Since 2006, the LUSAX research program at Lund University in Sweden has investigated the effects of digitisation on the physical security industry

Since 2006, the LUSAX research program at Lund University in Sweden has investigated the effects of digitisation on the physical security industry. This article will look into the forces driving digitisation, and how those forces broadly translate and impacts the physical security industry.

Historically, physical security systems have moved from purely mechanical systems into systems holding both mechanical and electronic low-voltage circuit-based components. Development was pushed further forward when digital components emerged in the late 1980’s with the introduction of Digital Video Recorders (DVRs). And from 1996, when Sweden-based Axis Communications claims to have introduced the first network-enabled surveillance camera, digital components were further introduced into physical security systems. From a strategic business point of view, the digital shift most importantly brought with it new ways of doing business. Currently it is more common to observe novel and potentially more efficient business models challenging the proprietary and integrated one-brand manufacturer-distributor-integrator model historically associated with the industry.

However, from an end-user point of view, the primary objective of a security system is still to protect organisational assets from harmful action. Preferably this is achieved by means of pro-active deterrence, and secondarily by direct prevention. Any change in the underlying technology – mechanical or digital – needs to be evaluated against these objectives. In order for technological advancements to be value adding, it needs to either strengthen the overall performance – both in terms of functional and non-functional requirements – of the current system, or lower costs for the same performance.

In the case of a video surveillance system, the purpose of the system could be to decrease the number of shoplifting incidents at a store by means of temporarily storing the snapshots or shorter video sequences of customers visiting the store. Two examples of advancements associated with digital surveillance cameras may for example be superior performance in terms of picture quality and ease of access to the recorded material compared to previous generations of surveillance cameras. But, it could also be to protect assets against unintended harmful actions, for example in protecting co-workers from exiting areas with sensitive business information. Furthermore, digital systems have been suggested to have potential value in improving core value-adding operations. A prime example of this feature is the track-and-trace functionality in parcel shipment. Finally, the potential of pre-programmed self-diagnostics is another example of feature associated with future digital systems.

Why digitisation happens

When Sweden-based Axis Communications claims to have introduced the first network-enabled surveillance camera, digital components were further introduced into physical security systems

More broadly, digitisation is tightly coupled to what is referred to as Moore’s Law within the computing industry. First formulated by Gordon Moore at Intel in the early 1960’s, it proposed that computing capacity doubles every 12 months. Put in other terms, if we enter a computer store to buy computing power in June 2013 for one dollar, we would receive double the amount of computing power in June 2014 for the same amount of dollar. Gordon Moore was proven right, although slight modifications to the law have been added. The current doubling-speed in terms of computing power happens every 24 months. While this is merely a computational law, the business-consequences are important. Assuming a doubling of computing power every 24 months creates business opportunities for entrepreneurs that can translate the computing power into business-serving concepts at a low cost. This creates a strong cost-pressure on firms to consider digitising and even automating parts of the value-adding process. Examples of professional categories that have been affected by automation are for example secretaries, travel agents and bank tellers.

Moore’s law may impact industries in mainly two distinct manners: The first being digitisation that enhances the physical and manual activities – referred to as a kind of digital overlay to the current activities. The second one having more fundamental impact on an industry in the form of automation – simply substituting manual labour with (digital) machines, like in the case of the professions mentioned earlier.

Reasons for a slower pace of digitisation

Consequently, the key decision is not to ignore digitisation as a mere ‘gadget shift’, but rather to ask the question - in what way will Moore´s law impact my industry sector? Will Moore’s Law digitally reinforce and complement current work-practices according to the digital overlay-scenario, or will it simply substitute manual security labour gradually? The evidence the LUSAX-team has collected the past 9 years suggests a slower than expected, gradual and complementary development compared to other industries. We see three main reasons to a slower development speed.

The first (1) being the nature of security systems, they are to deter harmful action that is based on non-standardised behaviour. The intruder is actively attempting to outsmart the system. Routine business tasks, like registering invoices is a routine that once established may easily be duplicated and lends itself easily to digitisation and automation. Quite the opposite – and due to the variation in the intruder’s behaviour –duplication of the external qualities of a security system across an organisation would represent a risk in itself.

In the case of the physical security industry, the evidence collected by the LUSAX group suggests a more slow-moving digitisation more associated with the digitally enhancing scenario

Secondly (2), the service-level of security systems should be near fail-safe. Everyday use of IT-based services is associated with a higher degree of acceptance to operational disruptions, meaning users and organisations tolerate a lower than fail-safe performance-level compared to security systems. This is sometimes refereed to as the Beta-culture of the IT-industry. In turn, this generates a more conservative approach to experimentation with new technologies among security practitioners that makes digitisation a slower-moving process compared to other sectors.

Third (3) and finally, while it is true that security management has increased in importance from a corporate point of view the past decades, security management still is redundancy and contingency-centric. This in turn hampers a rapid diffusion of digital security innovations. On the other hand, strategic management more generally concerns itself with achieving organisational goals by actively taking risks in a lean and non-redundancy direction. This orientation lends itself more compatible with the automation scenario, for example reducing the need to keep parts of the corporate accounting, marketing or R&D staff internally.

Summary

In this article we have briefly introduced Moore’s Law as a broad driver of digitisation. The effects of digitisation may impact industries differently. Either disruptively - basically gradually reducing the need for manual execution of current work practices, or enhance activities by means of digitisation. In the case of the physical security industry, the evidence collected by the LUSAX group suggests a more slow-moving digitisation more associated with the digitally enhancing scenario.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

Markus Lahtinen Researcher and Lecturer at Lund University, LUSAX Security Informatics

Markus Lahtinen holds a Master’s degree in Informatics (2001) and a Bachelor's degree in Business Administration and Economics (2006). The past ten years he has been active as lecturer at the Department of Informatics at the School of Economics and Management, teaching mainly Interaction Design but also given classes on Decision Support Systems, UML, IT and organisation, and supervising theses work for students at Bachelor and Master level.

In case you missed it

How has Brexit affected the security industry?
How has Brexit affected the security industry?

When the United Kingdom voted to leave the European Union, a world of uncertainty unfolded for those doing business in the UK and the EU. The referendum was passed in July 2016. Including subsequent delays, the separation was completed after four years in January 2020, with a transition period ending December 2020. Even with the deadlines past, there are still pockets of uncertainty stemming from the separation. We asked this week’s Expert Panel Roundtable: How has Brexit affected the security industry?

Hybrid working and the threat of desk data
Hybrid working and the threat of desk data

