.

Friday, March 29, 2019

Surveillance And Dataveillance in governments

Surveillance And Dataveillance in goernmentsIntroductionIt has become very common suffice for the G everyplacenments to keep and determination public information for the betterment and quality of serve provided. Different information systems are in custom which involve selective information closely the people. For better use of public information, it is necessary to reliably cuss the data with specific persons. An effective and efficient denomination system should be established and maintained. Information technology has remarkably progressed in human realisation system. It is very easy to identify and proctor a person with the avail of modern IT cocks.They key ch in all in allenge for the supervising g all overnment is to develop acknowledgment and monitor program which should be practicable and economic to address the issues. These programs should start high integrity to solve the problems faced by the governments regarding human identification and monitoring. The special concern in this regard is the threat to personalised secrecy that the human identification and monitoring programs presents. If these programmers are introduced energetically, the reaction of social framework may be threatened. Surveillance and dataveillanceWhat is charge?Surveillance involves keeping eonian watch over souls or a premise, the purpose of this activity locoweedful be to spy, supervise or to control. It assists in collecting information about the individuals sustainment, contacts and activities (Clarke 1988, p.499).The main form of surveillance is cognise as physical surveillance which is ultimately watching and auditory modality. The current technologically advanced world assists greatly in surveillance, as it provides top monitoring devices much(prenominal) as unseeable binoculars, field glasses, light amplifiers satellite cameras, and sound amplification devices analogous guiding microphones to easily monitor from a greater distance and at every time of the day. at that place are in like manner roughly puff up-known ways much(prenominal) as communications surveillance which involves taping the phone or bugging a premise, which allows you to listen and be aware of the individuals whereabouts and their associates and intended plans (Clarke 1988, p.499).Surveillance these eld provide profound insight into ones life and by collecting data from other sources as well a complete history of past and present of that individual go off be created. This holds the holder of this information such as the government or an agency great control over the individual (Clarke 1988, p.499).What is dataveillance?Surveillance involves the monitoring of an individual through watching and listening utilise modern technology. Dataveillance on the hand is monitoring by accessing and rendition through personal and confidential data of an individual by using advanced information technology tools. This involves accessing their bank acc ount details, credit tantalize purchases, GPS on their cars and mobile, emails and internet browsing to get an insight into their personal lives. Dataveillance is the dissolver of evolution of technology, as we become more and more dependent on technology it is creating an opportunity for others to invade our loneliness and monitor our every move (Clarke 1988, p.499).Government agencies lots use dataveillance to prevent terrorist attacks and other heinous crimes. There are two types of dataveillance that are common personal and mass dataveillance (Clarke 1988, p.499). ain dataveillance its benefits and dangersPersonal dataveillance is the monitoring of a targeted individual for a particular reason. This privy involve monitoring by a government agency like the police or tax department to find evidence of crimes connected or where stolen money is hidden. This evidence jakes be and so(prenominal) be utilise in court to prosecute the individual. This form of dataveillance is v aluable to the authorities as it provides them with evidence and information that can non be easily obtained through manual investigation and interrogation techniques. (Clarke 1988).Dataveillance is used heavily in chasing fugitives, prosecuting criminals and tracking terrorists. A current example is how dataveillance was used to eliminate Al Qaida leader Osama put in Laden. While Osama Bin Laden was aware of dataveillance techniques and avoided all activities that wouldve led to him universe tracked, his associates used technology and were able to be tracked. That is how one of his couriers was tracked when he made phone calls on behalf of the Al Qaida leader. This led to his demise and highlights the brilliance of dataveillance in tackling terrorism. From identifying terrorist cells around the globe to using high tech drones to monitor Afghanistan for terrorist activities, it is a valuable ally to the government. It excessively helps local authorities carry down cyber predat ors and bullies as well as identity fraud. This was the case in America when a high earning Wall Street employee was caught for insider trading. Dataveillance not but is used by authorities but also by businesses and individuals. Businesses can track employees activities