Global Surveillance: Advantages, Disadvantages, and Consequences

Verified

Added on  2022/12/26

|10
|2370
|30
Essay
AI Summary
This research essay provides a comprehensive analysis of surveillance technology, examining its advantages, disadvantages, and global implications. The essay begins by outlining the core argument, which focuses on the positive and negative aspects of electronic surveillance and its consequences. It then delves into five articles that explore various facets of surveillance, including legal frameworks governing surveillance, trans-border data flow, privacy concerns, assisted reproductive technology surveillance, and lateral surveillance. The essay discusses the impact of surveillance on privacy, data security, and individual behavior, as well as the ethical considerations involved. The author also examines the role of surveillance in different contexts, such as law enforcement, healthcare, and social media. The essay concludes by synthesizing the key findings and offering insights into the future of surveillance in a rapidly evolving technological landscape. The paper underscores the importance of understanding the balance between security and privacy in the digital age.
Document Page
Running head: RESEARCH ESSAY ON SURVEILLANCE IN THE WORLD
RESEARCH ESSAY ON SURVEILLANCE IN THE WORLD
Name of the Student
Name of the university
Author note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1RESEARCH ESSAY ON SURVEILLANCE IN THE WORLD
Table of Contents
Step 1..........................................................................................................................................2
Thesis Argument....................................................................................................................2
Step 2..........................................................................................................................................2
Article 1:.................................................................................................................................2
Article 2:.................................................................................................................................3
Article 3:.................................................................................................................................4
Article 4:.................................................................................................................................5
Article 5:.................................................................................................................................6
Document Page
2RESEARCH ESSAY ON SURVEILLANCE IN THE WORLD
Step 1
Thesis Argument
The advantages and the disadvantages of the surveillance technology and its
consequences will be argued upon in this paper. The thesis argument will be based on the
positive and the negative aspects of Electronic Surveillance. The technology’s applicability
will be reviewed in all those spheres where it has been used. The benefits of the surveillance
technology and any associated breaches in security will be discussed.
Step 2
Article 1: Kaminski, Margot E. “Regulating Real-World Surveillance.” Washington Law
Review, no. Issue 3, 2015, p. 1113. EBSCOhost, search.ebscohost.com/login.aspx?
direct=true&db=edshol&AN=edshol.hein.journals.washlr90.31&site=eds-live&scope=site.
Surveillance technologies include video cameras to drones technology which have
been the cause of many laws being enacted that govern the surveillance by the private parties
in the real physical space. The laws have been brought into the scenario in order to safeguard
the security breaches associated to this technology. The article focuses on the theory related
to privacy that encourages the government in order to protect individuals from gathering
information in illegal way and without their consent.
As per the research done by Margot, without a proper understanding of the theories
relating to these surveillance laws it needs to be argued upon whether these laws should exist
or are not required. Surveillance means tracking or keeping track of individuals in places
where security plays an important role.
At present, the surveillance technology has been under the purview of legislations that
see to it whether the privacy issues associated are taken care of or not. Understanding the
Document Page
3RESEARCH ESSAY ON SURVEILLANCE IN THE WORLD
interest of this crucial for making decisions about both when to enact these laws, and when
these laws can withstand balancing against other values, such as freedom of expression.
Article 2: Kuner, Christopher, et al. "Internet Balkanization gathers pace: is privacy the real
driver?" (2015): 1-2.
The work of Kuner provides about an overview that is explained in details about the
trans-border flow of data and the ongoing effort for legislating and even restricting the
transfer of data. Historical evolution is delved from the data flow of Trans border
surrounding; draw various examples throughout the world.
Besides the historical background, it is also explained by Kuner about the recent state
of all the regulations and any other initiatives of the future which protect the transfer of data
across border. Anyone who is wishing to understand the legal framework which already
exists throughout the data in online and the flow of data in the cross-border. The text
provided is based on key. The key is stated for the objective throughout the international
initiatives for promoting harmonization of the privacy of data which is between the states
which add a commitment for enforcing various, principles of protection of data.
For more stronger geographical restrictions and the judicial restrictions on the
persistent of flow of data which may include the recent calls for transferring that must be kept
restricted among the entities which is subjected for binding legally the mechanisms for
protecting the flow of cross-border in case of the personal data. Even the debate temperature
may also rise whenever the Snowden revelation will begin to emergence along with the
suggestions which even transfers among the regions of free-flow.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4RESEARCH ESSAY ON SURVEILLANCE IN THE WORLD
In this case an example can be given which may lead to the disruption of the material
for cloud and also for other services of the internet and talk for that service placed in Europe
for the development of any possible area of virtual Schengen.
The things that are not needed and the things that are not seen can be a detailed
explanation and a credible explanation for localization of data and the way this will lead to
enhance the protection for privacy, restraining the surveillance of intelligence which
increases the online privacy level. Until when a consideration of legal and computer science
in taken, it is better to be doubt about all the motivations placed behind the initiatives of data
localization and about the result.
Article 3: de Andrade, Norberto Nuno Gomes, and Shara Monteleone. "Digital Natives and
the Metamorphosis of the European Information Society. The Emerging Behavioral Trends
Regarding Privacy and Their Legal Implications." European Data Protection: Coming of
Age. Springer, Dordrecht, 2013. 119-144.
The collection of various articles which provides various backgrounds that are useful
leads in understanding of cross-border data privacy and data transfers, beyond the experience
of Europe. The individuals who are interested in the privacy questions and the data of online
must consult chapter of Ann Cavoukians. The design privacy leads to results, leadership and
the methods. There is another type of privacy called seven types which is contributed by
David Wright, Michael Friedwald and Rachel L. Finn. They have provided a strong
background in developing the privacy regarded as a concept after tracing it since from 1890s
till the present.
Cavoukian’s piece is expanded by the concept of “privacy by design” which is
introduced in the architecture of modelling cloud computing not by comprising the privacy.
In case of the design approach of the privacy by design that argues consideration of privacy
Document Page
5RESEARCH ESSAY ON SURVEILLANCE IN THE WORLD
should be integral in case of the design process and the development process considering
from the outset, not concerned about a new developed technology. The digital native research
is based upon Eurobarometer 359, “The State of Electronic Identity and Data Protection in
Europe” (published in June 2011), this is constituted of the maximum survey done on the
behaviour of the citizens and the attitude of the citizens that is concerned on the identity
management, privacy and the protection of the data.
As various persona data are disclosed, the article says about the protection of the
European data by inducing various protection laws, this runs with the risk of falling
temptation that is legally paternalistic, protects the citizens from any of the consequences of
action and it also lose touch along with the reality of the subjected data of expectations and
the behaviours.
The consequence of this leads to the argument about the future revisions about the
legal framework that could be taken into consideration with the images from the emerged
natives that are digital which recommends about the introduction about flexibility of higher
degree for the application of the rules being the core values kept intact.
Article 4: “Assisted Reproductive Technology Surveillance — United States,
2012.” Morbidity and Mortality Weekly Report: Surveillance Summaries, vol. 64, no.
6, 2015, p. 1. EBSCOhost, search.ebscohost.com/login.aspx?
direct=true&db=edsjsr&AN=edsjsr.24806300&site=eds-live&scope=site.
In this paper author discussed about the assisted technology surveillance in
reproduction. The paper also gives a clear explanation about how the ART (Assisted
Reproductive Technology) play the key role in controlling the deliveries of live-birth and
infants. The paper explains the advantage of science procedures in treatment for proper
fertilization and the adverse effect related to it.
Document Page
6RESEARCH ESSAY ON SURVEILLANCE IN THE WORLD
The paper also gives a picture which explains how multiple births posed substantial
threat to both infants and mom. In this scope the paper’s subject premises to evaluate the key
factors of embryo transfers. The author made a study over the results of ART implementation
upon the clinics of United States from the beginning of implementation of ART procedure to
2012, taking in counter of the rate of deliveries of infants and live-birth.
This paper makes an analysis upon the relationship of the performed procedure and
occurrence of infant outcomes. The survey based on a state specific report of US 2012 where
a total number of 456 clinic spread over six region of US performed 51261 ART procedures
among 1million women of the age of reproduction and results in 51261 delivery of live birth
and 65151 infant which resulted in six time more prone in giving birth to underweight
children.
The paper shows a reflection how using of ART in clinics increased in those state
turned into more than double of the practice of ART in national level. It was shown that the
use of eSAT with the ART procedure has the potential to reduce the multiple births and could
express adverse consequence from that of ART.
This paper properly expresses the importance of proper education for the family, so
that they learn about the consequences of health on both the infant and maternal. This paper
explains the multiple births depending only on the scale of ART, what could be marked as a
limitation of the research. Other factors of controlling multiple births, like age, fertility
treatment related to non-ART and warrant could be taken in consideration for further study.
Article 5: Andrejevic, Mark. “The Work of Watching One Another: Lateral Surveillance,
Risk, and Governance.” Surveillance & Society, vol. 2, no. 4, Dec. 2004, p.
479. EBSCOhost, search.ebscohost.com/login.aspx?
direct=true&db=edo&AN=61893738&site=eds-live&scope=site.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7RESEARCH ESSAY ON SURVEILLANCE IN THE WORLD
In this paper, the author discussed about the activities of surveillance one another in
the means of Lateral surveillance, risk and precaution related to it, governance of the
authority, Surveillance to the target and the impact of it upon society. This paper also
explains about the procedure and key features for achieving the goal. Author tried to explain
about how surveillance plays an important role in the society to assume and take decision
about other within a society.
The author used a combined theory of contemporary examples, like DIY tool of
investigation, verification services in online, Google searches, Andrejevic introduction of the
concept of ‘lateral surveillance’ or monitoring on peer pressure, that individual uses the same
tactics as that of police or marketing authority to gather information about several people of
their life. The author gave a clear conception about how suspicion and fear are deployed in
order to encourage surveillance that is peer based and normalize it: “In this era where anyone
could be considered as potential suspect, all are urged to act like spies – for the sake of us”.
While andrejevic does not play the role of a linker between lateral surveillance and SNS,
Andrejevic does take the Friendster of early SNS in counter as a sample (Though, he
designed it as a site of dating that is true leaving that of an SNS. This explains how latest the
SNS concept is). Andrejevic argues, Friendster, relation to ‘step the prospective date’s self-
presentation’ and peer referral use, in order to dig out the relative ‘truth’.
By meaning the Friendster is the surveillance that is peer-enabled. The author later
picked up the nation related to peer and lateral surveillance in counter for further analyse and
development for describing and understanding the actions on SNS thoroughly and has
acquired the essence of using it as a key of thinking about the privacy and activities of
surveillance on SNS.
Document Page
8RESEARCH ESSAY ON SURVEILLANCE IN THE WORLD
References
“Assisted Reproductive Technology Surveillance — United States, 2012.” Morbidity and
Mortality Weekly Report: Surveillance Summaries, vol. 64, no. 6, 2015, p. 1. EBSCOhost,
search.ebscohost.com/login.aspx?direct=true&db=edsjsr&AN=edsjsr.24806300&site=eds-
live&scope=site.
“Russia’s Surveillance State.” World Policy Journal, vol. 30, no. 3, 2013, p. 23. EBSCOhost,
search.ebscohost.com/login.aspx?direct=true&db=edsjsr&AN=edsjsr.43290240&site=eds-
live&scope=site.
Andrejevic, Mark. “The Work of Watching One Another: Lateral Surveillance, Risk, and
Governance.” Surveillance & Society, vol. 2, no. 4, Dec. 2004, p. 479. EBSCOhost,
search.ebscohost.com/login.aspx?direct=true&db=edo&AN=61893738&site=eds-
live&scope=site.
Bahr, Roald, et al. “Injury Risk Is Low among World-Class Volleyball Players: 4-Year Data
from the FIVB Injury Surveillance System.” British Journal of Sports Medicine, no. 17,
2015, p. 1132. EBSCOhost, search.ebscohost.com/login.aspx?
direct=true&db=edsgao&AN=edsgcl.430944154&site=eds-live&scope=site.
Junge, Astrid, and Jiri Dvorak. “Injury Surveillance in the World Football Tournaments
1998-2012.” British Journal of Sports Medicine, vol. 47, no. 12, Aug. 2013, pp. 782–
788. EBSCOhost, search.ebscohost.com/login.aspx?
direct=true&db=s3h&AN=89253489&site=eds-live&scope=site.
Kaminski, Margot E. “Regulating Real-World Surveillance.” Washington Law Review, no.
Issue 3, 2015, p. 1113. EBSCOhost, search.ebscohost.com/login.aspx?
direct=true&db=edshol&AN=edshol.hein.journals.washlr90.31&site=eds-live&scope=site.
Document Page
9RESEARCH ESSAY ON SURVEILLANCE IN THE WORLD
Negrier, Claude, et al. "Global Post-Authorization Safety Surveillance Study: real-world data
on prophylaxis and on-demand treatment using FEIBA (an activated prothrombin complex
concentrate)." Blood Coagulation & Fibrinolysis 27.5 (2016): 551.
Trottier, Daniel. Social media as surveillance: Rethinking visibility in a converging world.
Routledge, 2016.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]