This report discusses the latest Security and Surveillance Technology, including visual surveillance, biometric surveillance, CCTV, facial recognition, and more. It also covers the ethical issues associated with these technologies. The report provides a literature review, research questions, methodology, and project plan.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: SECURITY AND SURIVEILLANCE TECHNOLOGIES Security and Surveillance Technology Name of the Student Name of the University Authors note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2SECURITY AND SURVEILLANCE TECHNOLOGY Table of Contents Title of the report.............................................................................................................................3 Abstract............................................................................................................................................3 Background......................................................................................................................................3 Research Question...........................................................................................................................4 Literature review..............................................................................................................................5 Visual surveillance.......................................................................................................................5 Closed Circuit Television........................................................................................................6 Red Light camera.....................................................................................................................6 Satellite Imaging......................................................................................................................7 Thermal Imaging device..........................................................................................................8 Biometric surveillance.................................................................................................................8 Facial recognition....................................................................................................................9 Fingerprint.............................................................................................................................10 DNA testing...........................................................................................................................10 Corporate Surveillance..........................................................................................................11 Gait........................................................................................................................................11 Methodology..................................................................................................................................11 Research plan.................................................................................................................................13 Reference.......................................................................................................................................14
3SECURITY AND SURVEILLANCE TECHNOLOGY Title of the report The title of the report that the research proposal is concerned is Security and Surveillance technology. Abstract Surveillance is a technology that is gaining the global acceptance for the purpose of the keeping control over the functioning of the subject of the surveillance. Several members of the individual agencies and the separate organization can conduct surveillance. The major function of the security and the surveillance technology is that it helps in the processing of the crime investigation. The dependency of the crime investigators has been increasing with the emergence of the technology. This also enables the fact that monitoring of the house members is also possible in case the house members are out of place. The usage of this technology has been emerging since the last decade at a constant rate. The audience who has proper knowledge of the technology has globally accepted this technology. Despite all the advantages privacy acts to be the major issue for the processing of this technology. This report will provide the research questions for security and surveillance technology. This report will also provide the literature review regarding the security and the surveillance technology. This report will discuss about the methodologies that are incurred during the processing of the research. This report will also provide the project plan that will be followed during the processing of the task. Ethical issue: The research paper is mainly associated with discussing about the ethical issues that might arise while the employees in an organization is being monitored. While monitoring the
4SECURITY AND SURVEILLANCE TECHNOLOGY actions of the employee’s gives arise to various type of debates. But monitoring of the employees brings up different kind of ethical questions. According to Woodbury (2003) there are certain ethical issues which mainly includes the downloading of the pornography by the employees, putting personal web pages on company owned machines, or displaying offensive images on computer monitors. In many cases it has been seen that the employees are associated with spending of hours of their workday by playing games on their computers or by sending personal e-mail, or by gambling. Two of the major problems faced in today’s date are trading and online shopping. (Woodbury, 2003) The ethical issues might not seem to be similar for the employer and the employee. It all goes back to a point of view on what is permissible and what is right or wrong. Also according to Woodbury from the point of view of an employee the businesses might act unethically while monitoring keystrokes, looking at private e-mail, or providing inadequate equipment that leads to vision, neck, hand, wrist, or arm damage. The keystroke monitoring is particularly invasive, because any time an employee rests, perhaps stretch for health or having a short chat for sanity's sake, the person is off task (Woodbury, 2003). This type of strict monitoring might lead to rulings or workplace decisions which are capable of disciplining the employee for simply taking a legitimate break. The monitoring programs cannot know when an employee has an upset stomach and needs to be away from their desk - it just sensesthat the employee is not currently working. The employers get, in a sense, biased and incomplete data. In addition, monitoring programs such as key loggers can be extremely invasive. Background Collection or personalizing of the data that are used for the influencing of the data for maintaining the security of the location. This ensures the fact that tracking of the location and the personal data is not scrutinized until there is a need of the checking of the functioning of the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5SECURITY AND SURVEILLANCE TECHNOLOGY personnel due to some unconditional circumstances that affect the security of the society.The interest in the field of the surveillance and the security technology has been increasing in a planar rate. This fact has ensured the growth of the technology related to the surveillance and the security in the rapid rate. This will ensure the fact the transformation of this technology from its initial stage has been to a great level. The political parties to gain a command and tracing of the audience that are residing in the state and the country where the government has been elected have used usage of the technology regarding the surveillance and the security. The usage of this technology is seen in the major projects in order to ensure the practicality and the liability of the data that is being presented. The personal usage of this technology of the surveillance and the security technology has been increasing with the increasing time. This ensures the fact that the security of the documentation if the location is tracked and the information of any kind of mishap are gained through the proper tracking of the recording of the location. With all the advantages, that this technology possess the major disadvantage is the security of the data that are collected in the processing of the tracking of the visual that is being done by the appliances related to the technology of the security and the surveillance technology are not stored in a robust database. This ensures the fact that the data that are stored in the database of the appliance are vulnerable in nature and can be accessed by the imposters. Research Question Research Question 1: Which is the best security and surveillance technology? Research Question 2: How many types of security and surveillance technology are present? Research Question 3: What are the ethical problems of the facial recognition technology in the field of security and surveillance technology?
6SECURITY AND SURVEILLANCE TECHNOLOGY Research Question 4: What are the ethical problems of the CCTV in the field of security and surveillance technology? Research Question 5: What are the ethical problems of the Thermal Imaging in the field of security and surveillance technology? Literature review According toReddick, Chatfield and Jaramillo, 2015,the security and the surveillance technology is broadly classified in two parts namely the visual surveillance and the biometric surveillance. These two parts are further dividedinto many parts. The visual surveillance is divided into the likes of the Closed Circuit Television, Read light camera, Aerial, Satellite imaging and the Thermal imaging device. The biometric surveillance is further divided into Facial recognition, Fingerprints, DNA testing, Corporate Surveillance and Gait. Taking into consideration the perspective of the utilization technique of the security and the surveillance, it can be differentially standardized in terms of Active Surveillance and Passive Surveillance. Visual surveillance According toBennett and Haggerty, 2014,Visual surveillance has been acting as the dynamic scenario for the complementing of the complex statistic tracking of the moving object. The main aim of this surveillance is to track the human movement that will ensure the productive resultant for the purposing of the security methodology. According toRussell 2017,this factor will take into consideration the frameworks that are imposed n the movement process. This ensures the fact that the movements of the architecture are tracked efficiently. Flux statistics are
