Verified Document

Video Surveillance In Today's Highly Term Paper

Furthermore, the study found that the systems could easily be compromised by alterations in weight, hair color, sunglasses, and even weather and lighting alterations (McCullagh & Zarate, 2002). Additionally, behavioral recognition software can often incorrectly identify movements, such as tree branches, and follow those objects instead of actual suspicious movement occurring at the same time (Surveillance-Source, 2005). Even in spite of these weaknesses, there are numerous opportunities for growth in this particular industry. As companies such as "Spying Eye Surveillance" has noted, the highest area of growth is that of digital video surveillance. According to estimates, this particular area of the industry is set to grow at a 55% compound annual growth rate between 2003 and 2007. In terms on monetary growth opportunity, this field is estimated to grow to over 7.4 billion dollars, globally, due to heightened awareness in security, the overall return on investment in digital surveillance, and new IP solutions. In particular, this niche dominates in North and South America, where digital surveillance software and technology makes up almost 55% of the market share (DataMonitor, 2004).

Within this digital niche, perhaps the area with the most opportunity for growth is the retail industry, simply because of the sheer number of retail outlets in need of surveillance (DataMonitor, 2004). "Spying Eye Surveillance" alone notes over 1000 installed and operating surveillance systems they are responsible for in southern California. Considering this company is a very individualized service, with careful consideration of the intent of management and specialized setups, this speaks volumes for the need in this field. While this type of company specializes in personal development, others simply sell the hardware and software, allowing individual business owners to install and control the surveillance equipment themselves.

However, in spite of the growth and potential in this industry, there are certainly ramifications and threats from technological and legal standpoints. From a legal standpoint, the most often cited issue deals with the Fourth Amendment right to privacy. Hundreds of cases have come before local, state, and federal courts regarding this issue and all sides appear to have very different ideas of what constitutes a violation of privacy, in relation to video surveillance. For example, in cases of workplace surveillance, most courts hold to the concept that employees in a place of business should hold no expectation of privacy, since their employers have a vested and rightful interest in any activity occurring in the public work area. Video surveillance of public parks and streets has again often found support in the courts, since these are areas of public places, and generally do not fall under reasonable expectations of privacy (Hatcher, 2001).

However, in other cases, the issues are not as clear. For example, in the Virginia Court of Appeals in 1999, a man's conviction for using a spy camera to videotape underneath women's dresses on a public fairground was overturned, with the note that no expectation of privacy should have been held by the women. In this case, the local court's belief that this type of surveillance violated the Fourth Amendment obviously did not agree with the opinions of the State court (Hatcher, 2001). Additional cases have been noted both in favor of and against the placement of video surveillance in such places as fitting rooms and school locker rooms.

Another legal issue relating to this growing industry is the lack of current regulations regarding limits to the use of hidden cameras and video surveillance in general. Currently, very few federal or state regulations cover such issues, and often, when Bills are presented which would deal with these ramifications, they are postponed due to opponents, such as labor unions or conversely, business communities. While most agree that legislation should exist regarding the notification of individuals that cameras are present, such legislation would be difficult, and costly, to enforce.

Additional concerns exist surrounding the use of video surveillance technology in governmental...

Parts of this document are hidden

View Full Document
svg-one

Often these agencies are seen as unregulated, and as such, have many opportunities to abuse the quickly advancing technologies available in this industry. Current technologies would allow for remote video surveillance from orbital satellites, for example, which would be difficult for the pubic in general to monitor. Further, many industry analysts note that video surveillance technologies which would allow cameras to "see" through clothing and listen in on conversations within private homes up to 60 feet away are not far off (Pompano, 2000). As these technologies increase, the chances for abuse also increase.
There can be no question that the field of video surveillance technology is one of the most important and rapidly advancing industries in today's society. The benefits of such products, such as crime solving, protection, determent, and loss prevention are clear and vital in today's business world. New technologies such as facial recognition and behavioral perception could easily enhance these already existing positive aspects of video surveillance. At the same time, however, the possibilities for abuse are equally clear. While Orwell's novel 1984 was, at the time, a vision into the future that was unlikely, the idea that government entities, public citizens, or businesses can use video surveillance at their leisure and often while still within the boundaries of the law is a frightening reality.

With proper legislation, video surveillance really can improve the safety and health of almost any community. As with any technology, however, careful consideration must be placed on both the positive and negative outcomes of the decision to implement such strategies. As companies such as "Spying Eye Surveillance," increase, and as technological abilities increase, these issues will rise to the forefront of today's business, governmental, and legal societies, and will undoubtedly alter the course of the future for many generations to come.

References

Davies, S. (1996). Big brother: Britain's web of surveillance and the new technological order. London, England: Pan Books.

Hatcher, C. (2001). Silent video surveillance in the absence of probable cause - A brief legal checklist. Southern California Interdisciplinary Law Journal, 29, 9-25.

Marx, G. (1995). Electric eye in the sky: Some reflections of the new surveillance and popular culture. In J. Ferrell and R. Sanders (Ed.), Cultural criminology. Boston, MA: North Eastern University Press.

McCullagh, D. & Zarate, R. (2002, Feb. 16). Scanning tech a blurry picture. Wired News. Retrieved October 26, 2005 from Wired. Web site: http://www.wired.com/news/print/0,1294,50470,00.html.

Norris, C., & Armstrong, G. (1999). The maximum surveillance society: The rise of CCTV. New York, NY: Berg.

Pompano, A. (2000). Privacy in the age of video surveillance: This is not your father's candid camera. Retrieved October 26, 2005 from Yale-New Haven Teacher's Institute. Web site: http://www.yale.edu/ynhti/curriculum/units/2000/3/00.03.05.x.html#g.

