StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Surveillance Technologies - Essay Example

Cite this document
Summary
The present essay "Surveillance Technologies" dwells on the policy issues that include net neutrality, government surveillance, and corporate data mining that influences internet-based communications. The policy issues are based on interdisciplinary studies…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Surveillance Technologies
Read Text Preview

Extract of sample "Surveillance Technologies"

Surveillance Technologies The article discusses policy issues that include net neutrality, government surveillance, and corporate data mining that influences internet based communications. The policy issues bases on interdisciplinary studies and different advocacy efforts from different organizations. The article will examine some of the threats of private agreements in the social networking sites. Lastly, the article offers some recommendations for the technocrats to design a better future culture. Some of the challenges that students or online users encounter include sites taking long to open, ubiquitous advertising and alludes one’s privacy. If the current developments in the internet continue, users will encounter frustrations once Homeland Securities confiscate their computer devices on the pretext of links with terror related organizations. Behavioral profiling and the unwarranted seizures of digital communication will covert web surveillance to disrupt the work of internet users. Lyon (2009, p. 33) believes that researchers and other internet users must pay great care to the policy. The government has to provide ample time for students and other users of the web to learn extensively about the policy. Negotiations of the government agencies are crucial to the success of internet regulation. Decisions of the internet have a profound effect on web development. In future, corporations will have an overall control of the internet in the package of user-generated content of the commercial sites observed closely by the government agencies. 1. Preserving Net Neutrality President Obama asserts that internet is an open network since history and will remain so. The president remains committed to providers and the small voices. Net neutrality is one of the basic principles of internet. It specifies that internet is an open system that treats all the contents with equality together with terms of transmission. Large files and encrypted files take long to transmit while all have the same access to the network. According to Brooke (2011, p. 12), network neutrality implies that users control what one does online and broadband providers should not discriminate on the lawful internet applications. All the phone and cable companies that provide one with access to the internet should route the traffic in a neutral way with no biases in terms of speeding up or slowing down applications. Historically of internet use, people understood it as a crucial part of the internet while current occurrences threaten this principle and place the future of internet in peril. The Federal Communications Commission (FCC) established working relations with antiregulatory policies in 2005 during Bush administration (Lyon, 2009. 33). FCC held that internet was an information service other than a telecommunication service. The commission classified the internet in the low regulatory category to enforce the information service providers. To do that, FCC uses four policy statements concerning network neutrality to guide the regulatory category in Title I that includes consumers’ entitlement to access lawful content to protect network neutrality. Lyon (2009, p.34) says that the protection of open network will entail the development new standards and ensure that owners of internet are not a few wealthy companies. According to Brooke (2010, p. 12), Comcast is one of the companies that display discontent with FCC policy statement in the regulation of internet and internet service providers. The issue is that Comcast ensures challenges in throttling Bit Torrent due to slow transfer of the peer-to-peer application to a point that users of Comcast broadband cannot send or receive files (Brooke, 2011, p.22). FCC carried out investigations since their net neutrality principles had ancillary authority to regulate networks as prescribed in Title I. The investigations by FSS found Comcast violated the law to cease-and-desist bias treatment of Bit Torrent as held by the commissioners in 2008. Comcast appealed the ruling in 2010 in the federal courts where the courts held that FCC had contravened its authority in regulating the firm. Consequently, the Commission failed to tie its assertion on ancillary authority in Comcast internet service. The court classifies internet as information service other than a common carrier. In that case, FCC does not have authority to regulate any decisions concerning network management. Lyon (2009, p. 30) thinks that court ruling will lead to the death knell of internet and needs amendment. The classification of internet as common carrier subject to a strict regulatory will give powers to FCC to enforce its policies on net neutrality. As things stand now the battle is enormous concerning classification of internet service while a few corporations such as Comcast with power to control the internet content to users will lead to appear as cable television. The publicity of Verizon and Google in 2010 seeks to preempt FCC reclassification. Outshoorn (2005, p.4) proposes that wired internet services adhere to internet policies with exceptions of network management to cover all decisions concerning traffic on networks. Additionally, Verizon and Google perceive that that internet delivery is distinct and for that reason the internet services provided do not have to abide with the principles of open network. More than 60 percent of Americans access internet through wireless and the percentage are higher on minority populations. Brooke (2011, p. 11) claim that different regulations must exist for wireless networks as a guide to prevent fraudulent activities. Lyon (2009, p.35) argue that to preserve net neutrality since there are numerous loopholes for corporate to take over internet. Oudshoorn(2005, p.5) believes that the Verizon-Google proposal will have an issue of blockage of applications and that would divide information in the superhighway to create private fast lanes for well-established corporate leaving the start ups stranded. FCC believes that their standards do not protect illusionary dangers they can witness issues of policy as they emerge than can threaten internet fundamental architecture on open network. Dilly-dallying on the preservation of free and open internet can distort internet profound success. Some of the corporations that seek to undermine net neutrality include Verizon, AT&T, and Google. AT&T is one of the