StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Image Recognition and Surveillance - Term Paper Example

Cite this document
Summary
With technological advancements, the world has constantly been searching for ways to curb insecurity and maim those culprits involved in disturbing peace in various countries. In the golden age, there have been a number of groups responsible in causing chaos in various…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Image Recognition and Surveillance
Read Text Preview

Extract of sample "Image Recognition and Surveillance"

Download file to see previous pages

Ever since the September 11th bombing of the United States, several surveillance units were created to help in fighting terrorism both internally and externally. It has come to our knowledge that various surveillance systems have been installed in the country’s entry and exit points to help in monitoring and identifying such suspects (Winston, 2013). There have been a number of human rights groups that have been refuting the given move by the governments to put hidden and open surveillance technology in the general population arguing that it is unethical as it intrudes their private lives.

According to my opinion, I support the evolution of surveillance to be a blessing to bring a safer world. There are many types of surveillance and imaging technologies existent in the world. They include; imaging recognition devices, biometrics, social network analytical software, transponders, GPS tracking, RFID tagging, satellite imagery, Arial drone use, CCTV cameras, facial and phone thermographs (Tavani, 2011). Evolution of surveillance came about due to the need to improve security, prevent it from occurring and create a safe environment to stay (Tavani, 2011).

A number of technological gadgets have been created to detect harmful devices and weapons used by assailants at various checkpoints hence allowing early arrest of the perpetrators before committing a given crime. Surveillance hence serves as a man’s third eye in keeping everything at check (Tavani, 2011). We have heard several incidences of terror groups being stopped just before committing a given crime. A good example could be terror suspects arrested at the airport after having being found carrying weapons and explosives.

In cities and several towns, and intelligent traffic system is another technological surveillance tool that has been put to use to curb cases of insecurity and to bring law and order. This

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Image Recognition and Surveillance Term Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/sociology/1635106-image-recognition-and-surveillance
(Image Recognition and Surveillance Term Paper Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/sociology/1635106-image-recognition-and-surveillance.
“Image Recognition and Surveillance Term Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/sociology/1635106-image-recognition-and-surveillance.
  • Cited: 0 times

CHECK THESE SAMPLES OF Image Recognition and Surveillance

Is Surveillance a Necessary Feature of Democracy

The paper "Is surveillance a Necessary Feature of Democracy?... tells us about surveillance and democracy.... nbsp;Although the UK, per se, has not established through statutory means a law which directly addresses the right to privacy of its citizens the state falls under the EU Convention on Human Rights....
10 Pages (2500 words) Essay

Critical Evaluation of whether Britain Constitutes a Total Surveillance Society

This assignment "Critical Evaluation of whether Britain Constitutes a Total surveillance Society?... being a surveillance society in which all details of personal lives are gathered, stored and processed with the computer as a database.... hellip; surveillance is a system in which the behaviour of people is monitored in a secretive manner.... Under surveillance, an individual or a group of people is observed by government organizations....
9 Pages (2250 words) Assignment

Security, Audit and Compliance

However, the data protection laws alone may not effectively apply to businesses making use of CCTV surveillance.... Advancement in telecommunications technology is an indication that the surveillance will continue improving.... This research paper "Security, Audit and Compliance" focuses on measures that have to be enforced to ascertain that the use of different forms of data processing like the closed-circuit television, does not infringe on the rights of the data subjects, by ensuring the proper handling of the data....
13 Pages (3250 words) Research Paper

Privacy under Electronic Surveillance

The paper "Privacy under Electronic surveillance" highlights that various privacy concerns have emerged as a result of the implementation of electronic surveillance.... This has taken place in almost all aspects of modern society because surveillance can be done through mobile phones, on the streets.... Therefore, the cons of electronic surveillance outweigh the pros and better application of the system can be adopted to eliminate privacy concerns....
5 Pages (1250 words) Essay

Integration of Surveillance Technology into Strategies of State Control by Public Order in the UK

The essay "Integration of surveillance Technology into Strategies of State Control by Public Order in the UK" focuses on surveillance as an observation from a distance used for transmitting the information to a particular common point.... It will unravel the extent to which, the public influences the integration process of surveillance technology in the UK.... hellip; surveillance involves monitoring the behavior of people for the purpose of influencing, directing, or protecting these people....
9 Pages (2250 words) Essay

Iris Recognition Systems

… Iris recognition systemsIntroduction1994 was the year when Iris recognition systems were patented for the first time.... This technology works by the process of identifying the outside circular borders in the pupil and iris of the human eye and then Iris recognition systemsIntroduction1994 was the year when Iris recognition systems were patented for the first time.... The iris recognition systems need to have the ability to cope with the heavy human traffic that can be found in any busy airport....
6 Pages (1500 words) Article

Technology and Nature of Surveillance

The paper "Technology and Nature of surveillance" is focused on surveillance as the collection and processing of personal data, which can be either, personally identifiable or not, with a view to managing or exerting influence on the people whose data or information has been gathered.... hellip; Notably, the definition of surveillance involves gaining the power to exert influence over other people, as well as the fact that in some circumstances, the people being watched may have no idea that somebody is collecting their personal data (Humphreys, 2011)....
6 Pages (1500 words) Essay

Designing the Closed-Circuit Television System for Gold Storage Facility

The primary goal of the installation of CCTV is to be used for surveillance and offer security either in private or public properties.... The CCTV will be required to offer surveillance to prevent the threats mentioned above from taking place.... CCTV is therefore required to offer surveillance over movement activities inside and outside the gold facility.... Furthermore, authorized personnel has to pass through facial recognition areas where their database is stored....
11 Pages (2750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us