Privacy International. (2003). Privacy and human rights 2003: Threats to privacy. Washington, D.C.: Electronic Privacy Information Center.

Shandle, J. (2005, Feb 10). Digital video surveillance integrates many technologies. TechOnline. Retrieved Oct 26, 2005 from TechOnline. Website: http://developonline.com/community/tech_group/comm/feature_article/37613.

Siegel, N. (1998). NYC surveillance camera project. Retrieved October 26, 2005 from NYC Surveillance Camera Project website. Web site: http://www.mediaeater.com/cameras/.

Spying Eye Surveillance, Inc. (2005). Home Page. Retrieved October 26, 2005 from Spying Eye Surveillance, Inc. Web site: http://www.spyingeyeinc.com.

Surveillance Source. (2005). Video surveillance software. Retrieved October 26, 2005 from Surveillance-Source. Web site: http://www.surveillance-source.com/Video_Surveillance_Software.htm.

Technical Insights. (2004, June). Market trends and key findings. Security Technology -- North American trends and developments in video surveillance. Farmington, CT: Global Information Inc.

Sources used in this document:
References

Davies, S. (1996). Big brother: Britain's web of surveillance and the new technological order. London, England: Pan Books.

Hatcher, C. (2001). Silent video surveillance in the absence of probable cause - A brief legal checklist. Southern California Interdisciplinary Law Journal, 29, 9-25.

Marx, G. (1995). Electric eye in the sky: Some reflections of the new surveillance and popular culture. In J. Ferrell and R. Sanders (Ed.), Cultural criminology. Boston, MA: North Eastern University Press.

McCullagh, D. & Zarate, R. (2002, Feb. 16). Scanning tech a blurry picture. Wired News. Retrieved October 26, 2005 from Wired. Web site: http://www.wired.com/news/print/0,1294,50470,00.html.
Pompano, A. (2000). Privacy in the age of video surveillance: This is not your father's candid camera. Retrieved October 26, 2005 from Yale-New Haven Teacher's Institute. Web site: http://www.yale.edu/ynhti/curriculum/units/2000/3/00.03.05.x.html#g.
Shandle, J. (2005, Feb 10). Digital video surveillance integrates many technologies. TechOnline. Retrieved Oct 26, 2005 from TechOnline. Website: http://developonline.com/community/tech_group/comm/feature_article/37613.
Siegel, N. (1998). NYC surveillance camera project. Retrieved October 26, 2005 from NYC Surveillance Camera Project website. Web site: http://www.mediaeater.com/cameras/.
Spying Eye Surveillance, Inc. (2005). Home Page. Retrieved October 26, 2005 from Spying Eye Surveillance, Inc. Web site: http://www.spyingeyeinc.com.
Surveillance Source. (2005). Video surveillance software. Retrieved October 26, 2005 from Surveillance-Source. Web site: http://www.surveillance-source.com/Video_Surveillance_Software.htm.
Cite this Document:
Copy Bibliography Citation

Related Documents

Surveillance Software Privacy Legislation and
Words: 656 Length: 2 Document Type: Article Review

Also, employees should be mindful of what they post on social networking sites, even if done from their home computer. Employers should always be aware of what is considered a reasonable expectation of privacy. In certain industries, workplace monitoring may be necessary so that the company can protect itself. In the case of an organization that deals with the well being of children, even with thorough background checks performed it

Surveillance Systems: Two Quantitative Methods
Words: 625 Length: 2 Document Type: Thesis

Then, the patient can receive free care or referrals to specialists from the doctor. GPs thus can provide comprehensive data regarding patients with a variety of conditions, from a wide range of demographic groups. Currently, 3,500 GP practices, encompassing a population of 23 million patients, contribute to the national QSurveillance database. The system is the largest and most regularly updated health tracking system in the world (National disease surveillance,

Surveillance and the Advantages And/or
Words: 654 Length: 2 Document Type: Term Paper

This has the advantage of showing the suspect in different profiles. But there have also been accusations that in-person lineups may be biased, if they present the suspect with persons who are not sufficiently 'like' the accused. Also, the use of double-blind presentations, where the officers conducting the lineup do no know who the suspect is, might be advisable to dilute the potential for biased or swayed eyewitness identification.

Surveillance Capitalism
Words: 2792 Length: 9 Document Type: Essay

In Part II of her book The Age of Surveillance Capitalism, Zuboff (2019) lays out how the advance of surveillance capitalism has unfolded and where it is headed.  In chapters 7 and 8, she makes two very important points—one practical and the other ideological—that necessarily serve as the framework for the advance of surveillance capitalism.  The practical point is this:  the world has become so immersed in the Internet that

Surveillance in Public Areas
Words: 691 Length: 2 Document Type: Essay

Cameras in Public PlacesQ1. List all the places you traveled this past week where you likely appeared on a closed-circuit television. Do you believe your environment was safer with CCTV? Explain?Over the course of the past week, I have been in stores had CCTV. Overall, I did not feel that these stores were high-risk environments to begin with. Arguably, this may have made the environments safer for the cashiers who

Law Enforcement and Surveillance
Words: 1260 Length: 3 Document Type: Essay

Surveillance - Types, Methods, When to Conduct on Terrorist Surveillance can simply be defined as the observations undertaken to obtain information. This simple description contains a wealth of methods and techniques that can be seen as forms of surveillance. Law enforcement officials can use a "roving" monitor to "follow" an individual and legally intercept that individual's communications with one court instruction. All UAV's function as midair surveillance podiums and have potent

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now