Surveillance. By: Sambit Pulak XI-IB. Definition:.
By: Sambit Pulak
Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess employees’ performance. It can be used to support claims for promotion or to ensure that employees follow the organization’s internet policy appropriately.
4)Social network analysis
7)Data mining and profiling
11)Identification and credentials
13)Global Positioning System
Computer surveillance is the act of performing surveillance of computer activity, and of data stored on a hard drive or being transferred over the Internet.
A camera inside a bank branch that records activity in the bank, and can be used to identify bank robbers. Surveillance cameras are used in these cases.
Biometric Surveillance is basically defined as technical methods through which the personality and or unique factors that define each human being separately, either physically or by actions are carefully calculated and thoroughly investigated so that they may be legitimized, acknowledged or recognized and or examined for different purposes.
Aerial, or Air Reconnaissance, is the reconnaissance and surveillance that is usually conducted by unmanned aerial vehicles or reconnaissance aircraft. Their roles are to collect Imagery intelligence, Signals intelligence and Measurement and signature intelligence.
Corporate surveillance is the monitoring of a person or group\'s behavior by a corporation.
Radio Frequency Identification (RFID) tagging is the use of very small electronic devices (called \'RFID tags\') which are applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves.
The Global Positioning System (GPS) is a space-based global navigation satellite system (GNSS) that provides location and time information in all weather, anywhere on or near the Earth, where there is an unobstructed line of sight to four or more GPS satellites.
Mobile phones are also commonly used to collect geolocation data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily (whether it is being used or not), using a technique known multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone.
Surveillance devices, or "bugs", are hidden electronic devices which are used to capture, record, and/or transmit data to a receiving party such as a law enforcement agency.
Some supporters of surveillance systems believe that these tools protect society from terrorists and criminals. Other supporters simply believe that there is nothing that can be done about it, and that people must become accustomed to having no privacy.
Some critics state that the claim made by supporters should be modified to read: "As long as we do what we\'re told, we have nothing to fear."
Numerous civil rights groups and privacy groups oppose surveillance as a violation of people\'s right to privacy.
Some critics believe that in addition to its obvious function of identifying and capturing individuals who are committing undesirable acts, surveillance also functions to create in everyone a feeling of always being watched, so that they become self-policing.
Countersurveillance is the practice of avoiding surveillance or making surveillance difficult. With recent developments, counter surveillance has dramatically grown in scope and complexity.
Inverse surveillance is the practice of reversalism on surveillance (e.g., citizens photographing police).
Sousveillance is inverse surveillance that includes the recording of an activity by a participant in the activity.