...Throughout history, the response to social disorder and the rising of crimes rates has been to adopt the most modern technology and techniques available (Taylor 2002). Considerable advances in technology has dramatically increased the powers of a state to carry out surveillance upon its citizens (Taylor 2002). This therefore, brings with it the vision of an Orwellian society, where in citizens are constantly under the watchful eye and attentive ear of “Big Brother” (Taylor 2002). Though the allusion to “Big Brother” is a popular metaphor for the role of the state in regards to social control, it does ignore the numerous benefits that increased surveillance has brought about (Taylor 2002). In looking at surveillance today, we must first have...
Words: 1895 - Pages: 8
...has become very intrusive and borderline illegal. For a wire tap to take place warrants, investigation, and a legitimate reason for surveillance needs to be established. Video has eluded this facet of both ethical and legal exam. People including the government and local municipalities are free to record, post, and edit just about anything, anybody, anytime. Conspiracy theorists say this is by design. Although there is legitimate application of this technology, we have left legitimate and entered intrusive. Cameras and voyeurism have proliferated almost every facet of Americans lives from crime fighting, education, employment, being in public and all the way down to home use. On the plus side when used in context of there original intent cameras and video surveillance have been very beneficial. Video cameras have captured many crimes and resulted in the conviction of very dangerous criminals. “Law enforcement agencies say surveillance cameras have become a valuable crime-fighting weapon, like capturing the infamous Craigslist killer, who was identified on hotel surveillance”(Surveillance, 2012). Again when used in the proper context we can see a great benefit of video surveillance. Without video surveillance this very evil man may have never been caught. “Law enforcement around the world increasingly relies on a growing network of surveillance cameras to help solve crime. But do more cameras mean more...
Words: 606 - Pages: 3
...Electronic surveillance in the workplace Electronic Surveillance in the Workplace: Concerns for Employees and Challenges for Privacy Advocates Anna Johnston and Myra Cheng Paper delivered 28 November 2002 International Conference on Personal Data Protection Hosted by Personal Information Dispute Mediation Committee, Korea Information Security Agency Seoul, Korea Ms Anna Johnston is the NSW Deputy Privacy Commissioner. Ms Myra Cheng is a Research & Policy Officer with Privacy NSW, the Office of the NSW Privacy Commissioner. The authors gratefully acknowledge the assistance of Dr Ben Searle, Macquarie University, in providing an overview of the relevant literature from the field of organisational psychology. Introduction This paper takes up the challenge of talking about privacy in the workplace - a site of potential conflict in which there may be co-existing radically different views on whether workers can or should have any expectations of privacy. As long as there has been employment, employees have been monitored. Nebeker D M & B C Tatum, "The effects of computer monitoring, standards and rewards on work performance, job satisfaction and stress" (1993) 23(7) Journal of Applied Social Psychology 508 at 508. However, in recent years, with an environment of affordable technology, the availability of less easily observable or detectable monitoring devices, and a lack of adequate regulation, there has been an explosion in the use of electronic monitoring...
Words: 6767 - Pages: 28
...Electronic Surveillance of Employees Professor Michael Hall Law, Ethic, and Corporate Governance- LEG 500 November 1, 2011 Explain where an employee can reasonably expect to have privacy in the workplace. You may think your United States employee rights authorize you to have a privacy workplace. People are wrong because, according to workplace privacy studies, the odds were good that your employer was monitoring all your internet actions, including your web pages and chat rooms (Niznik, 2011). If your company policy does not state there is a workplace privacy policy, your employer may watch, listen, and read just about everything in workplace area. Employers have the right to protect their business, their finances, and all of their equipment. The American Management Association (AMA) conducted a study of 526 employers which most use some type of electronic surveillance of the employees (Niznik, 2011). Many employers will deny they use any type of electronic surveillance however; the odds are good that your employer has “the eye,” watching your every move at work. Employers are not required to provide workplace privacy because your employers own everything you use at work. Your employers own the computers you work on, the telephones you talk on and the buildings in which you work. There are only a few weak employee workplace privacy right laws that exist. Since there are so few workplace privacy laws, it is legal for “the eye” to spy on you without your...
