Surveillance Assemblages: Importance, Applications, And Security Goals

8131 Communication Technologies and Change

Security goals of surveillance assemblages

The usage of surveillance assemblages is increasing everyday across different sectors all around the world. A huge amount of information is stored and retrieved in the different internet and web technologies and it is very important that those data are kept and accessed securely which instigates the importance of surveillance assemblages. This technology is the modified version of the previous surveillance technologies with more efficiency and reliability (Gali?, Timan and Koops 2017). The prime purpose of the organization that are using this technology is maintaining control in a particular environment and in the governmental organization for the purpose of governing different departments of the government. These types of systems are also used by different organization such as healthcare industry for maintaining security on their premises (Beck et al. 2016). This type of system is also helpful to calculate the margin of profit and loss for any business organization. The use of this surveillance technology is also significantly increasing in the entertaining industry.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

As suggested by Doucet, (2016), the surveillance assemblages are the modified versions of the older formats with more enhanced specifications such as the virtual data doubles which obeys the physicals guidelines of specific institutions and help them to maintain their internal policies. These surveillance assemblages can also be modified with more advanced features as per the requirement of its users due to its flexible nature. The production of the advanced surveillance assemblages is done in such a way so that it very flexible with all the technologies it is associated with (Lee 2015). It is not possible for the governing bodies of each organization to monitor the activities of all individual associated with them, for this reason those organization started using the surveillance assemblages so that can manage them and guide them for better productivity (Lyon 2018).  The increasing use of the surveillance assemblages is the main reason behind its flexibility in market reach as there is a constant need of improving the technology as new problems are arriving each day for any organization so there is need to observe those and take all the necessary steps so that the issues are resolved (Thorburn 2014). The latest surveillance assemblages are more user-centric compared with the primitive surveillance technologies. The security goals of surveillance assemblages are described below.

Figure 1: Created by the author

The integrity models of the surveillance assemblages help to keep the integrity of the data from unintentional and intentional changes across various types of organizations (Haggerty and Ericson, 2000). The objectives of integrity model are to prevent unauthorized users from making any modifications to the stored data and maintaining the internal and external data consistency in a working environment.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

As Lippert and Scalia (2015) mention, the prime purpose of the availability model is to protect the network from different kinds of cyber-attacks such as the WannaCry Ransomware and Denial of Service (DoS) as those attacks lead to loss of vital information of an organization which ultimately leads to huge financial loss (Ullrich and Knopp 2018.). This model is helpful during the manmade disasters such as an act of terrorism and also from the natural disasters such as earthquakes and storms. The different kinds of issues which are related to these attacks such the server issues are also managed by the availability model of the surveillance assemblages (Puar 2017).

Applications of Surveillance Assemblages

The confidentiality aspect of surveillance assemblages helps to maintain the confidentiality of the data which are accessed by more than one organization at a time.

The use of surveillance assemblages in Facebook as it helps the Facebook users to know about their location, they just have to give the access of their location setting to the Facebook authorities. This technology has the capability of detecting who the Facebook users are with. This system is also used in different types of social activities; many criminal offences can be detected using this technology such as the major late-night accidents, vandalism of the government properties, and detection of the rioters in a sensitive area (van Aalst, Schwanen and van Liempt 2014).  In the war-affected zones or the areas which are affected by riots, these surveillance assemblages play a significant role in capturing live images, videos with date and location, the data collected from all the sources are automatically posted in different media assemblage such a YouTube. This information is seen all people all over the world and they get to know about the hostile conditions.

The media assemblage is used in different reality shows nowadays such as big brother where this technology is used to monitor the activities of the contestants who are supposed to be living in a limited environment with limited resources. The prime task of this system is to find out whether the contestants are abiding by the rules and regulations of the show or not, as this issue is one of the most important factors in winning the competition. The marketing department of any global organization uses the surveillance assemblages so that they are aware of the latest trends amongst their clients. Even in the research laboratories the use of these advanced systems is increasing each day due to its effectiveness and good reputation worldwide.

