Ethical and Professional Issues in Security Surveillance Tech
VerifiedAdded on  2023/06/14
|17
|4380
|168
Report
AI Summary
This document presents a research proposal focused on security and surveillance technology, exploring both visual and biometric methods. It addresses ethical issues related to technologies like CCTV, facial recognition, thermal imaging, and red-light cameras. The proposal includes a literature review, research questions concerning the best technologies and their ethical implications, and a detailed project plan. It highlights the growing use of surveillance technology, the importance of data security, and potential privacy concerns. The proposal also touches on the ethical dilemmas faced by employers and employees regarding workplace monitoring, such as keystroke monitoring and the use of company resources. The methodologies to be used in the research are also discussed.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running Head: SECURITY AND SURIVEILLANCE TECHNOLOGIES
Security and Surveillance Technology
Name of the Student
Name of the University
Authors note
Security and Surveillance Technology
Name of the Student
Name of the University
Authors note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

2SECURITY AND SURVEILLANCE TECHNOLOGY
Table of Contents
Title of the report.............................................................................................................................3
Abstract............................................................................................................................................3
Background......................................................................................................................................3
Research Question...........................................................................................................................4
Literature review..............................................................................................................................5
Visual surveillance.......................................................................................................................5
Closed Circuit Television........................................................................................................6
Red Light camera.....................................................................................................................6
Satellite Imaging......................................................................................................................7
Thermal Imaging device..........................................................................................................8
Biometric surveillance.................................................................................................................8
Facial recognition....................................................................................................................9
Fingerprint.............................................................................................................................10
DNA testing...........................................................................................................................10
Corporate Surveillance..........................................................................................................11
Gait........................................................................................................................................11
Methodology..................................................................................................................................11
Research plan.................................................................................................................................13
Reference.......................................................................................................................................14
Table of Contents
Title of the report.............................................................................................................................3
Abstract............................................................................................................................................3
Background......................................................................................................................................3
Research Question...........................................................................................................................4
Literature review..............................................................................................................................5
Visual surveillance.......................................................................................................................5
Closed Circuit Television........................................................................................................6
Red Light camera.....................................................................................................................6
Satellite Imaging......................................................................................................................7
Thermal Imaging device..........................................................................................................8
Biometric surveillance.................................................................................................................8
Facial recognition....................................................................................................................9
Fingerprint.............................................................................................................................10
DNA testing...........................................................................................................................10
Corporate Surveillance..........................................................................................................11
Gait........................................................................................................................................11
Methodology..................................................................................................................................11
Research plan.................................................................................................................................13
Reference.......................................................................................................................................14

3SECURITY AND SURVEILLANCE TECHNOLOGY
Title of the report
The title of the report that the research proposal is concerned is Security and Surveillance
technology.
Abstract
Surveillance is a technology that is gaining the global acceptance for the purpose of the
keeping control over the functioning of the subject of the surveillance. Several members of the
individual agencies and the separate organization can conduct surveillance. The major function
of the security and the surveillance technology is that it helps in the processing of the crime
investigation. The dependency of the crime investigators has been increasing with the emergence
of the technology. This also enables the fact that monitoring of the house members is also
possible in case the house members are out of place. The usage of this technology has been
emerging since the last decade at a constant rate. The audience who has proper knowledge of the
technology has globally accepted this technology. Despite all the advantages privacy acts to be
the major issue for the processing of this technology. This report will provide the research
questions for security and surveillance technology. This report will also provide the literature
review regarding the security and the surveillance technology. This report will discuss about the
methodologies that are incurred during the processing of the research. This report will also
provide the project plan that will be followed during the processing of the task.
Ethical issue:
The research paper is mainly associated with discussing about the ethical issues that
might arise while the employees in an organization is being monitored. While monitoring the
Title of the report
The title of the report that the research proposal is concerned is Security and Surveillance
technology.
Abstract
Surveillance is a technology that is gaining the global acceptance for the purpose of the
keeping control over the functioning of the subject of the surveillance. Several members of the
individual agencies and the separate organization can conduct surveillance. The major function
of the security and the surveillance technology is that it helps in the processing of the crime
investigation. The dependency of the crime investigators has been increasing with the emergence
of the technology. This also enables the fact that monitoring of the house members is also
possible in case the house members are out of place. The usage of this technology has been
emerging since the last decade at a constant rate. The audience who has proper knowledge of the
technology has globally accepted this technology. Despite all the advantages privacy acts to be
the major issue for the processing of this technology. This report will provide the research
questions for security and surveillance technology. This report will also provide the literature
review regarding the security and the surveillance technology. This report will discuss about the
methodologies that are incurred during the processing of the research. This report will also
provide the project plan that will be followed during the processing of the task.
Ethical issue:
The research paper is mainly associated with discussing about the ethical issues that
might arise while the employees in an organization is being monitored. While monitoring the

