We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Surveillance Technology, Privacy and Social Control - Research Paper Example

Comments (0)
This has compelled many stakeholders to device various ways geared towards enhancing the level of security provision. This is a social problem that is directly related to the topic selected in this discussion…
Download full paper
Surveillance Technology, Privacy and Social Control
Read TextPreview

Extract of sample
Surveillance Technology, Privacy and Social Control

Download file to see previous pages... Identification is imperative in processes of investigation, especially when there is suspicion of terrorism. The application of surveillance systems have also been greatly applied to enhance security through the proper scrutiny of people’s activities in public places thus enhancing security.
According to the Journal of International Affairs published in 2010, there is a great relationship between technology and security, specifically terrorism. The Journal focuses on the application of technology as a means to provide strategies that can be applied to offer security, with regard to prevention of terrorism.
The main argument presented by the author in the article is that the existence of technology is an appropriate tool that can be effectively applied to provide security, specifically by undertaking measures geared towards reducing terror attacks. The specific focus of the information presented in the article is directed towards the populace of the United Kingdom (Cornish 2010).
This article delves into a proposal or suggestion that was made to the Parliament of the United Kingdom to facilitate fighting terrorism. This is specifically, undertaken by application of technology research and innovation. The introductory section of the article begins by asserting that technology provides strategy through research and innovation; this strategy can be applied in reducing terrorism and also preventing the occurrence of terrorism. It goes further and suggests that there is a need to facilitate the understanding of various technological facets as a means to promote counter-terrorism.
In addition, it goes further and asserts that the major challenge facing the contemporary government is their means to keep-up with the technological edge. The article is not a research study, but it appears that the author might have used secondary sources of information to provide more insight with regard to the challenges exhibited to be facing governments in ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
Electronic Surveillance of Employees
According to the research findings, it can, therefore, be said that American laws do not prevent anybody or organization to undertake video monitoring of an employee, even the employee does not know about his/her consent being monitored. Even the private and public sector organizations are aware of the importance of effective use of electronic gadgets for the safety and security.
5 Pages(1250 words)Research Paper
Protecting Privacy in Social Media
The most popular social networks include Facebook, Twitter, and MySpace among many others. The users of forms of media are ever increasing daily with Facebook having the majority of users followed Twitter. The popularity of social media results from ability of users to share content (Massey 3).
4 Pages(1000 words)Research Paper
The Value of Digital Privacy in an Information Technology Age

The author states that hacking may either be used by computer criminals or computer security experts. In the wrong hands, unauthorized access to information may lead to the destruction of vital information or usage of information for destructive purposes. Another way through which individuals can access private information is through phishing. 

4 Pages(1000 words)Research Paper
Communications Surveillance, Privacy and Its Ethical Implications
Communication surveillance is not a new idea. It has been seen in different forms. Organizations have long been used it to monitor their employees whether they are using company time in carrying out business tasks. Organizations pay their staff members for work not for their personal activities.
8 Pages(2000 words)Research Paper
Video Surveillance Cameras vs. Personal Privacy

The conclusion from this study states that the benefit of video surveillance cameras outweighs personal privacy reasons. Anyway, for those claiming their private space is invaded in the public, it is unexpected that one could use public space for private matters. People do not have to be insecure in front of cameras, not unless they are on a wrong agenda.

10 Pages(2250 words)Research Paper
Based on Epistomological research- Are law enforcement cameras an invasion of privacy
In the context of USA law, privacy is defined as ‘a civil liberty, a right to be free of outside interference’ (Regan 4). In 1995, the British government defined privacy as incorporating two rights: ‘a) the right to be free from harassment and b) the right to privacy of personal information’ (Stanco 3).
8 Pages(2000 words)Research Paper
The End of Privacy
This superlative tool has increased the rapid mode of exchange of information for the users and simultaneously, has threatened the personal information to a high degree. Thus, the aspects and issues related to privacy and confidentiality have reached to a disturbing stage.
6 Pages(1500 words)Research Paper
Surveillance technology
Electronic surveillance technology has finally caught up with the expanding demand for innovative and advanced surveillance technology products which include the digital video recorders, panning, tilting cameras, wireless nanny cams, hidden spy cameras, and full fledged
7 Pages(1750 words)Essay
The Value of Digital Privacy in an Information Technology Age
In the wrong hands, unauthorized access to information may lead to destruction of vital information or usage of information for destructive purposes. Another way through which individuals can access private information is through phishing. Spear-phishing, in
4 Pages(1000 words)Research Paper
Employee Privacy
There are several things like drug tests and alcohol tests that are required in order to balance the working environment of an organization. However, entering an employee’s private zone after their working hours is unethical and there are
6 Pages(1500 words)Research Paper
Let us find you another Research Paper on topic Surveillance Technology, Privacy and Social Control for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us