Search Results

Free Essays
Unrated Essays
Better Essays
Stronger Essays
Powerful Essays
Term Papers
Research Papers

Your search returned over 400 essays for "surveillance"
[1] [2] [3] [4] [5] [Next >>]

These results are sorted by most relevant first (ranked search). You may also sort these by color rating or essay length.

Title Length Color Rating  
Aspects and implication of Cyberspace Surveillance Technologies - The three most thought about aspects of a surveillance society, would be; from one side it protects and monitors, but on the other hand in order to achieve its protection functions, certain boundaries of privacy are crossed. Some would argue that it is governments demand for more power over people, a disciplinary technique; the fact that people are more likely to behave if they had known they had been under a certain amount of supervision. But not all of the time can this be beneficial to them; questions are asked of whether the success of it, rationalize for existence radical surveillance technologies....   [tags: Surveillance Behavior]
:: 7 Works Cited
2488 words
(7.1 pages)
Better Essays [preview]
The NSA Surveillance Constitutionality: Edward Snowden - ... Freedom of speech and press, right to privacy, and the prohibition of unreasonable searches and seizures without a warrant; is violated with these surveillance programs. One may think of these violations as mild, as well as a small price worth the protection that the NSA is attempting to provide by catching terrorists and preventing other misfortunes from occurring to our country. Americans may also believe that these surveillance programs do not affect them if they are not doing anything wrong, but that is not the case when taking into consideration that our Constitution is meant to be interpreted, so how are we to know how our lawmakers interpreting it for the NSA....   [tags: privacy, surveillance, government]
:: 7 Works Cited
981 words
(2.8 pages)
Better Essays [preview]
Mass electronic surveillance contributes to social order. Discuss. - ... Firstly, the surveillance is a means of protection and care for the citizens from any harmful attack. We all indulge in some form of surveillance such as ‘Facebook stalking’ (Marwick, 2012). But such individual surveillance is always two sided where both can watch each other’s profile unlike in the state or corporate surveillance which is only one sided (Marwick, 2012). Thus, surveillance is not only limited to, government over masses, but citizens using it over each other. Secondly, the surveillance by very definition is act of collection and processing of the personal data for the purpose of influencing and managing data that has been gathered, but this definition immediately points out towards the protection of individual needs over that of the general population (Lynod, 2001)....   [tags: technology, the internet, surveillance]
:: 17 Works Cited
2366 words
(6.8 pages)
Research Papers [preview]
We Need Electronic Surveillance - Our society would not survive in the 21st century without the help of electronic surveillance. Safety is one of the main purposes of electronic surveillance. Safety is the state of being secure and free from danger of any sort. Today, many would rather give up their privacy for safety (Smithsimon). In fact, surveillance gadgets such as cameras, radio tracking chips and house alarms are used in many places to ensure safety. For instance, a parent can easily place a hidden camera in a stuffed animal in order to see how the babysitter handles his or her child (Public Places Have Eyes)....   [tags: Privacy vs Electronic Surveillance]
:: 12 Works Cited
3536 words
(10.1 pages)
Term Papers [preview]
Surveillance and the right of privacy - Surveillance and the Right of Privacy Introduction to Surveillance: According to Merriam-Webster’s collegiate dictionary, surveillance is defined as a “close kept watch over someone or something (as by a detective).” Surveillance has been used ever since the days of, “Follow that cab!” From their primitive state, surveillance techniques and technology have evolved. Policing agencies no longer need to use methods of surveillance such as listening through walls, looking through windows and over fences, and even sifting through a suspect’s garbage....   [tags: Research Surveillance Papers]
:: 6 Sources Cited
1873 words
(5.4 pages)
Powerful Essays [preview]
Government Surveillance vs Privacy - Is the American government trustworthy. Edward Joseph Snowden (2013) released to the United States press* selected information about the surveillance of ordinary citizens by the U.S.A.’s National Security Agency (N.S.A.), and its interconnection to phone and social media companies. The motion picture Citizenfour (2014), shows the original taping of those revelations. Snowden said that some people do nothing about this tracking because they have nothing to hide. He claims that this inverts the model of responsibility....   [tags: Communications Surveillance, 2015]
:: 12 Works Cited
1439 words
(4.1 pages)
Powerful Essays [preview]
Government Surveillance in America - As seemingly tangible evidence of a promising and greatly developed future society, technological advancement and innovation is typically celebrated and generously compensated by our contemporaries. In fact, individuals with a remarkable technological genius are deeply respected and almost venerated for their creations. Modern technology is, undeniably, used at the advantage of the American public, as it aids not only in disburdening the general population of the inconvenience of quotidian chores and in facilitating the accessibility of luxurious commodities to the lower classes but it also encourages the progression of the globalization of our society....   [tags: Privacy vs Government Surveillance]
:: 12 Works Cited
2485 words
(7.1 pages)
Research Papers [preview]
Government Surveillance vs Privacy - The 21st century has brought with it a myriad of technological advancements all designed to make the lives of the developed world much easier, faster, and more fun. These new technologies are not coming without their own set of costs, though. One of the greatest prices people may be paying for their technology is the high cost of the loss of privacy that may come with many of these devices. Jim Hightower, an author for Creators.com is very worried about what the new technological age will mean for privacy....   [tags: Government Surveillance Drones] 1538 words
(4.4 pages)
Powerful Essays [preview]
Electronic Surveillance: Who Is Watching You? - When one walks out the front door into the world, how aware and conscious are they of how often they are watched, tracked, and monitored. Through surveillance, everywhere one goes they are having their lives watched and invaded by prying eyes. Most people believe society needs electronic surveillance and that it is there to protect them. Others believe society does not need surveillance and worry about their privacy being invaded. Many argue about different issues relating to the costly use of surveillance....   [tags: Privacy vs Electronic Surveillance, 2015]
:: 9 Works Cited
3025 words
(8.6 pages)
Powerful Essays [preview]
