Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Term Paper:
Studies done by the United States Defense Department have discovered the technology to be correct only fifty-four percent of the time. Furthermore, the study found that the systems could easily be compromised by alterations in weight, hair color, sunglasses, and even weather and lighting alterations (McCullagh & Zarate, 2002). Additionally, behavioral recognition software can often incorrectly identify movements, such as tree branches, and follow those objects instead of actual suspicious movement occurring at the same time (Surveillance-Source, 2005).
Even in spite of these weaknesses, there are numerous opportunities for growth in this particular industry. As companies such as "Spying Eye Surveillance" has noted, the highest area of growth is that of digital video surveillance. According to estimates, this particular area of the industry is set to grow at a 55% compound annual growth rate between 2003 and 2007. In terms on monetary growth opportunity, this field is estimated to grow to over 7.4 billion dollars, globally, due to heightened awareness in security, the overall return on investment in digital surveillance, and new IP solutions. In particular, this niche dominates in North and South America, where digital surveillance software and technology makes up almost 55% of the market share (DataMonitor, 2004).
Within this digital niche, perhaps the area with the most opportunity for growth is the retail industry, simply because of the sheer number of retail outlets in need of surveillance (DataMonitor, 2004). "Spying Eye Surveillance" alone notes over 1000 installed and operating surveillance systems they are responsible for in southern California. Considering this company is a very individualized service, with careful consideration of the intent of management and specialized setups, this speaks volumes for the need in this field. While this type of company specializes in personal development, others simply sell the hardware and software, allowing individual business owners to install and control the surveillance equipment themselves.
However, in spite of the growth and potential in this industry, there are certainly ramifications and threats from technological and legal standpoints. From a legal standpoint, the most often cited issue deals with the Fourth Amendment right to privacy. Hundreds of cases have come before local, state, and federal courts regarding this issue and all sides appear to have very different ideas of what constitutes a violation of privacy, in relation to video surveillance. For example, in cases of workplace surveillance, most courts hold to the concept that employees in a place of business should hold no expectation of privacy, since their employers have a vested and rightful interest in any activity occurring in the public work area. Video surveillance of public parks and streets has again often found support in the courts, since these are areas of public places, and generally do not fall under reasonable expectations of privacy (Hatcher, 2001).
However, in other cases, the issues are not as clear. For example, in the Virginia Court of Appeals in 1999, a man's conviction for using a spy camera to videotape underneath women's dresses on a public fairground was overturned, with the note that no expectation of privacy should have been held by the women. In this case, the local court's belief that this type of surveillance violated the Fourth Amendment obviously did not agree with the opinions of the State court (Hatcher, 2001). Additional cases have been noted both in favor of and against the placement of video surveillance in such places as fitting rooms and school locker rooms.
Another legal issue relating to this growing industry is the lack of current regulations regarding limits to the use of hidden cameras and video surveillance in general. Currently, very few federal or state regulations cover such issues, and often, when Bills are presented which would deal with these ramifications, they are postponed due to opponents, such as labor unions or conversely, business communities. While most agree that legislation should exist regarding the notification of individuals that cameras are present, such legislation would be difficult, and costly, to enforce.
Additional concerns exist surrounding the use of video surveillance technology in governmental agencies. Often these agencies are seen as unregulated, and as such, have many opportunities to abuse the quickly advancing technologies available in this industry. Current technologies would allow for remote video surveillance from orbital satellites, for example, which would be difficult for the pubic in general to monitor. Further, many industry analysts note that video surveillance technologies which would allow cameras to "see" through clothing and listen in on conversations within private homes up to 60 feet away are not far off (Pompano, 2000). As these technologies increase, the chances for abuse also increase.
There can be no question that the field of video surveillance technology is one of the most important and rapidly advancing industries in today's society. The benefits of such products, such as crime solving, protection, determent, and loss prevention are clear and vital in today's business world. New technologies such as facial recognition and behavioral perception could easily enhance these already existing positive aspects of video surveillance. At the same time, however, the possibilities for abuse are equally clear. While Orwell's novel 1984 was, at the time, a vision into the future that was unlikely, the idea that government entities, public citizens, or businesses can use video surveillance at their leisure and often while still within the boundaries of the law is a frightening reality.
With proper legislation, video surveillance really can improve the safety and health of almost any community. As with any technology, however, careful consideration must be placed on both the positive and negative outcomes of the decision to implement such strategies. As companies such as "Spying Eye Surveillance," increase, and as technological abilities increase, these issues will rise to the forefront of today's business, governmental, and legal societies, and will undoubtedly alter the course of the future for many generations to come.
Davies, S. (1996). Big brother: Britain's web of surveillance and the new technological order. London, England: Pan Books.
Hatcher, C. (2001). Silent video surveillance in the absence of probable cause - A brief legal checklist. Southern California Interdisciplinary Law Journal, 29, 9-25.
Marx, G. (1995). Electric eye in the sky: Some reflections of the new surveillance and popular culture. In J. Ferrell and R. Sanders (Ed.), Cultural criminology. Boston, MA: North Eastern University Press.
McCullagh, D. & Zarate, R. (2002, Feb. 16). Scanning tech a blurry picture. Wired News. Retrieved October 26, 2005 from Wired. Web site: http://www.wired.com/news/print/0,1294,50470,00.html.
Norris, C., & Armstrong, G. (1999). The maximum surveillance society: The rise of CCTV. New York, NY: Berg.
Pompano, A. (2000). Privacy in the age of video surveillance: This is not your father's candid camera. Retrieved October 26, 2005 from Yale-New Haven Teacher's Institute. Web site: http://www.yale.edu/ynhti/curriculum/units/2000/3/00.03.05.x.html#g.
Privacy International. (2003). Privacy and human rights 2003: Threats to privacy. Washington, D.C.: Electronic Privacy Information Center.
Shandle, J. (2005, Feb 10). Digital video surveillance integrates many technologies. TechOnline. Retrieved Oct 26, 2005 from TechOnline. Website: http://developonline.com/community/tech_group/comm/feature_article/37613.
Siegel, N. (1998). NYC surveillance camera project. Retrieved October 26, 2005 from NYC Surveillance Camera Project website. Web site: http://www.mediaeater.com/cameras/.
Spying Eye Surveillance, Inc. (2005). Home Page. Retrieved October 26, 2005 from Spying Eye Surveillance, Inc. Web site: http://www.spyingeyeinc.com.
Surveillance Source. (2005). Video surveillance software. Retrieved October 26, 2005 from Surveillance-Source. Web site:…[continue]
"Video Surveillance In Today's Highly" (2005, October 28) Retrieved December 3, 2016, from http://www.paperdue.com/essay/video-surveillance-in-today-highly-70087
"Video Surveillance In Today's Highly" 28 October 2005. Web.3 December. 2016. <http://www.paperdue.com/essay/video-surveillance-in-today-highly-70087>
"Video Surveillance In Today's Highly", 28 October 2005, Accessed.3 December. 2016, http://www.paperdue.com/essay/video-surveillance-in-today-highly-70087
In this article, the author describes the technological, demographic, and market forces shaping this new digital media culture and the rich array of Web sites being created for children and teens. Many nonprofit organizations, museums, educational institutions, and government agencies are playing a significant role in developing online content for children, offering them opportunities to explore the world, form communities with other children, and create their own works of
According to Brech, these trends do not leave much time -- or money -- available for dining at full-service restaurants. In this study, the respondents "reported their families ate at cafeterias, family or chain restaurants, or fine dining restaurants only once or less each week" (Brech 1998: 21). This is not to say, though, that the number of full-service restaurants in countries such as the United States has declined
For the former, the cellular provider (as mandated by a court order) forwards information from the site of the phone to law enforcement authorities, allowing these authorities to fixate the location of a subject and to proceed accordingly. For the latter, an audio device consisting of a transmitter, antennae and power source is attached to a person to relay interactive surveillance in a manner which is highly covert. No
The need to save face does not bring people to the bargaining table, the need to resolve a dispute or issue does (Fisher and Ury, 1991). Positional bargaining does have advocates. In the case where the parties interests may interfere with their resolving the issues, positional bargaining may be preferred. Issues are deemed to be universal and party specific. Interests are party specific and will vary from case to case.
They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and
Women Objectification Women's Objectification in Society Women's Objectification in Society It is crucial to notice the language we use when we talk about bodies. We speak as if there was one collective perfect body, a singular entity that we're all after. The trouble is, I think we are after that one body. We grew up with the impression that underneath all this normal flesh, buried deep in the excessive recesses of our healthy
The federal workforce, U.S. federal government agency workforces are based on equal opportunity and promotions are on merit principles. (Starks, 2009) Thus we have Asians and Pacific Islanders well-represented in private sector professional positions (8.9%) and in government positions (4.8%) considering they made up 3.7% of the general population." (Starks, 2009) Another issue you are going to face is the gender issues. In the U.S. too it was an issue