SlideShare a Scribd company logo
1 of 27
ELECTRONIC SURVEILLANCE
IN LIBRARY…….
-KAMAL NOVA. A
M.LIB.I.SC.
SUNIVERSITY OF MADRAS
INTRODUCTION :
 Libraries have long maintained strong protections for patron privacy
and intellectual freedom. However, the increasing prevalence of
sophisticated surveillance systems in public libraries potentially
threatens these core library commitments.
 Video surveillance is an ever-increasing issue in modern society.
More and more security cameras and other surveillance
technologies such as drones, biometric recording, facial recognition
and even genetic profiling tools are becoming prevalent in our
everyday lives.
 Current large-scale security systems with networked video
cameras, expansive control rooms, roaming security guards, and
the incorporation of other cutting edge technologies,
 Panopticon designs of the English social theorist Jeremy Bentham
(Mike, 1990; Norris, 2003). “The possibility that the modern public
library, the with profession’s long held commitment to privacy and
intellectual freedom, could be compared to Bentham’s panoptic prison
in which the few – as largely unobservable observers – watch the many
in an act of power and domination, is striking”.
DEFINITION OF SURVEILLANCE :
 “Library users should have the right to personal privacy
and anonymity. Librarians and other library staff should
not disclose the identity of users or the materials they
use to a third party” (IFLA, 1999).
 “...high-resolution surveillance equipment is capable of
recording patron reading and viewing habits in ways that
are as revealing as the written circulation records
libraries routinely protect…. Since any such personal
information is sensitive and has the potential to be used
inappropriately in the wrong hands, gathering
surveillance data has serious implications for library
management” (American Library Association, 2006)
CONT..
 “provide a safe and secure facility for library
employees, library resources and equipment, and
library patrons” (McComb, 2004).
 close watch kept over someone or something (as
by a detective); (Merriam-Webster )
ACT
1. Section 69 of the Information Technology Act, 2000
[Amended 2008] empowers government to intercept,
monitor or decrypt any data or information stored on
any computer resources for the reason of public
safety, public order, etc.
LIBRARY SURVEILLANCE TWO
TYPES….
Physical Technical
 Physical could be men and
 Technical could be Electronic
DIFFERENT TYPES OF SURVEILLANCE
Electronic Surveillance:
 Radio Frequency Identification (RFID)
 Closed Circuit Television (CCTV)
 Biometric System
 Electromagnetic Strips
 Access Control Systems
 Movement Dectector
 BarCode
 Alarm system..
OTHER TYPES:
Computer Surveillance:
 Social Network Analysis
a) Facebook
b) MySpace
c) Twitter
 Carnivore
 NarusInsight
 "Magic Lantern“
 CIPAV
 TEMPEST
 "Pinwale“
AUDIO SURVEILLANCE :
 Telephones/Mobile Devices
a) Wiretap
b) Bugs
c) Multilateration
d) Pen Register
e) Trap Device
f) Trace Device…
PONDICHERY UNIVERSITY LIBRARY
CCTV SURVEILLANCE
CCTV :
Video surveillance and closed-circuit television (CCTV)
systems serve as a way to monitor and record security,
deter crime and ensure safety. Advances in CCTV
technology and reduction in cost have also made video
surveillance a cost effective management tool for library
facilities.
McCahill and Norris (2002) noted that “libraries can use
closed-circuit television (CCTV) to identify visitors and
employees, monitor work areas, deter theft and ensure the
security can also
use to monitor and record evidence on clientele and staff
misconduct in the library.
CCTv systems are quickly becoming one of the most
important and economic security and safety tools available
to libraries.
THE KEY STEPS WHEN CONSIDERING THE DESIGNING A CCTV SYSTEM FOR LIBRARY
ACCORDING TO MCCAHILL AND NORRIS (2002), INCLUDES :-
 Determine the primary application of the CCTV
system
 Define the layout and characteristics of the control
area(s) of the library building
 Decide on camera type and features
 Determine the best location for viewing monitors
 Determine the best method of signal transmission
 Decide on the type of recording/archival equipment
for the system
ACCORDING TO MARCUS (2007), THESE
SURVEILLANCE MOTION DETECTION IMAGING AND CAMERA CAN BE USED TO
MONITOR THE FOLLOWING PLACES IN THE LIBRARY PREMISES:
 Monitor driveway to the library building
 Monitor the parking area of the library
 Monitor the library shelf areas
 Monitor the library equipment, such as library
computers located in each offices
 Monitor the movement of staff and users within the
library
 Monitor the exchange of materials within the library,
etc.
CCTV SYSTEM TYPES:
CCTV systems are broadly divided into two types.
These are:
 1.Wired CCTV system
 2.Wireless CCTV system
DEFINITION:
“clearly established that CCTV is a solution to the
problem and that there are not other effective
solutions with less impact on privacy” (CILIP, 2011).
CCTV CAMERA BENEFITS:-
 Maintaining perimeter security in medium-to high-
secure areas and installations.
 Observing behavior of incarcerated inmates and
potentially dangerous patients in medical facilities.
 Traffic monitoring
 Building and ground security
 Overseeing location that would be hazardous to a
human.
CONT…
 In educational institutions, instead of inspecting the
various departments and sections periodically,
video surveillance and remote monitoring can be
used for an effective management..
 CCTV can be used in libraries to monitor the
student activities and their behavior in the library.
The common mischievous activities in the libraries
like tearing of the pages from the books, hiding the
books, sitting in corners and gossiping and book
theft can be reduced to a great extent.
CCTV CAMERA TYPES :-
 Indoor Camera
 Outdoor camera
 IR day/Night Camera
 Dome Camera
 Bullet Camera
 Vandal Proof Camera
 Hidden Camera
 Pen Tilt Zoom Camera
INDOOR CAMERA
 Indoor camera as its name suggests used for indoor
security mechanism.Theseare suitable for security in
homes,schools,offices,hotelsetc…
IR DAY/NIGHT CAMERA
 IR day/night cameras are used for high alert security areas were
surveillance needs to happened day and night. These cameras are
used by military personal,in parking lots and high security zones.
DOME CAMERA
 Cameras are installed inside a dark dome and are design in a way that they
go unnoticed by visitors. These cameras can be rotated and tilted Manually
BIOMETRIC (IDENTIFICATION BASE ON
BIOLOGICAL TRAITS)
 To measure and analyse both physiological and
behavioural characteristics of human beings.
 Biometrics include fingerprints, iris recognition, voice
pattern,
 Men having unique characteristics so that identifications
and distinguishing them is very easy
 No possibilities of duplication, hacking, forgetting, steel
etc…
 Not necessarily to remember or memorise the passwords
and Pin
For Examples:
Adhar Card..
USE OF BIOMETRICS
 With the increased use of computers for data storage and
easy retrieval methods, the
 biometric techniques can prevent unauthorized access to
ATMs, Cellular phones, Smart cards, desktop personal
computers, workstations and computer networks.
 In a personal identification system, emphasis is on
verifying the identity of the authorized user.
 Hence, it is assumed that the user of such system will
cooperate when he makes a claim for identity.
TYPES OF BIOMETRICS
Physical biometrics:
 Fingerprint—Analyzing fingertip patterns
 Facial recognition/face location—Measuring
facial characteristics
 Hand geometry—Measuring the shape of the hand
 Iris scan—Analyzing features of colored ring of the eye.
 Retinal scan—Analyzing blood vessels in the eye
 Vascular patterns—Analyzing vein patterns
 DNA—Analyzing genetic makeup.
 Earprint—this method is based on geometric distances,
force field transformation
ADVANTAGES:-
Biometrics cannot be lost, stolen or forgotten.
Barring disease or serious physical injury, the
biometric is consistent and permanent.
 It is also secure in that the biometric itself
cannot be socially engineered, shared or used
by others.
There is no requirement to remember passwords,
or PINs, thus eliminating an overhead cost. The
biometric is always available to the individual;
DIS ADVANTAGES:-
 Lack of standardization
 While the reliability and the accuracy of biometric
devices continues to improve.
 Biometric systems must be able to accommodate
changes to the biometric over time which may be
caused by ageing, illness or injury.
 The effectiveness of the sample collection process is
strongly influenced by environmental conditions, user
training and usability. For example, lighting, facial
orientations, expression, image resolution and the
wearing of hats can affect the quality of the sample.
CONCLUSION:-
 Library surveillance may take many forms, including
traditional reading and borrowing histories, RFID
tracking, e-book borrowing choices visible to outside
vendors like Amazon and Barnes and Noble, electronic
and web-based communication and interaction between
patrons and library staff, Internet browsing histories, and
video surveillance.
 The accumulation and aggregation of these forms of
surveillance data can potentially pose a threat to the
privacy of library patrons and staff in conflict with library
commitments to privacy and intellectual freedom,
especially if libraries do not establish policies to ensure
prompt deletion or when local or national laws may not
adequately protect all these forms of library records.
REFERENCES:-
 Ainley, R. (1998). Watching the detectors: control and the
Panopticon. In New Frontiers of Space, Bodies and Gender. (pp.
88–100). London: Routledge.
 American Library Association. (2006). Questions and Answers on
Privacy and Confidentiality. Retrieved from
http://www.ala.org/Template.cfm?Section=interpretations&Tmplat
e=/ContentManagement/ContentDisplay.cfm&ContentID=15347.
Bernhard v. City of Ontario. (2008).
 Biale, N. (2008). Expert Findings on Surveillance Cameras: What
Criminologists and Others Studying Cameras Have Found.
American Civil Liberties Union. Retrieved August 15, 2013, from
http://www.aclu.org/privacy/ 35775res20080625.html
 CILIP. (2008). CILIP Survey on Police, Surveillance and
Libraries , June 2008, 1–7.
Electronic Surveillance by Kamal

More Related Content

What's hot

Moving to Manufacture_Internet of Things (Part 01)
Moving to Manufacture_Internet of Things (Part 01)Moving to Manufacture_Internet of Things (Part 01)
Moving to Manufacture_Internet of Things (Part 01)alengadan
 
Seminar report on blue eyes
Seminar report on blue eyesSeminar report on blue eyes
Seminar report on blue eyesRoshmi Sarmah
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Pavan Kumar MT
 
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec..."Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...Edge AI and Vision Alliance
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology workAlisha Korpal
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security PresentationPrabh Jeet
 
Pattern Recognition
Pattern RecognitionPattern Recognition
Pattern RecognitionMaaz Hasan
 
modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches Venkat Projects
 
Different Types of Information Systems Alexis Chua SYANDES K31
Different Types of  Information Systems  Alexis Chua SYANDES K31Different Types of  Information Systems  Alexis Chua SYANDES K31
Different Types of Information Systems Alexis Chua SYANDES K31Alexis Chua
 
Voice morphing ppt
Voice morphing pptVoice morphing ppt
Voice morphing ppthimadrigupta
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face RecognitionNanditaDutta4
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processingshahab islam
 
Prediction of heart disease using machine learning.pptx
Prediction of heart disease using machine learning.pptxPrediction of heart disease using machine learning.pptx
Prediction of heart disease using machine learning.pptxkumari36
 

What's hot (20)

Moving to Manufacture_Internet of Things (Part 01)
Moving to Manufacture_Internet of Things (Part 01)Moving to Manufacture_Internet of Things (Part 01)
Moving to Manufacture_Internet of Things (Part 01)
 
Seminar report on blue eyes
Seminar report on blue eyesSeminar report on blue eyes
Seminar report on blue eyes
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec..."Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Pattern Recognition
Pattern RecognitionPattern Recognition
Pattern Recognition
 
modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches
 
Different Types of Information Systems Alexis Chua SYANDES K31
Different Types of  Information Systems  Alexis Chua SYANDES K31Different Types of  Information Systems  Alexis Chua SYANDES K31
Different Types of Information Systems Alexis Chua SYANDES K31
 
Voice morphing ppt
Voice morphing pptVoice morphing ppt
Voice morphing ppt
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face Recognition
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Hand gesture recognition
Hand gesture recognitionHand gesture recognition
Hand gesture recognition
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
 
