Search Results

Free Essays
Unrated Essays
Better Essays
Stronger Essays
Powerful Essays
Term Papers
Research Papers

Your search returned over 400 essays for "surveillance"
[1] [2] [3] [4] [5] [Next >>]

These results are sorted by most relevant first (ranked search). You may also sort these by color rating or essay length.

Title Length Color Rating  
Aspects and implication of Cyberspace Surveillance Technologies - The three most thought about aspects of a surveillance society, would be; from one side it protects and monitors, but on the other hand in order to achieve its protection functions, certain boundaries of privacy are crossed. Some would argue that it is governments demand for more power over people, a disciplinary technique; the fact that people are more likely to behave if they had known they had been under a certain amount of supervision. But not all of the time can this be beneficial to them; questions are asked of whether the success of it, rationalize for existence radical surveillance technologies....   [tags: Surveillance Behavior]
:: 7 Works Cited
2488 words
(7.1 pages)
Better Essays [preview]
Mass electronic surveillance contributes to social order. Discuss. - ... Firstly, the surveillance is a means of protection and care for the citizens from any harmful attack. We all indulge in some form of surveillance such as ‘Facebook stalking’ (Marwick, 2012). But such individual surveillance is always two sided where both can watch each other’s profile unlike in the state or corporate surveillance which is only one sided (Marwick, 2012). Thus, surveillance is not only limited to, government over masses, but citizens using it over each other. Secondly, the surveillance by very definition is act of collection and processing of the personal data for the purpose of influencing and managing data that has been gathered, but this definition immediately points out towards the protection of individual needs over that of the general population (Lynod, 2001)....   [tags: technology, the internet, surveillance]
:: 17 Works Cited
2366 words
(6.8 pages)
Research Papers [preview]
We Need Electronic Surveillance - Our society would not survive in the 21st century without the help of electronic surveillance. Safety is one of the main purposes of electronic surveillance. Safety is the state of being secure and free from danger of any sort. Today, many would rather give up their privacy for safety (Smithsimon). In fact, surveillance gadgets such as cameras, radio tracking chips and house alarms are used in many places to ensure safety. For instance, a parent can easily place a hidden camera in a stuffed animal in order to see how the babysitter handles his or her child (Public Places Have Eyes)....   [tags: Privacy vs Electronic Surveillance]
:: 12 Works Cited
3536 words
(10.1 pages)
Term Papers [preview]
Surveillance and the right of privacy - Surveillance and the Right of Privacy Introduction to Surveillance: According to Merriam-Webster’s collegiate dictionary, surveillance is defined as a “close kept watch over someone or something (as by a detective).” Surveillance has been used ever since the days of, “Follow that cab!” From their primitive state, surveillance techniques and technology have evolved. Policing agencies no longer need to use methods of surveillance such as listening through walls, looking through windows and over fences, and even sifting through a suspect’s garbage....   [tags: Research Surveillance Papers]
:: 6 Sources Cited
1873 words
(5.4 pages)
Powerful Essays [preview]
Government Surveillance vs Privacy - Is the American government trustworthy. Edward Joseph Snowden (2013) released to the United States press* selected information about the surveillance of ordinary citizens by the U.S.A.’s National Security Agency (N.S.A.), and its interconnection to phone and social media companies. The motion picture Citizenfour (2014), shows the original taping of those revelations. Snowden said that some people do nothing about this tracking because they have nothing to hide. He claims that this inverts the model of responsibility....   [tags: Communications Surveillance, 2015]
:: 12 Works Cited
1439 words
(4.1 pages)
Powerful Essays [preview]
Government Surveillance in America - As seemingly tangible evidence of a promising and greatly developed future society, technological advancement and innovation is typically celebrated and generously compensated by our contemporaries. In fact, individuals with a remarkable technological genius are deeply respected and almost venerated for their creations. Modern technology is, undeniably, used at the advantage of the American public, as it aids not only in disburdening the general population of the inconvenience of quotidian chores and in facilitating the accessibility of luxurious commodities to the lower classes but it also encourages the progression of the globalization of our society....   [tags: Privacy vs Government Surveillance]
:: 12 Works Cited
2485 words
(7.1 pages)
Research Papers [preview]
Government Surveillance vs Privacy - The 21st century has brought with it a myriad of technological advancements all designed to make the lives of the developed world much easier, faster, and more fun. These new technologies are not coming without their own set of costs, though. One of the greatest prices people may be paying for their technology is the high cost of the loss of privacy that may come with many of these devices. Jim Hightower, an author for Creators.com is very worried about what the new technological age will mean for privacy....   [tags: Government Surveillance Drones] 1538 words
(4.4 pages)
Powerful Essays [preview]
Electronic Surveillance: Who Is Watching You? - When one walks out the front door into the world, how aware and conscious are they of how often they are watched, tracked, and monitored. Through surveillance, everywhere one goes they are having their lives watched and invaded by prying eyes. Most people believe society needs electronic surveillance and that it is there to protect them. Others believe society does not need surveillance and worry about their privacy being invaded. Many argue about different issues relating to the costly use of surveillance....   [tags: Privacy vs Electronic Surveillance, 2015]
:: 9 Works Cited
3025 words
(8.6 pages)
Powerful Essays [preview]
Surveillance Techniques - ... Technological Tracking of Illegal Immigrants: While there is little validity in the promise that no illegal immigrant will make it through secured borders undetected, the first order of business is to apply tracking devices that can be utilized on immigrants that have in the past, or currently, entered into the country successfully and undetected. In other words, with current physical monitoring there is no way to truly track how many people are coming in and out of the secured border areas therefore the application of a virtual fence is appropriate....   [tags: ethical issues, law enforcement, centervale]
:: 4 Works Cited
1366 words
(3.9 pages)
Strong Essays [preview]
Surveillance Cameras - Surveillance Cameras How are kids safe at night. Do they roam the streets without adult supervision. Are drug dealers taking over the streets. Are drivers nervous of everyone else’s bad driving habits. Although some believe law enforcement cameras invade privacy and disrupt everyday lives, cameras help keep citizens safe. “Police departments across Great Britain credit cameras with dramatic crime reduction, citing such impressive results as 75 percent drop in Airdrie, Scotland, a 68 percent reduction in Glasgow, Scotland, and a 57 percent drop in Northampton” (Taylor 44+)....   [tags: Law Enforcement]
:: 5 Works Cited
1261 words
(3.6 pages)
Strong Essays [preview]
Surveillance Technologies - Farren and Gibb are correct when they say that the only things we can do about surveillance technologies is to get use to them. The advancement of the technology has come so far as to make it all but impossible to contain it. In a larger context this is because we depend on it in the first place. This dependence is encouraged by our own use of surveillance, tracking technologies and our voyeuristic desire to see ourselves and others. The need of these technologies in the commercial and governmental sectors is insatiable....   [tags: Security, Government Sectors, Commercial Sectors] 1657 words
(4.7 pages)
Better Essays [preview]
Technological Surveillance - Technological Surveillance In an age where instant communication and technology provide easy and ready access to information, the society and the individual is caught between two very controversial principles- open information and privacy. The perceptions and expectations of privacy are rapidly changing as a result of current developments in surveillance technologies. The question is are these new surveillance technologies endangering the values and morals of our democratic society, the society we have worked for many centuries to achieve....   [tags: Papers] 1076 words
(3.1 pages)
Unrated Essays [preview]
Satellite Surveillance - Satellite Surveillance I. Preface My interest in satellite surveillance did not really appear to after I saw the movie "Enemy of the State" in 1998. The synopsis of the movie is: Robert Dean (Will Smith) is a labor lawyer who is unknowingly in possession of evidence related to a serious politically motivated crime. Government agents eager to hide their guilt believe that Dean is on to them, and proceed to turn his life upside-down, ruin his reputation, and frame him for various incidents, thanks to the latest in high-tech government surveillance techniques....   [tags: Satellites Weapons Technology Essays]
:: 3 Works Cited :: 10 Sources Cited
3808 words
(10.9 pages)
Term Papers [preview]
The Growing Threat of Corporate Surveillance - ... One of the underlying ideas to creating and maintaining a successful business is customer satisfaction. In order to ensure the satisfaction of customers, corporate bodies try to key in to the mind of the customer and assess demographics (who their customers are), geo demographics (where their customers are), and psycho demographics (how their customers think) (Flew & Smith, 2011). By using these powerful techniques, corporate bodies can cater their businesses to the desires of their customers, thus allowing for greater success in their business endeavors....   [tags: Social Media]
:: 4 Works Cited
1428 words
(4.1 pages)
Powerful Essays [preview]
What exactly is a ‘surveillance society’? - What exactly is a ‘surveillance society’. The term is often used by the popular media to refer to the older more totalitarian notions of the ‘security state’ or Orwellian references to ‘Big Brother’ (Wood, 2009: 180). However, Wood points out that ‘surveillance societies’ exhibit immense cultural and geographical variety, in both historic and contemporary contexts, and need not exhibit totalitarian features (2009: 181). Wood acknowledges that more study of how societies encounter surveillance in order to determine the elements that operate at the different socio-spatial levels (2009: 189)....   [tags: Politics, Civil Liberties] 562 words
(1.6 pages)
FREE Essays [view]
Home Video Surveillance System - Most people think that video surveillance is most often used for ATM machines, schools, banks and gas stations to catch thieves in the act or for taping spouses that are behaving badly; but they are used for much more than that. They were first used in police stations for monitoring, in train stations, and to survey traffic flow. Insurance companies find them helpful regarding fraudulent claims. It is now very common for property owners to use surveillance cams to keep their rental homes secure and parents have used nanny cams for years to monitor their children, observe housekeepers or other domestic contractors....   [tags: Security] 688 words
(2 pages)
Better Essays [preview]
Public Surveillance in the USA - 1. Introduction All the developed countries (developing countries are also in no way lagging behind) the incidence of the people being monitored under various surveillance systems is high of which closed circuit television system (CCTV) is gaining dominance. For instance, the UK has over 4.2 million of them, giving it a ratio of one for every 14 persons and the USA is reported to have been installing it on a rapid pace in every conceivable location as town centers, schools, public transportation systems etc with a spiraling budget estimated at $100 million....   [tags: CCTV, Privacy Rights, Right of Privacy]
:: 9 Works Cited
2230 words
(6.4 pages)
Strong Essays [preview]
Government Surveillance of Library Patrons - ... Constitution, and that is certainly abridges rights guaranteed by the First Amendment of free thought and expression, particularly in the realm of academia where the surveillance of noncitizen students and visiting scholars has curbed the scholarly communication that often feeds intellectual freedom and diversity in thought processes (Reid 2009). Under the provisions of Section 215 of the USA PATRIOT Act, the FBI was no longer required to show "specific and articulable facts" of a connection between a particular person and spying or terrorism (Ramasastry 2006)....   [tags: privacy, USA PATRIOT, intelligence, library]
:: 11 Works Cited
2147 words
(6.1 pages)
Term Papers [preview]
Intelligent Traffic Surveillance System - Abstract- Due to the traffic accidents over the last few years; the development of surveillance systems with multifunctional techniques has received increasing attention. The use of the smart camera is one solution to solve the traffic problems, Smart cameras are cameras that can perform tasks far beyond simply taking photos and recording videos. Intelligent Traffic Surveillance System (ITSS) is used to monitor the roads in preventing accidents at the same time finding what causes the accidents....   [tags: Traffic Safety ] 2568 words
(7.3 pages)
Powerful Essays [preview]
Video Surveillance Systems for State University - ... Currently, video surveillance is provided at open dorm and learning center locations on campus. The infrastructure of these systems is analog, which uses coaxial cabling, with recorded playback of CCTV (Closed-circuit Television) cameras through hard drive recorders called DVMRE (Digital Video Multiplexer Recorder with Ethernet). According to the college Audio Video Manager, due to the thickness and inflexibility of the coaxial cabling, the current implementation of analog systems have been more difficult and time consuming to install than the CAT6 (Category 6) cabling for our IP (Internet Protocol) networks....   [tags: School Safety, Security] 1035 words
(3 pages)
Strong Essays [preview]
Public Video Surveillance - Public Video Surveillance INTRODUCTION Today’s technology has changed the way we live. It has changed the way that we view the environment, act when out in public, and the way we go about doing our daily task. Computers have greatly increased our capabilities to achieve our goals much faster. Human interaction between people has decreased because of this technology. The changes continue daily with an endless stream of new ideas and ways of doing things. There seems to be no end in site. This technology is also changing our moral and ethical values along with the way we employ them....   [tags: Cameras Privacy Issues] 1419 words
(4.1 pages)
Powerful Essays [preview]
Government Surveillance of Internet Activity - Government Surveillance of Internet Activity 1. Background Back to late 1980s in China, some young people in college or research institute had a chance to surf the Internet through a fairly low speed, roughly routed World Wide Web connection. But a big surprise for them was that the Internet was a real freeway, a freeway escaping from strict government control, a freeway for people who wanted to see but couldn’t see and who wanted to say but couldn’t say. Stepping into the 21st century after more than a decade, the Internet service in China has already been almost the latest generation in the world....   [tags: Internet Web Computers Essays]
:: 9 Works Cited :: 4 Sources Cited
3556 words
(10.2 pages)
Term Papers [preview]
Terrorism, Surveillance, and Radio-Transmitters - Terrorism, Surveillance, and Radio-Transmitters       ABSTRACT: This paper is an introduction into the discussion of different types of surveillance equipment. The paper centers on different intelligence agencies worldwide that use surveillance equipment, the types of information they need, and how they go about gathering the information. There is also a discussion on the most common type of surveillance equipment used by intelligence agencies, the radio transmitter. The transmitter is described in detail and its myriad of uses in surveillance are illustrated....   [tags: Exploratory Essays Research Papers]
:: 6 Sources Cited
1773 words
(5.1 pages)
FREE Essays [view]
The Ethics of Workplace Surveillance - The Ethics of Workplace Surveillance You get to work, login, check your email, and examine the values of your stocks. Have you done something wrong. Should your manager care about what you do with those couple of minutes. Hypothetically, if you consider 48 working days per year, with 40 hours per weeks (totally 9,600 hours of work a year), then the daily five minutes of personal internet usage mounts to approximately 24 hours (three working days) of wasted company time. In a capitalist economy, such inefficiency impedes the goal to maximize profit; therefore, compelling businesses to turn to rigorous surveillance to discourage inappropriate use of company resources and to promote productivity....   [tags: Security Work Environment Essays]
:: 4 Works Cited :: 3 Sources Cited
3432 words
(9.8 pages)
Term Papers [preview]
Government Surveillance in the Digital Age - Government Surveillance in the Digital Age Imagine walking along a busy street in the middle of a sunny day. Also imagine that someone is following you around, videotaping everything you do. Disturbing thought. Even more disturbing is the fact that the United States government is already doing this, and it's perfectly legal. According to Robert Trigaux, a reporter for the St. Petersburg times, until August of 2014, in Ybor City, Florida, the Tampa Police Department used fourty-six surveillance cameras that scanned faces of all people walking around the entertainment district....   [tags: Privacy in the Digital Age]
:: 5 Works Cited :: 5 Sources Cited
2364 words
(6.8 pages)
Research Papers [preview]
Government Surveillance vs Privacy - Spying is nothing new to the world. History books tell us that ancient civilizations like the Roman Empire, Egypt, Chine, India, and so on used it. On top of that, 1900s regimes like the Former Soviet Union and Nazi’s Germany used spying tactics around the world wars. The main use of spying at that time mostly was for political and military advantage. These countries were successful on spying. However, in the 21st century surveillance is used in different and very complicated way. So many crimes and terrorist attacks forced governments around the world to use electronic surveillance to protect their own people....   [tags: Security vs Privacy]
:: 9 Works Cited
2066 words
(5.9 pages)
Term Papers [preview]
The Impact of Surveillance Technology on Privacy - The Impact of Surveillance Technology on Privacy               David Brin in The Transparent Society warns us of the future of privacy that is on the horizon.  With millions of cameras recording our every public move, who should have control of the information: companies and governments or we the citizens?  If we take a look at Brin's vision of our future, his solution to the problem, the role of ICTs and the Kelley Cam at IU, we can come to a conclusion that our privacy is on the line and we as citizens must act soon in order to keep our country's foundational liberties....   [tags: Expository Essays Research Papers] 1203 words
(3.4 pages)
Strong Essays [preview]
Technology - Use of Infrared in Surveillance - Use of Infrared in Surveillance       Abstract:  This paper begins with an introduction into the discovery and description of infrared radiation by Sir William Herschel in 1800. It follows by describing various uses of infrared for surveillance purposes. The first application described is the role of infrared in active and passive Night Vision Devices (NVD's) for both military and recreational use. It describes the basic functions of these devices and the differences between the uses and benefits of both active and passive scopes....   [tags: Exploratory Essays Research Papers]
:: 5 Works Cited
1407 words
(4 pages)
FREE Essays [view]
Surveillance: A Welcome Necessity or a Frightening Imposition on Liberties - The increasingly pervasive presence of surveillance seems a peculiar and increasingly urgent feature of twenty-first century culture. Discussions about the need for national ID’s, the presence of surveillance cameras on street corners, recent concerns about phone tapping and listening into people’s conversations had been reflected in the popular media in movies such as “V for Vendetta”. However, using Foucault’s work on Panopticism, surveillance has always been a feature of early and late modern culture....   [tags: Film Review]
:: 3 Works Cited
1219 words
(3.5 pages)
Strong Essays [preview]
The NSA's Domestic Surveillance is Causing Catastrophic Effects - ... As of 2013, the NSA has a 10.8 billion dollar budget; the budget has risen 53% since 2004 (Andrews & Lindeman, 2013). Recently the NSA constructed the Utah Data Center. It is five-times as large as the US Capitol and is responsible for intercepting, sorting, and analyzing intelligence data as it goes through domestic and international networks (Bamford, 2012). The Data center cost an extra 2 billion dollars and the US is already incredibly deep in debt. How much more money will it cost to pay all of the new employees....   [tags: freedom of speech, terrorism, discrimination]
