This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Technology-based surveillance

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Technology-based surveillance

 

15

 

 

 

 

 

 

 

Technology-based surveillance

Student Name

University Name

 

Abstract

This report is about key factors support or underpins the proliferation or propagation of CCTV surveillance systems. Effective deployment of surveillance systems such as CCTV systems within public spaces for example workplaces and schools are also discussed in this report. Technological-based techniques for monitoring and responding to public spaces behavioural issues; usage of body camera; the key aspects of smart or intelligent video systems are also highlighted in this report.

 

Contents

Abstract 2

Introduction 4

Discussion 5

Key factors underpin proliferation of the CCTV systems 5

The effectiveness of CCTV systems deployed in a wide range of public places 7

Technology-based methods or techniques planned to monitor & react to behavioural issues at public spaces 9

Utilization of Body cameras 10

Smart video system key facets 11

Summary 12

References 14

 

 

 

Introduction

Technology-based monitoring technology monitors behaviour, activity, or other changes to influence, manage, direct, or protect people. This may include viewing or intercepting electronic transmission of information over long distances through electronic CCTV cameras, for instance, phone calls and Internet traffic. It can furthermore include simple as well as relatively low-technical methods, for example, artificial intelligence proxies and postal interceptions. Technology-based surveillance is utilized by the government agencies and law enforcement associations to collect intelligence information to prevent crime, protect programs, people, groups or objects, or to investigate crime or offense. It is moreover used by several criminal organizations and associations to plan as well as to carry out criminal activities for instance kidnapping and robbery. Enterprises collect information and conduct investigations by private investigators or examiners. Intense reasons exist to screen representative online conduct at work. These reasons are convincing for some businesses and justifiable as associations are watched. Contingent on the innovation and techniques utilized, observing applications may track all movement or may target particular exercises of workers on an organization claimed PC or terminal. They may screen different gadgets introduced on the PC, for example, web cameras and in addition amplifiers. This incorporates accounts from these gadgets as well as remote telecom of live sustain from webcams. Technology-based oversight can be completely understood as an infringement of privacy and security, therefore, frequently opposed by several civil libertarian groups as well as activists. Moderate democracy has laws that limit the use of private supervision, domestic administration and usually limit it to situations that endanger public safety. Authoritarian governments seldom have domestic restrictions along with international espionage activities are ubiquitous in different countries. On the other hand, today businesses are working electronically because for every organization, Internet access has now become a necessity for business organizations. The Internet, email, social networks, websites, wikis, forums, blogs, moreover instant messages are the basic tools people use to collaborate, communicate, and conduct research. However, these resources can be misused and distorted for both private as well as illegal activities.

Discussion

Key factors underpin proliferation of the CCTV systems

Key factors for example actors, social, economic, policy initiatives & responses, as well as technological developments are some major factors affecting proliferation of the CCTV systems. The proliferation of CCTV systems are the new possibilities of storing and analysing personal spending activities have led to increasing of direct as well as targeted marketing campaigns and the premature forms of mass social categorization. Computerization has also created several opportunities for electronic monitoring of public places such as monitoring of individual workers at workplace, schools, shopping malls, airports etc. With the popularization of the Internet in the 21st century, it is understandable that surveillance is an inherent phenomenon in daily life. Technology-based surveillance, as well as data collection, is no longer confined to specific locations, but countless forms of viewing, recording, and analysis (Xu, 2013). The political and economic background turned to consumerism and the financial significance of individual data was obviously enhanced. In a globally connected and highly connected information and knowledge society, new trust labels are constantly needed and organizations must constantly identify moreover assess risks, in addition, to seek to evade or minimize these risks, so ICTs are a means of coordination and exchange. Network-generated data, GSM, GPS, Wi-Fi-based locations identification biometric and communication monitoring play an essential role in information gathering, social classification and data mining. With the propagation or proliferation of CCTV systems in the workplace and in schools, institutions and in other public places, there has been some literature on workplace surveillance. Despite the fact that reconnaissance cameras change enormously in their specialized design and utilize, it is, for the most part, acknowledged that these frameworks have quickly picked up prevalence since the 1990s. Presently reconnaissance cameras have turned into a typical element of current society, solidly implanted in the cognizance of contemporary individuals. At the arrangement level, reconnaissance camera frameworks are likewise a vital strategy territory and are incorporated into national or group security methodologies. Regarding working frameworks out in the open spots, we can discover CCTV in parks, schools, in urban areas and towns, parking garages, transports and prepare stations, airplane terminals, and ports, exhibition halls, libraries, sports focus and stadiums, Hospitals and neighbourhoods (Kweon and Lee, 2016). Reconnaissance cameras can likewise be found on airports and taxis, lifts, gatherings and different private and open division representatives, for example, cops and motion controllers. There are additionally private places, for example, shops, service stations, shopping canters, banks, eateries, office structures and encased private groups where general society can without much of a stretch access and film cameras. Prominent highlights of the observation camera upset lay in camera speed, as well as in different spots utilized by cameras. The United Kingdom is regularly viewed as the cutting edge of observation camera transformations, and the far-reaching scattering of CCTV systems in broad daylight English areas has been imitated far and wide. It is, for the most part, acknowledged that in the year 1990, Britain encountered the biggest development and expansion of open space CCTV frameworks for various reasons (Trottier, 2013). Reconnaissance can be viewed as a type of correspondence to make up for the developing requirement for “trust orders” because of the decreasing physical nearness and the capacity to compose day to day lives remotely. Because of the multiplication of new advances, eye to eye trades have been supplemented with types of correspondence that don’t require human hands-on understanding.

The effectiveness of CCTV systems deployed in a wide range of public places

CCTV cameras are introduced in several law enforcement organizations around the globe with the objective of decreasing wrongdoing and expanding open security. In an undeniably indeterminate world, one of the most recent ten years has seen no indication of destabilization in the multiplication of CCTV frameworks in the training segment. Schools are progressively defied with an assortment of issues or problems, including instructor benchmarks, offices, and framework, class estimate, burglary, property harm, school harassing, more interesting collaborations, and late psychological oppression. Accordingly, school managers are swinging to IP computerized advancements, for example, CCTV to assist distinguish and manage the developing dangers. It is never again an issue of whether we ought to introduce CCTV, yet the amount we can introduce. CCTV scope in school from little six-camera frameworks to recording doors and ways out, up to eighty camera frameworks cover open zones, passageways, play areas, lockers, bike sanctuaries, stopping and administration workplaces(Gupta, 2012). Australian schools are not subject to the risk frequently found in the news, primarily outside the US. Almost 340 understudies and staff individuals from U.S. schools have kicked the bucket since 2004. Guilty parties’ insights demonstrate that they are youngsters denied of their rights, damaged, harassed, scholarly difficulties, presentation to rough recordings and diversions. In spite of the fact that schoolsdo not have a firearm culture risk, other potential culprits, for example, non-custodial guardians, represent a huge danger to the school condition, as are threats to particular social and religious schools. While outside dangers to schools by cheats, saboteurs and weapons-conveying hoodlums are frequently of worry to police and the media, internal dangers. There are several honest to goodness business reasons, managers utilize CCTV to screen their workers, and supervision is legitimate (Mishara, Bardon and Dupont, 2016).

When utilizing CCTV, three key ranges of law should be watched. First of all, the Employment Law stipulates that businesses must not act in ways that undermine or debilitate the common trust and trust amongst managers and workers. On the off chance that they do, workers may request useful expulsion, and their bosses have accomplished something that is on a very basic level conflicting with the common trust and assume that representatives have the privilege to leave as unfair rejection and pay. Second, information insurance laws and standards set out, how managers gather and process “individual information” about workers, including recordings recorded by utilizing CCTV cameras. Specifically, these laws and standards give workers rights to be educated of what information is on them and why they are gathered and handled through the arrangement of “subject access demands” to managers (Gerell, 2016). To what extent this information can be spared and furthermore restricted. In conclusion, bosses, mainly in the general population division, ought to guarantee that their CCTV observation is proportionate, not excessively obtrusive and that they should regard their security under human rights law. Staff ought to be given the chance to examine these issues and remark. After counsel, the methods and practices of managers ought to be incorporated into the strategy records of CCTV, acquainted and proceeded with workers and gave to them. Lead affect evaluations to decide the advantages and disadvantages of CCTV observation contrasted and elective methodologies that accomplish similar targets, including the government and documentation required, specifically, for representative solicitations for subject visits (Tromp, Hekkert and Verbeek, 2011). This ought to incorporate surveying the real area of the camera, for example, observing a shop or an open-design office camera more averse to disregard protection rights than a shut circuit TV in the restroom and continually checking the camera range of one or a couple of representatives pretty much than the individuals who screen the region of all workers will probably be viewed as intrusive.