such as internet usage and time checks to figure employees are working efficiently. It can also be used in risk management to detect and prevent errors and fraud to better shelter their business. Individuals can also use dataveillance to a degree such as using GPS on a car to see where a family outgrowth has travelled and what websites the kids are browsing. It offers families a form of security and control.Businesses and individuals go away not all use the personal dataveillance in the reclaim manner. Personal dataveillance is also a originatorful weapon that can be used to win power over another entity. Confidential secrets can be exposed and be used to blackmail an individual. It can be used to stubble a particular person or locate fewone to terms physically. In the wrong hands it can becomes a great tool to continuously have access to the intended target and that perspective just is frightening (Clarke 1988).Since dataveillance is more in terms of monitoring data so the actual person, it provides room for wrong identification. If wrong identification isnt detected then an innocent person may be prosecuted or much worse if at that place were bad intentions for monitoring that individual. If there are errors in the personal dataveillance technique then it would lead to ill-informed decisions (Clarke 1988).Dataveillance can be used banishly by business in sure areas such as hiring employees. sometimes to better know the candidate, they can view social network sites such as Facebook to understand the candidate. This can lead to a false indicant of their character and can result in not being hired. Facebook is used by millions of people and it has access to each of their pers onal details and lives. If this database isnt protect someone can come in and access these valuable information and exploit them at will. (McIntosh et al). An example is that of Julian Asange who had used dataveillance techniques to monitor and recuperate high level government documents and made them public. Furthermore personal dataveillance of an individual without their consent is illegal. While the government agencies are excused as they bring about these monitoring techniques to ensure our safety. However for businesses and individuals if caught tracking an individual without their consent, it can be punished by law as it is a breach of ones silence. good deal dataveillance its benefits and dangers green goddess dataveillance is monitoring of a certain(a) large multitude in order to identify an individual who belongs to that certain group. It is controversial as it is a form of profiling based on race, gender and religion and all are targeted, even though there is no ind ecision to unloosen monitoring them. It involves identifying members of the entire population that belong to a specified group and then using techniques similar to that of personal dataveillance except all data trails despite them being not important are followed up in the hope it could lead to someone of interest. (Clarke 1988).The benefits of this form of surveillance is that it is most liable(predicate) that the person of interest will belong to that group hence monitoring just that group will be more efficient then looking through the entire population. It is used by authorities such as the government and police as well as some businesses. Mass dataveillance can be summed up as a spellbind hunt while personal dataveillance is more targeted to an individual and does not allude other people. Mass dataveillance leads to discrimination and false accusations. Businesses may target a certain group of their employees as they suspect they could be up to some wrongdoing. Individuals can be closely monitored simply for the fact they belong to certain group of people. This type of surveillance has been used heavily in certain eastern countries but now it is also seen in western countries as a result of increased terrorism. However this shows how ones concealing can be invaded if necessary by higher authorities even when they maybe innocent. sort of mass dataveillance is used to arise suspicion rather than monitor individuals of suspicion like personal dataveillance. (Clarke 1988).The first and far most threat of dataveillance is to the privacy and identity of individuals and as a society as a whole. Mass surveillance has been criticized on more grounds like violation of privacy rights, illegality and for prevention social and political isolateddom.Importance of silence retirement can be defined as a persons right to be leftfield alone and one of the most valued right by free people (Craig 2006). Privacy is peoples right to make their own decisions regarding private matters and it is peoples right to live their lives secluded from public inquiry (Craig 2006). Privacy is important for diverse perceptions. They are Philosophically This is the concept of human dignity and integrity, as well as the notions of individual autonomy and self-determination. This is the notion and importance of Human rights. psychologically The peoples fate for private space. Sociologically The peoples need to behave freely and to transmit with other people without having the threat of being observed. Economically The peoples need to plan without surveillance. Politically The peoples need to be free to act, think and argue without surveillance.(Clarke 2006) broadly speaking interpreted privacy is an individuals integrity and then includes every characteristics of an individuals social need (Clarke 2006). Using Maslows Hierarchy of Needs privacy can be illustrated in the following categories (Clarke 2006) Privacy of the person It is also known as bodily privacy. It is the integrity of a persons body and comes under the Physiological and Safety call for in Maslowian Hierarchy. It is broadly known as a persons freedom from badgering and his right to medical treatment. Privacy of personal behaviour It is also known as media privacy and comes under belonging and self-esteem needs in Maslowian Hierarchy. It relates to peoples personal lives and not to be observed. Privacy of personal communications It is also known as interception privacy and comes under belonging and self-esteem needs in Maslowian Hierarchy. It is an individuals right to communicate with other people without being observed. Privacy of personal data It is also known as data privacy and comes under belonging, self-esteem and self-actualization needs in Maslowian Hierarchy. It is an individuals right to control over his data even in the hands of a third party.(Clarke 2006) exclusively means of dataveillance deter the concept of privacy of individuals and soci ety as a whole. One cannot perform well if he is being watched all the time. bulk do not feel themselves safe as this watch over can be used in a negative way. Dataveillance can harm the privacy and identity of the individuals and the society in the following ways1. The main and direct threat of dataveillance is that no actual people are always observing our data. It is mostly computer systems that collect and link the applicable data. Also it is very likely that computer systems can make mistakes and give information that is incorrect. These mistakes are mostly overlooked as there are no people monitoring this data. This can create a point of other problems like identifying wrongly people into different categories according to his data collect. For example a person using his personal computer to seek on terrorism for a project can be categorize into a group of highly watched individuals. In this example the individual is wrong identified and will have problems trying to oppo se being brand as a terrorist.2. The next threat of dataveillance is the quality of the data. Currently there are no standards concerning the quality of the data that are collected in the dataveillance systems. People or companies that collect data normally use tuppeny and easy forms dataveillance technology to reduce their costs. This is due no standards on the technology used for dataveillance. The data collected by these cheap technologies are usually low quality data and therefore may contain many errors and could put an individual in unnecessary dangers. Also most individuals are unaware that their data is collected and therefore will not be able to oppose these facts.3. Another important threat is that the data collected on an individual can be misinterpreted and is more likely if all the relevant data is not thoroughly checked. People or a computer system is not going to do extensive query as to whether the data collected is correct in that circumstance and therefore will o nly show the immediate facts. These days online marketing technology instantaneously collects, enhance and aggregate the data. This creates lots of problems for consumer privacy.(Donahue, Whittemore, Heerman)ConclusionDataveillance has two sides on one side, it apparently offers speed, security, and safety on the other, it unnecessarily exposes individuals to potential threats for privacy. Privacy is a privilege that most people take for granted. It is simply thought of as a source of God given right that we, as human being, are entitled to, the right to have our own space, to be safe, and to be left alone. The increased use of dataveillance has been found very helpful on many occasions and no one regret the positive aspects of dataveillance. For example as mentioned above it was most probably dataveillance techniques that led to the sidesplitting of Osama Bin Laden which reflects the positive highlights of dataveillance. However the main concern for the use of dataveillance techn ology is that it has no standards or regulations. In addition, because of its perceived benefits, the worrisome aspects are usually overlooked. This perhaps sheds light on why resistance is often lacking or simply fails. It is important in the early stages of twenty-first century, for citizens to ask collectively whether the negative aspects of dataveillance are likely to be palliate or eliminated if present trends continue. If as a concerned citizen, we feel the negative effects of dataveillance will not be mitigated if we continue on the current path then we must move collectively outside from trying to maintain an ever-weakening illusion of privacy, and shift to offensive, by demanding accountability of those whose power is enhanced by dataveillance. Therefore it is only when standards and regulations are adopted will individuals be able to enjoy privacy and freedom.

No comments:

Post a Comment