Tuesday, 3 January 2012

Crime in the information age

Computer crime is a regular occurrence nowadays; therefore detection is becoming more important. With the development of technology we are finding more words of preventing crime. 
Fingerprint recognition refers to the method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. Finger printing takes an image of a person's fingertips and records its characteristics in addition it has also been used by a small number of banks that have began to use fingerprint readers for authorization at ATMs. Grocery stores are experimenting with a fingerprint scan checkout that automatically recognizes and bills a registered user's credit card or debit account. More recent applications of finger recognition include use of fingerprints for voter registration.  Fingerprint recognition systems are highly accurate, they are also the most economical biometric PC user authentication technique furthermore, and they are also easy to use. Although, for some people it is very intrusive, because it is still related to criminal identification and the system can also make mistakes with the dryness or dirtiness of the finger's skin, as well as with the age. Overall this shows that the positives outweigh the negatives therefore this system is very effective.

Face recognition software is a
computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database.  It is mainly used for security purposes and can identify individuals based on their unique facial characteristics. Unlike many other identification methods they do not need to make direct contact with an individual in order to verify their identity. This can be advantageous in clean environments, for surveillance or tracking, and in automation systems.
Because the system keeps a reference model of the individual, and captures their image for identification, there may be concerns about how the system is perceived by its users. They may also be more error-prone when identifying individuals, due to the fairly recent development of the
technology. In addition, if used for security purposes, it is considerably more expensive and complex than other methods, such as mechanical locks, passwords, or identification cards.

This is a Close-up of the infrared illuminator. The light is invisible to the human eye, but creates a day-like environment for the surveillance cameras.



This is a Swiss European surveillance system that uses facial recognition and vehicle make, model, color and license plate reader.



A huge element of preventing crime is down to Close Circuit Television more commonly known as CCTV, this system has relied heavily on ICT, on average the CCTV cameras are all over the place these days – in shops, on street corners as well as many other places. These cameras help to detect crime, prevent crime and can be used as evidence if needed. They constantly film different places and can be placed in crime hotspots. CCTV is commonly implemented to deter crime. Especially used in the United Kingdom, CCTV cameras can be seen on nearly every corner of London and other major cities. Many cameras are needed for monitoring cities, and the number of cameras used has grown tremendously over the years. The majority of CCTV cameras are used for basic security surveillance, normally to prevent theft. CCTV is useful for the police as it is hard for the police to be everywhere at once. Therefore CCTV is useful as it runs for 24 hours a day. In the UK there are around 2.5 million cameras in London the average citizen is caught on CCTV cameras at a rate of almost 300 times per day.  However although there are a high amount of positives to using these cameras some people believe that there are to many cameras and its becoming uncomfortable although on the other hand It could also be said that the cameras are there and protecting people and making them for more comfortable walking the streets at night.  Therefore this has mixed opinions although the positives outweigh the negatives.





Criminal records are also another huge aspect of crime protection. The impact of IT has impacted society massively; the development of IT has allowed for us to do new things with computers and in terms of crime protection criminal records stored on computer databases is crucial. The PNC database contains around 6.1 million people. The database is split up into 4 categories:
  1. Persons convicted of serious offences
  2. Persons wanted or sought by the police for various reasons
  3. Persons missing (or found)
  4. Disqualified drivers
The PNC system holds information and allows it to be shared throughout the country, this means the police can piece together evidence in an efficient way, it is open 24 hours a day, seven days a week so it is impossible for an officer to not be able to find the information they need. The system takes seconds for the information to be transferred. The PNC deals with about 65 million transactions a year, which shows how crucial this piece of IT is and how much it can help. Whereas if we refer to the Criminal records bureau database. This database holds all the information relating to past criminal offenders. This database makes it possible for police or even businesses to check records on any to find any previous convictions. People who work with young children especially teachers have to be checked against this database before they are allowed to complete the job. Therefore, without this database people with past convictions even dangerous people would be able to work with young children this conveys how important IT is in today’s society.


With  the development of IT there has been some problems, cyber bullying has becoming a adverse effect with the development of IT this can be anything from using social networking sites to sending a text message on a phone.  With the majority of today’s society having mobile phones cyber bullying can occur easily. The main factor to why this cyber bullying happens is down to the screen in between the person getting bullied and the bully, the bully doesn’t realise the effect he is having, this bullying can go on for months even years with the victim becoming more tormenting cyber is hard to stop often purely down to the adults e.g. teachers or parents not knowing the bullying is happening.  Cyber bullying can lead terrible consequences even a young person taking their own life therefore this portrays that the development of IT has not had all positive effects on society.

No comments:

Post a Comment