Misplaced Pages

Surveillance

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

Management (or managing ) is the administration of organizations, whether they are a business , a nonprofit organization , or a government body through business administration , nonprofit management , or the political science sub-field of public administration respectively. It is the process of managing the resources of businesses, governments, and other organizations.

#19980

165-431: Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing , or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic . Increasingly, governments may also obtain consumer data through

330-417: A Bachelor of Commerce or a Master of Business Administration degree. Some major organizations, including companies, non-profit organizations, and governments, require applicants to managerial or executive positions to hold at minimum bachelor's degree in a field related to administration or management, or in the case of business jobs, a Bachelor of Commerce or a similar degree. At the undergraduate level,

495-442: A chief financial officer , chief technology officer , and so on. They are responsible for controlling and overseeing the operations of the entire organization. They set a " tone at the top " and develop strategic plans , company policies , and make decisions on the overall direction of the organization. In addition, top-level managers play a significant role in the mobilization of outside resources. Senior managers are accountable to

660-575: A $ 350 million grant towards the development of the Domain Awareness System , which is an interconnected system of sensors including 18,000 CCTV cameras used for continual surveillance of the city by both police officers and artificial intelligence systems . In the United Kingdom , the vast majority of video surveillance cameras are not operated by government bodies, but by private individuals or companies, especially to monitor

825-554: A bank machine, payment by credit card, use of a phone card, call from home, checked out library book, rented video, or otherwise complete recorded transaction generates an electronic record. Public records—such as birth, court, tax and other records—are increasingly being digitized and made available online. In addition, due to laws like CALEA , web traffic and online purchases are also available for profiling. Electronic record-keeping makes data easily collectable, storable, and accessible—so that high-volume, efficient aggregation and analysis

990-671: A broad understanding of competition, world economies, and politics. In addition, the CEO is responsible for implementing and determining (within the board's framework) the broad policies of the organization. Executive management accomplishes the day-to-day details, including instructions for the preparation of department budgets, procedures, and schedules; appointment of middle-level executives such as department managers; coordination of departments; media and governmental relations; and shareholder communication. Consist of general managers , branch managers and department managers. They are accountable to

1155-729: A centralized database and monitoring station, which will, upon completion of the project, contain a picture of the face of every person in China: over 1.3 billion people. Lin Jiang Huai, the head of China's "Information Security Technology" office (which is in charge of the project), credits the surveillance systems in the United States and the U.K. as the inspiration for what he is doing with the Golden Shield Project. The Defense Advanced Research Projects Agency (DARPA)

1320-522: A committee at the European Parliament backed a measure that, if it is enacted, would require American companies to seek clearance from European officials before complying with United States warrants seeking private data. The legislation has been under consideration for two years. The vote is part of efforts in Europe to shield citizens from online surveillance in the wake of revelations about

1485-470: A common belief that monitoring can increase productivity, it can also create consequences such as increasing chances of deviant behavior and creating punishments that are not equitable to their actions. Additionally, monitoring can cause resistance and backlash because it insinuates an employer's suspicion and lack of trust. Data mining is the application of statistical techniques and programmatic algorithms to discover previously unnoticed relationships within

1650-453: A complex mathematical algorithm that is unique to an individual phone, and is inaccessible to Apple. The encryption feature on the iPhone 6 has drawn criticism from FBI director James B. Comey and other law enforcement officials since even lawful requests to access user content on the iPhone 6 will result in Apple supplying "gibberish" data that requires law enforcement personnel to either break

1815-528: A court, with no need to even get supervisor approval on the part of the analyst." He added that the NSA databank, with its years of collected communications, allows analysts to search that database and listen "to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you've entered, and it also alerts them to any further activity that people connected to that email address or that IP address do in

SECTION 10

#1732772862020

1980-627: A database known as " Pinwale ", which stores and indexes large numbers of emails of both American citizens and foreigners. Additionally, the NSA runs a program known as PRISM , which is a data mining system that gives the United States government direct access to information from technology companies . Through accessing this information, the government is able to obtain search history, emails, stored information, live chats, file transfers, and more. This program generated huge controversies in regards to surveillance and privacy, especially from U.S. citizens. The official and unofficial tapping of telephone lines

2145-530: A dedicated personnel department. By 1929 that number had grown to over one-third. Formal management education became standardized at colleges and universities. Colleges and universities capitalized on the needs of corporations by forming business schools and corporate placement departments. This shift toward formal business education marked the creation of a corporate elite in the US. By about 1900 one finds managers trying to place their theories on what they regarded as

2310-589: A far-reaching spying program by the U.S. National Security Agency . Germany and France have also had ongoing mutual talks about how they can keep European email traffic from going across American servers. On October 21, 2013, the French Foreign Minister, Laurent Fabius , summoned the U.S. Ambassador, Charles Rivkin , to the Quai d'Orsay in Paris to protest large-scale spying on French citizens by

2475-489: A financial arrangement between the NSA's Special Source Operations (SSO) division and PRISM partners in the millions of dollars. Documents indicate that PRISM is "the number one source of raw intelligence used for NSA analytic reports", and it accounts for 91% of the NSA's internet traffic acquired under FISA section 702 authority." The leaked information came after the revelation that the FISA Court had been ordering

2640-623: A hearing before the House Judiciary Committee that they must change their use of sweeping National Security Agency surveillance programs or face losing the provisions of the Foreign Intelligence Surveillance Act that have allowed for the agency's mass collection of telephone metadata. "Section 215 expires at the end of 2015, and unless you realize you've got a problem, that is not going to be renewed," Rep. Jim Sensenbrenner, R-Wis., author of

2805-614: A judge would not approve them." The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country, and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia. A spokesman said the military was filtering out reports and content relating to government surveillance programs to preserve "network hygiene" and prevent any classified material from appearing on unclassified parts of its computer systems. Access to

2970-491: A manager's organization and a foe's. The writings of influential Chinese Legalist philosopher Shen Buhai may be considered to embody a rare premodern example of abstract theory of administration. American philosopher Herrlee G. Creel and other scholars find the influence of Chinese administration in Europe by the 12th century. Thomas Taylor Meadows, Britain's consul in Guangzhou , argued in his Desultory Notes on

3135-538: A market embracing diversity and a rising service industry. Managers are currently being trained to encourage greater equality for minorities and women in the workplace, by offering increased flexibility in working hours, better retraining, and innovative (and usually industry-specific) performance markers. Managers destined for the service sector are being trained to use unique measurement techniques, better worker support, and more charismatic leadership styles. Human resources finds itself increasingly working with management in

3300-411: A mobile phone (and thus the person carrying it) can be determined easily even when the phone is not being used, using a technique known as multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone. The legality of such techniques has been questioned in the United States, in particular whether a court warrant

3465-467: A movement for evidence-based management . The English verb manage has its roots in the fifteenth-century French verb mesnager , which often referred in equestrian language "to hold in hand the reins of a horse". Also the Italian term maneggiare (to handle, especially tools or a horse) is possible. In Spanish , manejar can also mean to rule the horses. These three terms derive from

SECTION 20

#1732772862020

3630-412: A person's emotional state based on an analysis of their facial expressions, how fast they are talking, the tone and pitch of their voice, their posture, and other behavioral traits. This might be used for instance to see if a person's behavior is suspect (looking around furtively, "tense" or "angry" facial expressions, waving arms, etc.). A more recent development is DNA profiling , which looks at some of

3795-603: A person's facial features to accurately identify them, usually from surveillance video. Both the Department of Homeland Security and DARPA are heavily funding research into facial recognition systems. The Information Processing Technology Office ran a program known as Human Identification at a Distance which developed technologies that are capable of identifying a person at up to 500 ft (150 m) by their facial features. Another form of behavioral biometrics, based on affective computing , involves computers recognizing

3960-537: A philosophy. Critics, however, find this definition useful but far too narrow. The phrase "management is what managers do" occurs widely, suggesting the difficulty of defining management without circularity , the shifting nature of definitions and the connection of managerial practices with the existence of a managerial cadre or of a class . One habit of thought regards management as equivalent to " business administration " and thus excludes management in places outside commerce , for example in charities and in

4125-454: A physical or mechanical mechanism) implies human motivation and implies some sort of successful progress or system outcome. As such, management is not the manipulation of a mechanism (machine or automated program), not the herding of animals, and can occur either in a legal or in an illegal enterprise or environment. From an individual's perspective, management does not need to be seen solely from an enterprise point of view, because management

4290-668: A searchable database , and by video analysis software (such as VIRAT and HumanID ). The amount of footage is also drastically reduced by motion sensors which record only when motion is detected. With cheaper production techniques, surveillance cameras are simple and inexpensive enough to be used in home security systems, and for everyday surveillance. Video cameras are one of the most common methods of surveillance. As of 2016, there are about 350 million surveillance cameras worldwide. About 65% of these cameras are installed in Asia. The growth of CCTV has been slowing in recent years. In 2018, China

4455-448: A society." Obama also said that government collection of data was needed in order to catch terrorists. In separate statements, senior Obama administration officials (not mentioned by name in source) said that Congress had been briefed 13 times on the programs since 2009. On June 8, 2013, Director of National Intelligence Clapper made an additional public statement about PRISM and released a fact sheet providing further information about

4620-747: A speech before the UN General Assembly on September 24, 2013. As a result, Boeing lost out on a US$ 4.5 billion contract for fighter jets to Sweden's Saab Group . Canada 's national cryptologic agency, the Communications Security Establishment (CSE), said that commenting on PRISM "would undermine CSE's ability to carry out its mandate." Privacy Commissioner Jennifer Stoddart lamented Canada's standards when it comes to protecting personal online privacy stating "We have fallen too far behind" in her report. "While other nations' data protection authorities have

4785-444: A staunch defence of her nation's intelligence co-operation with the United States. Brazil 's president at the time, Dilma Rousseff , responded to Snowden's reports that the NSA spied on her phone calls and emails by cancelling a planned October 2013 state visit to the United States, demanding an official apology, which by October 20, 2013, hadn't come. Also, Rousseff classified the spying as unacceptable between more harsh words in

4950-542: A subsidiary of telecommunications company Verizon Communications to turn over logs tracking all of its customers' telephone calls to the NSA. U.S. government officials have disputed criticisms of PRISM in the Guardian and Washington Post articles and have defended the program, asserting that it cannot be used on domestic targets without a warrant . Additionally claiming the program has helped to prevent acts of terrorism , and that it receives independent oversight from

5115-420: A thoroughly scientific basis (see scientism for perceived limitations of this belief). Examples include Henry R. Towne 's Science of management in the 1890s, Frederick Winslow Taylor 's The Principles of Scientific Management (1911), Lillian Gilbreth 's Psychology of Management (1914), Frank and Lillian Gilbreth 's Applied motion study (1917), and Henry L. Gantt 's charts (1910s). J. Duncan wrote

Surveillance - Misplaced Pages Continue

5280-399: A training capacity to help collect management data on the success (or failure) of management actions with employees. Good practices identified for managers include "walking the shop floor", and, especially for managers who are new in post, identifying and achieving some "quick wins" which demonstrate visible success in establishing appropriate objectives. Leadership writer John Kotter uses

5445-539: A written directive from the Attorney General and the Director of National Intelligence." It said that the attorney general provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, "provid[ing] an unprecedented degree of accountability and transparency." Democratic senators Udall and Wyden , who serve on the U.S. Senate Select Committee on Intelligence , subsequently criticized

5610-716: Is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD US-984XN . PRISM collects stored internet communications based on demands made to internet companies such as Google LLC and Apple under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms. Among other things,

5775-459: Is a rigorous review process of applications submitted by the executive branch, spearheaded initially by five judicial branch lawyers who are national security experts, and then by the judges, to ensure that the court's authorizations comport with what the applicable statutes authorize." The accusation of being a "rubber stamp" was further rejected by Walton who wrote in a letter to Senator Patrick J. Leahy: "The annual statistics provided to Congress by

5940-400: Is a technology that measures and analyzes human physical and/or behavioral characteristics for authentication, identification, or screening purposes. Examples of physical characteristics include fingerprints, DNA, and facial patterns. Examples of mostly behavioral characteristics include gait (a person's manner of walking) or voice. Facial recognition is the use of the unique configuration of

6105-478: Is able to install software, such as the FBI's Magic Lantern and CIPAV , on a computer system, they can easily gain unauthorized access to this data. Such software could be installed physically or remotely. Another form of computer surveillance, known as van Eck phreaking , involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters. The NSA runs

6270-911: Is an essential function in improving one's life and relationships . Management is therefore everywhere and it has a wider range of application. Communication and a positive endeavor are two main aspects of it either through enterprise or through independent pursuit. Plans, measurements , motivational psychological tools, goals, and economic measures (profit, etc.) may or may not be necessary components for there to be management. At first, one views management functionally, such as measuring quantity, adjusting plans , and meeting goals , but this applies even in situations where planning does not take place. From this perspective, Henri Fayol (1841–1925) considers management to consist of five functions : In another way of thinking, Mary Parker Follett (1868–1933), allegedly defined management as "the art of getting things done through people". She described management as

6435-588: Is an example of such a network. One common form of surveillance is to create maps of social networks based on data from social networking sites such as Facebook , MySpace , Twitter as well as from traffic analysis information from phone call records such as those in the NSA call database , and others. These social network "maps" are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities. Many U.S. government agencies such as

6600-559: Is based in the United States. The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States. Snowden's subsequent disclosures included statements that government agencies such as the United Kingdom 's GCHQ also undertook mass interception and tracking of internet and communications data  – described by Germany as "nightmarish" if true  – allegations that

6765-554: Is connected to the device, there is no way for the user to know that they are being tracked. The operator of the stingray is able to extract information such as location, phone calls, and text messages, but it is widely believed that the capabilities of the StingRay extend much further. A lot of controversy surrounds the StingRay because of its powerful capabilities and the secrecy that surrounds it. Mobile phones are also commonly used to collect location data. The geographical location of