Technology-based methods or techniques planned to monitor & react to behavioural issues at public spaces

IoT has been completely changing the pattern of private and government sector’s monitoring or inspection. Internet of Things technology is a cheaper as well as more efficient technology for monitoring and inspection of public space. Moreover, there have been reports of an increase in the use of technical tools, such as audio cameras, video cameras and microphones that are readily available to law authorities in addition to the use of satellite technology to track personal mobile phones (HARGREAVES HEAP, 2017). These actions are detrimental to some people because residents are not well-versed of these activities. Some people think this is a violation of human rights and freedom and people should have their own privacy. In addition, these monitoring data may be abused by authorities as the data may be sold to the other party for commercial and political purposes. Then again, the presence of CCTV in public places and the satellite tracking of the mobile phones, if properly used, have many benefits to humans. With these video surveillance activities, police departments can be helped to prevent and investigate criminal activity (Stone, 2017). And then use advanced satellite tracking technology, can help authorities to track down the suspects, the signal search by cell phone, the existence of suspects. Facts have proved that by using these advanced technologies, the number of offenses and crimes in several nations has been reduced. In short, the government usually uses advanced technologies such as cameras and cell phone tracking systems to monitor residents’ activities. Under normal circumstances, these monitoring or inspection actions are not educated as well as socialized by public. Some people think that this is a violation of the privacy policy (Anile and Devillard, 2015). If the authorities correctly use these activities, these activities are more positive than negative activities. LPR technology is a technology that reads license plates automatically and quickly, providing real-time information for example vehicle owners’ registration information. Prior to LPR, law enforcement officers must call the middle number with the license plate fine points to obtain the required information. Parabolic microphone technology is a best technology that lets people hear far-reaching conversations, even through the windows of buildings. To ensure that the microphone technology is pointing in the correct direction, the laser gadget is usually part of a microphone. Microphone technology is easily operated by single person as it is portable and small like a laptop. The cell shows the outline of the person on the grid but does not display the video to help to determine the exact location of persons behind crimes (Wu., 2014).

Utilization of Body cameras

A body camera and a body-worn camera, or wearable cameras are wearable audio, photographic recording or video systems. Body cameras have a wide range of uses as well as designs, two of which are well known or famous in uses are Policing Equipment and Google Glasses. Other uses comprise action body cameras for socializing and entertaining, including biking, commercial, healthcare plus medical use, such as memory prostheses that affect memory, military use, news, civic surveillance and clandestine surveillance (M.Abduljalil, 2014). Emerging research on law enforcement implications of cameras shows the different evidence that body cameras have an impact on the usage of power or force by some law enforcement agencies and communities. The technology raises privacy concerns, such as Policing and Google Glasses. While such devices may be beneficial in some circumstances, the arrival of outsized-scale information or data collection problems, coupled with a facial identification and other techniques that allow for the bulk interpretation of the video, means that using this camera may create a way to track the majority of the people, anytime as well as, at any place (Ma, 2012). In the area of policing, every officer using this new or advance technology, can become a travelling-surveillance camera. Additionally, body camera is a facial identification or recognition technology which will have a massive impact on several people especially with fugitives wanted criminals and terrorists. Like any other new technology, this new or modernized technology “body cameras” also become a new trend or mode to detect criminals and criminal activities by law enforcement associations and organizations. Although cameras and technology-based surveillance systems are used froma long time, the popularity of cameras is getting higher and higher as several high-profile cases push the new technology to a forefront. As law enforcement agencies continue to pilot projects to assess the utility of the project, they have to decide whether the benefits they receive meet the costs and costs of implementing the project (Weber, 2012). From a public point of view, using a body camera represents accountability moreover transparency. As institutions implement or execute body cameras, officials will become more and more aware about their behaviour and interaction with the public and will unlikely to cross the bottom line between the uses of force to arrest suspects and criminals.

Smart video system key facets

In the last decade, CCTV activities in several countries have been bursting out, drawing great interest in the computer vision algorithms that automatically monitor the scene (Neyroud, 2014). Intelligent video surveillance systems or also known as smart video systems perform application-exact image processing as well as generate important application-related information and data from a video sequence. Intelligent Video Surveillance Systems captured high-definition videos of interesting moving objects and these high-definition videos are useful for forensic investigation and examination. The earliest smart video systems involved steady monitoring, as there was not even a single way to store and record information. The growth and development of roll-to-roll media enable the recording of video surveillance systems. These systems require a manual tape change, and this is very time-consuming, unreliable as well as the expensive process (Johnson and Hansen, 2016). However, in the past 18 months, with the introduction of 4K smart video surveillance systems, a new trend of video surveillance take hype in technology-based surveillance systems market.

Summary

Law enforcement and government agencies use surveillance when they want to gather information about the crime, detect and prevent crime, as well as investigate crimes or offenses that have occurred. Surveillance is defined as a close observation of individuals or groups. The satellite is used to capture the image of the area of interest. Law enforcement corporations use pictures to compare for a period of time. This study concludes that with satellites, cameras were used to record areas of their interest. Many roads, intersections, and traffic lights have cameras. The UK is active backers, with an estimated 2.0 million CCTV cameras in 2016 and a growing number of cameras for every 32 British residents. It is reported that Chicago has at least 15,000 CCTV cameras installed in the United States, prompting civil liberties groups to express their strong concerns, and in New York, cameras are increasingly appearing in public transport and commercial areas, and even in high-end residential areas. It has also been concluded that CCTV cameras may also produce unexpected results, good and bad. “Halo effect” refers to the potential for greater safety outside the camera’s field of vision; this can be offset by “push effects” that promote antisocial activity to other parts of the city. Cameras may also increase the false sense of security, lead citizens to take less precautionary measures, or may lead to more criminal coverage, resulting in increased crime. This study summarizes that law enforcement associations use high tech video cameras and other technology-based systems for complete surveillance of these areas. Legal associations can document on-going activities and can utilize records in surveys. Over the past few years, interest in the technology-based surveillance applications has been growing because of the increasing accessibility of inexpensive visual sensors such as infrared cameras, optical as well as processors. For example, after the September 11, 2001, incident in the US, citizens of US demanded more safety moreover security. As algorithms and technologies become more sophisticated, these facts make it possible to use technology-based surveillance systems such as CCTV’s in a variety of applications for example security, automotive and transportation. Monitoring of remote, as well as often unattended environments such as metro lines plus railroad platforms, freeways, airports waiting rooms, public areas and taxiways, is a very complex issue that means using multiple sensors in cooperation. The monitoring system has provided a very high level of assistance or support to the operators and has evolved with advances in technology as well as sensors. There are several sensors available for highly developed surveillance or inspection systems and they vary from tactile and pressure sensors for example boundary monitoring to chemical sensors and chemical sensors are used for factory surveillance or also to counter-terrorism activities with the help of audio along with vision sensors. Technology-based surveillance systems are highly reliable for most organizations and associations to enhance their surveillance and monitoring capabilities as it is essential for them to make a suitable decision and these new technologies also help organizations to maintain their security and privacy as well as also take care of the security of individuals associated with them.

 

 

References

Anile, S. and Devillard, S. (2015). Study design and body mass influence RAIs from camera trap studies: evidence from the Felidae. Animal Conservation, 19(1), pp.35-45.

Gerell, M. (2016). Hot Spot Policing With Actively Monitored CCTV Cameras. International Criminal Justice Review, 26(2), pp.187-201.

Gupta, P. (2012). Computing Installation Parameters Of CCTV Cameras for Traffic Surveillance. International Journal of Computer Science and Information Technology, 4(6), pp.105-124.

HARGREAVES HEAP, S. (2017). Behavioural public policy: the constitutional approach. Behavioural Public Policy, 1(02), pp.252-265.

Johnson, T. and Hansen, J. (2016). Law enforcement agencies’ participation in the military surplus equipment program. Policing: An International Journal of Police Strategies & Management, 39(4), pp.791-806.

Kweon, J. and Lee, K. (2016). Proposed Placement Model for Public CCTV Systems in Student Safety Zones Considering Surveillance Probability on Pedestrian Streets. Journal of Asian Architecture and Building Engineering, 15(2), pp.231-238.

M.Abduljalil, F. (2014). Video Capture Service in the Intelligent Transportation System based on Cloud Computing. International Journal of Computer Applications, 97(5), pp.35-41.

Ma, Y. (2012). Research of Intelligent Video Surveillance System Based on the 3G Technology. Advanced Materials Research, 614-615, pp.1377-1380.

Mishara, B., Bardon, C. and Dupont, S. (2016). Can CCTV identify people in public transit stations who are at risk of attempting suicide? An analysis of CCTV video recordings of attempters and a comparative investigation. BMC Public Health, 16(1).

Neyroud, P. (2014). Policing ‘Facts’ and Policing Evidence: System 1 and System 2. Policing, 8(2), pp.93-95.

Stone, K. (2017). Smart Policing and the Use of Body Camera Technology: Unpacking South Africa’s Tenuous Commitment to Transparency. Policing: A Journal of Policy and Practice.

Tromp, N., Hekkert, P. and Verbeek, P. (2011). Design for Socially Responsible Behavior: A Classification of Influence Based on Intended User Experience. Design Issues, 27(3), pp.3-19.

Trottier, D. (2013). Crowdsourcing CCTV surveillance on the Internet. Information, Communication & Society, 17(5), pp.609-626.

Weber, K. (2012). Surveillance, Sousveillance, Equiveillance: Google Glasses. SSRN Electronic Journal.

Wu, H., Li, X., Yuan, Z. and Wang, J. (2014). Research on Key Techniques of Multi-Sensor Intelligent Video Surveillance System. Applied Mechanics and Materials, 599-601, pp.1040-1043.

Xu, Y. (2013). Forest Wireless Monitoring System of Internet of Things Based on Zigbee Technology. Information Technology Journal, 12(23), pp.7631-7635.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask