SEARCH RESULTS

YOU WERE LOOKING FOR :Privacy and Surveillance

Essays 61 - 90

Case Study on Ethics and Morality in the Workplace

According to Kantian theory, private employee monitoring - at least, without informing the employee - is not moral, no matter how ...

The Potential Clash of Alignment of Civil Liberties and Security Controls

and the rights of privacy prevented a more proactive actions being taken to find these threats. This is a core element of the argu...

Cancer Issues Overview

This research paper/essay pertain to different issues associated with cancer treatment, which include immune surveillance model of...

Tuberculosis, An Overview

This research paper presents an overview of the problem of tuberculosis (TB) in the US. Causes and transmission, at-risk groups, s...

Public Health Informatics, A Brief Overview

This research paper presents a brief overview of public health informatics, with special emphasis on surveillance systems and thei...

Surveillance Cameras Preventing and Solving Crimes

Our world has evolved overnight into one in which we can seldom find privacy. The use of cameras to record our...

OBESITY: AN ANALYSIS OF THE COMMUNITY AND HEALTH DATA

reduce obesity, increase activity and to encourage healthy eating habits. Wisconsin is also trying to take charge through ...

Law Enforcement/Use of Stun Guns, Video Surveillance

stun guns and video surveillance technology has become increasingly widespread among law enforcement officers. However, this trend...

The Responsible Use of Technology in Law Enforcement

fire small barbed electrodes into a targets skin, and then send an electrical current passing through their body. This has the eff...

Where’s That Bug?! Surveillance as Narration

the bug, and that Harry cannot find it unless he steps out of context to consider the way in which the film itself is made (Levin)...

Surveillance in modern societies

population can be quite vocal in its criticism of authority, but since it does not have access to power, this activity cannot effe...

Orwell/1984 Overview

and the public. Party slogans exemplify doublethink, as they proclaim that war is really peace, freedom is really slavery, etc. Wh...

Cameras and Surveillance in the Workplace

the restrooms and the monitoring of electronic communications. Many employers, however, believe that they are fully justified in...

Video Surveillance and Stun Guns Should Not Be Used by Police

injury and even death. In some way, the police have a false sense of security in using these devices. Stun guns are thought to b...

Power, Surveillance and the Totalitarian State

can be trusted; it is the ultimate in paranoid societies. By keeping its citizens fearful and mistrustful of each other, the gover...

The Echelon Surveillance System

United States, pursuant to various treaties" ("NSA Watch: Echelon FAQ," n.d.). It is easy to see that well-known global intelligen...

New Ruling to Allow GPS Surveillance

ruling is applicable to nine Western states, including California (Cohen, 2010). This is because a decision rendered by the U.S. C...

Surveillance Suspicious People Dry Runs

of the actual attack. The people who flew into the towers had been here for years, insinuating themselves into their neighborhoods...

The Theme of Surveillance in Orwell's 1984

recorded today. With computer technology what it is today, it is difficult to escape the watchful eye of the government and the po...

Legal And Ethical Delivery Of E-Health Applications

disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, e...

Elderly Privacy In An Institutionalized Setting: Ethical Issues And Social Work Involvement

need to be less oriented to rules and dilemmas, and more attuned to practical matters of everyday social experience" (pp. 19-22); ...

Health Insurance Portability and Accountability Act (HIPAA), Medical Coding, and Patient Privacy Rights

life in prison for patient death (Jacko & Sears, 2003). HIPAA is comprised of five major titles that are applicable to each provi...

The Non-Neutrality of Technology

comes to dealing with the junk mail, both snail mail and email, that comes pouring into our homes, it is something else when the i...

Technology is Not Neutral

think we "fit" the services they offer. While this may be merely annoying when it comes to dealing with the junk mail, both snail ...

Ethical Standards/Multicultural College Classroom

the class discussion that evolved form this assignment, the students expressed their "surprise at their varied backgrounds," as we...

Films and the Issue of Privacy

somewhat difficult; she appears to be one of those writers who will not use one word where she can cram in three. In addition, she...

Genetic Testing for Congenital Anomalies

based on the results?" (Pinsky, et al, 2001, p. 168). In the case of breast cancer, once a mutation that can cause cancer has be...

US Constitution’s Influence on the American Criminal Justice System

In the case of Baze v. Reese, Kentucky inmates who have been sentenced to death are claming that the states three-drug cocktail pr...

The Right to Privacy: A Constitutional Provision?

presented above. Obviously, the most important source that must be used in discussing our so-called Constitutional Rights is the ...

An Argument for a National Identification Card

what those horrors represented. This complacency is perhaps one of our greatest weaknesses. We must remind ourselves and those t...