{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"role-supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"products-popover":{"_type":"localeString","en":"Products","de":"die produkte","ru":"Продукты"},"introduction-popover":{"_type":"localeString","en":"introduction","ru":"внедрения"},"partners-popover":{"ru":"партнеры","_type":"localeString","en":"partners"},"update-profile-button":{"ru":"Обновить профиль","_type":"localeString","en":"Update profile"},"read-more-button":{"ru":"Показать ещё","_type":"localeString","en":"Show more"},"hide-button":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"user-implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"categories":{"en":"Categories","ru":"Компетенции","_type":"localeString"},"description":{"_type":"localeString","en":"Description","ru":"Описание"},"role-user":{"ru":"Пользователь","_type":"localeString","en":"User"},"partnership-vendors":{"_type":"localeString","en":"Partnership with vendors","ru":"Партнерство с производителями"},"partnership-suppliers":{"ru":"Партнерство с поставщиками","_type":"localeString","en":"Partnership with suppliers"},"reference-bonus":{"en":"Bonus 4 reference","ru":"Бонус за референс","_type":"localeString"},"partner-status":{"ru":"Статус партнёра","_type":"localeString","en":"Partner status"},"country":{"ru":"Страна","_type":"localeString","en":"Country"},"partner-types":{"_type":"localeString","en":"Partner types","ru":"Типы партнеров"},"branch-popover":{"en":"branch","ru":"область деятельности","_type":"localeString"},"employees-popover":{"en":"number of employees","ru":"количество сотрудников","_type":"localeString"},"partnership-programme":{"ru":"Партнерская программа","_type":"localeString","en":"Partnership program"},"partner-discounts":{"en":"Partner discounts","ru":"Партнерские скидки","_type":"localeString"},"registered-discounts":{"_type":"localeString","en":"Additional benefits for registering a deal","ru":"Дополнительные преимущества за регистрацию сделки"},"additional-advantages":{"_type":"localeString","en":"Additional Benefits","ru":"Дополнительные преимущества"},"additional-requirements":{"en":"Partner level requirements","ru":"Требования к уровню партнера","_type":"localeString"},"certifications":{"ru":"Сертификация технических специалистов","_type":"localeString","en":"Certification of technical specialists"},"sales-plan":{"ru":"Годовой план продаж","_type":"localeString","en":"Annual Sales Plan"},"partners-vendors":{"_type":"localeString","en":"Partners-vendors","ru":"Партнеры-производители"},"partners-suppliers":{"ru":"Партнеры-поставщики","_type":"localeString","en":"Partners-suppliers"},"all-countries":{"en":"All countries","ru":"Все страны","_type":"localeString"},"supplied-products":{"_type":"localeString","en":"Supplied products","ru":"Поставляемые продукты"},"vendored-products":{"ru":"Производимые продукты","_type":"localeString","en":"Produced products"},"vendor-implementations":{"ru":"Производимые внедрения","_type":"localeString","en":"Produced deployments"},"supplier-implementations":{"ru":"Поставляемые внедрения","_type":"localeString","en":"Supplied deployments"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"not-yet-converted":{"_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время."},"schedule-event":{"ru":"Pасписание событий","_type":"localeString","en":"Events schedule"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"register":{"ru":"Регистрация ","_type":"localeString","en":"Register"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"auth-message":{"ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To view company events please log in or register on the sit."},"company-presentation":{"ru":"Презентация компании","_type":"localeString","en":"Company presentation"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"ru":"Вход","_type":"localeString","en":"Log in","de":"Einloggen"},"logout":{"en":"Sign out","ru":"Выйти","_type":"localeString"},"faq":{"ru":"FAQ","_type":"localeString","en":"FAQ","de":"FAQ"},"references":{"en":"Requests","de":"References","ru":"Мои запросы","_type":"localeString"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"en":"Comparison Matrix","ru":"Матрица сравнения","_type":"localeString"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"en":"Enter your search term","ru":"Введите поисковый запрос","_type":"localeString"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"en":"Our IT Catalogs","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"en":"Explore IT products by category","_type":"localeString"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"ru":"Тарифы","_type":"localeString","en":"Subscriptions","de":"Tarife"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"_type":"localeString","en":"we pay for content","ru":"платим за контент"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"en":"Show form","ru":"Показать форму","_type":"localeString"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"_type":"localeString","en":"Leave comment","ru":"Оставить комментарий"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"title":{"en":"ROI4CIO: Company","ru":"ROI4CIO: Компания","_type":"localeString"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}],"translatable_meta":[{"name":"title","translations":{"_type":"localeString","en":"Company","ru":"Компания"}},{"translations":{"ru":"Описание компании","_type":"localeString","en":"Company description"},"name":"description"},{"name":"keywords","translations":{"_type":"localeString","en":"Company keywords","ru":"Ключевые слова для компании"}}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"vix-vizion":{"id":9325,"title":"Vix Vizion","logoURL":"https://old.roi4cio.com/uploads/roi/company/1588735427524.jpg","alias":"vix-vizion","address":"","roles":[{"id":2,"type":"supplier"},{"id":3,"type":"vendor"}],"description":"<span lang=\"EN\">Vix Vizion Pty Ltd (formerly Imagus Technology) is one of the world leaders in video analytics and face recognition technologies using advanced deep machine learning algorithms. The company was founded in January 2011 in Brisbane (Australia) by a group of machine learning and data specialists. Today, Vix Vizion specializes in developing fast, accurate and reliable video analytics solutions in industries such as technical security, identification, access control, customer service / healthcare, retail, marketing and transportation.</span>","companyTypes":["supplier","vendor"],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{"48":{"id":48,"title":"CCTV - Closed-circuit television","description":"CCTV (closed-circuit television) is a TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.\r\nCCTV relies on strategic placement of cameras, and observation of the camera's input on monitors somewhere. Because the cameras communicate with monitors and/or video recorders across private coaxial cable runs or wireless communication links, they gain the designation "closed-circuit" to indicate that access to their content is limited by design only to those able to see it.\r\nOlder CCTV systems used small, low-resolution black and white monitors with no interactive capabilities. Modern CCTV displays can be color, high-resolution displays and can include the ability to zoom in on an image or track something (or someone) among their features. Talk CCTV allows an overseer to speak to people within range of the camera's associated speakers.\r\nCCTV is commonly used for a variety of purposes, including:\r\n<ul><li>Maintaining perimeter security in medium- to high-secure areas and installations.</li><li>Observing the behavior of incarcerated inmates and potentially dangerous patients in medical facilities.</li><li>Traffic monitoring.</li><li>Overseeing locations that would be hazardous to a human, for example, highly radioactive or toxic industrial environments.</li><li>Building and grounds security.</li><li>Obtaining a visual record of activities in situations where it is necessary to maintain proper security or access controls (for example, in a diamond cutting or sorting operation; in banks, casinos, or airports).</li></ul>\r\nCCTV is finding increasing use in law-enforcement, for everything from traffic observation (and automated ticketing) to an observation of high-crime areas or neighborhoods. Such use of CCTV technology has fueled privacy concerns in many parts of the world, particularly in those areas in the UK and Europe where it has become a routine part of police procedure.","materialsDescription":" <span style=\"text-decoration: underline; \"><span style=\"font-weight: bold; \">Uses</span></span>\r\n<span style=\"font-weight: bold; \">Crime prevention</span>\r\nA 2009 systematic review by researchers from Northeastern University and University of Cambridge used meta-analytic techniques to pool the average effect of CCTV on crime across 41 different studies. The results indicated that\r\n<ul><li>CCTV caused a significant reduction of crime by on average 16%.</li><li>The largest effects of CCTV were found in car parks, where cameras reduced crime by on average 51%.</li><li>CCTV schemes in other public settings had small and non-statistically significant effects on crime: 7% reduction in city and town centers and 23% reduction in public transport settings.</li><li>When sorted by country, systems in the United Kingdom accounted for the majority of the decrease; the drop in other areas was insignificant.</li></ul>\r\nThe studies included in the meta-analysis used quasi-experimental evaluation designs that involve before-and-after measures of crime in experimental and control areas. However, several researchers have pointed to methodological problems associated with this research literature. First, researchers have argued that the British car park studies included in the meta-analysis cannot accurately control for the fact that CCTV was introduced simultaneously with a range of other security-related measures. Second, some have noted that, in many of the studies, there may be issues with selection bias since the introduction of CCTV was potentially endogenous to previous crime trends.