Integrating work processes and technology effectively

August 2001 Infrastructure

If you have not redone your security control room in the last five years, chances are it is due for an upgrade. Industry service expectations and technology advances in equipment have left holes in consoles, a mismatch of equipment competing for position, and operators struggling with a range of technology interfaces that often restrict the handling of workflow and tasks rather than facilitating them.

Whether you are installing a whole set of new technology or whether you are upgrading your existing equipment, you need to consider carefully how it is going to be implemented. It is not just how good the equipment will be, it is how it will fit in with what you want to achieve and how you organise your work and people in order to do it.

Companies spend so much on the technology that there is almost an expectation that the technology by itself will provide the solution. People are then disappointed when they do not get the results they were initially looking for. Relatively few sites have engaged from the beginning in a detailed look at the way that work will be organised and integrated with the technology.

Workflow

This includes specifying the different functions to be performed and required tasks, the work processes and work flow, the normal state of operation and peak rates or emergency situations, implications for workload, and how work tasks and responsibilities will be allocated and organised around positions. Why do I emphasise this? Because in many instances it is only after the technology is installed that people give serious considerations to these factors.

The nature of work processes and workflow should be closely tied to the technology right from the beginning to give the best solution. You should be able to visualise how the work is going to be done using the new technology before the final tender is approved. Indeed, in some advanced operations, simulations and computer modelling is done to review workflow and how it will be handled under different scenarios before the equipment has even been finalised. The control room at Heathrow airport is a good example of this. A clear knowledge and understanding of the work functions and the work process has implications for a whole range of issues that impact on how well work is done, including things like ergonomics, job design, and departmental structuring. This development process allows one to think through as many of the issues that will impact on effective performance as possible.

Control room consoles

One of the areas that benefits from a thorough analysis of the work process is control room consoles. What goes into a console and how it is designed is a critical part of the final effectiveness of all the technology. While the easy solution is to go out and get a standardised console or something that looks good at another site, this can seriously impact on the usefulness of your system.

I have touched on this in previous articles on ergonomics but I still encounter it on a regular basis. It is not just a case of getting as much equipment into a console as possible. Layout, workload, information presentation and management, priority setting, visual processing, and ease of use are just some of the issues relating to consoles. These can only be properly decided on after an in-depth review of the technology equipment and the impact of this on the operator's job functions and the work processes. Inevitably these demands differ from site to site. Taking a console design from one site and transplanting it into another will usually lead to a number of compromises in design.

Let us take a look at some examples from four different sites to illustrate this point. All of the sites below involve a combination of access control, CCTV and alarms. Theoretically, they could all have the same console. However, the demands of the sites and the resultant work objectives and processes have resulted in very different designs.

Scenario 1: Two linked consoles perform surveillance on two different types of areas with an emphasis on CCTV. The consoles are positioned in an L-shaped design. Straight desks follow the L design with the use of well populated monitor walls with 20" monitors (some multiplexed with four images on screen). Each desk area has a spot monitor, control monitor and access and communication equipment. There are separate single operators for each console. Additional personnel can be added in emergencies.

Scenario 2: In this site, a single console has been developed in a wide U-shape with access control and alarms on the side with CCTV and communications panel in the centre. CCTV monitors are integrated into the console itself. The design allows for a dedicated focus on any one of the functions of access, CCTV, or alarms but switching between these is easily done. The layout facilitates staffing by one or two operators on the same console depending on workload and situations.

Scenario 3: The alarm/access workstation is entirely separated from the CCTV workstations to allow dedicated attention to these different areas. This is due to the high workload demands of each function and benefits of specialised knowledge in the respective areas. The CCTV workstations have a desk mounted spot and control monitor with modular monitor walls to facilitate expansion and positioning. The modular design also allows different areas under surveillance to be separated into individual monitor wall sections. The fact that the individual workstations are staggered but positioned facing the same way allows operators to view the monitor walls as required. Shared and different areas can be monitored in this way.

Scenario 4: This site has a desktop-based console with spot, control and access/alarm monitors. Each workstation for the individual operator is a cubical type design to avoid distractions but part of the same overall straight line console. Surveillance, access control and alarms are viewed on the desktop screens with no monitor wall being used. Operators can communicate verbally with each other and coordinate action when required.

These four different scenarios are actual sites where the design has been influenced by what people want to accomplish and how this has incorporated into the work processes. Additional considerations such as the space available and the room design were also considered. Each scenario best accomplishes the demands faced by the operators on that particular site in a unique way. An in-depth analysis of the appropriate work processes and workloads and staffing implications is an important part of handling these demands effectively.

Dr Craig Donald is an industrial psychologist and specialist in human factors in security and CCTV. He is the co-developer of the Surveillance and Monitoring Assessment Exercise (SAMAE) for the selection and placement of CCTV operators and presenter of the CCTV Surveillance Skills training course. He can be contacted on telephone: (011) 787 7811, fax: (011) 886 6815, or e-mail: [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Advanced surveillance storage from ASBIS
Infrastructure Surveillance Products & Solutions
From a video storage solutions perspective, SkyHawk drives, designed for DVRs and NVRs, offer high capacity, optimised firmware, and a reliability workload rating of hundreds of terabytes per year.

Read more...
Power surges are killing our networks
Duxbury Networking Infrastructure
With power surges and lightning strikes becoming an all-too-familiar threat to South African infrastructure, Duxbury Networking is calling on local installers and network integrators to follow proper grounding protocols.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
The rise of autonomous data recovery
Information Security Infrastructure
Escalating cyberthreats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss.

Read more...
Can we really fight AI cybersecurity threats with more AI?
Information Security Infrastructure
In a world where artificial intelligence (AI) is increasingly being weaponised by cybercriminals, the question of whether we can effectively combat AI threats with more AI is not just a technical inquiry but a pressing global concern

Read more...