SlideShare une entreprise Scribd logo
1  sur  2
Monitoring is the regular observation and recording of activities taking place in a project

or programmed. It is a process of routinely gathering information on all aspects of the

project, supervising activities in progress to ensure they are on-course and on-schedule

in meeting the objectives and performance targets. To monitor is to check on how

project activities are progressing. It is observation; ─ systematic and purposeful

observation.


       Monitoring also involves giving feedback about the progress of the project to the

donors, implementers and beneficiaries of the project. Reporting enables the gathered

information to be used in making decisions for improving project performance. To

observe, supervise, or keep under review; to measure or test at intervals,

especially for the purpose of regulation or control, or to check or regulate the technical

quality of something.


       On the other hand, Surveillance is a process of close monitoring of behavior.

Ongoing close observation and collection of data or evidence, for a specified purpose or

confined to a narrow sector. In comparison, environmental scanning is broad and

includes all associated external factors.




       "Sur-Veillance" is French for to "watch from above". Note the all seeing "eye-in-

the-sky" in this London Transport poster. Although the word surveillance literally means

(in French) "to watch from above" (i.e. a God's-eye view looking down from on-high) the

term is often used for all forms of observation, not just visual observation. However, the
all-seeing eye-in-the-sky is still an icon of surveillance in general. It is commonly used to

describe observation from a distance by means of electronic equipment or other

technological means.


       Surveillance is the art of watching over the activities of persons or groups from a

position of higher authority. Surveillance may be covert (without their knowledge) or

overt (perhaps with frequent reminders such as "we are watching over you").

Surveillance has been an intrinsic part of human history. Sun Tzu's The Art of War,

written 2,500 years ago, discusses how spies should be used against a person's

enemies. But modern electronic and computer technology have given surveillance a

whole new means of operation. Surveillance can be automated using computers, and

people leave extensive records that describe their activities.


       Counter surveillance is the practice of avoiding surveillance or making it difficult.

Before computer networks, counter surveillance involved avoiding agents and

communicating secretly. With recent development of the Internet and computer

databases counter surveillance has grown. Now counter surveillance involves

everything from knowing how to delete a file on a computer to avoiding becoming the

target of direct advertising agencies.


        Inverse surveillance is the practice of reversalism on surveillance, e.g. citizens
photographing police, shoppers photographing shopkeepers, and passengers photographing
cab drivers who usually have surveillance cameras in their cabs. A well-known example is
George Haliday's recording of the Rodney King beating. Inverse surveillance attempts to
subvert the panoptic gaze of surveillance, and often attempts to subvert the secrecy of
surveillance through making the inverse surveillance recordings widely available (in contrast to
the usually secret surveillance tapes).

Contenu connexe

En vedette

2012 Ridgeline Burien Honda
2012 Ridgeline Burien Honda2012 Ridgeline Burien Honda
2012 Ridgeline Burien HondaBurien Honda
 
Use of Media 2.0 (New Technologies)
Use of Media 2.0 (New Technologies)Use of Media 2.0 (New Technologies)
Use of Media 2.0 (New Technologies)Helen
 
National geographic 4 is-
National geographic 4 is-National geographic 4 is-
National geographic 4 is-Babacar Mbengue
 
Quality granite for quality people
Quality granite for quality peopleQuality granite for quality people
Quality granite for quality peoplebrynndawson
 
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social NetworksA Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social NetworksOresti Banos
 
Quit smoking pp
Quit smoking ppQuit smoking pp
Quit smoking ppvarshac29
 
PLC Intro to programming
PLC Intro to programmingPLC Intro to programming
PLC Intro to programmingAmeen San
 
Intel Ortop Educational Case Study 2009
Intel Ortop Educational Case Study 2009Intel Ortop Educational Case Study 2009
Intel Ortop Educational Case Study 2009Pambie
 
Social Networks and International Education
Social Networks and International EducationSocial Networks and International Education
Social Networks and International EducationGene Begin
 

En vedette (11)

Hyy
HyyHyy
Hyy
 
2012 Ridgeline Burien Honda
2012 Ridgeline Burien Honda2012 Ridgeline Burien Honda
2012 Ridgeline Burien Honda
 
Use of Media 2.0 (New Technologies)
Use of Media 2.0 (New Technologies)Use of Media 2.0 (New Technologies)
Use of Media 2.0 (New Technologies)
 
National geographic 4 is-
National geographic 4 is-National geographic 4 is-
National geographic 4 is-
 
Quality granite for quality people
Quality granite for quality peopleQuality granite for quality people
Quality granite for quality people
 
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social NetworksA Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
 
Quit smoking pp
Quit smoking ppQuit smoking pp
Quit smoking pp
 
PLC Intro to programming
PLC Intro to programmingPLC Intro to programming
PLC Intro to programming
 
Intel Ortop Educational Case Study 2009
Intel Ortop Educational Case Study 2009Intel Ortop Educational Case Study 2009
Intel Ortop Educational Case Study 2009
 
Social Networks and International Education
Social Networks and International EducationSocial Networks and International Education
Social Networks and International Education
 
Perimetro
PerimetroPerimetro
Perimetro
 

Similaire à Former chaptr1

Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1cas123
 
Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1cas123
 
Camera surveilance 7 seminar salman
Camera surveilance 7 seminar salmanCamera surveilance 7 seminar salman
Camera surveilance 7 seminar salmanRameez Raja
 
Surveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptxSurveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptxitzmerhuzieeee
 
Types of Surveillance Systems
Types of Surveillance Systems			Types of Surveillance Systems
Types of Surveillance Systems LeolaHuffman
 
reserach paper on Study Of Digital Forensics Process.docx
reserach paper on Study Of Digital Forensics Process.docxreserach paper on Study Of Digital Forensics Process.docx
reserach paper on Study Of Digital Forensics Process.docxNavneetSaluja5
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
 
Thesis
ThesisThesis
Thesiscas123
 
Thesis
ThesisThesis
Thesiscas123
 
Thesis
ThesisThesis
Thesiscas123
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile applicationAlexander Decker
 
Aerial Surveillance, Scope & Applications (2).pdf
Aerial Surveillance, Scope & Applications (2).pdfAerial Surveillance, Scope & Applications (2).pdf
Aerial Surveillance, Scope & Applications (2).pdfRohansingh663594
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillancePuneet soni
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docxMVNVKUMAR
 
The Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public SafetyThe Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public SafetyNovoQuad
 
Electronic Surveillance
Electronic SurveillanceElectronic Surveillance
Electronic Surveillanceijtsrd
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkAndrew Gerber
 

Similaire à Former chaptr1 (20)

Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1
 
Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1
 
Survillance description
Survillance descriptionSurvillance description
Survillance description
 
Camera surveilance 7 seminar salman
Camera surveilance 7 seminar salmanCamera surveilance 7 seminar salman
Camera surveilance 7 seminar salman
 
Surveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptxSurveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptx
 
Types of Surveillance Systems
Types of Surveillance Systems			Types of Surveillance Systems
Types of Surveillance Systems
 
Presentation eco.pptx
Presentation eco.pptxPresentation eco.pptx
Presentation eco.pptx
 
reserach paper on Study Of Digital Forensics Process.docx
reserach paper on Study Of Digital Forensics Process.docxreserach paper on Study Of Digital Forensics Process.docx
reserach paper on Study Of Digital Forensics Process.docx
 
Developing technology
Developing technologyDeveloping technology
Developing technology
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
Thesis
ThesisThesis
Thesis
 
Thesis
ThesisThesis
Thesis
 
Thesis
ThesisThesis
Thesis
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
 
Aerial Surveillance, Scope & Applications (2).pdf
Aerial Surveillance, Scope & Applications (2).pdfAerial Surveillance, Scope & Applications (2).pdf
Aerial Surveillance, Scope & Applications (2).pdf
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
 
The Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public SafetyThe Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public Safety
 
Electronic Surveillance
Electronic SurveillanceElectronic Surveillance
Electronic Surveillance
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 

Plus de cas123

ayan na
ayan naayan na
ayan nacas123
 
Scrnsht
ScrnshtScrnsht
Scrnshtcas123
 
Sad format
Sad formatSad format
Sad formatcas123
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2cas123
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123cas123
 
My documentation
My documentationMy documentation
My documentationcas123
 
Chapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadChapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadcas123
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesiscas123
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentationcas123
 
Sad format
Sad formatSad format
Sad formatcas123
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2cas123
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123cas123
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesiscas123
 
Sad format
Sad formatSad format
Sad formatcas123
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2cas123
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123cas123
 
My documentation
My documentationMy documentation
My documentationcas123
 
Chapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadChapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadcas123
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesiscas123
 

Plus de cas123 (20)

ayan na
ayan naayan na
ayan na
 
Scrnsht
ScrnshtScrnsht
Scrnsht
 
Print
PrintPrint
Print
 
Sad format
Sad formatSad format
Sad format
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123
 
My documentation
My documentationMy documentation
My documentation
 
Chapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadChapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sad
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesis
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentation
 
Sad format
Sad formatSad format
Sad format
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesis
 
Sad format
Sad formatSad format
Sad format
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123
 
My documentation
My documentationMy documentation
My documentation
 
Chapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadChapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sad
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesis
 

Dernier

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 

Dernier (20)

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 

Former chaptr1

  • 1. Monitoring is the regular observation and recording of activities taking place in a project or programmed. It is a process of routinely gathering information on all aspects of the project, supervising activities in progress to ensure they are on-course and on-schedule in meeting the objectives and performance targets. To monitor is to check on how project activities are progressing. It is observation; ─ systematic and purposeful observation. Monitoring also involves giving feedback about the progress of the project to the donors, implementers and beneficiaries of the project. Reporting enables the gathered information to be used in making decisions for improving project performance. To observe, supervise, or keep under review; to measure or test at intervals, especially for the purpose of regulation or control, or to check or regulate the technical quality of something. On the other hand, Surveillance is a process of close monitoring of behavior. Ongoing close observation and collection of data or evidence, for a specified purpose or confined to a narrow sector. In comparison, environmental scanning is broad and includes all associated external factors. "Sur-Veillance" is French for to "watch from above". Note the all seeing "eye-in- the-sky" in this London Transport poster. Although the word surveillance literally means (in French) "to watch from above" (i.e. a God's-eye view looking down from on-high) the term is often used for all forms of observation, not just visual observation. However, the
  • 2. all-seeing eye-in-the-sky is still an icon of surveillance in general. It is commonly used to describe observation from a distance by means of electronic equipment or other technological means. Surveillance is the art of watching over the activities of persons or groups from a position of higher authority. Surveillance may be covert (without their knowledge) or overt (perhaps with frequent reminders such as "we are watching over you"). Surveillance has been an intrinsic part of human history. Sun Tzu's The Art of War, written 2,500 years ago, discusses how spies should be used against a person's enemies. But modern electronic and computer technology have given surveillance a whole new means of operation. Surveillance can be automated using computers, and people leave extensive records that describe their activities. Counter surveillance is the practice of avoiding surveillance or making it difficult. Before computer networks, counter surveillance involved avoiding agents and communicating secretly. With recent development of the Internet and computer databases counter surveillance has grown. Now counter surveillance involves everything from knowing how to delete a file on a computer to avoiding becoming the target of direct advertising agencies. Inverse surveillance is the practice of reversalism on surveillance, e.g. citizens photographing police, shoppers photographing shopkeepers, and passengers photographing cab drivers who usually have surveillance cameras in their cabs. A well-known example is George Haliday's recording of the Rodney King beating. Inverse surveillance attempts to subvert the panoptic gaze of surveillance, and often attempts to subvert the secrecy of surveillance through making the inverse surveillance recordings widely available (in contrast to the usually secret surveillance tapes).