Integrating work processes and technology effectively

August 2001 Infrastructure

If you have not redone your security control room in the last five years, chances are it is due for an upgrade. Industry service expectations and technology advances in equipment have left holes in consoles, a mismatch of equipment competing for position, and operators struggling with a range of technology interfaces that often restrict the handling of workflow and tasks rather than facilitating them.

Whether you are installing a whole set of new technology or whether you are upgrading your existing equipment, you need to consider carefully how it is going to be implemented. It is not just how good the equipment will be, it is how it will fit in with what you want to achieve and how you organise your work and people in order to do it.

Companies spend so much on the technology that there is almost an expectation that the technology by itself will provide the solution. People are then disappointed when they do not get the results they were initially looking for. Relatively few sites have engaged from the beginning in a detailed look at the way that work will be organised and integrated with the technology.

Workflow

This includes specifying the different functions to be performed and required tasks, the work processes and work flow, the normal state of operation and peak rates or emergency situations, implications for workload, and how work tasks and responsibilities will be allocated and organised around positions. Why do I emphasise this? Because in many instances it is only after the technology is installed that people give serious considerations to these factors.

The nature of work processes and workflow should be closely tied to the technology right from the beginning to give the best solution. You should be able to visualise how the work is going to be done using the new technology before the final tender is approved. Indeed, in some advanced operations, simulations and computer modelling is done to review workflow and how it will be handled under different scenarios before the equipment has even been finalised. The control room at Heathrow airport is a good example of this. A clear knowledge and understanding of the work functions and the work process has implications for a whole range of issues that impact on how well work is done, including things like ergonomics, job design, and departmental structuring. This development process allows one to think through as many of the issues that will impact on effective performance as possible.

Control room consoles

One of the areas that benefits from a thorough analysis of the work process is control room consoles. What goes into a console and how it is designed is a critical part of the final effectiveness of all the technology. While the easy solution is to go out and get a standardised console or something that looks good at another site, this can seriously impact on the usefulness of your system.

I have touched on this in previous articles on ergonomics but I still encounter it on a regular basis. It is not just a case of getting as much equipment into a console as possible. Layout, workload, information presentation and management, priority setting, visual processing, and ease of use are just some of the issues relating to consoles. These can only be properly decided on after an in-depth review of the technology equipment and the impact of this on the operator's job functions and the work processes. Inevitably these demands differ from site to site. Taking a console design from one site and transplanting it into another will usually lead to a number of compromises in design.

Let us take a look at some examples from four different sites to illustrate this point. All of the sites below involve a combination of access control, CCTV and alarms. Theoretically, they could all have the same console. However, the demands of the sites and the resultant work objectives and processes have resulted in very different designs.

Scenario 1: Two linked consoles perform surveillance on two different types of areas with an emphasis on CCTV. The consoles are positioned in an L-shaped design. Straight desks follow the L design with the use of well populated monitor walls with 20" monitors (some multiplexed with four images on screen). Each desk area has a spot monitor, control monitor and access and communication equipment. There are separate single operators for each console. Additional personnel can be added in emergencies.

Scenario 2: In this site, a single console has been developed in a wide U-shape with access control and alarms on the side with CCTV and communications panel in the centre. CCTV monitors are integrated into the console itself. The design allows for a dedicated focus on any one of the functions of access, CCTV, or alarms but switching between these is easily done. The layout facilitates staffing by one or two operators on the same console depending on workload and situations.

Scenario 3: The alarm/access workstation is entirely separated from the CCTV workstations to allow dedicated attention to these different areas. This is due to the high workload demands of each function and benefits of specialised knowledge in the respective areas. The CCTV workstations have a desk mounted spot and control monitor with modular monitor walls to facilitate expansion and positioning. The modular design also allows different areas under surveillance to be separated into individual monitor wall sections. The fact that the individual workstations are staggered but positioned facing the same way allows operators to view the monitor walls as required. Shared and different areas can be monitored in this way.

Scenario 4: This site has a desktop-based console with spot, control and access/alarm monitors. Each workstation for the individual operator is a cubical type design to avoid distractions but part of the same overall straight line console. Surveillance, access control and alarms are viewed on the desktop screens with no monitor wall being used. Operators can communicate verbally with each other and coordinate action when required.

These four different scenarios are actual sites where the design has been influenced by what people want to accomplish and how this has incorporated into the work processes. Additional considerations such as the space available and the room design were also considered. Each scenario best accomplishes the demands faced by the operators on that particular site in a unique way. An in-depth analysis of the appropriate work processes and workloads and staffing implications is an important part of handling these demands effectively.

Dr Craig Donald is an industrial psychologist and specialist in human factors in security and CCTV. He is the co-developer of the Surveillance and Monitoring Assessment Exercise (SAMAE) for the selection and placement of CCTV operators and presenter of the CCTV Surveillance Skills training course. He can be contacted on telephone: (011) 787 7811, fax: (011) 886 6815, or e-mail: [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Navigating the evolving tech landscape in 2024 and beyond
Residential Estate (Industry) Infrastructure
Progress in the fields of AI, VR and social media is to be expected, but what is not, is our fundamental relationship with how we deploy solutions in our business and how it integrates with greater organisational strategies and goals.

Read more...
iOCO collaboration protection secures Office 365
Information Security Infrastructure
The cloud, in general, and Office 365, in particular, have played a significant role in enabling collaboration, but it has also created a security headache as organisations store valuable information on the platform.

Read more...
Smart mining operations management
Mining (Industry) Infrastructure IoT & Automation
In his presentation at the recent MESA Africa conference, Neels van der Walt, Business Development Manager at Iritron, revealed the all-encompassing concept of SMOM (Smart Mining Operations Management) and why it is inextricably linked to the future of worldwide mining operations.

Read more...
Do you need a virtual CIO?
Editor's Choice News & Events Infrastructure
If you have a CIO, rest assured that your competitors have noticed and will come knocking on their door sooner or later. A Virtual CIO service is a compelling solution for businesses navigating tough economic conditions.

Read more...
The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Read more...
Cyber resilience – protect, defend, recover
Infrastructure
The challenge with AI is that threats are getting harder to detect. As a result, plans in 2024 are not just about detection and prevention, but about recovery.

Read more...
Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Top bets for backup and business continuity
Infrastructure
Become your organisation’s data pioneer and spearhead data governance and protection of critical data. Challenge why best practices are not adopted or in place, while highlighting the inherent risks this poses.

Read more...
Next-gen solar-powered switches
Infrastructure
Duxbury Networking has introduced its range of solar unmanaged switches, which are ideal for any environment requiring reliable Power-over-Ethernet (PoE) capabilities, such as IP phones, cameras, and access points.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...