Words: 1946 - Pages: 8
...Thesis Statement With the recent school shootings happening and evidence of the perpetrators posting comments online thru social media, the government should be focusing on applying laws requiring companies to use artificial intelligence agents to help identify persons of interest and allow local law enforcement, along with the companies, to monitor these agents. Annotated Bibliography Dulek, R., Motes, W., & Hilton, C. (1997), Executive Perceptions of Superior and Subordinate Information Control: Practice versus Ethics. Journal of Business Ethics Vol. 16, pgs.1175-1184 This entry examines the ethical practices of leaders in a business and their employees involving information control within a business. Specifically it examines whether these executives know if control is being performed and if they deem it ethical. The statement “…executives are generally drawn to those command activities they deem to be "proper and right." but shy away from those that are iniquitous.” R. Dulek has authored six books and publishes more than forty journal articles. He is currently...
Words: 1878 - Pages: 8
...CCTV surveillance and the civic conversation: a study in public sociology Author(s): Sean P. Hier , Dan Lett and Kevin Walby Source: Canadian Journal of Sociology. 35.3 (Summer 2010): p437. Document Type: Report Copyright : COPYRIGHT 2010 Canadian Journal of Sociology http://www.ualberta.ca/~cjscopy/subinfo.html Abstract: Public sociology is being debated across the social sciences. This article examines how sociologists can enter concretely into a civic conversation through the research process. We present partial findings from a Canada-wide investigation into how city street video surveillance systems are implemented in various communities. Our aim is to examine some of the challenges of doing public sociology by examining sociological knowledge production and communication with diverse publics. Data gleaned from focused group interviews in the City of Kelowna, British Columbia are presented to explore the challenges of facilitating a civic conversation about public policy on city street video surveillance. Keywords: public sociology; public-area video surveillance; Burawoy; public opinion La notion captivante de << sociologie publique >> a recemment anime des debats dans le monde des sciences sociales. Bien que ces debats aient permis de soulever des questions pertinentes relativement au statut de la production du savoir sociologique, on n'a pas apporte suffisamment de reflexion sur la maniere dont les sociologues entrent reellement dans une conversation...
Words: 10214 - Pages: 41
...FEIT31272 Project Management and the Professional Assignment 1 | Ethics of UAVs | 11035425 Ngo, Kevin 11035502 Truong, Matthew | Table of Contents Executive Summary 2 Introduction 2 Overview 3 Definition 3 History of UAV 4 Civil Use 7 Background: 8 Small Picture Ethics 9 Big Picture Ethics 12 Deontology. 12 Relativism 15 Virtue ethics 17 Future use: 19 Recommendation 21 Individual Opinion 22 Kevin Ngo 22 Matthew Truong 25 Reference List 27 Executive Summary Introduction Unmanned aerial vehicles (UAVs) can generally be defined as a “device used or intended to be used for flight in the air that has no on-board pilot”. Current generations of UAVs “can be as small as an insect or as large as a charter flight”. They can be launched from a road or a small vehicle, but are often large enough to accommodate cameras, sensors or other information gathering equipment. Recently, discussions of UAVs have shifted most of the attention toward the ethical, legal and privacy implications that UAVs have, on society in global and domestic level. Overview Definition ------------------------------------------------- ------------------------------------------------- There are many various terms used to identify these unmanned vehicles to which by its definition are that of a craft without a human pilot within. The most commonly accepted term would be UAV ( unmanned aerial vehicles); the US military much prefer...
Words: 7338 - Pages: 30
...Since the invention of radio, intelligence-gathering organizations have been developing and using eavesdropping techniques to intercept and review wireless communications. Initially, these capabilities were solely used to spy on hostile nations, and particularly for military purposes. Human operators had to manually review each transmission, and cryptanalysts pored over military ciphers in an attempt to decode important messages. As wireless communication has become an integral part of commercial and individual existence, and potential threats to security are increasingly found in peacetime and on home ground, the scope of this intelligence gathering has likewise broadened. One of the most controversial eavesdropping systems in existence is a classified project known as ‘Echelon.’ Its use of computer hardware and software to filter communications from all over the world brings up many ethical issues related to the impact of computers on privacy. Overview of Echelon Most of the evidence for Echelon is circumstantial, though a few facts have been established. The participating organizations (notably the US Central Intelligence Agency and National Security Agency) have neither confirmed nor denied its existence. In lieu of a discussion of the ethical issues, a brief summary of the current knowledge follows. How it Works Echelon is the product of Cold War efforts to monitor wireless communications in the USSR. It traces its roots back to the clandestine UKUSA...
Words: 5284 - Pages: 22
...In this essay I will argue that the ‘war on terror’ declared by the Bush administration and so assessed for the US; is not a just war. It fails in the central interrelated criteria of just cause and last resort for jus ad bellum, which I detail first through assessment of the Bush administration’s self-proclaimed just reasoning behind resorting to war against a concept, and the alternatives available to it, I will then detail its failure in the jus in bello criteria of discrimination and proportionality, reasoning through the case of drone warfare. Jus ad bellum I shall firstly focus on the crucial jus ad bellum principle of just cause, holding the only just cause for war to be self-defence . The USA and its allies suffered unjust, unprovoked terror attacks, notably to embassies and battleships, as well as ultimately the 9/11 disaster, and further possessed reputable evidence of other failed attacks. Thus this essay acknowledges that they were under-attack from a powerful and effective enemy, which could be reliably pinpointed as Al Qaeda. These attacks were focused on non-combatants in landmark locations; deliberate targeting for maximum terror spreading effect, which further represented an attack on western freedoms. Hence the assailant satisfied neither jus ad bellum, nor jus in bello, and without immediate and effective action there existed great potential for further unjust attacks. This was the Bush administration’s argument for sufficient reason to declare war in self-defence...
Words: 2219 - Pages: 9
...Computer crime involves: Theft by computer (including identity theft and phis hing) Software piracy and intellectual property misuse Software sabotage (malw are- including worms, viruses, Trojan horses, e tc.) Hacking and electronic trespassing. The computer crime dossier Computer crime: any crime accomplished through knowledge or use of computer technology Businesses and government institutions lose billions of dollars every year to computer criminals The majority of crimes is committed by company insiders Typically covered up or not reported to authorities to avoid embarrassment According to a 2001 survey of over 500 companies and government agencies: 85% detected computer security breaches in the preceding 12 months Financial losses due to security breaches topped $377 million 70% reported that Internet connections were frequent points of attack Only 31% said that internal systems were frequent points of attack. Theft by computer Theft is the most common form of computer crime. Computers are used to steal Money Goods Information Computer resources One common type of computer theft today is the actual theft of computers, such as notebook and PDAs Notebook and PDAs are expensive Data stored on a computer can be more valuable Denial o f Service ( DOS) Attacks bombard servers and Web sites with so much bogus traffic that they are effectively shut down networks, denying service to legitimate customers and clients. Computer security Protecting computer systems...
Words: 7438 - Pages: 30
...prescribed it as "required reading" for Labour Party M.P.s',(3) and, in the US, the Washington branch of the John Birch Society 'adopted "1984" as the last four digits of its telephone number'.(4) Moreover, Churchill had made the 'inseparably interwoven' relation between socialism and totalitarianism a plank in his 1945 election campaign(5) (and was not the protagonist of Nineteen Eighty-Four called Winston?). If, ten years earlier, an Orwell had written a futuristic fantasy in which Big Brother had had Hitler's features rather than Stalin's, would not the Left, whatever the writer's proclaimed political sympathies, have welcomed it as showing how capitalism, by its very nature, led to totalitarian fascism? With Nineteen Eighty-Four, it is particularly necessary to trust the tale and not the teller, but even this has its pitfalls. Interpretations of the novel already exist which blatantly ignore the intentions of the author by reinterpreting its manifest content without any obvious justification. But all existing interpretations of Nineteen Eighty-Four are unsatisfactory in one regard or another. For many years Nineteen Eighty-Four 'served as a sort of an ideological...
Words: 7887 - Pages: 32
...August the 2nd 1990 Saddam Hussains forces crashed the defenses of oil rich Kuwait in fear of an Iraqi invasion into Saudi Arabia. The United States and her coalition allies poured into the Arabian Peninsula to form a deterrent that would be known as Desert Shield. The result was a series of diplomatic talks, negotiations and count negotiations that rapidly declined into a no hope situation. On August the 17th 1991 the Desert Shield became Desert Storm. The conflict was witnessed by millions through the IF, CNN and the BBC showing propaganda of the systematic eradication of Saddam's forces by a coalition far superior in technological, political and economic power. However what was little known was that from the outset the war was engineered, controlled and manipulated by an elite group. A group which had created the illusion of a man with power at the head of a million strong army on the verge of going nuclear. A man who had gained control of the 1/5 of the World's oil overnight. However in reality he was merely a pawn in amongst many pawns. Just a puppet in a grand master plan with the Gulf War as a well orchestrated stepping stone. The orchestrates of the War were by no means strangers to controlling major World events. In fact they have done so for centuries. From the shadows they have engineered every major war, revolution and recession. They control everything you read, everything you hear and everything you see. They have managed to indoctrinate an entire populace...
