Title : Evaluating the Impact of Surveillance engine room : How Do down Maximize Its Benefits While Protecting their hidingBackground and ObjectivesTechnology has changed the way spate and organizations header on and process instruction . Despite the benefits of using privacy-infringing control applied science that allows government agents or law enforcement officers , nonpublic and public institutions , to invite access to information or existing events , fight terrorism , separate criminals or maintain protective covering , surveillance technologies is recognize to have a negative persuade to on pack s privacy which tends to be subtle and incremental in the slight term , but dramatic and important in the dour run (Simmons 2007 . Surveillance applied science tricks , stigmatizes , troubles , and represses , we akens participation s moral (Clarke , 1988 Sloan , 2001 Theodore Martin Hollon , 2006 . To identify the specific impact of surveillance technology , empirical selective information provide be obtainedIn habitual , the proposed study aims to evaluate the impact of surveillance technology on society . Specific questions will be addressedWhat is surveillance technologyWhat atomic number 18 the advantages and disadvantages of surveillance technology on societyHow could we maximize the benefits of surveillance technology ? When and where should this technology be usedWhat interventions or safety measures can be done to protect people s privacyMethodologyThis study employs descriptive look design in canvas related problem , issues , and solutions . It involves qualitative and quantitative analyses of selective information . specifically , retrospect methods will be used to obtain information from literature or data from the inquiry sample . These are literature-survey type throug h desk research and direct-data type through! survey questionnaires and interviewsReferencesSimmons , R (2007 ) Why 2007 Is not like 1984 : A Broader scene on Technology s performance on Privacy and after part Amendment Jurisprudence daybook of Criminal legality and Criminology 97 (2 , 531Garza , Katie (2002 ) coach Security Moves into the digital Age . T H E daybook 30 (5 , 44Theodore , N , Martin , N Hollon , R (2006 ) Securing the metropolis Emerging Markets in the Private Provision of Security serve in lucre . Social Justice 33 (3 , 85Sloan , L .
D (2001 ) Echelon and the lawful Restraints on Signals Intelligence : A sine qua non for Reevaluation . Duke Law Journal 50 (5 , 1467Clarke , R (1988 ) Information Technology a nd Dataveillance , 31 COMM . ACM 498 (May 1988 . In A . Michael Froomkin (2000 )The Death of Privacy Stanford Law Review 52 (5 , 1461List of resourcesBooksLoving Big Brother : Performance , Privacy , and Surveillance dummy Contributors : John E . Mcgrath - indite . publisher : Routledge . Place of subject : New York . Publication twelvemonth : 2004Selling AWACS to Saudi Arabia : The Reagan Administration and the equilibrise of America s Competing Interests in the Middle eastern hemisphere Contributors : Nicholas Laham - author . paper : Praeger . Place of Publication : Westport , CT . Publication stratum : 2002Futurenatural : Nature , Science , Culture . Contributors : George Robertson - editor program in header , Melinda beat out - editor , Lisa Tickner - editor , Jon Bird - editor , Barry Curtis - editor , Tim Putnam - editor . Publisher Routledge . Place of Publication : capital of the United Kingdom . Publication Year : 1996Democratic Governance and New Technology : technologically Mediated Innovations in Political P! ractice in westerly Europe . Contributors : Jens Hoff - editor , Ivan Horrocks - editor , Pieter Tops - editor . Publisher Routledge . Place of Publication...If you destiny to get a full essay, ordering it on our website: OrderEssay.net
If you want to get a full information about our service, visit our page: write my essay
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.