Essay Example on a Look Into Surveillance: Ancient to Modern Monitoring Techniques

Paper Type:  Essay
Pages:  5
Wordcount:  1176 Words
Date:  2023-05-23
Categories: 

Introduction

We live in an era of surveillance, where monitoring everything is an order of the day. Advancement in digital and information technologies has, by far, accelerated the pace and manner of surveillance. Information, behaviour, and activities are the most crucial aspects of surveillance. The act of surveillance is, however, not a new concept for it has been in existence since long ago, where mere observation was the only monitoring mode available. Monitoring techniques have slowly evolved over the years from the use of one's pair of eyes to electronic equipment like the use of closed-circuit television popularly known as CCTV. Intelligence has people, businesses, and governments using all sorts of surveillance techniques in the bid to protect matters of interests or spur competition. Information gathering in today's surveillance brings out the issue of privacy. Nothing seems private anymore, and thanks to monitoring, breach of confidentiality and terrorism are part of our lives. Although surveillance is essential, it has done more harm than good to society.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Summary of the Article

This essay concentrates on Thompson and Hickey's book called Society in Focus: An Introduction to Sociology. Thompson and Hickey (2011), talk about surveillance to be a growing trend as governments spy on their citizens. Surveillance is no longer about spying and collecting information about other nations or supposed enemies of a state. Surveillance has turned governments against their people as privacies are invaded all in a bid to ensure effective management and directing of a country's internal affairs. Surveillance is trending and makes use of high-tech devices. There is information sharing between governments and corporations whose impact is the invasion of people's privacy.

The Credibility of the Author's Message

The credibility of a writer's message is determined through the merits of ideas, the currency of the word, among other aspects. The views on surveillance, as presented by the authors, touch on everyone's lives. They bring out the predicaments the society faces, such as privacy in pursuit of human intelligence, and it is something that everyone can relate to. Surveillance is not something of the past; instead, it is an ongoing issue that everyone knows about. With the presentation of a current issue that is beneficial for society, it is safe to say that the authors' message is credible.

Reliability of Evidence

When evidence of particular information is reliable, it means that it is trustworthy and believable. The extent to which information is trustworthy varies from one piece of information to another. The degree of reliability depends on aspects such as objectivity and timeliness of the data. When data is said to be objective, it means that it is independent of various biases, including one's imagination, perception, and emotions. Thompson and Hickey's surveillance message does not contain personal opinions; instead, it draws information from reliable sources such as the USA Patriot Act of 2001. With sound sources such as that, it is clear that the message on privacy the two authors put forward is objective. The information provided by the authors is timely since it talks about surveillance and privacy-related issues; these are ongoing issues that have people talking all over the world. It is clear that the evidence presented by the authors is reliable; having looked at objectivity and timeliness.

The Relevance of the Message

The article emphasizes the lack of privacy in surveillance. There is an increase in spying, sale of personal information, identity theft because of privacy invasion (Thompson & Hickey, 2011, p.383). The issue of privacy in surveillance is not only relevant in society today but also deep-rooted. Matters surrounding privacy and surveillance are in no way likely to resolve soon, especially with the continued advancement of information and digital technology. Society needs to be aware of the extreme lack of privacy brought about by surveillance; It is up to the society to find alternatives for dealing with increasing privacy invasion, hence the authors' message is essential for it creates awareness on the dangers existing and those lurking in surveillance. Judging by the nature of the message, it is likely that it will still maintain its relevancy in the future.

Techniques that Enabled Effective Messaging

Effective messages, according to Osgood (2018), bring out a powerful combination, including written, visual, and verbal content. Achieving effective messaging requires some techniques, for instance, understanding one's audience. If a message is to be effective, then it needs to resonate with the intended audience. Another technique that enables effective messaging, according to Osgood (2018), is the ability to compel. Compulsion denotes attraction; hence a compelling message should captivate its audience. Consistency is another mode of achieving effective messaging, and it requires an author to be reliable and trustworthy. An author needs to both visceral and literal in a bid to achieve effective messaging, meaning the sharing of knowledge is done through emotional resonance, which requires combining conceptual metaphors, facts, and personal stories. Such a combination makes the audience fully understand the message to the extent of making straightforward interpretations. Osgood (2018) also expects an author to be open and ready for feedback, which confirms that the message has reached the intended audience. Opening up to other influences ensures that messages sent are of good quality.

Reading through Thompson and Hickey's article on surveillance, one does not need further explanation of what is being talked about. The message comes out loud and clear, indicating that it resonates with the audience. People are not familiar with cameras but also comfortable. Cameras can be found almost everywhere, including rooftops, streetlights and lampposts. Cameras can be visible such as the ones on the lampposts or hidden to the public and made visible only to the authorities. Monitoring happens all-time round (Thompson & Hickey, 2011, p.383). This excerpt is the beginning of the article, and it captures one's attention the moment they start reading. The statement compels one to want to know more, and this ability is a characteristic of effective messaging. The message of the article is also easily understood and interpreted hence making it effective.

Conclusion

In conclusion, surveillance is more harmful than good to society even though it is essential. Reading the article by Thompson and Hickey, this is the message that is derived outright. The authors bring to light the fact that surveillance nowadays concentrates on a nation's people, monitoring everyone. Privacies have been breached without care so that governments can control their citizens. Invasion of privacy brings more harm than good in society despite surveillance being justified as essential in running businesses and governments. The powerful message of privacy invasion is credible because it is current and beneficial to society. Evidence used to support this message is reliable since it is timely and objective. The privacy invasion message of the article is relevant to society today since it is ongoing. The authors have achieved effectiveness in communicating the privacy invasion message through compulsion, resonance, and literacy.

References

Osgood, C. (2018, July 10). Communicating with impact: Ten elements of effective messaging. Forbes.https://www.forbes.com/sites/ellevate/2018/07/10/communicating-with-impact-ten-elements-of-effective-messaging/#109946451805

Thompson, W. E., & Hickey, J. V. (2011). Society in focus: an introduction to sociology (7th ed.). Pearson Education, Inc.

Cite this page

Essay Example on a Look Into Surveillance: Ancient to Modern Monitoring Techniques. (2023, May 23). Retrieved from https://proessays.net/essays/essay-example-on-a-look-into-surveillance-ancient-to-modern-monitoring-techniques

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism