SlideShare a Scribd company logo
INTRODUCTION
When you think of surveillance, you may picture two police
officers camped out in an unmarked car, watching the comings
and goings at a suspect’s apartment building. Or you may
imagine an investigator trailing a car on the highway or tapping
a suspect’s phone to listen in on potentially incriminating
conversations. Surveillance is all these activities, but in the 21st
century, it is also much more.
Consider video surveillance of local businesses, streets, and
highways; cell phone data; and the reams and reams of digital
information gathered on everyday activities—from social media
and computer use to credit card transactions.
This week, you analyze concerns related to this new era of
surveillance, such as privacy and legal requirements.
LEARNING OBJECTIVES
Students will:
Analyze issues related to privacy and surveillance
Describe surveillance
Differentiate between legal and illegal surveillance
Analyze legal requirements for conducting surveillance
PRIVACY VERSUS PUBLIC SAFETY
The average citizen today may feel as though they are
constantly being watched and their actions recorded. And
perhaps rightly so. After all, social media sites market
personalized products based on how you use the Internet, cell
phones pinpoint your location, and fitness trackers transmit
your health and fitness activities to the cloud. This sense of
being “spied on,” however, does not negate the important use of
surveillance techniques in solving and preventing crime.
For this Discussion, you analyze how to balance two sometimes
opposing sides in surveillance work: the expectation of privacy
and the goal of public safety.
RESOURCES
Be sure to review the Learning Resources before completing
this activity.
YOU WILL FIND THE READING FOR THIS ASSIGNMENT
IN THE ATTACHED READING MATERIALS PLEASE GO
THERE AND READ BEFORE TRYING TO COMPLETE THIS
ASSIGNMENT SO YOU WILL UNDERSTAND WHAT IS
NEEDED TO COMPLETE THE WORK….
Post a response to the following:
When conducting surveillance, explain how to balance an
expectation of citizen privacy with legitimate investigative
procedure that has public safety as its goal.
Explain whether citizens should differentiate between
government intrusion and private companies who use citizens’
online data to surveil their movements and activity.
INTRODUCTIONWhen you think of surveillance, you may picture tw.docx

More Related Content

Similar to INTRODUCTIONWhen you think of surveillance, you may picture tw.docx

[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things
Altimeter, a Prophet Company
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future Agenda
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
SocialKwan
 
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsBCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 Threats
Gareth Niblett
 
1. When drug prices increase at a faster rate than inflation, the .docx
1. When drug prices increase at a faster rate than inflation, the .docx1. When drug prices increase at a faster rate than inflation, the .docx
1. When drug prices increase at a faster rate than inflation, the .docx
robert345678
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
waiforchi Wagiteerhh
 
The Internet of Things to 2020 (GSA white paper, October 2015)
The Internet of Things to 2020 (GSA white paper, October 2015)The Internet of Things to 2020 (GSA white paper, October 2015)
The Internet of Things to 2020 (GSA white paper, October 2015)
Global mobile Suppliers Association (GSA)
 
Public Surveillance In The USA Essay
Public Surveillance In The USA EssayPublic Surveillance In The USA Essay
Public Surveillance In The USA Essay
Winstina Kennedy
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
Ulf Mattsson
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
webb00704
 
Three things to know about mobile marketing
Three things to know about mobile marketingThree things to know about mobile marketing
Three things to know about mobile marketing
KPWriterMarketing
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010Twittercrisis
 
Digital Engineering: Combining Computer Science with Social Science to Transl...
Digital Engineering: Combining Computer Science with Social Science to Transl...Digital Engineering: Combining Computer Science with Social Science to Transl...
Digital Engineering: Combining Computer Science with Social Science to Transl...
Cognizant
 
CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015Jörn Weber
 
Guiding the Climb to Technological Competence
Guiding the Climb to Technological CompetenceGuiding the Climb to Technological Competence
Guiding the Climb to Technological Competence
Nathaniel Russell
 
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docxI. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
wilcockiris
 
Ericsson ConsumerLab: Personal Information Economy
   Ericsson ConsumerLab: Personal Information Economy   Ericsson ConsumerLab: Personal Information Economy
Ericsson ConsumerLab: Personal Information Economy
Ericsson
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
i4box Anon
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
The Center for Identity
 

Similar to INTRODUCTIONWhen you think of surveillance, you may picture tw.docx (20)

[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
 
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsBCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 Threats
 
1. When drug prices increase at a faster rate than inflation, the .docx
1. When drug prices increase at a faster rate than inflation, the .docx1. When drug prices increase at a faster rate than inflation, the .docx
1. When drug prices increase at a faster rate than inflation, the .docx
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
The Internet of Things to 2020 (GSA white paper, October 2015)
The Internet of Things to 2020 (GSA white paper, October 2015)The Internet of Things to 2020 (GSA white paper, October 2015)
The Internet of Things to 2020 (GSA white paper, October 2015)
 