Surveillance Techniques - ... Technological Tracking of Illegal Immigrants: While there is little validity in the promise that no illegal immigrant will make it through secured borders undetected, the first order of business is to apply tracking devices that can be utilized on immigrants that have in the past, or currently, entered into the country successfully and undetected. In other words, with current physical monitoring there is no way to truly track how many people are coming in and out of the secured border areas therefore the application of a virtual fence is appropriate....   [tags: ethical issues, law enforcement, centervale]
:: 4 Works Cited
1366 words
(3.9 pages)
Strong Essays [preview]
Surveillance Cameras - Surveillance Cameras How are kids safe at night. Do they roam the streets without adult supervision. Are drug dealers taking over the streets. Are drivers nervous of everyone else’s bad driving habits. Although some believe law enforcement cameras invade privacy and disrupt everyday lives, cameras help keep citizens safe. “Police departments across Great Britain credit cameras with dramatic crime reduction, citing such impressive results as 75 percent drop in Airdrie, Scotland, a 68 percent reduction in Glasgow, Scotland, and a 57 percent drop in Northampton” (Taylor 44+)....   [tags: Law Enforcement]
:: 5 Works Cited
1261 words
(3.6 pages)
Strong Essays [preview]
Surveillance Technologies - Farren and Gibb are correct when they say that the only things we can do about surveillance technologies is to get use to them. The advancement of the technology has come so far as to make it all but impossible to contain it. In a larger context this is because we depend on it in the first place. This dependence is encouraged by our own use of surveillance, tracking technologies and our voyeuristic desire to see ourselves and others. The need of these technologies in the commercial and governmental sectors is insatiable....   [tags: Security, Government Sectors, Commercial Sectors] 1657 words
(4.7 pages)
Better Essays [preview]
Technological Surveillance - Technological Surveillance In an age where instant communication and technology provide easy and ready access to information, the society and the individual is caught between two very controversial principles- open information and privacy. The perceptions and expectations of privacy are rapidly changing as a result of current developments in surveillance technologies. The question is are these new surveillance technologies endangering the values and morals of our democratic society, the society we have worked for many centuries to achieve....   [tags: Papers] 1076 words
(3.1 pages)
Unrated Essays [preview]
Satellite Surveillance - Satellite Surveillance I. Preface My interest in satellite surveillance did not really appear to after I saw the movie "Enemy of the State" in 1998. The synopsis of the movie is: Robert Dean (Will Smith) is a labor lawyer who is unknowingly in possession of evidence related to a serious politically motivated crime. Government agents eager to hide their guilt believe that Dean is on to them, and proceed to turn his life upside-down, ruin his reputation, and frame him for various incidents, thanks to the latest in high-tech government surveillance techniques....   [tags: Satellites Weapons Technology Essays]
:: 3 Works Cited :: 10 Sources Cited
3808 words
(10.9 pages)
Term Papers [preview]
The Growing Threat of Corporate Surveillance - ... One of the underlying ideas to creating and maintaining a successful business is customer satisfaction. In order to ensure the satisfaction of customers, corporate bodies try to key in to the mind of the customer and assess demographics (who their customers are), geo demographics (where their customers are), and psycho demographics (how their customers think) (Flew & Smith, 2011). By using these powerful techniques, corporate bodies can cater their businesses to the desires of their customers, thus allowing for greater success in their business endeavors....   [tags: Social Media]
:: 4 Works Cited
1428 words
(4.1 pages)
Powerful Essays [preview]
What exactly is a ‘surveillance society’? - What exactly is a ‘surveillance society’. The term is often used by the popular media to refer to the older more totalitarian notions of the ‘security state’ or Orwellian references to ‘Big Brother’ (Wood, 2009: 180). However, Wood points out that ‘surveillance societies’ exhibit immense cultural and geographical variety, in both historic and contemporary contexts, and need not exhibit totalitarian features (2009: 181). Wood acknowledges that more study of how societies encounter surveillance in order to determine the elements that operate at the different socio-spatial levels (2009: 189)....   [tags: Politics, Civil Liberties] 562 words
(1.6 pages)
FREE Essays [view]
Government Surveillance For The Greater Good - ... The attackers for the Boston Marathon would have never been known if it weren’t for these cameras, since they blended in with the spectators and had left the bombs in backpacks. If it weren’t for these cameras these men would still be out there possible planning other attacks of terrorism and putting the nation’s citizens in danger. Government Surveillance cameras would not only aid in deterring terrorist, they would also give people a sense of security. Americans cite a loss of privacy as one of their main concerns when it comes to government surveillance....   [tags: Governement, Technology]
:: 10 Works Cited
1663 words
(4.8 pages)
Powerful Essays [preview]
Home Video Surveillance System - Most people think that video surveillance is most often used for ATM machines, schools, banks and gas stations to catch thieves in the act or for taping spouses that are behaving badly; but they are used for much more than that. They were first used in police stations for monitoring, in train stations, and to survey traffic flow. Insurance companies find them helpful regarding fraudulent claims. It is now very common for property owners to use surveillance cams to keep their rental homes secure and parents have used nanny cams for years to monitor their children, observe housekeepers or other domestic contractors....   [tags: Security] 688 words
(2 pages)
Better Essays [preview]
Internet Censorship and Surveillance - ... Will CISPA put the United States in the same category as these nations. The governments of these nations believe they know what is best for their citizens and do not allow them the freedoms we enjoy in the United States. CISPA, the proposed legislation of the Cyber Intelligence Sharing and Protection Act or more simply put internet surveillance, would eliminate these freedoms. This legislation has been presented to the Senate but as of today has not been voted on by the Senate. CISPA had been put on the back burner after whistleblower Edward Snowden started leaking information about the NSA surveillance techniques, but according to Mike Masnick in his September 25th 2013 article titled “Tone Deaf Dianne Feinstein Thinks Now Is A Good Time To Revive CISPA” on techdirt.com, Senator Feinstein plans to push CISPA through the Senate....   [tags: Government Policy, Cyber Intelligence]
:: 6 Works Cited
920 words
(2.6 pages)
Better Essays [preview]
Public Surveillance in the USA - 1. Introduction All the developed countries (developing countries are also in no way lagging behind) the incidence of the people being monitored under various surveillance systems is high of which closed circuit television system (CCTV) is gaining dominance. For instance, the UK has over 4.2 million of them, giving it a ratio of one for every 14 persons and the USA is reported to have been installing it on a rapid pace in every conceivable location as town centers, schools, public transportation systems etc with a spiraling budget estimated at $100 million....   [tags: CCTV, Privacy Rights, Right of Privacy]
:: 9 Works Cited
2230 words
(6.4 pages)
Strong Essays [preview]
Government Surveillance of Library Patrons - ... Constitution, and that is certainly abridges rights guaranteed by the First Amendment of free thought and expression, particularly in the realm of academia where the surveillance of noncitizen students and visiting scholars has curbed the scholarly communication that often feeds intellectual freedom and diversity in thought processes (Reid 2009). Under the provisions of Section 215 of the USA PATRIOT Act, the FBI was no longer required to show "specific and articulable facts" of a connection between a particular person and spying or terrorism (Ramasastry 2006)....   [tags: privacy, USA PATRIOT, intelligence, library]
:: 11 Works Cited
2147 words
(6.1 pages)
Term Papers [preview]
Intelligent Traffic Surveillance System - Abstract- Due to the traffic accidents over the last few years; the development of surveillance systems with multifunctional techniques has received increasing attention. The use of the smart camera is one solution to solve the traffic problems, Smart cameras are cameras that can perform tasks far beyond simply taking photos and recording videos. Intelligent Traffic Surveillance System (ITSS) is used to monitor the roads in preventing accidents at the same time finding what causes the accidents....   [tags: Traffic Safety ] 2568 words
(7.3 pages)
Powerful Essays [preview]
Internet a Source of Surveillance - ... Social network sites help not only with keeping in touch with family and friends. Moreover, it enables the wider public to express themselves, creatively, in ways that they may not feel comfortable doing in person. This is not just a form of liberty for the younger generations. Giddens (2009) referred to social networking encouraging public opinion and political debate, giving a global voice to political views and social movement, political views just as with social movement can be discourse globally through social networking, gaining much deeper knowledge and different societies and cultures and religions....   [tags: Communication, Freedom, Privacy]
:: 12 Works Cited
1404 words
(4 pages)
Powerful Essays [preview]
Mass Electronic Surveillance is an Invasion of Privacy - ... A state usually employs various methods to curtail freedom of its citizen online so that some order is maintained. Various methods devised by the state range from direct physical attack on the person to blocking person’s internet access. State usually used blocking and filtering of various websites which they might find harmful, China and Saudi Arabia posses some most powerful blocking capabilities (Global internet freedom, 2013: 9). The state also curtails freedom by passing new laws where intermediary are held liable for the content on the internet hence there is a lot of self censorship by internet service provider (Global internet freedom, 2013: 12)....   [tags: panoptic, big brother, snowden, citizens rights]
:: 18 Works Cited
2476 words
(7.1 pages)
Powerful Essays [preview]
Video Surveillance Systems for State University - ... Currently, video surveillance is provided at open dorm and learning center locations on campus. The infrastructure of these systems is analog, which uses coaxial cabling, with recorded playback of CCTV (Closed-circuit Television) cameras through hard drive recorders called DVMRE (Digital Video Multiplexer Recorder with Ethernet). According to the college Audio Video Manager, due to the thickness and inflexibility of the coaxial cabling, the current implementation of analog systems have been more difficult and time consuming to install than the CAT6 (Category 6) cabling for our IP (Internet Protocol) networks....   [tags: School Safety, Security] 1035 words
(3 pages)
Strong Essays [preview]
Public Video Surveillance - Public Video Surveillance INTRODUCTION Today’s technology has changed the way we live. It has changed the way that we view the environment, act when out in public, and the way we go about doing our daily task. Computers have greatly increased our capabilities to achieve our goals much faster. Human interaction between people has decreased because of this technology. The changes continue daily with an endless stream of new ideas and ways of doing things. There seems to be no end in site. This technology is also changing our moral and ethical values along with the way we employ them....   [tags: Cameras Privacy Issues] 1419 words
(4.1 pages)
Powerful Essays [preview]
Government Surveillance of Internet Activity - Government Surveillance of Internet Activity 1. Background Back to late 1980s in China, some young people in college or research institute had a chance to surf the Internet through a fairly low speed, roughly routed World Wide Web connection. But a big surprise for them was that the Internet was a real freeway, a freeway escaping from strict government control, a freeway for people who wanted to see but couldn’t see and who wanted to say but couldn’t say. Stepping into the 21st century after more than a decade, the Internet service in China has already been almost the latest generation in the world....   [tags: Internet Web Computers Essays]
:: 9 Works Cited :: 4 Sources Cited
3556 words
(10.2 pages)
Term Papers [preview]
Terrorism, Surveillance, and Radio-Transmitters - Terrorism, Surveillance, and Radio-Transmitters       ABSTRACT: This paper is an introduction into the discussion of different types of surveillance equipment. The paper centers on different intelligence agencies worldwide that use surveillance equipment, the types of information they need, and how they go about gathering the information. There is also a discussion on the most common type of surveillance equipment used by intelligence agencies, the radio transmitter. The transmitter is described in detail and its myriad of uses in surveillance are illustrated....   [tags: Exploratory Essays Research Papers]
:: 6 Sources Cited
1773 words
(5.1 pages)
FREE Essays [view]
The Ethics of Workplace Surveillance - The Ethics of Workplace Surveillance You get to work, login, check your email, and examine the values of your stocks. Have you done something wrong. Should your manager care about what you do with those couple of minutes. Hypothetically, if you consider 48 working days per year, with 40 hours per weeks (totally 9,600 hours of work a year), then the daily five minutes of personal internet usage mounts to approximately 24 hours (three working days) of wasted company time. In a capitalist economy, such inefficiency impedes the goal to maximize profit; therefore, compelling businesses to turn to rigorous surveillance to discourage inappropriate use of company resources and to promote productivity....   [tags: Security Work Environment Essays]
:: 4 Works Cited :: 3 Sources Cited
3432 words
(9.8 pages)
Term Papers [preview]
Government Surveillance in the Digital Age - Government Surveillance in the Digital Age Imagine walking along a busy street in the middle of a sunny day. Also imagine that someone is following you around, videotaping everything you do. Disturbing thought. Even more disturbing is the fact that the United States government is already doing this, and it's perfectly legal. According to Robert Trigaux, a reporter for the St. Petersburg times, until August of 2014, in Ybor City, Florida, the Tampa Police Department used fourty-six surveillance cameras that scanned faces of all people walking around the entertainment district....   [tags: Privacy in the Digital Age]
