SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6
Intrusion detection
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

How Successful Is Security In Reducing Crime Rates?

16 Aug 2021

How Successful Is Security In Reducing Crime Rates?
Larry Anderson
Larry Anderson
16 Aug 2021
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Security systems often shift crime rather than prevent it entirely.
  • Modern security technologies primarily aid post-crime forensics rather than crime prevention.
  • Crime prevention remains the ideal yet challenging goal for the security industry.

Editor Introduction

Crime prevention is a basic goal of security, even if a security system merely convinces a criminal to seek out a different target. However, many of today’s security technologies are most useful after the fact, to provide forensic information about a crime that has already taken place. Solving a crime presents a whole new level of challenge. Surely, prevention is the best approach. We asked this week’s Expert Panel Roundtable: How successful is the security industry in crime prevention and reducing crime rates?


Card image cap
John Davies TDSi

Case studies have proven that having a video surveillance system can deter a significant amount of crime. For example, the University of North Carolina (May 2020) found that half of all the surveyed burglars would flee the area after discovering cameras. The obvious presence of security systems can be just as useful in tackling crime as their practical ability in protecting people and property. Street surveillance cameras (CCTVs) and dashboard cameras can also deter crime by increasing the probabilities of arrest and punishment, at a fraction of the cost of hiring more law enforcement officers. They are not a panacea, though. They need to be deployed and monitored effectively, with the right backup and support to deal with any incidents. It is also vital that consideration be given to maintain privacy, too – people need to be comfortable these systems are not intruding unnecessarily on their personal space.

Card image cap
Leo Levit ONVIF

For the security manager, the best crime is the one that never happens, as investigations of past events are difficult and time consuming. We have learned how to be successful in crime prevention, and that is because of all the different disciplines that are available for end users to use to build a successful and holistic crime prevention program. Preventative measures include public view monitors for a clear indicator of surveillance, object detection analytics and audio capabilities integrated with cameras to deter intruders, as well as proper lighting of specific areas, efficient access control systems and the presence of security personnel. One important aspect to crime prevention is raising awareness and educating users about specific threats. Cybersecurity is a good example of how greater awareness of threats directly assists in crime prevention and the reduction of such crimes. More organizations are implementing solutions to contain threats.

Card image cap
Rick Taylor Genetec, Inc.

The huge amounts of data available from video surveillance, body-worn devices, traffic cameras and other IoT devices means there is more real-time and historical evidence for police to work with than ever before. Despite this, the percentage of crimes that are resolved has remained fairly constant at about 64%. Police departments often say that they are data-rich but information-poor, as making sense of all this data can be overwhelming and time-consuming. Many also find themselves operationally hindered by the “siloed” systems they rely upon, in which each source of data coming into the command center is separate from the rest. New unified solutions enable cities and public safety agencies to leverage the full potential of evidence available by reducing time spent on mundane tasks and providing methods to collaborate more effectively with businesses and the public, while at the same time preserving the privacy of individuals.

Card image cap
Julie Beach STANLEY Security

Traditional alarm systems are designed simply to detect and notify in the case of an alarm activation. These activations come from various sensors that detect intrusion when armed. When the central station is notified an alarm has been triggered, they respond based on the listed instructions. Although this technique is widely used, it does present problems because of the lack of early detection and large numbers of false alarms, often resulting in a slow response from law enforcement and low apprehension rates. Alarm verification using audio and/or video detection can help mitigate these issues. Impact-activated audio sensors are a proven method of early detection, allowing central station operators to hear a break-in, often before the intruder has even gained entry into the building. These volumetric audio sensors provide the central station operator real-time information they can forward to police dispatch, which can shorten police response times, enhance safety, and improve apprehension.


Editor Summary

Today’s security systems provide more data than ever, often in real-time. Using that data to prevent crime depends on an ability to translate the raw data into useful information. Tying together technologies into a holistic process to prevent crime is an ongoing challenge. The simple presence of security technology can help to discourage a criminal, and awareness is the first step toward vigilance.

  • Related links
  • Genetec Video Surveillance software
  • Genetec Observation systems & accessories
  • TDSi Video Surveillance software
  • TDSi Access control systems & kits
  • TDSi Surveillance cameras
  • TDSi Intruder detectors
  • Related categories
  • Surveillance cameras
  • Observation systems & accessories
  • Digital video recorders (DVRs)
  • Video Surveillance software
  • Access control systems & kits
  • Intruder detectors
  • Intruder alarm warning devices
  • Intruder alarm lighting systems
Related white papers
Precision And Intelligence: LiDAR's Role In Modern Security Ecosystems

Precision And Intelligence: LiDAR's Role In Modern Security Ecosystems

Download
The Top 4 Reasons To Upgrade Physical Security With The Cloud

The Top 4 Reasons To Upgrade Physical Security With The Cloud

Download
11 Advantages Of A Combined System For Access Control And Intrusion

11 Advantages Of A Combined System For Access Control And Intrusion

Download
Related articles
Securitas UK & Hays Travel Partnership Milestone

Securitas UK & Hays Travel Partnership Milestone

Ranger Acquires Universal Fire & Security In UK Expansion

Ranger Acquires Universal Fire & Security In UK Expansion

Detection Tech Unveils DT2030 Strategy For X-ray Growth

Detection Tech Unveils DT2030 Strategy For X-ray Growth

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Intrusion detection
  4. News
  5. Round table discussions
About this page

Discover key strategies for successful security, reducing crime rates, and enhancing safety with technology and community-focused efforts.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec