The Review of Paper "Computer vision in Security" Author: Fothul Karim Forhan   The paper is the overview on a technology that helps us recognize different patterns and proceed it in a specific format. The focus is set on security field where CV helps to prevent attacks and massive resource looses. The introduction covers a bit of history as well as points to goals of the research.   The main part is divided into: Types of CV technologies applied in security matters, security matters that require CV and other safety matters.   For me the most fascinating part is CV in financial field. In the given example cv could identify fraudsters by emotional state, the way a fraudster behaves. After the thief is identified, the alarm is enabled automatically and the transaction is terminated. This is a direct example of how cv saves a companies' money.   The only thing that missing is lack of illustrations. It'd be great to see face-recognition algorithms visualization.   Overall...
 Rule Utilitarianism. Big data  The Utilitarianism theory defines what is write and what is wrong by assessing outcomes. No matter what bad consequences take place, the most ethical choice is always the one that has the greatest good.   Big data falls under this theory just fine. While it's hard to give any precise guidelines, the example can be considered in the abstract.  On the one hand it brings us economy boost by providing more specific information, on another hand it affects on the privacy of consumers.   Examples of The Good    Big data cuts business costs  Help government to track citizens and prevent unwanted events  Using big data improves company's pricing policy  Allow competition with bigger companies  Suggests to user more interest-related content      Examples of The Bad    Ruins people's privacy  Add an advantage to those who have been shown as a more trustable person by doing nothing personal online  Uses tons of computational resources and not necessarily...