USE OF ICT BASED SYSTEMS IN SITE SECURITY MANAGEMENT: A SOUTH AFRICAN STUDY

Main Article Content

Aghaegbuna OZUMBA
Dikeledi MAPATHA
Winston SHAKANTU

Keywords

ICT, Security systems, site theft, site management, site security management

Abstract

Adoption of information and communications technology systems for the enhancement of security management on construction sites is presented in this paper. The site security situation, key influencing factors, use, and impact of ICT-based security systems are examined in the context of South Africa as an emerging economy. The paper uses a purposive sample of special informative literature on construction in developing countries, technology transfer, ICT in Construction, and site security management. Deductions from literature review are complimented with field work using a case study of construction sites. Limitations of access to data sources were placed on the study. Nevertheless the case study approach ensured richness of data collected. Findings suggest the occurrence of security lapses and an appreciable need for site security on local construction sites. While there is availability of ICT-based security systems, there is an apparent lack of expedient adoption considering the benefits, and threats to site security. There is also attestable difference in the impact of adoption amongst adopters and rate of theft on sites which depend on manual systems for security management. Major implications include the need for more adoption of such technologies in site security management, especially in remote areas. In addition there is need to seek ways of using ICT-based systems to enhance the performance of manual systems in site security management. Furthermore the need to adopt such ICT should reflect on tenders for contracts ab initio. Findings from the study add value to the local body of knowledge on ICT in Construction, with regard to possibilities for site security management.

Abstract 129 | PDF Downloads 41

References

Azzar, A. and Karam, A.H. (2003). A Comparative Study: With insight into the use of IT in local Architectural Practices, In: Amor, R, Editor, Proceeding CIB-W78 International Conference on Information Technology for Construction, 23rd – 25th April, New Zealand, Auckland, University of Auckland, pp.8-14.
Barnet, L. (2003). Loss control best practice, Florida partnership safety and health, New York, https://www.riskinstitute.org/peri/images/file/Chapter6sevenstep.pdf (Accessed, 2010 February 23).
Boba, R. and Santos, R. (2008). A review of the Research, Practice and evaluation of construction site theft occurrences and prevention: Directions for future research, Security Journal, Vol.21 (October): 246-263. http://www.palgrave-journals.com/sj/journal/v21/n4/full/8350063a.html (Accessed 2010 February 23).
Charlett, A.J. (1992). Deterring vandalism on building sites. In Harlow, P. A. Editor, In the practice of site management, Vol.4, UK, The Charted Institute of Building (CIOB).
Clark, E. (2007). Fence defence security system for construction sites. http://web.gizmag.com/go/7946 (Accessed 2010 March 21).
Chartered Institute of Building (CIOB), (2009). Industry loses millions every year due to theft, vandalism and health and safety neglect, Contact, UK: CIOB, Issue 76. (September / October): 5.
Earnshaw, L. (1984). Construction site security. London and New York: Longman Inc.
Forster, G. (1989). Construction site studies; Production, administration and personnel. UK: Longman Group Limited.
Glaeser, E.L. and Sacerdote, B. (1999). Why is there more crime in cities?, USA: University of Chicago. http://web.mit.edu/~cwuz/OldFiles/MacData/afs.cwuz.public/14.33/glaeser%20sacerdote%201999.PDF (Accessed 2010 May 3).
Hampton, T. (2004). Under heavy lock and key. http://en3ev5fm5j.search.serialsolutions.com/directLink?&atitle=More%20Contractors%20Are%20Putting%20Under%20Heavy%20Lock%20and%20Key%3B&author=Tudor%Hampton&issn=08919526&title=ENR&volume=253&issue=19&date=20041115&spage=18&id=doi:&sid=ProQss&genre=article&lang=en (Accessed 2010 March 21).
Harris, F. (1989). Modern construction equipment and methods. New York: John Wiley and Sons, Inc.
Healy, R. (1983). Design for security. 2nd edition. Canada: John Wiley and Sons, Inc.
Hinze, E.D. (2004). Theft and vandalism on construction sites. www.dcp.ufl.edu/hinze/Security-Commercial-Construction.htm (Accessed 2010 April 26).
Kelleger, K. (2007). Construction equipment theft a “low risk” gamble, Journal of Commerce, 2007(July). http://www.journalofcommerce.com/article/id23659 (Accessed 2013 March 28).
Kitchen, T. and Scheinder, R.H. (2002). Planning for crime prevention: A transatlantic perspective. London: Routledge.
Koekemoer, V. and Smallwood, J. (2007). Information Technology (IT) in the construction process. In: Boyd, D. Editor, Proceedings of 23rd annual ARCOM Conference, September 3-5, Belfast, UK, Association of Researchers in Construction Management, pp.503-512.
Lepatner, B. (2007). Broken buildings, busted budgets: how to fix America’s trillion-dollar construction industry. New York: University of Chicago.
Louw, A. (1999). Comparing crime in South African major cities, African Security Review. South Africa: Institute for Security Studies. http://www.iss.co.za/pubs/asr/8No1/ComparingCrime.html (Accessed 2013 March 27).
McMillan, J.H. and Schumacher, S. (1993). Research in education: a conceptual introduction. 3rd Edition. Virginia Commonwealth University, United States of America: Harpercollins college publishers.
Mittrup, I., Smarshy, K., Hartman, D. and Bettziecle, V. (2003). An Agent-based Approach to Dam Monitoring. In Amor, R. (Editor), Proceedings, CIB-W78 International Conference on Information Technology for Construction. 23rd – 25th April, New Zealand, Auckland, University of Auckland, pp.239-246.
Nunally, S.W. (1998). Construction methods and management. USA, Prentice-Hall, Inc.
Ofori, G. (2007). Construction in Developing Countries, Construction Management and Economics, January, Vol.25 (Issue 1): 1-6. http://www.informaworld.com/smpp/title~content=t713664979 (Accessed 2008 October 30).
Oxford University press (2013). Theft. Oxford Dictionaries. http://oxforddictionaries.com/definition/english/theft?q=theft (Accessed 2013 march 28).
Oxford University press (2013). Thief. Oxford Dictionaries. http://oxforddictionaries.com/definition/english/thief?q=thief (Accessed 2013 march 28).
Ozumba, A. O. U. and Shakantu, W. M. W. (2013). Investigating barriers to ICT adoption in site management: a pilot study in South Africa, In Proceedings, RICS COBRA 2013 Conference, September 11-13, New Delhi, India, Royal Institute of Chartered Surveyors.
Ozumba, A. O. U. and Shakantu, W. M. W. (2012). ICT in site management process in South Africa. In Proceedings, RICS COBRA 2012 Conference, September 11-13, Las Vegas, USA, Royal Institute of Chartered Surveyors. http://www.rics.org/sg/knowledge/research/conference-papers/cobra-2012-ict-in-site-management-process-in-south-africa-/ (Accessed 3 April 2013).
Ozumba, A. O. U. and Shakantu, W. M. W. (2008). Achieving Ubiquity in the Site Management Process through ICT, In Proceedings, RICS COBRA 2008 Conference, September 4-5, Ireland, Royal Institute of Chartered Surveyors. http://www.rics.org/NR/rdonlyres/98B9FD65-3A92-4EA0-894A-6F913D8BF98E/0/Ozumba.pdf (Accessed 10 March 2009).
Pierre, L. (1991). From drawing board to building site: working conditions, quality, economic performance. United Kingdom: The European foundation for the improvement of living and working conditions (Eurofound).
Poyner, B. (1983). Design against crime: Beyond defensible space. UK: Butterworth.
Sales, L. (2006). The site manager’s bible. London: Ebury Publishing.
Sharma, A. and Bausman, D. (2009). Construction site security: The impact of company size and loss history on security measures. Clemson, South Carolina: Clemson University. http://ascpro0.ascweb.org/archives/cd/2010/paper/CPRT119002010.pdf
Trochim, W. M. K. and Donnelly, J. P. (2008). The Research Methods Knowledge Base. (3rd Edition). USA: Cengage learning.
Trunko, M. (2002). Protect your assets, Rental Equipment Register Magazine, (February 2002). http://rermag.com/mag/anti-theft-systems-jaws-pit-bull (Accessed 2013 March 28).
Wilson, J. (2009). New technology can slow construction site crime, California Builder, California Building Industry Association. http://www.cbia.org/go/cbia/california-builder-magazine/current-issue/construction-site-crime/ (Accessed 2013 March 28).

Similar Articles

141-150 of 157

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)