The Role of Computers in Surveillance - PowerPoint PPT Presentation

About This Presentation
Title:

The Role of Computers in Surveillance

Description:

Red light cameras used to increase profit. Cameras don't prevent accidents ... Information from red light cameras can be used for other purposes ... – PowerPoint PPT presentation

Number of Views:12
Avg rating:3.0/5.0
Slides: 11
Provided by: Kat8226
Learn more at: https://www.ecs.csun.edu
Category:

less

Transcript and Presenter's Notes

Title: The Role of Computers in Surveillance


1
  • The Role of Computers in Surveillance
  • Katie Hatland

2
Background
  • Types of Surveillance
  • Red light cameras
  • Photographic or video data
  • Located at intersections
  • Used to catch and prevent vehicles from running
    red lights

3
Background
  • Types of Surveillance
  • Biometric
  • Physical and behavioral characteristics of people
  • Would be integrated into all aspects of daily
    activities
  • Used for identification, verification, and
    screening

4
Background
  • Before Computers
  • Physical presence of police necessary
  • Continuous monitoring not practical
  • Waste of resources

5
Ethical Issues
  • Safety vs. Profit
  • Red light cameras used to increase profit
  • Cameras dont prevent accidents
  • Cameras actually cause accidents

6
Ethical Issues
  • Privacy
  • Information from red light cameras can be used
    for other purposes
  • Biometric data stores too much information on
    individuals
  • Protection on who is able to access information
  • Certain groups will be targets

7
Conclusion
  • Computers have made it possible to
  • Easily store and access information
  • Reduce human characteristics to numeric codes
  • Monitor activity as a means of protection and law
    enforcement

8
(No Transcript)
9
History of Impact
  • Current Technology
  • Red light cameras use digital photographs and
    video recordings
  • Collection and maintenance is less expensive
  • Biometric uses fingerprinting, handwriting, and
    iris recognition
  • Used in some banks for verifying identity

10
History of Impact
  • Future Technology
  • Biometric data to monitor for suspicious behavior
  • Would replace passwords
Write a Comment
User Comments (0)
About PowerShow.com