This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Camera

Internet-Connected Door Cameras

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Internet-Connected Door Cameras

The rate of technology growth is alarming. Technology is changing the way human beings interact with each other. Technology has also influenced the operation of various activities in our life. The age of artificial intelligence is now at the door. Things that were thought could not happen thirty or fifty years ago are now occurring due to improved technology in various fields. Today, every industry has advanced, and its production has rapidly increased due to the use of improved technology majorly because computers or computer-controlled systems can process more work accurately in a short while as compared to humans. Also, computer-controlled systems do not get bored due to processing the same data repeatedly. Therefore, the art of consistency and accuracy has increased the preference of computers in all fields. The introduction of the internet since the early ’70s has significantly impacted technology. The internet, which is termed as  “network of networks,” facilitates access of relevant and authorized information in any device. Also, the internet has enabled the sharing of information remotely within an organization, or remote monitoring of one’s activities and properties. Therefore, the internet has led to significant improvements in technology. However, these advancements in technology in various sectors and the growth of the internet have some social impacts. Therefore, this paper focuses on the social consequences of internet-connected door cameras.

As mentioned earlier, different fields are incorporating technology together with the human element to improve productivity and obtain accurate results. Leo Marx, the author of does improved technology mean progress believed that the introduction of the internet of things implied advancement in technology and, thus, growth (33-41). For example, the use of closed-circuit television cameras, commonly known as CCTV cameras, that exchange information over the internet has been used to track events within a building or in the streets to monitor the operation of people and improve security. These cameras record every event in places they are placed to monitor, and the footage can be reviewed to determine how a particular activity was committed and whoever committed the act. The use of these door cameras, together with growth on the internet, has dramatically facilitated the sharing of information remotely to individuals far away from their homes, thus reducing criminals or burglary cases within homes. Also, it becomes easy for security personnel within homes to monitor all activities taking place at their workplace. The internet of things has transformed the daily operation of events. Various items, such as door cameras, have now been connected to the internet to facilitate monitoring of information flow among all door cameras of a building. However, this act of entirely relying upon the internet for information has enormous social consequences, as discussed below..

Don't use plagiarised sources.Get your custom essay just from $11/page

To begin with, the increase in cyber-threats and cyber-attacks has become a significant security threat to the information stored or exchanged over the internet. Malicious attackers may bypass security protocols, thus gain access to the data transferred between the cameras and the monitoring personnel. When hackers gain unauthorized knowledge, they are likely to perform malicious acts such as blocking the cameras from sending information to the security personnel. Hackers may also decide to inject false information that reaches the monitoring personnel, thus gaining access to the rooms under surveillance. Hackers may also implant viruses on the information contacting the monitoring team, thus gaining access to all computers connected over the same network (Hutchby, 2001). Malicious attackers may decide to use the cameras to obtain more information about the room under surveillance and plan on how to launch attacks in more private areas within the room. Lastly, in case there is a confidential meeting within the place under supervision, attackers are likely to listen to everything within the conference or fetch information using the building’s or company’s network.

Secondly, the increasing use of internet-connected cameras has increased the rate in which human beings over-rely on the use of technology for security purposes. As stated earlier, the increase in the internet of things has increased cyber-crimes and attacks. Malicious attackers want to gain unauthorized information to use the data collected to attack the building or gain access to the building’s resources. Despite such threats, most people still believe that internet-connected cameras provide quality and reliable information. Thus, there is no need to incorporate human beings to provide extra security. Technological equipment may fail to capture vital information due to one reason or the other, at this stage, buildings or organizations, in general, require trained security personnel to provide maximum security. When an organization hires security personnel to provide extra protection, the staff tend to rely much on cameras, thus risking the organization’s safety. Many scientific researchers have said that technology controls us. The above statement is beyond doubt since most human beings tend to believe the results obtained from technological devices without researching to ascertain whether the result is accurate, despite the various security threats happening over the internet today and targeting the components relying on the internet to exchange resources. According to Fernad, David, the author of does technology control us,  states, “Technology is only an instrument and man does not always know how to use it (18).” Therefore, over-reliance in technology and the internet could cause a significant loss of information within an organization.

Thirdly, the use of internet-connected cameras has increased the rate or privacy violations. When attackers gain access to the information flowing through the internet, they are likely to explore private and unauthorized areas within the building, thus invading the privacy of the building’s users. Also, attackers may send ransom-wares which exploit various components within the structure that are interconnected via the internet. Woodrow Harztog, the author of why design is everything, argues that to limit the exploitation and violation of privacy, the need for proper composition is vital, as configuration specifies how the internet of things operate within a room, thus making it possible to limit the level of exploitation within a building (21-55). The whole idea of getting to choose what to connect over the internet, who you allow using your network, and the building’s components connected over the internet to enable the sharing of resources makes one in control of his or her privacy while using the internet. Limiting the sharing of personal information over the internet could significantly reduce the risk of being attacked by malicious users. Therefore, design affects how the internet of things is used, the functions it performs within a building, and how all such components are interconnected to share resources.

Lastly, using internet-connected door cameras facilitates the monitoring of large buildings at once without the need to employ a high number of security staff to do the surveillance. As much as some people may disregard the internet of things because of it being prone to attack, it is worth mentioning that it has transformed the operation of human beings. For this reason, it is rapidly growing. When there is a need to carry out surveillance of a large building, or many buildings and sending the results to a central point, adapting the use of internet-connected door cameras provides efficient results. As stated earlier, human beings tend to get bored quickly when they do one thing repeatedly over time. Since machines deliver results without getting tired or bored, it becomes more efficient to use such cameras to provide extra surveillance and security (Brey, 2005). Also, less security staff is likely to be employed to man a large building due to the presence of internet-connected cameras.

In conclusion, nothing is likely to limit the use and the growth of the internet of things. As more equipment is being connected to the internet, it is becoming rich with personal information, our daily operations, and even our belongings. On the other hand, security threats are rising significantly as malicious attackers may find a loophole, which leads to plenty of our information stored or flowing through the internet. However, despite the insecurity levels of data flowing through the internet, most people still see the internet as a reliable way of accessing information and sharing resources between their homes, offices, and other parts of the world. At this growth rate, it is crucial to ensure that the information shared or stored on the internet is safe and away from malicious attacks. Therefore, choosing what to share over the internet, who to share the resources with, and how various devices are connected over the internet is likely to limit attacks from cybercriminals.

 

 

References

Leo Marx, Makes Improved Technology Mean Progress?,” Technology Review (1987): 33-41, 71.

David E. Nye, “Does Technology Control Us?,” Technology Matters (2007), 17-31.

Philip Brey, “Artifacts as Social Agents,” Inside the Politics of Technology (2005), 61-73.

Ian Hutchby, “Technologies, Texts, and Affordances,” Sociology (2001), 441-456.

Woodrow Hartzog, “Why Design is Everything,” Privacy’s Blueprint (2019), 21-55.

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask