logo

Security and Surveillance Technology

   

Added on  2023-06-14

17 Pages4380 Words168 Views
Running Head: SECURITY AND SURIVEILLANCE TECHNOLOGIES
Security and Surveillance Technology
Name of the Student
Name of the University
Authors note

2SECURITY AND SURVEILLANCE TECHNOLOGY
Table of Contents
Title of the report.............................................................................................................................3
Abstract............................................................................................................................................3
Background......................................................................................................................................3
Research Question...........................................................................................................................4
Literature review..............................................................................................................................5
Visual surveillance.......................................................................................................................5
Closed Circuit Television........................................................................................................6
Red Light camera.....................................................................................................................6
Satellite Imaging......................................................................................................................7
Thermal Imaging device..........................................................................................................8
Biometric surveillance.................................................................................................................8
Facial recognition....................................................................................................................9
Fingerprint.............................................................................................................................10
DNA testing...........................................................................................................................10
Corporate Surveillance..........................................................................................................11
Gait........................................................................................................................................11
Methodology..................................................................................................................................11
Research plan.................................................................................................................................13
Reference.......................................................................................................................................14

3SECURITY AND SURVEILLANCE TECHNOLOGY
Title of the report
The title of the report that the research proposal is concerned is Security and Surveillance
technology.
Abstract
Surveillance is a technology that is gaining the global acceptance for the purpose of the
keeping control over the functioning of the subject of the surveillance. Several members of the
individual agencies and the separate organization can conduct surveillance. The major function
of the security and the surveillance technology is that it helps in the processing of the crime
investigation. The dependency of the crime investigators has been increasing with the emergence
of the technology. This also enables the fact that monitoring of the house members is also
possible in case the house members are out of place. The usage of this technology has been
emerging since the last decade at a constant rate. The audience who has proper knowledge of the
technology has globally accepted this technology. Despite all the advantages privacy acts to be
the major issue for the processing of this technology. This report will provide the research
questions for security and surveillance technology. This report will also provide the literature
review regarding the security and the surveillance technology. This report will discuss about the
methodologies that are incurred during the processing of the research. This report will also
provide the project plan that will be followed during the processing of the task.
Ethical issue:
The research paper is mainly associated with discussing about the ethical issues that
might arise while the employees in an organization is being monitored. While monitoring the

4SECURITY AND SURVEILLANCE TECHNOLOGY
actions of the employee’s gives arise to various type of debates. But monitoring of the employees
brings up different kind of ethical questions. According to Woodbury (2003) there are certain
ethical issues which mainly includes the downloading of the pornography by the employees,
putting personal web pages on company owned machines, or displaying offensive images on
computer monitors. In many cases it has been seen that the employees are associated with
spending of hours of their workday by playing games on their computers or by sending personal
e-mail, or by gambling. Two of the major problems faced in today’s date are trading and online
shopping. (Woodbury, 2003) The ethical issues might not seem to be similar for the employer
and the employee. It all goes back to a point of view on what is permissible and what is right or
wrong. Also according to Woodbury from the point of view of an employee the businesses might
act unethically while monitoring keystrokes, looking at private e-mail, or providing inadequate
equipment that leads to vision, neck, hand, wrist, or arm damage. The keystroke monitoring is
particularly invasive, because any time an employee rests, perhaps stretch for health or having a
short chat for sanity's sake, the person is off task (Woodbury, 2003). This type of strict
monitoring might lead to rulings or workplace decisions which are capable of disciplining the
employee for simply taking a legitimate break. The monitoring programs cannot know when an
employee has an upset stomach and needs to be away from their desk - it just senses that the
employee is not currently working. The employers get, in a sense, biased and incomplete data. In
addition, monitoring programs such as key loggers can be extremely invasive.
Background
Collection or personalizing of the data that are used for the influencing of the data for
maintaining the security of the location. This ensures the fact that tracking of the location and the
personal data is not scrutinized until there is a need of the checking of the functioning of the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethics of Surveillance in the Workplace PDF
|19
|4044
|27

Mobile Payment: Issues and Challenges with Apple Pay Technology
|13
|3063
|252

The Importance of Forensic Accounting: Doc
|19
|5489
|170

Ethical Issues in the Car Industry: A Case Study of Aston Martin
|11
|3485
|40

Implementation of Intelligent Building Fire Protection System
|17
|4510
|257

How to secure internet of everything in the age of internet of Everything
|13
|3536
|262