The History Of The Surveillance Technologies Information Technology Essay

1.0 Introduction

Police identified a pack of teenage bullies through CCTV footage and progress facial function engineering ( Britton, 2010 ) .There are messages from eBay in my inbox stating “ We ‘ve missed you ” and offering price reductions and free transportation on the sort of points that I had browsed on eBay some clip back. Such cases compel persons to sense and happen ways to screen themselves from supervising for their personal penchants and information. In this epoch of advanced engineering and communications, persons find themselves in quandary of a two faced society ( Lyon, 2001 ) . On one face there are so many benefits, installations and security that semen with these engineerings but on other side, these engineering shreds the drapes of their personal life in forepart of legion information agents ( Mohammed, 1999 ) . This renders persons inquiring about the moralss behind the surveillance engineerings and the effects they might hold to confront in future.

This essay discusses ethical facet of consumer surveillance in commercial sector. The construction of the essay consist of three subdivisions: First is the debut to surveillance and related engineerings. The 2nd subdivision evaluates the consumer surveillances engineerings for their benefits, ethical issues and possible solutions. Last, a contemplation on some other surveillance engineerings and wrapping up of the essay.

1.1 What is surveillance

Surveillance can be perceived as a ‘superpanopticon ‘ in which consumers have become atomized map of a elephantine panoptic mechanism ( Foucault, Webster and redbreasts in Lyon 2004, pp 71 ) . The Panopticon was an thought proposed and introduced by Jeremy Bentham in 1791 as ‘all- seeing topographic point ‘ ; it can be defined as a surveillance mechanism in which perceiver has capableness of sing topics without being noticed, such as in an unseeable manner ( Hislop, 2004 ) . This panoptical nature of surveillance is prevailing in today ‘s metropoliss where consumers are seeable to all sort of private and authorities organisations through their purchases, penchants, recognition evaluations and several other activities. This information about personal lives of people is so stored in immense databases, retrieved, processed and analyzed to unprecedented degrees by authorities and other corporations utilizing extremely efficient computing machine engineerings ( Cespedes and Smith, 1993 and Rygielski et al. , 2002 ) .

1.2 Surveillance Technologies

In today ‘s technologically sophisticated universe, surveillance is progressively being used by companies for consumer contact direction. Technologies such as ‘loyalty cards, co-branded recognition cards ‘ and client focused advertisement on bills ( Lyon, 2001 ) are widely in usage. During the 1990s, the UK materialized as ‘card centric society ‘ and fictile cards were used as agencies for measure payments, client trueness wagess and keeping records of client information and purchases. These cards were known as trueness cards, with 27 million single supermarket, 15 million gasoline and 10 million pre-paid telephone trueness card proprietors within United Kingdom in 1996 ( Worthington,1998 ) .

Furthermore, to congregate extra information about clients, two or more organisations formed alliances and created the construct of co-branded cards, in which client is offered a free card, with no one-year fees and competitory involvement rate and discounts. Some really successful illustrations of Co-branded cards are from AT & A ; T, General Motors and British Airways ( Bliss, 1996 ) . Another method which came into being is ‘transactionally generated ‘ information, for illustration, merchandise charge grosss and gross revenues records ( Lyon, 2001 ) .

Already abundant surveillance engineerings gained a new paradigm with the debut of Internet, high velocity calculating and e-commerce. Internet initiated use of cookies, debris mail selling and voluntary sharing of information by clients ( Rygielski, 2002 ) . Cookies are defined as construct of tracking client ‘s online activity by hive awaying and directing little pieces of information from the user ‘s web browser to designated web waiter whenever user visits designated website ( Lyon, 2001 ) . Personal information can besides be collected through voluntary self revelation of information by user facilitated by several causes. Some of them are, during on-line purchase client is asked to supply all personal inside informations such as name, reference, contact figure, bank inside informations, etc ; Accessing information from studies and competition web site where anonymously sing of information is non allowed ; Attracting clients to supply information in exchange of free gifts and verifiers ( Kelly and Rowland, 2000 ) .

Lyon ( 2004 ) considers ‘Junk Mail selling ‘ to be nucleus of consumer surveillance in current selling scenario, where companies are utilizing electronic resources to aim identified possible clients. This is supported by an illustration, in which the writer received petition to fall in an car association merely after uncluttering driving scrutiny.

Information collected from online every bit good as offline beginnings of trueness cards, dealing grosss, cookies and online self divulgement is farther assimilated in a big database for processing and information excavation. Data Mining is a scheme to heighten understanding and serviceability of client ‘s personal informations by implementing a statistical algorithm which discovers assorted forms and correlativities ( Kelly and Rowland, 2000 and Rygielski et al. , 2002 ) .

