CCT303H5 Chapter Notes - Chapter 8: Data Mining

81 views1 pages

Document Summary

Issues in the era of technological and social networking. Laws governing how cameras can be used in public places. Surveillance can be used by parents to control children, by community members over their neighbours, managers over their employees, and the government over its citizens. We reveal personal information through participation in social networking sites, job application websites, e-commerce transactions, and online bookings. He argues we shouldn"t totally get rid of surveillance as it helps with crime investigation, but we should find a balance between electronic surveillance and the protection of citizens" fundamental human rights and privacy. There many types of surveillance including audio (phone tapping and listening devices), visual (in-car, video devices, hidden video surveillance, and cctv, tracking surveillance (gps), data through mobile phones, computers, internet, and keystroke monitoring. Surveillance is an instrument used by authorities to monitor and manage the activities of its citizenry. Similarly, marketing firms use social media tech to collect data about individuals, violating their privacy.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents