Humanities
JRN 1100 Troy University Facial Recognition Technology Article Discussion

JRN 1100

Troy University

JRN

Question Description

I’m studying and need help with a Computer Science question to help me learn.

Internet & Technology:

More Than Half of U.S. Adults Trust Law Enforcement to Use Facial Recognition Responsibly


This assignment requires you to write a response to the reading, as indicated above, which is sourced from the Pew Research Center.

Reading links: https://www.pewresearch.org/internet/2019/09/05/more-than-half-of-u-s-adults-trust-law-enforcement-to-use-facial-recognition-responsibly/ (Links to an external site.)

You should write a 600 - 900 word response based on the following assignment questions:

Facial recognition

  1. Why do men and women consider the tools of facial recognition technologies to be most effective?
  2. Do the majority of Americans find the use of facial recognition acceptable or unacceptable?
  3. Aside from the general population using facial recognition, explain a second use of people using facial recognition, as noted in the reading.

For structure purpose, only refer to this example; all students should follow this example only.

Technical specifications:

  • Include an Introduction and Conclusion
  • Type using Microsoft Word and save document as a word.doc (save as initial of first name and lastname.doc) - Example: ATabb.doc
  • Font size: 11 pt. or 12 pt.
  • Single-spaced, no more than four sentences per paragraph, 1 spacing line to separate paragraphs
  • Font options: Times New Roman, Times, Arial, Helvetica or Georgia
  • Perform a grammar, spelling and punctuation check
  • Write using third person only, no first or second person
  • You can include information for the entire research document to help in completing this assignment.

Unformatted Attachment Preview

Student’s Name JRN 1100 Date Assignment: Internet and Technology This is an example Introduction paragraph. Type your response here. Filler text - Lorem Ipsum comes from sections 1.10.32 and 1.10.33 of "de Finibus Bonorum et Malorum" (The Extremes of Good and Evil) by Cicero, written in 45 BC. This book is a treatise on the theory of ethics, very popular during the Renaissance. The first line of Lorem Ipsum, "Lorem ipsum dolor sit amet..", comes from a line in section 1.10.32. 1. Type the question here. Type your response here. Filler text - Lorem Ipsum comes from sections 1.10.32 and 1.10.33 of "de Finibus Bonorum et Malorum" (The Extremes of Good and Evil) by Cicero, written in 45 BC. This book is a treatise on the theory of ethics, very popular during the Renaissance. The first line of Lorem Ipsum, "Lorem ipsum dolor sit amet..", comes from a line in section 1.10.32. Lorem Ipsum comes from sections 1.10.32 and 1.10.33 of "de Finibus Bonorum et Malorum" (The Extremes of Good and Evil) by Cicero, written in 45 BC. This book is a treatise on the theory of ethics, very popular during the Renaissance. The first line of Lorem Ipsum, "Lorem ipsum dolor sit amet..", comes from a line in section 1.10.32. 2. Type the question here. Type your response here. Filler text - The standard chunk of Lorem Ipsum used since the 1500s is reproduced below for those interested. Sections 1.10.32 and 1.10.33 from "de Finibus Bonorum et Malorum" by Cicero are also reproduced in their exact original form, accompanied by English versions from the 1914 translation by H. Rackham. Lorem Ipsum comes from sections 1.10.32 and 1.10.33 of "de Finibus Bonorum et Malorum" (The Extremes of Good and Evil) by Cicero, written in 45 BC. This book is a treatise on the theory of ethics, very popular during the Renaissance. The first line of Lorem Ipsum, "Lorem ipsum dolor sit amet..", comes from a line in section 1.10.32. 3. Type the question here. Type your response here. Filler text - Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at HampdenSydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source. Lorem Ipsum comes from sections 1.10.32 and 1.10.33 of "de Finibus Bonorum et Malorum" (The Extremes of Good and Evil) by Cicero, written in 45 BC. This book is a treatise on the theory of ethics, very popular during the Renaissance. The first line of Lorem Ipsum, "Lorem ipsum dolor sit amet..", comes from a line in section 1.10.32. This is an example Conclusion paragraph. Type your response here. Filler text - Lorem Ipsum comes from sections 1.10.32 and 1.10.33 of "de Finibus Bonorum et Malorum" (The Extremes of Good and Evil) by Cicero, written in 45 BC. This book is a treatise on the theory of ethics, very popular during the Renaissance. The first line of Lorem Ipsum, "Lorem ipsum dolor sit amet..", comes from a line in section 1.10.32. Lorem Ipsum comes from sections 1.10.32 and 1.10.33 of "de Finibus Bonorum et Malorum" (The Extremes of Good and Evil) by Cicero, written in 45 BC. This book is a treatise on the theory of ethics, very popular during the Renaissance. The first line of Lorem Ipsum, "Lorem ipsum dolor sit amet..", comes from a line in section 1.10.32. ...
Purchase answer to see full attachment
Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Attached.

Running head: INTERNET AND TECHNOLOGY

Internet and Technology
Name:
Institution:

1

INTERNET AND TECHNOLOGY

2
Internet and Technology

Over the years, facial recognition technology has gained popularity around the world.
From law enforcement agencies to technology companies, people are finding their information
used for different reasons. One aspect that has led to the use of this technology is the continuous
need for public safety. Public places such as airports need to screen incoming and outgoing
passengers against a security database to determine if they pose any threats to other passengers.
However, companies have found a way to use the same technology to target customers with
advertisements and also to improve on device and system security. Concerns remain high
regarding data privacy violations that could occur as a result of using this technology.
Discussion
According to the article, men and women consider the tools of facial recognition
technologies to be most effective due to the following reasons. First, a majority of American
adults think that it is acceptable for law enforcement agencies to use this technology to access
potential threats in publ...

mwalimumusah (21231)
Duke University

Anonymous
Top quality work from this tutor! I’ll be back!

Anonymous
It’s my second time using SP and the work has been great back to back :) The one and only resource on the Interwebs for the work that needs to be done!

Anonymous
Thanks, good work

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4