StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Development of a Surveillance Cameras System - Article Example

Cite this document
Summary
This article "Development of a Surveillance Cameras System" discusses how various digital media platforms and the internet have enabled the act of surveillance to be carried out without the prior knowledge of the target victims and how the collected data is used…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful

Extract of sample "Development of a Surveillance Cameras System"

Name Professor`s name Course title Date The acceptance and widespread use of the modern state of art technology provide us either great benefit that could either be social, cultural or even economical. Every user of the modern technology that includes the internet or other digital media platform is determined to fulfill a certain duty that could be economical of social or both. Therefore the constant use of the internet and the other media platform that are digital has led to every person to be under constant surveillance by either the government or commercial organization who correct the data for certain use. The collected data is later analyzed using algorithms which determine certain likely patterns that could otherwise not be determined by the human being. Surveillance can arguably be defined as the constant cumulative process of the interlocked networks through which data is collected, analyzed and purposely used to forge a future visibility (Trottier, 2012). In this article or rather the paper, we shall discuss how various digital media platforms and the internet have enabled the act of surveillance to be carried out without the prior knowledge of the target victims and how the collected data is used and the likely parties’ that have benefit from this act of surveillance. Also we shall look into the issues and implications that have resulted from the act of surveillance on personal data and how they have been handled by the victims or rather the users of the modern technology which is the internet and other digital media platforms that simplified how we communicate with the rest of the society. The modern digital media platforms and the internet have provided the users with an ideal environment for them to actually voluntarily provide personal details either in the interests of sharing or in return for a service especially the websites (Rolls, 2006). Social sites such as the Twitter, Facebook have been established to request personal information from the users for them to be able to use their services. Same case has also applied to the e-commerce sites where accurate personal details are actually required so that you can use their services. The idea that the modern people can have total privacy to their data is largely considered a myth in the modern day setting and age. When we provide data to such parties we actually never know what they will do with our data or if they will share it with third parties with a prior knowledge form the users. We have had several cases where the Homeland Security in America has monitored the tweets from various users since the 9/11 disaster on the American soil. When they monitor the users’ tweets in the twitter, they will also have the personal details about the users account and can be able to track down the users to the location they actually reside. Figure: The image of the 9/11 attacks in USA In public places such as shopping malls, leisure parks, worship areas there are closed circuit television cameras (CCTVs) have been installed and at times introduced to certain places that make it difficult for us to know they are actually there. These closed circuit cameras usually collected data from us; the data is stored in a database where it can later be analyzed for a certain specified reason. We actually can note how our personal privacy has been breached and how data is now being collected without our prior knowledge and cannot know how they collected data will be used and for what purpose (Uemura & Murata, 2009). Digital communication devices like the mobile phones have enabled the collection of data from other persons to be very simplified and this act of data gathering can be timely carried out without the victim ever noticing. Mobile phone applications such as Bluetooth and the wireless fidelity (wifi) have enabled user’s phones to the accessed remotely and their personal data like the emails to read, the contact lists to be harvested and other sorts of information deemed to be personal. When a user walks through a public place with the Bluetooth or the wifi networks activated, the hackers r rather the data harvester can get connected to the wifi or the Bluetooth networks and thereafter access a person’s personal data without any prior permission from the victim (Stephenson, 2011). Global positioning (GPS) tools and applications that can be installed on the mobile phones and the computers connected to the internet have readily enabled the harvesting of personal data. In mobile phones that support this application, a person`s data of where he has been travelling to several days can be harvested hence breaching the privacy of a person. This data harvesting is normally carried out remotely. In America, the BlackBerry mobile phones were established to have a data bank where they actually transmitted user’s data to. We actually cannot evaluate what our personal data would be used for. These modern trends of technologies are easing the process of data gathering (Uemura & Murata, 2009). Commercial companies such as those majoring in the clothing industry have lately been established to monitor their products without informing the buyers of their products. The radio frequency identification (FDID) tags have been established to have been introduced on goods such as clothes to give off readable information about the purchasing choices and the tastes and hence help the manufacturing companies improve their goods to realize better profits in the future and purposely remain relevant in the industry of practice (Karmakar et al, 2012). It should be noted that as we leave our digital footprints that behind, it is very important to understand the characteristics that enable surveillance of the digital media in online environments. Social sites such as Facebook, Twitter, e-commercial sites such PayPal, all collect, record and finally organize their user’s personal data in multiple formats such as the text, audio and video (Lipton, 2010). It is very important to note that the data that we may view has not very important, it is everyday increasingly being collected, recorded and analyzed by the very large organizations behind daily online use and the data collected is at times sold to the third parties for huge sums of money (Lyon, 2007). Data harvesting is normally carried out by the government itself or essentially undertaken by private or public entities on the behalf of the government. In the modern setting of the 21st century, widespread surveillance is a social feature that every online user has evolved to cope with since it is very difficult to know that your personal data is under surveillance. Users have evolved to provide false information on online sites so as to protect their privacy. The data that has been obtained through surveillance has found its way to numerous uses, from the business fields to the security realms. In the business field, advertisements that we come across in the various websites such as those in the WebPages of the search engines, social sites, e-commerce sites are all as a result of surveillance on the users’ data. The adverts perform well since the proprietors of these adverts already know our interests, habits, the demographics of the certain products from the documented data they have previously gathered from us without our understanding or permission. We therefore can state that these adverts are reflective of our general interests and the habits. Figure: The examples of Social Media Sites Mobile phone companies have also collected and recorded data about the mobile phones users. The vast data is stored in databases and can be passed on to the third parties at a cost which involves large sums of money. We note how these big corporations behind our daily use of the internet and other digital media platforms are bankrolling from our data which they collect without our knowledge or permission. In as much we may view the surveillance as negative, it is very important to note and acknowledge how important it has enabled the public of every nation in the world enjoy high levels of security and medical care attention. Since the 9/11 terrorist attacks on the American soil, several world governments have embarked on surveillance programs to track down the persons and groups deemed to be a threat to the nation’s security. The FBI, CIA and the Homeland Security run very secretive surveillance programs worldwide that have enabled the tracking down of the terrorists and the terrorists to be. We have observed how high level terror cells such as the al Qaeda and their leaders have been brought down by the use of the surveillance programs where their digital communication equipments such as the mobile phones have been under surveillance through a period of time to reveal their identities and the location they currently reside. The public have been the major beneficiaries of this kind of program since they are the major targets of the terrorists. Several terror attacks have been foiled since the surveillance programs enable the law enforcers to actually and in time know what the terrorist are actually planning to undertake. In the medical field we have also observed how certain diseases have been classified to affect certain populations of the society from specific geographical areas. This has been possible due to the surveillance of the data we offer the medical personnel when we visit the hospitals. When such data is collected and analyzed properly, the public stands a chance of the first beneficially since proper medical measures will be timely introduced to avert spread or even occurrence those certain diseases. We can therefore conclude that the surveillance programs have yielded both positive and negative results to the public of the modern society. There are certain implications that have resulted as a result of surveillance on our privacy and the freedom of expression and generally the security. Several world governments have already introduced high tech measures in order to tackle the growing menace of radicalization and terrorism. Since the advent of the 9/11 on the American soil, the United States of America government has installed more than five million closed circuit television cameras throughout the country for security purposes. Wiretaps and the ear dropping programs with the intention of data harvesting have been secretly introduced in the country and several civil societies have termed the programs as acts of excessive infringement on civil liberties (Lyon, 2007). We can now see how two British tourists (Leigh Van Bryan and Emily Bunting) were barred from touring America upon their arrival at the Los Angeles airport because of their tweeter feeds that read, “Destroying America”. They were deported back to their origin. We can actually now understand how surveillance on a suspect`s personal data can be used against the victim in courts of law. The two tourists were deemed as a threat to America`s security (Nelson 2012). We also remember when the Australian hacker by the name Julian Assange leaked details about the surveillance programs run by the American government (Domscheit-Berg, Klopp & Chase, 2011). The reaction from the victim nations’ was very cold and they demand and explanation from the America. They also wanted a halt to such programs since it was also pinpointed that they had ear dropped on some presidents so that they could actually get information and other relevant data about them. It was a hard time for the American nation since some of the world nation had threatened to break diplomatic ties with the America because of its secretive surveillance programs. We therefore the users of the 21st century technology we should do away with the notation that privacy of our data will exist when third parties are involved. We cannot determine how the third parties will essentially do with our data that we voluntarily give to them in return for a service or a good. Therefore privacy of any data in the 21st century can only be termed as a myth. References Nelson, S. C., 2012. Leigh Van Bryan and Emily Bunting Banned from Entering US After Twitter Joke About ‘Destroying America’. The Huffington Post, [online] 30 January. Available at: [Accessed 10 June 2012]. Lyon, D., 2007. Surveillance Studies: An Overview. Cambridge: Polity Press. Lipton, J. D., 2010. Digital multi-media and the limits of privacy law. Case Western Reserve Journal of International Law, 42 (3), 551. TROTTIER, D. (2012). Social media as surveillance rethinking visibility in a converging world. Farnham, Surrey, England, Ashgate. http://public.eblib.com/choice/publicfullrecord.aspx?p=1019403. UEMURA, W., & MURATA, M. (2009). Development of a surveillance cameras system in ad hoc network. 355-356. DOMSCHEIT-BERG, D., KLOPP, T., & CHASE, J. S. (2011). Inside Wikileaks: my time with Julian Assange at the world's most dangerous website. New York, NY, Crown Publishers. COULDRY, N. (2012). Media, society, world: social theory and digital media practice. Cambridge, Polity. SHARMA, R., TAN, M., & PEREIRA, F. (2012). Understanding the interactive digital media marketplace: frameworks, platforms, communities and issues. Hershey, PA, Information Science Reference. ROLLS, A. (2006). New media. Bronx, NY, H.W. Wilson. STEPHENSON, M. M. (2011). Web-empowered ministry: connecting with people through websites, social media, and more. Nashville, TN, Abingdon Press. KARMAKAR, G., DOOLEY, L. S., KARMAKAR, N. C., & KAMRUZZAMAN, J. C. (2012). Object Analysis with Visual Sensors and RFID. Read More

