By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.

Slides:



Advertisements
Similar presentations
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 16 Integrating Wireless Technology in business.
Advertisements

Primary 4 Communication in the Ancient and Modern times.
Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)
2 Language of Computer Crime Investigation
Presentation on RFID and GPS
The Role of Global Positional Systems in Policing and Crime Prevention William J. Artis Jr. FRS 142: Where’s Waldo April 19, 2004.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
1 A study on Location Aware Computing Presenter : Narendiran Visvanathan Instructor : Dr. Chin-Chih Chang Course : CS 898T Mobile and Wireless Networks.
Wireless, Cellular, Geolocation Harry Lewis April 14, 20111Harvard Bits.
Police 3.6 Politics and Government. DNA Data Collection.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Data Privacy.
The Role of Computers in Surveillance ~ Katie Hatland.
Surveillance camera in terms of business. Index *surveillance systems * Types of control systems * Elements of control systems * Types of monitoring camera.
Communications and Networks Chapter 6. Objectives Defines the components required for successful communications Describe uses of communications Identify.
 The Global Positioning System (GPS) is a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver.
Business Driven Technology Unit 4 Building Innovation Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
Welcome to Week 5 at the Summer Computer Club GPS and Geocaching.
Chapter CHAPTER SEVEN OVERVIEW SECTION NETWORKS AND TELECOMMUNICATIONS  Network Basics  Voice over IP  Networking Businesses  Increasing.
How Global Positioning Devices (GPS) work
Surveillance Society. Definition The monitoring of the behavior, activities, or other changing information, usually for the purpose of influencing, managing,
Mobile phone: A mobile phone (also known as a cellular phone, cell phone and a hand phone) is a device which can make and receive telephone calls over.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
AS ICT.  A portable communication device is a pocket sized device that is carried around by an individual  They typically have a display screen with.
Communications & Networks
1 CHAPTER 18 Creating a Wireless Organization. 2 Learning Outcomes Explain how a wireless device helps an organization conduct business anytime, anywhere,
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Cell Phone Review. Bluetooth Bluetooth:  Bluetooth is a wireless connection technology that can connect different types of devices within a short range.
Jörn-Marc Schmidt Social Networks Computer / Notebook Localization Smart Phone Identification Tracking ??? RFID Social Networks.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Trends Information Systems and Management. Trends Disruptive versus Sustaining Wireless IT Focus for organizations IRM –Strategic vs. –Operational CIO.
GPS. What is the Global Positioning System (GPS)? a satellite-based navigation system made up of a network of 24 satellites. a satellite-based navigation.
By Shubham GOEL ECE-III year xyz. Introduction Automatic Vehicle Locator (AVL) is a computer – based vehicle tracking system The actual real –time position.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
GPS Morgan walsh. The GPS satellite system GPS stands for “Global Positioning System” A GPS is a space-based satellite navigation system that provides.
Global Positioning System (GPS) WHAT: Describe GPS and how it is used HOW: Group discussion and an activity to find a secret location WHY: GPS technology.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved BUSINESS DRIVEN TECHNOLOGY Chapter Eighteen Creating a Wireless Organization.
PRESENTATION In a modern society there are different types of surveillance systems from cctv cameras to biometric readers. In this power point presentation.
Computers and Surveillance different types of surveillance surveillance programs some books and movies controversy.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Monitoring.
CS 6v Privacy The end of Privacy ?? Dr.Murat Kantarcioglu.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Mohammad Dastbaz, Eddie Halpin, Steve Wright Chapter 10 - Emerging Technologies and the Human Rights Challenge.
Chapter 3 : The Electromagnetic Spectrum
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes.
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
Security and Privacy. 228 What might this number indicate? This is the number of mobile phones stolen in the UK every hour.
Contents Introduction What are Location-based services Working of Location-based services Location Tracking Technologies Power profiling a mobile phone.
Video Biometrics: Surveillance 2/2/2016VIDEO BIOMETRICS:SURVEILLANCE1.
Local Positioning System
G p s.  The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information in all weather conditions,
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
CJ 213 Unit 3 Information Technology. Crime Analysis Collection and analysis of data pertaining to a criminal incident, offender and target. Crime Analysis.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Location-Sensing and Location Systems 1. A positioning system provides the means to determine location and leaves it to the user device to calculate its.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Unit: Sound and Light Lesson 3: Wireless Communication
Embedded Web Technology (EWT)
Targeted surveillance
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
Home and personal communication systems
Ad Hoc Phase Structured Phase Enterprise Phase
Betty Fermin Rajal Patel Amanda Poirier David Pandolfo
Presentation transcript:

By: Sambit Pulak XI-IB

Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess employees’ performance. It can be used to support claims for promotion or to ensure that employees follow the organization’s internet policy appropriately.

1)Computer surveillance 2)Telephones 3)Surveillance cameras 4)Social network analysis 5Biometric surveillance 6)Aerial surveillance 7)Data mining and profiling 8)Corporate surveillance 9)Human operatives 10)Satellite imagery 11)Identification and credentials 12)RFID tagging 13)Global Positioning System 14)Mobile phones 15)Surveillance devices 16)Postal services

Computer surveillance is the act of performing surveillance of computer activity, and of data stored on a hard drive or being transferred over the Internet. A camera inside a bank branch that records activity in the bank, and can be used to identify bank robbers. Surveillance cameras are used in these cases. Biometric Surveillance is basically defined as technical methods through which the personality and or unique factors that define each human being separately, either physically or by actions are carefully calculated and thoroughly investigated so that they may be legitimized, acknowledged or recognized and or examined for different purposes. Aerial, or Air Reconnaissance, is the reconnaissance and surveillance that is usually conducted by unmanned aerial vehicles or reconnaissance aircraft. Their roles are to collect Imagery intelligence, Signals intelligence and Measurement and signature intelligence.

Corporate surveillance is the monitoring of a person or group's behavior by a corporation. Radio Frequency Identification (RFID) tagging is the use of very small electronic devices (called 'RFID tags') which are applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. The Global Positioning System (GPS) is a space-based global navigation satellite system (GNSS) that provides location and time information in all weather, anywhere on or near the Earth, where there is an unobstructed line of sight to four or more GPS satellites. Mobile phones are also commonly used to collect geolocation data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily (whether it is being used or not), using a technique known multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone. Surveillance devices, or "bugs", are hidden electronic devices which are used to capture, record, and/or transmit data to a receiving party such as a law enforcement agency.

Support Some supporters of surveillance systems believe that these tools protect society from terrorists and criminals. Other supporters simply believe that there is nothing that can be done about it, and that people must become accustomed to having no privacy. Opposition Some critics state that the claim made by supporters should be modified to read: "As long as we do what we're told, we have nothing to fear." Privacy Numerous civil rights groups and privacy groups oppose surveillance as a violation of people's right to privacy. Psychological/social effects Some critics believe that in addition to its obvious function of identifying and capturing individuals who are committing undesirable acts, surveillance also functions to create in everyone a feeling of always being watched, so that they become self-policing.

Countersurveillance is the practice of avoiding surveillance or making surveillance difficult. With recent developments, counter surveillance has dramatically grown in scope and complexity. Inverse surveillance is the practice of reversalism on surveillance (e.g., citizens photographing police). Sousveillance is inverse surveillance that includes the recording of an activity by a participant in the activity.

&sa=X&ei=6QzSTqTDKcHKrAefksmwDg&ved=0CCQQkQ4&bav=on.2,or.r_gc. r_pw.,cf.osb&fp=2b1c a067e&biw=1280&bih=923 surveillance/