StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Nature Of Surveillance, Surveillance Implications for Security - Coursework Example

Cite this document
Summary
The paper "The Nature Of Surveillance, Surveillance Implications for Security " is a great example of information technology coursework. Surveillance is the main factor of modern developed western societies. Surveillance practices and technologies are extensively used in various sectors that include security and police force, companies, hospitals, organizations, government, and retail stores among other places…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful

Extract of sample "The Nature Of Surveillance, Surveillance Implications for Security"

The Nature of Surveillance Student’s Name Institution’s Name Date The Nature of Surveillance Introduction Surveillance is the main factor of modern developed western societies. Surveillance practices and technologies are extensively used in various sectors that include security and police force, companies, hospitals, organizations, government, and retail stores among other places. Surveillance refers to selective, continuous observation of objects, persons, things or places so as to gather information. It is normally done for security purposes, though in some cases, it is done to ensure efficiency and prevent breaking of the operation rules (Ahmed, 2013). However, its use has highly created controversy on individual privacy and trust in social relation. Nevertheless, its great benefits on security related aspect has enhanced the extensive use of surveillance despite of the negative views. Surveillance is enhanced using various means that include the use of CCTVs, tracking devices, biometric means, trapping of telecommunication devices, GPS, and keystroke software among others. Its use has highly been enhanced by the development of big data technology which enhances the storage of huge volumes of data in the modern databases (Ju, 2014). This paper focuses on critically evaluating the nature of surveillance in big data context and in the context of security and privacy. Meaning of Surveillance in the Information Age Initially, surveillance involved the use of physical means or wiretapping of telecommunication devices to gain more information about things or a person. However, this has greatly changed with the evolution of communication technology in the world. The extensive use of computers, internet technology and revolutionary of database technology has brought a new meaning to surveillance (Burton, 2007). The modern form of surveillance involves the use of technical surveillance, which involves the use of technical devices to monitor, document or record, the movements, activities or conversations of a targeted individual. It entails a systematic continuous gathering, organization, and analysis of data and the timely information dissemination to those who require to know the action to be taken (Nostate.net, 2009). Surveillance is normally done for a reason which include security purpose or to enhance commitment and efficiency in work. Thus, surveillance devices are set in a manner that they will capture the required information with great level of efficiency, during normal business operations at all times. These devices are integrated into a complete database system where the captured data are stored to enhance further organization and analysis, to acquire the required information. Surveillance data collected depends on the targeted area or people and the devices used. Devices installed in public places focus on all individuals visiting these places, while surveillance devices employed in other places focus on particular individuals and their activities (Esposti & Gomez, 2015). In addition, some devices collect images while others collect voices. For instance, in retail stores the CCTVs focus on the activities of the customers, while in offices or companies, surveillance devices focus on collecting images on activities of workers (VDS, 2006). However, surveillance devices in cars and in computers focus on collecting particular information regarding the driver or user, for instance driver’s location or user’s keystrokes. In this regard, it can be said that the surveillance target depends on the actual activity taking place in the targeted area and the data processed can vary based on the device target (Cumming & Johan, 2015). Constitutes of Surveillance Surveillance involves diverse forms of collecting personal details regarding the targeted individuals. These different forms include listening devices in cars and homes, night-vision devices, tracking devices, CCTV videos or images, internet activity monitoring, and tapped telephones for the actual calls content or communication recording, or most frequently, categorical or numerical data, RFID employment on shipments, GPS to read individual position, and biometrics that include iris scans or fingerprints (Michael, 2014; Weinberg, 2004). Others may include the employment of computer activities monitoring software such as spyware or keystroke monitoring. As defined surveillance requires to be continuous, secretive watching of a vehicle, person, object, or place so as at to get information (Marx, 2004). Thus, surveillance needs to be undetected and unnoticed to enhance efficiency, to ensure that the individual being monitored is not cautious, but acts in the most natural way possible, based on his or her nature. In this regard, surveillance can be complex to detect since it strives to be hidden and convert. Information development via surveillance is normally a lengthy and progressive process (Lyon, 2002). The patterns of the overall picture of the targeted individual or event are developed from several pieces of information which are pieced together. Surveillance will usually start with limited information regarding the targeted workplace, residence or activity, and extra information will be developed so as to identify activities, times, travel routes, or location in which to centre the target pattern analysis or surveillance effort. This varies extensively based on where the surveillance is employed and the main purpose of the surveillance. More than one form of surveillance may be used while monitoring criminal behaviours of a person. However, one form of surveillance may be enough while monitoring work behaviour of an employee. Who is Being Watched and by Whom The surveillance target normally varies based on the places where surveillance is employed. In retail stores, surveillance involves watching of the customers’ activities by the management as a way of detecting petty theft. In companies, surveillance focuses on individuals who access the company and is purposely meant to deny access to unauthorized individuals and create an alarm in case a force entry is made. This is either done by the security personnel or the management. In the workplace, surveillance involves monitoring of individual worker’s activities. This can vary based on the assignments given (Fuchs, 2015). For those using computers, their activities can be monitored either with a CCTV or installed software, which snoop on visited sites or individual keystrokes. For those travelling from one place to another, tracking devices may be used to find of their where about. Employees’ phones calls may also be recorded or tapped for general data on their usage and the form of communication done (Koskela, 2000; Potokar & Bernik, 2014). All this is done by the employer with intention of enhancing work efficiency. In public surveillance is enhanced by the government security department with intention of monitoring activities in a certain area for security purposes (Home Office, 2010; Potokar & Androic, 2016). This enhances the identification of offenders in the public. Surveillance is also used on roads by traffic department to identify traffic offenders and accident events (Lin, 2016). It can also be used by parents to monitor the movement of their teenage children or to monitor their calls and internet activities. In schools, surveillance is normally used in exam rooms to monitor on exam irregularities. Thus, surveillance applicants and targets can vary extensively based on the places and intended information. Surveillance Implications for Privacy Surveillance has played a great role in interfering with the privacy of individuals in the public. People have turned to be surveillance targets in every turn of life. Information about people is collected in beauty parlours, in transaction with retailers, day-care providers, medical care givers, and mail order companies among other places (ACLU, 2016; Privacy International, n.d.). This information is stored, analysed and in some cases shared. There is uncontrollable harvesting of individual information from different governmental agencies for security purposes, which in its self threatens privacy of innocent citizens. Surveillance is workplace has highly interfered with workers’ right to privacy (Galetta, 2013; Nieto et al., 2002; York, 2014). Despite work privacy being considered as human basic need in various nations, the advancement of surveillance in workplace has highly infringed this right as employers employ more effort to enhance monitoring of their employees (Ju, 2014; Nissenbaum, 1998). Surveillance also interferes with individual health privacy as more and more information is collected and stored as a way of monitoring individual health progress. This information is highly retrievable and can highly be shared without the patient consent (Haggerty & Trottier, 2015). Surveillance Implications for Security Surveillance has played a great role in enhancing security in different organization and more to the general security of a country. Surveillance have been extensively use by the security agencies to track down criminals and to collect all the required proof to enhance the legal action against them. It has also played a great role in fighting terrorism that had turned to be a great challenge in the world (Esposti & Gomez, 2015). Surveillance can therefore be commended for playing a great role in identifying possible security threats and curbing them before they turn to be destructive (Nostate, 2009). Surveillance is also used in medical organization to monitor individual health development and employ possible measures to prevent further destructions. It is also highly employed in monitoring and controlling the spread of communicable diseases in the society. Thus, surveillance plays a great role in identifying changes in medical condition in the society, particularly in identifying rising cases of certain medical condition in the society, and enhances the development of strategies to control it (WHO, 2006). Conclusion The growth of computer and electronic technology has played a great part in the development of technical surveillance in the world. Surveillance has been widely employed by different organizations and institutions with intention of enhancing work efficiency and security. Surveillance has played a great role in reducing the security threats in various places, especially in terrorism. Nevertheless, the extensive collection, storage, analysis, and sharing of individual data has highly interfered with people privacy. This has created controversy of the application of surveillance in the public, despite of its contribution in security matters. References ACLU. (2016). Privacy and surveillance. Retrieved from < https://www.aclu.org/issues/national-security/privacy-and-surveillance> Ahmed, S. (2013). Censorship and surveillance in the global information age: Are telecommunications companies agents of suppression or revolution. Journal of Law, Technology, & the Internet, 4(2), 504-530 Burton, F. (2007, Jun 13). Surveillance in the information age. Retrieved from < https://www.stratfor.com/surveillance_information_age> Cumming, D., & Johan, S. (2015). Cameras tracking shoppers: the economies of retail video surveillance. Eurasian Business Review, 5, 235-257. Esposti, S. D., & Gomez, E. S. (2015). Acceptable surveillance-oriented security technologies: Insights from the surprise project. Surveillance & Society, 13(3/4), 437-454. Fuchs, C. (2015). Reading Marx information age: A media and communication studies perspective on capital volume 1. Routledge Galetta, A. (2013). The changing nature of the presumption of innocence in today's surveillance societies: rewrite human rights or regulate the use of surveillance technologies? European Journal of Law and Technology, 4(2). Retrieved from < http://ejlt.org/article/view/221/377> Haggerty, K. D., & Trottier, D. (2015). Surveillance and/of nature monitoring beyond the human. Society & Animals, 23(4), 400-420. Home Office. (2010). Covert surveillance and property interference. Norwich: TSO. Retrieved from < https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/97960/code-of-practice-covert.pdf> Ju, R. (2014). Issues of privacy and surveillance in information age: In the web 2.0 environment and organizational setting. China Media Research, 10(3), 87-93. Koskela, H. (2000). The gaze without eyes‘: video-surveillance and the changing nature of urban space. Progress in Human Geography, 24(2), 243-265. Lin, H. (2016). Having a conversation about bulk surveillance. Communications of the ACM, 59(2), 40-42. Lyon, D. (2002). Surveillance studies: understanding visibility, mobility and the phonetic fix. Surveillance & Society, 1(1), 1-7. Marx, G. T. (2004). What’s new about the “newsurveillance”? Classification for change and continuity. Surveillance & Society,1(1), 9-29. Michael, K. (2014). Redefining surveillance: Implications for privacy, security, trust and the law. Retrieved from< http://www.issuesmagazine.com.au/article/issue-december-2014/redefining-surveillance-implications-privacy-security-trust-and-law.html> Nieto, M., Johnston-Dodds, K., & Simmons, C. W. (2002). Public and private applications of video surveillance and biometric technologies. Retrieved from < https://www.library.ca.gov/crb/02/06/02-006.pdf> Nissenbaum, H. (1998). Protecting privacy in an information age: the problems of privacy in public. Law and Philosophy, 17, 559-596. Nostate. (2009). Security & counter-surveillance: Information against the police state. Retrieved from < http://325.nostate.net/library/security-countersurveillance.pdf> Potokar, M., & Bernik, I. (2014). Video surveillance from the personal data protection point of view. In D. Čaleta, M. Vršec, & B. Ivanc (Eds.), Corporate security – open dilemmas in the modern information society (pp. 131–138). Potokar, M., & Androic, S. (2016). Video surveillance and corporate security. Journal of Criminal Justice and Security, 2, 148-163. Privacy International. (n.d.). Mass surveillance. Retrieved from < https://www.privacyinternational.org/node/52> VDS. (2006). Video surveillance system (CCTV). Retrieved from < http://vds.de/fileadmin/vds_publikationen/vds_5473en_web.pdf> Weinberg, J. (2004). RFID and privacy. Retrieved from < http://papers.ssrn.com/sol3/papers.cfm?abstract_id=611625>. WHO. (2006). Communicable disease surveillance and response system: Guide to monitoring and evaluating. Retrieved from < http://www.who.int/csr/resources/publications/surveillance/WHO_CDS_EPR_LYO_2006_2.pdf> York, J. (2014). The harms of surveillance to privacy, expression and association. Electronic Frontier Foundation. Retrieved from < https://giswatch.org/en/communications-surveillance/harms-surveillance-privacy-expression-and-association> Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Nature Of Surveillance, Surveillance Implications for Security Coursework, n.d.)
The Nature Of Surveillance, Surveillance Implications for Security Coursework. https://studentshare.org/information-technology/2085581-the-nature-of-surveillance
(The Nature Of Surveillance, Surveillance Implications for Security Coursework)
The Nature Of Surveillance, Surveillance Implications for Security Coursework. https://studentshare.org/information-technology/2085581-the-nature-of-surveillance.
“The Nature Of Surveillance, Surveillance Implications for Security Coursework”. https://studentshare.org/information-technology/2085581-the-nature-of-surveillance.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Nature Of Surveillance, Surveillance Implications for Security

