Question

Video surveillance can be an effective physical security control, but there are also many privacy concerns...

Video surveillance can be an effective physical security control, but there are also many privacy concerns that are raised when discussing video surveillance

When does video surveillance become too intrusive when used to control crime?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Video Surveillance is an effective tool and modern way of monitoring unethical/illegal/criminal activities in different sectors of industry like Bank,Hospital,School,Office,Government buildings etc.It is now a days used as a process for constant maintenance of vigilance over the people working in that area or the outsiders who visit the premises time and again. But it is also found that many times video surveillance effects the personal lives which directly/indirectly effects the privacy of the people. For example,we see in many schools there are CCTVs installed in school toilets to look over the higher class students so that they cannot break into adultery....In this case the innocent students may suffer harrasments.Just like CCTVs placed in the trial rooms of shopping malls and general stores.In this way this system of video surveillance becomes too intrusive sometimes when used to control crime.

Add a comment
Know the answer?
Add Answer to:
Video surveillance can be an effective physical security control, but there are also many privacy concerns...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Protecting Health Care Privacy The U.S. Health Insurance Portability and Accountability Act (HIPAA) addresses (among other...

    Protecting Health Care Privacy The U.S. Health Insurance Portability and Accountability Act (HIPAA) addresses (among other things) the privacy of health information. Its Title 2 regulates the use and disclosure of protected health information (PHI), such as billing services, by healthcare providers, insurance carriers, employers, and business associates Email is often the best way for a hospital to communicate with off-site specialists and insurance carriers about a patient. Unfortunately, standard email is insecure. It allows eavesdropping, later retrieval of messages...

  • Security Manufacturing, Inc. is a producer of surveillance systems. Its current line of surveillance systems are selling...

    Security Manufacturing, Inc. is a producer of surveillance systems. Its current line of surveillance systems are selling excellently. However, in order to cope with the foreseeable competition from other similar products, SM spent $6,400,000 to develop a new line of HD surveillance systems (new model development cost). The comprehensive 1440p HD surveillance system model can be used very well for any small home or business. As a result of the advanced HD analog technology made up of a 4-channel 4K...

  • Security Manufacturing, Inc. is a producer of surveillance systems. Its current line of surveillance systems...

    Security Manufacturing, Inc. is a producer of surveillance systems. Its current line of surveillance systems are selling excellently. However, in order to cope with the foreseeable competition from other similar products, SM spent $6,400,000 to develop a new line of HD surveillance systems (new model development cost). The comprehensive 1440p HD surveillance system model can be used very well for any small home or business. As a result of the advanced HD analog technology made up of a 4-channel 4K...

  • Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control...

    Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control assessor Information System Owner (ISO) Information Owner/Steward When making determinations regarding the adequacy of common controls for their respective systems, Information System Owner (ISO) refer to the Common Control Providers’ (CCP) Privacy Impact Assessment (PIA) Business Impact Analysis (BIA) Authorization Packages Vulnerability Scans An organization-wide approach to identifying common controls early in the Risk Management Framework (RMF) process does which of the following? Considers...

  • Case 2: Facebook and Google Privacy: What Privacy? In a 2010 interview, Mark Zuckerberg, the founder...

    Case 2: Facebook and Google Privacy: What Privacy? In a 2010 interview, Mark Zuckerberg, the founder of Facebook, proclaimed that the “age of privacy” had to come to an end. According to Zuckerberg, social norms had changed and people were no longer worried about sharing their personal information with friends, friends of friends, or even the entire Web. This view is in accordance with Facebook’s broader goal, which is, according to Zuckerberg, to make the world a more open and...

  • Task 3: Analysis of Case Study on Regulating Information Security for the Company: TransManuCo has asked for your help in dealing with securing their information while they remain within set regulatio...

    Task 3: Analysis of Case Study on Regulating Information Security for the Company: TransManuCo has asked for your help in dealing with securing their information while they remain within set regulations. In order to do business efficiently and effectively the company uses eSign. However, they have concerns about the security of this especially with clients overseas. According to the new Protecting Cyber Networks Act Sec. 103 “Permits private entities to monitor or operate defensive measures to prevent or mitigate cybersecurity...

  • Read the airport security control case posted under to answer the following questions. Everything you do...

    Read the airport security control case posted under to answer the following questions. Everything you do as an official at the Department of Homeland Security is about control. Your task is to maintain strict security standards at all U.S. airports, while also trying to keep things running smoothly and efficiently. As the training program you created repeats emphatically, and as recent events have demonstrated, just one slip, one small mistake, can quickly escalate into a disaster. It is your responsibility...

  • The company and union have had a bargaining relationship for more than 20 years. On July...

    The company and union have had a bargaining relationship for more than 20 years. On July 11, bargaining unit member Allan Engle was performing his assigned work duties of cleaning the bathroom on the second floor of the company's administrative building when he glanced up and observed a camera approximately 6 to 8 feet away located in an air vent and pointed directly at him. Engle reported his discovery to three other bargaining unit members, including union steward Luther Hall,...

  • I need your thoughts about this article. Pew Research recently reported that “roughly six-in-ten U.S. adults...

    I need your thoughts about this article. Pew Research recently reported that “roughly six-in-ten U.S. adults say they do not think it is possible to go through daily life without having data collected about them by companies or the government.” Andrew Hawn, my former colleague and now founder of MetaForesight, is a technology, media and content expert. Andrew has been collaborating with my analytic startup, Metametrix, and we recently spoke about privacy and its far-reaching implications. “We’re seeing a social...

  • Please explain how to do part (b), (c) and (d) only The PID control architecture might be popular, but that does not mean it can be used for everything. This question explores when the PID controller...

    Please explain how to do part (b), (c) and (d) only The PID control architecture might be popular, but that does not mean it can be used for everything. This question explores when the PID controller is (in)sufficient: when it is too much, when it is "goldilocks", and when it is not enough. Consider a plant given by P'(s)-SaAs n increases, so does the order of the system. (sta)" Let's consider three orders and how PID controller design works for...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT