| Feature | Security-Focused Monitoring | Productivity-Focused Monitoring |
|---|---|---|
| Primary Goal | Threat detection and safety | Efficiency and policy compliance |
| Typical Setting | Public spaces, high-risk zones | Workplaces, digital platforms |
| Data Type | Video, location, access logs | Keystrokes, screen time, emails |
| Ethical Priority | Collective safety | Contractual accountability |
Analyze the Context: When evaluating a monitoring scenario, always identify the specific stakeholders (e.g., the monitor vs. the monitored) and their conflicting interests.
Apply Ethical Frameworks: Use concepts like Transparency, Accountability, and Data Minimization to critique whether a monitoring practice is justified.
Balance the Argument: High-scoring answers must present both the benefits (e.g., crime reduction) and the drawbacks (e.g., loss of privacy) rather than taking a one-sided view.
Check for Proportionality: Evaluate if the method of monitoring is 'proportionate' to the goal. For example, is full-time GPS tracking necessary for a low-risk office job?