In some cases, it was found that these surveillance assemblages are used for ensuring privacy in the organization. This technology has greater application in the collection of information about any specific individual or a group of individuals depending upon the requirement. The surveillance assemblages also play an important role in the online shopping by suggesting the type of products which the customer might have an interest in. These suggestions are based on the previous product searches made by the clients.

The surveillance assemblages have a great impact on the police departments all over the world. They help to maintain the security of the civilians by its automatic image and video capturing capability (Wood 2013). All the criminal activities are detected with the use of this technology, these activities are seen by the police authorities and they take all the necessary steps for the purpose of minimizing the criminal activities in a particular town.

The organization who deals with complex calculations such as forensic departments, statistical institutions, financial institutes such as stock market departments, global corporate organizations such as Tesla uses this technology for different kinds of purposes. Careful observation of all the entities in a specific organization can be obtained by using the surveillance assemblages; those entities can be seen and managed in a better way than the primitive surveillance equipment (Slack and Wise 2005). The use of surveillance assemblages is very common in the jails so that the authorities can observe the activities of the criminals as sometimes more than one criminal is allocated to a particular cell. The organization who works in data mining projects actively uses this technology for different kinds of monitoring purposes. This technology is helpful in the identification of the actual criminal among a group of communal who works on radical activities such as terrorism and extremists, in this way this technology is used to maintain the national security.

Thus, it can be seen that surveillance assemblages are used in wide range of activities in our environment and guide our society to a way better position than it is now by controlling the criminal activities of the town. The application of all the different types of surveillance assemblages had a positive impact on our society.

The prime reasons why most the global corporations adopting this technology is to enhancing the efficiency of their organization by monitoring all the illegal activity of the employers and guide them to obey the rules and regulations of the corporation. It was seen that the use of surveillance assemblages has an impact on the productivity of an organization. These technologies help its user to modify their existing policies which can indirectly help the employers of the organization to accomplish their business objectives. The competitiveness in the market is also maintained by the surveillance assemblages. It helps the employees to work together productively for any particular project as the project members can see and manage the activities of the group members as well.

According to Kubitschko, (2015) surveillance assemblages is one of the most discrete methods of surveillance technology it is very much in use in the healthcare industry as well. The application of surveillance assemblages is increasing each day in the operations theatre all around the world. Surveillance assemblages are also very much important in managing the documents effectively in a business organization (Rueda-Solano et al. 2016). The use of surveillance assemblages is not only restricted to the information which is stored in a computer system it also plays an important role in protecting the telephonic conversation between internal and external stakeholders of the organization as some of the crucial deals of the company are sometimes done via telephonic conversations especially between the vendors (Wise 1998). Discovery recovery planning and the business continuity planning are other applications of surveillance assemblages in a business organization.

According to Fisher (2018), the most conventional methods of surveillance assemblages across different types of industries are data mining, data matching and profiling. The other methods of surveillance assemblages are body scans, smart cards, body cameras, telecommunication devices and GPS, these different kinds of surveillance assemblages are required so that the users of this equipment can continuously observe the performance of different systems and monitors its regular activities (Moore and Walker 2016). Radio frequency identification and electronic chips are incorporated into electronic devices as these are useful in managing the activities performed by those electronic devices; these help the users of the electronic devices to know more about the efficiency and effectiveness. After careful observation of the different types of surveillance assemblages, the corporation can find out the necessity regarding any new changes in their system which can be more productive than the existing system (Liang et al. 2018.). Thus, it can be understood that surveillance assemblages have the capability of increasing the productivity of an organization just by managing their system in an effective manner. All the online activities of a business enterprise can be monitored with the help of latest surveillance assemblages.

Major data breaching disasters such as the Wiki Leaks, data breach of Facebook in April are the main reasons behind corporations and governments adapting to the surveillance assemblages. The issues related to the big data analysis and metadata can be significantly reduced with the help of the surveillance assemblages. The design and development of the different types of surveillance assemblages by different organizations are done in such way so that it helps its user to accomplish the purpose of installing that equipment.