:: 8 Works Cited
1050 words
(3 pages)
Strong Essays [preview]
Case Study: An Information System for Use in Surveillance Rounds - Case Study: An Information System for Use in Surveillance Rounds The equipment located in a facility at the Los Alamos National Laboratories (LANL) is monitored in order to ensure its safe operation. While critical components are continuously monitored and controlled by an automated system most of the non-vital support equipment is checked daily without the use of information technology (IT). Instead, technicians conduct surveillance rounds to check that equipment is operating properly within specified parameters....   [tags: Case Study]
:: 3 Works Cited
1316 words
(3.8 pages)
Strong Essays [preview]
She Snoops to Conquer: Surveillance and the Right to Privacy - Employers these days are becoming more and more concerned about employee theft and are making sure that they minimize these kinds of activities by using sophisticated and high-tech devices. However, it is essential to be honest about the actions and it is equally important to provide privacy in any kind of workspace. In case 9.3, Jean Fanuchi is a manager of a shopping mall in jewelry department. Since there were many recent incidents of theft and shoplifting, she decided to install hidden cameras and microphones without her employees knowledge....   [tags: Ethics, Business]
:: 2 Works Cited
1438 words
(4.1 pages)
Unrated Essays [preview]
Electronic Surveillance: The FBI Carnivore Program - Electronic Surveillance: The FBI Carnivore Program Is Big Brother watching our every computer move. Is the government (FBI, specifically) reading and filtering our email and where we go on the web. According to the critics of the FBI’s new CARNIVORE program, the answer is a resounding “yes”. However, according to FBI spokesperson John Collingwood (in a letter to the LA Times on August 7, 2000), CARNIVORE is not a government-backed spy program to invade the privacy of US citizens--it is an effective weapon (similar to phone taps) in the war against crime....   [tags: Papers] 660 words
(1.9 pages)
Better Essays [preview]
Surveillance Techniques of New Technologies Demand Rethinking of Online Behaviour - Daily usage of the new media technologies like updating our Facebook profile over the internet offer a vast set of opportunities, which are already integrated into our life, but nevertheless the services of these technologies require to expose information about ourself, which are sent over unknown data highways, cached and stored in diverse memory locations and, most of all, read and transferred by many unknown connection points. We are not fully aware of what happens until our data are saved at the desired location, neither do we know what happens with our data....   [tags: Information Technology ]
:: 6 Works Cited
1074 words
(3.1 pages)
Better Essays [preview]
Do new technologies of surveillance encourage self regulation - 2. Do new technologies of surveillance encourage self-regulation. Discuss A fundamental dimension of modernity is the emergence of coordinated administrative power. The nation state is the prime site if such power but is also a part of modern organisations in general. Administrative power is based upon the control of information. Administrative power is enforced through surveillance where information is routinely used to monitor the activities of a subject population. No less than capitalism or industrialism, surveillance is a tool in levering the modern social world further away from traditional modes of socialisation....   [tags: essays research papers] 726 words
(2.1 pages)
FREE Essays [view]
Essay on Internet Privacy - Carnivore, and the Power Of FBI Surveillance - Carnivore: The Power Of FBI Surveillance       Abstract:  This paper provides an analysis of the privacy issues associated with governmental Internet surveillance, with a focus on the recently disclosed FBI tool known as Carnivore. It concludes that, while some system of surveillance is necessary, more mechanisms to prevent abuse of privacy must exist.   Communication surveillance has been a controversial issue in the US since the 1920's, when the Supreme Court deemed unwarranted wiretaps legitimate in the case of Olmstead v United States....   [tags: Exploratory Essays Research Papers]
:: 7 Works Cited
1739 words
(5 pages)
Powerful Essays [preview]
Different Modes in Intelligence Surveillance in the United States - DIFFERENT MODES IN INTELLIGENCE SURVEILLANCE IN THE UNITED STATES Information operations conducted in the enemy’s backyard will assist in achieving specific strategic and tactical objectives. The flexibility to change any perspective provides commanders with a deeper insight into the dynamics of target appreciation. Having the ability to understand a target system provides commander’s with the analytical tools to decipher diverse categories of complex surveillance. The end result of the different modes of intelligence surveillance could lead to a variety of improved protocol, or a resolution to a problem....   [tags: essays research papers] 526 words
(1.5 pages)
FREE Essays [view]
Privacy - It's Time to Control the Use of Electronic Surveillance - It's Time to Control the Use of Electronic Surveillance       How would you feel if every move you make, every word you say, every number you dial on the telephone, could easily be accessed or monitored by just about anyone in the world. Well, chances are that you and me and many others are currently, or have been, victims of this infringement on privacy. With today's ever growing technology, there is little one can do to ensure privacy in normal, every day life. Even though many benefits have come with this increased technology, the inherent loss of privacy scares many....   [tags: Argumentative Persuasive Essays]
:: 8 Sources Cited
1480 words
(4.2 pages)
Powerful Essays [preview]
Surveillance in Foucault's Panopticism and Vonnegut's Harrison Bergeron - Surveillance in Foucault's Panopticism and Vonnegut's Harrison Bergeron Ever feel as though someone is watching you. You know that you are the only one in a room, but for some reason you get an eerie feeling that you are not alone. You might not see anyone, but the eyes of a stranger could be gazing down on you. In Foucault's "Panopticism," a new paradigm of discipline is introduced, surveillance. No one dares to break the law, or do anything erroneous for that matter, in fear that they are being watched....   [tags: Panopticism Harrison Bergeron]
:: 3 Sources Cited
1798 words
(5.1 pages)
Powerful Essays [preview]
The Surveilance Program - ... It is true that nobody would claim for privacy when their house is about to get bombed, but it s right to protest against this surveillance program because it’s has no power to protect. The fact that this surveillance program is not working is obvious because of the terrorist attack plots NSA was unable to detect, in spite of all the budget it uses for it and violated privacy. The most recent attack by a terrorist was the Boston Bombing, which had took 3 lives and harmed 264 people (CNN Library)....   [tags: Technology, edward snowden, leak]