Public Surveillance In The USA Essay
Public Surveillance In The USA EssayPublic Surveillance In The USA Essay
Public Surveillance In The USA Essay
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
Three things to know about mobile marketing
Three things to know about mobile marketingThree things to know about mobile marketing
Three things to know about mobile marketing
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010
 
Digital Engineering: Combining Computer Science with Social Science to Transl...
Digital Engineering: Combining Computer Science with Social Science to Transl...Digital Engineering: Combining Computer Science with Social Science to Transl...
Digital Engineering: Combining Computer Science with Social Science to Transl...
 
CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015
 
Guiding the Climb to Technological Competence
Guiding the Climb to Technological CompetenceGuiding the Climb to Technological Competence
Guiding the Climb to Technological Competence
 
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docxI. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
 
Ericsson ConsumerLab: Personal Information Economy
   Ericsson ConsumerLab: Personal Information Economy   Ericsson ConsumerLab: Personal Information Economy
Ericsson ConsumerLab: Personal Information Economy
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 

More from pauline234567

Journeys of Paul REL3034.E1Assignment OneWrite about half.docx
Journeys of Paul  REL3034.E1Assignment OneWrite about half.docxJourneys of Paul  REL3034.E1Assignment OneWrite about half.docx
Journeys of Paul REL3034.E1Assignment OneWrite about half.docx
pauline234567
 
JW House FundraiserJourney Through the Enchanted Forest Ga.docx
JW House FundraiserJourney Through the Enchanted Forest Ga.docxJW House FundraiserJourney Through the Enchanted Forest Ga.docx
JW House FundraiserJourney Through the Enchanted Forest Ga.docx
pauline234567
 
JP Morgan Chase The Balance Between Serving Customers and Maxim.docx
JP Morgan Chase The Balance Between Serving Customers and Maxim.docxJP Morgan Chase The Balance Between Serving Customers and Maxim.docx
JP Morgan Chase The Balance Between Serving Customers and Maxim.docx
pauline234567
 
Interpret a Current Policy of Three CountriesInstructionsAs .docx
Interpret a Current Policy of Three CountriesInstructionsAs .docxInterpret a Current Policy of Three CountriesInstructionsAs .docx
Interpret a Current Policy of Three CountriesInstructionsAs .docx
pauline234567
 
Interviews and Eyewitness Identifications AP PhotoMat.docx
Interviews and Eyewitness Identifications AP PhotoMat.docxInterviews and Eyewitness Identifications AP PhotoMat.docx
Interviews and Eyewitness Identifications AP PhotoMat.docx
pauline234567
 
Interview Presentation QuestionsTo prepare · I.docx
Interview Presentation QuestionsTo prepare         · I.docxInterview Presentation QuestionsTo prepare         · I.docx
Interview Presentation QuestionsTo prepare · I.docx
pauline234567
 
INT 220 Business Brief Template Course Project.docx
INT 220 Business Brief Template Course Project.docxINT 220 Business Brief Template Course Project.docx
INT 220 Business Brief Template Course Project.docx
pauline234567
 
Instructor Name Point Value 30Student NameCATEGORY .docx
Instructor Name Point Value 30Student NameCATEGORY .docxInstructor Name Point Value 30Student NameCATEGORY .docx
Instructor Name Point Value 30Student NameCATEGORY .docx
pauline234567
 
InstructionsThere are two high-level types of distribution cha.docx
InstructionsThere are two high-level types of distribution cha.docxInstructionsThere are two high-level types of distribution cha.docx
InstructionsThere are two high-level types of distribution cha.docx
pauline234567
 
InstructionsNOTE If you have already reviewed this presentation.docx
InstructionsNOTE If you have already reviewed this presentation.docxInstructionsNOTE If you have already reviewed this presentation.docx
InstructionsNOTE If you have already reviewed this presentation.docx
pauline234567
 
InstructionsA SWOT analysis is used as a strategic planning tech.docx
InstructionsA SWOT analysis is used as a strategic planning tech.docxInstructionsA SWOT analysis is used as a strategic planning tech.docx
InstructionsA SWOT analysis is used as a strategic planning tech.docx
pauline234567
 
InstructionsRead two of your colleagues’ postings from the Di.docx
InstructionsRead two of your colleagues’ postings from the Di.docxInstructionsRead two of your colleagues’ postings from the Di.docx
InstructionsRead two of your colleagues’ postings from the Di.docx
pauline234567
 
