Verified Document

Video Surveillance In Today's Highly Term Paper

Furthermore, the study found that the systems could easily be compromised by alterations in weight, hair color, sunglasses, and even weather and lighting alterations (McCullagh & Zarate, 2002). Additionally, behavioral recognition software can often incorrectly identify movements, such as tree branches, and follow those objects instead of actual suspicious movement occurring at the same time (Surveillance-Source, 2005). Even in spite of these weaknesses, there are numerous opportunities for growth in this particular industry. As companies such as "Spying Eye Surveillance" has noted, the highest area of growth is that of digital video surveillance. According to estimates, this particular area of the industry is set to grow at a 55% compound annual growth rate between 2003 and 2007. In terms on monetary growth opportunity, this field is estimated to grow to over 7.4 billion dollars, globally, due to heightened awareness in security, the overall return on investment in digital surveillance, and new IP solutions. In particular, this niche dominates in North and South America, where digital surveillance software and technology makes up almost 55% of the market share (DataMonitor, 2004).

Within this digital niche, perhaps the area with the most opportunity for growth is the retail industry, simply because of the sheer number of retail outlets in need of surveillance (DataMonitor, 2004). "Spying Eye Surveillance" alone notes over 1000 installed and operating surveillance systems they are responsible for in southern California. Considering this company is a very individualized service, with careful consideration of the intent of management and specialized setups, this speaks volumes for the need in this field. While this type of company specializes in personal development, others simply sell the hardware and software, allowing individual business owners to install and control the surveillance equipment themselves.

However, in spite of the growth and potential in this industry, there are certainly ramifications and threats from technological and legal standpoints. From a legal standpoint, the most often cited issue deals with the Fourth Amendment right to privacy. Hundreds of cases have come before local, state, and federal courts regarding this issue and all sides appear to have very different ideas of what constitutes a violation of privacy, in relation to video surveillance. For example, in cases of workplace surveillance, most courts hold to the concept that employees in a place of business should hold no expectation of privacy, since their employers have a vested and rightful interest in any activity occurring in the public work area. Video surveillance of public parks and streets has again often found support in the courts, since these are areas of public places, and generally do not fall under reasonable expectations of privacy (Hatcher, 2001).

However, in other cases, the issues are not as clear. For example, in the Virginia Court of Appeals in 1999, a man's conviction for using a spy camera to videotape underneath women's dresses on a public fairground was overturned, with the note that no expectation of privacy should have been held by the women. In this case, the local court's belief that this type of surveillance violated the Fourth Amendment obviously did not agree with the opinions of the State court (Hatcher, 2001). Additional cases have been noted both in favor of and against the placement of video surveillance in such places as fitting rooms and school locker rooms.

Another legal issue relating to this growing industry is the lack of current regulations regarding limits to the use of hidden cameras and video surveillance in general. Currently, very few federal or state regulations cover such issues, and often, when Bills are presented which would deal with these ramifications, they are postponed due to opponents, such as labor unions or conversely, business communities. While most agree that legislation should exist regarding the notification of individuals that cameras are present, such legislation would be difficult, and costly, to enforce.

Additional concerns exist surrounding the use of video surveillance technology in governmental...

Often these agencies are seen as unregulated, and as such, have many opportunities to abuse the quickly advancing technologies available in this industry. Current technologies would allow for remote video surveillance from orbital satellites, for example, which would be difficult for the pubic in general to monitor. Further, many industry analysts note that video surveillance technologies which would allow cameras to "see" through clothing and listen in on conversations within private homes up to 60 feet away are not far off (Pompano, 2000). As these technologies increase, the chances for abuse also increase.
There can be no question that the field of video surveillance technology is one of the most important and rapidly advancing industries in today's society. The benefits of such products, such as crime solving, protection, determent, and loss prevention are clear and vital in today's business world. New technologies such as facial recognition and behavioral perception could easily enhance these already existing positive aspects of video surveillance. At the same time, however, the possibilities for abuse are equally clear. While Orwell's novel 1984 was, at the time, a vision into the future that was unlikely, the idea that government entities, public citizens, or businesses can use video surveillance at their leisure and often while still within the boundaries of the law is a frightening reality.

With proper legislation, video surveillance really can improve the safety and health of almost any community. As with any technology, however, careful consideration must be placed on both the positive and negative outcomes of the decision to implement such strategies. As companies such as "Spying Eye Surveillance," increase, and as technological abilities increase, these issues will rise to the forefront of today's business, governmental, and legal societies, and will undoubtedly alter the course of the future for many generations to come.

References

Davies, S. (1996). Big brother: Britain's web of surveillance and the new technological order. London, England: Pan Books.

Hatcher, C. (2001). Silent video surveillance in the absence of probable cause - A brief legal checklist. Southern California Interdisciplinary Law Journal, 29, 9-25.

Marx, G. (1995). Electric eye in the sky: Some reflections of the new surveillance and popular culture. In J. Ferrell and R. Sanders (Ed.), Cultural criminology. Boston, MA: North Eastern University Press.

McCullagh, D. & Zarate, R. (2002, Feb. 16). Scanning tech a blurry picture. Wired News. Retrieved October 26, 2005 from Wired. Web site: http://www.wired.com/news/print/0,1294,50470,00.html.

Norris, C., & Armstrong, G. (1999). The maximum surveillance society: The rise of CCTV. New York, NY: Berg.

Pompano, A. (2000). Privacy in the age of video surveillance: This is not your father's candid camera. Retrieved October 26, 2005 from Yale-New Haven Teacher's Institute. Web site: http://www.yale.edu/ynhti/curriculum/units/2000/3/00.03.05.x.html#g.

Privacy International. (2003). Privacy and human rights 2003: Threats to privacy. Washington, D.C.: Electronic Privacy Information Center.

Shandle, J. (2005, Feb 10). Digital video surveillance integrates many technologies. TechOnline. Retrieved Oct 26, 2005 from TechOnline. Website: http://developonline.com/community/tech_group/comm/feature_article/37613.

Siegel, N. (1998). NYC surveillance camera project. Retrieved October 26, 2005 from NYC Surveillance Camera Project website. Web site: http://www.mediaeater.com/cameras/.

Spying Eye Surveillance, Inc. (2005). Home Page. Retrieved October 26, 2005 from Spying Eye Surveillance, Inc. Web site: http://www.spyingeyeinc.com.

Surveillance Source. (2005). Video surveillance software. Retrieved October 26, 2005 from Surveillance-Source. Web site: http://www.surveillance-source.com/Video_Surveillance_Software.htm.

Technical Insights. (2004, June). Market trends and key findings. Security Technology -- North American trends and developments in video surveillance. Farmington, CT: Global Information Inc.

Sources used in this document:
References

Davies, S. (1996). Big brother: Britain's web of surveillance and the new technological order. London, England: Pan Books.

Hatcher, C. (2001). Silent video surveillance in the absence of probable cause - A brief legal checklist. Southern California Interdisciplinary Law Journal, 29, 9-25.

Marx, G. (1995). Electric eye in the sky: Some reflections of the new surveillance and popular culture. In J. Ferrell and R. Sanders (Ed.), Cultural criminology. Boston, MA: North Eastern University Press.

McCullagh, D. & Zarate, R. (2002, Feb. 16). Scanning tech a blurry picture. Wired News. Retrieved October 26, 2005 from Wired. Web site: http://www.wired.com/news/print/0,1294,50470,00.html.
Pompano, A. (2000). Privacy in the age of video surveillance: This is not your father's candid camera. Retrieved October 26, 2005 from Yale-New Haven Teacher's Institute. Web site: http://www.yale.edu/ynhti/curriculum/units/2000/3/00.03.05.x.html#g.
Shandle, J. (2005, Feb 10). Digital video surveillance integrates many technologies. TechOnline. Retrieved Oct 26, 2005 from TechOnline. Website: http://developonline.com/community/tech_group/comm/feature_article/37613.
Siegel, N. (1998). NYC surveillance camera project. Retrieved October 26, 2005 from NYC Surveillance Camera Project website. Web site: http://www.mediaeater.com/cameras/.
Spying Eye Surveillance, Inc. (2005). Home Page. Retrieved October 26, 2005 from Spying Eye Surveillance, Inc. Web site: http://www.spyingeyeinc.com.
Surveillance Source. (2005). Video surveillance software. Retrieved October 26, 2005 from Surveillance-Source. Web site: http://www.surveillance-source.com/Video_Surveillance_Software.htm.
Cite this Document:
Copy Bibliography Citation

Related Documents

Tracking and Surveillance Watch Closely:
Words: 1527 Length: 5 Document Type: Term Paper

For the former, the cellular provider (as mandated by a court order) forwards information from the site of the phone to law enforcement authorities, allowing these authorities to fixate the location of a subject and to proceed accordingly. For the latter, an audio device consisting of a transmitter, antennae and power source is attached to a person to relay interactive surveillance in a manner which is highly covert. No

Restaurant Industry Is a Highly
Words: 12333 Length: 45 Document Type: Dissertation

According to Brech, these trends do not leave much time -- or money -- available for dining at full-service restaurants. In this study, the respondents "reported their families ate at cafeterias, family or chain restaurants, or fine dining restaurants only once or less each week" (Brech 1998: 21). This is not to say, though, that the number of full-service restaurants in countries such as the United States has declined

Married, Daphne Built a Highly
Words: 4047 Length: 13 Document Type: Term Paper

The need to save face does not bring people to the bargaining table, the need to resolve a dispute or issue does (Fisher and Ury, 1991). Positional bargaining does have advocates. In the case where the parties interests may interfere with their resolving the issues, positional bargaining may be preferred. Issues are deemed to be universal and party specific. Interests are party specific and will vary from case to case.

Government Surveillance of the American People
Words: 3194 Length: 10 Document Type: Term Paper

Big Brother Watches America When Orson Wells wrote his famous novel about government surveillance taken to the extreme, the world he described seemed very unrealistic. However, at the turn of the new millenium, the world that he describes is not so different and it seems as if we are just one step away from the "thought police" knocking on the door. For some this gives them an extra-added element of

Speech Symposium Dear Today You
Words: 4047 Length: 15 Document Type: Term Paper

The federal workforce, U.S. federal government agency workforces are based on equal opportunity and promotions are on merit principles. (Starks, 2009) Thus we have Asians and Pacific Islanders well-represented in private sector professional positions (8.9%) and in government positions (4.8%) considering they made up 3.7% of the general population." (Starks, 2009) Another issue you are going to face is the gender issues. In the U.S. too it was an issue

Workplace Monitoring
Words: 1629 Length: 5 Document Type: Term Paper

Workplace Monitoring As technology advances, employers worldwide are faced with the problem of employee's ill usage of the communication media. In order to reduce these risks, employers are now turning towards technology monitoring, which would enable them to keep a strict watch over their employees. A lot of issues have risen, as a result of workplace monitoring and the debate whether this act of the employers is ethically correct or not

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now