Surveillance Essays (Examples)

Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… China and Russia despite concerns regarding its legitimacy and view as an acceptable state behavior. [3: William C. Banks, “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage”, Emory law Journal 66, (2017):513.]
Problem Statement
Cyber espionage involves illegal practices that result in information theft that could … espionage is attributable to the long-standing practice of intelligence gathering and espionage in national security apparatus of every nation. Cyber espionage involves electronic surveillance of computer systems or networks to intercept communication between two or more parties. Using electronic surveillance, adversaries intercept what is said and planned. Such surveillance always result in processing and exploitation of huge volumes of communications transmitted on the Internet. Therefore, electronic surveillance has provided an avenue for transformation of conventional state-sponsored surveillance and espionage. [4: Ibid., 3]
Lotrionte (2015) provide a different perspective regarding the proliferation of cyber espionage. Even though the proliferation is attributable ………

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Study Document

Intelligence Oversight Ethics

Pages: 11 (3311 words) Sources: 15 Document Type:Research Paper Document #:23829007

… violation of privacy rights (Landau 2013). Snowden showed that by the second decade of the 21st century the United States had become a surveillance state.
And yet in the face of Snowden’s revelations, Wizner (2017) affirms that the nation’s institutions and organizations have altered the ways and … aside. Prior to Reagan’s EO, the federal government had struggled with the issue of IO, and had gone to the FISA courts for surveillance requests (Brown and Cinquegrana 1985). Reagan’s EO, however, put an end to who had the authority to grant surveillance. What remained to be seen was how and in what manner that authority would be carried out.
Technology also improved, which made the ……

References

References

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Brown, William F., and Americo R. Cinquegrana. \\\\\\\\\\\\"Warrantless Physical Searches for Foreign Intelligence Purposes: Executive Order 12,333 and the Fourth Amendment.\\\\\\\\\\\\" Cath. UL Rev. 35 (1985): 97.

Cantarella, Michele. \\\\\\\\\\\\"Intelligence ethics in the digital age.\\\\\\\\\\\\" (2016).

Congressional Research Service, “CIA Ethics Education: Background and Perspectives” (2018).

Ferrari, Rachel. \\\\\\\\\\\\"Moral Relativism and Dangerous Ethical Dilemmas in the US Intelligence Community.\\\\\\\\\\\\" (2018).

Ford, Christopher M. \\\\\\\\\\\\"Intelligence Demands in a Democratic State: Congressional Intelligence Oversight.\\\\\\\\\\\\" Tul. L. Rev. 81 (2006): 721.

Goldman, Jan. \\\\\\\\\\\\"Teaching About Intelligjence and Ethics.\\\\\\\\\\\\" Journal of US Intelligence Studies 20, no. 2 (2013): 79.

Hayes, Jonathan. \\\\\\\\\\\\"The Cinema of Oliver Stone: Art, Authorship and Activism by Ian

Study Document

Obesity And Role Of Government

Pages: 6 (1668 words) Sources: 5 Document Type:Essay Document #:81197776

...Surveillance Introduction
Obesity is a critical issue in the United States, and the problem seems to be getting worse in the country and across the planet. As per the latest estimates, about 34 percent of American adults and 15 to 20 percent of American adolescents and children suffer from obesity. Every demographic of the American population is affected by obesity, and the worst thing about the condition is that it enhances the risk of multiple chronic conditions in both adults and children. Considering its spread in the population, obesity is now an epidemic. To address the problem of obesity in the United States, there is a need for public health officials to come up with programs and policies to address obesity. However, as of now, no significant efforts are being made to address the problem. Because of how complex the problem of obesity is, it is probably going to be a……

References

References

AAFP. (2010). Federal government takes bigger role in combating obesity. Retrieved from https://www.aafp.org/news/obesity/20100517fed-initiatives.html

Institute of Medicine. 2007. Progress in preventing childhood obesity: how do we measure up?. Washington, DC: The National Academies Press.  https://doi.org/10.17226/11722 .