:: 5 Works Cited :: 5 Sources Cited
2364 words
(6.8 pages)
Research Papers [preview]
Government Surveillance vs Privacy - Spying is nothing new to the world. History books tell us that ancient civilizations like the Roman Empire, Egypt, Chine, India, and so on used it. On top of that, 1900s regimes like the Former Soviet Union and Nazi’s Germany used spying tactics around the world wars. The main use of spying at that time mostly was for political and military advantage. These countries were successful on spying. However, in the 21st century surveillance is used in different and very complicated way. So many crimes and terrorist attacks forced governments around the world to use electronic surveillance to protect their own people....   [tags: Security vs Privacy]
:: 9 Works Cited
2066 words
(5.9 pages)
Term Papers [preview]
The Impact of Surveillance Technology on Privacy - The Impact of Surveillance Technology on Privacy               David Brin in The Transparent Society warns us of the future of privacy that is on the horizon.  With millions of cameras recording our every public move, who should have control of the information: companies and governments or we the citizens?  If we take a look at Brin's vision of our future, his solution to the problem, the role of ICTs and the Kelley Cam at IU, we can come to a conclusion that our privacy is on the line and we as citizens must act soon in order to keep our country's foundational liberties....   [tags: Expository Essays Research Papers] 1203 words
(3.4 pages)
Strong Essays [preview]
Technology - Use of Infrared in Surveillance - Use of Infrared in Surveillance       Abstract:  This paper begins with an introduction into the discovery and description of infrared radiation by Sir William Herschel in 1800. It follows by describing various uses of infrared for surveillance purposes. The first application described is the role of infrared in active and passive Night Vision Devices (NVD's) for both military and recreational use. It describes the basic functions of these devices and the differences between the uses and benefits of both active and passive scopes....   [tags: Exploratory Essays Research Papers]
:: 5 Works Cited
1407 words
(4 pages)
FREE Essays [view]
Surveillance: A Welcome Necessity or a Frightening Imposition on Liberties - The increasingly pervasive presence of surveillance seems a peculiar and increasingly urgent feature of twenty-first century culture. Discussions about the need for national ID’s, the presence of surveillance cameras on street corners, recent concerns about phone tapping and listening into people’s conversations had been reflected in the popular media in movies such as “V for Vendetta”. However, using Foucault’s work on Panopticism, surveillance has always been a feature of early and late modern culture....   [tags: Film Review]
:: 3 Works Cited
1219 words
(3.5 pages)
Strong Essays [preview]
The NSA's Domestic Surveillance is Causing Catastrophic Effects - ... As of 2013, the NSA has a 10.8 billion dollar budget; the budget has risen 53% since 2004 (Andrews & Lindeman, 2013). Recently the NSA constructed the Utah Data Center. It is five-times as large as the US Capitol and is responsible for intercepting, sorting, and analyzing intelligence data as it goes through domestic and international networks (Bamford, 2012). The Data center cost an extra 2 billion dollars and the US is already incredibly deep in debt. How much more money will it cost to pay all of the new employees....   [tags: freedom of speech, terrorism, discrimination]
:: 8 Works Cited
1050 words
(3 pages)
Strong Essays [preview]
The Dangerous Rise of Government Surveillance: The Patriot Act - ... Our government should not have access to whole cell phone carrier’s customer information, specifically important, personal information like conversations, internet searches, religious affiliations or political views, which they could potentially use against them in an investigation. The Patriot Act has real potential to greatly infringe on constitutionally protected speech and religion in its new, overbroad redefinition of a terrorist to include "domestic terrorism." It defines a domestic terrorist as any person who does an act "dangerous to human life" that is in violation of state or federal criminal laws, if the act even appears to be intended to: “(i) intimidate or coerce a civilian population; (ii) influence the policy of a government by intimidation or coercion; or (iii) to affect the conduct of a government by mass destruction, assassination or kidnapping” (American Civil Liberties Union)....   [tags: USA Patriot Act, Government, Privacy]
:: 2 Works Cited
1107 words
(3.2 pages)
Strong Essays [preview]
Case Study: An Information System for Use in Surveillance Rounds - Case Study: An Information System for Use in Surveillance Rounds The equipment located in a facility at the Los Alamos National Laboratories (LANL) is monitored in order to ensure its safe operation. While critical components are continuously monitored and controlled by an automated system most of the non-vital support equipment is checked daily without the use of information technology (IT). Instead, technicians conduct surveillance rounds to check that equipment is operating properly within specified parameters....   [tags: Case Study]
:: 3 Works Cited
1316 words
(3.8 pages)
Strong Essays [preview]
She Snoops to Conquer: Surveillance and the Right to Privacy - Employers these days are becoming more and more concerned about employee theft and are making sure that they minimize these kinds of activities by using sophisticated and high-tech devices. However, it is essential to be honest about the actions and it is equally important to provide privacy in any kind of workspace. In case 9.3, Jean Fanuchi is a manager of a shopping mall in jewelry department. Since there were many recent incidents of theft and shoplifting, she decided to install hidden cameras and microphones without her employees knowledge....   [tags: Ethics, Business]
:: 2 Works Cited
1438 words
(4.1 pages)
Unrated Essays [preview]
Privacy and Human Rights - ... The fourth amendment in the Bill of Rights is the privacy against unreasonable searches and seizures (The Right of Privacy: Is It Protected by the Constitution. ). The Fifth Amendment “protects the privacy of certain types of information” (The Times Editorial Board). The ninth Amendment is not fully accepted as an amendment that protects our right to privacy, but according to the Times Editorial Board it states that we possess other rights that are not stated the Bill of Rights. Last but not least, the fourteenth amendment says that a life of a person, their property, or liberty cannot be taken away without “due process of the law” also stated by the Times Editorial Board....   [tags: government, surveillance]
:: 10 Works Cited
1497 words
(4.3 pages)
Powerful Essays [preview]