[30] In particular, the estimated effects may be biased if CCTV is introduced in response to crime trends.\r\nIt has been argued that problems of selection bias and endogeneity can be addressed by stronger research designs such as randomized controlled trials and natural experiments. A 2017 review published in Journal of Scandinavian Studies in Criminology and Crime Prevention compiles seven studies that use such research designs. The studies included in the review found that CCTV reduced crime by 24-28% in public streets and urban subway stations. It also found that CCTV could decrease unruly behaviour in football stadiums and theft in supermarkets/mass merchant stores. However, there was no evidence of CCTV having desirable effects in parking facilities or suburban subway stations. Furthermore, the review indicates that CCTV is more effective in preventing property crimes than in violent crimes.\r\nAnother question in the effectiveness of CCTV for policing is around uptime of the system; in 2013 City of Philadelphia Auditor found that the $15M system was operational only 32% of the time. There is still much research to be done to determine the effectiveness of CCTV cameras on crime prevention before any conclusions can be drawn.\r\nThere is strong anecdotal evidence that CCTV aids in detection and conviction of offenders; indeed UK police forces routinely seek CCTV recordings after crimes. Moreover, CCTV has played a crucial role in tracing the movements of suspects or victims and is widely regarded by antiterrorist officers as a fundamental tool in tracking terrorist suspects. Large-scale CCTV installations have played a key part of the defences against terrorism since the 1970s. Cameras have also been installed on public transport in the hope of deterring crime, and in mobile police surveillance vehicles, often with automatic number plate recognition, and a network of APNI-linked cameras is used to manage London's congestion charging zone.\r\nA more open question is whether most CCTV is cost-effective. While low-quality domestic kits are cheap the professional installation and maintenance of high definition CCTV is expensive. Gill and Spriggs did a Cost-effectiveness analysis (CEA) of CCTV in crime prevention that showed little monetary saving with the installation of CCTV as most of the crimes prevented resulted in little monetary loss. Critics however noted that benefits of non-monetary value cannot be captured in a traditional Cost Effectiveness Analysis and were omitted from their study. A 2008 Report by UK Police Chiefs concluded that only 3% of crimes were solved by CCTV. In London, a Metropolitan Police report showed that in 2008 only one crime was solved per 1000 cameras. In some cases CCTV cameras have become a target of attacks themselves.\r\nCities such as Manchester in the UK are using DVR-based technology to improve accessibility for crime prevention.\r\nIn October 2009, an "Internet Eyes" website was announced which would pay members of the public to view CCTV camera images from their homes and report any crimes they witnessed. The site aimed to add "more eyes" to cameras which might be insufficiently monitored. Civil liberties campaigners criticized the idea as "a distasteful and a worrying development".\r\nIn 2013 Oaxaca hired deaf police officers to lip read conversations to uncover criminal conspiracies.\r\nIn Singapore, since 2012, thousands of CCTV cameras have helped deter loan sharks, nab litterbugs and stop illegal parking, according to government figures.\r\n<span style=\"font-weight: bold; \">Body worn</span>\r\nIn recent years, the use of body worn video cameras has been introduced for a number of uses. For example, as a new form of surveillance in law enforcement, with cameras located on a police officer's chest or head.\r\n<span style=\"font-weight: bold; \">Industrial processes</span>\r\nIndustrial processes that take place under conditions dangerous for humans are today often supervised by CCTV. These are mainly processes in the chemical industry, the interior of reactors or facilities for manufacture of nuclear fuel. Special cameras for some of these purposes include line-scan cameras and thermographic cameras which allow operators to measure the temperature of the processes. The usage of CCTV in such processes is sometimes required by law.\r\n<span style=\"font-weight: bold; \">Traffic monitoring</span>\r\nMany cities and motorway networks have extensive traffic-monitoring systems, using closed-circuit television to detect congestion and notice accidents. Many of these cameras however, are owned by private companies and transmit data to drivers' GPS systems.\r\nThe UK Highways Agency has a publicly owned CCTV network of over 3000 Pan-Tilt-Zoom cameras covering the British motorway and trunk road network. These cameras are primarily used to monitor traffic conditions and are not used as speed cameras. With the addition of fixed cameras for the active traffic management system, the number of cameras on the Highways Agency's CCTV network is likely to increase significantly over the next few years.\r\nThe London congestion charge is enforced by cameras positioned at the boundaries of and inside the congestion charge zone, which automatically read the licence plates of cars. If the driver does not pay the charge then a fine will be imposed. Similar systems are being developed as a means of locating cars reported stolen.\r\nOther surveillance cameras serve as traffic enforcement cameras.\r\n<span style=\"font-weight: bold; \">Transport safety</span>\r\nA CCTV system may be installed where any example, on a Driver-only operated train CCTV cameras may allow the driver to confirm that people are clear of doors before closing them and starting the train.\r\n<span style=\"font-weight: bold; \">Sporting events</span>\r\nMany sporting events in the United States use CCTV inside the venue for fans to see the action while they are away from their seats. The cameras send the feed to a central control center where a producer selects feeds to send to the television monitors that fans can view. CCTV monitors for viewing the event by attendees are often placed in lounges, hallways, and restrooms. This use of CCTV is not used for surveillance purposes.\r\n<span style=\"font-weight: bold; \">Monitor employees</span>\r\nOrganizations use CCTV to monitor the actions of workers. Every action is recorded as an information block with subtitles that explain the performed operation. This helps to track the actions of workers, especially when they are making critical financial transactions, such as correcting or cancelling of a sale, withdrawing money or altering personal information.\r\nActions which an employer may wish to monitor could include:\r\n<ul><li>Scanning of goods, selection of goods, introduction of price and quantity;</li><li>Input and output of operators in the system when entering passwords;</li><li>Deleting operations and modifying existing documents;</li><li>Implementation of certain operations, such as financial statements or operations with cash;</li><li>Moving goods, revaluation scrapping and counting;</li><li>Control in the kitchen of fast food restaurants;</li><li>Change of settings, reports and other official functions.</li></ul>\r\nEach of these operations is transmitted with a description, allowing detailed monitoring of all actions of the operator. Some systems allow the user to search for a specific event by time of occurrence and text description, and perform statistical evaluation of operator behaviour. This allows the software to predict deviations from the standard workflow and record only anomalous behaviour.\r\n<span style=\"font-weight: bold; \">Use in schools</span>\r\nIn the United States, Britain, Australia and New Zealand, CCTV is widely used in schools due to its success in preventing bullying, vandalism, monitoring visitors and maintaining a record of evidence in the event of a crime. There are some restrictions on installation, with cameras not being installed in an area where there is a "reasonable expectation of privacy", such as bathrooms, gym locker areas and private offices (unless consent by the office occupant is given). Сameras are generally acceptable in hallways, parking lots, front offices where students, employees, and parents come and go, gymnasiums, cafeterias, supply rooms and classrooms. The installation of cameras in classrooms may be objected to by some teachers.\r\n<span style=\"font-weight: bold; \">Criminal use</span>\r\nCriminals may use surveillance cameras to monitor the public. For example, a hidden camera at an ATM can capture people's PINs as they are entered, without their knowledge. The devices are small enough not to be noticed, and are placed where they can monitor the keypad of the machine as people enter their PINs. Images may be transmitted wirelessly to the criminal. Even lawful surveillance cameras sometimes have their data go into the hands of people who have no legal right to receive it.\r\n\r\n<span style=\"text-decoration: underline; \"><span style=\"font-weight: bold; \">Technological developments</span></span>\r\n<span style=\"font-weight: bold; \">Computer-controlled analytics and identification</span>\r\nComputer-controlled cameras can identify, track, and categorize objects in their field of view.\r\n<span style=\"font-weight: bold; \">Video content analysis (VCA)</span> is the capability of automatically analyzing video to detect and determine temporal events not based on a single image, but rather object classification. As such, it can be seen as the automated equivalent of the biological visual cortex.\r\nA system using VCA can recognize changes in the environment and even identify and compare objects in the database using size, speed, and sometimes colour. The camera's actions can be programmed based on what it is "seeing". For example; an alarm can be issued if an object has moved in a certain area, or if a painting is missing from a wall, or if a smoke or fire is detected, or if running people are detected, or if fallen people are detected and if someone has spray painted the lens, as well as video loss, lens cover, defocus and other so called camera tampering events.\r\nVCA analytics can also be used to detect unusual patterns in an environment. The system can be set to detect anomalies in a crowd, for instance a person moving in the opposite direction in airports where passengers are supposed to walk only in one direction out of a plane or in a subway where people are not supposed to exit through the entrances.\r\nVCA can track people on a map by calculating their position from the images. It is then possible to link many cameras and track a person through an entire building or area. This can allow a person to be followed without having to analyze many hours of film. Currently the cameras have difficulty identifying individuals from video alone, but if connected to a key-card system, identities can be established and displayed as a tag over their heads on the video.\r\nThere is also a significant difference in where the VCA technology is placed, either the data is being processed within the cameras (on the edge) or by a centralized server. Both technologies have their pros and cons.\r\nA <span style=\"font-weight: bold; \">facial recognition system</span> is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database.\r\nThe combination of CCTV and facial recognition has been tried as a form of mass surveillance, but has been ineffective because of the low discriminating power of facial recognition technology and the very high number of false positives generated. This type of system has been proposed to compare faces at airports and seaports with those of suspected terrorists or other undesirable entrants.[citation needed] Computerized monitoring of CCTV images is under development, so that a human CCTV operator does not have to endlessly look at all the screens, allowing an operator to observe many more CCTV cameras.[citation needed] These systems do not observe people directly. Insta Types of body-movement behavior, or particular types of clothing or baggage.\r\nTo many, the development of CCTV in public areas, linked to computer databases of people's pictures and identity, presents a serious breach of civil liberties. Conservative critics fear the possibility that one would no longer have anonymity in public places. Demonstrations or assemblies in public places could be affected as the state would be able to collate lists of those leading them, taking part, or even just talking with protesters in the street.\r\nComparatively harmless are people counter systems. They use CCTV equipment as front end eyes of devices which perform shape recognition technology in order to identify objects as human beings and count people passing pre-defined areas.\r\n<span style=\"font-weight: bold; \">Retention, storage and preservation</span>\r\nMost CCTV systems may record and store digital video and images to a digital video recorder (DVR) or, in the case of IP cameras, directly to a server, either on-site or offsite.\r\nThere is a cost in the retention of the images produced by CCTV systems. The amount and quality of data stored on storage media is subject to compression ratios, images stored per second, image size and is effected by the retention period of the videos or images. DVRs store images in a variety of proprietary file formats. Recordings may be retained for a preset amount of time and then automatically archived, overwritten or deleted, the period being determined by the organisation that generated them.\r\nClosed-circuit digital photography (CCDP)\r\nClosed-circuit digital photography (CCDP) is more suited for capturing and saving recorded high-resolution photographs, whereas closed-circuit television (CCTV) is more suitable for live-monitoring purposes.\r\nHowever, an important feature of some CCTV systems is the ability to take high resolution images of the camera scene, e.g. on a time lapse or motion-detection basis. Images taken with a digital still camera often have higher resolution than those taken with some video cameras. Increasingly, low-cost high-resolution digital still cameras can also be used for CCTV purposes.\r\nImages may be monitored remotely when the computer is connected to a network.\r\n<span style=\"font-weight: bold; \">IP cameras</span>\r\nA growing branch in CCTV is internet protocol cameras (IP cameras). It is estimated that 2014 was the first year that IP cameras outsold analog cameras. IP cameras use the Internet Protocol (IP) used by most Local Area Networks (LANs) to transmit video across data networks in digital form. IP can optionally be transmitted across the public internet, allowing users to view their cameras through any internet connection available through a computer or a phone, this is considered remote access. For professional or public infrastructure security applications, IP video is restricted to within a private network or VPN, or can be recorded onto a remote server.\r\n<span style=\"font-weight: bold; \">Networking CCTV cameras</span>\r\nThe city of Chicago operates a networked video surveillance system which combines CCTV video feeds of government agencies with those of the private sector, installed in city buses, businesses, public schools, subway stations, housing projects etc. Even homeowners are able to contribute footage. It is estimated to incorporate the video feeds of a total of 15,000 cameras.\r\nThe system is used by Chicago's Office of Emergency Management in case of an emergency call: it detects the caller's location and instantly displays the real-time video feed of the nearest security camera to the operator, not requiring any user intervention. While the system is far too vast to allow complete real-time monitoring, it stores the video data for later usage in order to provide possible evidence in criminal cases.\r\nNew York City has a similar network called the Domain Awareness System.\r\nLondon also has a network of CCTV systems that allows multiple authorities to view and control CCTV cameras in real time. The system allows authorities including the Metropolitan Police Service, Transport for London and a number of London boroughs to share CCTV images between them. It uses a network protocol called Television Network Protocol to allow access to many more cameras than each individual system owner could afford to run and maintain.\r\nThe Glynn County Police Department uses a wireless mesh-networked system of portable battery-powered tripods for live megapixel video surveillance and central monitoring of tactical police situations. The systems can be used either on a stand-alone basis with secure communications to nearby police laptops, or within a larger mesh system with multiple tripods feeding video back to the command vehicle via wireless, and to police headquarters via 3G.\r\n<span style=\"font-weight: bold; \">Integrated systems</span>\r\nIntegrated systems allow different security systems, like CCTV, access control, intruder alarms and intercoms to operate together. For example, when an intruder alarm is activated, CCTV cameras covering the intrusion area are recorded at a higher frame rate and transmitted to an Alarm Receiving Centre.\r\n<span style=\"font-weight: bold; \">Wireless security cameras</span>\r\nMany consumers are turning to wireless security cameras for home surveillance. Wireless cameras do not require a video cable for video/audio transmission, simply a cable for power. Wireless cameras are also easy and inexpensive to install, but lack the reliability of hard-wired cameras. Previous generations of wireless security cameras relied on analog technology; modern wireless cameras use digital technology which delivers crisper audio, sharper video, and a secure and interference-free signal.\r\n<span style=\"font-weight: bold;\">Talking CCTV</span>\r\nIn Wiltshire, UK, 2003, a pilot scheme for what is now known as "Talking CCTV" was put into action; allowing operators of CCTV cameras to order offenders to stop what they were doing, ranging from ordering subjects to pick up their rubbish and put it in a bin to ordering groups of vandals to disperse. In 2005, Ray Mallon, the mayor and former senior police officer of Middlesbrough implemented "Talking CCTV" in his area.\r\nOther towns have had such cameras installed. In 2007 several of the devices were installed in Bridlington town centre, East Riding of Yorkshire.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CCTV.png","alias":"cctv-closed-circuit-television"}},"companySizes":"51 to 100 Employees","companyUrl":"https://www.vixvizion.com/","countryCodes":[],"certifications":[],"isSeller":true,"isSupplier":true,"isVendor":true,"presenterCodeLng":"","seo":{"title":"Vix Vizion","keywords":"","description":"<span lang=\"EN\">Vix Vizion Pty Ltd (formerly Imagus Technology) is one of the world leaders in video analytics and face recognition technologies using advanced deep machine learning algorithms. The company was founded in January 2011 in Brisbane (Australia) by","og:title":"Vix Vizion","og:description":"<span lang=\"EN\">Vix Vizion Pty Ltd (formerly Imagus Technology) is one of the world leaders in video analytics and face recognition technologies using advanced deep machine learning algorithms. The company was founded in January 2011 in Brisbane (Australia) by","og:image":"https://old.roi4cio.com/uploads/roi/company/1588735427524.jpg"},"eventUrl":"","vendorPartners":[],"supplierPartners":[],"vendoredProducts":[{"id":6758,"logo":false,"scheme":false,"title":"Imagus Intelligent Video Analytics","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"imagus-intelligent-video-analytics","companyTitle":"Vix Vizion","companyTypes":["supplier","vendor"],"companyId":9325,"companyAlias":"vix-vizion","description":"<span lang=\"EN-US\">Imagus Intelligent Video Analytics is a powerful and efficacious Face Recognition and Video Analytics solution, based on AI and machine learning algorithms. Imagus delivers fast accurate face detection, matching, recognition and tracking using advanced deep learning algorithms. </span>Imagus is effective with high or low densities of people in frame, even with poorly lit, poor quality, angled or obstructed views.\r\n\r\n<b><span lang=\"EN-US\">Main features:</span></b>\r\n\r\n<span style=\"font-weight: bold;\">Face Recognition</span>\r\n<ul><li>VIP / person of interest recognition, tracking and alerts in real time</li><li><span lang=\"EN-US\">Unknown associate identification</span></li><li><span lang=\"EN-US\">Forensic historic video database investigation</span></li><li><span lang=\"EN-US\">Privacy controls and facial blurring</span></li></ul>\r\n\r\n<span style=\"font-weight: bold;\"><span lang=\"EN-US\">Face Verification</span></span>\r\n<ul><li><span lang=\"EN-US\">Identity verification</span></li><li><span lang=\"EN-US\">Access control integration</span></li><li><span lang=\"EN-US\">Enhanced security</span></li><li><span lang=\"EN-US\">Liveness / anti-spoofing</span></li></ul>\r\n<span lang=\"EN-US\"> </span>\r\n<span style=\"font-weight: bold;\">Video Analytics</span>\r\n<ul><li>Intelligent video analytics for better business decision making</li><li>Age, gender, emotion</li><li>Crowd counting, direction, heatmaps, flow.</li><li>Marketing, planning, security, traffic flow, events</li></ul>","shortDescription":"Imagus Intelligent Video Analytics is a powerful and efficacious Face Recognition and Video Analytics solution, based on AI and machine learning algorithms.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Imagus Intelligent Video Analytics","keywords":"","description":"<span lang=\"EN-US\">Imagus Intelligent Video Analytics is a powerful and efficacious Face Recognition and Video Analytics solution, based on AI and machine learning algorithms. Imagus delivers fast accurate face detection, matching, recognition and tracking usi","og:title":"Imagus Intelligent Video Analytics","og:description":"<span lang=\"EN-US\">Imagus Intelligent Video Analytics is a powerful and efficacious Face Recognition and Video Analytics solution, based on AI and machine learning algorithms. Imagus delivers fast accurate face detection, matching, recognition and tracking usi"},"eventUrl":"","translationId":6758,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":48,"title":"CCTV - Closed-circuit television","alias":"cctv-closed-circuit-television","description":"CCTV (closed-circuit television) is a TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.\r\nCCTV relies on strategic placement of cameras, and observation of the camera's input on monitors somewhere. Because the cameras communicate with monitors and/or video recorders across private coaxial cable runs or wireless communication links, they gain the designation "closed-circuit" to indicate that access to their content is limited by design only to those able to see it.\r\nOlder CCTV systems used small, low-resolution black and white monitors with no interactive capabilities. Modern CCTV displays can be color, high-resolution displays and can include the ability to zoom in on an image or track something (or someone) among their features. Talk CCTV allows an overseer to speak to people within range of the camera's associated speakers.\r\nCCTV is commonly used for a variety of purposes, including:\r\n<ul><li>Maintaining perimeter security in medium- to high-secure areas and installations.</li><li>Observing the behavior of incarcerated inmates and potentially dangerous patients in medical facilities.</li><li>Traffic monitoring.</li><li>Overseeing locations that would be hazardous to a human, for example, highly radioactive or toxic industrial environments.</li><li>Building and grounds security.</li><li>Obtaining a visual record of activities in situations where it is necessary to maintain proper security or access controls (for example, in a diamond cutting or sorting operation; in banks, casinos, or airports).</li></ul>\r\nCCTV is finding increasing use in law-enforcement, for everything from traffic observation (and automated ticketing) to an observation of high-crime areas or neighborhoods. Such use of CCTV technology has fueled privacy concerns in many parts of the world, particularly in those areas in the UK and Europe where it has become a routine part of police procedure.","materialsDescription":" <span style=\"text-decoration: underline; \"><span style=\"font-weight: bold; \">Uses</span></span>\r\n<span style=\"font-weight: bold; \">Crime prevention</span>\r\nA 2009 systematic review by researchers from Northeastern University and University of Cambridge used meta-analytic techniques to pool the average effect of CCTV on crime across 41 different studies. The results indicated that\r\n<ul><li>CCTV caused a significant reduction of crime by on average 16%.</li><li>The largest effects of CCTV were found in car parks, where cameras reduced crime by on average 51%.</li><li>CCTV schemes in other public settings had small and non-statistically significant effects on crime: 7% reduction in city and town centers and 23% reduction in public transport settings.</li><li>When sorted by country, systems in the United Kingdom accounted for the majority of the decrease; the drop in other areas was insignificant.</li></ul>\r\nThe studies included in the meta-analysis used quasi-experimental evaluation designs that involve before-and-after measures of crime in experimental and control areas. However, several researchers have pointed to methodological problems associated with this research literature. First, researchers have argued that the British car park studies included in the meta-analysis cannot accurately control for the fact that CCTV was introduced simultaneously with a range of other security-related measures. Second, some have noted that, in many of the studies, there may be issues with selection bias since the introduction of CCTV was potentially endogenous to previous crime trends.[30] In particular, the estimated effects may be biased if CCTV is introduced in response to crime trends.\r\nIt has been argued that problems of selection bias and endogeneity can be addressed by stronger research designs such as randomized controlled trials and natural experiments. A 2017 review published in Journal of Scandinavian Studies in Criminology and Crime Prevention compiles seven studies that use such research designs. The studies included in the review found that CCTV reduced crime by 24-28% in public streets and urban subway stations. It also found that CCTV could decrease unruly behaviour in football stadiums and theft in supermarkets/mass merchant stores. However, there was no evidence of CCTV having desirable effects in parking facilities or suburban subway stations. Furthermore, the review indicates that CCTV is more effective in preventing property crimes than in violent crimes.\r\nAnother question in the effectiveness of CCTV for policing is around uptime of the system; in 2013 City of Philadelphia Auditor found that the $15M system was operational only 32% of the time. There is still much research to be done to determine the effectiveness of CCTV cameras on crime prevention before any conclusions can be drawn.\r\nThere is strong anecdotal evidence that CCTV aids in detection and conviction of offenders; indeed UK police forces routinely seek CCTV recordings after crimes. Moreover, CCTV has played a crucial role in tracing the movements of suspects or victims and is widely regarded by antiterrorist officers as a fundamental tool in tracking terrorist suspects. Large-scale CCTV installations have played a key part of the defences against terrorism since the 1970s. Cameras have also been installed on public transport in the hope of deterring crime, and in mobile police surveillance vehicles, often with automatic number plate recognition, and a network of APNI-linked cameras is used to manage London's congestion charging zone.\r\nA more open question is whether most CCTV is cost-effective. While low-quality domestic kits are cheap the professional installation and maintenance of high definition CCTV is expensive. Gill and Spriggs did a Cost-effectiveness analysis (CEA) of CCTV in crime prevention that showed little monetary saving with the installation of CCTV as most of the crimes prevented resulted in little monetary loss. Critics however noted that benefits of non-monetary value cannot be captured in a traditional Cost Effectiveness Analysis and were omitted from their study. A 2008 Report by UK Police Chiefs concluded that only 3% of crimes were solved by CCTV. In London, a Metropolitan Police report showed that in 2008 only one crime was solved per 1000 cameras. In some cases CCTV cameras have become a target of attacks themselves.\r\nCities such as Manchester in the UK are using DVR-based technology to improve accessibility for crime prevention.\r\nIn October 2009, an "Internet Eyes" website was announced which would pay members of the public to view CCTV camera images from their homes and report any crimes they witnessed. The site aimed to add "more eyes" to cameras which might be insufficiently monitored. Civil liberties campaigners criticized the idea as "a distasteful and a worrying development".\r\nIn 2013 Oaxaca hired deaf police officers to lip read conversations to uncover criminal conspiracies.\r\nIn Singapore, since 2012, thousands of CCTV cameras have helped deter loan sharks, nab litterbugs and stop illegal parking, according to government figures.\r\n<span style=\"font-weight: bold; \">Body worn</span>\r\nIn recent years, the use of body worn video cameras has been introduced for a number of uses. For example, as a new form of surveillance in law enforcement, with cameras located on a police officer's chest or head.\r\n<span style=\"font-weight: bold; \">Industrial processes</span>\r\nIndustrial processes that take place under conditions dangerous for humans are today often supervised by CCTV. These are mainly processes in the chemical industry, the interior of reactors or facilities for manufacture of nuclear fuel. Special cameras for some of these purposes include line-scan cameras and thermographic cameras which allow operators to measure the temperature of the processes. The usage of CCTV in such processes is sometimes required by law.\r\n<span style=\"font-weight: bold; \">Traffic monitoring</span>\r\nMany cities and motorway networks have extensive traffic-monitoring systems, using closed-circuit television to detect congestion and notice accidents. Many of these cameras however, are owned by private companies and transmit data to drivers' GPS systems.\r\nThe UK Highways Agency has a publicly owned CCTV network of over 3000 Pan-Tilt-Zoom cameras covering the British motorway and trunk road network. These cameras are primarily used to monitor traffic conditions and are not used as speed cameras. With the addition of fixed cameras for the active traffic management system, the number of cameras on the Highways Agency's CCTV network is likely to increase significantly over the next few years.\r\nThe London congestion charge is enforced by cameras positioned at the boundaries of and inside the congestion charge zone, which automatically read the licence plates of cars. If the driver does not pay the charge then a fine will be imposed. Similar systems are being developed as a means of locating cars reported stolen.\r\nOther surveillance cameras serve as traffic enforcement cameras.\r\n<span style=\"font-weight: bold; \">Transport safety</span>\r\nA CCTV system may be installed where any example, on a Driver-only operated train CCTV cameras may allow the driver to confirm that people are clear of doors before closing them and starting the train.\r\n<span style=\"font-weight: bold; \">Sporting events</span>\r\nMany sporting events in the United States use CCTV inside the venue for fans to see the action while they are away from their seats. The cameras send the feed to a central control center where a producer selects feeds to send to the television monitors that fans can view. CCTV monitors for viewing the event by attendees are often placed in lounges, hallways, and restrooms. This use of CCTV is not used for surveillance purposes.\r\n<span style=\"font-weight: bold; \">Monitor employees</span>\r\nOrganizations use CCTV to monitor the actions of workers. Every action is recorded as an information block with subtitles that explain the performed operation. This helps to track the actions of workers, especially when they are making critical financial transactions, such as correcting or cancelling of a sale, withdrawing money or altering personal information.\r\nActions which an employer may wish to monitor could include:\r\n<ul><li>Scanning of goods, selection of goods, introduction of price and quantity;</li><li>Input and output of operators in the system when entering passwords;</li><li>Deleting operations and modifying existing documents;</li><li>Implementation of certain operations, such as financial statements or operations with cash;</li><li>Moving goods, revaluation scrapping and counting;</li><li>Control in the kitchen of fast food restaurants;</li><li>Change of settings, reports and other official functions.</li></ul>\r\nEach of these operations is transmitted with a description, allowing detailed monitoring of all actions of the operator. Some systems allow the user to search for a specific event by time of occurrence and text description, and perform statistical evaluation of operator behaviour. This allows the software to predict deviations from the standard workflow and record only anomalous behaviour.\r\n<span style=\"font-weight: bold; \">Use in schools</span>\r\nIn the United States, Britain, Australia and New Zealand, CCTV is widely used in schools due to its success in preventing bullying, vandalism, monitoring visitors and maintaining a record of evidence in the event of a crime. There are some restrictions on installation, with cameras not being installed in an area where there is a "reasonable expectation of privacy", such as bathrooms, gym locker areas and private offices (unless consent by the office occupant is given). Сameras are generally acceptable in hallways, parking lots, front offices where students, employees, and parents come and go, gymnasiums, cafeterias, supply rooms and classrooms. The installation of cameras in classrooms may be objected to by some teachers.\r\n<span style=\"font-weight: bold; \">Criminal use</span>\r\nCriminals may use surveillance cameras to monitor the public. For example, a hidden camera at an ATM can capture people's PINs as they are entered, without their knowledge. The devices are small enough not to be noticed, and are placed where they can monitor the keypad of the machine as people enter their PINs. Images may be transmitted wirelessly to the criminal. Even lawful surveillance cameras sometimes have their data go into the hands of people who have no legal right to receive it.\r\n\r\n<span style=\"text-decoration: underline; \"><span style=\"font-weight: bold; \">Technological developments</span></span>\r\n<span style=\"font-weight: bold; \">Computer-controlled analytics and identification</span>\r\nComputer-controlled cameras can identify, track, and categorize objects in their field of view.\r\n<span style=\"font-weight: bold; \">Video content analysis (VCA)</span> is the capability of automatically analyzing video to detect and determine temporal events not based on a single image, but rather object classification. As such, it can be seen as the automated equivalent of the biological visual cortex.\r\nA system using VCA can recognize changes in the environment and even identify and compare objects in the database using size, speed, and sometimes colour. The camera's actions can be programmed based on what it is "seeing". For example; an alarm can be issued if an object has moved in a certain area, or if a painting is missing from a wall, or if a smoke or fire is detected, or if running people are detected, or if fallen people are detected and if someone has spray painted the lens, as well as video loss, lens cover, defocus and other so called camera tampering events.\r\nVCA analytics can also be used to detect unusual patterns in an environment. The system can be set to detect anomalies in a crowd, for instance a person moving in the opposite direction in airports where passengers are supposed to walk only in one direction out of a plane or in a subway where people are not supposed to exit through the entrances.\r\nVCA can track people on a map by calculating their position from the images. It is then possible to link many cameras and track a person through an entire building or area. This can allow a person to be followed without having to analyze many hours of film. Currently the cameras have difficulty identifying individuals from video alone, but if connected to a key-card system, identities can be established and displayed as a tag over their heads on the video.\r\nThere is also a significant difference in where the VCA technology is placed, either the data is being processed within the cameras (on the edge) or by a centralized server. Both technologies have their pros and cons.\r\nA <span style=\"font-weight: bold; \">facial recognition system</span> is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database.\r\nThe combination of CCTV and facial recognition has been tried as a form of mass surveillance, but has been ineffective because of the low discriminating power of facial recognition technology and the very high number of false positives generated. This type of system has been proposed to compare faces at airports and seaports with those of suspected terrorists or other undesirable entrants.[citation needed] Computerized monitoring of CCTV images is under development, so that a human CCTV operator does not have to endlessly look at all the screens, allowing an operator to observe many more CCTV cameras.[citation needed] These systems do not observe people directly. Insta Types of body-movement behavior, or particular types of clothing or baggage.\r\nTo many, the development of CCTV in public areas, linked to computer databases of people's pictures and identity, presents a serious breach of civil liberties. Conservative critics fear the possibility that one would no longer have anonymity in public places. Demonstrations or assemblies in public places could be affected as the state would be able to collate lists of those leading them, taking part, or even just talking with protesters in the street.\r\nComparatively harmless are people counter systems. They use CCTV equipment as front end eyes of devices which perform shape recognition technology in order to identify objects as human beings and count people passing pre-defined areas.\r\n<span style=\"font-weight: bold; \">Retention, storage and preservation</span>\r\nMost CCTV systems may record and store digital video and images to a digital video recorder (DVR) or, in the case of IP cameras, directly to a server, either on-site or offsite.\r\nThere is a cost in the retention of the images produced by CCTV systems. The amount and quality of data stored on storage media is subject to compression ratios, images stored per second, image size and is effected by the retention period of the videos or images. DVRs store images in a variety of proprietary file formats. Recordings may be retained for a preset amount of time and then automatically archived, overwritten or deleted, the period being determined by the organisation that generated them.\r\nClosed-circuit digital photography (CCDP)\r\nClosed-circuit digital photography (CCDP) is more suited for capturing and saving recorded high-resolution photographs, whereas closed-circuit television (CCTV) is more suitable for live-monitoring purposes.\r\nHowever, an important feature of some CCTV systems is the ability to take high resolution images of the camera scene, e.g. on a time lapse or motion-detection basis. Images taken with a digital still camera often have higher resolution than those taken with some video cameras. Increasingly, low-cost high-resolution digital still cameras can also be used for CCTV purposes.\r\nImages may be monitored remotely when the computer is connected to a network.\r\n<span style=\"font-weight: bold; \">IP cameras</span>\r\nA growing branch in CCTV is internet protocol cameras (IP cameras). It is estimated that 2014 was the first year that IP cameras outsold analog cameras. IP cameras use the Internet Protocol (IP) used by most Local Area Networks (LANs) to transmit video across data networks in digital form. IP can optionally be transmitted across the public internet, allowing users to view their cameras through any internet connection available through a computer or a phone, this is considered remote access. For professional or public infrastructure security applications, IP video is restricted to within a private network or VPN, or can be recorded onto a remote server.\r\n<span style=\"font-weight: bold; \">Networking CCTV cameras</span>\r\nThe city of Chicago operates a networked video surveillance system which combines CCTV video feeds of government agencies with those of the private sector, installed in city buses, businesses, public schools, subway stations, housing projects etc. Even homeowners are able to contribute footage. It is estimated to incorporate the video feeds of a total of 15,000 cameras.\r\nThe system is used by Chicago's Office of Emergency Management in case of an emergency call: it detects the caller's location and instantly displays the real-time video feed of the nearest security camera to the operator, not requiring any user intervention. While the system is far too vast to allow complete real-time monitoring, it stores the video data for later usage in order to provide possible evidence in criminal cases.\r\nNew York City has a similar network called the Domain Awareness System.\r\nLondon also has a network of CCTV systems that allows multiple authorities to view and control CCTV cameras in real time. The system allows authorities including the Metropolitan Police Service, Transport for London and a number of London boroughs to share CCTV images between them. It uses a network protocol called Television Network Protocol to allow access to many more cameras than each individual system owner could afford to run and maintain.\r\nThe Glynn County Police Department uses a wireless mesh-networked system of portable battery-powered tripods for live megapixel video surveillance and central monitoring of tactical police situations. The systems can be used either on a stand-alone basis with secure communications to nearby police laptops, or within a larger mesh system with multiple tripods feeding video back to the command vehicle via wireless, and to police headquarters via 3G.\r\n<span style=\"font-weight: bold; \">Integrated systems</span>\r\nIntegrated systems allow different security systems, like CCTV, access control, intruder alarms and intercoms to operate together. For example, when an intruder alarm is activated, CCTV cameras covering the intrusion area are recorded at a higher frame rate and transmitted to an Alarm Receiving Centre.\r\n<span style=\"font-weight: bold; \">Wireless security cameras</span>\r\nMany consumers are turning to wireless security cameras for home surveillance. Wireless cameras do not require a video cable for video/audio transmission, simply a cable for power. Wireless cameras are also easy and inexpensive to install, but lack the reliability of hard-wired cameras. Previous generations of wireless security cameras relied on analog technology; modern wireless cameras use digital technology which delivers crisper audio, sharper video, and a secure and interference-free signal.\r\n<span style=\"font-weight: bold;\">Talking CCTV</span>\r\nIn Wiltshire, UK, 2003, a pilot scheme for what is now known as "Talking CCTV" was put into action; allowing operators of CCTV cameras to order offenders to stop what they were doing, ranging from ordering subjects to pick up their rubbish and put it in a bin to ordering groups of vandals to disperse. In 2005, Ray Mallon, the mayor and former senior police officer of Middlesbrough implemented "Talking CCTV" in his area.\r\nOther towns have had such cameras installed. In 2007 several of the devices were installed in Bridlington town centre, East Riding of Yorkshire.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CCTV.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"suppliedProducts":[{"id":6758,"logo":false,"scheme":false,"title":"Imagus Intelligent Video Analytics","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"imagus-intelligent-video-analytics","companyTitle":"Vix Vizion","companyTypes":["supplier","vendor"],"companyId":9325,"companyAlias":"vix-vizion","description":"<span lang=\"EN-US\">Imagus Intelligent Video Analytics is a powerful and efficacious Face Recognition and Video Analytics solution, based on AI and machine learning algorithms. Imagus delivers fast accurate face detection, matching, recognition and tracking using advanced deep learning algorithms. </span>Imagus is effective with high or low densities of people in frame, even with poorly lit, poor quality, angled or obstructed views.\r\n\r\n<b><span lang=\"EN-US\">Main features:</span></b>\r\n\r\n<span style=\"font-weight: bold;\">Face Recognition</span>\r\n<ul><li>VIP / person of interest recognition, tracking and alerts in real time</li><li><span lang=\"EN-US\">Unknown associate identification</span></li><li><span lang=\"EN-US\">Forensic historic video database investigation</span></li><li><span lang=\"EN-US\">Privacy controls and facial blurring</span></li></ul>\r\n\r\n<span style=\"font-weight: bold;\"><span lang=\"EN-US\">Face Verification</span></span>\r\n<ul><li><span lang=\"EN-US\">Identity verification</span></li><li><span lang=\"EN-US\">Access control integration</span></li><li><span lang=\"EN-US\">Enhanced security</span></li><li><span lang=\"EN-US\">Liveness / anti-spoofing</span></li></ul>\r\n<span lang=\"EN-US\"> </span>\r\n<span style=\"font-weight: bold;\">Video Analytics</span>\r\n<ul><li>Intelligent video analytics for better business decision making</li><li>Age, gender, emotion</li><li>Crowd counting, direction, heatmaps, flow.</li><li>Marketing, planning, security, traffic flow, events</li></ul>","shortDescription":"Imagus Intelligent Video Analytics is a powerful and efficacious Face Recognition and Video Analytics solution, based on AI and machine learning algorithms.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Imagus Intelligent Video Analytics","keywords":"","description":"<span lang=\"EN-US\">Imagus Intelligent Video Analytics is a powerful and efficacious Face Recognition and Video Analytics solution, based on AI and machine learning algorithms. Imagus delivers fast accurate face detection, matching, recognition and tracking usi","og:title":"Imagus Intelligent Video Analytics","og:description":"<span lang=\"EN-US\">Imagus Intelligent Video Analytics is a powerful and efficacious Face Recognition and Video Analytics solution, based on AI and machine learning algorithms. Imagus delivers fast accurate face detection, matching, recognition and tracking usi"},"eventUrl":"","translationId":6758,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":48,"title":"CCTV - Closed-circuit television","alias":"cctv-closed-circuit-television","description":"CCTV (closed-circuit television) is a TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.\r\nCCTV relies on strategic placement of cameras, and observation of the camera's input on monitors somewhere. Because the cameras communicate with monitors and/or video recorders across private coaxial cable runs or wireless communication links, they gain the designation "closed-circuit" to indicate that access to their content is limited by design only to those able to see it.\r\nOlder CCTV systems used small, low-resolution black and white monitors with no interactive capabilities. Modern CCTV displays can be color, high-resolution displays and can include the ability to zoom in on an image or track something (or someone) among their features. Talk CCTV allows an overseer to speak to people within range of the camera's associated speakers.\r\nCCTV is commonly used for a variety of purposes, including:\r\n<ul><li>Maintaining perimeter security in medium- to high-secure areas and installations.</li><li>Observing the behavior of incarcerated inmates and potentially dangerous patients in medical facilities.</li><li>Traffic monitoring.</li><li>Overseeing locations that would be hazardous to a human, for example, highly radioactive or toxic industrial environments.</li><li>Building and grounds security.</li><li>Obtaining a visual record of activities in situations where it is necessary to maintain proper security or access controls (for example, in a diamond cutting or sorting operation; in banks, casinos, or airports).</li></ul>\r\nCCTV is finding increasing use in law-enforcement, for everything from traffic observation (and automated ticketing) to an observation of high-crime areas or neighborhoods. Such use of CCTV technology has fueled privacy concerns in many parts of the world, particularly in those areas in the UK and Europe where it has become a routine part of police procedure.","materialsDescription":" <span style=\"text-decoration: underline; \"><span style=\"font-weight: bold; \">Uses</span></span>\r\n<span style=\"font-weight: bold; \">Crime prevention</span>\r\nA 2009 systematic review by researchers from Northeastern University and University of Cambridge used meta-analytic techniques to pool the average effect of CCTV on crime across 41 different studies. The results indicated that\r\n<ul><li>CCTV caused a significant reduction of crime by on average 16%.</li><li>The largest effects of CCTV were found in car parks, where cameras reduced crime by on average 51%.</li><li>CCTV schemes in other public settings had small and non-statistically significant effects on crime: 7% reduction in city and town centers and 23% reduction in public transport settings.</li><li>When sorted by country, systems in the United Kingdom accounted for the majority of the decrease; the drop in other areas was insignificant.</li></ul>\r\nThe studies included in the meta-analysis used quasi-experimental evaluation designs that involve before-and-after measures of crime in experimental and control areas. However, several researchers have pointed to methodological problems associated with this research literature. First, researchers have argued that the British car park studies included in the meta-analysis cannot accurately control for the fact that CCTV was introduced simultaneously with a range of other security-related measures. Second, some have noted that, in many of the studies, there may be issues with selection bias since the introduction of CCTV was potentially endogenous to previous crime trends.[30] In particular, the estimated effects may be biased if CCTV is introduced in response to crime trends.\r\nIt has been argued that problems of selection bias and endogeneity can be addressed by stronger research designs such as randomized controlled trials and natural experiments. A 2017 review published in Journal of Scandinavian Studies in Criminology and Crime Prevention compiles seven studies that use such research designs. The studies included in the review found that CCTV reduced crime by 24-28% in public streets and urban subway stations. It also found that CCTV could decrease unruly behaviour in football stadiums and theft in supermarkets/mass merchant stores. However, there was no evidence of CCTV having desirable effects in parking facilities or suburban subway stations. Furthermore, the review indicates that CCTV is more effective in preventing property crimes than in violent crimes.\r\nAnother question in the effectiveness of CCTV for policing is around uptime of the system; in 2013 City of Philadelphia Auditor found that the $15M system was operational only 32% of the time. There is still much research to be done to determine the effectiveness of CCTV cameras on crime prevention before any conclusions can be drawn.\r\nThere is strong anecdotal evidence that CCTV aids in detection and conviction of offenders; indeed UK police forces routinely seek CCTV recordings after crimes. Moreover, CCTV has played a crucial role in tracing the movements of suspects or victims and is widely regarded by antiterrorist officers as a fundamental tool in tracking terrorist suspects. Large-scale CCTV installations have played a key part of the defences against terrorism since the 1970s. Cameras have also been installed on public transport in the hope of deterring crime, and in mobile police surveillance vehicles, often with automatic number plate recognition, and a network of APNI-linked cameras is used to manage London's congestion charging zone.\r\nA more open question is whether most CCTV is cost-effective. While low-quality domestic kits are cheap the professional installation and maintenance of high definition CCTV is expensive. Gill and Spriggs did a Cost-effectiveness analysis (CEA) of CCTV in crime prevention that showed little monetary saving with the installation of CCTV as most of the crimes prevented resulted in little monetary loss. Critics however noted that benefits of non-monetary value cannot be captured in a traditional Cost Effectiveness Analysis and were omitted from their study. A 2008 Report by UK Police Chiefs concluded that only 3% of crimes were solved by CCTV. In London, a Metropolitan Police report showed that in 2008 only one crime was solved per 1000 cameras. In some cases CCTV cameras have become a target of attacks themselves.\r\nCities such as Manchester in the UK are using DVR-based technology to improve accessibility for crime prevention.\r\nIn October 2009, an "Internet Eyes" website was announced which would pay members of the public to view CCTV camera images from their homes and report any crimes they witnessed. The site aimed to add "more eyes" to cameras which might be insufficiently monitored. Civil liberties campaigners criticized the idea as "a distasteful and a worrying development".\r\nIn 2013 Oaxaca hired deaf police officers to lip read conversations to uncover criminal conspiracies.\r\nIn Singapore, since 2012, thousands of CCTV cameras have helped deter loan sharks, nab litterbugs and stop illegal parking, according to government figures.\r\n<span style=\"font-weight: bold; \">Body worn</span>\r\nIn recent years, the use of body worn video cameras has been introduced for a number of uses. For example, as a new form of surveillance in law enforcement, with cameras located on a police officer's chest or head.\r\n<span style=\"font-weight: bold; \">Industrial processes</span>\r\nIndustrial processes that take place under conditions dangerous for humans are today often supervised by CCTV. These are mainly processes in the chemical industry, the interior of reactors or facilities for manufacture of nuclear fuel. Special cameras for some of these purposes include line-scan cameras and thermographic cameras which allow operators to measure the temperature of the processes. The usage of CCTV in such processes is sometimes required by law.\r\n<span style=\"font-weight: bold; \">Traffic monitoring</span>\r\nMany cities and motorway networks have extensive traffic-monitoring systems, using closed-circuit television to detect congestion and notice accidents. Many of these cameras however, are owned by private companies and transmit data to drivers' GPS systems.\r\nThe UK Highways Agency has a publicly owned CCTV network of over 3000 Pan-Tilt-Zoom cameras covering the British motorway and trunk road network. These cameras are primarily used to monitor traffic conditions and are not used as speed cameras. With the addition of fixed cameras for the active traffic management system, the number of cameras on the Highways Agency's CCTV network is likely to increase significantly over the next few years.\r\nThe London congestion charge is enforced by cameras positioned at the boundaries of and inside the congestion charge zone, which automatically read the licence plates of cars. If the driver does not pay the charge then a fine will be imposed. Similar systems are being developed as a means of locating cars reported stolen.\r\nOther surveillance cameras serve as traffic enforcement cameras.\r\n<span style=\"font-weight: bold; \">Transport safety</span>\r\nA CCTV system may be installed where any example, on a Driver-only operated train CCTV cameras may allow the driver to confirm that people are clear of doors before closing them and starting the train.\r\n<span style=\"font-weight: bold; \">Sporting events</span>\r\nMany sporting events in the United States use CCTV inside the venue for fans to see the action while they are away from their seats. The cameras send the feed to a central control center where a producer selects feeds to send to the television monitors that fans can view. CCTV monitors for viewing the event by attendees are often placed in lounges, hallways, and restrooms. This use of CCTV is not used for surveillance purposes.\r\n<span style=\"font-weight: bold; \">Monitor employees</span>\r\nOrganizations use CCTV to monitor the actions of workers. Every action is recorded as an information block with subtitles that explain the performed operation. This helps to track the actions of workers, especially when they are making critical financial transactions, such as correcting or cancelling of a sale, withdrawing money or altering personal information.\r\nActions which an employer may wish to monitor could include:\r\n<ul><li>Scanning of goods, selection of goods, introduction of price and quantity;</li><li>Input and output of operators in the system when entering passwords;</li><li>Deleting operations and modifying existing documents;</li><li>Implementation of certain operations, such as financial statements or operations with cash;</li><li>Moving goods, revaluation scrapping and counting;</li><li>Control in the kitchen of fast food restaurants;</li><li>Change of settings, reports and other official functions.</li></ul>\r\nEach of these operations is transmitted with a description, allowing detailed monitoring of all actions of the operator. Some systems allow the user to search for a specific event by time of occurrence and text description, and perform statistical evaluation of operator behaviour. This allows the software to predict deviations from the standard workflow and record only anomalous behaviour.\r\n<span style=\"font-weight: bold; \">Use in schools</span>\r\nIn the United States, Britain, Australia and New Zealand, CCTV is widely used in schools due to its success in preventing bullying, vandalism, monitoring visitors and maintaining a record of evidence in the event of a crime. There are some restrictions on installation, with cameras not being installed in an area where there is a "reasonable expectation of privacy", such as bathrooms, gym locker areas and private offices (unless consent by the office occupant is given). Сameras are generally acceptable in hallways, parking lots, front offices where students, employees, and parents come and go, gymnasiums, cafeterias, supply rooms and classrooms. The installation of cameras in classrooms may be objected to by some teachers.