SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Monitoring is the regular observation and recording of activities taking place in a project or programmed. It is a process of routinely gathering information on all aspects of the project, supervising activities in progress to ensure they are on-course and on-schedule in meeting the objectives and performance targets. To monitor is to check on how project activities are progressing. It is observation; ─ systematic and purposeful observation.<br />Monitoring also involves giving feedback about the progress of the project to the donors, implementers and beneficiaries of the project. Reporting enables the gathered information to be used in making decisions for improving project performance. To observe, supervise, or keep under review; to measure or test at intervals,<br />especially for the purpose of regulation or control, or to check or regulate the technical quality of something.<br />On the other hand, Surveillance is a process of close monitoring of behavior. Ongoing close observation and collection of data or evidence, for a specified purpose or confined to a narrow sector. In comparison, environmental scanning is broad and includes all associated external factors.<br />quot;
Sur-Veillancequot;
 is French for to quot;
watch from abovequot;
. Note the all seeing quot;
eye-in-the-skyquot;
 in this London Transport poster. Although the word surveillance literally means (in French) quot;
to watch from abovequot;
 (i.e. a God's-eye view looking down from on-high) the term is often used for all forms of observation, not just visual observation. However, the all-seeing eye-in-the-sky is still an icon of surveillance in general. It is commonly used to describe observation from a distance by means of electronic equipment or other technological means.<br />Surveillance is the art of watching over the activities of persons or groups from a position of higher authority. Surveillance may be covert (without their knowledge) or overt (perhaps with frequent reminders such as quot;
we are watching over youquot;
). Surveillance has been an intrinsic part of human history. Sun Tzu's The Art of War, written 2,500 years ago, discusses how spies should be used against a person's enemies. But modern electronic and computer technology have given surveillance a whole new means of operation. Surveillance can be automated using computers, and people leave extensive records that describe their activities. <br />Counter surveillance is the practice of avoiding surveillance or making it difficult. Before computer networks, counter surveillance involved avoiding agents and communicating secretly. With recent development of the Internet and computer databases counter surveillance has grown. Now counter surveillance involves everything from knowing how to delete a file on a computer to avoiding becoming the target of direct advertising agencies. <br />Inverse surveillance is the practice of reversalism on surveillance, e.g. citizens photographing police, shoppers photographing shopkeepers, and passengers photographing cab drivers who usually have surveillance cameras in their cabs. A well-known example is George Haliday's recording of the Rodney King beating. Inverse surveillance attempts to subvert the panoptic gaze of surveillance, and often attempts to subvert the secrecy of surveillance through making the inverse surveillance recordings widely available (in contrast to the usually secret surveillance tapes).<br />
Former chaptr1

Weitere ähnliche Inhalte

Andere mochten auch

yow! assignment kow! yow!
yow! assignment kow! yow!yow! assignment kow! yow!
yow! assignment kow! yow!cas123
 
Applets - lev' 2
Applets - lev' 2Applets - lev' 2
Applets - lev' 2Rakesh T
 
Chapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadChapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadcas123
 
My documentation
My documentationMy documentation
My documentationcas123
 
Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1cas123
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123cas123
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesiscas123
 
(Nov 2008) Preparing Future Digital Curators
(Nov 2008) Preparing Future Digital Curators(Nov 2008) Preparing Future Digital Curators
(Nov 2008) Preparing Future Digital CuratorsCarolyn Hank
 
lock system
lock systemlock system
lock systemcas123
 
Thesis
ThesisThesis
Thesiscas123
 
(Nov 2007) Informing Blog Appraisal through Bloggers Perspectives on Selectio...
(Nov 2007) Informing Blog Appraisal through Bloggers Perspectives on Selectio...(Nov 2007) Informing Blog Appraisal through Bloggers Perspectives on Selectio...
(Nov 2007) Informing Blog Appraisal through Bloggers Perspectives on Selectio...Carolyn Hank
 
Scholars in the Blogosphere
Scholars in the BlogosphereScholars in the Blogosphere
Scholars in the BlogosphereCarolyn Hank
 
Scholars’ Blogs or Scholarly Blogs? Perceptions and Implications for Promotio...
Scholars’ Blogs or Scholarly Blogs? Perceptions and Implications for Promotio...Scholars’ Blogs or Scholarly Blogs? Perceptions and Implications for Promotio...
Scholars’ Blogs or Scholarly Blogs? Perceptions and Implications for Promotio...Carolyn Hank
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123cas123
 
Joemary.doc
Joemary.docJoemary.doc
Joemary.doccas123
 
Removing Records Documenting Acts of Violence and Atrocities from the Archive...
Removing Records Documenting Acts of Violence and Atrocities from the Archive...Removing Records Documenting Acts of Violence and Atrocities from the Archive...
Removing Records Documenting Acts of Violence and Atrocities from the Archive...Carolyn Hank
 
WED - 2011
WED -  2011WED -  2011
WED - 2011Rakesh T
 
(Jan 2011) Scholars, their Blogs, and Digital Preservation: Reflections on Re...
(Jan 2011) Scholars, their Blogs, and Digital Preservation: Reflections on Re...(Jan 2011) Scholars, their Blogs, and Digital Preservation: Reflections on Re...
(Jan 2011) Scholars, their Blogs, and Digital Preservation: Reflections on Re...Carolyn Hank
 

Andere mochten auch (20)

Ignou mba
Ignou mbaIgnou mba
Ignou mba
 
yow! assignment kow! yow!
yow! assignment kow! yow!yow! assignment kow! yow!
yow! assignment kow! yow!
 
Applets - lev' 2
Applets - lev' 2Applets - lev' 2
Applets - lev' 2
 
Chapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadChapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sad
 
My documentation
My documentationMy documentation
My documentation
 
Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesis
 
(Nov 2008) Preparing Future Digital Curators
(Nov 2008) Preparing Future Digital Curators(Nov 2008) Preparing Future Digital Curators
(Nov 2008) Preparing Future Digital Curators
 
lock system
lock systemlock system
lock system
 
Thesis
ThesisThesis
Thesis
 
(Nov 2007) Informing Blog Appraisal through Bloggers Perspectives on Selectio...
(Nov 2007) Informing Blog Appraisal through Bloggers Perspectives on Selectio...(Nov 2007) Informing Blog Appraisal through Bloggers Perspectives on Selectio...
(Nov 2007) Informing Blog Appraisal through Bloggers Perspectives on Selectio...
 
Scholars in the Blogosphere
Scholars in the BlogosphereScholars in the Blogosphere
Scholars in the Blogosphere
 
Scholars’ Blogs or Scholarly Blogs? Perceptions and Implications for Promotio...
Scholars’ Blogs or Scholarly Blogs? Perceptions and Implications for Promotio...Scholars’ Blogs or Scholarly Blogs? Perceptions and Implications for Promotio...
Scholars’ Blogs or Scholarly Blogs? Perceptions and Implications for Promotio...
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123
 
Joemary.doc
Joemary.docJoemary.doc
Joemary.doc
 
Neurotheology neuroscience of the soul (cooke 2009)
Neurotheology neuroscience of the soul (cooke 2009)Neurotheology neuroscience of the soul (cooke 2009)
Neurotheology neuroscience of the soul (cooke 2009)
 
Removing Records Documenting Acts of Violence and Atrocities from the Archive...
Removing Records Documenting Acts of Violence and Atrocities from the Archive...Removing Records Documenting Acts of Violence and Atrocities from the Archive...
Removing Records Documenting Acts of Violence and Atrocities from the Archive...
 
WED - 2011
WED -  2011WED -  2011
WED - 2011
 
(Jan 2011) Scholars, their Blogs, and Digital Preservation: Reflections on Re...
(Jan 2011) Scholars, their Blogs, and Digital Preservation: Reflections on Re...(Jan 2011) Scholars, their Blogs, and Digital Preservation: Reflections on Re...
(Jan 2011) Scholars, their Blogs, and Digital Preservation: Reflections on Re...
 

Ähnlich wie Former chaptr1

reserach paper on Study Of Digital Forensics Process.docx
reserach paper on Study Of Digital Forensics Process.docxreserach paper on Study Of Digital Forensics Process.docx
reserach paper on Study Of Digital Forensics Process.docxNavneetSaluja5
 
Surveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptxSurveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptxitzmerhuzieeee
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensicsJohnson Ubah
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkAndrew Gerber
 
Types of Surveillance Systems
Types of Surveillance Systems			Types of Surveillance Systems
Types of Surveillance Systems LeolaHuffman
 
Camera surveilance 7 seminar salman
Camera surveilance 7 seminar salmanCamera surveilance 7 seminar salman
Camera surveilance 7 seminar salmanRameez Raja
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesBRNSSPublicationHubI
 
Mark Borkowski Presentation
Mark Borkowski PresentationMark Borkowski Presentation
Mark Borkowski Presentationsvito
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
 
Electronic Surveillance
Electronic SurveillanceElectronic Surveillance
Electronic Surveillanceijtsrd
 
Overview of HR monitoring, fact finding and documentation
Overview of HR monitoring, fact finding and documentationOverview of HR monitoring, fact finding and documentation
Overview of HR monitoring, fact finding and documentationNone
 
The tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdfThe tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdfnoelbuddy
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicIRJET Journal
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace SurveilanceSampath
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docxMVNVKUMAR
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptxaratibhavsar
 

Ähnlich wie Former chaptr1 (20)

Survillance description
Survillance descriptionSurvillance description
Survillance description
 
reserach paper on Study Of Digital Forensics Process.docx
reserach paper on Study Of Digital Forensics Process.docxreserach paper on Study Of Digital Forensics Process.docx
reserach paper on Study Of Digital Forensics Process.docx
 
Surveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptxSurveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptx
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 
Presentation eco.pptx
Presentation eco.pptxPresentation eco.pptx
Presentation eco.pptx
 
Types of Surveillance Systems
Types of Surveillance Systems			Types of Surveillance Systems
Types of Surveillance Systems
 
