logo

Digital Surveillance and Information Privacy Introduction

   

Added on  2022-12-20

9 Pages1916 Words37 Views
University
Semester
Digital Surveillance and Information
Privacy Introduction
Student ID
Student Name
Submission Date
1

Table of Contents
1. Introduction........................................................................................................ 3
2. Research Question and Hypothesis............................................................................ 3
3. Literature review.................................................................................................. 3
4. Research Methodology........................................................................................... 4
5. Result and Discussion............................................................................................ 5
6. Conclusion.......................................................................................................... 6
7. Appendix............................................................................................................ 7
References......................................................................................................... 9
2

1. Introduction
Surveillance is simply the method of monitoring and observation. Surveillance
abuse is the use of surveillance methods or technology to monitor the activity of an individual
or group of individuals in a way which violates the social norms or laws of a society.
Nowadays, surveillance abuse has become more far-flung through corporate and industrial
use of private security firms which may be used to carry out industrial espionage, monitor
competitors, and target trade union leaders. There is a strong group of individuals and people
who believe that these methods and technics shall be used in monitoring and observing for
unwanted activities, crimes, terrorism etc. But opposing these beliefs is another side of
people and organizations that believe that these will be abused and will be used in controlling
and misuse of data and information so collected.
Data collected through various routes may be misused and can be passed on to some
elements of the society which may be harmful to the individual or the organization. Data is
stored and collected from various sources and modes. These data is collected cheaply and
also stored cheaply. Understanding these should be easy and analyzing also is easy with so
many applications and methods availability. Government policies and Authorized sectors
may make use of data so collected from the surveillance nodes and make it worthwhile for
projects that may be irrelevant at times.
2. Research Question and Hypothesis
1. RQ: What is the importance of Social Media monitoring and its privacy for
people of young age?
2. H1: A High level of self-realization (DV) about Individual Privacy and
Monitoring motives is present among the Tertiary educated university students
and they will keep an eye for this on the Social Media.
3. H0:A Low level of self-realization (DV) about Individual Privacy and Monitoring
motives is present among the Tertiary educated university students and they will
be negligent to these while accessing Social Media (Andrews, 2016).
3. Literature review
Privacy today faces growing threats from a growing surveillance apparatus that is
often justified in the name of national security. Use of tools where information and Data
collected for a particular interest is stored and this data becomes valuable to authorities and
3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Does mass surveillance really protect us from crime / terrorism?
|8
|2373
|35

Is Privacy Dead in the Age of Social Media?
|10
|4051
|130

Criminal Justice Socloge Assignment 2022
|3
|667
|11

Report in Business Information System
|5
|610
|30

Control System: Traffic Management
|6
|1499
|331

(PDF) Understanding online anonymity
|9
|1883
|46