The transition to remote working has been a revelation for many traditional office staff, yet concerns over data security risks are rising. Mark Harper of HSM explains why businesses and their remote workers must remain vigilant when it comes to physical document security in homes. Pre-pandemic, home offices were often that neglected room in people’s homes. But now things are different. After the initial lockdown in 2020, 46.6% of UK workers did some work at home with 86% of those doing so because of the pandemic. Semi-permanent workspaces Since then, many have found that over time, those semi-permanent workspaces have become slightly more permanent – with official hybrid working coming into effect for an assortment of businesses and their teams. The adoption of hybrid working can in fact be seen as one of the few positives to come from the pandemic, with less travel, more freedom and higher productivity top of the benefits list for businesses and their employees. The handling of sensitive documents, is a growing concern for office managers But those welcomed benefits don’t tell the whole story. The transition to remote working has undoubtedly impacted workplace security, with various touch points at risk. The handling of sensitive documents for example, is a growing concern for office managers. In simpler times, sensitive data was more or less contained in an office space, but with millions of home setups to now think about, how can businesses and their office managers control the issue of desk data? Physical document security As of January 2021, it’s said that one in three UK workers are based exclusively at home. That’s millions of individuals from a variety of sectors, all of which must continue in their efforts to remain data secure. With that, reports of cyber security fears are consistently making the news but that shouldn’t be the sole focus. There is also the underlying, but growing, issue of physical document security. The move to remote working hasn’t removed these physical forms of data – think hard drives, USBs and paper based documentation. A recent surge in demand for home printers for example, only exemplifies the use of physical documents and the potential security issues home offices are facing. Adding to that, research conducted in 2020 found that two out of three employees who printed documents at home admitted to binning those documents both in and outside of their house without shredding them. Data security concern Without the right equipment, policies and guidance, businesses are sure to be at risk Those findings present a huge data security concern, one that must be fixed immediately. The Information Commissioner’s Office (ICO) has since released guidance for those working from their bedrooms and dining tables. Designed to help overcome these challenges, the ‘security checklists’ and ‘top tips’ should be the first port of call for many. Yet throughout, the ICO make reference to ‘following your organisation’s policies and guidance’ – highlighting that the onus isn’t solely on the individuals working from their makeshift offices. Office managers have a monumental task on their hands to ensure teams are well equipped within their home setups. Without the right equipment, policies and guidance, businesses are sure to be at risk. But it would be wrong to insinuate that unsecure desk data has only now become an issue for organisations. Modern office spaces Keeping clear desks has long been a battle for many office managers. In fact, clear desk policies are practised in most modern office spaces, with it recognised as a key preventative to personal information being wrongly accessed and so falling foul of GDPR legislation. Throwing sensitive documents in the bin was never an option pre-pandemic However, the unsupervised aspect of home working has led to a potentially more lax approach to these policies, or in some cases, they can’t be followed at all. For those taking a more laid back approach, organisation leaders must remind staff of their data security responsibilities and why clear desk policies have previously proven effective. Ultimately, throwing sensitive documents in the bin was never an option pre-pandemic and this must be carried through to home workspaces now. Securely destroy documents There are also concerns over the equipment people have access to at home. For example, without a reliable home shredding solution, data security suddenly becomes a tougher task. To add to that, several recommendations state that employees working from home should avoid throwing documents away by instead transporting them to the office for shredding once lockdown rules ease. While this is an option, it does pose further issues, with document security at risk of accidental loss or even theft throughout the transportation period, not to mention the time spent in storage. The best and most effective way to securely destroy documents is at the source, especially in environments where higher levels of personal data is regularly handled. Correct shredding equipment The recent findings on home office behaviour represent a true security risk Only when home workers implement their own clear desk policies alongside the correct shredding equipment (at the correct security level), can both home office spaces and regular offices become data secure. Realistically, these solutions should, like the common home printer, become a staple in home office spaces moving forward. The likelihood is that many UK workers will remain in their home offices for the foreseeable future, only to emerge as hybrid workers post-pandemic. And while the current working environment is more ideal for some than others, the recent findings on home office behaviour represent a true security risk to organisations. With this in mind, it’s now more key than ever for business leaders, their office managers and homeworkers to all step up and get a handle on home data security policies (as well as maintaining their standards back at the office) – starting with the implementation of clear desk policies. After all, a clear desk equals a clear mind.

Video intercoms for a smarter, safer workspace
Video intercoms for a smarter, safer workspace