Kumanyaki, S. K., Parker, L., & Sim, L. J. (2010). Bridging the evidence gap in obesity prevention: A framework to inform decision making. Retrieved from  https://www.ncbi.nlm.nih.gov/books/NBK220174/ 

Mitchell, N., Catenacci, V., Wyatt, H., & Hill, J. (2011). Obesity: Overview of an epidemic. Psychiatr Clin North Am, 34(4), 717-732. DOI: 10.1016/j.psc.2011.08.005

Swinburn, B. (2008). Obesity prevention: The role of policies, laws, and regulations. Aust New Zealand Health Policy, 5(12). DOI: 10.1186/1743-8462-5-12

Study Document

Formulating An Effective National Response To Ebola In Nigeria

Pages: 17 (5038 words) Sources: 20 Document Type:Research Paper Document #:83371879

… regions of the country (Successful Ebola responses in Nigeria, Senegal and Mali, 2016). In addition, existing resources that were being used for polio surveillance including global positioning systems for mapping purposes were adapted to focus on the Ebola disease. Moreover, the country’s political leadership also established isolation ……

References

References

Allam, M. F. (2014, September). Ebola hemorrhagic fever: Case fatality rate 90%? Central European Journal of Public Health 22(3), 207-210.

Allam, M. F. & Vonka, V. (2015, March). Ebola virus disease: Temperature checks for travelers? Central European Journal of Public Health, 23(1), 84.

Brand, J. E. & Stela, D. (2014, October). Ebola is here: Knowledge, identification, and appropriate infection control are key. American Nurse Today, 9(10), 37-39.

Brown, G. (2015, Winter). Ebola in America: An epidemic or a pandemic? ABNF Journal, 26(1), 3-5.

Ebola. (2019). Doctors without Borders. Retrieved from https://www.doctorswithout borders.org/what-we-do/medical-issues/ebola.

Ebola outbreak. (2019). U.S. Centers for Disease Control and Prevention. Retrieved from  https://www.cdc.gov/vhf/ebola/history/2014-2016-outbreak/index.html .

Ebola virus disease. (2019). U.S. Centers for Disease Control and Prevention. Retrieved from  https://www.cdc.gov/vhf/ebola/index.html .

Hancock, M. (2019, September). After Ebola. African Business, 422, 56-58.

Study Document

Clausewitz The Future Of The Air Power

Pages: 5 (1412 words) Sources: 4 Document Type:Essay Document #:29434498

… airpower in historic wars
Historically, airpower was initially used in a major war during the First World War. Militaries used planes particularly for surveillance and observation activities during the First World War and this helped them to quickly deal with potential threats and negate enemy activities. This ……

References

References

Bender, Willaim J., and William D. Bryant. Assuring the USAF core missions in the information age. Office of the Secretary of the Air Force Washington United States, 2016.

Clodfelter, Mark. "Back from the future: The impact of change on airpower in the decades ahead." Strategic Studies Quarterly 3, no. 3 (2009): 104-122.

Grissom, Adam. "The future of military innovation studies." Journal of strategic studies 29, no. 5 (2006): 905-934.

JOINT CHIEFS OF STAFF-JCS. "Joint Operating Environment JOE 2035: The Joint Force in a Contested and Disordered World. US Joint Chiefs of Staff, J7, Joint Force Development [cit. 2016-07-01]." (2016).

Study Document

Using An Epidemiological Approach To Critically Analyze A Population

Pages: 7 (2136 words) Sources: 6 Document Type:Essay Document #:49902014

...Surveillance Introduction
Psychosocial Factors. A feeling of workplace well- being serves as a key component of employee strategy. Of late, there has been considerable focus on this element, particularly in the healthcare sector and with healthcare workers. In western countries, the combination of an unappealing workplace atmosphere, work-linked stress, a shortage of practitioners, and an increasingly elderly population underscores the necessity of updated studies in this area. The concept of well- being is a summative one, encompassing physical, societal, and emotional facets within as well as external to the organization (i.e., workplace). Further, it is a key factor determining productivity – psychosocial, organizational climate, which encompasses work climate, social support, and works recognition is believed to have a significant influence on the workplace well- being. Psychosocial elements make up elements like job satisfaction, physical workload, and social support on the job (Goetz, Berger, Gavartina, Zaroti & Szecsenyi, 2015).
Psychosocial elements denote……

References

References

Cladellas, R., & Castelló, A. (2011). University Professors\\\\\\\\\\\\' Stress and Perceived State of Health in Relation to Teaching Schedules. Electronic Journal of Research in Educational Psychology, 9(23), 217–240.

