Skip to main content
Erschienen in: Wireless Personal Communications 2/2013

01.11.2013

Continuity in Wireless Video Security System-Based Physical Security Services

verfasst von: DongHwi Lee, Kyong-Ho Choi

Erschienen in: Wireless Personal Communications | Ausgabe 2/2013

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Traditional physical security policy considers an intentional use of budgets and a way of using physical spaces. It represents difficulties in responses to the environment, which is dynamically changed, because the plan is determined as static and stereotypical manners. Thus, in this study a wireless IP camera is used as a method that expands monitoring ranges in existing physical spaces in order to propose a security service structure that can support instantaneous detections and responses to disasters. Although the effort for protecting facilities and equipments using a video monitoring system using wireless IP cameras for temporal threats is a proper way for providing a physical security service according to needs of an adaptable security level. Moreover, if a security level for a specific section is to be upgraded according to changes in external environments, the security level, which is guaranteed by periodic guard patrols, can be improved and supported using a wireless IP camera-based video monitoring system for 24 h during the period to be required. Also, it is possible to establish an environment that enables instantaneous detections and responses for a moment of accidents through performing a continuous video monitoring work from the beginning of rainfall to a dangerous level of flooding.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Nosworthy, D. J. (2000). A practical risk analysis approach: Managing BCM risk. Computers and Security, 19(7), 596–614.CrossRef Nosworthy, D. J. (2000). A practical risk analysis approach: Managing BCM risk. Computers and Security, 19(7), 596–614.CrossRef
2.
Zurück zum Zitat Sveen, O. F., Torres, M. J., & Sarriegi, M. J. (2009). Blind information security strategy. International Journal of Critical Infrastructure Protection, 2(3), 95–109.CrossRef Sveen, O. F., Torres, M. J., & Sarriegi, M. J. (2009). Blind information security strategy. International Journal of Critical Infrastructure Protection, 2(3), 95–109.CrossRef
3.
Zurück zum Zitat Finne, T. (1996). The Information Security Chain in a Company. Computers and Security, 15(4), 297–316.CrossRef Finne, T. (1996). The Information Security Chain in a Company. Computers and Security, 15(4), 297–316.CrossRef
4.
Zurück zum Zitat Bandyopadhyay, D., & Sen, J. (2011). Internet of things: Applications and challenges in technology and standardization. Wireless Personal Communications, 58(1), 49–69.CrossRef Bandyopadhyay, D., & Sen, J. (2011). Internet of things: Applications and challenges in technology and standardization. Wireless Personal Communications, 58(1), 49–69.CrossRef
5.
Zurück zum Zitat Paul, B., Marcombes, S., David, A., Struijk, L. N. S. A., & Moullec, Y. L. (2013). A context-aware user interface for wireless personal-area network assistive environments. Wireless Personal Communications, 69(1), 427–447.CrossRef Paul, B., Marcombes, S., David, A., Struijk, L. N. S. A., & Moullec, Y. L. (2013). A context-aware user interface for wireless personal-area network assistive environments. Wireless Personal Communications, 69(1), 427–447.CrossRef
6.
Zurück zum Zitat Yi-Wei, M., Chin-Feng, L., Jenq-Muh, H., Nong-Kun, C., & Yuen-Min, H. (2011). RFID-based positioning system for telematics location-aware applications. Wireless Personal Communications, 59(1), 95–108.CrossRef Yi-Wei, M., Chin-Feng, L., Jenq-Muh, H., Nong-Kun, C., & Yuen-Min, H. (2011). RFID-based positioning system for telematics location-aware applications. Wireless Personal Communications, 59(1), 95–108.CrossRef
7.
Zurück zum Zitat Coudert, F. (2010). When video cameras watch and screen: Privacy implications of pattern recognition technologies. Computer Law and Security Review, 26(4), 377–384.CrossRef Coudert, F. (2010). When video cameras watch and screen: Privacy implications of pattern recognition technologies. Computer Law and Security Review, 26(4), 377–384.CrossRef
8.
Zurück zum Zitat Srimuk, P., Mitatha, S., & Yupapin, P. P. (2010). Novel CCTV security camera system using DWDM wavelength enhancement. Procedia-Social and Behavioral Sciences, 2(1), 79–83.CrossRef Srimuk, P., Mitatha, S., & Yupapin, P. P. (2010). Novel CCTV security camera system using DWDM wavelength enhancement. Procedia-Social and Behavioral Sciences, 2(1), 79–83.CrossRef
9.
Zurück zum Zitat Deng, H., & Venetianer, P. L. (2010). Performance evaluation of an intelligent video surveillance system—A case study. Computer Vision and Image Understanding, 114(11), 1292–1302.CrossRef Deng, H., & Venetianer, P. L. (2010). Performance evaluation of an intelligent video surveillance system—A case study. Computer Vision and Image Understanding, 114(11), 1292–1302.CrossRef
10.
Zurück zum Zitat Thananunsophon, K., Mangalabruks, B., Fujii, Y., & Yupapin, P. P. (2011). Community monitoring and security using an intelligent camera in EAT smart grids. Procedia Engineering, 8, 332–336.CrossRef Thananunsophon, K., Mangalabruks, B., Fujii, Y., & Yupapin, P. P. (2011). Community monitoring and security using an intelligent camera in EAT smart grids. Procedia Engineering, 8, 332–336.CrossRef
11.
Zurück zum Zitat Taran, Y., & Lindgren, P. (2011). Business models and business model innovation in a “Secure and Distributed Cloud Clustering (DISC) Society”. Wireless Personal Communications, 58(1), 159–167.CrossRef Taran, Y., & Lindgren, P. (2011). Business models and business model innovation in a “Secure and Distributed Cloud Clustering (DISC) Society”. Wireless Personal Communications, 58(1), 159–167.CrossRef
12.
Zurück zum Zitat Deloitte Report. (2007). The convergence of physical and information security in the context of enterprise risk management. The Alliance for Enterprise Security Risk Management. Deloitte Report. (2007). The convergence of physical and information security in the context of enterprise risk management. The Alliance for Enterprise Security Risk Management.
Metadaten
Titel
Continuity in Wireless Video Security System-Based Physical Security Services
verfasst von
DongHwi Lee
Kyong-Ho Choi
Publikationsdatum
01.11.2013
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2013
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-013-1229-2

Weitere Artikel der Ausgabe 2/2013

Wireless Personal Communications 2/2013 Zur Ausgabe

Neuer Inhalt