Sign In
Not register? Register Now!
Pages:
3 pages/≈825 words
Sources:
Check Instructions
Style:
APA
Subject:
Social Sciences
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 12.96
Topic:

Surveillance Mechanisms Benefits

Essay Instructions:

Please read the instructions I unload carefully. Answer three questions and write a page for each question. Note that all the links to the readings are in the instructions, so please read them carefully. Besides, some of these readings are in PDF format, and some are linked to web pages. In general, PDF files are quite long in content. Please do not only analyze short articles linked to web pages, but also analyze documents in PDF format.

Answer all 3 questions. Only use our readings ; do not use outside sources. Please cite (end line citation with the list of sources at the bottom) at the end of the sentence and include a reference list at the end. Do not use more than one newspaper/popular source per answer. 

I am looking for well argued (using evidence) answers.

Each answer should be between a minimum of 1.5 double spaced pages.

1. Using any of our earlier readings, find the definition of surveillance that resonates most with you. Explain why this definition works better than others. Use our readings. Even though it is your preference, this is not an opinion question. It has to be an educated argument based on our readings. Reserve opinion till the very end.

2. The privacy vs. security debate has been hotly since 2001. Using our readings, discuss 3 points in favor of privacy and 3 points in favor of security. Which do you kind more convincing and why?

3. In our readings, the argument is made that corporations are the most eager to collect our personal data because it is profitable. Using our readings, explain how profit could be made from our personal data. Also, discuss what impact this has on our everyday lives and emotions. If you do not feel this affects us, also make sure to back up your arguments.

Reading Resources:

Stuart Armstrong, 2013. “Life in a Fish Bowl” in Aeon

https://aeon(dot)co/essays/the-strange-benefits-of-living-in-a-total-surveillance-state

John Schup: “Schools are spending billions on high-tech security. But are students any safer?”

https://www(dot)nbcnews(dot)com/news/us-news/schools-are-spending-billions-high-tech-security-are-students-any-n875611

Nancy G. La Vigne, Samantha S. Lowry, Joshua A. Markman, and Allison M. Dwyer. “Evaluating the Use of Public Surveillance Cameras for Crime Control and Prevention—A Summary”

https://www(dot)urban(dot)org/sites/default/files/publication/27546/412401-Evaluating-the-Use-of-Public-Surveillance-Cameras-for-Crime-Control-and-Prevention-A-Summary.PDF

Surveillance Monitoring: An Emerging Standard of Care

http://www(dot)24x7mag(dot)com/2015/09/surveillance-monitoring-emerging-standard-care/

William Staples, 2014. “Chapter One: Everyday Surveillance” in Everyday Surveillance.staples.surv.pdf

https://s3(dot)us-east-1(dot)amazonaws(dot)com/blackboard.learn.xythos.prod/5a306634d5d25/4620377?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27staples.surv.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20191028T021010Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20191028%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=ebc50f3812441be0777336efa04272d69521c7322bf9e5a1c22c384a55d71ded

David Lyon, 2014. “”The Emerging Surveillance Culture” in Media, Surveillance and Identity: Social Perspectives. emerging surveillance.pdf

https://s3(dot)us-east-1(dot)amazonaws(dot)com/blackboard.learn.xythos.prod/5a306634d5d25/4624712?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27emerging%2520surveillance.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20191028T021256Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20191028%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=73baed81add46320697f12ba9817a3064f7d2c692520b08f3b5ff7cf42cb913a

Julie Miller, 2018. “Twenty years later, everything is the Truman Show.”  https://www(dot)vanityfair(dot)com/hollywood/2018/06/truman-show-anniversary-jim-carrey-peter-weir-laura-linney

Barbara Hofer. “Limiting Communication When Sending Kids Off to College”

https://www(dot)huffingtonpost(dot)com/barbara-k-hofer/electronic-tether_b_909270.html

Nick WIngfield. 2016. “Should you spy on your kids?”

https://www(dot)nytimes(dot)com/2016/11/10/style/family-digital-surveillance-tracking-smartphones.html

Tuesday September 11: David Cole and James X. Dempsey, 2006. “The Patriot Act – Unleashing Government Spying, Reducing Oversight,” in Terrorism and the Constitution.

https://s3(dot)us-east-1(dot)amazonaws(dot)com/blackboard.learn.xythos.prod/5a306634d5d25/4653126?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Watkins100Copier%2540american.edu_20180910_163714.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20191028T021718Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20191028%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=fbe80a222e6f8b9aedbedb513bf6196c80de86d8868473aa6eda85d3f43cd44f

   (a better version)

Ali Winston, 2018. “Stationed Overseas, but Solving Crimes in New York City” in New York Times. 

https://www(dot)nytimes(dot)com/2018/08/21/nyregion/terrorism-nypd-intelligence-crime.html

Radley Bralko, 2014. “Surprise! Controversial Patriot Act power now overwhelmingly used in drug investigations,” in The Washington Post

https://www(dot)washingtonpost(dot)com/news/the-watch/wp/2014/10/29/surprise-controversial-patriot-act-power-now-overwhelmingly-used-in-drug-investigations/?noredirect=on&utm_term=.7894d13b9625

A community on the brink: Making sense of 9/11 across generations (you do not need to read the parts on German and Japanese Americans - they are optional).

https://s3(dot)us-east-1(dot)amazonaws(dot)com/blackboard.learn.xythos.prod/5a306634d5d25/5141560?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27serhan911-c3.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20191028T021808Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20191028%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=bc89c9fbeacbbc7e14af78642a366b604751f922d353896e81d44de08f84db7f

Glenn Sulmasy, 2013. “Why we need government surveillance,” (CNN)

https://www(dot)cnn(dot)com/2013/06/10/opinion/sulmasy-nsa-snowden/index.html

Nicole Perlroth et al. 2013.  “N.S.A. Able to Foil Basic Safeguards of Privacy on Web”
http://cs340(dot)cs(dot)ua(dot)edu/wp-content/uploads/2014/02/nsa-foils-much-internet-en.pdf

David Sanger and Thom Shanker, 2014. “N.S.A. Devises Radio Pathway Into Computers”
https://www(dot)nytimes(dot)com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html

Charlie Savage, 2013. “N.S.A. Chief Says Surveillance Has Stopped Dozens of Plots”
https://www(dot)nytimes(dot)com/2013/06/19/us/politics/nsa-chief-says-surveillance-has-stopped-dozens-of-plots.html

Please do not be intimidated by the size of the legal document. Most of the actual text takes up 1/2 of a page. Legal documents have to demonstrate evidence and precedent and so you will see that a good portion of the document is footnotes and citations. You do not need to worry about those.

Read up to 527. 
You are not expected to memorize or understand the nuances of the law, but rather to begin to grasp the complexity of it.

Readings:

Mary-Rose Papandrea, 2014. “Leaker traitor whistleblower spy: National security leaks and the first amendment,” in Boston University Law Review
https://s3(dot)us-east-1(dot)amazonaws(dot)com/blackboard.learn.xythos.prod/5a306634d5d25/4680998?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27leaker-law.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20191028T022604Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20191028%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=7775cb4083a98ef0aa68ec21ad84e3492e52a5207f610e503607c0d95d2767ba

Harry Litman and Mary Knobler, 2017. “Trump's war on leaks is really a war on whistleblowers.” (CNN)  https://www(dot)cnn(dot)com/2017/08/09/opinions/whistleblowers-opinion-litman-knobler/index.html

Christian Fuchs, “Social Networking Sites in the Surveillance Society” in Media, Surveillance, and Society

https://s3(dot)us-east-1(dot)amazonaws(dot)com/blackboard.learn.xythos.prod/5a306634d5d25/4701312?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27scan_serhan_2018-09-19-16-09-45.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20191028T022759Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20191028%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=28624f9415e6adc58b3b4aa264d6c7da37a463659e78afbd4613d3620390c88d

The Economist, 2014. “Stalkers, Inc.” https://www(dot)economist(dot)com/news/leaders/21616953-surveillance-advertising-industrys-new-business-model-privacy-needs-better

Tuesday September 25: Nils Zuwarski. 2014. “Consuming Surveillance: Mediating Control Practices through consumer culture and everyday life” in Media, Surveillance, and Identity.

https://s3(dot)us-east-1(dot)amazonaws(dot)com/blackboard.learn.xythos.prod/5a306634d5d25/4726723?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Watkins100Copier%2540american.edu_20180924_142227.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20191028T022932Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20191028%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=402f0af8c71ac05428c83416c2593e3e3a0591a6590ac7bc4cfe01553c071a4a

From debts to data: (skim this, you don't need to know details, but you do need to understand history/scope): debt to data.pdf

https://s3(dot)us-east-1(dot)amazonaws(dot)com/blackboard.learn.xythos.prod/5a306634d5d25/6908377?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27debt%2520to%2520data.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20191028T023004Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20191028%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=8a3435bfdb039565e5825d45f1aa1ea3dfa73f9d475f024f28c85c1853529be0

Media Smarts, “Surveillance: Why worry, if you’ve got nothing to hide?” 

http://mediasmarts(dot)ca/privacy/surveillance-why-worry-if-youve-got-nothing-hide

Videos on Consumerism and surveillance. 

https://s3(dot)us-east-1(dot)amazonaws(dot)com/blackboard.learn.xythos.prod/5a306634d5d25/6957222?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27selfie%2520culture.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20191028T023122Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20191028%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=79b9feca61b392447fd6bb9093bbddf0067851948544da9d95742ccfc7d09b1e

https://s3(dot)us-east-1(dot)amazonaws(dot)com/blackboard.learn.xythos.prod/5a306634d5d25/6957223?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27cyber.2015.0433.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20191028T023140Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20191028%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=a0164fc6f57e420a497e296bb202093bf0f08f7b3f5ff4e33d4ff9b2c068f2b9

Lee Humphreys, 2011. “Who's Watching Whom? A Study of Interactive Technology and Surveillance,” in Journal of Communications

https://s3(dot)us-east-1(dot)amazonaws(dot)com/blackboard.learn.xythos.prod/5a306634d5d25/4775101?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27415b8a46793440f960491c089ee0801465f5.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20191028T023213Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20191028%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=94b945f17178442bc3db7c3bd71fa1ab92826e4298c7cb02ea04128570b472f0

Kate Moran, 2016. “Social Media Natives: Growing Up with Social Networking.”

https://www(dot)nngroup(dot)com/articles/social-media-natives/

Daniel Solove. 2011. “Introduction” and “The National Security Argument” in Nothing to Hide: The False Tradeoff Between Privacy and Security

https://scholarship(dot)law(dot)gwu(dot)edu/cgi/viewcontent.cgi?article=2092&context=faculty_publications

John Fleming and Amy Adkins, 2016.“Data Security: Not a Big Concern for Millennials.”

https://news(dot)gallup(dot)com/businessjournal/192401/data-security-not-big-concern-millennials.aspx

 “’You never really know who’s looking’: Imagined surveillance across social media platforms,” in New Media and Society, pp. 1-20.

https://s3(dot)us-east-1(dot)amazonaws(dot)com/blackboard.learn.xythos.prod/5a306634d5d25/4810985?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%271461444818791318.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20191028T023441Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20191028%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=14ec584d869705014b048466aa345c0a840075611ea681d629017c78d041affd

Jonathan Margolis, 2017. “Be careful with social media — employers are watching,” in Financial Times 

https://www(dot)ft(dot)com/content/5b8bb3b0-6aca-11e7-b9c7-15af748b60d0

Justin Florence, 2016. “Making the No Fly List Fly: A Due Process Model for Terrorist Watchlists” in Yale Law Review.