7SECURITY AND SURVEILLANCE TECHNOLOGY considered to be the main technology that helps to increase the efficiency of functioning of the system. Closed Circuit Television According toMarin 2017, closed Circuit television is considered to be the networking system that ensured-s the fact that the data that are tracked by the closed circuit television is not put for the purpose of the distribution of the tracked record, but used for the purpose of the referencing of the activities in case of emergency situations. The efficiency of this technology is completely dependent on the placement of the cameras. This ensures the fact that the tracking of the data is completely dependent on the placement of the visuals that are happening. The location of the cameras acts as the major role as the probable action that has been happening is recorded properly in terms of the activation of the closed circuit television. According toZavršnik 2015, theCommon usage of the closed circuit televisionis maintaining the perimeter security in order to secure the medium and the high end security areas. According toClopton 2016,traffic monitoring has also been a job for the CCTV for which the technology is gaining interest world wide. The major ethical issue in this aspect is that the privacy of the people who are under the surveillance of the CCTV is at stake. The data that is recorded in the CCTV can be put into use with wrong intention, hence affecting the regular lifestyle of the people. Red Light camera According toVermeersch and De Pauw 2017,the red-light camera acts as the traffic enforcement light these red light camera are used to trace the vehicles that havebeen breaking the signals and getting into intersection of the daily use. This function ensures the fact that the camera tracks the vehicles that has been going in the direction, which is not allowed. The major advantage of this kind of camera tracking system is that the offensive drivers who are breaking
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
8SECURITY AND SURVEILLANCE TECHNOLOGY the rules can be caught and are punished with due transparency. According toLee 2017,this continuous tracking of the vehicles ensures the fact that the citizens stay aware of the punishment structure of the state. This fact ensures that the citizens abide by the trafficking laws to avoid the penalty that are imposed kin case of the breaking of the laws that are portrayed by the government. The major ethical issue that the people faces is that the due to the poor camera quality that is set with the red light system wrong individuals are often accused of breaking the laws. The original suspect might not be approached for performing the crime instead the innocent person would have to get harassed. Satellite Imaging According toClopton 2016, satellite Imaging has been acting as the framework that ensures the fact that the pictures are captured from the satellites that are sent in the universe for the capturing of the photos that are related to the universal concern. The terminology enhances the factor that coverage of the events that are being performed in the different parts of the world is recorded with proper efficiency and clarity in the image processing. The major advantage of this technology is the telecasting of the visual image processing that has been going across the globe. This ensures the fact that every minute activity that is being performed in every corner of the world gets recorded and during the case of the contradiction the data that are captured in the satellite area used for resolving the matter. According toMarx 2016,the major ethical issue that the people faces due to satellite imaging is that the visuals that are sent by the satellite imaging can be altered by the imposters and the processed image when gets into the media, the entire termination of the video changes. This aspect takes into consideration the fact that the media distribute the wrong video and the entire mass faces a lot of difficulties in the processing of the data.
9SECURITY AND SURVEILLANCE TECHNOLOGY Thermal Imaging device According toShaw 2016,thermal imaging device acts as the method of improving the translucent prospect of the object. This ensures the fact that the visibility of the object that is put under this source gains better visibility. This technique is used for capturing low light imaging. Another advantage of Red Light imaging is that it helps in the processing of the image efficiently after coming into contact with the fog and the smog, which prevents the lighting on the project to be negligible causing to the fact that the image processing faces difficulties. According to Parsons 2018,the major purpose of this thermal imaging is that this technology the fact that the image that are worth processing for the global purpose. This also finds its use in the latest updated mobile phones as well as the high end cameras which enables them to take low light photos. The experts perform the processing of the thermal imaging and proper education is required for the operation of the appliances, which has the thermal imaging installed in the devices. The main ethical issue of the thermal imaging device is that the privacy of the people stays at stake due to the reason that this technology is used for the sting operation as the visuals captured through this technique is low light efficient. The lack of efficiency of the privacy has been clients has been acting as the major reason for the ethical issue created by the Thermal imaging device Biometric surveillance According toWilson 2017,biometric surveillance deals with the factor of tracking the accessibility of the individual over a database or the organizational prospect. The tracking of the entrants who are entering the location are traced by the biometric system. This fact ensures the factor that the entrants who are unauthorized to enter the premises are stopped by the biometric system. the main function of the biometric system is that the data of the genuine clients are
10SECURITY AND SURVEILLANCE TECHNOLOGY recorded previously and stored in the database if the biometric system. in case any new entrant wants to get into the restricted premises, the biometric takes the documentation approval of the client. In case the data that is entered by the client is compared with the data that is stored in the database of the biometric system. In case the data matches with the data present in the biometric system, the client gets the allowance to enter the restricted premises. Facial recognition According toGrunwald 2015, the facial recognition has been one f the latest technology that has been used by many organizations to keep the premises of the organization restricted from the imposters. The photos of the employees of the organization are taken and stored in the database of the organization. This fact acts as the reference list of the evaluation of the database. This ensures the fact that the photos that are stored in the reference list are compared with the photo that is taken by the biometric system of the client who is seeking the entrance in the organization. Both the photos are compared and in case both the photos of the fact that are taken matches the biometric system allows the client to get access to the organization premises. In case the image does not match with the image that is stored in the database of the biometric system the client is not allowed to enter the premises of the organization. This is the process that the face recognition uses to prevent unauthorized access to the organization. The major ethical issue that is present in the facial recognition is that this technology uses the strategy of plotting the outline of the face of the people who is trying to enter the premises with restriction imposed in the entry of the strangers. This acts to be the major reason behind the issue as glitch regarding to the fact that facial structure of more than one individual can be same. This aspect ensures the entry of the personnel who are not certified and gain access to the data that is stored in the database of the organization.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
11SECURITY AND SURVEILLANCE TECHNOLOGY Fingerprint According toClopton 2016,Fingerprint scanning is the most efficient version of the biometricsystem.Thisensuresthattheauthenticationof theclientwho isenteringthe organization premises that is restricted. The fingerprint of all the employees of the organization is taken and the data of all the employees are stored in the database of the organization. This fact ensures that the client trying to enter the organization has to take the finger print test is order to enter the organization. The fingerprint is considered to be the most secured version if biometric because the fingerprint of every individual is unique in nature. 2 individuals can never have similar finger prints. This ensured the fact that three can never be duplicity in the reentrance of the organization. The client who wants to enter the organization takes the finger print test. In case the finger print matches with the reference list the client can enter the organization premises. In case the fingerprint does not match, the client cannot enter the office premises. The major ethical issue is that the biometric system that is concerned with finger printing does not track the genuine client and the client is stopped outside the organization premises. DNA testing Clopton 2016, in his book stated thatDNA testing is the ultimate security inspection technique that is being used globally t detect the criminals who manage to escape from all other biometric tests. This aspect is taken into consideration that the DNA of every individual is unique and the DNA can never be replicated by own will. According toLee 2017,Hence this acts as the ultimate prodigy for detecting the criminals. DNA elements namely blood, hair is collected from the suspects of the crime and the testing is performed. The evaluation of the testing is compared with the results that is previously stored from the crime location. In case the result matches with the results that is stored by the forensic platform then the person is accused
12SECURITY AND SURVEILLANCE TECHNOLOGY of the crime. The major ethical issue in the DNA testing is that all the personal information of a person comes to the forefront of the testing team. Corporate Surveillance According toLee 2017,the main usage of the biometric system is in the corporate sector to prevent unauthorized access to the data of the organization. The data that are stored in the database of the organization acts to the most valuable asset for the company. The entrance in the premises is restricted by the biometric systems. Only the genuine employees can enter the premises. The major ethical issue of corporative surveillance is that the biometric systems that are installed in the processing of the organizations sometime do not function efficiently and the genuine clients are stopped where as the clients who acts as the imposters are allowed. Gait AccordingtoMarin2017,Gaittechnologyisusedtodetectthemomentary communication senses of an individual. This prospect is taken under consideration the fact that it is used for understanding the motive of the individual by tracking the posture of the body. This technology finds its usage in the airport to detect the criminals and the terrorists from the posture if their body. The major ethical issue is that the data that is gained after performing the Gait might be proven wrong. In that case an innocent person will be harassed and the time of that person will be wasted. Methodology The methodology that is undertaken is the mixed methodology. The methodology includes both quantitative and qualitative methodology. The quantitative methodology includes the fact that the processing of the research includes questioning the employees of the corporate