4SECURITY AND SURVEILLANCE TECHNOLOGY
actions of the employee’s gives arise to various type of debates. But monitoring of the employees
brings up different kind of ethical questions. According to Woodbury (2003) there are certain
ethical issues which mainly includes the downloading of the pornography by the employees,
putting personal web pages on company owned machines, or displaying offensive images on
computer monitors. In many cases it has been seen that the employees are associated with
spending of hours of their workday by playing games on their computers or by sending personal
e-mail, or by gambling. Two of the major problems faced in today’s date are trading and online
shopping. (Woodbury, 2003) The ethical issues might not seem to be similar for the employer
and the employee. It all goes back to a point of view on what is permissible and what is right or
wrong. Also according to Woodbury from the point of view of an employee the businesses might
act unethically while monitoring keystrokes, looking at private e-mail, or providing inadequate
equipment that leads to vision, neck, hand, wrist, or arm damage. The keystroke monitoring is
particularly invasive, because any time an employee rests, perhaps stretch for health or having a
short chat for sanity's sake, the person is off task (Woodbury, 2003). This type of strict
monitoring might lead to rulings or workplace decisions which are capable of disciplining the
employee for simply taking a legitimate break. The monitoring programs cannot know when an
employee has an upset stomach and needs to be away from their desk - it just senses that the
employee is not currently working. The employers get, in a sense, biased and incomplete data. In
addition, monitoring programs such as key loggers can be extremely invasive.
Background
Collection or personalizing of the data that are used for the influencing of the data for
maintaining the security of the location. This ensures the fact that tracking of the location and the
personal data is not scrutinized until there is a need of the checking of the functioning of the
actions of the employee’s gives arise to various type of debates. But monitoring of the employees
brings up different kind of ethical questions. According to Woodbury (2003) there are certain
ethical issues which mainly includes the downloading of the pornography by the employees,
putting personal web pages on company owned machines, or displaying offensive images on
computer monitors. In many cases it has been seen that the employees are associated with
spending of hours of their workday by playing games on their computers or by sending personal
e-mail, or by gambling. Two of the major problems faced in today’s date are trading and online
shopping. (Woodbury, 2003) The ethical issues might not seem to be similar for the employer
and the employee. It all goes back to a point of view on what is permissible and what is right or
wrong. Also according to Woodbury from the point of view of an employee the businesses might
act unethically while monitoring keystrokes, looking at private e-mail, or providing inadequate
equipment that leads to vision, neck, hand, wrist, or arm damage. The keystroke monitoring is
particularly invasive, because any time an employee rests, perhaps stretch for health or having a
short chat for sanity's sake, the person is off task (Woodbury, 2003). This type of strict
monitoring might lead to rulings or workplace decisions which are capable of disciplining the
employee for simply taking a legitimate break. The monitoring programs cannot know when an
employee has an upset stomach and needs to be away from their desk - it just senses that the
employee is not currently working. The employers get, in a sense, biased and incomplete data. In
addition, monitoring programs such as key loggers can be extremely invasive.
Background
Collection or personalizing of the data that are used for the influencing of the data for
maintaining the security of the location. This ensures the fact that tracking of the location and the
personal data is not scrutinized until there is a need of the checking of the functioning of the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

5SECURITY AND SURVEILLANCE TECHNOLOGY
personnel due to some unconditional circumstances that affect the security of the society. The
interest in the field of the surveillance and the security technology has been increasing in a planar
rate. This fact has ensured the growth of the technology related to the surveillance and the
security in the rapid rate. This will ensure the fact the transformation of this technology from its
initial stage has been to a great level. The political parties to gain a command and tracing of the
audience that are residing in the state and the country where the government has been elected
have used usage of the technology regarding the surveillance and the security. The usage of this
technology is seen in the major projects in order to ensure the practicality and the liability of the
data that is being presented. The personal usage of this technology of the surveillance and the
security technology has been increasing with the increasing time. This ensures the fact that the
security of the documentation if the location is tracked and the information of any kind of mishap
are gained through the proper tracking of the recording of the location. With all the advantages,
that this technology possess the major disadvantage is the security of the data that are collected
in the processing of the tracking of the visual that is being done by the appliances related to the
technology of the security and the surveillance technology are not stored in a robust database.
This ensures the fact that the data that are stored in the database of the appliance are vulnerable
in nature and can be accessed by the imposters.
Research Question
Research Question 1: Which is the best security and surveillance technology?
Research Question 2: How many types of security and surveillance technology are present?
Research Question 3: What are the ethical problems of the facial recognition technology in the
field of security and surveillance technology?
personnel due to some unconditional circumstances that affect the security of the society. The
interest in the field of the surveillance and the security technology has been increasing in a planar
rate. This fact has ensured the growth of the technology related to the surveillance and the
security in the rapid rate. This will ensure the fact the transformation of this technology from its
initial stage has been to a great level. The political parties to gain a command and tracing of the
audience that are residing in the state and the country where the government has been elected
have used usage of the technology regarding the surveillance and the security. The usage of this
technology is seen in the major projects in order to ensure the practicality and the liability of the
data that is being presented. The personal usage of this technology of the surveillance and the
security technology has been increasing with the increasing time. This ensures the fact that the
security of the documentation if the location is tracked and the information of any kind of mishap
are gained through the proper tracking of the recording of the location. With all the advantages,
that this technology possess the major disadvantage is the security of the data that are collected
in the processing of the tracking of the visual that is being done by the appliances related to the
technology of the security and the surveillance technology are not stored in a robust database.
This ensures the fact that the data that are stored in the database of the appliance are vulnerable
in nature and can be accessed by the imposters.
Research Question
Research Question 1: Which is the best security and surveillance technology?
Research Question 2: How many types of security and surveillance technology are present?
Research Question 3: What are the ethical problems of the facial recognition technology in the
field of security and surveillance technology?

6SECURITY AND SURVEILLANCE TECHNOLOGY
Research Question 4: What are the ethical problems of the CCTV in the field of security and
surveillance technology?
Research Question 5: What are the ethical problems of the Thermal Imaging in the field of
security and surveillance technology?
Literature review
According to Reddick, Chatfield and Jaramillo, 2015, the security and the surveillance
technology is broadly classified in two parts namely the visual surveillance and the biometric
surveillance. These two parts are further divided into many parts. The visual surveillance is
divided into the likes of the Closed Circuit Television, Read light camera, Aerial, Satellite
imaging and the Thermal imaging device. The biometric surveillance is further divided into
Facial recognition, Fingerprints, DNA testing, Corporate Surveillance and Gait. Taking into
consideration the perspective of the utilization technique of the security and the surveillance, it
can be differentially standardized in terms of Active Surveillance and Passive Surveillance.
Visual surveillance
According to Bennett and Haggerty, 2014, Visual surveillance has been acting as the
dynamic scenario for the complementing of the complex statistic tracking of the moving object.
The main aim of this surveillance is to track the human movement that will ensure the productive
resultant for the purposing of the security methodology. According to Russell 2017, this factor
will take into consideration the frameworks that are imposed n the movement process. This
ensures the fact that the movements of the architecture are tracked efficiently. Flux statistics are
Research Question 4: What are the ethical problems of the CCTV in the field of security and
surveillance technology?
Research Question 5: What are the ethical problems of the Thermal Imaging in the field of
security and surveillance technology?
Literature review
According to Reddick, Chatfield and Jaramillo, 2015, the security and the surveillance
technology is broadly classified in two parts namely the visual surveillance and the biometric
surveillance. These two parts are further divided into many parts. The visual surveillance is
divided into the likes of the Closed Circuit Television, Read light camera, Aerial, Satellite
imaging and the Thermal imaging device. The biometric surveillance is further divided into
Facial recognition, Fingerprints, DNA testing, Corporate Surveillance and Gait. Taking into
consideration the perspective of the utilization technique of the security and the surveillance, it
can be differentially standardized in terms of Active Surveillance and Passive Surveillance.
Visual surveillance
According to Bennett and Haggerty, 2014, Visual surveillance has been acting as the
dynamic scenario for the complementing of the complex statistic tracking of the moving object.
The main aim of this surveillance is to track the human movement that will ensure the productive
resultant for the purposing of the security methodology. According to Russell 2017, this factor
will take into consideration the frameworks that are imposed n the movement process. This
ensures the fact that the movements of the architecture are tracked efficiently. Flux statistics are

7SECURITY AND SURVEILLANCE TECHNOLOGY
considered to be the main technology that helps to increase the efficiency of functioning of the
system.
Closed Circuit Television
According to Marin 2017, closed Circuit television is considered to be the networking
system that ensured-s the fact that the data that are tracked by the closed circuit television is not
put for the purpose of the distribution of the tracked record, but used for the purpose of the
referencing of the activities in case of emergency situations. The efficiency of this technology is
completely dependent on the placement of the cameras. This ensures the fact that the tracking of
the data is completely dependent on the placement of the visuals that are happening. The location
of the cameras acts as the major role as the probable action that has been happening is recorded
properly in terms of the activation of the closed circuit television. According to Završnik 2015,
the Common usage of the closed circuit television is maintaining the perimeter security in order
to secure the medium and the high end security areas. According to Clopton 2016, traffic
monitoring has also been a job for the CCTV for which the technology is gaining interest world
wide. The major ethical issue in this aspect is that the privacy of the people who are under the
surveillance of the CCTV is at stake. The data that is recorded in the CCTV can be put into use
with wrong intention, hence affecting the regular lifestyle of the people.
Red Light camera
According to Vermeersch and De Pauw 2017, the red-light camera acts as the traffic
enforcement light these red light camera are used to trace the vehicles that have been breaking
the signals and getting into intersection of the daily use. This function ensures the fact that the
camera tracks the vehicles that has been going in the direction, which is not allowed. The major
advantage of this kind of camera tracking system is that the offensive drivers who are breaking
considered to be the main technology that helps to increase the efficiency of functioning of the
system.
Closed Circuit Television
According to Marin 2017, closed Circuit television is considered to be the networking
system that ensured-s the fact that the data that are tracked by the closed circuit television is not
put for the purpose of the distribution of the tracked record, but used for the purpose of the
referencing of the activities in case of emergency situations. The efficiency of this technology is
completely dependent on the placement of the cameras. This ensures the fact that the tracking of
the data is completely dependent on the placement of the visuals that are happening. The location
of the cameras acts as the major role as the probable action that has been happening is recorded
properly in terms of the activation of the closed circuit television. According to Završnik 2015,
the Common usage of the closed circuit television is maintaining the perimeter security in order
to secure the medium and the high end security areas. According to Clopton 2016, traffic
monitoring has also been a job for the CCTV for which the technology is gaining interest world
wide. The major ethical issue in this aspect is that the privacy of the people who are under the
surveillance of the CCTV is at stake. The data that is recorded in the CCTV can be put into use
with wrong intention, hence affecting the regular lifestyle of the people.
Red Light camera
According to Vermeersch and De Pauw 2017, the red-light camera acts as the traffic
enforcement light these red light camera are used to trace the vehicles that have been breaking
the signals and getting into intersection of the daily use. This function ensures the fact that the
camera tracks the vehicles that has been going in the direction, which is not allowed. The major
advantage of this kind of camera tracking system is that the offensive drivers who are breaking
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