https://s3(dot)us-east-1(dot)amazonaws(dot)com/blackboard.learn.xythos.prod/5a306634d5d25/4900337?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27JustinFlorenceMakingtheNo.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20191028T023612Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20191028%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=b527a1874858023f0754fd5e35f000bf96a63dafd5f502914aefd4aab2cabd53 

Junichi Semitsu, 2011. “From Facebook to mug shot: How the dearth of social networking privacy rights revolutionized online government surveillance https://heinonline(dot)org/HOL/LandingPage?handle=hein.journals/pace31&div=10&id=&page=,” in Pace Law Review.

https://s3(dot)us-east-1(dot)amazonaws(dot)com/blackboard.learn.xythos.prod/5a306634d5d25/4900332?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27JunichiPSemitsuFromFacebo.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20191028T023630Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20191028%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=2238c0447a84fc68e6d754c6144ee02ee18aa60aab43374c96bb492f55cae3cc

Rachel Sanders, 2016. “Self-tracking in the Digital Era: Biopower, Patriarchy, and the New Biometric Body Projects,” in Body and Society

https://s3(dot)us-east-1(dot)amazonaws(dot)com/blackboard.learn.xythos.prod/5a306634d5d25/4944860?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%271357034x16660366.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20191028T023818Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20191028%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=60ed04a67848cfae22d7caec5d4f126b68e60f5b818f47223016d77979adbf2e

Thomas McMullan, 2015. “What does the panopticon mean in the age of digital surveillance?”

https://www(dot)theguardian(dot)com/technology/2015/jul/23/panopticon-digital-surveillance-jeremy-bentham

Essay Sample Content Preview:

Surveillance Mechanisms Benefits
Author`s Name
Institutional Affiliation
Surveillance Mechanisms Benefits
Question 1
Surveillance is an emerging technology that enforces security measures in different activities around the world. Surveillance is the use of cameras and microphones with other tracking facilities to store and process data in real-time life. Surveillance does not only enable watching of an event but enables the event analysis (Staples, 2014). Several attempts to control surveillance have failed, as people can watch your private life such as sex life. Developing technology is a factor leading to faster growth of surveillance efforts in the world. Despite the negative effects the surveillance system has on the social lifestyle, we also ought to think of the positive aspects it has on daily activities. For instance, it has many potential benefits to our different forms of activities in various sectors.
Surveillance could have controlled various events in people`s lifetime daily. Total surveillance help to eliminate particular types of crimes from a country as well as on the globe. It will limit the assault or breaking into people`s facilities to lower levels as much as possible. The surveillance equipment of police to manage these situations should not only recording devices, but also advanced computer systems and recognition algorithms for effective detection of crimes. The information can help to eradicate perpetrators in fear of future discovery and punishment. The approach promotes a crime-free regime due to total surveillance reducing many activities such as bribes, terrorism, and child abuse.
Excellent surveillance will keep track of a variety of activities country attacks on one another, managing diseases influence on people, and prevent deadliest catastrophic risks to the society. For instance, the researchers would have eradicated AIDS epidemiologists more swiftly by the identification and treatment of the affected population (La Vigne, Lowry, Markman & Dwyer, 2011). The health personnel can quarantine the affected population to avoid infection of other people. Besides, it can help in the easy location of people during a natural disaster such as an earthquake. Surveillance can reduce the level of hypocrisy and lying to society, as people will be honest with each other.
Question 2
Surveillance technique reduces the level of privacy of a person, as it watches and analysis a person`s actions at every point of life. For instance, the approach suggests the use of fewer passwords in people`s facilities such as smartphones, computers and credit cards (Florence, 2016). One needs to have a less private life because of continued surveillance by the use of cameras and audio recording devices. Furthermore, a person's social life privacy reduces due to the developing technology in surveillance systems. Security can watch and have a detailed of people`s sex life in society. It leads to the determination of which kind of life exists in different families and various relationships. It can lead to a partner knowing his or her counterpart's sexual relationship. Therefore, surveillance reduces the privacy of a person to the entire society.
Surveillance has reduced the privacy of many criminals and terro...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!