2.0 Evaluation

2.1 Benefits

Surveillance engineerings that have raised assorted concerns about moralss have besides provided a assortment of reliable, touchable and beyond doubt benefits ( Lyon, 2001 ) . It besides holds sensible justification, for illustration purpose of tracking shopping dealing is to supply consumer with better offers and installations ( Danna and Gandy, 2002 ) .

ALSO READ  Key Facts Of A Clients Case Law Essay

Furthermore convenience of fictile cards provides persons with the power to pass, path and pull off their sweeps. Another of import sociological facet is care of ordinances and policies in society. This is itself a consequence of multifaceted society that wishes to build fleet procedures with security and freedom of consumer ( Lyon, 2001 ) .

Consumer benefits can be categorized into security, safety, preparation and better installations ( Kirkup and Carrigan, 2000 ) .Video surveillance provides security to both retail merchant and client by offering secure shopping environment with protection from shop-lifters, frauds, ram-raiders. It besides safeguards persons in exigency conditions by turn uping people in danger and acquiring speedy aid to them. The retail staff could be trained by utilizing information collected from assorted surveillance devices to better efficiency and effectivity of services to clients. Further, staff planning, care activities can besides done by analysing peak working and shopping yearss and hr ‘s.Capturing purchase forms helps merchandiser to conform its services as per consumer ‘s desires and demands. For illustration, if dealing record shows that all consumers who are buying milk are besides purchasing staff of life and eggs ; shop can put all the three points in next shelves for easiness and clip nest eggs.

Another statement from Underhill, USA illustrates that surveillance is an effort to do retail merchants conform to the demands of consumers and non doing consumers conform to the demands of retail merchants ( Kirkup and Carrigan, 2000 ) .But this freedom of the consumer becomes an issue when many companies use this to make societal and economic divisions and seek to command and compress the consumer desires, behaviour and picks ( Lyon, 2001 ; Danna and Gandy, 2002 ) .

2.2 Ethical Issues

Consumer ‘s enthusiasm in interchanging personal information for compensation or benefits provides a gateway for informations aggregation and its compromised use ( Franzak et al. , 2001 ) . This creates equilibrium of societal contract theory between the consumer and organisation. Social contract theory establishes an understanding between informations topic and selling bureau when single portions personal information for having associated offer ( Milne and Gordan, 1993 ) . Cespedes and Smith ( 1993 ) further argue that privateness in consumer ‘s facet is non absolute isolation but duty to safeguard the personal information against unethical use and injury.

Unethical uses of consumer information are force per unit area merchandising, daze advertizements and prejudiced pricing selling ( Kirkup and Carrigan, 2000 ) . These issues of moralss arises when information compiled from a scope of beginnings is utilised for intents which are either non disclosed to consumer or they do non hold a pick to screen themselves from this surveillance.

Data assemblage and tracking the motion and forms of consumer purchases has been practiced since the brick and howitzer shops environments but this was done with namelessness and restricted to the store proprietor records ( Caudill and Murphy, 2000 ) . Now concern behind surveillance is besides generalized modus operandi which is further enhanced by its panoptic nature. However with the amazing growing of Internet and calculating engineering, range of informations sharing has exponentially widened in bend raising ethical issues and possible menaces to consumer privateness.

Consumer informations privateness, societal taylorism and trust have become prevailing ethical issues which received significant attending over the last 30 old ages. Its importance can be illustrated by such concerns being on top precedences in authorities and corporate treatments ( Bennett, 2001 ) . Since the late mid-twentiess, organisations all over the universe are deploying surveillance engineerings exceling all societal and legal allegations. These engineerings are being utilized to ‘sort and sift, categorise and sort ‘ populations, with intents of bettering life construction of some and hinder it for left over population ( Lyon, 2001 ) .

The information gathered by offline and online techniques is stored into databases secured by authorities and organisations under assorted privateness Acts of the Apostless. But this information is continuously being pulled up from diverse databases utilizing informations excavation algorithms to unite the variables ( such as national insurance figure ) for making exact elaborate profile of users. The information which should hold been collected from consumers under the privateness Torahs is consumed by organisations for doing net incomes without consumer ‘s cognition ( Bliss, 1996 ) . This procedure further increases the sensitiveness of consumer information and the ethical concerns. Furthermore, utilizing these databases for bunch of the users on the footing of their income, life styles, instruction, etc raises a intuition among consumers.

An illustration of this is alliance among three American recognition card services viz. TRW Inc, Equifax Inc and Trans-Union Corporation. This agency maintains and updates the personal information such as names, references, societal security figure ( ssn ) , and recognition history from all the possible different beginnings including Bankss, retail merchants, rental houses and recognition card companies ( Lyon, 2004 ) . Such databases are often being used for recognition look intoing before loan blessings, acquiring recognition cards, smart phones and trueness cards, etc.

