Internship Place
The CBC (Cameroon Baptist Convention) had no land in Yaoundé until 1980; Mr Akenji Gregory
purchased one, 4.796 square meters word 14.2 million. This piece of land was a swamp with very few
inhabitants. The need for medical work was very eminent and the Health board decided in December 1983,
to create a Health Center on the land. The minister of Health approved the Health centre on June 18 1984,
and by September 1985 as the construction was completed, the doors of the health Centre were opened to
the public with the following pioneer staff Sr. Trudy Schatz (Chief of Centre), Daounda Nfor, John Ngum,
etc. The Health Centre started with general consultation, laboratory, treatment room, and a pharmacy. For all
these years the Health Centre has been improved upon and now offers so many services to the general
public.
The CBC Etoug-Ebe Baptist health Centre Yaoundé seeks to assist in the provision of care to all, who need
it as an expression of Christian Love and as a means of witness, so that those who need it, might be brought
to God, through Jesus Christ. They offer the following services Dental services, Laboratory, Eyes Services,
physiotherapy, Ultrasound, Treatment Center, Observation Ward, Information Technology (IT), Technical
Services, Pharmacy, Consultation, Women’s Health Program, Ear Nose and Throat, and Security
Department, with over 300 staff and support staff and an average client attendance of 200 000 clients as of
the time of this study.
EBAY Information Technology department is structured with the implementation, management and control
of information security, wired LAN, wireless LAN, access control to the network, the connection of devices
and internet access. It’s free for individuals to come and do their internships and research, offering training
on basic structural and organizational, network management, computer, intercom and network internet
access troubleshooting.
HISTORICAL BACKGROUND ON SURVEILLANCE CAMERA
A future in which people are constantly monitored was featured in George Orwell’s 1939 dystopian fiction
1984. And although he may have been off on the date, he was definitely onto something with regards to
security cameras. Most of us don’t think anything of video surveillance these days; they’re at the bank, on
street corners, and even in schools, but cameras weren’t always so ubiquitous. Here is a brief review of the
history and evolution of video surveillance The first video surveillance system was installed in 1942 in Nazi-
occupied Germany to observe the launch of long-range guided ballistic missiles. Shortly thereafter, CCTV
systems became available in the US as well, to both government entities and commercial users who wished
to keep an eye on their business(“From Edison to Internet,” 2020)

THE PROBLEM STATEMENT


Video surveillance shows every sign of growing more and more prevalent in the world, with a report by
Technavio predicting an 11% growth in the global video surveillance market between 2019 and 2021. Users
of video surveillance can experience everything from greater on-site security to increased workplace
productivity. But the more businesses, schools, and other organizations relly on these critical technologies
to protect themselves and the people they serve, the more challenges they may encounter in implementing
and maintaining their systems. .Here are some of the challenges face by this institution are
Data storage challenges

OBJECTIVE OF THE STUDY


The objective of the study is divided into two parts namely:
 The general objective which is the main objective and
 The specific objectives.

General objective
The general objective is to find out how intelligent video surveillance system monitoring and the security
challenges in an organization.

Specific objective
 To analyse the effect of camera on security challenges
 To evaluate the effect of monitoring on security challenges
 To examine which type of cable and routers will be suitable for the cameras on security challenges
 To determine which type of video recorder will be suitable on security challenges
 To evaluate which type of component will be use for data storage on security challenges

General research question


 How Does video surveillance system, and monitoring cope security challenges in an organization?

Specific research question


Here we will develop our specific research question base on our specific objective
 What effect does camera have on security challenges?
 What effect does monitoring have on security challenges?
 What effect does cables and routers have on security challenge ?
 How does video recorder affect security challenges?
 How does data storage affect security challenges?

HYPOTHESIS OF THE STUDY


The hypotheses just like the research questions are realized from the objectives. The hypotheses answer the
research questions. We shall also be looking at the specific hypotheses.
General hypothesis
The effect of video surveillance systems on security challenges in an organization

Specific hypotheses
 H1: There is a statistical relationship between cameras and security challenges

 H0: There is no statistical relationship between camera and security challenges

 H2: there is a statistical relationship between monitoring and security challenges

 H0 : there is no statistical relationship between monitoring and security challenges

 H3: there is a statistical relationship between data storage and security challenges

 H0: there is no statistical relationship between data storage and security challenges

 H4: there is a statistical relationship between data storage and security challenges

 H0: there is no statistical relationship between data storage and security challenges

SIGNIFICANCE OF THE STUDY

Research on the topic the effect of video surveillance system and security challenges have a major
significance to the community, and business organisations such as schools and hospitals .
Video surveillance involves the act of observing a scene or scenes and looking for specific behaviours
that are improper or that may indicate the emergence or existence of improper behaviour.
Common uses of video surveillance include observing the public at the entry to sports events, public
transportation (train platforms, airports, etc.), and business organisation around the perimeter of
secure facilities, especially those that are directly bounded by community spaces.
The video surveillance process includes the identification of areas of concern and the identification of
specific cameras or groups of cameras that may be able to view those areas. If it is possible to identify
schedules when security trends have occurred or may be likely to occur, that is also helpful to the
process. Then, by viewing the selected images at appropriate times, it is possible to determine if the
improper activity is occurring.
One such application is for business organisations. Following a series of reports of intimidating
behaviour at a particular time in different businesses, the use of video cameras and intercoms was
found to reduce the potential for such events as the perpetrators began to understand that their
behaviour could be recorded and used to identify them to police. Furthermore, the act of stealing and
bugling has deterred the police who use these images to track and apprehend the criminals. Word got
around and the behaviour was reduced dramatically. (TFE, 2018)
JUSTIFICATION OF THE STUDY.
To justify this study, the researcher will start by saying that from the significance of the study seen above the
effect of video surveillance cameras which help to keep checks on security challenges in an organization and
even in a small community for observation, organizations that fail to use intelligence video surveillance and
monitoring system are likely to be more vulnerable to security challenges Also what prompts the
researcher to work on this topic was the number of time theft bugle into the ETUOG-EBE BAPTIST
HOSPITAL within the period of internship bulk of images was to be analyzed with complex nature of
analogue images from analogue cameras it was difficult to track the cuprite hence giving security challenges
in this institution

SCOPE OF THE STUDY.


In the scope of the study, we shall be looking at how long the researcher took to put this piece of work
together. We will also discuss the thematic scope which is on the sphere of study. Lastly, we shall be
looking at the geographical scope which will be telling us the area in terms of location where the study was
carried out.

TIME SCOPE

This study is aim at providing a realisable project that can help in reducing security challenges in most
organisations by using the right tools of video surveillance cameras that have about 85% of tracking action
and record desirable behaviour in the environment and can then be analysed by security expert this product
of research carried out in ETUOG-EBE BAPTIST HOSPITAL. took the researcher THREE months which
started from the 15 FEBRUARY TO THE 15 OF June 20222. This time was too small to carry out a
scientific work of this nature. So, all criticisms to strengthen the research are highly welcome. Also what
prompts the researcher to work on this topic was the number of bugling by theft in this short period of
internship giving a clow on what other organisations are going through as far as security is concerned within
the organisation and without so video surveillance and monitoring will help bridge this gap as far as
security challenges are concern.

GEOGRAPHICal SCOPE

The internship place is located at ETUOG-EBE IN THE BIYEM ASI NEIGHBOURHOOD in the political
capital YAOUNDE in the CENTRE REGION OF THE REPUBLIC OF CAMEROON.
CHAPTER TWO

LITERATURE REVIEW
Literature review talks about what other people have written in relation to the topic in question, This chapter
also includes the following; review by theories, review by concepts, review by context, review by objectives
and presentation of internship activities..

 2.1 THEORITICAL REVIEW


This part of the study reviews the theories earlier mentioned in chapter one. The theories of this study
include;

The detection theory: Camera tamper detection is the ability to detect faults and
operational failures in video surveillance cameras by analyzing the video. In this
research, a signal detection theory approach is proposed to quantitatively analyze the
information being captured by the camera and to detect tampers. Signal activity is used
as a feature to measure the amount of information in the image. The distribution of
features representing the normal operation of a camera is modeled as a Gaussian
mixture model (GMM). To reduce the effects of noise, a Kalman filter is used to model
changes in signal activity in the video.
Routine Activity Theory (RAT): RAT argues that when a crime occurs, three things happen at the same
time and in the same space:

A suitable target is available: There are three major categories of target. A target can either be: a person,
an object, or a place.

There is the lack of a suitable guardian to prevent the crime from happening: The second condition is
that a capable guardian whose presence would discourage a crime from taking place must be absent.

A capable guardian is anything, either a person or thing that discourages crime from taking place. These can
be formal or informal.

Some examples of capable guardians: Alarm Systems, Barriers, Close Circuit Television (CCTV) Systems,
Fences, Locks, Neighbors, Police Patrols, Security Guards and many more.

Likely Offenders: When a suitable target is unprotected by a capable guardian there is a chance that a crime
will take place. The final element in this picture is that a likely offender has to be present.

RAT looks at crime from an offender's point of view. A crime will only be committed if a likely offender
thinks that a target is suitable and a capable guardian is absent. It is their assessment of a situation that
determines whether a crime will take place.

CCTV as a crime prevention method

Closed Circuit Television (CCTV) plays a vital role in protecting the public and assisting the law enforcement agencies
in the investigation of crime and apprehending of offenders. It is estimated that there are about five million CCTV
cameras in use today, and this number is likely to increase significantly in the future (Gill, 2006). Even though the
exact number of CCTV systems is unclear, "the extent of CCTV coverage and the government's funding of new
systems have increased dramatically over the last decade," (Armitage, 2002) yet there is little substantive research
evidence to show that CCTV works (Armitage, 2002). The research presented examines the social and technical
problems affecting CCTV performance, provides a framework for understanding the cause of problems, and guidance
on how to overcome them in practice. A CCTV security system is typically configured to record CCTV video footage of
people (targets) and their activities. In Britain today, it is impossible to avoid the vast amount of surveillance that
covers the country. Over the last 20 years, the dramatic increase in Closed Circuit Television cameras (CCTV) and
other forms of surveillance has meant that getting caught on camera is part of everyday life. There are also debates
discussing the different aims of CCTV and the impacts and effectiveness CCTV has on society. Therefore, there have
also been many theories and literature on surveillance introduced in the last decade in criminology; much of which
looks at CCTV as a crime prevention measure. Before looking at the most recent theories on surveillance, it is useful
to look at some traditional theorists and how their work relates to surveillance. Both Marx and Weber's theories give
reasons why they believe surveillance exists in the social world. “Karl Marx focuses special attention on surveillance
as an aspect of the struggle between labour and capital. Overseeing and monitoring workers is viewed here as a
means of maintaining managerial control on behalf of capital” (Lyon, 1994:7).This shows Marx's view that in a
capitalist society, workers in factories, for example, were watched for the factory owners toremain in control and
continue to make money."Max Weber, on the other hand, concentrates on the ways that all modern organizations
develop means of storing and retrieving data in the form of files as part of the quest of efficient practice within a
bureaucracy. Such files frequently contain personal information so that organizations, especially government
administrators can 'keep tabs' on populations" (Lyon, 1994:7). These past theories and conceptions are relevant as
they give us some history and background information. From this arguments it shows that these arguments that
surveillance has always existed as social control. We can also see how theories expand and develop as surveillance
does. I can now move on to look at how surveillance and CCTV is perceived in contemporary society and how it has
affected it. CCTV has dramatically risen in Britain and therefore has different areas of research surrounding this. For
example, fear of crime, public safety and crime prevention. Their main aim of the increase of CCTV in the UK was to
reduce crime and use it as an effective crime prevention method. Therefore in 1995: “the government announced
the establishment of a special fund, known as the ‘CCTV Challenge Competition’, to encourage local authorities to set
up and part fund surveillance schemes” and “in the three years to the end of 1997 the Home Office and local
authorities collectively invested £120 million in CCTV systems” (Guardian9.1.1998 cited in Crawford, 1998: 41). These
CCTV systems were put in place as a way of detecting and deterring crime, monitoring scenes and to cause self-
discipline. They also suggest that CCTV "may prevent crime because potential offenders are deterred by their
increased subjective probability of being detected" (Welsh &Farrington, 2009: 36). This is sometimes referred to as
situational crime prevention and shows
that the presence of CCTV could cause potential offenders not to commit a crime as the risk outweighs the benefits.
Therefore, CCTV reduces offenders' opportunities to commit crimes. It also links to the idea that CCTV is used to
produce self-discipline in victims and offenders. For potential victims CCTV is a “reminder of the ‘risk’ of crime,
therefore altering their behavior accordingly” (Armitage, 2002: 1) and controlling

 CONCEPTUAL REVIEW

Under the review by concept, we are to explain in detail, all the concepts used in this research: looking at the
meaning of installation and configuration of surveillance cameras. In this case we will define what is mean
by installation and configuration of surveillance camera and equally security and monitoring, how it can
improve the performance and safety of an organization.

1. Camera

If you’re building a CCTV Camera System, you have two camera options: Internet Protocol (IP) or
analog. IP is usually the preferred choice due to its compatibility with most devices. Many different
types of cameras can be installed, for example -dome cameras, bullet cameras, covert cameras.
Depending on how many angles you want to cover, how many cameras you will need in that
specific area, how much resolution or detailing you require when you choose your preferred
cameras

2. Monitoring Station

A monitor arguably facilitates the most important function of a security camera: viewing recorded
images and footage. Deciding how many monitors you’ll need is dependent upon what, and which
area you are monitoring. You wouldn't need more than three to five screens if you aren't operating
in a large-scale facility. Although if your requirements change, you can easily add or remove
monitors anytime to match the compatibility of your camera.

3 Cables & Routers

Depending on the type of surveillance system, and cameras you choose, you will need supporting
technologies like cables, and routers to be integrated into your system for a seamless connection.
For example, wireless systems require a router, while wired versions do not.

Therefore, choose the cables and wires after selecting your cameras, and monitors according to
your unique needs.