largest phone carriers in America that has plans to execute paid policy where a company receives money from internet content developers to enable it deliver their content at variable rates. The phone carrier claims that paid prioritization is an open internet since the delivery is that of higher speeds better than others are. Internet is an open network and in the absence of government to enforce net neutrality we face a future where large corporations will control and produce all the content. The preservation of open internet ensures access of all central priorities that we need to engage in. 2. Data mining and privacy Google and Face Book benefits from data mining to enable them push online companies stock values. Brooke (2011, p. 12) elucidate that Google has patents on portable data centers on some of the shipping containers .Internet users benefit from convenient Web sites. In an ideal situation, one would opt to use a non-commercial open source site to write and research online while resource limitations see users applying Google Docs in case of collaborative writing or YouTube for video hosting. According to Brooke (2011, p. 12), convenience does not always mean the best choice in relation to privacy of communications and online actions. Mega size corporations in the internet follow every detail of internet users in the pretext of targeted advertizing and personalization. The corporations seek information just like radio, television, and newspaper to deliver demographics to advertisers. The private practices established are not effective to protect users in the past and will not have any effect in the age of cloud computing and Web 3.0 technologies. Failure to advocate for extensive and private policies the future will have ubiquitous advertising and behavioral profiling to fuel ever-expanding data mining. The Federal Trade Commission develops different principles of privacy in relation to computing technology that include (1) businesses to provide notice of information collected from consumers and how to use it. (2) Consumers should have a choice concerning the use of information collected. (3) Consumers should have the capability of accessing data collected. (4) Businesses should take reasonable steps to ensure security of information collected from consumers. Bush administration enforced compliance with Fair Information Practices other than harm-based approach where firms face fines or regulation to specific and tangible privacy harms. In the harm-based approach, FTC focuses less on the routine data collection while focusing more on spyware, financial theft, and identity theft. Face Book company shares personal identifying information with no prior notification to users. On one day, a user has control profile and directory information on another day all information of a user appears in public domain. The company structures its private choices where a user can change the private settings. Behavioral profiling is prone to occur as the firm records and collects everything that users do online. Government Web Surveillance It is possible for Homeland Security or any other law enforcement to read, collect, view, or listens to users’ online communication without a warrant. In that perspective, internet serves as panoptical other than ensuring internet freedom as depicted in the formal years of internet. Web surveillance has potential constraints in the knowledge that government agencies can collect researchers’ information for evaluation. According to Zureik (2005, p.21), a panopticon is a device viewing the peripheral ring without the knowledge of the central tower or user detecting it. A political regime may declare it illegal to express certain views or teach some topics. For instance, Tennessee State Senate prohibited the discussion of LGBTQ and same sex relationships in public schools. While the bill does not address digital technologies, it is possible for the government agencies to scrutinize the violation of the policy using states internet communication. Unless efforts are made to succeed, the restrictions that hinder rights of free speech Web surveillance will have more problems in future. Americas Fourth Amendment as prescribed in the Constitution is that all information has the protection from warrantless searches. The email messages contained in the remote server do not require warrant to search and seize. In summary, some of the ways of challenging data mining, Web surveillance, and net neutrality includes education and promoting advocacy. Researchers can investigate the current structure of the internet from different organizations such as Open Net Initiative. Internet users will benefit from recent policies that influence on the use of Web. Concerning privacy, online one can change the computer internet settings such as blocking cookies and turning off location services. Users can also opt out personalized advertising on site by site or on the company basis. Student and educators need to have technological literacy; interfaces of language developers to enable them resist technological regularization. Bibliography Brooke, H. (2010). The silent state: Secrets, surveillance and the myth of British democracy. London: William Heinemann. Brooke, H. (2011). The revolution will be digitised: Dispatches from the information war. London: William Heinemann. Lyon, D. (2009). Theorizing surveillance: The panopticon and beyond (Repr. ed.). Cullompton, Devon: Willan Publishing. Oudshoorn, N. (2005). How users matter the co-construction of users and technology. Cambridge, Mass.: MIT Press. Parker, J. (2000). Total surveillance: Investigating the Big Brother world of e-spies, eavesdroppers and CCTV. London: Piatkus. Phillips, S. (2010). Exposed: Voyeurism, surveillance, and the camera. London: Tate Pub. in association with the San Francisco Museum of Modern Art. Woodward, K. (1980). The Myths of information: Technology and postindustrial culture. Madison, WI: Coda Press. Zureik, E. (2005). Global surveillance and policing: Borders, security, identity. Cullompton: Willan. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Surveillance Technologies Essay Example | Topics and Well Written Essays - 1500 words - 1”, n.d.)
Surveillance Technologies Essay Example | Topics and Well Written Essays - 1500 words - 1. Retrieved from https://studentshare.org/sociology/1670883-please-follow-the-instruction-in-the-order-instruction-box
(Surveillance Technologies Essay Example | Topics and Well Written Essays - 1500 Words - 1)
Surveillance Technologies Essay Example | Topics and Well Written Essays - 1500 Words - 1. https://studentshare.org/sociology/1670883-please-follow-the-instruction-in-the-order-instruction-box.
“Surveillance Technologies Essay Example | Topics and Well Written Essays - 1500 Words - 1”, n.d. https://studentshare.org/sociology/1670883-please-follow-the-instruction-in-the-order-instruction-box.
  • Cited: 0 times