ALSO READ  Traditional Law, the virtual environment and UEJF v. Yahoo

Imputing to such databases, consumers and groups are being tagged for blacklisting ensuing into loan refusals ( may be due to few unpaid debts ) and other restraining interventions. Furthermore due to non updation, consumers besides face jobs even after the debts have been cleared. This is shown in an illustration of instant credits denial in retail shops and other services to a financially capable British household in 1884. This was attributed to debt of 16 lbs, which was already paid but non reflecting in the household ‘s database for five old ages ( Lyon, 2004 ) .

Furthermore categorization of consumers and making profiles on the footing on their gender, ethnicity, demographics, devouring power and socio economic sciences lead to societal taylorism. Social Taylorism is procedure of utilizing surveillance engineerings to transform social informations and resources into power and principal by appropriation ( Lyon, 2004 ) . Through this categorization of users, companies try to extinguish the lower class consumers and other unwanted category of people ( Lyon, 2004 ; Cespedes and Smith, 1993 ) . However, utilizing this information they besides try to score the prospective consumers by supplying them with price reductions, trueness cards and verifiers. Lyon ( 2004 ) argues that enthusiastic shoppers which are non sufficiently argus-eyed autumn victim to selling schemes of retail organisation, assisting them do net incomes and might acquire themselves into debt. This procedure is considered unethical because non keeping a recognition card, trueness cards or non holding a hazard taking behaviour does non exemplify fiscal ability and exclusion to recognition installations and price reductions.

Financial and medical information normally falls in sensitive class which people do non desire to be disclosed and are frightened of this information falling into inappropriate custodies doing them injury or exasperation. This apprehensiveness is justified by several instances: In 1999, due to human mistake the confidential medical records of patients which incorporated names, reference, ssn, employment and medical history logs of diseases were exposed on an unprotected web site in Michigan university wellness system. Furthermore in the same twelvemonth, unrestricted entree to records of subscribed trueness plan air stat mis aggregators was available in Canada ( Lyon, 2001 ) . An old lady got identified by the list of her on-line hunts, which were published on that web site ( Barbaro and Zeller, 2006 ) . Present state of affairs can be illustrated by the heartland payment systems breach in 2009, where 1000000s of US recognition card holder ‘s information and dealing inside informations were being stolen by undercover agent package for unknown period of clip ( Ashford, 2009 ) .

Ethical motives has progressively going the most of import concern for online shoppers. A study by Yankelovich spouses in 2000 identified 90 % Internet users are concerned about their privateness and 79 % of the users decide to go forth the web site, when inquired about the personal information for accessing informations ( EPIC, 2000 ) .

Loss of consumer trust besides emerged to be an of import ethical. It is argued that gathering of consumer information benefits web concerns to greater extents as compared to consumers ( Kelly and Rowland, 2000 ) .Moreover it generates consumer intuition and fright of personal information being tracked and shared with companies unknown to them. In a long tally, this farther raises concern of morality and decreases client ‘s trust in web minutess. This feeling of misgiving creates reluctance to utilize Internet for doing dealing and therefore affects both the online bargainers and state ‘s economic system. It could direct to mass recoil of on-line shoppers and communities, ensuing in tight authorities policies ( Kelly and Rowland, 2000 ) .

2.3 Possible Solutions

The widespread uses of assorted surveillance tools have raised communal sensitiveness and consciousness to development of personal information and received response from authorities and other bureaus in signifier of guidelines and ordinances to protect unethical use of informations collected for assorted intents. This helps information directors to manage ethical issues with raised criterions and unity ( Kirkup and Carrigan, 2000 ) .

Different states employ different methods, height and criterions of managing ethical issues for protecting and keeping privateness, trust and control misdemeanor. Some of these are informations protection Acts of the Apostless in UK and Privacy protection act in USA. Federal Trade committee was besides apparatus for managing marketing standard conformities ( Caudill and Murphy, 2000 ) .

However, these Acts of the Apostless and policies portion a generalised consensus of just information rules, as discussed below ( Lyon, 2001 and Laudon, 1996 ) :

Accountability of information collection by organisation though entrustment of consumers. Organizations and system directors should keep complete duty of information against any harm to informations topic and information corruptness.

The intent of information assemblage should be clearly defined.

The organisation should seek the permission of informations capable before roll uping information. For informations topics below 13 old ages, consent of their parents should be taken before nearing for any personal inside informations.

The personal information should be used merely for stated intent and non to be shared with other bureaus. It should be under no sharing rules without consent from single to whom information pertains, with single consent and royalties attached for exchange ( if required ) .

ALSO READ  Study On Scheduled Computer Systems Maintenance Information Technology Essay

Information should be destroyed every bit shortly as stated intent is complete. In instance it is required to be retained for longer clip, organisation should guarantee its regular updation, completion and rectification.

In association with Cespedes and Smith ‘s ( 1993 ) ‘sunshine rule ‘ , unfastened information policies should be used where information topic has a right and entree to rectify and update his/her information.

Proper security step should besides be taken to protect information from larcenies, misdirection and choping onslaughts.

Forming informations right bureaus is besides of import to maintain a path of informations sharing among assorted public and private organisations. Following this enterprise, a watchdog for surveillance named as ‘Privacy International ‘ was set up in 1990 with cooperation of more than 100 privateness specializers and human rights organisations from 40 states across the universe ( privacyinternational, 2010 ) .

Effectiveness of these rules could be realized by their acceptance in states such as USA, Canada, United Kingdom and other European states. Some illustrations of conformity of above rules are in several Bankss and informations managing houses by direct selling association of Canada ; another understanding is between New York province lawyer and American express for proper handling of records and client communicating for maintaining path and list of sale proceedings ( Lyon, 2001 ) .

The above rules are non eligible to be applied for all surveillance and informations aggregation engineerings, such as CCTV ‘s and street cameras. So, another method of encoding and blind signatures was suggested in which security was sustained and the individuality of the user was kept anon. . These engineerings make usage of public and private digital key cryptanalysis utilizing construct of representatives and observer devices for keeping genuineness of user and prevent revelation of the cardinal holder ( Chaum, 1992 ) . Chaum theory of blind signatures uses two calculating french friess: representative is used by consumer for carry oning cryptanalytic minutess and Observer ( which is managed by sure organisation ) to attest the genuineness and behaviour of embedded representatives. However, this engineering was non accepted by organisations and retail merchants due to their inability of piecing personal information and recognition worthiness of consumers.

It is hard to expect and decide all ethical issues but being of ordinances decidedly elucidates the ethical facet of organisational concern and client relationship direction ( Brenner and Molander, 1977 ) . However, consideration of specificity of ordinance is of import for turn toing ethical issues. In bing scenario, there are figure of ethical policies but they have really negligible legal enforcement and deficiency of specificity in these policies is used by information merchandisers to besiege them. ( Kirkup and Carrigan, 2000 ) .

3.0 Other available engineerings

Increasingly new engineerings are coming into market for merchandisers to do net incomes and have a better mentality of consumer. These engineerings range from two manner mirrors to video cameras that have capableness to enter facial looks and usage image acknowledgment techniques for farther associating to transactional database. Some other engineerings such as Automatic figure home base acknowledgment, biometric ( fingerprints, iris scan and DNA sampling ) are being embedded on computing machine french friess that is implanted in ID cards and passports. Monitoring of employees work, utilizing picture cameras, GPS, desktop and electronic mail monitoring are functioning rating of the public presentation and efficiency for assessments ( Ball and Wood, 2006 and Kirkup and Carrigan, 2000 ) . Retails sector is utilizing RFID labeling on superstore points for tracking. Presence of all these engineerings and informations gathered utilizing them has created a scenario of Roger Clarke ‘s construct of dataveillance society. Dataveillance can be described as supervising the consumer ‘s involvements, minutess and penchants for roll uping personal informations ( Clarke, 2007 ) .

4.0 Decision

This essay attempts to demo ethical issues as a lifting concern in consumer environment through treatment of assorted surveillance engineerings, turn toing their deductions and placing the possible solutions. The information compiled through prevailing engineerings such as cookies, trueness cards and dealing inside informations raises fright of the things traveling incorrect among the consumers. Furthermore, rapid growing of surveillance engineerings and sum of informations makes it hard to place cases of security breaches when private informations is spilled out in public infinites. Furthermore, increasing strength of such cases raises intuition among informations topics and compels regulating bureaus to make and guarantee conformity of policies and ordinances for reprobating ethical issues for private information ordinance. However, the positive accomplishments of this engineering which brings efficient individualized services, safety and installations to the clients can non been ignored.

Conclusively, consumer surveillance engineerings is a really broad subject in itself and I wholly understand importance of ethical issues generated by engineerings such as CCTV, RFID, biometries and QR codification, etc for other facets of society. But due to the restraint of word it was possible to explicate merely the ethical issues related to cookies, electronic mail selling, voluntary sharing and trueness cards in alliance with consumer moralss. Further research on this subject could be directed towards the affect of upcoming surveillance engineerings on other domains of society.