2. INTRODUCTION :
Libraries have long maintained strong protections for patron privacy
and intellectual freedom. However, the increasing prevalence of
sophisticated surveillance systems in public libraries potentially
threatens these core library commitments.
Video surveillance is an ever-increasing issue in modern society.
More and more security cameras and other surveillance
technologies such as drones, biometric recording, facial recognition
and even genetic profiling tools are becoming prevalent in our
everyday lives.
Current large-scale security systems with networked video
cameras, expansive control rooms, roaming security guards, and
the incorporation of other cutting edge technologies,
Panopticon designs of the English social theorist Jeremy Bentham
(Mike, 1990; Norris, 2003). “The possibility that the modern public
library, the with profession’s long held commitment to privacy and
intellectual freedom, could be compared to Bentham’s panoptic prison
in which the few – as largely unobservable observers – watch the many
in an act of power and domination, is striking”.
3. DEFINITION OF SURVEILLANCE :
“Library users should have the right to personal privacy
and anonymity. Librarians and other library staff should
not disclose the identity of users or the materials they
use to a third party” (IFLA, 1999).
“...high-resolution surveillance equipment is capable of
recording patron reading and viewing habits in ways that
are as revealing as the written circulation records
libraries routinely protect…. Since any such personal
information is sensitive and has the potential to be used
inappropriately in the wrong hands, gathering
surveillance data has serious implications for library
management” (American Library Association, 2006)
4. CONT..
“provide a safe and secure facility for library
employees, library resources and equipment, and
library patrons” (McComb, 2004).
close watch kept over someone or something (as
by a detective); (Merriam-Webster )
ACT
1. Section 69 of the Information Technology Act, 2000
[Amended 2008] empowers government to intercept,
monitor or decrypt any data or information stored on
any computer resources for the reason of public
safety, public order, etc.
6. DIFFERENT TYPES OF SURVEILLANCE
Electronic Surveillance:
Radio Frequency Identification (RFID)
Closed Circuit Television (CCTV)
Biometric System
Electromagnetic Strips
Access Control Systems
Movement Dectector
BarCode
Alarm system..
7. OTHER TYPES:
Computer Surveillance:
Social Network Analysis
a) Facebook
b) MySpace
c) Twitter
Carnivore
NarusInsight
"Magic Lantern“
CIPAV
TEMPEST
"Pinwale“
8. AUDIO SURVEILLANCE :
Telephones/Mobile Devices
a) Wiretap
b) Bugs
c) Multilateration
d) Pen Register
e) Trap Device
f) Trace Device…
10. CCTV :
Video surveillance and closed-circuit television (CCTV)
systems serve as a way to monitor and record security,
deter crime and ensure safety. Advances in CCTV
technology and reduction in cost have also made video
surveillance a cost effective management tool for library
facilities.
McCahill and Norris (2002) noted that “libraries can use
closed-circuit television (CCTV) to identify visitors and
employees, monitor work areas, deter theft and ensure the
security can also
use to monitor and record evidence on clientele and staff
misconduct in the library.
CCTv systems are quickly becoming one of the most
important and economic security and safety tools available
to libraries.
11. THE KEY STEPS WHEN CONSIDERING THE DESIGNING A CCTV SYSTEM FOR LIBRARY
ACCORDING TO MCCAHILL AND NORRIS (2002), INCLUDES :-
Determine the primary application of the CCTV
system
Define the layout and characteristics of the control
area(s) of the library building
Decide on camera type and features
Determine the best location for viewing monitors
Determine the best method of signal transmission
Decide on the type of recording/archival equipment
for the system
12. ACCORDING TO MARCUS (2007), THESE
SURVEILLANCE MOTION DETECTION IMAGING AND CAMERA CAN BE USED TO
MONITOR THE FOLLOWING PLACES IN THE LIBRARY PREMISES:
Monitor driveway to the library building
Monitor the parking area of the library
Monitor the library shelf areas
Monitor the library equipment, such as library
computers located in each offices
Monitor the movement of staff and users within the
library
Monitor the exchange of materials within the library,
etc.
13. CCTV SYSTEM TYPES:
CCTV systems are broadly divided into two types.
These are:
1.Wired CCTV system
2.Wireless CCTV system
DEFINITION:
“clearly established that CCTV is a solution to the
problem and that there are not other effective
solutions with less impact on privacy” (CILIP, 2011).
14. CCTV CAMERA BENEFITS:-
Maintaining perimeter security in medium-to high-
secure areas and installations.
Observing behavior of incarcerated inmates and
potentially dangerous patients in medical facilities.
Traffic monitoring
Building and ground security
Overseeing location that would be hazardous to a
human.
15. CONT…
In educational institutions, instead of inspecting the
various departments and sections periodically,
video surveillance and remote monitoring can be
used for an effective management..
CCTV can be used in libraries to monitor the
student activities and their behavior in the library.
The common mischievous activities in the libraries
like tearing of the pages from the books, hiding the
books, sitting in corners and gossiping and book
theft can be reduced to a great extent.
16. CCTV CAMERA TYPES :-
Indoor Camera
Outdoor camera
IR day/Night Camera
Dome Camera
Bullet Camera
Vandal Proof Camera
Hidden Camera
Pen Tilt Zoom Camera
17. INDOOR CAMERA
Indoor camera as its name suggests used for indoor
security mechanism.Theseare suitable for security in
homes,schools,offices,hotelsetc…
18. IR DAY/NIGHT CAMERA
IR day/night cameras are used for high alert security areas were
surveillance needs to happened day and night. These cameras are
used by military personal,in parking lots and high security zones.
19. DOME CAMERA
Cameras are installed inside a dark dome and are design in a way that they
go unnoticed by visitors. These cameras can be rotated and tilted Manually
20. BIOMETRIC (IDENTIFICATION BASE ON
BIOLOGICAL TRAITS)
To measure and analyse both physiological and
behavioural characteristics of human beings.
Biometrics include fingerprints, iris recognition, voice
pattern,
Men having unique characteristics so that identifications
and distinguishing them is very easy
No possibilities of duplication, hacking, forgetting, steel
etc…
Not necessarily to remember or memorise the passwords
and Pin
For Examples:
Adhar Card..
21. USE OF BIOMETRICS
With the increased use of computers for data storage and
easy retrieval methods, the
biometric techniques can prevent unauthorized access to
ATMs, Cellular phones, Smart cards, desktop personal
computers, workstations and computer networks.
In a personal identification system, emphasis is on
verifying the identity of the authorized user.
Hence, it is assumed that the user of such system will
cooperate when he makes a claim for identity.
22. TYPES OF BIOMETRICS
Physical biometrics:
Fingerprint—Analyzing fingertip patterns
Facial recognition/face location—Measuring
facial characteristics
Hand geometry—Measuring the shape of the hand
Iris scan—Analyzing features of colored ring of the eye.
Retinal scan—Analyzing blood vessels in the eye
Vascular patterns—Analyzing vein patterns
DNA—Analyzing genetic makeup.
Earprint—this method is based on geometric distances,
force field transformation
23. ADVANTAGES:-
Biometrics cannot be lost, stolen or forgotten.
Barring disease or serious physical injury, the
biometric is consistent and permanent.
It is also secure in that the biometric itself
cannot be socially engineered, shared or used
by others.
There is no requirement to remember passwords,
or PINs, thus eliminating an overhead cost. The
biometric is always available to the individual;
24. DIS ADVANTAGES:-
Lack of standardization
While the reliability and the accuracy of biometric
devices continues to improve.
Biometric systems must be able to accommodate
changes to the biometric over time which may be
caused by ageing, illness or injury.
The effectiveness of the sample collection process is
strongly influenced by environmental conditions, user
training and usability. For example, lighting, facial
orientations, expression, image resolution and the
wearing of hats can affect the quality of the sample.
25. CONCLUSION:-
Library surveillance may take many forms, including
traditional reading and borrowing histories, RFID
tracking, e-book borrowing choices visible to outside
vendors like Amazon and Barnes and Noble, electronic
and web-based communication and interaction between
patrons and library staff, Internet browsing histories, and
video surveillance.
The accumulation and aggregation of these forms of
surveillance data can potentially pose a threat to the
privacy of library patrons and staff in conflict with library
commitments to privacy and intellectual freedom,
especially if libraries do not establish policies to ensure
prompt deletion or when local or national laws may not
adequately protect all these forms of library records.
26. REFERENCES:-
Ainley, R. (1998). Watching the detectors: control and the
Panopticon. In New Frontiers of Space, Bodies and Gender. (pp.
88–100). London: Routledge.
American Library Association. (2006). Questions and Answers on
Privacy and Confidentiality. Retrieved from
http://www.ala.org/Template.cfm?Section=interpretations&Tmplat
e=/ContentManagement/ContentDisplay.cfm&ContentID=15347.
Bernhard v. City of Ontario. (2008).
Biale, N. (2008). Expert Findings on Surveillance Cameras: What
Criminologists and Others Studying Cameras Have Found.
American Civil Liberties Union. Retrieved August 15, 2013, from
http://www.aclu.org/privacy/ 35775res20080625.html
CILIP. (2008). CILIP Survey on Police, Surveillance and
Libraries , June 2008, 1–7.