PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes.

Slides:



Advertisements
Similar presentations
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Advertisements

PowerPoint Presentation Possible Topics Related to General Education Area VI Computer Science Appendix B.
AXIS Camera Recorder. Value Proposition  AXIS Camera Recorder Offers all core video recording and monitoring functionality at an attractive price level.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
PewInternet.org The new landscape for civics and politics (especially in mobile) Voting Information Technology Summit - GeekNetNYC December 1, 2011 Lee.
The Role of Computers in Surveillance ~ Katie Hatland.
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
BIOMETRICS: GAIT RECOGNITION
Chapter 26 Communication Systems. Objectives After reading the chapter and reviewing the materials presented the students will be able to: Identify common.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
INTERNET SAFETY Elementary Age Children Catherine Horn, M.A., C.A.S. Cos Cob School Psychologist.
J. Chansavang. Use this Powerpoint to gain understanding about the main areas that are affected by computers and technology. Possible research topics.
By: Fesetan, Cindy L.. Contents Instant Messaging How Instant Messaging Work Instant Messaging Program Types of Instant Messaging Advantages & Disadvantages.
Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring.
Mobile Devices ACGNJ February 9, 2011 Text Messaging.
Technology and Hotel Security Hotel Mgmt. Hospitality Services R. McCann.
Surveillance Society. Definition The monitoring of the behavior, activities, or other changing information, usually for the purpose of influencing, managing,
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Karthiknathan Srinivasan Sanchit Aggarwal
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
Deb Gearhart Trot University Student Authentication – What it Means for Us.
ICT at Work Global Communication.
Cyber Basics and Big Data. 2 Semantic Extraction Sentiment Analysis Entity Extraction Link Analysis Temporal Analysis Geospatial Analysis Time Event Matrices.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
BUSINESS B1 Information Security.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
A sensor for measuring the acceleration of a moving or vibrating body.
Indecent Exposure – Are Your Private Parts Truly Private? (Privacy and Technology) Barbara Buckett Barbara Buckett & Associates 27 August 2008.
ONLINE COMMUNICATION 2 Lesson 5. Starter  How has online communication changed the way in which we communicate?  How has online communication affected.
Communication Technology Mr. Butler Department of Technology John Jay High School Wappingers Central School District.
COMMUNICATION. Passing on of information or ideas Information must be:  Easy to understand  Sent by the most suitable method  Sent to the correct person.
Jess Thornton Unit 9. Unit 9 Chores DiscussionQuiz Unit 9 Project (Look under unit 9 for direction) Seminar.
Social Networking Presentation to Department Heads January 21, 2010.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
PRESENTATION ON BIOMETRICS
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
Education Archiving, Internet & Social Media Monitoring
Biometric Technologies
Why Do We Use Computers For Communication?. Read the words and make up the word combinations fax phone electronic to receive to send printed to use computer.
CS 6v Privacy The end of Privacy ?? Dr.Murat Kantarcioglu.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Mohammad Dastbaz, Eddie Halpin, Steve Wright Chapter 10 - Emerging Technologies and the Human Rights Challenge.
Internet Service Currently Provides numerous services including: Data service to access information from around the world Entertainment (iTunes, Hulu,
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
SURVEILLANCE BY: BRADY, EVAN, GUNNAR, MATTHEW, ZACH.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Monitoring By Krystal Thousand. What is Monitoring in the Workplace? record and review their employees' communications and activities on the job, including.
Video Biometrics: Surveillance 2/2/2016VIDEO BIOMETRICS:SURVEILLANCE1.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
Flame & Smoke Detection System Flame & Smoke Vision Detection is an intelligent vision-based analytics system which can timely detect suspicious fire or.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
CJA 364 Week 4 Learning Team Criminal Identification Procedures in the 21st Century To purchase this material click below link
Electronic counter surveillance.
Architecture for security monitoring in IoT environments
Security systems for cities
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Appendix B Possible Research Topics for CS Taken from A Gift of Fire by Sara Basse PowerPoint Presentation Possible Topics Related to General Education.
Biometrics.
Biometric technology.
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
Communication Technology TGJ – Mr. Pisani
TECHNOLOGICAL PROGRESS
Communication Technology TGJ – Mr. Pisani
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Communication Technology TGJ – Mr. Pisani
Presentation transcript:

PRESENTATION ON SURVELLANCE

Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes done in a surreptitious manner. The word surveillance may be applied to observation from a distance by means of electronic equipment.

Government Surveillance is very useful to governments and law enforcement to maintain social control, recognize and monitor threats, and prevent/investigate criminal activity.

Computer surveillance The vast majority of computer surveillance involves the monitoring of data and traffic on the internet. In the United States for example, all phone calls and broadband Internet traffic ( s, web traffic, instant messaging, etc.) are required to be available for real-time monitoring by Federal law enforcement agencies.

Telephones The official and unofficial tapping of telephone lines is widespread. In the United States for instance, it is required that all telephone communications will be available for real- time wiretapping by Federal law enforcement and intelligence agencies.

Surveillance cameras Surveillance cameras such as these are installed by the millions in many countries, and are nowadays monitored by automated computer programs instead of humans. Surveillance cameras are video cameras used for the purpose of observing an area. The amount of footage is also drastically reduced by motion sensors which only record when motion is detected.

Social network analysis One common form of surveillance is to create maps of social networks based on data from social networking sites such as Facebook, My space, Twitter.

Biometric surveillance Biometric surveillance refers to technologies that measure and analyze human physical and/or behavioral characteristics for authentication, identification, or screening purposes. Examples of physical characteristics include fingerprints, DNA, and facial patterns. Examples of mostly behavioral characteristics include gait (a person's manner of walking) or voice.

SOME OTHER RELATED TERMS…..

Countersurveillance, sousveillance Counter surveillance is the practice of avoiding surveillance or making surveillance difficult. Sousvelliance is the type of surveillance that includes the recording of an activity by a participant in the activity.

Bibliography Images: Videos: Information:

Thank you