4. Video Recorders

The video recorder is the device where video recorded on the camera gets processed for storage &
viewing. There are two types of video recorders: DVR (Digital Video Recorders) and NVR (Network
Video Recorders).

5. Data Storage

Your CCTV security system is only as good as the hard disk backing it. The storage device for a
security camera system should be able to record, store and re-play videos non-stop from multiple
feeds. Regular hard drives that are used in PCs and Laptops are ill equipped to handle CCTV
storage needs. Hence, it is critical to choose a robust storage system for safe data storage

INSTALLATION:

It is the setting up of hardware or software for it to carry out its normal function. In the aspect of
surveillance cameras, it is the positioning of the cameras and the connection of those cameras to a network
for proper monitoring. It also includes the installation of the software that came with those cameras so as to
enable proper configuration.

CONFIGURATION:

Configuration is the manner in which components are arranged to make up a system. Configuration consists
of both hardware and software components. Sometimes, people specifically point to hardware arrangement
as hardware configuration and to software components as software configuration. Understanding of
computer configuration is important as for certain hardware or software applications, a minimum
configuration is required.

SURVEILLANCE:

Surveillance is the monitoring of behavior, activities, or information for the purpose of information
gathering, influencing,  managing  or directing. This can include observation from a distance by means of
electronic equipment, such as closed-circuit television (CCTV),or interception of electronically transmitted
information, such as Internet traffic. It can also include simple technical methods such as human intelligence
gathering and postal interception(Graywalls, 2020).

SECURITY
Security is freedom from or resilience against potential harm (or other unwanted coercive change) caused by
others. Beneficiaries (technically referents) of security may be of persons and social groups, objects and
institutions, ecosystems or any other entity or phenomenon vulnerable to unwanted change. Security, in
information technology (IT), is the defense of digital information and IT assets against internal and external,
malicious and accidental threats. This defense includes detection, prevention and response to threats through
the use of security policies, software tools and IT services. Security is critical for enterprises and
organizations of all sizes and in all industries. Security can be physical or informational(Matthieu Petrigh,
2020).

 2.3 CONTEXTUAL BACKGROUND


CCTV, or closed-circuit television, is a system that allows you to keep an eye on what’s going on in and
around your business. Cameras and monitors enable you to view events live, and recorders archive footage
for later reference. It doesn’t receive publicly broadcasted content, only footage from security cameras
installed on the premises.
CCTV technology has been around for decades, but improvements in recent years make it even more
effective at capturing criminals in the act and bringing them to justice. The various parts of a CCTV system
are the cameras, the monitor, the video storage device and cables and they all work together.
The purpose of security cameras is to capture footage, especially in any vulnerable or high-crime places in
and around your building. There are several basic security camera options to choose from:

Wired security cameras use cables to transmit footage and conduct video surveillance, but the signal can
weaken when the transmission range exceeds 300 meters. Using the appropriate networking cables,
switches, and signal boosters can help overcome this problem. Several cameras can be interconnected to a
single monitor located in a security room.
Analog cameras have been around for years and are still the most common type of CCTV camera installed
today. They have basic functionality and store video onsite.

IP (Internet protocol) cameras carry out the same functions as their analog counterparts, but with vastly
greater capabilities. IP cameras boast sharper, higher resolution images and more flexible features like
remote zoom and repositioning. They also give you the option to view footage on a web browser. This
makes it possible to receive notifications regarding anything peculiar your cameras record such as
movement inside your business at 3:00 am and view it live from anywhere via a computer or smartphone.
The major drawback of IP cameras is their higher price tag(SSI, 2019).

What Is Surveillance
IP-Surveillance is a term for a security system that gives users the ability to monitor and record video and/or
audio over an IP (Internet Protocol-based) computer network such as a local area network (LAN) or the
Internet. In a simple IP-Surveillance system, this involves the use of a network camera (or an analog camera
with a video encoder/video server), a network switch, a PC for viewing, managing and storing video, and
video management software(PSA,2006.).

 PRESENTATION OF THE ENTERPRISE(INTENSHIP PLACE )


 Figure 1: An IP-Surveillance or network video system(IP_Surveillance_Design_Guide.Pdf,
n.d.).
Unlike analog video systems that use dedicated point-to-point analog cabling from the camera location to
the viewing/recording station, IP-Surveillance (or network video) uses the IP network technology as the
backbone for transporting information. In an IP-Surveillance application, digitized video and/or audio
streams can be sent to any location—even around the world if desired via a wired and/or wireless IP
network, enabling video monitoring and recording from anywhere with network access.
 Figure 2: An analog video system that incorporates a DVR (digital video recorder)
(IP_Surveillance_Design_Guide.Pdf, n.d.).

While an analog video system is for the most part a one-directional signal carrier that ends at the recording
device, a network video system is bi-directional (allowing information to be sent and received) and can be
an integrated part of a larger, scalable system. A network camera, for instance, can send video, audio and
other data (e.g., SMS) to a user, as well as receive from the user audio and data instructions that could, for
example, activate doors or external alarms. In addition, a network video system can communicate with
several applications in parallel and perform various tasks such as detecting motion or sending different
streams of video. Such a system provides for greater performance possibilities and flexibility(PSA,2006).

 2.3.2 Types of Surveillance Camera


We have different types of surveillance cameras in the world today. They have different sizes different
shapes. Security is essential in every sphere of life. With the ongoing technological advancements,
individuals and their possessions can now be comprehensively protected. Commercial and residential zones
are now adopting a standardized security protocol that helps to reduce crime and monitor activities around
the clock. Surveillance is possible with different types of closed-circuit television (CCTV) cameras. We
explore some surveillance cameras that exist in the world.

Based on types and purposes we can list the following;

2. DOME CAMERA
These Cameras are named after their shape and are they typically used for indoor security systems. The
dome shape of these cameras permits them not to be easily noticed because it is hard to tell the direction the
cameras are facing, however being still on the eyes. They are widely used in retail spaces. Some of these
cameras are designed with infrared illuminators which enables them to capture videos at low light
conditions.
Figure 3:Dome camera(LUO, 2018)

PURPOSE
 Video surveillance in retail stores and offices

2) BULLET CAMERA
Cameras with a long and tapered cylindered like design that resembles an oversized ammo cartridge. Mostly
used outdoors, especially in areas where long viewing is necessary. However, they can be used indoors
where the long viewing is required like backyards and parking lots. They are installed inside protective
casings and are typically weatherproof. Most bullet cameras come with a fixed length that allows the angle
of view of up to 80degrees. This camera is usually fitted with a fixed focal lens.

Figure 4: Bullet camera(LUO, 2018).

PURPOSE
 Long-distance surveillance up to 40Ft
 Outdoors weatherproof surveillance

3) CORNER MOUNT OR C-MOUNT CAMERA


This is a camera that uses detachable lenses to suit different purposes. Typically, a CCTV camera can record
up to 35Ft, however, if you need surveillance beyond this distance, a C-MOUNT or corner mount camera
with a particular lens can serve this purpose. They can be zoomed in and out without losing focus.
Figure 5:C-mount camera(Mangla, 2017).
PURPOSE
 Used to achieve variable zoom in surveillance
4) DAY/NIGHT CCTV CAMERA
This kind of cameras can be used both in poor light and standard environments. Mostly used outdoors, these
surveillance units have a wide dynamic range and can function under direct sunlight, glare or reflections.
They are used 24/7, and these cameras do not require am infrared illuminator as they come with an extra
sensitive imagining chip which is used in the dark.
 Figure 6:Day/Night camera(Mangla, 2017).

PURPOSE
 For 24/7 surveillance
 Often in low light conditions

5) PAN TILT ZOOM(PTZ) CAMERA


It is possible to plan, tilt and zoom PTZ cameras. It gives surveillance operator the freedom to plan, tilt and
zooms the lens. You can manually control these cameras or program them to follow an accurate view of
thing. Since these cameras can monitored using live controls, they are employed in highly sensitive zones
where live monitoring is required.
 Figure 7:Pan Tilt zoom camera(LUO, 2018)

PURPOSE
 Expensive PTZ cameras are to achieve responsiveness

6) HIGH -DEFINITION CCTV CAMERA


HD CCTV cameras can record at high frame rates and at HD quality which is comparatively at a higher
resolution than other CCTV cameras. This type of camera can capture finer details while giving the operator
the option to zoom in without losing picture quality.

 Figure 8: High Definition camera(cosmotechph, 2014)

PURPOSE
 At highly niche places HD CCTV cameras work well example casinos and banks
 Casino manager often check if a player is counting cards or not through these cameras.
7) INFRARED /NIGHT VISION CCTV CAMERAS
When we need to see what’s happening the dark then a night –vision CCTV camera can help us. It is able to
see when lighting is poor or absolute darkness. The technology behind this is infrared LEDS.

8) NETWORK /IP CCTV CAMERA


The IP camera can transmit recording over the internet. May or may not require a wired connection. Yes, it
also works on wireless technology. In comparison to the analog camera is easy to install. It is possible to
send recording over a far distance without requiring any power boost using a cable.

 Figure 9 :Network/IP camera(cosmotechph, 2014)

9) WIRELESS CCTV CAMERA


We have talked about the wireless IP camera. These types of CCTV cameras are also available that work on
wireless technology. Flexible installation is one of the primary benefits

 Figure 10: Wireless camera(LUO, 2018)

 REQUIREMENT AND DESIGN WORKSHEETS


The table below lists basic questions to determine high level CCTV system requirements and to
influence the system design.

 Table 1: Basic questions to determine high level CCTV system requirements(Naval
warfare,2013).

A sample checklist containing some of the factors to consider during a site survey is provided in
the table below. This checklist can be used by the design team to record the number and type of
cameras, monitors, and housings as well as address connectivity requirements.
 Table 2: Factors to consider during a site survey(Naval warfare,2013)
COMPONENTS OF CCTV SYSTEMS
CCTV uses components that are directly connected to generate, transmit, display, and store video
data. A CCTV system can be as simple as a camera purchased from a retail electronics store
connected to a video monitor. However, larger systems operated by professional security
personnel are comprised of a number of components falling into several basic categories:
• Cameras;
• Lenses;
• Housings and mounts;
• Monitors;
• Switchers and multiplexers; and
• Video recorders.
Many features exist within each of these categories that can satisfy an agency’s operational
requirements in the most challenging environments. The most complex CCTV systems may
incorporate hundreds of cameras and sensors integrated into one overall security network.
The figure below provides a CCTV component diagram example.


Figure 11 : CCTV Component Diagram(Naval warfare,2013).

Most new CCTV systems maximize the advantages of digital technologies by utilizing electronic
databases, compact components, and wireless transmission techniques. With larger quantities of
data being collected, it is essential that the system be capable of retaining data in accordance
with the organization’s policies and procedures.

Cameras
Cameras are an essential component of any CCTV system. Matching the right CCTV camera to
a particular application is increasingly complex due to rapid technological developments and a
greater range of applications. A system’s performance is affected by many factors beyond those
listed in the vendor data sheets. Effective camera selection requires detailed knowledge of the
camera, application, supporting architecture, and host environment.
All CCTV cameras include three basic elements:

• Image sensor–Converts light (photons) into electronic signals;

• Lens–Gathers light reflected from a subject and focuses the light on the image sensor;
Image processing circuitry: Organizes, optimizes, and transmits video signals.
The type of camera best suited for a CCTV system depends on the operational environment and
how it will integrate into the system. The answers to the following questions may help
determine the best camera type:

• What is the desired image quality?


• What size is the desired field of view (FOV)?
• How much lighting is available?
• Will the camera be installed indoors or outdoors?
• Will the video be monitored on a full time basis?
• How will the video be transmitted?
• Will the camera be exposed to extreme conditions?

There are many types of cameras designed to perform under specific environmental conditions
but cameras can be grouped into two primary categories: fixed and pan-tilt-zoom (PTZ). Fixed
cameras are intended to constantly view a single scene, while PTZ cameras are motor driven and
can pan left or right, tilt up or down, and zoom in or out to instantly customize the view as
needed. A combination of fixed and PTZ cameras are often used to provide the required
surveillance coverage.

 2.4 EMPERICAL REVIEW (Review by objectives)

 2.4.1 Main Objectives


Surveillance cameras are one of the most ubiquitous and recognizable technologies used to watch us as we
move about our daily lives. There are still some things that you need to take care of when you hire a
professional CCTV installation professional. Here, we have listed some of the basic but crucial things that
you need to consider while installing CCTV cameras in your home or office or organization which includes
the coverage, types of cameras, the location, permission and even cost. If all these things are considered
before the installation of any CCTV then the goal of the CCTV to the organization will surely be achieved.

 2.4.2 Specific Objectives


INFORMATION GATHERING

The information to be gathered from an organization based on their security and monitoring can be gotten
through interviews, questionnaire, observation and brainstorming.

THE GOAL OF INSATLLING A SURVEILLANCE CAMERA


The goal of any one who seeks to install a CCTV is either to obtain maximum security in an organization or
in a home or to monitor a scene.

THE IMPORTANCE OF INSTALLING A SURVEILLANCE CAMERA

The installation of a surveillance camera is very important because the cost is cheaper as compared to the
cost of hiring a guardian and also for the fact that images can be watched at a distance.

 2.5.1 Presentation of The Internship Place


ETOUG EBE BAPTIST HOSPITAL(EBHY) is located in Yaoundé VI, Cameroon. EBHY is made of so
many departments amongst which we have the IT department. It is made up of two staff, and at the time of
this internship, it had 4 interns; two software, and two hardware. This IT department has two rooms; a
server, and a working room.

 2.5.2 Activities Carried Out


During my internship, I did not just work on my research study or did just things that I learned in school.
During this internship I was involved in the following activities:
 Cabling and cable crimping.
 Installation of surveillance cameras.
 Troubleshooting the network at the level of the switches and routers and resolving issues found as to
ensure proper connectivity.
 Troubleshooting PCs in the organization and replacing the field replaceable components (FRU).
 Installing wireless routers and testing for connectivity.
 Troubleshooting the intercom system to ensure connectivity.
 Taking inventories of all the PCs in the organization.

 2.5.3 Internship Experience


This part of the study is about the internship experience. It includes both professional and personal
experience
 Professional Experience
During my internship, I acquired professional experience in diverse domains. I acquired experience in my
profession which is computer hardware maintenance in the following aspects
 I had the opportunity to troubleshoot PCs that malfunctioned in the organization, identify all the
faults and resolve them.
I also had that opportunity to work with a local area network (LAN), in which I could troubleshoot
the network and resolve problems like no internet access.

 Personal Experience
During this internship, I did not only acquire professional experience, also I acquired personal experience.
As personal experience, during this internship, I was able to prove myself I was capable of doing certain
things that I could not believe I could do.

 2.5.4 Strength and Weakness


This part of the work contains the strength and weakness of the internship place.
 The Strength
 EBHY is an institution that practice unity and team work and as a result there is a better performance
in all its department
 EBHY staffs have passion and are so devoted to the work they do.
 The EBHY staffs are always conscious of time and as such are always available at their duty post
and ready to work.
 The Weakness
Unfortunately, nobody is perfect. Like all EBHY has its little weakness. The workers of EBHY are so
committed to their work that they work through out without resting, at times due to the work load they might
even work and forget about their break and so mindful of the fact that the body needs rest working for long
hours without rest might lead to inefficient work.

 2.5.5 Problems Encountered


During this internship, all was not easy. There were good and bad moments. I encountered different types of
problems, but it was not very difficult to get with certain problems. Some problems I encountered were as
follows;
 Time management
There were days that we will even work for more than eight hours of work and without even taking a
break
 Unstable internet connection
Internet connection was necessary for most of the activities we carried out, but there were days that
we had no internet connection
 IP address shortage
There was a time that the devices in the network that was using the class C became more than the IP
addresses and some of the devices were unable to connect.
CHAPTER THREE
RESEARCH METHODOLOGY

This chapter emphasis on the various stages, and phases that, will give accurate description, explanation and
prediction to complete this chapter. This chapter consists of research design, sampling, data collection and
techniques, data analyzing instrument, validation and method of data presentation.

RESEARCH DESIGN
According to MEGENDA (1999), research design is the outline plan or scheme that is used to generate
answers to the research problem. It is basically the structure and plan investigation. The study used a
descriptive survey design. Descriptive research is used to obtain information concerning the current status of
the phenomena to describe ‘’ what exist’’ with respect to variables or conditions in a situation. The design
involves in depth study of budgetary control and it effect on financial performance.

SITE OF STUDY
This refers to where the researcher did his/her internship or carried out the study. The study was done at
ETOUG-EBE BAPTIST HOSPITAL AT THE BIYEM ASI NIEGBORHOOD YAOUNDE IN THE
CENTER REGION

POPULATION STUDY
This refers to that population to which a researcher wants to generalize the result of the study. The
population of the study consists of 22 staff of EBHY

TARGETED POPULATION
The targeted population here was the expected population the population that the researcher was to interview
or give questionnaires to. The targeted population here was 04 staff.

ACCESSIBLE POPULATION
The accessible population here is the population that the researcher was able to administer questionnaires to
and the population the researcher was able to interview.

SAMPLE SIZE
The sample size that was used to carry out this research was 4(made up of the founders, the secretary, and
the manager) workers were selected to represent the population.

SAMPLE TECHNIQUES
The stratified random sampling method was used in this study to select our workers. The researcher
decided to use this method because it is simple to administer and gives the respondent independent chance to
answer the questions.
SOURCES OF DATA COLLECTION
This talk of the different sources used for the collection of data. There are two main source of data
collection that is primary and secondary source. For this project the primary and secondary source were
used for the collection of data to come out with useful effect of video surveillance on security challenges in
an organization

PRIMARY SOURCES
This describes the means through which first –hand information is being collected. These sources include
questionnaire, interview and observation

QUESTIONNAIRE
This is a form consisting of inter-related questions prepared by the researcher about the research
problem under investigation, based on the objectives of the study. Considering the study, a questionnaire
was been carried out by the researcher on the effect of video surveillance on security challenges in an
organization. It is a very advantageous method of data collection as it is less consuming and the respondent
have the same question and answer options. It is also easy to administer.

OBSERVATION
This is equally the source of primary data which consist of two techniques which are mechanical and
personal observation. It is important source taken into consideration the fact that the researcher spent time in
EBHY before writing this piece of work.

INTERVIEW
Here the researcher prepares the series of questions which is disclosed through the use of questionnaire and
carries it to the respondents, to respond following their perception and experience in relation to the questions
posed. The researcher administered a face to face conversation with some staffs and customers. The
researcher subject matter of discussion was on the effect of video surveillance on security challenges in an
organization

SECONDARY SOURCE
The secondary source involves getting information from dictionary, document
(organizational handbooks), internet, text books or class notes.

CLASS NOTE
Information were gotten from class note which greatly help the researcher on her findings and research.

INTERNET
More of the researcher’s information were gotten from the internet in order to realize this project.

VALIDITY AND RELIABILITY OF INSTRUMENT


The researcher here by attest that the research instrument in this work is consistent and confidential in all
the information provided.
VALIDITY OF INSTRUMENT.
This involves giving copies of questionnaire to someone who has experience in research work. The expert in
this case is the supervisor who examined in term of clarity to the need of the study.

DATA ANALYSIS
The data collected through questionnaires were tabulated and analyzed and result tabulated and analyzed
using descriptive statistics. The data collected was the relation of one dependent variable to multiple
independent variables
CHAPTER FOUR
DATA PRESENTATION, ANALYSIS AND INTERPRETATION OF
FINDINGS
Here in this chapter we will talk on the presentation of the research using questionnaires and it will be
presented using tables and pie charts.

SECTION A: DEMOGRAPHIC DATA


Here we have questions like gender, age; marital status; academic qualification that is the questions
concerning employees personally
TABLE 1: GENDER

sex of workers

Frequency Percent Valid Percent Cumulative


Percent

male 12 60.0 60.0 60.0

Valid female 8 40.0 40.0 100.0

Total 20 100.0 100.0


FIGURE 1: Gender distribution in the institution

Table 1 show that the gender of the institution are un equally distributed that is the number of female not
equal to the number of male meaning that there are 12 male and 8 female giving us 60% of male as oppose
to 40% female in the organization

TABLE 2: AGE
Age

age of workers

Frequency Percent Valid Percent Cumulative


Percent

18-28 13 65.0 65.0 65.0

Valid 29-38 7 35.0 35.0 100.0

Total 20 100.0 100.0

Figure 2: Age distribution of workers

From the table 2 above it shows that there are 13 employees with the age ranging from 21-28 years and there
are also 7 employees with age ranging from 28-35 years. That is 65 range from 21-28 and 35 range from 28-
35 there making a total of 100%
TABLE3: MARITAL STATUS

marital status

Frequency Percent Valid Percent Cumulative


Percent

single 11 55.0 55.0 55.0

Valid married 9 45.0 45.0 100.0

Total 20 100.0 100.0

Figure 3: Marital status of employees


From table 3 above it shows that 9 of the employees are married. The institution has as advantage because
the large number of the employee are not married so therefore in case of employee transfer it won’t affect
the organization finances and man power since they do not have spouse if you look at the percentage of 55%
single against 45% married it will sure some vibranness in the organization structure of it labour force

TABLE 4: HIGHEST ACADEMIC QUALIFICATION


highest level of qualification
highest level of qualification

Frequency Percent Valid Percent Cumulative


Percent

master degree 1 5.0 5.0 5.0

degree 5 25.0 25.0 30.0

HND 5 25.0 25.0 55.0

Valid O/L 1 5.0 5.0 60.0

A/L 5 25.0 25.0 85.0

others 3 15.0 15.0 100.0

Total 20 100.0 100.0

Figure 4: Academic qualification of employees


From table 4 above it shows that majority of the employee have a middle class deplom such as the
degree,higher national diploma and advance level with percentage of 25% while we have 5% of the
employee are master degree holders and about 15% hold other diploma or non at all this is an indication that
the organization are more interested in qualify workers as can be seen in the the table distribution above and
the pie chat analysis

SECTION B: CAMERA
Here we will talk of question concerning camera and the respondents given by the employees.
TABLE 5:

do you think is easy to use surveillance camera

Frequency Percent Valid Percent Cumulative


Percent

strongly disagree 2 10.0 10.0 10.0

disagree 5 25.0 25.0 35.0

Valid agree 10 50.0 50.0 85.0

strongly agree 3 15.0 15.0 100.0

Total 20 100.0 100.0

Figure 5: do you think is easy to use surveillance camera


From the above respondents it should be noted many of the employee do not know how a security camera
function talkless on how to use there security cameras are use by expert to install in organisation and that is
why at EBHY there are team of technician inchage of cameras and other IT services you can see on the table
that only 15% of the worker give a strong response and 50% agreeing on the usage and 25% strongly
disagreeing on the usage of security camera
TABLE 6 the reason for video surveillance is to reduce theft
and insecurity in an organization

Frequency Percent Valid Percent Cumulative


Percent

strongly disagree 2 10.0 10.0 10.0

agree 5 25.0 25.0 35.0


Valid
strongly agree 13 65.0 65.0 100.0

Total 20 100.0 100.0

Figure: 6 the reason for video surveillance is to reduce theft and insecurity in an
organization

From the above analysis it shows that 65% strongly agree that surveillance cameras help to reduce if not
completely deter steeling and bulkling of organization while 10% strongly disagree on the deterrence nature
of cameras in an organization

TABLE 7 accessibility of video footages in an organization

anyone can have access to video footages in an organization


Frequency Percent Valid Percent Cumulative
Percent

0 11 55.0 55.0 55.0

Valid 1 9 45.0 45.0 100.0

Total 20 100.0 100.0

Figure 7: accessibility of video footages in an organization


From the above analysis it shows that 11 employees strongly disagree and disagree this therefore means that
there not everyone have access to the video footage that the camera captured and 9 employee also disagree
so only expert have access to the video footage

SECTION C: monitoring station


Here we will talk of question concerning monitoring station and the respondents given by the employees.
TABLE 8: monitoring system as a tool of organizational growth
monitoring system help in the growth of the organization

Frequency Percent Valid Percent Cumulative


Percent

agree 17 85.0 85.0 85.0

Valid strongly disagree 3 15.0 15.0 100.0

Total 20 100.0 100.0


Figure 8: monitoring and organization growth
From the above analysis it shows that 85% strongly disagree that there is no growth if we
monitor the organization as oppose by 15% agreeing of the company growth with relative to
no bulkling or terror attack

TABLE 9 monitoring network of cameras at the same time

it is possible to monitor many surveillance camera at the same time

Frequency Percent Valid Percent Cumulative


Percent

disagree 3 15.0 15.0 15.0

agree 11 55.0 55.0 70.0


Valid
strongly agree 6 30.0 30.0 100.0

Total 20 100.0 100.0


Figure 10. Monitoring network of cameras at the same time

From the above analysis it shows that using SPSS 50% agree that explanation of how the budget support the
company’s mission, vision, goal and objectives and 50% strongly agree. This therefore implies that the
institution or company clearly state it mission, vision, goal and objectives to it employees

TABLE 11: expert are in charge of monitoring cameras to avoid footage been corrupt

the organization select expert to monitor the camera to avoid it been corrupt

Frequency Percent Valid Percent Cumulative


Percent

disagree 1 5.0 5.0 5.0

agree 13 65.0 65.0 70.0


Valid
strongly agree 6 30.0 30.0 100.0

Total 20 100.0 100.0


Figure 11 expert are in charge of monitoring cameras to avoid footage been corrupt

Using SPSS it shows that 50% agree and 30% strongly agree that expert are inchage of monitoring and
interpreting the fottages from the cameras and only 5% disagree with that fact .

TABLE 12: computers in chage of monitoring are constanly connected to the network of the
organisation

computer responsible for monitoring the cammeras are constantly connected to


the network

Frequency Percent Valid Percent Cumulative


Percent

agree 13 65.0 65.0 65.0

Valid strongly agree 7 35.0 35.0 100.0

Total 20 100.0 100.0


TABLE 13: computers in charge of monitoring are constantly connected to the network of the

The analysis above shows that 35% agree and 65% strongly agree that computers that are used for
monitoring is 100% connected to the network. This implies that the network of cameras are been monitor via
the computer 24/7 if need be

SECTION D: video recorder


Here we will talk of question video recorder and the respondents given by the employees.
TABLE 14: only action or motion are recorded by the by the surveillance cameras

only action are recorded

Frequency Percent Valid Percent Cumulative


Percent

strongly disagree 5 25.0 25.0 25.0

disagree 7 35.0 35.0 60.0

Valid agree 7 35.0 35.0 95.0

strongly agree 1 5.0 5.0 100.0

Total 20 100.0 100.0


TABLE 15: only action or motion are recorded by the surveillance cameras
The analysis above shows that 25% strongly disagree and 35% disagree making a total of 60% that say not
only action are been recorded as of 35% and 5% strongly agree and agree .we can there fore conclude from
the table above that the cameras record the environment constantly without necessary waiting for action
there by putting all the activity in the organization into record and can be view and reanalyze for eventual
action to be taken by the administration.

TABLE 16 video analyses are done by expert of the domain

recorded video require an expert to analyze it

Frequency Percent Valid Percent Cumulative


Percent

disagree 2 10.0 10.0 10.0

agree 9 45.0 45.0 55.0


Valid
strongly agree 9 45.0 45.0 100.0

Total 20 100.0 100.0


Figure: 16 video analyses are done by expert of the domain

The analysis above shows that 45% strongly agree and 45% agree making the total of 90% that have accept
the fact that video footages require expert to analyze a scenario that occure in an organization as oppose by
just total of 10% of that.

SECTION E: Data storage

TABLE 17: the best storage device for surveillance cameras is cloude

the best storage for video recorded is the cloud

Frequency Percent Valid Percent Cumulative


Percent

strongly disagree 1 5.0 5.0 5.0

disagree 2 10.0 10.0 15.0

Valid agree 8 40.0 40.0 55.0

strongly agree 9 45.0 45.0 100.0

Total 20 100.0 100.0


Figure 18: the best storage device for surveillance cameras is cloude

The analysis above shows that 45% strongly agree and 40% agree making a total of 85% of respondan
accepting that clouds is the best stoge device for video surveillance as oppose by just 20% of of the
respondent so there for we can conclude that clude is the best storage divice.

TABLE 19: data storage is a complex and expensive

storing data is expensive and complicated

Frequency Percent Valid Percent Cumulative


Percent

strongly disagree 2 10.0 10.0 10.0

disagree 9 45.0 45.0 55.0

Valid agree 6 30.0 30.0 85.0

strongly agree 3 15.0 15.0 100.0

Total 20 100.0 100.0


Figure:19 data storage is a complex and expensive

From the above analysis it shows that 10% strongly disagree and 45% disagree making a total of 55% as
oppose by 45% who thin storing data is complex and expensive. And from the above analysis we can say it
is easy and non complex to stored data .

TABLE 20:data access and safety

the data stored can be corrupted if access is allow to everyone in the organization

Frequency Percent Valid Percent Cumulative


Percent

strongly disagree 2 10.0 10.0 10.0

disagree 6 30.0 30.0 40.0

Valid agree 11 55.0 55.0 95.0

strongly disagree 1 5.0 5.0 100.0

Total 20 100.0 100.0


Figure :20 :data access and safety
From the above analysis it shows that 55% agree and 5% strongly agree making the total of 60% that have
accept that giving access to everybody in an organization can lead to data been corrupt and therefore no
safety can be guarantee as oppose by just 40% of the respondent the for we can conclude here that data need
safety and as such need fewer hands

TABLE 21 storage capacity

data storage required a lot of space and is costly for the organization

Frequency Percent Valid Percent Cumulative


Percent

strongly disagree 1 5.0 5.0 5.0

disagree 10 50.0 50.0 55.0

Valid agree 6 30.0 30.0 85.0

strongly agree 3 15.0 15.0 100.0

Total 20 100.0 100.0

Figure 22 storage capacity


From the above analysis it shows that 50%, 3% disagree and 15% strongly agree that surveillance cameras
require a lot of space these is per our respondent .
SECTION F: SECURITY CHALLENGES

TABLE: 23 security cameras as deterrence

security cameras deter theft or bucklers in an organization

Frequency Percent Valid Percent Cumulative


Percent

disagree 2 10.0 10.0 10.0

agree 13 65.0 65.0 75.0


Valid
strongly agree 5 25.0 25.0 100.0

Total 20 100.0 100.0


FIGURE: 23 security cameras as deterrence

From the above analysis it shows that 65% agree and 25% strongly agree making the total of 90% that
have accept that security cameras can act as a deterrence against theft and bulkers or terrorist activity in an
organization as oppose by just 10% giving access to everybody in an organization can lead to data been
corrupt and therefore no safety can be guarantee as oppose by just 40% of the respondent the for we can
conclude here that data need safety and as such need fewer hands

TABLE24 security cameras as a tracking tools in an organization

unwanted actions or behavior are tract in an organization with help of security

Frequency Percent Valid Percent Cumulative


Percent

agree 4 20.0 20.0 20.0

Valid strongly agree 16 80.0 80.0 100.0

Total 20 100.0 100.0

FIGURE 24: security cameras as a tracking tools in an organization


From the table and the pie chat above analysis shows that 80% strongly agree and 20% agree that
surveillance cameras is a security tool that is use for tracking on wanted behavior or any action that is on
disereble in an organization

TABLE 25: security cameras as a preventive tool for attack or terror act in an organization

terrorism are prevented in an organization with the help of security cameras

Frequency Percent Valid Percent Cumulative


Percent

agree 8 40.0 40.0 40.0

Valid strongly agree 12 60.0 60.0 100.0

Total 20 100.0 100.0

Figure 25: security cameras as a preventive tool for attack or terror act in an organization
From the table and the pie chat above analysis shows that 40% agree and 60% strongly agree that
security cameras can act as a preventive tool against theft and bulkers or terrorist activity in an organization
PRESENTATION OF INFERENTIAL STATISTICS

Here we will talk on hypothesis. Hypothesis will be tested using SPSS

Hypothesis one: There is a statistical relationship between cameras on security challenge


Table 26: Computation of relationship between easy use of security cameras and diterence of theft
and bulklers

Chi-Square Tests

Value df Asymp. Sig. (2-


sided)

Pearson Chi-Square 1.176 a


3 .029
Likelihood Ratio 1.896 3 .032
Linear-by-Linear Association .005 1 .042
N of Valid Cases 20

a. 7 cells (87.5%) have expected count less than 5. The minimum


expected count is .30.

the value of the test statistic is 1.176 and the corresponding p – value of
the test statistic is p = 0.759
Decision rule
Following the hypothesis testing decision rule, with p value of 0.029 which is less than 0.05, we do reject
the null hypothesis meaning we accept the alternative hypothesis meaning there is a relationship between the
independence variable and the dependence variable. Therefore to conclude that an increase or decrease in
one will to lead to an increase or a decrease to another

Hypothesis two :( H2) There is a statistical relationship between monitoring of many surveillance camera at
the same time and tracking of unwanted action and behavior in an organization
TABLE 27
Chi-Square Tests

Value df Asymp. Sig. (2-


sided)

Pearson Chi-Square 3.197a 2 .033


Likelihood Ratio 3.306 2 .011
Linear-by-Linear Association 1.778 1 .042
N of Valid Cases 20

a. 5 cells (83.3%) have expected count less than 5. The


minimum expected count is .60.

the value of the test statistic is 3.197 and


the corresponding p – value of the test statistic is p = 0.033

Decision rule
Following the hypothesis testing decision rule, with p value of 0.033 less than 0.05 indicate that there is a
strong relationship between the two variables the independent variable and the dependent variable and the
fact that the p value is lesser than our chosen significant value of 0.05 ,then we reject the null hypotheses in
favour of the alternate hypotheses wish is an indicator of a strong relationship Therefore to conclude that an
increase or decrease in one will lead to an increase or a decrease to another
HYPOTHESIS THREE (H3): There is a statistical relationship between access to stored data and an attact
or a terror act in an organization

TABLE 28:
Chi-Square Tests

Value do Asymp. Sig. (2-


sided)

Pearson Chi-Square 2.151a 3 .542


Likelihood Ratio 2.560 3 .464
Linear-by-Linear Association .009 1 .926
N of Valid Cases 20

a. 7 cells (87.5%) have expected count less than 5. The minimum


expected count is .35.

the value of the test statistic is 2.151 and


the corresponding p – value of the test statistic is p = 0.542

from the table above we can see that the value of alpha is greater than the value of the test satistics ie the
value if p (0.542) and a relevant conclution can be made

Decision rule
Following the hypothesis testing decision rule, with p value of 0.542 greater than 0.05 indicate that that
there is a relationship between the two variables
Result from the tables above show that we will fail to reject the null hypotheses there by not accepting
the alternate hypotheses in this case the relationship is moderate .the hypotheses is were tested using the chi
squer to understand the relationship between access to stored data and a security challenge such as a terror
attack ,steeling and worker behavior at work

CHAPTER FIVE
DISCUSSION, RECOMMENDATIONS AND CONCLUSIONS
Here we will talk on the discussion, conclusion and recommendation based on the data analyzed in chapter
four

Discussions
This chapter is divided into three main sections, discussion, conclusion and recommendation

This piece of work entitle the effect of video surveillance cameras on security challenges in an organization
. In the opening chapter of this work , the following were presented: the background of the study , the
problem statement, objectives, research questions, scope and significant of the study, the next chapter that is
chapter two talk about all literature review, theories review, conceptual review and review of objectives. In
chapter three, the study present the research design, population of the study, sample size and sample method,
method of data collection and method of data analysis. From the demographic question from table 1 to 5, it
is discovered that workers were both female and male with majority being female. Form the respondents
there are married and single workers with majority being married. We can also observed that the secretary,
the ADMINISTRATOR of EBHY of the HOSPITAL are directly concern with this topic

From the results in chapter 4 of this work, discussions, conclusion and recommendations are made in order
to reinforce as well as develop and adopt new strategies that will help EBHY (Etoug Ebe Baptist Hospital)
improve on their security measures and monitoring and surveillance technique.

3. DISCUSSION
The result gotten from chapter four shows that the effect of video surveillance cameras minimize security
challenges At EBHY, which is one of the institutions of the Cameroon Baptist Convention Health services
was already having an IP CCTV put in place which was not a PoE, remote access, and motion detection was
not configured, and other institutions of this Cameroon Baptist Convention Health services was having
analogue CCTV cameras installed which was due to lack of a good network that this analogue camera was
installed. With these systems in place there were a lot of limitation to security which needed some
amelioration. This study enabled EBHY to envisage the amelioration of surveillance cameras in the
institution and the organization at large.

RECOMMENDATION
To keep your system or organization secured you will need to consider certain things. The following
document will enable enhance a good security and monitoring service in your institution it will equally
include the maintenance of the device which will enable the user get the best of security and monitoring
system.

Select Good Cameras


For good footages to be recorded a good surveillance camera should be selected or chosen among many. A
surveillance camera with a good lens and the ability of having good and clear footages that is with high
resolution will be effective in this aspect.

Select High Storage Device


For storage, a storage device with high capacity should be chosen. Because footages requires high storage
capacity as surveillance is a continuous process which runs 24 hours a day and seven days a week and
videos have to be constantly recorded for easy retrieval and reference in the enterprise in case of need maybe
with respect to monitoring or with the case of an offense with respect to the enterprise. For an enterprise a
storage space of about 4Terrabyte can be implemented and as time goes on the space can be augmented.

Implement Maintenance Policies

One of the most important requirements or necessities in the aspect of electronic devices or security
monitoring devices is the aspect of maintenance. Carrying out preventive, curative and proactive
maintenance presents a lot of advantages over the care of the device and places ideas to the uses of the
device on how to effectively handle faults and equally prevent faults from taking place in the device. Like
educating the users on the disadvantage of dust to the device and the positioning of the device also what
device can be placed where and at what time. Telling the users at what time the camera best functions does it
have night vision ability? Such question enables users to know how the device better functions.

Backup Your Data


To save yourself headache, you should regularly backup the data on the computer. A full system backup is
recommended but with large hard drive that are available today this is not always practical. For large hard
drive or storage devices it is recommended that you at the least backup the files that you create. For
example, letters, documents, spreadsheets, email and many others.
Clean and Cool
Heat and dust is the worst enemies to electronic devices. Your device should be located in a clean and well-
ventilated area with nothing blocking the front and rear air vent. A few times every year arrange for a
computer technician to open up the case, clean out any excess dust and check to make sure all fans are
working correctly.

Implement Good Security


We need to place a good security measure with respect to where the footages recorded are being stored so as
to avoid people from gaining access into footages and perhaps modify the footages. We can implement
strong passwords on the device or the unit for processing so we prevent illegal access into the system.

Implement facial recognition:


In the organization, some vital areas like the bursary need special monitoring. With facial recognition, a
database of all images of staffs and those who are permitted to access the bursary will be collected, stored
and configured with the camera system such that when an image is captured at this vital zones, the image
will be compared with those in the database to so if there is a match. An alarm system will also be connected
such that any strength face is detected the alarm will be triggered to produce a loud sound to alert that
something might be going wrong. In that case it will help the security or other staffs to verify whether the
action is safe or not

Empty The Recycle Been


Constantly empty your recycle bin so as to free up some space that it occupies. By doing so it creates more
space for footages to be recorded and stored.

CONCLUSSION
At the end of our finding which focused on the effect of video surveillance cameras , the aspect of security
challenges in organizations and why it should be considered. It has become a point of interest in this century
and a lot of enterprises and organizations are considering the implementation of it. With the implementation
of this research work security methods will be enhanced and ameliorated in different enterprises and
organizations. And accurate results with respect to reports of crimes will be gotten equally and better means
of an all-round supervision method and system So on the basis of finding of this study as presented,
analyzed and interpret in chapter four, the conclusion is that there is an effect of video surveillance cameras
on security challenges in an organization.
Appendix

SECTION A: DEMOGRAPHIC DATA


1) What is your age
a) Male b) female
2) How old are you
a) 21 - 28 year b) 28 – 35 year c) 35 – 40 years
3) What is your marital status
a) Single b) married c) divorce d) widow e) widower
4) Highest level of qualification
a) Master degree b) degree c) higher national diploma
SECTION B: CAMERA

Tick on the space provided below the suitable answer which suit the statement provided below where by SD:
strongly disagree D: disagree A : agree SA: strongly agree

ITEM SD D A SA
5 Do you think it is easy to use surveillance camera
6 The reason for considering the addition of video surveillance is to
reduce theft in the company
7 Anyone can have to the video footage
8 Anyone can be engage in designing and installing camera systems
9 A professional is responsible for the ongoing maintenance of video
system in the organization
10 Cameras are installed in a way that it cannot be recognized or
noticed by anyone

SECTION C: MONITORING STATION

11 Monitoring system help in the growth of the organization


12 It is possible to monitor many surveillance camera at the same time

13 The organization select a particular group of staff to monitor the camera so that nobody corrupt
it
14 Computers responsible to monitor all cameras in the organization are constantly connected
SECTION D: VIDEO RECORDER

15 The video recorder use by the organization is very costly to the organization

16 To record a video requires a lot of time and devices

17 Recording a video requires a professional and an expert to be done

SECTION E: DATA STORAGE

18 The best storage for the video recorded is cloud


19 Storing data is expensive and complicated
20 The data recorded can be corrupted by anyone in the organization
21 Data storage and devices required to store data is complicated and very costly for the
organization

SECTION F SECURITY CHALLENGES

22 security cameras deter theft or bucklers in an organization

23 unwanted actions or behavior are tract in an organization with help of


security cameras

terrorism are prevented in an organization with the help of security cameras


24

22 security cameras deter theft or bucklers in an organization

23 unwanted actions or behavior are tract in an organization with help of security


cameras
24 terrorism are prevented in an organization with the help of security cameras

You might also like