The Final Project I selected under Surveillance State is “Facial Recognition and Fear”.
Facial recognition technology has become more accurate and less biased without the need for policy intervention. The disconnection between public discourse and actual performance raises three problems which are How do we clarify the discrepancies in the public discussion of facial recognition? How do we construct a better research agenda for policy issues? And how do we avoid imposing policies that are unnecessary or harmful as we create reasonable protections? “It is particularly worrisome that many of the concerns expressed over facial recognition and AI are hypothetical” (Chang, 2014). The internet created vast opportunities, but it also came with new risks for security and privacy where cybercrime and other malicious acts cost billions of dollars and the internet generates trillions in revenues. The internet’s growth was intentionally unhampered, as the policy of the 1990s was to seize opportunity despite the risks and Overregulation would have stifled growth. After 1990s exactly Twenty-five years later, the internet is no longer a fragile blossom that needs protection, but if it were commercialized today, it might have met with a very different response, one that slowed or even blocked deployment in the United States where this would have been a disaster in the history of mankind.
“The disparity in views of facial recognition in Asia and in the United States is also worrying” (Bramer Max, 2006). Facial recognition technologies are widely used in Asia, but there has been no outcry about discrimination. If the technology itself was flawed, we would expect to see similar problems across national implementations and we do not know if this reflects a lack of diversity in Asian populations or whether larger social narratives shape some of the concern over facial recognition in the United States. This would be another useful area for research, since understanding the cause of the discrepancy in views is crucial for accurately depicting risk. “Americans say they want innovation, but innovation only comes with risk” (Gates Kelly, 2011). There are important privacy concerns with the use of facial recognition technologies that the United States needs to address in a demonstrably honest and transparent manner. For example, we need adequate principles and rules for data retention and use, and for redress. But like the internet when it was commercialized, facial recognition technologies offer more opportunities than costs.
“Fears that government use of facial recognition technology will lead to the pervasive surveillance system seen in China are irrational as it reflects a lack of faith in the strength of democratic institutions” (Bergstra, 2007). The trend in facial recognition is toward greater accuracy, not less thus relying on higher accuracy and greatly reduces the kind of errors that have attracted so much criticism where the Japanese and Chinese companies have reportedly been able to achieve facial accuracy rates of over 98 percent. Civil and Private campaigner which includes the Electronic Frontier Foundation and other companies had concerns on the privacy of the person is being compromised by most usage of the surveillance technologies and facial recognition is one among them which include photos, social media and other patterns where the government would have access to all the whereabouts at given point of time.
Gates, Kelly (2011). Our Biometric Future: Facial Recognition Technology and the Culture of Surveillance. NYU Press. pp. 48–49.
Chen, S.K; Chang, Y.H (2014). 2014 International Conference on Artificial Intelligence and Software Engineering (AISE2014). DEStech Publications, Inc. p. 21.
Bramer, Max (2006). Artificial Intelligence in Theory and Practice: IFIP 19th World Computer Congress, TC 12: IFIP AI 2006 Stream, August 21-24, 2006, Santiago, Chile. Berlin: Springer Science+Business Media. p. 395
Kumar Mandal, Jyotsna; Bhattacharya, Debika (2019). Emerging Technology in Modelling and Graphics: Proceedings of IEM Graph 2018. Springer. p. 672.
de Leeuw, Karl; Bergstra, Jan (2007). The History of Information Security: A Comprehensive Handbook. Elsevier. p. 266.
Thank you for sharing your post on smartphone surveillance. Phone spyware can be especially intrusive and dangerous for survivors, because it can monitor many things you do on your smartphone, including photos and videos you take, websites you visit, text messages you send and receive, call history, and your location. Spyware installed on rooted for android and ios devices can allow someone to turn on the webcam or microphone, take screenshots, see activity on third party apps and intercept, forward, or record phone calls. Detecting spyware on the phone may be difficult and some signs could include your battery draining rapidly, device turning off and on, or spikes in data usage. However, the most common sign that your activity is being monitored will be because of the abuser’s suspicious behavior. There are many other methods someone can use to access information on your phone without installing spyware. Look for patterns in what the person knows and where that information might have come from to help you to narrow down the possibilities.
We value our customers and so we ensure that what we do is 100% original..
With us you are guaranteed of quality work done by our qualified experts.Your information and everything that you do with us is kept completely confidential.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
The Product ordered is guaranteed to be original. Orders are checked by the most advanced anti-plagiarism software in the market to assure that the Product is 100% original. The Company has a zero tolerance policy for plagiarism.Read more
The Free Revision policy is a courtesy service that the Company provides to help ensure Customer’s total satisfaction with the completed Order. To receive free revision the Company requires that the Customer provide the request within fourteen (14) days from the first completion date and within a period of thirty (30) days for dissertations.Read more
The Company is committed to protect the privacy of the Customer and it will never resell or share any of Customer’s personal information, including credit card data, with any third party. All the online transactions are processed through the secure and reliable online payment systems.Read more
By placing an order with us, you agree to the service we provide. We will endear to do all that it takes to deliver a comprehensive paper as per your requirements. We also count on your cooperation to ensure that we deliver on this mandate.Read more