Words: 9724 - Pages: 39
...Lone Wolf Terrorism Introduction Problem background and significance In the United States terrorism incidents such as the attack in 1995 in Oklahoma by Timothy McVeigh and the September 11th attack in 2001, have led to the realization that lone wolf terrorism posses a grave threat to the safety of the public. Terrorism analysts and law enforcement authorities have insisted that it is hard to spot lone terrorists before they strike and this is of great threat to the security of a nation. From FBI information it is evident that lone terrorism trends indicate that it is an ongoing risk both in side the United States and outside the country (Risen & Johnston, 2003) In 2003 the director of the FBI stated that there was an increased threat from persons who are affiliated or sympathetic with the Al Qaeda and they act without having any conspiracies surrounding them or external support. Scholars in the field of terrorism have in the past concentrated on the how terrorist groups work so as to explain how individuals work. The general view of terrorism is that it is a group activity which is mainly influenced by leaders training, recruitment, obedience and conformity, solidarity and moral disengagement. Due to the imbalance that exists between the focus by scholars on terrorism that is group based on one hand and apparent threat posed by lone wolf terrorist on the other hand, necessitates the empirical and conceptual analysis of lone wolf terrorism so as to establish a good understanding...
Words: 8796 - Pages: 36
...Examine the use David Simpson makes of Ẑiẑek’s theoretical work in his study 9/11: The Culture of Commemoration. “The routines of commemorative culture, whether private or public, exist to mediate and accommodate the unbearably dissonant agonies of the survivors into a larger picture that can be metaphysical or national-political and is often both at once.” (Simpson 2) David Simpson’s study 9/11: The Culture of Commemoration published in 2006 focuses on a post-9/11 America wracked by fear and paranoia. The “war against terror” implacably positions the American nation against vengeful messianic Islamist “terrorists” who represent the other, the enemy, and are identifiable en masse as “the culture of terror”. The tragic events of the day known globally as 9/11 shattered any illusion Americans might have had about an ethic of tolerance operating both within and without their borders. But Simpson notes in his introductory arguments that while that day has been represented as a rupture with known reality it had a familiarity about it that can be traced over time to the influence of television and film, and was thus already embedded within American culture as a shocking explosive tragedy waiting to happen. Simpson states unequivocally that it’s time we turned to “those who speak for theory” to guide and lead us towards a new cultural understanding of 9/11, mentioning the Slovenian philosopher and cultural theorist Slavoj Ẑiẑek as part of a respected cohort of theorists: “The...
Words: 9727 - Pages: 39
...University of Wollongong Research Online Faculty of Informatics - Honours Theses (Archive) University of Wollongong Thesis Collections 2005 Ethical Issues arising from the Real Time Tracking and Monitoring of People Using GPS-based Location Services A. Mcnamee University of Wollongong Publication Details This thesis was originally submitted as McNamee, A, Ethical Issues arising from the Real Time Tracking and Monitoring of People Using GPS-based Location Services, Bachelor of Information and Communication Technology (Honours), University of Wollongong, 2005,71p. Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: research-pubs@uow.edu.au Ethical Issues arising from the Real Time Tracking and Monitoring of People Using GPS-based Location Services Abstract The Global Positioning System is a constellation of 24 satellites which have the ability to calculate the position, time and velocity of any GPS receiver. Ethical concerns arise when a person carrying a receiver has their location transmitted to second party. This type of tracking has a wide variety of applications including tracking dementia sufferers, tracking parolees and law enforcement. A literature review found that the ethics of GPS tracking has not been thoroughly assessed. This paper investigates the ethical issues arising from the real time tracking of people using GPS-based location services. Usability...
Words: 20727 - Pages: 83