\r\n<span style=\"font-weight: bold; \">Criminal use</span>\r\nCriminals may use surveillance cameras to monitor the public. For example, a hidden camera at an ATM can capture people's PINs as they are entered, without their knowledge. The devices are small enough not to be noticed, and are placed where they can monitor the keypad of the machine as people enter their PINs. Images may be transmitted wirelessly to the criminal. Even lawful surveillance cameras sometimes have their data go into the hands of people who have no legal right to receive it.\r\n\r\n<span style=\"text-decoration: underline; \"><span style=\"font-weight: bold; \">Technological developments</span></span>\r\n<span style=\"font-weight: bold; \">Computer-controlled analytics and identification</span>\r\nComputer-controlled cameras can identify, track, and categorize objects in their field of view.\r\n<span style=\"font-weight: bold; \">Video content analysis (VCA)</span> is the capability of automatically analyzing video to detect and determine temporal events not based on a single image, but rather object classification. As such, it can be seen as the automated equivalent of the biological visual cortex.\r\nA system using VCA can recognize changes in the environment and even identify and compare objects in the database using size, speed, and sometimes colour. The camera's actions can be programmed based on what it is "seeing". For example; an alarm can be issued if an object has moved in a certain area, or if a painting is missing from a wall, or if a smoke or fire is detected, or if running people are detected, or if fallen people are detected and if someone has spray painted the lens, as well as video loss, lens cover, defocus and other so called camera tampering events.\r\nVCA analytics can also be used to detect unusual patterns in an environment. The system can be set to detect anomalies in a crowd, for instance a person moving in the opposite direction in airports where passengers are supposed to walk only in one direction out of a plane or in a subway where people are not supposed to exit through the entrances.\r\nVCA can track people on a map by calculating their position from the images. It is then possible to link many cameras and track a person through an entire building or area. This can allow a person to be followed without having to analyze many hours of film. Currently the cameras have difficulty identifying individuals from video alone, but if connected to a key-card system, identities can be established and displayed as a tag over their heads on the video.\r\nThere is also a significant difference in where the VCA technology is placed, either the data is being processed within the cameras (on the edge) or by a centralized server. Both technologies have their pros and cons.\r\nA <span style=\"font-weight: bold; \">facial recognition system</span> is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database.\r\nThe combination of CCTV and facial recognition has been tried as a form of mass surveillance, but has been ineffective because of the low discriminating power of facial recognition technology and the very high number of false positives generated. This type of system has been proposed to compare faces at airports and seaports with those of suspected terrorists or other undesirable entrants.[citation needed] Computerized monitoring of CCTV images is under development, so that a human CCTV operator does not have to endlessly look at all the screens, allowing an operator to observe many more CCTV cameras.[citation needed] These systems do not observe people directly. Insta Types of body-movement behavior, or particular types of clothing or baggage.\r\nTo many, the development of CCTV in public areas, linked to computer databases of people's pictures and identity, presents a serious breach of civil liberties. Conservative critics fear the possibility that one would no longer have anonymity in public places. Demonstrations or assemblies in public places could be affected as the state would be able to collate lists of those leading them, taking part, or even just talking with protesters in the street.\r\nComparatively harmless are people counter systems. They use CCTV equipment as front end eyes of devices which perform shape recognition technology in order to identify objects as human beings and count people passing pre-defined areas.\r\n<span style=\"font-weight: bold; \">Retention, storage and preservation</span>\r\nMost CCTV systems may record and store digital video and images to a digital video recorder (DVR) or, in the case of IP cameras, directly to a server, either on-site or offsite.\r\nThere is a cost in the retention of the images produced by CCTV systems. The amount and quality of data stored on storage media is subject to compression ratios, images stored per second, image size and is effected by the retention period of the videos or images. DVRs store images in a variety of proprietary file formats. Recordings may be retained for a preset amount of time and then automatically archived, overwritten or deleted, the period being determined by the organisation that generated them.\r\nClosed-circuit digital photography (CCDP)\r\nClosed-circuit digital photography (CCDP) is more suited for capturing and saving recorded high-resolution photographs, whereas closed-circuit television (CCTV) is more suitable for live-monitoring purposes.\r\nHowever, an important feature of some CCTV systems is the ability to take high resolution images of the camera scene, e.g. on a time lapse or motion-detection basis. Images taken with a digital still camera often have higher resolution than those taken with some video cameras. Increasingly, low-cost high-resolution digital still cameras can also be used for CCTV purposes.\r\nImages may be monitored remotely when the computer is connected to a network.\r\n<span style=\"font-weight: bold; \">IP cameras</span>\r\nA growing branch in CCTV is internet protocol cameras (IP cameras). It is estimated that 2014 was the first year that IP cameras outsold analog cameras. IP cameras use the Internet Protocol (IP) used by most Local Area Networks (LANs) to transmit video across data networks in digital form. IP can optionally be transmitted across the public internet, allowing users to view their cameras through any internet connection available through a computer or a phone, this is considered remote access. For professional or public infrastructure security applications, IP video is restricted to within a private network or VPN, or can be recorded onto a remote server.\r\n<span style=\"font-weight: bold; \">Networking CCTV cameras</span>\r\nThe city of Chicago operates a networked video surveillance system which combines CCTV video feeds of government agencies with those of the private sector, installed in city buses, businesses, public schools, subway stations, housing projects etc. Even homeowners are able to contribute footage. It is estimated to incorporate the video feeds of a total of 15,000 cameras.\r\nThe system is used by Chicago's Office of Emergency Management in case of an emergency call: it detects the caller's location and instantly displays the real-time video feed of the nearest security camera to the operator, not requiring any user intervention. While the system is far too vast to allow complete real-time monitoring, it stores the video data for later usage in order to provide possible evidence in criminal cases.\r\nNew York City has a similar network called the Domain Awareness System.\r\nLondon also has a network of CCTV systems that allows multiple authorities to view and control CCTV cameras in real time. The system allows authorities including the Metropolitan Police Service, Transport for London and a number of London boroughs to share CCTV images between them. It uses a network protocol called Television Network Protocol to allow access to many more cameras than each individual system owner could afford to run and maintain.\r\nThe Glynn County Police Department uses a wireless mesh-networked system of portable battery-powered tripods for live megapixel video surveillance and central monitoring of tactical police situations. The systems can be used either on a stand-alone basis with secure communications to nearby police laptops, or within a larger mesh system with multiple tripods feeding video back to the command vehicle via wireless, and to police headquarters via 3G.\r\n<span style=\"font-weight: bold; \">Integrated systems</span>\r\nIntegrated systems allow different security systems, like CCTV, access control, intruder alarms and intercoms to operate together. For example, when an intruder alarm is activated, CCTV cameras covering the intrusion area are recorded at a higher frame rate and transmitted to an Alarm Receiving Centre.\r\n<span style=\"font-weight: bold; \">Wireless security cameras</span>\r\nMany consumers are turning to wireless security cameras for home surveillance. Wireless cameras do not require a video cable for video/audio transmission, simply a cable for power. Wireless cameras are also easy and inexpensive to install, but lack the reliability of hard-wired cameras. Previous generations of wireless security cameras relied on analog technology; modern wireless cameras use digital technology which delivers crisper audio, sharper video, and a secure and interference-free signal.\r\n<span style=\"font-weight: bold;\">Talking CCTV</span>\r\nIn Wiltshire, UK, 2003, a pilot scheme for what is now known as "Talking CCTV" was put into action; allowing operators of CCTV cameras to order offenders to stop what they were doing, ranging from ordering subjects to pick up their rubbish and put it in a bin to ordering groups of vandals to disperse. In 2005, Ray Mallon, the mayor and former senior police officer of Middlesbrough implemented "Talking CCTV" in his area.\r\nOther towns have had such cameras installed. In 2007 several of the devices were installed in Bridlington town centre, East Riding of Yorkshire.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CCTV.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"partnershipProgramme":null}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}