8SECURITY AND SURVEILLANCE TECHNOLOGY
the rules can be caught and are punished with due transparency. According to Lee 2017, this
continuous tracking of the vehicles ensures the fact that the citizens stay aware of the punishment
structure of the state. This fact ensures that the citizens abide by the trafficking laws to avoid the
penalty that are imposed kin case of the breaking of the laws that are portrayed by the
government. The major ethical issue that the people faces is that the due to the poor camera
quality that is set with the red light system wrong individuals are often accused of breaking the
laws. The original suspect might not be approached for performing the crime instead the
innocent person would have to get harassed.
Satellite Imaging
According to Clopton 2016, satellite Imaging has been acting as the framework that
ensures the fact that the pictures are captured from the satellites that are sent in the universe for
the capturing of the photos that are related to the universal concern. The terminology enhances
the factor that coverage of the events that are being performed in the different parts of the world
is recorded with proper efficiency and clarity in the image processing. The major advantage of
this technology is the telecasting of the visual image processing that has been going across the
globe. This ensures the fact that every minute activity that is being performed in every corner of
the world gets recorded and during the case of the contradiction the data that are captured in the
satellite area used for resolving the matter. According to Marx 2016, the major ethical issue that
the people faces due to satellite imaging is that the visuals that are sent by the satellite imaging
can be altered by the imposters and the processed image when gets into the media, the entire
termination of the video changes. This aspect takes into consideration the fact that the media
distribute the wrong video and the entire mass faces a lot of difficulties in the processing of the
data.
the rules can be caught and are punished with due transparency. According to Lee 2017, this
continuous tracking of the vehicles ensures the fact that the citizens stay aware of the punishment
structure of the state. This fact ensures that the citizens abide by the trafficking laws to avoid the
penalty that are imposed kin case of the breaking of the laws that are portrayed by the
government. The major ethical issue that the people faces is that the due to the poor camera
quality that is set with the red light system wrong individuals are often accused of breaking the
laws. The original suspect might not be approached for performing the crime instead the
innocent person would have to get harassed.
Satellite Imaging
According to Clopton 2016, satellite Imaging has been acting as the framework that
ensures the fact that the pictures are captured from the satellites that are sent in the universe for
the capturing of the photos that are related to the universal concern. The terminology enhances
the factor that coverage of the events that are being performed in the different parts of the world
is recorded with proper efficiency and clarity in the image processing. The major advantage of
this technology is the telecasting of the visual image processing that has been going across the
globe. This ensures the fact that every minute activity that is being performed in every corner of
the world gets recorded and during the case of the contradiction the data that are captured in the
satellite area used for resolving the matter. According to Marx 2016, the major ethical issue that
the people faces due to satellite imaging is that the visuals that are sent by the satellite imaging
can be altered by the imposters and the processed image when gets into the media, the entire
termination of the video changes. This aspect takes into consideration the fact that the media
distribute the wrong video and the entire mass faces a lot of difficulties in the processing of the
data.

9SECURITY AND SURVEILLANCE TECHNOLOGY
Thermal Imaging device
According to Shaw 2016, thermal imaging device acts as the method of improving the
translucent prospect of the object. This ensures the fact that the visibility of the object that is put
under this source gains better visibility. This technique is used for capturing low light imaging.
Another advantage of Red Light imaging is that it helps in the processing of the image efficiently
after coming into contact with the fog and the smog, which prevents the lighting on the project to
be negligible causing to the fact that the image processing faces difficulties. According to
Parsons 2018, the major purpose of this thermal imaging is that this technology the fact that the
image that are worth processing for the global purpose. This also finds its use in the latest
updated mobile phones as well as the high end cameras which enables them to take low light
photos. The experts perform the processing of the thermal imaging and proper education is
required for the operation of the appliances, which has the thermal imaging installed in the
devices. The main ethical issue of the thermal imaging device is that the privacy of the people
stays at stake due to the reason that this technology is used for the sting operation as the visuals
captured through this technique is low light efficient. The lack of efficiency of the privacy has
been clients has been acting as the major reason for the ethical issue created by the Thermal
imaging device
Biometric surveillance
According to Wilson 2017, biometric surveillance deals with the factor of tracking the
accessibility of the individual over a database or the organizational prospect. The tracking of the
entrants who are entering the location are traced by the biometric system. This fact ensures the
factor that the entrants who are unauthorized to enter the premises are stopped by the biometric
system. the main function of the biometric system is that the data of the genuine clients are
Thermal Imaging device
According to Shaw 2016, thermal imaging device acts as the method of improving the
translucent prospect of the object. This ensures the fact that the visibility of the object that is put
under this source gains better visibility. This technique is used for capturing low light imaging.
Another advantage of Red Light imaging is that it helps in the processing of the image efficiently
after coming into contact with the fog and the smog, which prevents the lighting on the project to
be negligible causing to the fact that the image processing faces difficulties. According to
Parsons 2018, the major purpose of this thermal imaging is that this technology the fact that the
image that are worth processing for the global purpose. This also finds its use in the latest
updated mobile phones as well as the high end cameras which enables them to take low light
photos. The experts perform the processing of the thermal imaging and proper education is
required for the operation of the appliances, which has the thermal imaging installed in the
devices. The main ethical issue of the thermal imaging device is that the privacy of the people
stays at stake due to the reason that this technology is used for the sting operation as the visuals
captured through this technique is low light efficient. The lack of efficiency of the privacy has
been clients has been acting as the major reason for the ethical issue created by the Thermal
imaging device
Biometric surveillance
According to Wilson 2017, biometric surveillance deals with the factor of tracking the
accessibility of the individual over a database or the organizational prospect. The tracking of the
entrants who are entering the location are traced by the biometric system. This fact ensures the
factor that the entrants who are unauthorized to enter the premises are stopped by the biometric
system. the main function of the biometric system is that the data of the genuine clients are

10SECURITY AND SURVEILLANCE TECHNOLOGY
recorded previously and stored in the database if the biometric system. in case any new entrant
wants to get into the restricted premises, the biometric takes the documentation approval of the
client. In case the data that is entered by the client is compared with the data that is stored in the
database of the biometric system. In case the data matches with the data present in the biometric
system, the client gets the allowance to enter the restricted premises.
Facial recognition
According to Grunwald 2015, the facial recognition has been one f the latest technology
that has been used by many organizations to keep the premises of the organization restricted
from the imposters. The photos of the employees of the organization are taken and stored in the
database of the organization. This fact acts as the reference list of the evaluation of the database.
This ensures the fact that the photos that are stored in the reference list are compared with the
photo that is taken by the biometric system of the client who is seeking the entrance in the
organization. Both the photos are compared and in case both the photos of the fact that are taken
matches the biometric system allows the client to get access to the organization premises. In case
the image does not match with the image that is stored in the database of the biometric system
the client is not allowed to enter the premises of the organization. This is the process that the face
recognition uses to prevent unauthorized access to the organization. The major ethical issue that
is present in the facial recognition is that this technology uses the strategy of plotting the outline
of the face of the people who is trying to enter the premises with restriction imposed in the entry
of the strangers. This acts to be the major reason behind the issue as glitch regarding to the fact
that facial structure of more than one individual can be same. This aspect ensures the entry of the
personnel who are not certified and gain access to the data that is stored in the database of the
organization.
recorded previously and stored in the database if the biometric system. in case any new entrant
wants to get into the restricted premises, the biometric takes the documentation approval of the
client. In case the data that is entered by the client is compared with the data that is stored in the
database of the biometric system. In case the data matches with the data present in the biometric
system, the client gets the allowance to enter the restricted premises.
Facial recognition
According to Grunwald 2015, the facial recognition has been one f the latest technology
that has been used by many organizations to keep the premises of the organization restricted
from the imposters. The photos of the employees of the organization are taken and stored in the
database of the organization. This fact acts as the reference list of the evaluation of the database.
This ensures the fact that the photos that are stored in the reference list are compared with the
photo that is taken by the biometric system of the client who is seeking the entrance in the
organization. Both the photos are compared and in case both the photos of the fact that are taken
matches the biometric system allows the client to get access to the organization premises. In case
the image does not match with the image that is stored in the database of the biometric system
the client is not allowed to enter the premises of the organization. This is the process that the face
recognition uses to prevent unauthorized access to the organization. The major ethical issue that
is present in the facial recognition is that this technology uses the strategy of plotting the outline
of the face of the people who is trying to enter the premises with restriction imposed in the entry
of the strangers. This acts to be the major reason behind the issue as glitch regarding to the fact
that facial structure of more than one individual can be same. This aspect ensures the entry of the
personnel who are not certified and gain access to the data that is stored in the database of the
organization.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