Surveillance - Misplaced Pages Continue

6930-507: Is explained below in specifications of their different responsibilities and likely job titles. The top or senior layer of management is a small group which consists of the board of directors (including non-executive directors , executive directors and independent directors ), president , vice-president , CEOs and other members of the C-level executives. Different organizations have various members in their C-suite, which may include

7095-552: Is funding a research project called Combat Zones That See that will link up cameras across a city to a centralized monitoring station, identify and track individuals and vehicles as they move through the city, and report "suspicious" activity (such as waving arms, looking side-to-side, standing in a group, etc.). At Super Bowl XXXV in January 2001, police in Tampa, Florida, used Identix's facial recognition software, FaceIt, to scan

7260-402: Is installing automated facial recognition and license plate recognition devices in its squad cars, and providing handheld face scanners, which officers will use to identify people while on patrol. Facial thermographs are in development, which allow machines to identify certain emotions in people such as fear or stress, by measuring the temperature generated by blood flow to different parts of

7425-496: Is only used to collect internet communications, not telephone conversations. These internet communications are not collected in bulk, but in a targeted way: only communications that are to or from specific selectors, like e-mail addresses, can be gathered. Under PRISM, there is no collection based on keywords or names. The actual collection process is done by the Data Intercept Technology Unit (DITU) of

7590-583: Is possible at significantly lower costs. Managing Larger organizations generally have three hierarchical levels of managers, in a pyramid structure: Management is taught across different disciplines at colleges and universities. Prominent major degree programs in management include Management , Business Administration and Public Administration . Social scientists study management as an academic discipline , investigating areas such as social organization , organizational adaptation , and organizational leadership . In recent decades, there has been

7755-401: Is required. Records for one carrier alone (Sprint), showed that in a given year federal law enforcement agencies requested customer location data 8 million times. In response to customers' privacy concerns in the post Edward Snowden era, Apple's iPhone 6 has been designed to disrupt investigative wiretapping efforts. The phone encrypts e-mails, contacts, and photos with a code generated by

7920-623: Is that it can unjustifiably violate people's privacy and is often criticized by civil liberties activists. Democracies may have laws that seek to restrict governmental and private use of surveillance, whereas authoritarian governments seldom have any domestic restrictions. Espionage is by definition covert and typically illegal according to the rules of the observed party, whereas most types of surveillance are overt and are considered legal or legitimate by state authorities. International espionage seems to be common among all types of countries. The vast majority of computer surveillance involves

8085-401: Is the midway management of a categorized organization, being secondary to the senior management but above the deepest levels of operational members. An operational manager may be well-thought-out by middle management or may be categorized as a non-management operator, liable to the policy of the specific organization. The efficiency of the middle level is vital in any organization since it bridges

8250-399: Is the monitoring of a person or group's behavior by a corporation. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of business intelligence , which enables the corporation to better tailor their products and/or services to be desirable by their customers. Although there is

8415-643: Is the most popular professional degree at the master's level and can be obtained from many universities in the United States. MBA programs provide further education in management and leadership for graduate students. Other master's degrees in business and management include Master of Management (MM) and the Master of Science (M.Sc.) in business administration or management, which is typically taken by students aiming to become researchers or professors. There are also specialized master's degrees in administration for individuals aiming at careers outside of business , such as

SECTION 50

#1732772862020

8580-675: Is widespread. In the United States for instance, the Communications Assistance for Law Enforcement Act (CALEA) requires that all telephone and VoIP communications be available for real-time wiretapping by Federal law enforcement and intelligence agencies. Two major telecommunications companies in the U.S.— AT&T Inc. and Verizon —have contracts with the FBI, requiring them to keep their phone call records easily searchable and accessible for Federal agencies, in return for $ 1.8 million per year. Between 2003 and 2005,

8745-536: Is working on plans to build up a fleet of surveillance UAVs ranging from micro-aerial vehicles to full-size drones , to be used by police forces throughout the U.K. In addition to their surveillance capabilities, MAVs are capable of carrying tasers for " crowd control ", or weapons for killing enemy combatants. Programs such as the Heterogeneous Aerial Reconnaissance Team program developed by DARPA have automated much of

8910-731: The Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) are investing heavily in research involving social network analysis. The intelligence community believes that the biggest threat to U.S. power comes from decentralized, leaderless, geographically dispersed groups of terrorists , subversives , extremists , and dissidents . These types of threats are most easily countered by finding important nodes in

9075-591: The Doctor of Business Administration (DBA), the Doctor of Public Administration (DPA), the Ph.D. in business administration, the Ph.D. in management, and the Ph.D. in political science with a concentration in public administration. In the 2010s, doctorates in business administration and management were available with many specializations. While management trends can change fast, the long-term trend in management has been defined by

9240-598: The Information Awareness Office , or companies such as Verint , and Narus , which search for certain words or phrases, to decide whether to dedicate a human agent to the call. Law enforcement and intelligence services in the United Kingdom and the United States possess technology to activate the microphones in cell phones remotely, by accessing phones' diagnostic or maintenance features in order to listen to conversations that take place near

9405-436: The Master of Public Administration (MPA) degree (also offered as a Master of Arts or Master of Science in public administration in some universities), for students aiming to become managers or executives in the public service and the Master of Health Administration , for students aiming to become managers or executives in the health care and hospital sector. Management doctorates are the most advanced terminal degrees in

9570-579: The NSA has been taking advantage of this ambiguity in the law by collecting metadata on "at least hundreds of millions" of "incidental" targets from around the world. The NSA uses an analytic tool known as CO-TRAVELER in order to track people whose movements intersect and to find any hidden connections with persons of interest. The Snowden leaks have also revealed that the British Government Communications Headquarters (GCHQ) can access information collected by

9735-457: The NSA , the FBI and the now-defunct Information Awareness Office , to develop, purchase, implement, and operate systems such as Carnivore , NarusInsight , and ECHELON to intercept and analyze all of this data to extract only the information which is useful to law enforcement and intelligence agencies. Computers can be a surveillance target because of the personal data stored on them. If someone

9900-515: The NSA call database , and extract "communities of interest"—groups of people who call each other regularly, or groups that regularly visit certain sites on the Internet. AT&T originally built the system to develop "marketing leads", but the FBI has regularly requested such information from phone companies such as AT&T without a warrant, and, after using the data, stores all information received in its own databases, regardless of whether or not

10065-561: The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress ." The fact sheet also stated that "the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based on

SECTION 60

#1732772862020

10230-795: The government jobs . Many colleges and universities also offer certificates and diplomas in business administration or management, which typically require one to two years of full-time study. To manage technological areas, one often needs an undergraduate degree in a STEM area . At the graduate level students aiming at careers as managers or executives may choose to specialize in major subareas of management or business administration such as entrepreneurship , human resources , international business , organizational behavior , organizational theory , strategic management , accounting , corporate finance , entertainment, global management, healthcare management , investment management , sustainability and real estate . A Master of Business Administration (MBA)

10395-582: The public sector . More broadly, every organization must "manage" its work, people, processes, technology, etc. to maximize effectiveness. Nonetheless, many people refer to university departments that teach management as " business schools ". Some such institutions (such as the Harvard Business School ) use that name, while others (such as the Yale School of Management ) employ the broader term "management". English speakers may also use

10560-602: The "PRISM/US-984XN Overview" presentation on October 21, 2013. The British newspaper The Guardian disclosed new PRISM slides (see pages 3 and 6) in November 2013 which on the one hand compares PRISM with the Upstream program , and on the other hand deals with collaboration between the NSA's Threat Operations Center and the FBI. PRISM is a program from the Special Source Operations (SSO) division of

10725-414: The 1940s, Patrick Blackett worked in the development of the applied-mathematics science of operations research , initially for military operations. Operations research, sometimes known as " management science " (but distinct from Taylor's scientific management ), attempts to take a scientific approach to solving decision problems and can apply directly to multiple management problems, particularly in

10890-611: The 1950s. The United States Department of Homeland Security is in the process of testing UAVs to patrol the skies over the United States for the purposes of critical infrastructure protection , border patrol, " transit monitoring ", and general surveillance of the U.S. population. Miami-Dade police department ran tests with a vertical take-off and landing UAV from Honeywell , which is planned to be used in SWAT operations. Houston's police department has been testing fixed-wing UAVs for use in "traffic control". The United Kingdom , as well,

11055-460: The Attorney General ...—frequently cited to in press reports as a suggestion that the Court's approval rate of application is over 99%—reflect only the number of final applications submitted to and acted on by the Court. These statistics do not reflect the fact that many applications are altered to prior or final submission or even withheld from final submission entirely, often after an indication that

11220-477: The FBI sent out more than 140,000 " National Security Letters " ordering phone companies to hand over information about their customers' calling and Internet histories. About half of these letters requested information on U.S. citizens. Human agents are not required to monitor most calls. Speech-to-text software creates machine-readable text from intercepted audio, which is then processed by automated call-analysis programs, such as those developed by agencies such as

11385-492: The FBI, which on behalf of the NSA sends the selectors to the U.S. internet service providers, which were previously served with a Section 702 Directive. Under this directive, the provider is legally obliged to hand over (to DITU) all communications to or from the selectors provided by the government. DITU then sends these communications to NSA, where they are stored in various databases, depending on their type. Data, both content and metadata, that already have been collected under

11550-680: The FISA Amendments Act of 2008 "specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant" when one of the parties is outside the U.S. The most detailed description of the PRISM program can be found in a report about NSA's collection efforts under Section 702 FAA, that was released by the Privacy and Civil Liberties Oversight Board (PCLOB) on July 2, 2014. According to this report, PRISM

11715-684: The Government and People of China (1847) that "the long duration of the Chinese empire is solely and altogether owing to the good government which consists in the advancement of men of talent and merit only," and that the British must reform their civil service by making the institution meritocratic . Influenced by the ancient Chinese imperial examination , the Northcote–Trevelyan Report of 1854 recommended that recruitment should be on

11880-548: The Indian Arthashastra by Chanakya (written around 300 BC), and The Prince by Italian author Niccolò Machiavelli ( c.  1515 ). Written in 1776 by Adam Smith , a Scottish moral philosopher , The Wealth of Nations discussed efficient organization of work through division of labour . Smith described how changes in processes could boost productivity in the manufacture of pins . While individuals could produce 200 pins per day, Smith analyzed

12045-496: The Metropolitan Police Department, so they could perform "day-to-day monitoring". The development of centralized networks of CCTV cameras watching public areas—linked to computer databases of people's pictures and identity ( biometric data), able to track people's movements throughout the city, and identify whom they have been with—has been argued by some to present a risk to civil liberties . Trapwire

12210-544: The NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone , to focus on stored data that telecommunication filtering systems discarded earlier, and to get data that is easier to handle. PRISM began in 2007 in the wake of the passage of the Protect America Act under the Bush Administration . The program is operated under

12375-595: The NSA engaged in "dangerous" and "criminal" activity by "hacking" civilian infrastructure networks in other countries such as "universities, hospitals, and private businesses", and alleged that compliance offered only very limited restrictive effect on mass data collection practices (including of Americans) since restrictions "are policy-based, not technically based, and can change at any time", adding that "Additionally, audits are cursory, incomplete, and easily fooled by fake justifications", with numerous self-granted exceptions, and that NSA policies encourage staff to assume

12540-708: The NSA on American citizens. Once the data has been collected, the GCHQ can hold on to it for up to two years. The deadline can be extended with the permission of a "senior UK official". Surveillance cameras, or security cameras, are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network , and may be watched by a security guard or law enforcement officer . Cameras and recording equipment used to be relatively expensive and required human personnel to monitor camera footage, but analysis of footage has been made easier by automated software that organizes digital video footage into

12705-742: The NSA, which in the tradition of NSA's intelligence alliances, cooperates with as many as 100 trusted U.S. companies since the 1970s. A prior program, the Terrorist Surveillance Program , was implemented in the wake of the September 11 attacks under the George W. Bush Administration but was widely criticized and challenged as illegal, because it did not include warrants obtained from the Foreign Intelligence Surveillance Court . PRISM

12870-579: The PRISM program and the NSA's telephone calls logging program, said, "What you've got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout." He also said, "You can't have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we're going to have to make some choices as

13035-434: The PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification, and others said that they had not been aware of the program. After statements had been released by the president and the Director of National Intelligence, some lawmakers began to comment: Senator John McCain (R-AZ) Senator Dianne Feinstein (D-CA), chair of

13200-710: The PRISM program, may be searched for both US and non-US person identifiers. These kinds of queries became known as "back-door searches" and are conducted by NSA, FBI and CIA. Each of these agencies has slightly different protocols and safeguards to protect searches with a US person identifier. Internal NSA presentation slides included in the various media disclosures show that the NSA could unilaterally access data and perform "extensive, in-depth surveillance on live communications and stored information" with examples including email, video and voice chat, videos, photos, voice-over-IP chats (such as Skype ), file transfers, and social networking details. Snowden summarized that "in general,

13365-588: The PRISM web traffic surveillance program contributed in over 90 percent of those cases. According to court records, one example Alexander gave regarding a thwarted attack by al Qaeda on the New York Stock Exchange was not in fact foiled by surveillance. Several senators wrote Director of National Intelligence Clapper asking him to provide other examples. U.S. intelligence officials, speaking on condition of anonymity, told various news outlets that by June 24 they were already seeing what they said

13530-894: The Senate Intelligence Committee Senator Rand Paul (R-KY) Senator Susan Collins (R-ME), member of Senate Intelligence Committee and past member of Homeland Security Committee Representative Jim Sensenbrenner (R-WI), principal sponsor of the Patriot Act Representative Mike Rogers (R-MI), a chairman of the Permanent Select Committee on Intelligence . Senator Mark Udall (D-CO) Representative Todd Rokita (R-IN) Representative Luis Gutierrez (D-IL) Senator Ron Wyden (D-OR) Following these statements some lawmakers from both parties warned national security officials during

13695-499: The U.S. Congress pressed the Foreign Intelligence Surveillance Court to release declassified versions of its secret ruling, the court dismissed those requests arguing that the decisions can't be declassified because they contain classified information. Reggie Walton , the current FISA presiding judge, said in a statement: "The perception that the court is a rubber stamp is absolutely false. There

13860-465: The U.S. National Security Agency (NSA). Paris prosecutors had opened preliminary inquiries into the NSA program in July, but Fabius said, "... obviously we need to go further" and "we must quickly assure that these practices aren't repeated." Germany did not receive any raw PRISM data, according to a Reuters report. German Chancellor Angela Merkel said that "the internet is new to all of us" to explain

14025-595: The UK at 4.2 million (of which 500,000 were in Greater London ). More reliable estimates put the number of private and local government operated cameras in the United Kingdom at around 1.85 million in 2011. In the Netherlands, one example city where there are cameras is The Hague. There, cameras are placed in city districts in which the most illegal activity is concentrated. Examples are the red-light districts and

14190-470: The USA Patriot Act, threatened during the hearing. "It's got to be changed, and you've got to change how you operate section 215. Otherwise, in two and a half years, you're not going to have it anymore." Leaks of classified documents pointed to the role of a special court in enabling the government's secret surveillance programs, but members of the court maintained they were not collaborating with

14355-514: The United States Senate Select Committee on Intelligence that the NSA does "not wittingly" collect any type of data on millions or hundreds of millions of Americans. Clapper later admitted the statement he made on March 12, 2013, was a lie, or in his words "I responded in what I thought was the most truthful, or least untruthful manner by saying no." On June 7, 2013, U.S. President Barack Obama , referring to

14520-569: The United States as a defense against national security threats. The statement read in part, " The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act . They contain numerous inaccuracies." He went on to say, "Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside

14685-401: The United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States." Clapper concluded his statement by stating, "The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans." On March 12, 2013, Clapper had told

14850-1028: The Washington Post , which also published information on classified NSA surveillance programs disclosed by Edward Snowden, had not been blocked at the time the blocking of access to The Guardian was reported. The former head of the Austrian Federal Office for the Protection of the Constitution and Counterterrorism , Gert-René Polli , stated he knew the PRISM program under a different name and stated that surveillance activities had occurred in Austria as well. Polli had publicly stated in 2009 that he had received requests from US intelligence agencies to do things that would be in violation of Austrian law, which Polli refused to allow. The Australian government has said it will investigate

15015-412: The aerial surveillance process. They have developed systems consisting of large teams drone planes that pilot themselves, automatically decide who is "suspicious" and how to go about monitoring them, coordinate their activities with other drones nearby, and notify human operators if something suspicious is occurring. This greatly increases the amount of area that can be continuously monitored, while reducing

15180-561: The areas of logistics and operations. Some of the later 20th-century developments include the theory of constraints (introduced in 1984), management by objectives (systematized in 1954), re-engineering (the early 1990s), Six Sigma (1986), management by walking around (1970s), the Viable system model (1972), and various information-technology -driven theories such as agile software development (so-named from 2001), as well as group-management theories such as Cog's Ladder (1972) and

15345-421: The basis of merit determined through competitive examination, candidates should have a solid general education to enable inter-departmental transfers, and promotion should be through achievement rather than "preferment, patronage, or purchase". This led to implementation of Her Majesty's Civil Service as a systematic, meritocratic civil service bureaucracy. Like the British, the development of French bureaucracy

15510-531: The benefit of the doubt in cases of uncertainty. Below are a number of slides released by Edward Snowden showing the operation and processes behind the PRISM program. The "FAA" referred to is Section 702 of the FISA Amendments Act ("FAA"), and not the Federal Aviation Administration, which is more widely known by the same FAA initialism. The French newspaper Le Monde disclosed new PRISM slides (see pages 4, 7 and 8) coming from

15675-418: The best available evidence. As with other evidence-based practice, this is based on the three principles of published peer-reviewed (often in management or social science journals) research evidence that bears on whether and why a particular management practice works; judgment and experience from contextual management practice, to understand the organization and interpersonal dynamics in a situation and determine

15840-430: The briefing document reviewed by The Washington Post indicated that "98 percent of PRISM production is based on Yahoo, Google, and Microsoft". The slide presentation stated that much of the world's electronic communications pass through the U.S., because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world's internet infrastructure

16005-484: The centuries faced the problems of exploiting and motivating a dependent but sometimes unenthusiastic or recalcitrant workforce, but many pre-industrial enterprises , given their small scale, did not feel compelled to face the issues of management systematically. However, innovations such as the spread of Arabic numerals (5th to 15th centuries) and the codification of double-entry book-keeping (1494) provided tools for management assessment, planning and control. With

16170-595: The changing workplaces of the Industrial Revolution in the 18th and 19th centuries, military theory and practice contributed approaches to managing the newly popular factories . Given the scale of most commercial operations and the lack of mechanized record-keeping and recording before the Industrial Revolution, it made sense for most owners of enterprises in those times to carry out management functions by and for themselves. But with

16335-457: The city of Chicago , Illinois, recently used a $ 5.1 million Homeland Security grant to install an additional 250 surveillance cameras, and connect them to a centralized monitoring center, along with its preexisting network of over 2000 cameras, in a program known as Operation Virtual Shield . Speaking in 2009, Chicago Mayor Richard Daley announced that Chicago would have a surveillance camera on every street corner by 2016. New York City received

16500-578: The code themselves or to get the code from the phone's owner. Because the Snowden leaks demonstrated that American agencies can access phones anywhere in the world, privacy concerns in countries with growing markets for smart phones have intensified, providing a strong incentive for companies like Apple to address those concerns in order to secure their position in the global market. Apple has made several moves to emphasize their concern for privacy, in order to appeal to more consumers. In 2011, Apple stopped

16665-421: The context of automatic decision-making. Aerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne vehicle—such as an unmanned aerial vehicle , helicopter , or spy plane . Military surveillance aircraft use a range of sensors (e.g. radar) to monitor the battlefield. Digital imaging technology, miniaturized computers, and numerous other technological advances over

16830-462: The crowd for potential criminals and terrorists in attendance at the event (it found 19 people with pending arrest warrants). Governments often initially claim that cameras are meant to be used for traffic control , but many of them end up using them for general surveillance. For example, Washington, D.C. had 5,000 "traffic" cameras installed under this premise, and then after they were all in place, networked them all together and then granted access to

16995-598: The data. Data profiling in this context is the process of assembling information about a particular individual or group in order to generate a profile — that is, a picture of their patterns and behavior. Data profiling can be an extremely powerful tool for psychological and social network analysis . A skilled analyst can discover facts about a person that they might not even be consciously aware of themselves. Economic (such as credit card purchases) and social (such as telephone calls and emails) transactions in modern society create large amounts of stored data and records. In

17160-411: The day-to-day activities of the organization. However, this varies depending on the type (e.g., public versus private), size, and culture of the organization. These directors are theoretically liable for breaches of that duty and are typically insured under directors and officers liability insurance . Fortune 500 directors are estimated to spend 4.4 hours per week on board duties, and median compensation

17325-508: The executive branch. The New York Times , however, reported in July 2013 that in "more than a dozen classified rulings, the nation's surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans while pursuing not only terrorism suspects, but also people possibly involved in nuclear proliferation, espionage and cyberattacks." After Members of

17490-944: The face. Law enforcement officers believe that this has potential for them to identify when a suspect is nervous, which might indicate that they are hiding something, lying, or worried about something. In his paper in Ethics and Information Technology , Avi Marciano maps the harms caused by biometric surveillance, traces their theoretical origins, and brings these harms together in one integrative framework to elucidate their cumulative power. Marciano proposes four types of harms: Unauthorized use of bodily information, denial or limitation of access to physical spaces, bodily social sorting, and symbolic ineligibility through construction of marginality and otherness. Biometrics' social power, according to Marciano, derives from three main features: their complexity as "enigmatic technologies", their objective-scientific image, and their increasing agency, particularly in

17655-507: The fact sheet as being inaccurate. NSA Director General Keith Alexander acknowledged the errors, stating that the fact sheet "could have more precisely described" the requirements governing the collection of e-mail and other internet content from US companies. The fact sheet was withdrawn from the NSA's website around June 26. In a closed-doors Senate hearing around June 11, FBI Director Robert Mueller said that Snowden's leaks had caused "significant harm to our nation and to our safety." In

17820-502: The federal government's executive , judicial and legislative branches. On June 19, 2013, U.S. President Barack Obama , during a visit to Germany, stated that the NSA's data gathering practices constitute "a circumscribed, narrow system directed at us being able to protect our people." Edward Snowden publicly revealed the existence of PRISM through a series of classified documents leaked to journalists of The Washington Post and The Guardian while Snowden, an NSA contractor at

17985-414: The field of business and management. Most individuals obtaining management doctorates take the programs to obtain the training in research methods, statistical analysis, and writing academic papers that they will need to seek careers as researchers, senior consultants, and/or professors in business administration or management. There are several types of management doctorates: the Doctor of Management (DM),

18150-510: The first college management textbook in 1911. In 1912 Yoichi Ueno introduced Taylorism to Japan and became the first management consultant of the " Japanese management style ". His son Ichiro Ueno pioneered Japanese quality assurance . The first comprehensive theories of management appeared around 1920. The Harvard Business School offered the first Master of Business Administration degree (MBA) in 1921. People like Henri Fayol (1841–1925) and Alexander Church (1866–1936) described

18315-593: The future." Greenwald was referring in the context of the foregoing quotes to the NSA program XKeyscore . Unified Targeting Tool Shortly after publication of the reports by The Guardian and The Washington Post , the United States Director of National Intelligence , James Clapper , on June 7, 2013, released a statement confirming that for nearly six years the government of the United States had been using large internet services companies such as Facebook to collect information on foreigners outside

18480-721: The gap between top-level and bottom-level staff. Their functions include: Line managers include supervisors , section leaders, forepersons, and team leaders. They focus on controlling and directing regular employees. They are usually responsible for assigning employees tasks, guiding and supervising employees on day-to-day activities, ensuring the quality and quantity of production and/or service, making recommendations and suggestions to employees on their work, and channeling employee concerns that they cannot resolve to mid-level managers or other administrators. Low-level or "front-line" managers also act as role models for their employees. In some types of work, front-line managers may also do some of

18645-777: The growing size and complexity of organizations, a distinction between owners (individuals, industrial dynasties, or groups of shareholders ) and day-to-day managers (independent specialists in planning and control) gradually became more common. The field of management originated in ancient China, including possibly the first highly centralized bureaucratic state, and the earliest (by the second century BC) example of an administration based on merit through testing . Some theorists have cited ancient military texts as providing lessons for civilian managers. For example, Chinese general Sun Tzu in his 6th-century BC work The Art of War recommends (when re-phrased in modern terminology) being aware of and acting on strengths and weaknesses of both

18810-466: The impact of the PRISM program and the use of the Pine Gap surveillance facility on the privacy of Australian citizens. Australia's former foreign minister Bob Carr said that Australians should not be concerned about PRISM but that cybersecurity is high on the government's list of concerns. The Australian Foreign Minister Julie Bishop stated that the acts of Edward Snowden were treachery and offered

18975-510: The information was ever useful in an investigation. Some people believe that the use of social networking sites is a form of "participatory surveillance", where users of these sites are essentially performing surveillance on themselves, putting detailed personal information on public websites where it can be viewed by corporations and governments. In 2008, about 20% of employers reported using social networking sites to collect personal data on prospective or current employees. Biometric surveillance

19140-583: The interception of chats, and "for Prism collection against Microsoft email services will be unaffected because Prism collects this data prior to encryption." Also according to The Guardian's Glenn Greenwald even low-level NSA analysts are allowed to search and listen to the communications of Americans and other people without court approval and supervision. Greenwald said low level Analysts can, via systems like PRISM, "listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents. And it's all done with no need to go to

19305-418: The interiors of shops and businesses. According to 2011 Freedom of Information Act requests, the total number of local government operated CCTV cameras was around 52,000 over the entirety of the UK. The prevalence of video surveillance in the UK is often overstated due to unreliable estimates being requoted; for example one report in 2002 extrapolated from a very small sample to estimate the number of cameras in

19470-457: The legal power to make binding orders, levy hefty fines and take meaningful action in the event of serious data breaches, we are restricted to a 'soft' approach: persuasion, encouragement and, at the most, the potential to publish the names of transgressors in the public interest." And, "when push comes to shove," Stoddart wrote, "short of a costly and time-consuming court battle, we have no power to enforce our recommendations." On 20 October 2013

19635-445: The major markers in the body's DNA to produce a match. The FBI is spending $ 1 billion to build a new biometric database, which will store DNA, facial recognition data, iris/retina (eye) data, fingerprints, palm prints, and other biometric data of people living in the United States. The computers running the database are contained in an underground facility about the size of two American football fields . The Los Angeles Police Department

19800-687: The monitoring of data and traffic on the Internet . In the United States for example, under the Communications Assistance For Law Enforcement Act , all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by federal law enforcement agencies. There is far too much data on the Internet for human investigators to manually search through all of it. Therefore, automated Internet surveillance computers sift through

19965-492: The most common business programs are the Bachelor of Business Administration (BBA) and Bachelor of Commerce (B.Com.). These typically comprise a four-year program designed to give students an overview of the role of managers in planning and directing within an organization. Course topics include accounting, financial management, statistics, marketing, strategy, and other related areas. Many other undergraduate degrees include

20130-484: The need for clerks, bookkeepers, secretaries and managers expanded. The demand for trained managers led college and university administrators to consider and move forward with plans to create the first schools of business on their campuses. At the turn of the twentieth century, the need for skilled and trained managers had become increasingly apparent. The demand occurred as personnel departments began to expand rapidly. In 1915, less than one in twenty manufacturing firms had