:: 14 Works Cited
1866 words
(5.3 pages)
Term Papers [preview]
Environmental Scanning - ... According to Boeder (2005), since the media and the internet are widely used as tools for environmental scanning, the emergence of ‘panoptic surveillance’ cannot be ignored. He further argues that this has led to invasion of the privacy of individuals since information that the public are unwilling to reveal are acquired digitally and by other network used in social interaction (Habermas, 1989). This may restrict information flow between the public and an organization (Boeder, 2005). Foucalt (1979) argues that literacy provides citizens with protection against governmental powers whereas surveillance provides the government with the ability to infringe the privacy of its citizens and subject them to coercion, control and confusion....   [tags: Public Relations, Surveillance Culture]
:: 28 Works Cited
2074 words
(5.9 pages)
Term Papers [preview]
Yes We Scan - ... FISA, Foreign Intelligence Surveillance Act, is a secret court in the United States that monitors surveillance against terrorism and foreign threats. The immunization from FISA allows the NSA to collect intelligence of Americans under the claim that they are searching for foreign intelligence threats. However, the probable cause of the agency has been changed since FISA was created. The NSA no longer has to give a probable cause for a crime but instead insist that an individual is a target of a foreign threat....   [tags: government surveillance, patriot act]
:: 8 Works Cited
3146 words
(9 pages)
Research Papers [preview]
Surveillance and Information Gathering:the Role of the Nation State, Military and Citizenry - Within any society, information gathering and surveillance mechanisms exist. The sophistication of this information gathering varies, but at all levels; the information gathered can be received voluntarily or involuntarily. The collection of information, whether it is surveillance received at a traffic road crossing, or satellite images from outer space, occurs every day. Everyday life is subject to monitoring, checking and scrutinizing. To find a place or an activity, which is shielded from some kind of surveillance device is difficult....   [tags: Politics] 3298 words
(9.4 pages)
Powerful Essays [preview]
The People, the Nation, and the NSA - ... As events have progressed, NSA surveillance programs have increasingly become exposed to the public, causing a severe distrust of the government. In 2012, two democratic senators, Ron Wyden and Mark Udall wrote a letter to Attorney General Eric Holder concerning the US’s surveillance programs. In the letter, they urged for government transparency on surveillance issues. They stated a very moving fact, saying that citizens are unknowledgeable of the official government interpretation of section 215 of the Patriot Act....   [tags: data, technology, surveillance, freedom, terrorism]
:: 9 Works Cited
1300 words
(3.7 pages)
Strong Essays [preview]
In Praise of Big Brother: Why We Should Learn to Stop Worrying and Love Government Surveillance - Part I: James Stacey Taylor's article, "In Praise of Big Brother: Why We Should Learn to Stop Worrying and Love Government Surveillance" begins reviewing the concept of "Big Brother" as it was originally presented in George Orwell's 1984. The Big Brother started off as a fictional character in 1984-- a dictator of Oceania within a totalitarian state. Set within a society in which everyone is under complete surveillance by the authorities, mainly by telescreens, the people are constantly reminded of this by the phrase “Big Brother is watching you” (Wikipedia) ....   [tags: privacy]
:: 2 Works Cited
1896 words
(5.4 pages)
Strong Essays [preview]
Under The Rug: Break Into the Pentagon - ... Steve turned with anger and sprinted towards the Pentagon. Steve avoids the patrols when possible and also evades the line of sight from the snipers above. He hid behind the closest tree to the building and stare at it. “America’s proud building, huh!” Steve mocked and gave a light laughed. “Steve, that ain’t your problem, just gets in the god damn building!” Shouted Sally. “Oh, shut up, will you, you hurting my ears!” Steve complained furiously. Before Steve charges… Sally suddenly said. “Wait, Steve, you had no idea where the package is!” Sally said....   [tags: United States, surveillance, Steve, explosion]
:: 6 Works Cited
1211 words
(3.5 pages)
Strong Essays [preview]
The Government: Watching Everything You Do - ... 1-2). After the attempt of reporting it to the DoD IG, they soon decided to retire in October 2001. They did continue to blow the whistle outside of the agency along with the help of GAP “providing Binney and Wiebe with legal advice on whistleblowing matters and assisted them with media and public advocacy” (“NSA Whistleblowers William B. & J. Kirk W.” par. 3). Since then, Binney, Wiebe and Thomas Drake have been part of the court case Jewel v. NSA filed by the Electronic Frontier Foundation or EFF that “is aimed at ending the NSA’s dragnet surveillance of millions of ordinary Americans and holding accountable the government officials who illegally authorized it” ( “Jewel v....   [tags: surveillance, United States, NSA, communications]
:: 9 Works Cited
1512 words
(4.3 pages)
Powerful Essays [preview]
Big Brother: An American Reality - ... "Intelligence agencies operate in an industry where their commodity is information, or restricted access to information. And the reason their information has any value is, well, because no one else has access to it" (Elahi). If every American takes control of their digital footprint , data collected by the NSA, CIA, FBI, has little value. Opponents may argue that we are just buying into their game by making it easier for them to gather our information. They state that to the government agencies, all data is the same regardless of how it was obtained....   [tags: surveillance, patriot act, government spying, 9/11]
:: 20 Works Cited
2795 words
(8 pages)
Term Papers [preview]
Twitter: Protecting User Privacy - Social media has seen a significant number of stories that bring attention to failures in surveillance policies over the past decade. Time after time we hear about how surveillance technology is digging deeper and deeper into our personal information and is infringing on our rights more and more. It is important however to recognize successes in personal information protection and acknowledge achievements on behalf of the common population. As more and more attention is brought to surveillance the public is becoming better informed....   [tags: Twitter vs Government Surveillance, 2015]
:: 5 Works Cited
1126 words
(3.2 pages)
Strong Essays [preview]
The Patriot Act - The Patriot Act In the wake of September 11, many things happened very quickly. Along with the beginning of a '"'war'"' against terrorism, an act was passed to help prevent future terrorism in the USA. The name of this is the USA Patriot Act. The act legalizes many surveillance techniques that were once prohibited. The act has been passed without debate, and the new privileges given to our government have not been thoroughly examined. The law enforcers of our country are now capable of monitoring the citizens in ways most people are not aware of....   [tags: USA Terrorism Surveillance Wire Tapping] 1144 words
(3.3 pages)
Strong Essays [preview]
Private Investigator - ... One of the simplest tools would be a camera with a telephoto lens in order to take still photos of the subject in question. A voice recorder is used to ensure that the investigator does not miss any pertinent information and allow for review later. In order to record telephone conversations in full between the subject and whomever he speaks with, a private investigator needs to have a card recorder. (The Tools a Private Investigator Needs, 2008) A wireless audio receiver is needed in order to eavesdrop on conversations from a distance, such as in a restaurant, as not to draw attention to yourself....   [tags: Surveillance, Communication, Public Relations]
:: 9 Works Cited
1904 words
(5.4 pages)
Term Papers [preview]
REMOTE SENSING IN AFGHANISTAN - ... These satellites were capable of collecting SIGINT and MASINT. Satellites systems were not the only collection systems developed during this time. Although the currently fielded constellation of ISR satellites does an exceptionally good job of providing strategic and tactical collection is not possible for non-GEO ISR assets to provide a constant, staring presence on a timescale of days, weeks, or months over a selected area of interest without fielding more satellite systems. Additionally any satellite program suffers from three major drawbacks....   [tags: War, intelligence, surveilance]
:: 3 Works Cited
1899 words
(5.4 pages)
Term Papers [preview]
The world of Biometric Security - The world of Biometric Security Biometrics is methods of recognizing a person based on a physiological or behavioral characteristic. Some of the features measured in biometrics identification that I will include in this paper are: fingerprints, retina, face, signature, and voice scans. Biometric technologies are quickly becoming the foundation for a large array of highly secure identification and personal verification techniques. As the level of security and transaction fraud increases, the need for more secure identification and personal verification technologies also increases....   [tags: Biometric Security Surveillance Papers]
:: 8 Sources Cited
1827 words
(5.2 pages)
Term Papers [preview]
Global Privacy… Are You Being Watched?? - Global Privacy… Are You Being Watched?. Introduction Privacy has grown to become an intensely complex and important human rights topic in the information age. The right to privacy underlines human dignity. One of the first privacy laws can be traced back hundreds of years, to 1361, when England enacted the Justice of the Peace Act, which allowed the arrest of eavesdroppers and peeping toms.1 About every country in the world explicitly recognizes a right of privacy in their constitution, allowing people to have a right to home communication secrecy and inviolability at the very least....   [tags: Surveillance Technology Essays]
:: 14 Sources Cited
2323 words
(6.6 pages)
Research Papers [preview]
Smile, You’re On Camera - Mitchell Gray’s paper “Urban Surveillance and Panopticism: will we recognize the facial recognition society?” analyzes the effects of the use of facial recognition surveillance devices as a reaction to perceptions of “insecurity” in urban environments. Mitchell Gray views facial recognition systems as “part of an attempt to reduce insecurity through knowledge and vision, but, paradoxically, their use may add to insecurity by transforming society in unanticipated directions.” Facial recognition, he insists, will expand the disciplinary power of panoptic surveillance into the present-day urban environment....   [tags: Article Analysis ]
:: 1 Works Cited
909 words
(2.6 pages)
Better Essays [preview]
Orwell's Nineteen Eighty Four - Quickly Becoming Reality - Eric Blair wrote the novel 1984 under the pseudonym George Orwell. Nineteen Eighty Four’s original title was The Last Man in Europe, however, the title was changed for unknown purposes. It has been speculated that the change in title was done because it was a mere reversal of the last two digits of the year it was written. The novel was first received with conflicting acclamations and criticisms. Some reviewers disliked its dystopian satire of the class system, the power struggles of world leaders, nationalism, totalitarian regimes, and bureaucracy, while others panned it as nihilistic prophesy on the downfall of humankind....   [tags: George Orwell, 1984] 2959 words
(8.5 pages)
Strong Essays [preview]
The Patriot Act - The USA PATRIOT Act which stands for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism, was proposed by the Bush administration’s antiterrorism to congress on September 19, 2001 one week after the terrorist attacks on the twin towers on 9/11. The Patriot Act was passed by The House of Representatives on October 2nd, 2001 and was then passed by the Senate on October 4,2001 with both the Democrats and Republicans supporting it. This act passed in the House of Representatives by a margin of 357 to 66 and passed in the Senate by a margin of 98 to 1 with only one senator, Russell Feingold, a Democrat from Wisconsin, voted against it saying “ I have asked for time to speak on the Senate floor about the anti-terrorism bill before us....   [tags: U.S. Law]
:: 3 Works Cited
1654 words
(4.7 pages)
Unrated Essays [preview]
Brainwashing of Constituents in George Orwell's "1984" - Eric Blair wrote the novel 1984 under the pseudonym George Orwell. The original title of 1984 was The Last Man in Europe, however, the title was changed for unknown purposes. It has been speculated that the change in title was done because it was a mere reversal of the last two digits of the year in which it was written. The novel was first received with conflicting acclamations and criticisms. Those who provided acclamation for the novel believed that it portrayed the impending possibility of the future and what it might bring....   [tags: George Orwell, 1984, government,] 3231 words
(9.2 pages)
Powerful Essays [preview]
Article Analysis: Infection Control in Home Care -   Introduction The article Infection Control in Home Care was given by Emily Rhinehart in April 2001. This article is about the home care and infection control in the United States of America. This article stated that, in the past decades, the scope and intensity of home care have increased, whereas the strategies and prevention solutions of infection surveillance and control efforts have fallen behind (Rhinehart, 2001). Lack of applicable and consistent methods for surveillance and acute-care practices of prevention are needed to control infections....   [tags: Health Care ]
:: 5 Works Cited
1221 words
(3.5 pages)
Strong Essays [preview]
ms - The International Monetary Fund is an international organization which involves 184 member countries, and it is located in Washington D.C. It was established in 1945 in order to promote international monetary cooperation, exchange stability, and orderly exchange arrangements. It also fosters economic growth and high level of employment. Another propose of the IMF is to provide temporary financial assistance to countries to help ease the balance of payments adjustment. Since the IMF has been established, its purposes haven’t been changed, but its operations such as surveillance, financial assistance, and technical assistance, have been developed in order to meet the needs of the countries that are members of the IMF, and that are in an evolving world economy....   [tags: essays research papers] 437 words
