+44 (0)1509 263171
Please use this identifier to cite or link to this item:
|Title: ||Can CCTV reliably detect gun crime?|
|Authors: ||Darker, Iain T.|
Gale, Alastair G.
|Issue Date: ||2007|
|Publisher: ||© IEEE|
|Citation: ||DARKER, I.T. ... et al, 2007. Can CCTV reliably detect gun crime? IN: 41st Annual IEEE International Carnahan Conference on Security Technology, Ottawa, Ontario, 8-11 October, pp. 264-271|
|Abstract: ||In recent years the highest levels of gun crime in England and Wales have been recorded. Gun crime is known to occur in environments that fall under the view of the networks of CCTV cameras which are endemic in urban Britain. Consequently, CCTV has the potential to detect gun crime. However, CCTV operators face a near impossible task: often, each individual operator is required to monitor multiple cameras for extended time periods. It is not surprising then to find that CCTV has had little effect at reducing gun crime. A new collaborative research programme (MEDUSA) is underway across the UK which will develop a software application to aid CCTV operators detect the precursors of gun crime. MEDUSA aims automatically to detect both guns as objects (concealed or otherwise) and people who intend to commit gun crime, via CCTV. The system is partly based on eliciting the features that skilled CCTV operators identify as indicative of a concealed weapon or suspicious behaviour related to gun crime. Initial studies into the examination of these skills across several CCTV centres indicate that there was little formal instruction in the detection of mal-intent. Much skill is built up from prolonged experience in examining CCTV imagery. Thus, potentially, there is widespread individualisation of detection skills. Further, visual cues specific to gun crime were limited. However, the present methodology relied upon direct report. It is argued that a range of both consciously and subconsciously detected cues could facilitate gun detection via CCTV. Future studies will examine this possibility.|
|Description: ||This is a conference paper [©2007 IEEE]. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. This paper is also available from: http://ieeexplore.ieee.org/Xplore/dynhome.jsp|
|Publisher Link: ||http://ieeexplore.ieee.org/Xplore/dynhome.jsp|
|Appears in Collections:||Conference Papers and Presentations (Computer Science)|
Files associated with this item:
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.