20295-687: The network, and removing them. To do this requires a detailed map of the network. Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the Information Awareness Office : The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people.... In order to be successful SSNA will require information on

20460-495: The notion of "thriving on chaos" (1987). As the general recognition of managers as a class solidified during the 20th century and gave perceived practitioners of the art/science of management a certain amount of prestige, so the way opened for popularised systems of management ideas to peddle their wares. In this context, many management fads may have had more to do with pop psychology than with scientific theories of management. PRISM (surveillance program) PRISM

20625-429: The number of human operators required. Thus a swarm of automated, self-directing drones can automatically patrol a city and track suspicious individuals, reporting their activities back to a centralized monitoring station. In addition, researchers also investigate possibilities of autonomous surveillance by large groups of micro aerial vehicles stabilized by decentralized bio-inspired swarming rules. Corporate surveillance

20790-465: The organization. Colleges and universities around the world offer bachelor's degrees, graduate degrees, diplomas, and certificates in management; generally within their colleges of business, business schools, or faculty of management but also in other related departments. Higher education has been characterized as a necessary factor in the managerial revolution in the 20th century. While some professions require academic credentials in order to work in

20955-471: The past decade have contributed to rapid advances in aerial surveillance hardware such as micro-aerial vehicles , forward-looking infrared , and high-resolution imagery capable of identifying objects at extremely long distances. For instance, the MQ-9 Reaper , a U.S. drone plane used for domestic operations by the Department of Homeland Security , carries cameras that are capable of identifying an object

21120-402: The past, this data was documented in paper records, leaving a " paper trail ", or was simply not documented at all. Correlation of paper-based records was a laborious process—it required human intelligence operators to manually dig through documents, which was time-consuming and incomplete, at best. But today many of these records are electronic, resulting in an " electronic trail ". Every use of

21285-407: The person who holds the phone. The StingRay tracker is an example of one of these tools used to monitor cell phone usage in the United States and the United Kingdom. Originally developed for counterterrorism purposes by the military, they work by broadcasting powerful signals that cause nearby cell phones to transmit their IMSI number , just as they would to normal cell phone towers. Once the phone

21450-560: The phenomenon of management from a sociological perspective. Peter Drucker (1909–2005) wrote one of the earliest books on applied management: Concept of the Corporation (published in 1946). It resulted from Alfred Sloan (chairman of General Motors until 1956) commissioning a study of the organization . Drucker went on to write 39 books, many in the same vein. H. Dodge, Ronald Fisher (1890–1962), and Thornton C. Fry introduced statistical techniques into management studies. In

21615-465: The phrase "Short-Term Wins" to express the same idea. As in all work, achieving an appropriate work-life balance for self and others is an important management practice. Evidence-based management is an emerging movement to use the current, best evidence in management and decision-making . It is part of the larger movement towards evidence-based practices . Evidence-based management entails managerial decisions and organizational practices informed by

21780-415: The plans and goals that affect the entire organization. These individuals typically have titles such as executive vice president, president, managing director, chief operating officer, chief executive officer, or board chairman. These managers are classified in a hierarchy of authority and perform different tasks. In many organizations, the number of managers at every level resembles a pyramid. Each level

21945-570: The plots that he mentioned appear to have been identified using other collection methods." On June 18, NSA Director Alexander said in an open hearing before the House Intelligence Committee of Congress that communications surveillance had helped prevent more than 50 potential terrorist attacks worldwide (at least 10 of them involving terrorism suspects or targets in the United States) between 2001 and 2013, and that

22110-494: The pre-1861 slave-based sector of the US economy. That environment saw 4 million people, as the contemporary usages had it, "managed" in profitable quasi- mass production before wage slavery eclipsed chattel slavery. Salaried managers as an identifiable group first became prominent in the late 19th century. As large corporations began to overshadow small family businesses the need for personnel management positions became more necessary. Businesses grew into large corporations and

22275-427: The process, communication data of some U.S. citizens are also collected unintentionally. Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign U.S. data, "it's nothing to worry about." According to The Guardian , NSA had access to chats and emails on Hotmail.com and Skype because Microsoft had "developed a surveillance capability to deal" with

22440-508: The profession (e.g., law, medicine, and engineering, which require, respectively the Bachelor of Law , Doctor of Medicine , and Bachelor of Engineering degrees), management and administration positions do not necessarily require the completion of academic degrees. Some well-known senior executives in the US who did not complete a degree include Steve Jobs , Bill Gates and Mark Zuckerberg . However, many managers and executives have completed some type of business or management training, such as

22605-506: The program, which he described as "an internal government computer system used to facilitate the government's statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a)." The fact sheet stated that "the surveillance activities published in The Guardian and

22770-436: The protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and commit crimes, and by businesses to gather intelligence on criminals, their competitors, suppliers or customers. Religious organizations charged with detecting heresy and heterodoxy may also carry out surveillance. Auditors carry out a form of surveillance. A byproduct of surveillance

22935-433: The purchase of online information, effectively expanding surveillance capabilities through commercially available digital records. It can also include simple technical methods, such as human intelligence gathering and postal interception . Surveillance is used by citizens, for instance for protecting their neighborhoods. It is widely used by governments for intelligence gathering, including espionage, prevention of crime,

23100-429: The reality is this: if an NSA, FBI, CIA, DIA, etc. analyst has access to query raw SIGINT [signals intelligence] databases, they can enter and get results for anything they want." According to The Washington Post , the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be U.S. citizens, but in

23265-434: The risks and benefits of available actions; and the preferences and values of those affected. Some see management as a late-modern (in the sense of late modernity ) conceptualization. On those terms it cannot have a pre-modern history – only harbingers (such as stewards ). Others, however, detect management-like thought among ancient Sumerian traders and the builders of the pyramids of ancient Egypt . Slave owners through

23430-435: The same Senate hearing, NSA Director Alexander defended the program. Alexander's defense was immediately criticized by Senators Udall and Wyden, who said they saw no evidence that the NSA programs had produced "uniquely valuable intelligence." In a joint statement, they wrote, "Gen Alexander's testimony yesterday suggested that the NSA's bulk phone records collection program helped thwart 'dozens' of terrorist attacks, but all of

23595-489: The same tasks that employees do, at least some of the time. For example, in some restaurants, the front-line managers will also serve customers during a very busy period of the day. In general, line managers are considered part of the workforce and not part of the organization's proper management despite performing traditional management functions. Front-line managers typically provide: Some front-line managers may also provide career planning for employees who aim to rise within

23760-587: The semantic development of the English word management in the 17th and 18th centuries. Views on the definition and scope of management include: Management involves identifying the mission , objective, procedures , rules and manipulation of the human capital of an enterprise to contribute to the success of the enterprise. Scholars have focused on the management of individual, organizational, and inter-organizational relationships. This implies effective communication : an enterprise environment (as opposed to

23925-427: The shareholders, the general public, and public bodies that oversee corporations and similar organizations. Some members of the senior management may serve as the public face of the organization, and they may make speeches to introduce new strategies or appear in marketing . The board of directors is typically primarily composed of non-executives who owe a fiduciary duty to shareholders and are not closely involved in

24090-524: The size of a milk carton from altitudes of 30,000 feet (9.1 km), and has forward-looking infrared devices that can detect the heat from a human body at distances of up to 60 kilometers (37 mi). In an earlier instance of commercial aerial surveillance, the Killington Mountain ski resort hired 'eye in the sky' aerial photography of its competitors' parking lots to judge the success of its marketing initiatives as it developed starting in

24255-498: The social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists. AT&T developed a programming language called "Hancock", which is able to sift through enormous databases of phone call and Internet traffic records, such as

24420-651: The steps involved in the manufacture and, with 10 specialists, enabled the production of 48,000 pins per day. Classical economists such as Adam Smith (1723–1790) and John Stuart Mill (1806–1873) provided a theoretical background to resource allocation , production (economics) , and pricing issues. About the same time, innovators like Eli Whitney (1765–1825), James Watt (1736–1819), and Matthew Boulton (1728–1809) developed elements of technical production such as standardization , quality-control procedures, cost-accounting , interchangeability of parts, and work-planning . Many of these aspects of management existed in

24585-460: The study of management, such as Bachelor of Arts and Bachelor of Science degrees with a major in business administration or management and the Bachelor of Arts (BA) or Bachelor of Science (BS) in political science (PoliSci) with a concentration in public administration or the Bachelor of Public Administration (B.P.A), a degree designed for individuals aiming to work as bureaucrats in

24750-534: The supervision of the U.S. Foreign Intelligence Surveillance Court (FISA Court, or FISC) pursuant to the Foreign Intelligence Surveillance Act (FISA). Its existence was leaked six years later by NSA contractor Edward Snowden , who warned that the extent of mass data collection was far greater than the public knew and included what he characterized as "dangerous" and "criminal" activities. The disclosures were published by The Guardian and The Washington Post on June 6, 2013. Subsequent documents have demonstrated

24915-409: The term "management" or "the management" as a collective word describing the managers of an organization, for example of a corporation . Historically this use of the term often contrasted with the term labor – referring to those being managed. A common management structure of organizations includes three management levels: low-level, middle-level, and top-level managers. Low-level managers manage

25080-428: The time, fled to Hong Kong . The leaked documents included 41 PowerPoint slides, four of which were published in news articles. The documents identified several technology companies as participants in the PRISM program, including Microsoft in 2007, Yahoo! in 2008, Google in 2009, Facebook in 2009, Paltalk in 2009, YouTube in 2010, AOL in 2011, Skype in 2011 and Apple in 2012. The speaker's notes in

25245-479: The top management for their department's function. They devote more time to organizational and directional functions. Their roles can be emphasized as executing organizational plans in conformance with the company's policies and the top management's objectives, defining and discussing information and policies from top management to lower management, and most importantly, inspiring and providing guidance to lower-level managers towards better performance. Middle management

25410-431: The top weaknesses of CEOs were " mentoring skills" and "board engagement", and 10% of companies never evaluated the CEO. The board may also have certain employees (e.g., internal auditors ) report to them or directly hire independent contractors ; for example, the board (through the audit committee ) typically selects the auditor . Helpful skills for top management vary by the type of organization but typically include

25575-479: The train stations. As part of China's Golden Shield Project , several U.S. corporations, including IBM , General Electric , and Honeywell , have been working closely with the Chinese government to install millions of surveillance cameras throughout China , along with advanced video analytics and facial recognition software, which will identify and track individuals everywhere they go. They will be connected to

25740-535: The two Latin words manus (hand) and agere (to act). The French word for housekeeping , ménagerie , derived from ménager ("to keep house"; compare ménage for "household"), also encompasses taking care of domestic animals. Ménagerie is the French translation of Xenophon 's famous book Oeconomicus ( ‹See Tfd› Greek : Οἰκονομικός ) on household matters and husbandry . The French word mesnagement (or ménagement ) influenced

25905-453: The use of permanent device identifiers, and in 2019, they banned the ability of third parties to track on children’s apps. Although the CALEA requires telecommunications companies to build into their systems the ability to carry out a lawful wiretap, the law has not been updated to address the issue of smart phones and requests for access to e-mails and metadata . The Snowden leaks show that

26070-497: The various branches of management and their inter-relationships. In the early 20th century, people like Ordway Tead (1891–1973), Walter Scott (1869–1955) and J. Mooney applied the principles of psychology to management. Other writers, such as Elton Mayo (1880–1949), Mary Parker Follett (1868–1933), Chester Barnard (1886–1961), Max Weber (1864–1920), who saw what he called the "administrator" as bureaucrat , Rensis Likert (1903–1981), and Chris Argyris (born 1923) approached

26235-406: The vast amount of intercepted Internet traffic to identify and report to human investigators the traffic that is considered interesting or suspicious. This process is regulated by targeting certain "trigger" words or phrases, visiting certain types of web sites, or communicating via email or online chat with suspicious individuals or groups. Billions of dollars per year are spent by agencies, such as

26400-594: The work of non-managerial individuals who are directly involved with the production or creation of the organization's products. Low-level managers are often called supervisors, but may also be called line managers, office managers, or even foremen. Middle managers include all levels of management between the low level and the top level of the organization. These managers manage the work of low-level managers and may have titles such as department head, project leader, plant manager, or division manager. Top managers are responsible for making organization-wide decisions and establishing

26565-450: Was $ 212,512 in 2010. The board sets corporate strategy, makes major decisions such as major acquisitions, and hires, evaluates, and fires the top-level manager ( chief executive officer or CEO). The CEO typically hires other positions. However, board involvement in the hiring of other positions such as the chief financial officer (CFO) has increased. In 2013, a survey of over 160 CEOs and directors of public and private companies found that

26730-468: Was authorized by the Foreign Intelligence Surveillance Court. PRISM was enabled under President Bush by the Protect America Act of 2007 and by the FISA Amendments Act of 2008 , which immunizes private companies from legal action when they cooperate with U.S. government agencies in intelligence collection. In 2012 the act was renewed by Congress under President Obama for an additional five years, through December 2017. According to The Register ,

26895-404: Was evidence that suspected terrorists had begun changing their communication practices in order to evade detection by the surveillance tools disclosed by Snowden. In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens' telephone records, Congressional leaders initially had little to say about

27060-706: Was influenced by the Chinese system. Voltaire claimed that the Chinese had "perfected moral science" and François Quesnay advocated an economic and political system modeled after that of the Chinese. French civil service examinations adopted in the late 19th century were also heavily based on general cultural studies. These features have been likened to the earlier Chinese model. Various ancient and medieval civilizations produced " mirrors for princes " books, which aimed to advise new monarchs on how to govern. Plato described job specialization in 350 BC, and Alfarabi listed several leadership traits in AD 900. Other examples include

27225-509: Was reported to have a huge surveillance network of over 170 million CCTV cameras with 400 million new cameras expected to be installed in the next three years, many of which use facial recognition technology . In the United States , the Department of Homeland Security awards billions of dollars per year in Homeland Security grants for local, state, and federal agencies to install modern video surveillance equipment. For example,

#19980