Electronic Surveillance: The FBI Carnivore Program - Electronic Surveillance: The FBI Carnivore Program Is Big Brother watching our every computer move. Is the government (FBI, specifically) reading and filtering our email and where we go on the web. According to the critics of the FBI’s new CARNIVORE program, the answer is a resounding “yes”. However, according to FBI spokesperson John Collingwood (in a letter to the LA Times on August 7, 2000), CARNIVORE is not a government-backed spy program to invade the privacy of US citizens--it is an effective weapon (similar to phone taps) in the war against crime....   [tags: Papers] 660 words
(1.9 pages)
Better Essays [preview]
Surveillance Techniques of New Technologies Demand Rethinking of Online Behaviour - Daily usage of the new media technologies like updating our Facebook profile over the internet offer a vast set of opportunities, which are already integrated into our life, but nevertheless the services of these technologies require to expose information about ourself, which are sent over unknown data highways, cached and stored in diverse memory locations and, most of all, read and transferred by many unknown connection points. We are not fully aware of what happens until our data are saved at the desired location, neither do we know what happens with our data....   [tags: Information Technology ]
:: 6 Works Cited
1074 words
(3.1 pages)
Better Essays [preview]
Do new technologies of surveillance encourage self regulation - 2. Do new technologies of surveillance encourage self-regulation. Discuss A fundamental dimension of modernity is the emergence of coordinated administrative power. The nation state is the prime site if such power but is also a part of modern organisations in general. Administrative power is based upon the control of information. Administrative power is enforced through surveillance where information is routinely used to monitor the activities of a subject population. No less than capitalism or industrialism, surveillance is a tool in levering the modern social world further away from traditional modes of socialisation....   [tags: essays research papers] 726 words
(2.1 pages)
FREE Essays [view]
Essay on Internet Privacy - Carnivore, and the Power Of FBI Surveillance - Carnivore: The Power Of FBI Surveillance       Abstract:  This paper provides an analysis of the privacy issues associated with governmental Internet surveillance, with a focus on the recently disclosed FBI tool known as Carnivore. It concludes that, while some system of surveillance is necessary, more mechanisms to prevent abuse of privacy must exist.   Communication surveillance has been a controversial issue in the US since the 1920's, when the Supreme Court deemed unwarranted wiretaps legitimate in the case of Olmstead v United States....   [tags: Exploratory Essays Research Papers]
:: 7 Works Cited
1739 words
(5 pages)
Powerful Essays [preview]
Different Modes in Intelligence Surveillance in the United States - DIFFERENT MODES IN INTELLIGENCE SURVEILLANCE IN THE UNITED STATES Information operations conducted in the enemy’s backyard will assist in achieving specific strategic and tactical objectives. The flexibility to change any perspective provides commanders with a deeper insight into the dynamics of target appreciation. Having the ability to understand a target system provides commander’s with the analytical tools to decipher diverse categories of complex surveillance. The end result of the different modes of intelligence surveillance could lead to a variety of improved protocol, or a resolution to a problem....   [tags: essays research papers] 526 words
(1.5 pages)
FREE Essays [view]
Privacy - It's Time to Control the Use of Electronic Surveillance - It's Time to Control the Use of Electronic Surveillance       How would you feel if every move you make, every word you say, every number you dial on the telephone, could easily be accessed or monitored by just about anyone in the world. Well, chances are that you and me and many others are currently, or have been, victims of this infringement on privacy. With today's ever growing technology, there is little one can do to ensure privacy in normal, every day life. Even though many benefits have come with this increased technology, the inherent loss of privacy scares many....   [tags: Argumentative Persuasive Essays]
:: 8 Sources Cited
1480 words
(4.2 pages)
Powerful Essays [preview]
Surveillance in Foucault's Panopticism and Vonnegut's Harrison Bergeron - Surveillance in Foucault's Panopticism and Vonnegut's Harrison Bergeron Ever feel as though someone is watching you. You know that you are the only one in a room, but for some reason you get an eerie feeling that you are not alone. You might not see anyone, but the eyes of a stranger could be gazing down on you. In Foucault's "Panopticism," a new paradigm of discipline is introduced, surveillance. No one dares to break the law, or do anything erroneous for that matter, in fear that they are being watched....   [tags: Panopticism Harrison Bergeron]
:: 3 Sources Cited
1798 words
(5.1 pages)
Powerful Essays [preview]
The Surveilance Program - ... It is true that nobody would claim for privacy when their house is about to get bombed, but it s right to protest against this surveillance program because it’s has no power to protect. The fact that this surveillance program is not working is obvious because of the terrorist attack plots NSA was unable to detect, in spite of all the budget it uses for it and violated privacy. The most recent attack by a terrorist was the Boston Bombing, which had took 3 lives and harmed 264 people (CNN Library)....   [tags: Technology, edward snowden, leak]
:: 14 Works Cited
1866 words
(5.3 pages)
Term Papers [preview]
Environmental Scanning - ... According to Boeder (2005), since the media and the internet are widely used as tools for environmental scanning, the emergence of ‘panoptic surveillance’ cannot be ignored. He further argues that this has led to invasion of the privacy of individuals since information that the public are unwilling to reveal are acquired digitally and by other network used in social interaction (Habermas, 1989). This may restrict information flow between the public and an organization (Boeder, 2005). Foucalt (1979) argues that literacy provides citizens with protection against governmental powers whereas surveillance provides the government with the ability to infringe the privacy of its citizens and subject them to coercion, control and confusion....   [tags: Public Relations, Surveillance Culture]
:: 28 Works Cited
2074 words
(5.9 pages)
Term Papers [preview]
Yes We Scan - ... FISA, Foreign Intelligence Surveillance Act, is a secret court in the United States that monitors surveillance against terrorism and foreign threats. The immunization from FISA allows the NSA to collect intelligence of Americans under the claim that they are searching for foreign intelligence threats. However, the probable cause of the agency has been changed since FISA was created. The NSA no longer has to give a probable cause for a crime but instead insist that an individual is a target of a foreign threat....   [tags: government surveillance, patriot act]
:: 8 Works Cited
3146 words
(9 pages)
Research Papers [preview]
The People, the Nation, and the NSA - ... As events have progressed, NSA surveillance programs have increasingly become exposed to the public, causing a severe distrust of the government. In 2012, two democratic senators, Ron Wyden and Mark Udall wrote a letter to Attorney General Eric Holder concerning the US’s surveillance programs. In the letter, they urged for government transparency on surveillance issues. They stated a very moving fact, saying that citizens are unknowledgeable of the official government interpretation of section 215 of the Patriot Act....   [tags: data, technology, surveillance, freedom, terrorism]
:: 9 Works Cited
1300 words
(3.7 pages)
Strong Essays [preview]
Surveillance and Information Gathering:the Role of the Nation State, Military and Citizenry - Within any society, information gathering and surveillance mechanisms exist. The sophistication of this information gathering varies, but at all levels; the information gathered can be received voluntarily or involuntarily. The collection of information, whether it is surveillance received at a traffic road crossing, or satellite images from outer space, occurs every day. Everyday life is subject to monitoring, checking and scrutinizing. To find a place or an activity, which is shielded from some kind of surveillance device is difficult....   [tags: Politics] 3298 words
(9.4 pages)
Powerful Essays [preview]
In Praise of Big Brother: Why We Should Learn to Stop Worrying and Love Government Surveillance - Part I: James Stacey Taylor's article, "In Praise of Big Brother: Why We Should Learn to Stop Worrying and Love Government Surveillance" begins reviewing the concept of "Big Brother" as it was originally presented in George Orwell's 1984. The Big Brother started off as a fictional character in 1984-- a dictator of Oceania within a totalitarian state. Set within a society in which everyone is under complete surveillance by the authorities, mainly by telescreens, the people are constantly reminded of this by the phrase “Big Brother is watching you” (Wikipedia) ....   [tags: privacy]
:: 2 Works Cited
1896 words
(5.4 pages)
Strong Essays [preview]
Under The Rug: Break Into the Pentagon - ... Steve turned with anger and sprinted towards the Pentagon. Steve avoids the patrols when possible and also evades the line of sight from the snipers above. He hid behind the closest tree to the building and stare at it. “America’s proud building, huh!” Steve mocked and gave a light laughed. “Steve, that ain’t your problem, just gets in the god damn building!” Shouted Sally. “Oh, shut up, will you, you hurting my ears!” Steve complained furiously. Before Steve charges… Sally suddenly said. “Wait, Steve, you had no idea where the package is!” Sally said....   [tags: United States, surveillance, Steve, explosion]
:: 6 Works Cited
1211 words
(3.5 pages)
Strong Essays [preview]
The Government: Watching Everything You Do - ... 1-2). After the attempt of reporting it to the DoD IG, they soon decided to retire in October 2001. They did continue to blow the whistle outside of the agency along with the help of GAP “providing Binney and Wiebe with legal advice on whistleblowing matters and assisted them with media and public advocacy” (“NSA Whistleblowers William B. & J. Kirk W.” par. 3). Since then, Binney, Wiebe and Thomas Drake have been part of the court case Jewel v. NSA filed by the Electronic Frontier Foundation or EFF that “is aimed at ending the NSA’s dragnet surveillance of millions of ordinary Americans and holding accountable the government officials who illegally authorized it” ( “Jewel v....   [tags: surveillance, United States, NSA, communications]
:: 9 Works Cited
1512 words
(4.3 pages)
Powerful Essays [preview]
Big Brother: An American Reality - ... "Intelligence agencies operate in an industry where their commodity is information, or restricted access to information. And the reason their information has any value is, well, because no one else has access to it" (Elahi). If every American takes control of their digital footprint , data collected by the NSA, CIA, FBI, has little value. Opponents may argue that we are just buying into their game by making it easier for them to gather our information. They state that to the government agencies, all data is the same regardless of how it was obtained....   [tags: surveillance, patriot act, government spying, 9/11]
:: 20 Works Cited
2795 words
(8 pages)
Term Papers [preview]
Twitter: Protecting User Privacy - Social media has seen a significant number of stories that bring attention to failures in surveillance policies over the past decade. Time after time we hear about how surveillance technology is digging deeper and deeper into our personal information and is infringing on our rights more and more. It is important however to recognize successes in personal information protection and acknowledge achievements on behalf of the common population. As more and more attention is brought to surveillance the public is becoming better informed....   [tags: Twitter vs Government Surveillance, 2015]
:: 5 Works Cited
1126 words
(3.2 pages)
Strong Essays [preview]
The Patriot Act - The Patriot Act In the wake of September 11, many things happened very quickly. Along with the beginning of a '"'war'"' against terrorism, an act was passed to help prevent future terrorism in the USA. The name of this is the USA Patriot Act. The act legalizes many surveillance techniques that were once prohibited. The act has been passed without debate, and the new privileges given to our government have not been thoroughly examined. The law enforcers of our country are now capable of monitoring the citizens in ways most people are not aware of....   [tags: USA Terrorism Surveillance Wire Tapping] 1144 words
(3.3 pages)
Strong Essays [preview]
Private Investigator - ... One of the simplest tools would be a camera with a telephoto lens in order to take still photos of the subject in question. A voice recorder is used to ensure that the investigator does not miss any pertinent information and allow for review later. In order to record telephone conversations in full between the subject and whomever he speaks with, a private investigator needs to have a card recorder. (The Tools a Private Investigator Needs, 2008) A wireless audio receiver is needed in order to eavesdrop on conversations from a distance, such as in a restaurant, as not to draw attention to yourself....   [tags: Surveillance, Communication, Public Relations]
:: 9 Works Cited
1904 words
(5.4 pages)
Term Papers [preview]
Remote Sensing in Afghanistan - ... IMINT satellites were not the only type of collection satellites developed by the US to bolster the collection capabilities, during the late sixties and seventies several new satellite system came on line. These satellites were capable of collecting SIGINT and MASINT. Satellites systems were not the only collection systems developed during this time. Although the currently fielded constellation of ISR satellites does an exceptionally good job of providing strategic and tactical collection is not possible for non-GEO ISR assets to provide a constant, staring presence on a timescale of days, weeks, or months over a selected area of interest without fielding more satellite systems....   [tags: War, intelligence, surveilance]
:: 3 Works Cited
1899 words
(5.4 pages)
Powerful Essays [preview]
The world of Biometric Security - The world of Biometric Security Biometrics is methods of recognizing a person based on a physiological or behavioral characteristic. Some of the features measured in biometrics identification that I will include in this paper are: fingerprints, retina, face, signature, and voice scans. Biometric technologies are quickly becoming the foundation for a large array of highly secure identification and personal verification techniques. As the level of security and transaction fraud increases, the need for more secure identification and personal verification technologies also increases....   [tags: Biometric Security Surveillance Papers]
:: 8 Sources Cited
1827 words
(5.2 pages)
Term Papers [preview]
Global Privacy… Are You Being Watched?? - Global Privacy… Are You Being Watched?. Introduction Privacy has grown to become an intensely complex and important human rights topic in the information age. The right to privacy underlines human dignity. One of the first privacy laws can be traced back hundreds of years, to 1361, when England enacted the Justice of the Peace Act, which allowed the arrest of eavesdroppers and peeping toms.1 About every country in the world explicitly recognizes a right of privacy in their constitution, allowing people to have a right to home communication secrecy and inviolability at the very least....   [tags: Surveillance Technology Essays]
:: 14 Sources Cited
2323 words
(6.6 pages)
Research Papers [preview]
Smile, You’re On Camera - Mitchell Gray’s paper “Urban Surveillance and Panopticism: will we recognize the facial recognition society?” analyzes the effects of the use of facial recognition surveillance devices as a reaction to perceptions of “insecurity” in urban environments. Mitchell Gray views facial recognition systems as “part of an attempt to reduce insecurity through knowledge and vision, but, paradoxically, their use may add to insecurity by transforming society in unanticipated directions.” Facial recognition, he insists, will expand the disciplinary power of panoptic surveillance into the present-day urban environment....   [tags: Article Analysis ]
:: 1 Works Cited
909 words
(2.6 pages)
Better Essays [preview]
Orwell's Nineteen Eighty Four - Quickly Becoming Reality - Eric Blair wrote the novel 1984 under the pseudonym George Orwell. Nineteen Eighty Four’s original title was The Last Man in Europe, however, the title was changed for unknown purposes. It has been speculated that the change in title was done because it was a mere reversal of the last two digits of the year it was written. The novel was first received with conflicting acclamations and criticisms. Some reviewers disliked its dystopian satire of the class system, the power struggles of world leaders, nationalism, totalitarian regimes, and bureaucracy, while others panned it as nihilistic prophesy on the downfall of humankind....   [tags: George Orwell, 1984] 2959 words
(8.5 pages)
Strong Essays [preview]
The Patriot Act - The USA PATRIOT Act which stands for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism, was proposed by the Bush administration’s antiterrorism to congress on September 19, 2001 one week after the terrorist attacks on the twin towers on 9/11. The Patriot Act was passed by The House of Representatives on October 2nd, 2001 and was then passed by the Senate on October 4,2001 with both the Democrats and Republicans supporting it. This act passed in the House of Representatives by a margin of 357 to 66 and passed in the Senate by a margin of 98 to 1 with only one senator, Russell Feingold, a Democrat from Wisconsin, voted against it saying “ I have asked for time to speak on the Senate floor about the anti-terrorism bill before us....   [tags: U.S. Law]
:: 3 Works Cited
1654 words
(4.7 pages)
Unrated Essays [preview]
The West Nile Virus - ... 2) Environmental surveillance – emphasizes local WNV activity in vectors and non-human vertebrate hosts before epidemic activity affecting humans. Using human case surveillance by itself is insufficient for predicting outbreaks. It can take several weeks, from the time the person get infected to actual diagnosis of the disease and to finally report the case. Resulting in time gap and thus the human case reports lag well behind from the time when WNV actually transmits from mosquitoes that initiated the infection....   [tags: flaviridae, mosquitoes, fever]
:: 3 Works Cited
1937 words
(5.5 pages)
Term Papers [preview]
NSA and Edward Snowden - ... Many innocent civilians in middle-eastern countries have lost their lives as a result of this military sect’s reliance on the NSA’s data, rather than human correspondence. According to an anonymous former drone-operator, the victims of these attacks “might have been terrorists, or they could have been family members who have nothing to do with the target’s activities” (Scahill and Greenwald), suggesting that the NSA often acts imprudently, as seen in their apparent apathy towards the prospect of killing innocent civilians in their tyrannical war on terrorism....   [tags: privacy, secrecy]
:: 2 Works Cited
1318 words
(3.8 pages)
Strong Essays [preview]
Brainwashing of Constituents in George Orwell's "1984" - Eric Blair wrote the novel 1984 under the pseudonym George Orwell. The original title of 1984 was The Last Man in Europe, however, the title was changed for unknown purposes. It has been speculated that the change in title was done because it was a mere reversal of the last two digits of the year in which it was written. The novel was first received with conflicting acclamations and criticisms. Those who provided acclamation for the novel believed that it portrayed the impending possibility of the future and what it might bring....   [tags: George Orwell, 1984, government,] 3231 words
(9.2 pages)
Powerful Essays [preview]
Article Analysis: Infection Control in Home Care -   Introduction The article Infection Control in Home Care was given by Emily Rhinehart in April 2001. This article is about the home care and infection control in the United States of America. This article stated that, in the past decades, the scope and intensity of home care have increased, whereas the strategies and prevention solutions of infection surveillance and control efforts have fallen behind (Rhinehart, 2001). Lack of applicable and consistent methods for surveillance and acute-care practices of prevention are needed to control infections....   [tags: Health Care ]
:: 5 Works Cited
1221 words
(3.5 pages)
Strong Essays [preview]
ms - The International Monetary Fund is an international organization which involves 184 member countries, and it is located in Washington D.C. It was established in 1945 in order to promote international monetary cooperation, exchange stability, and orderly exchange arrangements. It also fosters economic growth and high level of employment. Another propose of the IMF is to provide temporary financial assistance to countries to help ease the balance of payments adjustment. Since the IMF has been established, its purposes haven’t been changed, but its operations such as surveillance, financial assistance, and technical assistance, have been developed in order to meet the needs of the countries that are members of the IMF, and that are in an evolving world economy....   [tags: essays research papers] 437 words
(1.2 pages)
FREE Essays [view]
Cameras in Schools - Cameras in Schools Surveillance in schools has become more popular, not only for safety reasons, but also to monitor the classrooms and teachers. In recent years, violent episodes in schools in Arkansas, Colorado, California, Kentucky, Mississippi and other states have led educators and legislators to make safe schools a priority. The only problem with making the schools safer is how to make them safer without people feeling violated. Some programs to decrease the violence and inappropriate behavior rates are character education and peer meditation; however, this is not enough....   [tags: Essays Papers]
