A report brought out by the surveillance society in the year 2006 pointed out that the heightened concerns in view of the levels of intrusion in citizen’s lives2. There are of course the incidents like the 9/11 attacks, the London bombing, the Mumbai shootout, the Pakistani bomb blasts, the Afghanistan war etc. which require intelligence inputs so that the terror elements are not in a position to work out similar incidents, but at the same time the citizens do expect that the info-age doesn’t put them in embarrassing situations. Loss of privacy, intimidating acts, frequent delays, heightened security mechanism etc are some circumstances leading to the discomfort of the citizen in general. The report by the surveillance society has pointed out that people actions are increasingly being monitored. Monitoring of credit card transactions, mobile phone conversation, usage of the loyalty card, and CCTV footage are some of the acts of surveillance, which have been put into the category of ‘dataveillance’ by researchers (BBC, 2006). From time to time concerns have been raised by human rights groups about the intimidating nature of the surveillance being carried out by the security agencies, but all such voices seem to have no significance if we take a look around us. . The Age of New Media and Its Development.
1. BBC (2006). Britain is surveillance society. available online at http://news.bbc.co.uk/2/hi/uk_news/6108496.stm (March 26, 2009)
2. BBC (2006a). ‘Snooping fears plague new iTunes’. Available online at http://news.bbc.co.uk/2/hi/technology/4608882.stm (March 26, 2009)
3. Bone, Victoria (2007). How Hackers Are Us worked. BBC. Available online at http://news.bbc.co.uk/2/hi/uk_news/6767019.stm (April 2, 2009)
4. Harcourt-Webster, Adam (2006). Is business the real Big Brother? Available online at http://news.bbc.co.uk/2/hi/business/5015826.stm (April 2, 2009)
5. Harris, Jan (2007). Report warns on misuse of CCTV. Available online at http://www.cctvcore.co.uk/27-03-2007-report-warns-on-misuse-of-cctv.html (April 2, 2009)
6. Ranky, Paul G (2006). ‘An introduction to radio frequency identification (RFID) methods and solutions’. Assembly Automation. 26/1 (2006) 28–33. Emerald Group Publishing Limited.
7. Slack, James (2008). Revealed: 800 public bodies now have powers to snoop on our phones and emails. Available online at http://www.dailymail.co.uk/news/article-510991/Revealed-800-public-bodies-powers-snoop-phones-emails.html (April 2, 2009)
8. Victor (2009). China, Tibet and Cyber Snooping. Available online at http://committeetoprotectbloggers.org/2009/03/31/china-tibet-and-cyber-snooping/ (April 2, 2009)
9. Wood, David Murakami (2006). A Report on the Surveillance Society. Available online at http://news.bbc.co.uk/2/shared/bsp/hi/pdfs/02_11_06_surveillance.pdf (March 26, 2009)
Please type your essay title, choose your document type, enter your email and we send you essay samples