InstructionsRespond to your colleagues. Respond with a comment .docx
InstructionsRespond to your colleagues. Respond with a comment .docxInstructionsRespond to your colleagues. Respond with a comment .docx
InstructionsRespond to your colleagues. Respond with a comment .docx
pauline234567
 
InstructionsProcurement Outsourcing (PO) StrategiesPO strat.docx
InstructionsProcurement Outsourcing (PO) StrategiesPO strat.docxInstructionsProcurement Outsourcing (PO) StrategiesPO strat.docx
InstructionsProcurement Outsourcing (PO) StrategiesPO strat.docx
pauline234567
 
InstructionsPart Four of Applied Final Project,Playing with Ge.docx
InstructionsPart Four of Applied Final Project,Playing with Ge.docxInstructionsPart Four of Applied Final Project,Playing with Ge.docx
InstructionsPart Four of Applied Final Project,Playing with Ge.docx
pauline234567
 
InstructionsClients come to MFTs because they want to change, .docx
InstructionsClients come to MFTs because they want to change, .docxInstructionsClients come to MFTs because they want to change, .docx
InstructionsClients come to MFTs because they want to change, .docx
pauline234567
 
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docxINST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
pauline234567
 
Insert Prename, Surname of all studentsWinter Term 202223Theo.docx
Insert Prename, Surname of all studentsWinter Term 202223Theo.docxInsert Prename, Surname of all studentsWinter Term 202223Theo.docx
Insert Prename, Surname of all studentsWinter Term 202223Theo.docx
pauline234567
 
Informative SpeechCourse COM103 Public SpeakingCriteria.docx
Informative SpeechCourse COM103 Public SpeakingCriteria.docxInformative SpeechCourse COM103 Public SpeakingCriteria.docx
Informative SpeechCourse COM103 Public SpeakingCriteria.docx
pauline234567
 
Information Technology and Organizational Learning .docx
Information Technology and Organizational Learning .docxInformation Technology and Organizational Learning .docx
Information Technology and Organizational Learning .docx
pauline234567
 

More from pauline234567 (20)

Journeys of Paul REL3034.E1Assignment OneWrite about half.docx
Journeys of Paul  REL3034.E1Assignment OneWrite about half.docxJourneys of Paul  REL3034.E1Assignment OneWrite about half.docx
Journeys of Paul REL3034.E1Assignment OneWrite about half.docx
 
JW House FundraiserJourney Through the Enchanted Forest Ga.docx
JW House FundraiserJourney Through the Enchanted Forest Ga.docxJW House FundraiserJourney Through the Enchanted Forest Ga.docx
JW House FundraiserJourney Through the Enchanted Forest Ga.docx
 
JP Morgan Chase The Balance Between Serving Customers and Maxim.docx
JP Morgan Chase The Balance Between Serving Customers and Maxim.docxJP Morgan Chase The Balance Between Serving Customers and Maxim.docx
JP Morgan Chase The Balance Between Serving Customers and Maxim.docx
 
Interpret a Current Policy of Three CountriesInstructionsAs .docx
Interpret a Current Policy of Three CountriesInstructionsAs .docxInterpret a Current Policy of Three CountriesInstructionsAs .docx
Interpret a Current Policy of Three CountriesInstructionsAs .docx
 
Interviews and Eyewitness Identifications AP PhotoMat.docx
Interviews and Eyewitness Identifications AP PhotoMat.docxInterviews and Eyewitness Identifications AP PhotoMat.docx
Interviews and Eyewitness Identifications AP PhotoMat.docx
 
Interview Presentation QuestionsTo prepare · I.docx
Interview Presentation QuestionsTo prepare         · I.docxInterview Presentation QuestionsTo prepare         · I.docx
Interview Presentation QuestionsTo prepare · I.docx
 
INT 220 Business Brief Template Course Project.docx
INT 220 Business Brief Template Course Project.docxINT 220 Business Brief Template Course Project.docx
INT 220 Business Brief Template Course Project.docx
 
Instructor Name Point Value 30Student NameCATEGORY .docx
Instructor Name Point Value 30Student NameCATEGORY .docxInstructor Name Point Value 30Student NameCATEGORY .docx
Instructor Name Point Value 30Student NameCATEGORY .docx
 
InstructionsThere are two high-level types of distribution cha.docx
InstructionsThere are two high-level types of distribution cha.docxInstructionsThere are two high-level types of distribution cha.docx
InstructionsThere are two high-level types of distribution cha.docx
 
InstructionsNOTE If you have already reviewed this presentation.docx
InstructionsNOTE If you have already reviewed this presentation.docxInstructionsNOTE If you have already reviewed this presentation.docx
InstructionsNOTE If you have already reviewed this presentation.docx
 
InstructionsA SWOT analysis is used as a strategic planning tech.docx
InstructionsA SWOT analysis is used as a strategic planning tech.docxInstructionsA SWOT analysis is used as a strategic planning tech.docx
InstructionsA SWOT analysis is used as a strategic planning tech.docx
 
InstructionsRead two of your colleagues’ postings from the Di.docx
InstructionsRead two of your colleagues’ postings from the Di.docxInstructionsRead two of your colleagues’ postings from the Di.docx
InstructionsRead two of your colleagues’ postings from the Di.docx
 
InstructionsRespond to your colleagues. Respond with a comment .docx
InstructionsRespond to your colleagues. Respond with a comment .docxInstructionsRespond to your colleagues. Respond with a comment .docx
InstructionsRespond to your colleagues. Respond with a comment .docx
 
InstructionsProcurement Outsourcing (PO) StrategiesPO strat.docx
InstructionsProcurement Outsourcing (PO) StrategiesPO strat.docxInstructionsProcurement Outsourcing (PO) StrategiesPO strat.docx
InstructionsProcurement Outsourcing (PO) StrategiesPO strat.docx
 
InstructionsPart Four of Applied Final Project,Playing with Ge.docx
InstructionsPart Four of Applied Final Project,Playing with Ge.docxInstructionsPart Four of Applied Final Project,Playing with Ge.docx
InstructionsPart Four of Applied Final Project,Playing with Ge.docx
 
InstructionsClients come to MFTs because they want to change, .docx
InstructionsClients come to MFTs because they want to change, .docxInstructionsClients come to MFTs because they want to change, .docx
InstructionsClients come to MFTs because they want to change, .docx
 
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docxINST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
 
Insert Prename, Surname of all studentsWinter Term 202223Theo.docx
Insert Prename, Surname of all studentsWinter Term 202223Theo.docxInsert Prename, Surname of all studentsWinter Term 202223Theo.docx
Insert Prename, Surname of all studentsWinter Term 202223Theo.docx
 
Informative SpeechCourse COM103 Public SpeakingCriteria.docx
Informative SpeechCourse COM103 Public SpeakingCriteria.docxInformative SpeechCourse COM103 Public SpeakingCriteria.docx
Informative SpeechCourse COM103 Public SpeakingCriteria.docx
 
Information Technology and Organizational Learning .docx
Information Technology and Organizational Learning .docxInformation Technology and Organizational Learning .docx
Information Technology and Organizational Learning .docx
 

Recently uploaded

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 

Recently uploaded (20)

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 

INTRODUCTIONWhen you think of surveillance, you may picture tw.docx

  • 1. INTRODUCTION When you think of surveillance, you may picture two police officers camped out in an unmarked car, watching the comings and goings at a suspect’s apartment building. Or you may imagine an investigator trailing a car on the highway or tapping a suspect’s phone to listen in on potentially incriminating conversations. Surveillance is all these activities, but in the 21st century, it is also much more. Consider video surveillance of local businesses, streets, and highways; cell phone data; and the reams and reams of digital information gathered on everyday activities—from social media and computer use to credit card transactions. This week, you analyze concerns related to this new era of surveillance, such as privacy and legal requirements. LEARNING OBJECTIVES Students will: Analyze issues related to privacy and surveillance Describe surveillance Differentiate between legal and illegal surveillance Analyze legal requirements for conducting surveillance PRIVACY VERSUS PUBLIC SAFETY
  • 2. The average citizen today may feel as though they are constantly being watched and their actions recorded. And perhaps rightly so. After all, social media sites market personalized products based on how you use the Internet, cell phones pinpoint your location, and fitness trackers transmit your health and fitness activities to the cloud. This sense of being “spied on,” however, does not negate the important use of surveillance techniques in solving and preventing crime. For this Discussion, you analyze how to balance two sometimes opposing sides in surveillance work: the expectation of privacy and the goal of public safety. RESOURCES Be sure to review the Learning Resources before completing this activity. YOU WILL FIND THE READING FOR THIS ASSIGNMENT IN THE ATTACHED READING MATERIALS PLEASE GO THERE AND READ BEFORE TRYING TO COMPLETE THIS ASSIGNMENT SO YOU WILL UNDERSTAND WHAT IS NEEDED TO COMPLETE THE WORK…. Post a response to the following: When conducting surveillance, explain how to balance an expectation of citizen privacy with legitimate investigative procedure that has public safety as its goal. Explain whether citizens should differentiate between government intrusion and private companies who use citizens’ online data to surveil their movements and activity.