Edudorm Facebook

Application Tacit Consent

Application Tacit Consent

There are a number of technologies that have emerged that can be useful to law enforcers in apprehending criminals (Willard, 2007). In that, the technologies can mainly benefit all the law enforcer ranging from police officers to investigators in determining facts regarding different cases and solutions to some of the prevailing issues. This ranges from the use of GPS to sky drones. Two major technologies that can be used in reducing crimes are robotic cameras and software’s that seek to mainly gathers data from suspects privately without being suspected with just the use of normal phones or computers (Willard, 2007). Robotic cameras are mainly utilized in surveillance of operations from the sky. These devices are highly capable because they utilize remote and can access any needed area without being detected.

The robotic camera holds an electronic powered motor with customized wheels that stirs its movement and exploration within a set location (Garcia-Rodriguez & Cazorla, 2013). The devices can be operated by a single individual while recording everything that is being viewed to be analyzed later. The device is highly technological because it is wireless and has the ability to access even the remotest part. Through this device, the law enforcers can mainly focus on ensuring that they survey areas that are characterized by the highest crime rate to observe individual behaviors and stop crimes (Garcia-Rodriguez & Cazorla, 2013). This is relative to community policing which mainly involves moving around the communities to ensure that crimes are prevented. This is because when individuals are aware that they are being spied then it will mainly discourage them from engaging in any crime. In most of the police departments, this can be utilized in assessing areas and enabling them to respond adequately to any rising crime. In that, they can be used within building and outside and thus the officers can utilize them to detect bombs through the use of the controllers to view any suspicious parcels. In crowded location, this devices are highly essential in stopping any terrorist of criminal attack by searching everyone respectively. The acquired information can thus help to assure the safety of the public (Garcia-Rodriguez & Cazorla, 2013).

The use of computer-based software’s is an additional technology that mainly gathers online information from phones and online sites from the public (Peak, 2015). For those being suspected of certain offenses, the devices can thus be utilized to detect the motives and the plans. In this context, the gathered information works to assert the safety of the public in general by stopping crimes from occurring. This is because technology has allowed the sharing of information from different locations which can easily be accessed through this surveillance software without the suspicion of those that are being spied (Garcia-Rodriguez & Cazorla, 2013).

However, these technologies have presented varying issues in regard to individual’s privacy (Willard, 2007). This is because most of those spied might be innocent yet without their knowledge some personal information might be accessed which violates their privacy privileges in general. Based on the fourth amendment the privacy of an individual should never be intruded without a probable cause. Those that choose to use technology have, however, given tacit consent for their personal content (Peak, 2015). In that personal information entails mainly details such as residence, phone details and so on. Agreeing to use the sites means that one has given the consent for the general use of such details (Peak, 2015).

 

 

 

 

References

Garcia-Rodriguez, J., & Cazorla, Q. M. A. (2013). Robotic vision: Technologies for machine learning and vision applications.

Peak, K. J. (2015). Introduction to criminal justice. Los Angeles [etc.: Sage.

Willard, N. E. (2007). Cyberbullying and cyberthreats: Responding to the challenge of online social aggression, threats, and distress. Champaign, Ill: Research Press.

628 Words  2 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...