Though many office workers across the globe have found themselves working remotely for the past year, we are seeing a bit of a silver lining, as vaccine rollouts hint at a return to some pre-pandemic sense of normalcy. However, while some of us might opt for a fully-remote work life, others are anticipating a hybrid solution. Even before the pandemic, offices were taking a new, more open layout approach—moving past the days of cubicles and small office configurations. Going forward, offices and other workspaces will be tasked with supporting a hybrid work solution, as well as increasing hygiene measures. Video intercom solution This is where an IP video intercom solution can assist. Below are four ways they can help usher in a smarter, safer work environment: Video intercoms assist in creating a more hygienic work environment - The outbreak of COVID-19 has raised awareness of germs and just how easily a virus can be transmitted by face-to-face contact. Germ barriers are popping up in many aspects of our daily lives, where we were not likely to see them before Unfortunately, the door is also the easiest of these germ barriers to breach As such, we’re becoming accustomed to seeing plexiglass barriers at restaurants, grocery stores, and even coffee shops. However, many don’t realise that one of the best germ barriers is a simple door. Unfortunately, the door is also the easiest of these germ barriers to breach. All it takes is a knock or a doorbell ring to make us open our germ barrier and be face-to-face with whomever is on the other side. Increasing hygiene safety A simple step to increase hygiene safety and visitor security in commercial buildings and workspaces is an IP video intercom. Installing a video intercom will allow staff to see and speak with visitors without breaching that all-important germ barrier. A video intercom system provides a first line of defence, enabling the user to visually confirm the identity of the person on the other side of the door first before granting access. It can also be used to make sure proper procedures are being followed before a person is allowed to enter, such as using hand sanitiser, wearing a mask, and following social distancing guidelines. Basic security needs A major topic of conversation the past year has been how to manage occupancy in all facilities Video intercoms for occupancy management and basic security - A major topic of conversation the past year has been how to manage occupancy in all facilities—ranging from grocery stores and retail shops to restaurants and commercial buildings. Workspaces and offices are no exception. A video intercom provides a quick and convenient method of seeing who, or what, is on the unsecure side of the door before opening. For basic security needs, if a business has a door opening into an alley, a video intercom would be used to ensure no one is waiting outside to force their way in when the door is opened. Personal protection equipment Such solutions can also be used to ensure a person is carrying proper credentials, or wearing proper personal protection equipment (PPE), before entering a sensitive area. For example, if a lab has a room which can only be accessed by two persons at a time wearing specific protective gear, a video intercom could ensure each person is properly equipped, before allowing access that particular room. Additionally, for office or workspaces that have shared common areas, such as a cafeteria, gym or even conference rooms, managing access to these spaces will remain a priority, especially with post-pandemic restrictions in place. Video intercoms are a comprehensive safety and security tool for any workspace Deliveries of packages, work-related materials, or even food are common in any office or workspace. Video intercoms can assist in facilitating safe deliveries by visually and audibly confirming the identity of the individual. The visitor could be your next big client, your lunch delivery, a fellow employee with a faulty access card, or your mail. Video intercoms are a comprehensive safety and security tool for any workspace. Visitor management systems Video intercoms provide a cost-effective solution in small to mid-sized office facilities - One significant advantage of video intercom systems is the variety of applications available. Systems range from simple one-to-one video intercoms, to buzz-in systems, to full-fledged visitor management systems in mixed-use buildings. While they might lack the resources and manpower many enterprises have, small-to medium-sized offices can also take steps to ensure the safety of their staff and customers. Like any business, controlling who comes into the building is a primary way of maintaining safety. Video intercoms work in conjunction with access control systems to provide an identifying view of visitors or employees with lost or missing credentials. They allow staff to both see and hear those on the unsecured side of the door to determine intent before granting access. Most quality video intercoms will provide a clear enough image to allow an identification card to be read by holding it close to the lens, adding another opportunity to verify identity. Touchless intercom activation One major trend is the option of providing a touchless door activation Video intercoms provide a touchless option - Even prior to COVID-19, one major trend is the option of providing a touchless door activation or touchless intercom activation of a video intercom for those without proper credentials. Though touchless isn’t a new solution to the access control market, the pandemic introduced a renewed focus on these types of solutions to provide hygienic access to visitors. For offices and other workspaces looking to make investments into post-pandemic solutions to assist in reopening, touchless can support these efforts. When it comes to smart, secure workspaces, many people think instantly of cameras or monitors, access control, and alarm systems. Proper access credentials However, video intercoms are often the missing piece of a building’s security puzzle. A video intercom provides an identifying view that is not always available from a camera covering a large area. They allow those without proper access credentials a method of requesting entry, and just like cameras, they can be activated by alarms to allow staff to clearly see and communicate. If a workspace or office is important enough to be secure, it’s important enough to be sure of who is there before the door is opened. In 2021, it’s not enough to ensure the physical security of your staff and visitors, but also to ensure they are accessing a hygienic environment. Video intercoms provide that security and peace of mind.