Eatough, E., Way, J., & Chang, C. (2012). Understanding the link between psychosocial work stressors and work-related musculoskeletal complaints. Appl Egron, 43(3), 554-63. Retrieved from  https://www.ncbi.nlm.nih.gov/pubmed/21944295 

Fernandes, M., & Rocha, M. (2009). Impact of the psychosocial aspects of work on the quality of life of teachers. Brazilian Journal of Psychiatry, 31(1). Retrieved from  http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1516-44462009000100005 

Goetz, K., Berger, S., Gavartina, A., Zaroti, S., & Szecsenyi, J. (2015). How psychosocial factors affect wellbeing of practice assistants at work in general medical care? – a questionnaire survey. BMC Fam Pract, 16, 166. DOI: 10.1186/s12875-015-0366-y

Himmelfarb Health Sciences Library. (2019). Case-control study. Retrieved from  https://himmelfarb.gwu.edu/tutorials/studydesign101/casecontrols.cfm 

Jardim, J., & Pereira, A. (2016). Perceived impact of lifelong training in teachers. Interacções, 31(42), 22–31.

Karasek, R., Baker, D., Marxer, F., Ahlbom, A., & Theorell, T. (1981). Job decision latitude, job demands, and cardiovascular disease: a prospective study of Swedish men. Am J Public Health, 71(7), 694-705.

Kessler, R. C., Andrews, G., Colpe, L. J., Hiripi, E., Mroczek, D. K., Normand, S. L. T., … Zaslavsky, A. M. (2002). Short screening scales to monitor population prevalences and trends in non-specific psychological distress. Psychological Medicine, 32(6), 959–976. Retrieved from  http://www.ncbi.nlm.nih.gov/pubmed/12214795

Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

...Surveillance Abstract
Cybercrime, data breaches, and fraud represent evils that significantly threaten businesses. Companies have, in the past, lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In this paper, the processes information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT security auditing constitutes a significant step in the safeguarding of corporate data against cybercrime, data breaches, and fraud. It must be performed from time to time in the form of a methodical analysis by an outside specialist on compliance, for identifying any chinks in the armor of the company's information technology system.
Introduction
ICT advancements have meant the availability of vast quantities of data, which also creates considerable risks to the data itself, computer systems, and critical infrastructures and operations it supports. Despite developments in information security,……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Study Document

The Transformation Of The US Into Oceania

Pages: 9 (2807 words) Sources: 7 Document Type:Essay Document #:33502677

… disclosure that the U.S. National Security Agency has wiretapped U.S. citizens outside of the normal channels that are required for these types of surveillance efforts have raised additional questions concerning the government’s actual limits on privacy intrusions and what should be done to reverse these disturbing trends ……

References

References

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Cantor, M. D. (2006, Summer). No information about me without me: Technology, privacy, and home monitoring. Generations, 30(2), 49-55.

Ethical issues facing businesses. (2020). Florida Tech. Retrieved from https://www.floridatech online.com/blog/business/the-5-biggest-ethical-issues-facing-businesses/.

Haslag, C. (2018, Fall). Technology or privacy: Should you really have to choose only one? Missouri Law Review, 83(4), 1027-1033.

Karn, R. (2019). The biggest threat to data security? Humans, of course. The Privacy Advisor. Retrieved from  https://iapp.org/news/a/the-biggest-threat-to-data-security-humans-of-course/ .

Sharma, P. (2017, June). Organizational culture as a predictor of job satisfaction: The role of age and gender. Journal of Contemporary Management Issues, 22(1), 35-40.

Taslitz, A. E. (2009, Spring). The Fourth Amendment in the twenty-first century: Technology, privacy, and human emotions. Law and Contemporary Problems, 65(2), 125-131.

Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

...Surveillance Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage,……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… questionable amidst the proposition that it is an acceptable state behavior while cyberattack in unacceptable. [3: William C. Banks, “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage”, Emory law Journal 66, (2017):513.]
Problem Statement
Cyber espionage involves illegal practices that result in information theft that could ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".