11SECURITY AND SURVEILLANCE TECHNOLOGY
Fingerprint
According to Clopton 2016, Fingerprint scanning is the most efficient version of the
biometric system. This ensures that the authentication of the client who is entering the
organization premises that is restricted. The fingerprint of all the employees of the organization
is taken and the data of all the employees are stored in the database of the organization. This fact
ensures that the client trying to enter the organization has to take the finger print test is order to
enter the organization. The fingerprint is considered to be the most secured version if biometric
because the fingerprint of every individual is unique in nature. 2 individuals can never have
similar finger prints. This ensured the fact that three can never be duplicity in the reentrance of
the organization. The client who wants to enter the organization takes the finger print test. In
case the finger print matches with the reference list the client can enter the organization
premises. In case the fingerprint does not match, the client cannot enter the office premises. The
major ethical issue is that the biometric system that is concerned with finger printing does not
track the genuine client and the client is stopped outside the organization premises.
DNA testing
Clopton 2016, in his book stated that DNA testing is the ultimate security inspection
technique that is being used globally t detect the criminals who manage to escape from all other
biometric tests. This aspect is taken into consideration that the DNA of every individual is
unique and the DNA can never be replicated by own will. According to Lee 2017, Hence this
acts as the ultimate prodigy for detecting the criminals. DNA elements namely blood, hair is
collected from the suspects of the crime and the testing is performed. The evaluation of the
testing is compared with the results that is previously stored from the crime location. In case the
result matches with the results that is stored by the forensic platform then the person is accused
Fingerprint
According to Clopton 2016, Fingerprint scanning is the most efficient version of the
biometric system. This ensures that the authentication of the client who is entering the
organization premises that is restricted. The fingerprint of all the employees of the organization
is taken and the data of all the employees are stored in the database of the organization. This fact
ensures that the client trying to enter the organization has to take the finger print test is order to
enter the organization. The fingerprint is considered to be the most secured version if biometric
because the fingerprint of every individual is unique in nature. 2 individuals can never have
similar finger prints. This ensured the fact that three can never be duplicity in the reentrance of
the organization. The client who wants to enter the organization takes the finger print test. In
case the finger print matches with the reference list the client can enter the organization
premises. In case the fingerprint does not match, the client cannot enter the office premises. The
major ethical issue is that the biometric system that is concerned with finger printing does not
track the genuine client and the client is stopped outside the organization premises.
DNA testing
Clopton 2016, in his book stated that DNA testing is the ultimate security inspection
technique that is being used globally t detect the criminals who manage to escape from all other
biometric tests. This aspect is taken into consideration that the DNA of every individual is
unique and the DNA can never be replicated by own will. According to Lee 2017, Hence this
acts as the ultimate prodigy for detecting the criminals. DNA elements namely blood, hair is
collected from the suspects of the crime and the testing is performed. The evaluation of the
testing is compared with the results that is previously stored from the crime location. In case the
result matches with the results that is stored by the forensic platform then the person is accused

12SECURITY AND SURVEILLANCE TECHNOLOGY
of the crime. The major ethical issue in the DNA testing is that all the personal information of a
person comes to the forefront of the testing team.
Corporate Surveillance
According to Lee 2017, the main usage of the biometric system is in the corporate sector
to prevent unauthorized access to the data of the organization. The data that are stored in the
database of the organization acts to the most valuable asset for the company. The entrance in the
premises is restricted by the biometric systems. Only the genuine employees can enter the
premises. The major ethical issue of corporative surveillance is that the biometric systems that
are installed in the processing of the organizations sometime do not function efficiently and the
genuine clients are stopped where as the clients who acts as the imposters are allowed.
Gait
According to Marin 2017, Gait technology is used to detect the momentary
communication senses of an individual. This prospect is taken under consideration the fact that it
is used for understanding the motive of the individual by tracking the posture of the body. This
technology finds its usage in the airport to detect the criminals and the terrorists from the posture
if their body. The major ethical issue is that the data that is gained after performing the Gait
might be proven wrong. In that case an innocent person will be harassed and the time of that
person will be wasted.
Methodology
The methodology that is undertaken is the mixed methodology. The methodology
includes both quantitative and qualitative methodology. The quantitative methodology includes
the fact that the processing of the research includes questioning the employees of the corporate
of the crime. The major ethical issue in the DNA testing is that all the personal information of a
person comes to the forefront of the testing team.
Corporate Surveillance
According to Lee 2017, the main usage of the biometric system is in the corporate sector
to prevent unauthorized access to the data of the organization. The data that are stored in the
database of the organization acts to the most valuable asset for the company. The entrance in the
premises is restricted by the biometric systems. Only the genuine employees can enter the
premises. The major ethical issue of corporative surveillance is that the biometric systems that
are installed in the processing of the organizations sometime do not function efficiently and the
genuine clients are stopped where as the clients who acts as the imposters are allowed.
Gait
According to Marin 2017, Gait technology is used to detect the momentary
communication senses of an individual. This prospect is taken under consideration the fact that it
is used for understanding the motive of the individual by tracking the posture of the body. This
technology finds its usage in the airport to detect the criminals and the terrorists from the posture
if their body. The major ethical issue is that the data that is gained after performing the Gait
might be proven wrong. In that case an innocent person will be harassed and the time of that
person will be wasted.
Methodology
The methodology that is undertaken is the mixed methodology. The methodology
includes both quantitative and qualitative methodology. The quantitative methodology includes
the fact that the processing of the research includes questioning the employees of the corporate

13SECURITY AND SURVEILLANCE TECHNOLOGY
organizations. The data collection technology also includes taking interview of the operational
managers of the organization that has implemented the theory of the security and surveillance
technology. This task also includes the information gathering with the help of the taking
interview of the organizations that has been producing and manufacturing the security and
surveillance technology appliances. The survey was made taking into consideration above 60
people regarding the efficiency of the security and surveillance technology appliances. The
major substantiate information was gathered by interviewing the employees of the organizations
that has been using the security and surveillance technology appliances for their security
purpose. This will ensure the fact that the issues caused by the security and surveillance
technology appliances will be well known. The qualitative methodology will also be taken into
consideration. This will include the fact that the knowledge that is gained by the literary sources
that are authorized and authenticated. The major issues of the security and surveillance
technology appliances are gained with the help of the literary sources.
organizations. The data collection technology also includes taking interview of the operational
managers of the organization that has implemented the theory of the security and surveillance
technology. This task also includes the information gathering with the help of the taking
interview of the organizations that has been producing and manufacturing the security and
surveillance technology appliances. The survey was made taking into consideration above 60
people regarding the efficiency of the security and surveillance technology appliances. The
major substantiate information was gathered by interviewing the employees of the organizations
that has been using the security and surveillance technology appliances for their security
purpose. This will ensure the fact that the issues caused by the security and surveillance
technology appliances will be well known. The qualitative methodology will also be taken into
consideration. This will include the fact that the knowledge that is gained by the literary sources
that are authorized and authenticated. The major issues of the security and surveillance
technology appliances are gained with the help of the literary sources.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

14SECURITY AND SURVEILLANCE TECHNOLOGY
Research plan
Research plan

15SECURITY AND SURVEILLANCE TECHNOLOGY
Reference
Ahson, S.A. and Ilyas, M., 2017. RFID handbook: applications, technology, security, and
privacy. CRC press.
Ball, K., 2017. All consuming surveillance: surveillance as marketplace icon. Consumption
Markets & Culture, 20(2), pp.95-100.
Balzacq, T., 2014. Security and surveillance contests: resistance and counter-resistance.
In Contesting Security (pp. 27-40). Routledge.
Bennett, C.J. and Haggerty, K. eds., 2014. Security games: Surveillance and control at mega-
events. Routledge.
Clopton, Z.D., 2016. Territoriality, Technology, and National Security. The University of
Chicago Law Review, pp.45-63.
Clopton, Z.D., 2016. Territoriality, Technology, and National Security. The University of
Chicago Law Review, pp.45-63.
Coaffee, J. and Fussey, P., 2015. Constructing resilience through security and surveillance: The
politics, practices and tensions of security-driven resilience. Security Dialogue, 46(1), pp.86-105.
Fiscus, J.G. and Michel, M., 2018, January. 2017 TRECVID Workshop: Surveillance Event
Detection (SED) Retrospective Task Overview. In TRECVID (No. TRECVID).
Grunwald, A., 2015. Technology assessment. In Encyclopedia of Information Science and
Technology, Third Edition (pp. 3998-4006). IGI Global.
Hosein, G., 2017. Digital Citizenship and Surveillance| Compromising Over Technology,
Security, and Privacy—Commentary. International Journal of Communication, 11, p.5.
Kidd, C., 2018. Bad Bodies: Comparing Surveillance of Border Crossing and Weight Loss. The
iJournal: Graduate Student Journal of the Faculty of Information, 3(3).
Lee, B.S., 2017. Security Over Surveillance in the US. ThePPEREVIEW, p.8.
Lyon, D., 2014. Surveillance, Snowden, and big data: Capacities, consequences, critique. Big
Data & Society, 1(2), p.2053951714541861.
Marin, L., 2017. 6 The deployment of drone technology in border surveillance. Surveillance,
Privacy and Security, p.107.
Reference
Ahson, S.A. and Ilyas, M., 2017. RFID handbook: applications, technology, security, and
privacy. CRC press.
Ball, K., 2017. All consuming surveillance: surveillance as marketplace icon. Consumption
Markets & Culture, 20(2), pp.95-100.
Balzacq, T., 2014. Security and surveillance contests: resistance and counter-resistance.
In Contesting Security (pp. 27-40). Routledge.
Bennett, C.J. and Haggerty, K. eds., 2014. Security games: Surveillance and control at mega-
events. Routledge.
Clopton, Z.D., 2016. Territoriality, Technology, and National Security. The University of
Chicago Law Review, pp.45-63.
Clopton, Z.D., 2016. Territoriality, Technology, and National Security. The University of
Chicago Law Review, pp.45-63.
Coaffee, J. and Fussey, P., 2015. Constructing resilience through security and surveillance: The
politics, practices and tensions of security-driven resilience. Security Dialogue, 46(1), pp.86-105.
Fiscus, J.G. and Michel, M., 2018, January. 2017 TRECVID Workshop: Surveillance Event
Detection (SED) Retrospective Task Overview. In TRECVID (No. TRECVID).
Grunwald, A., 2015. Technology assessment. In Encyclopedia of Information Science and
Technology, Third Edition (pp. 3998-4006). IGI Global.
Hosein, G., 2017. Digital Citizenship and Surveillance| Compromising Over Technology,
Security, and Privacy—Commentary. International Journal of Communication, 11, p.5.
Kidd, C., 2018. Bad Bodies: Comparing Surveillance of Border Crossing and Weight Loss. The
iJournal: Graduate Student Journal of the Faculty of Information, 3(3).
Lee, B.S., 2017. Security Over Surveillance in the US. ThePPEREVIEW, p.8.
Lyon, D., 2014. Surveillance, Snowden, and big data: Capacities, consequences, critique. Big
Data & Society, 1(2), p.2053951714541861.
Marin, L., 2017. 6 The deployment of drone technology in border surveillance. Surveillance,
Privacy and Security, p.107.

16SECURITY AND SURVEILLANCE TECHNOLOGY
Marin, L., 2017. The deployment of drone technology in border surveillance: between techno-
securitization and challenges to privacy and data protection. In Surveillance, Privacy and
Security (pp. 133-148). Routledge.
Marx, G.T., 2016. Windows into the soul: Surveillance and society in an age of high technology.
University of Chicago Press.
Park, K.H. and Lee, S.Q., Electronics and Telecommunications Research Institute,
2015. Security system based on sound field variation pattern analysis and the method. U.S.
Patent 9,197,976.
Parsons, C.A., 2018. Law Enforcement and Security Agency Surveillance in Canada: The
Growth of Digitally-Enabled Surveillance and Atrophy of Accountability.
Reddick, C.G., Chatfield, A.T. and Jaramillo, P.A., 2015. Public opinion on National Security
Agency surveillance programs: A multi-method approach. Government Information
Quarterly, 32(2), pp.129-141.
Rice, R.M., 2017. Beyond interactivity: critical/cultural surveillance scholarship, 10 years after
Andrejevic. Review of Communication, 17(1), pp.37-55.
Russell, S., 2017. Applications of distributed acoustic sensing for security and surveillance.
In Handbook of Optoelectronics, Second Edition (pp. 99-102). CRC Press.
Shaw, I.G., 2016. Predator empire: drone warfare and full spectrum dominance. University of
Minnesota Press.
Vermeersch, H. and De Pauw, E., 2017. 3 The acceptance of new security oriented
technologies. Surveillance, Privacy and Security, p.52.
Wilson, D., 2017. Surveillance, Crime and Social Control. Routledge.
Završnik, A. ed., 2015. Drones and Unmanned Aerial Systems: Legal and Social Implications for
Security and Surveillance. Springer.
Marin, L., 2017. The deployment of drone technology in border surveillance: between techno-
securitization and challenges to privacy and data protection. In Surveillance, Privacy and
Security (pp. 133-148). Routledge.
Marx, G.T., 2016. Windows into the soul: Surveillance and society in an age of high technology.
University of Chicago Press.
Park, K.H. and Lee, S.Q., Electronics and Telecommunications Research Institute,
2015. Security system based on sound field variation pattern analysis and the method. U.S.
Patent 9,197,976.
Parsons, C.A., 2018. Law Enforcement and Security Agency Surveillance in Canada: The
Growth of Digitally-Enabled Surveillance and Atrophy of Accountability.
Reddick, C.G., Chatfield, A.T. and Jaramillo, P.A., 2015. Public opinion on National Security
Agency surveillance programs: A multi-method approach. Government Information
Quarterly, 32(2), pp.129-141.
Rice, R.M., 2017. Beyond interactivity: critical/cultural surveillance scholarship, 10 years after
Andrejevic. Review of Communication, 17(1), pp.37-55.
Russell, S., 2017. Applications of distributed acoustic sensing for security and surveillance.
In Handbook of Optoelectronics, Second Edition (pp. 99-102). CRC Press.
Shaw, I.G., 2016. Predator empire: drone warfare and full spectrum dominance. University of
Minnesota Press.
Vermeersch, H. and De Pauw, E., 2017. 3 The acceptance of new security oriented
technologies. Surveillance, Privacy and Security, p.52.
Wilson, D., 2017. Surveillance, Crime and Social Control. Routledge.
Završnik, A. ed., 2015. Drones and Unmanned Aerial Systems: Legal and Social Implications for
Security and Surveillance. Springer.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

17SECURITY AND SURVEILLANCE TECHNOLOGY
1 out of 17
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.