Prediction of heart disease using machine learning.pptx
Prediction of heart disease using machine learning.pptxPrediction of heart disease using machine learning.pptx
Prediction of heart disease using machine learning.pptx
 

Similar to Electronic Surveillance by Kamal

SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURESSECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURESIAEME Publication
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein TechnologySai Divya
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingsanjaymps
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegenceLovely Singla
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile applicationAlexander Decker
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
 
The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...
The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...
The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...ShivaniMeena42
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensicsijtsrd
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillancePuneet soni
 
The Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing coThe Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing cocarmanl5wisc
 
The Invisible Eye
The Invisible EyeThe Invisible Eye
The Invisible Eyeijtsrd
 
Biometric Security in Mobile Age
Biometric Security in Mobile AgeBiometric Security in Mobile Age
Biometric Security in Mobile AgeIRJET Journal
 
IRJET-Experimental Investigation on Mechanical & Durability of Concrete Conta...
IRJET-Experimental Investigation on Mechanical & Durability of Concrete Conta...IRJET-Experimental Investigation on Mechanical & Durability of Concrete Conta...
IRJET-Experimental Investigation on Mechanical & Durability of Concrete Conta...IRJET Journal
 
Internet Of things (IoT) ppt
Internet Of things (IoT) pptInternet Of things (IoT) ppt
Internet Of things (IoT) pptAhibaPathan
 
Thesis
ThesisThesis
Thesiscas123
 
Thesis
ThesisThesis
Thesiscas123
 

Similar to Electronic Surveillance by Kamal (20)

SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURESSECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegence
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...
The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...
The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
403 10
403 10403 10
403 10
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
 
The Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing coThe Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing co
 
The Invisible Eye
The Invisible EyeThe Invisible Eye
The Invisible Eye
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Biometric Security in Mobile Age
Biometric Security in Mobile AgeBiometric Security in Mobile Age
Biometric Security in Mobile Age
 
IRJET-Experimental Investigation on Mechanical & Durability of Concrete Conta...
IRJET-Experimental Investigation on Mechanical & Durability of Concrete Conta...IRJET-Experimental Investigation on Mechanical & Durability of Concrete Conta...
IRJET-Experimental Investigation on Mechanical & Durability of Concrete Conta...
 
Internet Of things (IoT) ppt
Internet Of things (IoT) pptInternet Of things (IoT) ppt
Internet Of things (IoT) ppt
 
Iris ppt
Iris ppt Iris ppt
Iris ppt
 
Thesis
ThesisThesis
Thesis
 
Thesis
ThesisThesis
Thesis
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 

Electronic Surveillance by Kamal

  • 1. ELECTRONIC SURVEILLANCE IN LIBRARY……. -KAMAL NOVA. A M.LIB.I.SC. SUNIVERSITY OF MADRAS
  • 2. INTRODUCTION :  Libraries have long maintained strong protections for patron privacy and intellectual freedom. However, the increasing prevalence of sophisticated surveillance systems in public libraries potentially threatens these core library commitments.  Video surveillance is an ever-increasing issue in modern society. More and more security cameras and other surveillance technologies such as drones, biometric recording, facial recognition and even genetic profiling tools are becoming prevalent in our everyday lives.  Current large-scale security systems with networked video cameras, expansive control rooms, roaming security guards, and the incorporation of other cutting edge technologies,  Panopticon designs of the English social theorist Jeremy Bentham (Mike, 1990; Norris, 2003). “The possibility that the modern public library, the with profession’s long held commitment to privacy and intellectual freedom, could be compared to Bentham’s panoptic prison in which the few – as largely unobservable observers – watch the many in an act of power and domination, is striking”.
  • 3. DEFINITION OF SURVEILLANCE :  “Library users should have the right to personal privacy and anonymity. Librarians and other library staff should not disclose the identity of users or the materials they use to a third party” (IFLA, 1999).  “...high-resolution surveillance equipment is capable of recording patron reading and viewing habits in ways that are as revealing as the written circulation records libraries routinely protect…. Since any such personal information is sensitive and has the potential to be used inappropriately in the wrong hands, gathering surveillance data has serious implications for library management” (American Library Association, 2006)
  • 4. CONT..  “provide a safe and secure facility for library employees, library resources and equipment, and library patrons” (McComb, 2004).  close watch kept over someone or something (as by a detective); (Merriam-Webster ) ACT 1. Section 69 of the Information Technology Act, 2000 [Amended 2008] empowers government to intercept, monitor or decrypt any data or information stored on any computer resources for the reason of public safety, public order, etc.
  • 5. LIBRARY SURVEILLANCE TWO TYPES…. Physical Technical  Physical could be men and  Technical could be Electronic
  • 6. DIFFERENT TYPES OF SURVEILLANCE Electronic Surveillance:  Radio Frequency Identification (RFID)  Closed Circuit Television (CCTV)  Biometric System  Electromagnetic Strips  Access Control Systems  Movement Dectector  BarCode  Alarm system..
  • 7. OTHER TYPES: Computer Surveillance:  Social Network Analysis a) Facebook b) MySpace c) Twitter  Carnivore  NarusInsight  "Magic Lantern“  CIPAV  TEMPEST  "Pinwale“
  • 8. AUDIO SURVEILLANCE :  Telephones/Mobile Devices a) Wiretap b) Bugs c) Multilateration d) Pen Register e) Trap Device f) Trace Device…
  • 10. CCTV : Video surveillance and closed-circuit television (CCTV) systems serve as a way to monitor and record security, deter crime and ensure safety. Advances in CCTV technology and reduction in cost have also made video surveillance a cost effective management tool for library facilities. McCahill and Norris (2002) noted that “libraries can use closed-circuit television (CCTV) to identify visitors and employees, monitor work areas, deter theft and ensure the security can also use to monitor and record evidence on clientele and staff misconduct in the library. CCTv systems are quickly becoming one of the most important and economic security and safety tools available to libraries.
  • 11. THE KEY STEPS WHEN CONSIDERING THE DESIGNING A CCTV SYSTEM FOR LIBRARY ACCORDING TO MCCAHILL AND NORRIS (2002), INCLUDES :-  Determine the primary application of the CCTV system  Define the layout and characteristics of the control area(s) of the library building  Decide on camera type and features  Determine the best location for viewing monitors  Determine the best method of signal transmission  Decide on the type of recording/archival equipment for the system
  • 12. ACCORDING TO MARCUS (2007), THESE SURVEILLANCE MOTION DETECTION IMAGING AND CAMERA CAN BE USED TO MONITOR THE FOLLOWING PLACES IN THE LIBRARY PREMISES:  Monitor driveway to the library building  Monitor the parking area of the library  Monitor the library shelf areas  Monitor the library equipment, such as library computers located in each offices  Monitor the movement of staff and users within the library  Monitor the exchange of materials within the library, etc.
  • 13. CCTV SYSTEM TYPES: CCTV systems are broadly divided into two types. These are:  1.Wired CCTV system  2.Wireless CCTV system DEFINITION: “clearly established that CCTV is a solution to the problem and that there are not other effective solutions with less impact on privacy” (CILIP, 2011).
  • 14. CCTV CAMERA BENEFITS:-  Maintaining perimeter security in medium-to high- secure areas and installations.  Observing behavior of incarcerated inmates and potentially dangerous patients in medical facilities.  Traffic monitoring  Building and ground security  Overseeing location that would be hazardous to a human.
  • 15. CONT…  In educational institutions, instead of inspecting the various departments and sections periodically, video surveillance and remote monitoring can be used for an effective management..  CCTV can be used in libraries to monitor the student activities and their behavior in the library. The common mischievous activities in the libraries like tearing of the pages from the books, hiding the books, sitting in corners and gossiping and book theft can be reduced to a great extent.
  • 16. CCTV CAMERA TYPES :-  Indoor Camera  Outdoor camera  IR day/Night Camera  Dome Camera  Bullet Camera  Vandal Proof Camera  Hidden Camera  Pen Tilt Zoom Camera
  • 17. INDOOR CAMERA  Indoor camera as its name suggests used for indoor security mechanism.Theseare suitable for security in homes,schools,offices,hotelsetc…
  • 18. IR DAY/NIGHT CAMERA  IR day/night cameras are used for high alert security areas were surveillance needs to happened day and night. These cameras are used by military personal,in parking lots and high security zones.
  • 19. DOME CAMERA  Cameras are installed inside a dark dome and are design in a way that they go unnoticed by visitors. These cameras can be rotated and tilted Manually
  • 20. BIOMETRIC (IDENTIFICATION BASE ON BIOLOGICAL TRAITS)  To measure and analyse both physiological and behavioural characteristics of human beings.  Biometrics include fingerprints, iris recognition, voice pattern,  Men having unique characteristics so that identifications and distinguishing them is very easy  No possibilities of duplication, hacking, forgetting, steel etc…  Not necessarily to remember or memorise the passwords and Pin For Examples: Adhar Card..
  • 21. USE OF BIOMETRICS  With the increased use of computers for data storage and easy retrieval methods, the  biometric techniques can prevent unauthorized access to ATMs, Cellular phones, Smart cards, desktop personal computers, workstations and computer networks.  In a personal identification system, emphasis is on verifying the identity of the authorized user.  Hence, it is assumed that the user of such system will cooperate when he makes a claim for identity.
  • 22. TYPES OF BIOMETRICS Physical biometrics:  Fingerprint—Analyzing fingertip patterns  Facial recognition/face location—Measuring facial characteristics  Hand geometry—Measuring the shape of the hand  Iris scan—Analyzing features of colored ring of the eye.  Retinal scan—Analyzing blood vessels in the eye  Vascular patterns—Analyzing vein patterns  DNA—Analyzing genetic makeup.  Earprint—this method is based on geometric distances, force field transformation
  • 23. ADVANTAGES:- Biometrics cannot be lost, stolen or forgotten. Barring disease or serious physical injury, the biometric is consistent and permanent.  It is also secure in that the biometric itself cannot be socially engineered, shared or used by others. There is no requirement to remember passwords, or PINs, thus eliminating an overhead cost. The biometric is always available to the individual;
  • 24. DIS ADVANTAGES:-  Lack of standardization  While the reliability and the accuracy of biometric devices continues to improve.  Biometric systems must be able to accommodate changes to the biometric over time which may be caused by ageing, illness or injury.  The effectiveness of the sample collection process is strongly influenced by environmental conditions, user training and usability. For example, lighting, facial orientations, expression, image resolution and the wearing of hats can affect the quality of the sample.
  • 25. CONCLUSION:-  Library surveillance may take many forms, including traditional reading and borrowing histories, RFID tracking, e-book borrowing choices visible to outside vendors like Amazon and Barnes and Noble, electronic and web-based communication and interaction between patrons and library staff, Internet browsing histories, and video surveillance.  The accumulation and aggregation of these forms of surveillance data can potentially pose a threat to the privacy of library patrons and staff in conflict with library commitments to privacy and intellectual freedom, especially if libraries do not establish policies to ensure prompt deletion or when local or national laws may not adequately protect all these forms of library records.
  • 26. REFERENCES:-  Ainley, R. (1998). Watching the detectors: control and the Panopticon. In New Frontiers of Space, Bodies and Gender. (pp. 88–100). London: Routledge.  American Library Association. (2006). Questions and Answers on Privacy and Confidentiality. Retrieved from http://www.ala.org/Template.cfm?Section=interpretations&Tmplat e=/ContentManagement/ContentDisplay.cfm&ContentID=15347. Bernhard v. City of Ontario. (2008).  Biale, N. (2008). Expert Findings on Surveillance Cameras: What Criminologists and Others Studying Cameras Have Found. American Civil Liberties Union. Retrieved August 15, 2013, from http://www.aclu.org/privacy/ 35775res20080625.html  CILIP. (2008). CILIP Survey on Police, Surveillance and Libraries , June 2008, 1–7.