Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
F.M, Okikiola
- E-Intruders Monitoring and Criminal Evidence System in a Construction Site: A Proactive Approach to Mitigate Corrupt Practices in Project Finances and Contractual Relationships
Abstract Views :175 |
PDF Views:0
Authors
Affiliations
1 Computer Engineering Department, Yaba College of Technology, NG
2 Computer Technology Department, Yaba College of Technology, NG
3 Quantity Surveying Department, Yaba College of Technology, NG
1 Computer Engineering Department, Yaba College of Technology, NG
2 Computer Technology Department, Yaba College of Technology, NG
3 Quantity Surveying Department, Yaba College of Technology, NG
Source
International Journal of Advanced Networking and Applications, Vol 13, No 4 (2022), Pagination: 5052-5056Abstract
Insecurity in Nigeria has shown significant growth thereby showing the flaws in the security system of the nation. This has led to the citizens clamoring for a system that works in tackling the potential and future security threats. The perpetrators of the criminal are majorly the intruders. E-security monitoring and criminal evidence system is a globally recognized and trusted device that has the capability of providing security alternatives in society. This tool is seen as a means of cautioning intruder’s activities which in return leads of less or no crime. This research work explores the influence of e-security intruder monitoring and criminal evidence system on the behavior of individuals and extends the discourse analysis to interpreting insecurity occurrences in our society to investigate and find meanings that construct social reality.Keywords
Insecurity, Intruders, Crime Prevention, E-Security, Criminal, Crime Evidence, Security System.References
- Abeer S. J. (2015) “Designing A Digital System for the Security of a Building Based on Behavioral Tracking”, University of Technology, Computer Science Department, 2015.
- Bui D. C, et.al, (2013) “Real-time Zoom Tracking for DM36x-based IP Network Camera”, Journal of Korea Multimedia Society, vol. 16, no. 1, pp 12611271, 2013.
- Elizabeth L. K. (2011) “The cons of analog cameras”, available at http://ipvideomarket.info/report/cctvsurveillance.ht m August 2011. Retrieved 13, January 2022.
- Farhan T. (2016)"understanding and planning of CCTV security systems", Life safety & security, 2016.
- P. Raghu Vamsi, Agrah Jain (2021) Practical Security Testing Of Electronic Commerce Web Applications: Int. J. Advanced Networking and Applications Volume: 13 Issue: 01 Pages: 48614873(2021) ISSN: 0975-0290
- Herring T. (2015) "The history of CCTV", available https://herringtechnology.com/news/the- history-ofcctv/, 2015. Retrieved December 31, 2022.
- Jea H. S, Hong R. K. (2013) “A new IP-based MultiChannel Elevator Video Surveillance System”, The Transactions of the Korean Institute of Electrical Engineers, vol. 62, no. 4, pp 164-168, 2013.
- Jong W. C. (2012) “A Study on the Network Based DVR(NVR)-GUI Design”, Journal of Digital Interaction Design, vol. 11, no. 3, pp 49-62, 2012.
- Joseph Q. (2013) “Overview of IP Camera Technology Report” pg 12-14, 2013
- Louis F. (2001) "Encryption and Cryptosystems in Electronic Surveillance: A Survey of the Technology Assessment Issues", 2001
- Moon W. (2008) "Electronic Security Systems", University Press, Cambridge UK, 2008, pg 66-75
- Oloyede Adetokunbo Olamide., Yekini Nureni Asafe., Onadokun Isaac Olawale., & Akinyele Okedola Akinleye (2027). Networking CCTV Cameras & Passive Infra-Red Sensors For EClassroom Monitoring System: Proactive Approach To Quality Assurance In Education System. Int. J. Advanced Networking and Applications Volume: 08 Issue: 05 Pages: 3213-3219 (2017) ISSN: 0975-0290.