CHECK THESE SAMPLES OF Surveillance Technologies

Image Recognition and Surveillance

There are many types of surveillance and imaging technologies existent in the world.... Hope of fighting these groups is through having prior knowledge of Ever since the September 11th bombing of the United States, several surveillance units were created to help in fighting terrorism both internally and externally.... It has come to our knowledge that various surveillance systems have been installed in the country's entry and exit points to help in monitoring and identifying such suspects (Winston, 2013)....
4 Pages (1000 words) Term Paper

Case Study of a Biomatric surveillance technology on primary school children

Rather, schools must critically engage learners on the various Surveillance Technologies available in the bigger world, the rationale behind them and their implications.... In the future, however, they are This paper holds that schools must prepare learners for the emergent “surveillance society”.... Besides biometric surveillance, schools are using other forms of surveillance, notably CCTV surveillance.... The theory underpinning the effectiveness of public surveillance systems, including biometrics and CCTV, is that if potential offenders know that they are being monitored, they will keep off committing an offence or a crime(Webster , 1995)....
5 Pages (1250 words) Essay

Criminal Justice

Q4: The Use of Technology in Curbing Crime Criminal justice systems use modern electronic tracking and Surveillance Technologies to control the occurrence of crimes.... The use of such technologies helps the police and other units related to criminal justice to watch over the occurrence of crimes.... Such measures could involve the use of camera technologies, alarm systems and other computer technologies in improving the security of places....
2 Pages (500 words) Assignment

Surveillance's Influence on the Society

The essay "surveillance's Influence on the Society" seeks to highlight the benefits and risks of surveillance in the UK society, with emphasis on technology and society.... hellip; Another important feature is the concept of surveillance is the vital role of technology in advancing surveillance techniques....  Current technology allows the adoption of surveillance techniques in a non-defiant manner, as it is possible to replace surveillance codes with norms and rules....
7 Pages (1750 words) Essay

Surveillance Technology and Security Issues

he need for security and safety thus has led to the development of a number of Surveillance Technologies.... The paper "surveillance Technology and Security Issues" describes that the use of spy cam has made it easier for many parents to monitor the movements and actions of their children.... 45-178) notes that surveillance is a key aspect of crime management, which entails prevention, detection, control, categorization and correction of criminals and errant....
8 Pages (2000 words) Coursework

Effectiveness of Security Technology in Reducing Security Threats

Several technologies in form of software systems have been generated to solve this security threat.... Various scholars have various schools of thoughts and perspectives regarding security threats, the technologies used to address the threats, their effectiveness or failure and whether these technologies respond to the dynamic times and circumstances brought about by the constantly changing field of the information and communication technology....
10 Pages (2500 words) Research Paper

Big Brother: State Surveillance in the 21st Century

From the work "Big Brother: State surveillance in the 21st Century," it is clear that unregulated state surveillance remains a real threat to public trust, civil liberties, and the key processes of a democratic environment.... The author outlines the purposes of protecting civil liberties, surveillance decisions.... It is these advancements in technology that have increased opportunities for state surveillance, as well as other interventions into the private communications between citizens....
6 Pages (1500 words) Essay

Integration of Surveillance Technology into Strategies of State Control by Public Order in the UK

ver the years, there has been enough evidence that most state control agencies rely on mass Surveillance Technologies to facilitate control of citizen's behavior.... This is because the government has a variety of technologies to use in tracking the movement of its citizens.... The essay "Integration of surveillance Technology into Strategies of State Control by Public Order in the UK" focuses on surveillance as an observation from a distance used for transmitting the information to a particular common point....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us