(1.2 pages)
FREE Essays [view]
Cameras in Schools - Cameras in Schools Surveillance in schools has become more popular, not only for safety reasons, but also to monitor the classrooms and teachers. In recent years, violent episodes in schools in Arkansas, Colorado, California, Kentucky, Mississippi and other states have led educators and legislators to make safe schools a priority. The only problem with making the schools safer is how to make them safer without people feeling violated. Some programs to decrease the violence and inappropriate behavior rates are character education and peer meditation; however, this is not enough....   [tags: Essays Papers]
:: 9 Sources Cited
2110 words
(6 pages)
Term Papers [preview]
The Patriot Act is Detrimental to the Rights of American Citizens - Over two hundred years ago, the founding fathers of this great nation signed their names to the Declaration of Independence, sending a message to Great Britain that they were tired of being subservient to a monarch who had no respect for his people. These extraordinary men understood the concept of liberty and embraced it with great passion. They were all too familiar with the consequences of a government with excess power. In order to prevent America from returning to the ways of Great Britain, they crafted one of the greatest documents ever written, the Constitution of the United States of America....   [tags: U.S. Government ]
:: 3 Works Cited
2329 words
(6.7 pages)
Better Essays [preview]
We Are Big Brother's Reality Television Star - Today, the American people are obsessed with reality television. Television shows such as, So You Think You Can Dance and The Bachelorette are just two examples of the fifteen reality or unscripted shows that placed on the Top 20 Highest Rated Television Programs in 2010 (Carter). What Americans fail to realize is they too are the stars of their own reality television show. Although their actions are not being broadcasted to the rest of the country, American citizens are still being monitored by the government through wire taps, GPS locators and cameras....   [tags: Film]
:: 5 Works Cited
1442 words
(4.1 pages)
Powerful Essays [preview]
Edward Snowden - ... The second way that it could be solved is by passing a 28th amendment that would create an exception for the new world of internet on unlawful searches. Either way, the issue would be solved. Another subject of concern is the policy on foreign surveillance. Most of the major attacks on U.S. soil have been from organizations outside the nation’s borders (Carafano). Although limiting our knowledge about foreign affairs would leave us vulnerable, wiretapping foreign officials infringes on their rights as a country, not to mention severing the relationship....   [tags: politics, leaks on the U.S. government]
:: 14 Works Cited
1550 words
(4.4 pages)
Powerful Essays [preview]
The Mutual Relationship Between Technology and Society - I am interested in exploring the mutual shaping relationship between technology and society through an integrated development perspective. During my postgraduate study of science and technology studies (STS) in University of Edinburgh, I followed the mutual shaping route and briefly touched the problems of integrated development in two researches, “Understanding Local Circumstances of Surveillance on ICT Applications in China” and “The Mutual Shaping History of Agricultural Technology, Social Condition, And Public Policy in China”....   [tags: Technology/Society] 2504 words
(7.2 pages)
Powerful Essays [preview]
President Bush and FISA - ... Out of a few different proposed options, the recommendation was to leave physical searches out, allow them for the time-being, and address them at a later date. This is the first example of the bridging of national security and personal liberty. The memo goes on to suggest against including covering electronic surveillance overseas, communications intelligence, and not mentioning presidential power restrictions. Point number five is another clear definition of bringing together national security and personal liberty....   [tags: 9 11, Wiretapping, President Carter]
:: 5 Works Cited
2088 words
(6 pages)
Term Papers [preview]
1984 vs Today - ... phone. You no longer know if you're being filmed... an unspoken social rule is being violated" (Brown 42). and gives the government the ability to see from the point of view of anyone. With most every person you meet having quick access to some sort of recordable technology, it is easy to have your actions recorded or documented without your knowledge. The information can be easily spread around the world without your knowing or permission with just a simple touch. As said before, “.....an unspoken social rule is being violated” (Brown 42), taking away the sense of privacy and security felt by many Americans....   [tags: literary analysis, george orwell]
:: 6 Works Cited
871 words
(2.5 pages)
Better Essays [preview]
Use of Closed Circuit Television (CCTV) in the Workplace - Use of Closed Circuit Television (CCTV) in the Workplace Introduction The next generation approaching adulthood has a new challenge; growing up during the technological revolution and believing being monitored is way of life. Generation Y, as they are termed, will grow up thinking it is normal for video cameras to be on every street corner, at work, automatic teller machines, and one day in every home as a security device. They may grow up having “Big Brother” in the workplace applying constant pressure on them to prove they are productive....   [tags: Workplace Privacy Essays] 2090 words
(6 pages)
FREE Essays [view]
Finding the Balance Between Privacy and Security - Clearly, the United States is in unfamiliar territory when it comes to combat- ing counter-terrorism with technology. The founding fathers could not foresee the technological advances, and the complications that arose from them. Under- standably, the United States law enforcement is having a rough time reconciling the constitutional rights a orded to its citizens, while protecting them from a terrorist threat. Initially, the government struggled with this balance. What brought these laws on in the rst place was the lack of balance; security dominated privacy during the Vietnam War to an unacceptable point....   [tags: Security] 1785 words
(5.1 pages)
Powerful Essays [preview]
The Morality of CCTV - The Morality of CCTV Closed-circuit television is widely used in England as a deterrent to crime. It is also used sparingly in Scotland, Times Square, and Atlantic City. The idea is to capture crimes or images of potential criminals on video surveillance tape so that the criminal can be identified. The dilemma of this practice comes from the moral conflict it creates. Do the civil liberties and privacy issues that are taken away justify the protection and safety that CCTV provides. This paper will look at the moral, statistical, and ethical issues of CCTV....   [tags: Argumentative Persuasive Closed Circuit Essays]
:: 4 Sources Cited
2277 words
(6.5 pages)
Powerful Essays [preview]
Telescreens And Technology In 1984 - Through out George Orwells 1984, the use of telescreens is very efficient and effective for the Party. On the other hand it plays a very hard role on our main character, Winston. Through out the novel, he lives in fear of the telescreen and is ultimately taken by the mighty power that is the Party, all in help by the telescreen. The watchful eye of the telescreen is not totally fiction though, in many places it all ready exists.Winston is a worker who's job is to change history to make sure that its "correct" by the Parties standards....   [tags: essays research papers] 485 words
(1.4 pages)
Unrated Essays [preview]
No Online Privacy in America - No Online Privacy in America Along with its many benefits, the march of technology makes an encompassing surveillance network seem almost inevitable. We owe much of the privacy we have enjoyed in the past to a combination of immature technology and insufficient manpower to monitor us. But these protective inefficiencies are giving way to efficient technologies of data processing and digital surveillance that threaten to eliminate our privacy. Already we are tracked by our credit-card transactions, our passes through the fast-lanes at toll booths, our cell phone calls....   [tags: Essays Papers] 1596 words
(4.6 pages)
FREE Essays [view]
Doctoral Degree in International Health - I am pursuing a doctoral degree in international health because I believe it is the next important step in my career in public health research. I have a passion for research, I enjoy the disease detective work, and I think there are still many important public health problems that are yet unsolved. I have been working at the Centers for Disease Control for 7 years, and my experiences have provided hands-on application of public health research conducted in often challenging, resource-limited settings....   [tags: Personal Statement] 1346 words
(3.8 pages)
Strong Essays [preview]
Singapore - How might the Singapore society differ were it not for these technologies – would the society be more or less heavily regulated. Lee recommends analysing politics and society by addressing how power struggles and relations were played out in the pre-Internet era, namely the maintenance of political control via public support (2005: 74). Foucault defines ‘governmentality’ as the point of contact where the technologies of power interact with the governed. This spurs Lee to postulate that, in order to retain power in the Internet era, 'governments need to be actively involved in shaping the design as well as the societal, cultural and regulatory environment in which the Internet and other new media technologies operate' (2005: 75)....   [tags: Singapore Politics, Government] 1910 words
(5.5 pages)
Strong Essays [preview]
Granny Cams - Video surveillance systems are quickly becoming an affordable and efficient way to ensure vulnerable seniors stay safe when in the care of others, whether it is an in-home caretaker, nursing home, hospital or other type of managed care facility. A granny cam can also provide a clear picture of how an elderly person is getting along on their own, or it can capture mistreatment. Most experts estimate between 1 million and 2 million elderly Americans have experienced abuse or neglect. However, the Senate Special Committee on Aging believes the number of victims may actually be closer to 5 million, which means five additional cases may exist for every one reported....   [tags: Health Care] 1138 words
(3.3 pages)
Strong Essays [preview]
Korean Totalitarian Government of 1984 - As evident through the striking similarities between the totalitarian government of 1984 and the Communist regime of North Korea, it really is as if Kim Il Sung obtained an early copy of George Orwell’s 1984 and used it as a blueprint for his system (Hitchens n.p.). George Orwell had been exposed to various types of imperialism throughout his early life, leading to a realization of his resentment for authority. Orwell produced the novel with the intent of warning future societies of the dangers of totalitarian governments, yet North Korea epitomizes a flawless depiction of the very authority that Orwell yearned to avoid through providing a detailed illustration of the ramifications of submitting to a tyrannical government (Merriman n.p.)....   [tags: Korea]
:: 9 Works Cited
2111 words
(6 pages)
Unrated Essays [preview]
We Don't Need Laws to Regulate Encryption Technology - We Don't Need Laws to Regulate Encryption Technology "It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You had to live -- did live, from habit that became instinct -- in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized" (1984, Orwell 6). Government shouldn't require in all encryption devices a trapdoor feature that would allow immediate decoding of any message by law-enforcement officials....   [tags: Argumentative Persuasive Essays] 572 words
(1.6 pages)
FREE Essays [view]
Quit Watching Me! - “Quit Watching Me!'; Attempts to monitor employees have always existed in one form or another, from mechanical keystroke counters in the early part of the century, to the latest innovations in electronic monitoring. As technology advances, so do the monitoring possibilities in the workplace. As result of the endless possibilities in surveillance, anxiety in employee’s increase, which in most cases leads to illnesses. Studies have shown that individuals who are constantly being monitored at work suffer from inevitable effects, the majority being illnesses such as physical, emotional, and mental disorders....   [tags: essays research papers] 804 words
(2.3 pages)
FREE Essays [view]
The U.S. Patriot Act - The US Patriot Act Privacy can be considered one of the most valued rights of a civilized society. The founders of the constitution had this in mind when they developed search and seizure laws to protect the privacy of the citizens from the British soldiers. The invasion of privacy has been a much discussed and debated topic among both politicians and private citizens alike, and the question many are asking is, “How much freedom do we give up for our sense of security?” The US Patriot address issues of criminal activities in relation to acts of terror....   [tags: essays research papers] 801 words
(2.3 pages)
Better Essays [preview]
Civil Disobedience: The Curious Case of Edward Snowden - More than six months after first sending shockwaves through the world, Edward Snowden is alive, not imprisoned, and still making daily headlines. A former National Security Agency contractor, Snowden was responsible for revealing to the American public the existence of enormous, secret governmental surveillance programs, tactics that irrefutably border unconstitutionality. He gave up his freedom and ultimately his way of life in revealing how the NSA was harvesting and storing global phone records and text messages, the majority sent by ordinary American citizens....   [tags: Civil Disobedience]
:: 3 Works Cited
359 words
(1 pages)
FREE Essays [view]


Your search returned over 400 essays for "surveillance"
[1] [2] [3] [4] [5] [Next >>]



Copyright © 2000-2015 123HelpMe.com. All rights reserved. Terms of Service