13SECURITY AND SURVEILLANCE TECHNOLOGY organizations. The data collection technology also includes taking interview of the operational managers of the organization that has implemented the theory of the security and surveillance technology. This task also includes the information gathering with the help of the taking interview of the organizations that has been producing and manufacturing the security and surveillance technology appliances. The survey was made taking into consideration above 60 people regarding the efficiency of the security and surveillance technology appliances. The major substantiate information was gathered by interviewing the employees of the organizations that has been using the security and surveillance technology appliances for their security purpose. This will ensure the fact that the issues caused by the security and surveillance technology appliances will be well known. The qualitative methodology will also be taken into consideration. This will include the fact that the knowledge that is gained by the literary sources thatareauthorizedandauthenticated.Themajorissuesof thesecurityandsurveillance technology appliances are gained with the help of the literary sources.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
14SECURITY AND SURVEILLANCE TECHNOLOGY Research plan
15SECURITY AND SURVEILLANCE TECHNOLOGY Reference Ahson, S.A. and Ilyas, M., 2017.RFID handbook: applications, technology, security, and privacy. CRC press. Ball, K., 2017. All consuming surveillance: surveillance as marketplace icon.Consumption Markets & Culture,20(2), pp.95-100. Balzacq, T., 2014. Security and surveillance contests: resistance and counter-resistance. InContesting Security(pp. 27-40). Routledge. Bennett, C.J. and Haggerty, K. eds., 2014.Security games: Surveillance and control at mega- events. Routledge. Clopton, Z.D., 2016. Territoriality, Technology, and National Security.The University of Chicago Law Review, pp.45-63. Clopton, Z.D., 2016. Territoriality, Technology, and National Security.The University of Chicago Law Review, pp.45-63. Coaffee, J. and Fussey, P., 2015. Constructing resilience through security and surveillance: The politics, practices and tensions of security-driven resilience.Security Dialogue,46(1), pp.86-105. Fiscus, J.G. and Michel, M., 2018, January. 2017 TRECVID Workshop: Surveillance Event Detection (SED) Retrospective Task Overview. InTRECVID(No. TRECVID). Grunwald, A., 2015. Technology assessment. InEncyclopedia of Information Science and Technology, Third Edition(pp. 3998-4006). IGI Global. Hosein, G., 2017. Digital Citizenship and Surveillance| Compromising Over Technology, Security, and Privacy—Commentary.International Journal of Communication,11, p.5. Kidd, C., 2018. Bad Bodies: Comparing Surveillance of Border Crossing and Weight Loss.The iJournal: Graduate Student Journal of the Faculty of Information,3(3). Lee, B.S., 2017. Security Over Surveillance in the US.ThePPEREVIEW, p.8. Lyon, D., 2014. Surveillance, Snowden, and big data: Capacities, consequences, critique.Big Data & Society,1(2), p.2053951714541861. Marin, L., 2017. 6 The deployment of drone technology in border surveillance.Surveillance, Privacy and Security, p.107.
16SECURITY AND SURVEILLANCE TECHNOLOGY Marin, L., 2017. The deployment of drone technology in border surveillance: between techno- securitization and challenges to privacy and data protection. InSurveillance, Privacy and Security(pp. 133-148). Routledge. Marx, G.T., 2016.Windows into the soul: Surveillance and society in an age of high technology. University of Chicago Press. Park, K.H. and Lee, S.Q., Electronics and Telecommunications Research Institute, 2015.Security system based on sound field variation pattern analysis and the method. U.S. Patent 9,197,976. Parsons, C.A., 2018. Law Enforcement and Security Agency Surveillance in Canada: The Growth of Digitally-Enabled Surveillance and Atrophy of Accountability. Reddick, C.G., Chatfield, A.T. and Jaramillo, P.A., 2015. Public opinion on National Security Agency surveillance programs: A multi-method approach.Government Information Quarterly,32(2), pp.129-141. Rice, R.M., 2017. Beyond interactivity: critical/cultural surveillance scholarship, 10 years after Andrejevic.Review of Communication,17(1), pp.37-55. Russell, S., 2017. Applications of distributed acoustic sensing for security and surveillance. InHandbook of Optoelectronics, Second Edition(pp. 99-102). CRC Press. Shaw, I.G., 2016.Predator empire: drone warfare and full spectrum dominance. University of Minnesota Press. Vermeersch, H. and De Pauw, E., 2017. 3 The acceptance of new security oriented technologies.Surveillance, Privacy and Security, p.52. Wilson, D., 2017.Surveillance, Crime and Social Control. Routledge. Završnik, A. ed., 2015.Drones and Unmanned Aerial Systems: Legal and Social Implications for Security and Surveillance. Springer.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser