FinalProjectProposal.docx

The Final Project I selected under Surveillance State is “Facial Recognition and Fear”.
Facial recognition technology has become more accurate and less biased without the need for policy intervention. The disconnection between public discourse and actual performance raises three problems which are How do we clarify the discrepancies in the public discussion of facial recognition? How do we construct a better research agenda for policy issues? And how do we avoid imposing policies that are unnecessary or harmful as we create reasonable protections? “It is particularly worrisome that many of the concerns expressed over facial recognition and AI are hypothetical” (Chang, 2014). The internet created vast opportunities, but it also came with new risks for security and privacy where cybercrime and other malicious acts cost billions of dollars and the internet generates trillions in revenues. The internet’s growth was intentionally unhampered, as the policy of the 1990s was to seize opportunity despite the risks and Overregulation would have stifled growth. After 1990s exactly Twenty-five years later, the internet is no longer a fragile blossom that needs protection, but if it were commercialized today, it might have met with a very different response, one that slowed or even blocked deployment in the United States where this would have been a disaster in the history of mankind.
“The disparity in views of facial recognition in Asia and in the United States is also worrying” (Bramer Max, 2006). Facial recognition technologies are widely used in Asia, but there has been no outcry about discrimination. If the technology itself was flawed, we would expect to see similar problems across national implementations and we do not know if this reflects a lack of diversity in Asian populations or whether larger social narratives shape some of the concern over facial recognition in the United States. This would be another useful area for research, since understanding the cause of the discrepancy in views is crucial for accurately depicting risk. “Americans say they want innovation, but innovation only comes with risk” (Gates Kelly, 2011). There are important privacy concerns with the use of facial recognition technologies that the United States needs to address in a demonstrably honest and transparent manner. For example, we need adequate principles and rules for data retention and use, and for redress. But like the internet when it was commercialized, facial recognition technologies offer more opportunities than costs.
“Fears that government use of facial recognition technology will lead to the pervasive surveillance system seen in China are irrational as it reflects a lack of faith in the strength of democratic institutions” (Bergstra, 2007). The trend in facial recognition is toward greater accuracy, not less thus relying on higher accuracy and greatly reduces the kind of errors that have attracted so much criticism where the Japanese and Chinese companies have reportedly been able to achieve facial accuracy rates of over 98 percent. Civil and Private campaigner which includes the Electronic Frontier Foundation and other companies had concerns on the privacy of the person is being compromised by most usage of the surveillance technologies and facial recognition is one among them which include photos, social media and other patterns where the government would have access to all the whereabouts at given point of time.

References:
Gates, Kelly (2011). Our Biometric Future: Facial Recognition Technology and the Culture of Surveillance. NYU Press. pp. 48–49. 
Chen, S.K; Chang, Y.H (2014). 2014 International Conference on Artificial Intelligence and Software Engineering (AISE2014). DEStech Publications, Inc. p. 21.
Bramer, Max (2006). Artificial Intelligence in Theory and Practice: IFIP 19th World Computer Congress, TC 12: IFIP AI 2006 Stream, August 21-24, 2006, Santiago, Chile. Berlin: Springer Science+Business Media. p. 395
Kumar Mandal, Jyotsna; Bhattacharya, Debika (2019). Emerging Technology in Modelling and Graphics: Proceedings of IEM Graph 2018. Springer. p. 672. 
de Leeuw, Karl; Bergstra, Jan (2007). The History of Information Security: A Comprehensive Handbook. Elsevier. p. 266. 

Hi Vamsee,
Thank you for sharing your post on smartphone surveillance. Phone spyware can be especially intrusive and dangerous for survivors, because it can monitor many things you do on your smartphone, including photos and videos you take, websites you visit, text messages you send and receive, call history, and your location. Spyware installed on rooted for android and ios devices can allow someone to turn on the webcam or microphone, take screenshots, see activity on third party apps and intercept, forward, or record phone calls. Detecting spyware on the phone may be difficult and some signs could include your battery draining rapidly, device turning off and on, or spikes in data usage. However, the most common sign that your activity is being monitored will be because of the abuser’s suspicious behavior. There are many other methods someone can use to access information on your phone without installing spyware. Look for patterns in what the person knows and where that information might have come from to help you to narrow down the possibilities.
Thanks,
Praveen

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your paper today and save 30% with the discount code HAPPY

X
Open chat
1
You can contact our live agent via WhatsApp! Via + 1 323 412 5597

Feel free to ask questions, clarifications, or discounts available when placing an order.

Order your essay today and save 30% with the discount code HAPPY