:: 9 Sources Cited
2110 words
(6 pages)
Term Papers [preview]
The Patriot Act is Detrimental to the Rights of American Citizens - Over two hundred years ago, the founding fathers of this great nation signed their names to the Declaration of Independence, sending a message to Great Britain that they were tired of being subservient to a monarch who had no respect for his people. These extraordinary men understood the concept of liberty and embraced it with great passion. They were all too familiar with the consequences of a government with excess power. In order to prevent America from returning to the ways of Great Britain, they crafted one of the greatest documents ever written, the Constitution of the United States of America....   [tags: U.S. Government ]
:: 3 Works Cited
2329 words
(6.7 pages)
Better Essays [preview]
We Are Big Brother's Reality Television Star - Today, the American people are obsessed with reality television. Television shows such as, So You Think You Can Dance and The Bachelorette are just two examples of the fifteen reality or unscripted shows that placed on the Top 20 Highest Rated Television Programs in 2010 (Carter). What Americans fail to realize is they too are the stars of their own reality television show. Although their actions are not being broadcasted to the rest of the country, American citizens are still being monitored by the government through wire taps, GPS locators and cameras....   [tags: Film]
:: 5 Works Cited
1442 words
(4.1 pages)
Powerful Essays [preview]
The NSA, Privacy and the War or Terrorism - ... The second way that it could be solved is by passing a 28th amendment that would create an exception for the new world of internet on unlawful searches. Either way, the issue would be solved. Another subject of concern is the policy on foreign surveillance. Most of the major attacks on U.S. soil have been from organizations outside the nation’s borders (Carafano). Although limiting our knowledge about foreign affairs would leave us vulnerable, wiretapping foreign officials infringes on their rights as a country, not to mention severing the relationship....   [tags: Edward Snowden]
:: 14 Works Cited
1550 words
(4.4 pages)
Powerful Essays [preview]
The Mutual Relationship Between Technology and Society - I am interested in exploring the mutual shaping relationship between technology and society through an integrated development perspective. During my postgraduate study of science and technology studies (STS) in University of Edinburgh, I followed the mutual shaping route and briefly touched the problems of integrated development in two researches, “Understanding Local Circumstances of Surveillance on ICT Applications in China” and “The Mutual Shaping History of Agricultural Technology, Social Condition, And Public Policy in China”....   [tags: Technology/Society] 2504 words
(7.2 pages)
Powerful Essays [preview]
President Bush and FISA - ... Out of a few different proposed options, the recommendation was to leave physical searches out, allow them for the time-being, and address them at a later date. This is the first example of the bridging of national security and personal liberty. The memo goes on to suggest against including covering electronic surveillance overseas, communications intelligence, and not mentioning presidential power restrictions. Point number five is another clear definition of bringing together national security and personal liberty....   [tags: 9 11, Wiretapping, President Carter]
:: 5 Works Cited
2088 words
(6 pages)
Term Papers [preview]
1984 vs Today - ... phone. You no longer know if you're being filmed... an unspoken social rule is being violated" (Brown 42). and gives the government the ability to see from the point of view of anyone. With most every person you meet having quick access to some sort of recordable technology, it is easy to have your actions recorded or documented without your knowledge. The information can be easily spread around the world without your knowing or permission with just a simple touch. As said before, “.....an unspoken social rule is being violated” (Brown 42), taking away the sense of privacy and security felt by many Americans....   [tags: literary analysis, george orwell]
:: 6 Works Cited
871 words
(2.5 pages)
Better Essays [preview]
Use of Closed Circuit Television (CCTV) in the Workplace - Use of Closed Circuit Television (CCTV) in the Workplace Introduction The next generation approaching adulthood has a new challenge; growing up during the technological revolution and believing being monitored is way of life. Generation Y, as they are termed, will grow up thinking it is normal for video cameras to be on every street corner, at work, automatic teller machines, and one day in every home as a security device. They may grow up having “Big Brother” in the workplace applying constant pressure on them to prove they are productive....   [tags: Workplace Privacy Essays] 2090 words
(6 pages)
FREE Essays [view]
Finding the Balance Between Privacy and Security - Clearly, the United States is in unfamiliar territory when it comes to combat- ing counter-terrorism with technology. The founding fathers could not foresee the technological advances, and the complications that arose from them. Under- standably, the United States law enforcement is having a rough time reconciling the constitutional rights a orded to its citizens, while protecting them from a terrorist threat. Initially, the government struggled with this balance. What brought these laws on in the rst place was the lack of balance; security dominated privacy during the Vietnam War to an unacceptable point....   [tags: Security] 1785 words
(5.1 pages)
Powerful Essays [preview]
The Morality of CCTV - The Morality of CCTV Closed-circuit television is widely used in England as a deterrent to crime. It is also used sparingly in Scotland, Times Square, and Atlantic City. The idea is to capture crimes or images of potential criminals on video surveillance tape so that the criminal can be identified. The dilemma of this practice comes from the moral conflict it creates. Do the civil liberties and privacy issues that are taken away justify the protection and safety that CCTV provides. This paper will look at the moral, statistical, and ethical issues of CCTV....   [tags: Argumentative Persuasive Closed Circuit Essays]
:: 4 Sources Cited
2277 words
(6.5 pages)
Powerful Essays [preview]
Telescreens And Technology In 1984 - Through out George Orwells 1984, the use of telescreens is very efficient and effective for the Party. On the other hand it plays a very hard role on our main character, Winston. Through out the novel, he lives in fear of the telescreen and is ultimately taken by the mighty power that is the Party, all in help by the telescreen. The watchful eye of the telescreen is not totally fiction though, in many places it all ready exists.Winston is a worker who's job is to change history to make sure that its "correct" by the Parties standards....   [tags: essays research papers] 485 words
(1.4 pages)
Unrated Essays [preview]


Your search returned over 400 essays for "surveillance"
[1] [2] [3] [4] [5] [Next >>]



Copyright © 2000-2015 123HelpMe.com. All rights reserved. Terms of Service