Digital communication devices like the mobile phones have enabled the collection of data from other persons to be very simplified and this act of data gathering can be timely carried out without the victim ever noticing. Mobile phone applications such as Bluetooth and the wireless fidelity (wifi) have enabled user’s phones to the accessed remotely and their personal data like the emails to read, the contact lists to be harvested and other sorts of information deemed to be personal. When a user walks through a public place with the Bluetooth or the wifi networks activated, the hackers r rather the data harvester can get connected to the wifi or the Bluetooth networks and thereafter access a person’s personal data without any prior permission from the victim (Stephenson, 2011).

Global positioning (GPS) tools and applications that can be installed on the mobile phones and the computers connected to the internet have readily enabled the harvesting of personal data. In mobile phones that support this application, a person`s data of where he has been travelling to several days can be harvested hence breaching the privacy of a person. This data harvesting is normally carried out remotely. In America, the BlackBerry mobile phones were established to have a data bank where they actually transmitted user’s data to.

We actually cannot evaluate what our personal data would be used for. These modern trends of technologies are easing the process of data gathering (Uemura & Murata, 2009). Commercial companies such as those majoring in the clothing industry have lately been established to monitor their products without informing the buyers of their products. The radio frequency identification (FDID) tags have been established to have been introduced on goods such as clothes to give off readable information about the purchasing choices and the tastes and hence help the manufacturing companies improve their goods to realize better profits in the future and purposely remain relevant in the industry of practice (Karmakar et al, 2012).

It should be noted that as we leave our digital footprints that behind, it is very important to understand the characteristics that enable surveillance of the digital media in online environments. Social sites such as Facebook, Twitter, e-commercial sites such PayPal, all collect, record and finally organize their user’s personal data in multiple formats such as the text, audio and video (Lipton, 2010). It is very important to note that the data that we may view has not very important, it is everyday increasingly being collected, recorded and analyzed by the very large organizations behind daily online use and the data collected is at times sold to the third parties for huge sums of money (Lyon, 2007).

Data harvesting is normally carried out by the government itself or essentially undertaken by private or public entities on the behalf of the government. In the modern setting of the 21st century, widespread surveillance is a social feature that every online user has evolved to cope with since it is very difficult to know that your personal data is under surveillance. Users have evolved to provide false information on online sites so as to protect their privacy. The data that has been obtained through surveillance has found its way to numerous uses, from the business fields to the security realms.

In the business field, advertisements that we come across in the various websites such as those in the WebPages of the search engines, social sites, e-commerce sites are all as a result of surveillance on the users’ data. The adverts perform well since the proprietors of these adverts already know our interests, habits, the demographics of the certain products from the documented data they have previously gathered from us without our understanding or permission. We therefore can state that these adverts are reflective of our general interests and the habits.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Development of a Surveillance Cameras System Article Example | Topics and Well Written Essays - 1750 words, n.d.)
Development of a Surveillance Cameras System Article Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/media/2065668-development-of-a-surveillance-cameras-system
(Development of a Surveillance Cameras System Article Example | Topics and Well Written Essays - 1750 Words)
Development of a Surveillance Cameras System Article Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/media/2065668-development-of-a-surveillance-cameras-system.
“Development of a Surveillance Cameras System Article Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/media/2065668-development-of-a-surveillance-cameras-system.
  • Cited: 0 times

CHECK THESE SAMPLES OF Development of a Surveillance Cameras System

Information Technology: Surveillance Security

To eliminate the threats including unauthorized access, viruses, Trojans, malware, and malicious codes, 1-Click Mobile Phones Ltd has decided to implement a surveillance security system that will provide the following features.... This assignment "Information Technology: Surveillance Security" shows that The report demonstrates a typical surveillance system for an organization, to protect critical information assets from physical theft, unauthorized access, and natural disasters....
7 Pages (1750 words) Assignment

Video Surveillance Cameras vs. Personal Privacy

This paper compares video surveillance cameras and personal privacy.... This paper has such sections: location and privacy; monitoring services necessity; technology changes in video surveillance cameras; who watches the watcher; privacy protected video surveillance systems.... The conclusion from this study states that the benefit of video surveillance cameras outweighs personal privacy reasons.... Systems of video surveillance cameras have been applied widely to different situations and not necessarily to intrude on personal privacy but to monitor and supervise activities for the intended purposes....
10 Pages (2500 words) Research Paper

Surveillance Technology

Perhaps the advancement of surveillance technology from the twentieth century onwards is best shown through the rapid development of video surveillance.... The major categories discussed will be cameras or video surveillance, biometrics, Internet and etc.... Prior to the usage of cameras and video surveillance, manual observers would need to be placed in the relevant areas.... cameras are used to survey traffic and to prevent and detect crime....
8 Pages (2000 words) Term Paper

Surveillance Society

a surveillance society aims to keep a check over its entire population or a fraction of it, but basically over the masses.... a surveillance society, usually under the government influence, aims to closely monitor the behavior, actions, activities, and personal information of the individuals with or without their consent.... These organisations aim to provide the residents of the UK a safer and a secure place to live in, and try to combat the effects of terror and criminal activities, plus makes the defense system of the UK much stronger to counter any terrorist threats that might occur in the future, and prevent them from happening in the present....
13 Pages (3250 words) Coursework

Information Technology: Surveillance Security

The report demonstrates a typical surveillance system for an organization, in order to protect the critical information assets from physical theft, unauthorized access, and natural disasters.... Similarly, if a critical system is hacked by internal or external sources, organization's financial data along with goals and objectives can be revealed to other competitors.... The report concludes prevention of physical theft by incorporating surveillance IP based cameras....
8 Pages (2000 words) Assignment

Video Surveillance Cameras versus Personal Privacy

The writer of the paper claims that the benefit of video surveillance cameras outweighs personal privacy reasons.... Systems of video surveillance cameras have been applied widely for different situations and not necessarily to intrude on personal privacy but to monitor and supervise activities for the intended purposes.... Location and privacy: The use of surveillance cameras is potentially used and recognized in the European nations than in the United States, with Europe significantly overstating the benefits of the CCTV ('video surveillance,' epic....
10 Pages (2500 words) Term Paper

New Surveillance System in the Decca Commissary

Counter-surveillance is the chief evil of the technological gimmicks employed to circumvent surveillance or to compromise the functionality of a surveillance technology to function properly (Haritaoglu & Harwood, 2000).... Amongst these is the use of the technical surveillance counter-measures (TSCM) to enhance the integrity of surveillance technology through its detection of technical counter-surveillance devices within a surveillance neighbourhood, together with the integrity shortcoming of a surveillance technology which abates its penetration in counter-surveillance....
8 Pages (2000 words) Assignment

Closed-Circuit Television and Imaging System

This literature review "Closed-Circuit Television and Imaging system" presents a site plan where the concerned areas are marked.... The details will assist in the positioning of cameras and lights, particularly with respect to the view site as well as potential surrounding problems for instance foliage and sun (Nij, 2003).... he cameras to be applied in the mine should be able to capture a large and clear image, so as to be able to identify the image without any error....
12 Pages (3000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us