The Review of Paper "Computer vision in Security" Author: Fothul Karim Forhan The paper is the overview on a technology that helps us recognize different patterns and proceed it in a specific format. The focus is set on security field where CV helps to prevent attacks and massive resource looses. The introduction covers a bit of history as well as points to goals of the research. The main part is divided into: Types of CV technologies applied in security matters, security matters that require CV and other safety matters. For me the most fascinating part is CV in financial field. In the given example cv could identify fraudsters by emotional state, the way a fraudster behaves. After the thief is identified, the alarm is enabled automatically and the transaction is terminated. This is a direct example of how cv saves a companies' money. The only thing that missing is lack of illustrations. It'd be great to see face-recognition algorithms visualization. Overall
Rule Utilitarianism. Big data The Utilitarianism theory defines what is write and what is wrong by assessing outcomes. No matter what bad consequences take place, the most ethical choice is always the one that has the greatest good. Big data falls under this theory just fine. While it's hard to give any precise guidelines, the example can be considered in the abstract. On the one hand it brings us economy boost by providing more specific information, on another hand it affects on the privacy of consumers. Examples of The Good Big data cuts business costs Help government to track citizens and prevent unwanted events Using big data improves company's pricing policy Allow competition with bigger companies Suggests to user more interest-related content Examples of The Bad Ruins people's privacy Add an advantage to those who have been shown as a more trustable person by doing nothing personal online Uses tons of computational resources and not necessarily