Homeland Security

This assignment "Homeland security" shows that the legal system of the United States has provisions regarding terrorists and acts of terrorism.... Some of these laws include the Foreign Intelligence security Act.... Foreign Intelligence security Act (FISA) The 1978 Foreign Intelligence Surveillance Act (FISA) allowed agents easy access to warrants if they could show that there was a substantial 'foreign intelligence' angle to their work; the warrants would be granted by a special FISA court....
8 Pages (2000 words) Assignment

Communications Surveillance, Privacy and Its Ethical Implications

This paper presents an overview of surveillance of communications.... In fact, in the majority of countries, security agencies have forced internet service providers as well as telecommunications firms to keep an eye on users' communications.... This paper ''Communications Surveillance, Privacy and Its Ethical implications'' presents an overview of ethical and moral concerns in communications surveillance.... The basic aim of this research is to analyze the legal, privacy and ethical implications of communications surveillance....
8 Pages (2000 words) Literature review

Surveillant assemblages

But for those who widely look towards the social benefits of surveillance, the notion that people are becoming inured to the gaze of the camera in a worrisome matter.... The city of London is filled with security cameras.... Nowadays a new subjectivity is taking place in the western world regarding surveillance.... These power relations can be described as surveillance assemblages.... According to experts the next generation cameras that are used for surveillance in the streets of London will be equipped wit computer software that can judge suspicious behavior that can lead towards a crime....
10 Pages (2500 words) Essay

Surveillant Assemblage

n the past, surveillance was used primarily by the government for security as well as safety issues (Ericson 2007, p.... The paper "Surveillant Assemblage" describes that surveillant assemblage incorporates a system of surveillance tools that monitors almost all activities that individuals undertake in their day-to-day lives.... Moreover, the purpose of surveillance in the modern perspective has also changed as compared to the past.... This implies that the modern forms of surveillance are less concerned with the physical body but more concerned with electronically obtained information that the institutions use in creating an individual's image concerning needs and behaviours such as purchase behaviours (Williams & Johnson 2007, p....
16 Pages (4000 words) Essay

Electronic Surveillance at Work

The role of surveillance is becoming more and more crucial in the complex and competitive corporate world.... here may be two types of surveillance that can be employed in an organization.... The positive implications of using the electronic surveillance technique in workplaces are also mentioned.... The report includes an overview of the electronic surveillance technique followed by an identification of the primary uses of the electronic surveillance systems in a company, the advantages, and disadvantages of using these kinds of systems are also discussed....
5 Pages (1250 words) Essay

Surveillance's Influence on the Society

This increasing need for security and the consequent growing perception of these needs highlights the global modern insecurity (Coleman and McCahill, 2010:135).... The essay "Surveillance's Influence on the Society" seeks to highlight the benefits and risks of surveillance in the UK society, with emphasis on technology and society.... Another important feature is the concept of surveillance is the vital role of technology in advancing surveillance techniques....
7 Pages (1750 words) Essay

Impact of Surveillance on Society

The "Impact of surveillance on Society" paper undertakes to look into the positive and negative ways in which the surveillance system impacts the society.... We can easily understand and interpret that the technology of surveillance not only monitors the people themselves but also makes them aware and account for their acts themselves.... The concept of surveillance refers to supervising and monitoring the activities, behaviors and other various information about the people in order to direct, influence, manage or protect them (Lyon, David, 2007)....
9 Pages (2250 words) Research Proposal

Technology and Nature of Surveillance

The paper "Technology and nature of surveillance" is focused on surveillance as the collection and processing of personal data, which can be either, personally identifiable or not, with a view to managing or exerting influence on the people whose data or information has been gathered.... Notably, the definition of surveillance involves gaining the power to exert influence over other people, as well as the fact that in some circumstances, the people being watched may have no idea that somebody is collecting their personal data (Humphreys, 2011)....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us