Conclusion

From the above essay it can be concluded that with all the major developments in the field of science and technology, the use of surveillance assemblages is increasing every day due to its enhanced efficiency. This technology helps in maintaining the confidentiality, integrity and availability of all the available resources in any organization and also helps to deal with major cybercrimes which negatively impact the progress of any organization. Different types of corporations are getting used to this particular technology in order to monitor the daily activities in their facility. Based on those observations, the authorities of the corporation takes all the necessary measures this brings better productivity and growth for the company.

References

Beck, E.N., Crow, A., McKee, H.A., Reilly, C.A., Vie, S., Gonzales, L. and DeVoss, D.N., 2016. Writing in an age of surveillance, privacy, and net neutrality.

Doucet, M.G., 2016. Global assemblages of security governance and contemporary international intervention. Journal of Intervention and Statebuilding, 10(1), pp.116-132.

Fisher, D.X., 2018. Situating Border Control: Unpacking Spain’s SIVE border surveillance assemblage. Political Geography, 65, pp.67-76.

Gali?, M., Timan, T. and Koops, B.J., 2017. Bentham, Deleuze and beyond: an overview of surveillance theories from the panopticon to participation. Philosophy & Technology, 30(1), pp.9-37.

Haggerty, K.D. and Ericson, R.V., 2000. The surveillant assemblage. The British journal of sociology, 51(4), pp.605-622.

Kubitschko, S., 2015. The role of hackers in countering surveillance and promoting democracy. Media and Communication, 3(2), pp.77-87.

Lee, A., 2015. Integrating subjects: Linking surveillance experiences to social patterns using ethno-epistemic assemblages. Surveillance & Society, 13.

Liang, F., Das, V., Kostyuk, N. and Hussain, M.M., 2018. Constructing a Data?Driven Society: China’s Social Credit System as a State Surveillance Infrastructure. Policy & Internet.

Lippert, R.K. and Scalia, J., 2015. Attaching Hollywood to a surveillant assemblage: Normalizing discourses of video surveillance. Media and Communication, 3(3), pp.26-38.

Lyon, D., 2018. The Culture of Surveillance: Watching as a Way of Life. John Wiley & Sons.

Moore, A. and Walker, J., 2016. Tracing the US military’s presence in Africa. Geopolitics, 21(3), pp.686-716.

Puar, J.K., 2017. Terrorist assemblages: Homonationalism in queer times. Duke University Press.

Rueda-Solano, L.A., Flechas, S.V., Galvis-Aparicio, M., Rocha-Usuga, A.A., Rincón-Barón, E.J., Cuadrado-Peña, B. and Franke-Ante, R., 2016. Epidemiological surveillance and amphibian assemblage status at the Estación Experimental de San Lorenzo, Sierra Nevada de Santa Marta, Colombia. Amphibian & Reptile Conservation, 10(1), pp.7-19.

Thorburn, E.D., 2014. Social media, subjectivity, and surveillance: Moving on from occupy, the rise of live streaming video. Communication and Critical/Cultural Studies, 11(1), pp.52-63.

Ullrich, P. and Knopp, P., 2018. Protesters’ Reactions to Video Surveillance of Demonstrations: Counter-Moves, Security Cultures, and the Spiral of Surveillance and Counter-Surveillance.

van Aalst, I., Schwanen, T. and van Liempt, I., 2014. Video-surveillance and the production of space in urban nightlife districts. In Responsible Innovation 1 (pp. 315-334). Springer, Dordrecht.

Wise, J.M., 1998. Intelligent agency. Cultural Studies, 12(3), pp.410-428.

Wood, D.M., 2013. What is global surveillance? Towards a relational political economy of the global surveillant assemblage. Geoforum, 49, pp.317-326.

Slack, J.D. and Wise, J.M., 2005. Culture+ technology: A primer. Peter Lang.