Camera surveilance 7 seminar salman
Camera surveilance 7 seminar salmanCamera surveilance 7 seminar salman
Camera surveilance 7 seminar salman
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
 
Mark Borkowski Presentation
Mark Borkowski PresentationMark Borkowski Presentation
Mark Borkowski Presentation
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
Electronic Surveillance
Electronic SurveillanceElectronic Surveillance
Electronic Surveillance
 
Overview of HR monitoring, fact finding and documentation
Overview of HR monitoring, fact finding and documentationOverview of HR monitoring, fact finding and documentation
Overview of HR monitoring, fact finding and documentation
 
The tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdfThe tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdf
 
Developing technology
Developing technologyDeveloping technology
Developing technology
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
 
Surveillance Software.docx
Surveillance Software.docxSurveillance Software.docx
Surveillance Software.docx
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptx
 

Mehr von cas123

ayan na
ayan naayan na
ayan nacas123
 
Scrnsht
ScrnshtScrnsht
Scrnshtcas123
 
Thesis
ThesisThesis
Thesiscas123
 
Sad format
Sad formatSad format
Sad formatcas123
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2cas123
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123cas123
 
My documentation
My documentationMy documentation
My documentationcas123
 
Chapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadChapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadcas123
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesiscas123
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentationcas123
 
Sad format
Sad formatSad format
Sad formatcas123
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2cas123
 
Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1cas123
 
Thesis
ThesisThesis
Thesiscas123
 
Sad format
Sad formatSad format
Sad formatcas123
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2cas123
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesiscas123
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentationcas123
 
Chapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadChapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadcas123
 

Mehr von cas123 (20)

ayan na
ayan naayan na
ayan na
 
Scrnsht
ScrnshtScrnsht
Scrnsht
 
Print
PrintPrint
Print
 
Thesis
ThesisThesis
Thesis
 
Sad format
Sad formatSad format
Sad format
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123
 
My documentation
My documentationMy documentation
My documentation
 
Chapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadChapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sad
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesis
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentation
 
Sad format
Sad formatSad format
Sad format
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2
 
Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1
 
Thesis
ThesisThesis
Thesis
 
Sad format
Sad formatSad format
Sad format
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesis
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentation
 
Chapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadChapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sad
 

Kürzlich hochgeladen

Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Availablepr788182
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSkajalroy875762
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubaijaehdlyzca
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 

Kürzlich hochgeladen (20)

Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 

Former chaptr1

  • 1. Monitoring is the regular observation and recording of activities taking place in a project or programmed. It is a process of routinely gathering information on all aspects of the project, supervising activities in progress to ensure they are on-course and on-schedule in meeting the objectives and performance targets. To monitor is to check on how project activities are progressing. It is observation; ─ systematic and purposeful observation.<br />Monitoring also involves giving feedback about the progress of the project to the donors, implementers and beneficiaries of the project. Reporting enables the gathered information to be used in making decisions for improving project performance. To observe, supervise, or keep under review; to measure or test at intervals,<br />especially for the purpose of regulation or control, or to check or regulate the technical quality of something.<br />On the other hand, Surveillance is a process of close monitoring of behavior. Ongoing close observation and collection of data or evidence, for a specified purpose or confined to a narrow sector. In comparison, environmental scanning is broad and includes all associated external factors.<br />quot; Sur-Veillancequot; is French for to quot; watch from abovequot; . Note the all seeing quot; eye-in-the-skyquot; in this London Transport poster. Although the word surveillance literally means (in French) quot; to watch from abovequot; (i.e. a God's-eye view looking down from on-high) the term is often used for all forms of observation, not just visual observation. However, the all-seeing eye-in-the-sky is still an icon of surveillance in general. It is commonly used to describe observation from a distance by means of electronic equipment or other technological means.<br />Surveillance is the art of watching over the activities of persons or groups from a position of higher authority. Surveillance may be covert (without their knowledge) or overt (perhaps with frequent reminders such as quot; we are watching over youquot; ). Surveillance has been an intrinsic part of human history. Sun Tzu's The Art of War, written 2,500 years ago, discusses how spies should be used against a person's enemies. But modern electronic and computer technology have given surveillance a whole new means of operation. Surveillance can be automated using computers, and people leave extensive records that describe their activities. <br />Counter surveillance is the practice of avoiding surveillance or making it difficult. Before computer networks, counter surveillance involved avoiding agents and communicating secretly. With recent development of the Internet and computer databases counter surveillance has grown. Now counter surveillance involves everything from knowing how to delete a file on a computer to avoiding becoming the target of direct advertising agencies. <br />Inverse surveillance is the practice of reversalism on surveillance, e.g. citizens photographing police, shoppers photographing shopkeepers, and passengers photographing cab drivers who usually have surveillance cameras in their cabs. A well-known example is George Haliday's recording of the Rodney King beating. Inverse surveillance attempts to subvert the panoptic gaze of surveillance, and often attempts to subvert the secrecy of surveillance through making the inverse surveillance recordings widely available (in contrast to the usually secret surveillance tapes).<br />