1,069
23
Essay, 7 pages (1800 words)

Invading our privacy by smart phones information technology essay

Our phone is a spy, it’s a fact or a lie? Everyone is hearing about invading our privacy by smart phones all over the world, which is our smart phones can reveal our privacy and secrets issues. In the world of technology, everything is possible now. People can track you down wherever you are, it’s completely invasion to our rights as humans. In every application we download or every time we have access to internet, someone somewhere can know a lot of things about us. Even worse, we already now have saved profile of hundreds and maybe thousands of pages that include information about every single one of us. Companies are collecting details about us without our consent and making a lot of money on our account. That’s terrifying, but there is always a way out by just following some rules, and proceeding with some precautious methods. Smart phones became cleverer, however maybe they got cleverer than they should? Have they become too intelligent for their own good? They provide so many choices and so much detail, but in latest disputes, it’s said that they even monitor what the customer is doing. It cannot just keep a record of whom you contact, what web websites you check out, but it can even take images of where you are actually situated and where you go. Costumers hate being monitored in that way, and one of the greatest suppliers and causes is the apple company and they have just lately declared that they have taken out and customized the way that the applications work so that this no more occurs. Most men and ladies could not think about residing without their smartphones, but this monitoring, this intrusion of comfort isn’t something that they voluntarily finalized up for. Now, if it was published into your agreement and they requested authorization for some way of marketing or promotion analysis study, which would be a different tale (Thomas, 2011). These mobile phones are awesome items of technology, and it looks like each week, something new and innovative is launched. It is a large market, and producers and designers cannot manage to rage any section of their consumer platform. It is not good business and it can come back to bother them later on. These mobile phones offer nearly as many features as a laptop did few years ago. They are nearly as fast in handling power online and the more recent editions can run several programs at once (fakhoury, 2011). They are great for making telephone phone calls for sure, but they are really much more. Most people use these mobile phones as their digital relationship to the world. All of their connections, many of their private images and songs are saved on the product. It is their relationship to their family members, buddies and colleagues. They have become an expansion as essential, if not more essential than their computer systems at home or work (Thomas, 2011). You probably listen to the phrase ” smartphone” alot. But everyone is questioning, what is a smart phone? How is a smartphone different than a mobile phone, and what characteristics make it so smart? In a few words, a smartphone is a system that allows you make phone calls, but also contributes in functions that, before, you would find only on a smartphone or a computer–such as the capability to deliver and get e-mail and modify Office documents, for example (Lord, 2012). But, to know what a smart phone is (and is not), we should begin with a class in record. At first, there were mobile phones and personal digital assistants (or PDAs). Cell mobile phones were used for calling–and nothing else–while PDAs, like the Palm Pilot, were used as individual, convenient planners. A PDA could save your contact details and a to-do list, and could synchronize with your personal computer. Eventually, PDAs obtained wireless connectivity and became able to send and receive e-mail. Mobile phones, meanwhile, obtained messaging capabilities, too. PDAs then included cell phone functions, while mobile cell phones included more PDA-like (and even computer-like) functions. Leading to the smartphone (Cassavoy, 2013). But smart phone have the ability to reveal our privacy, and how it is done? First it could be due to application. Approximately all cell mobile phones involve some type of application (even the most main styles these days involve an address book or some type of contact manager, for example), a smartphone could be able to do more. It would let you create and change office documents–or view the files. It would let you to acquire programs, such as personal and business finance managers, useful personal team, or, almost anything. Or it would let you to alter pictures, get driving recommendations via GPS, and make a playlist of digital songs (cellphones. about. com, 2013). How applications can help in revealing our privacy? Well, advertisers pay app designers to get entry to you. The advertisers provide code to the app-makers to develop into the app. The code not only creates an ad visible when you use the app, but also gathers information from your cellphone and sends it in return to the advertiser. It’s also achievable that the app itself gathers information which is distributed to ad networks. The ad networks may then display the customer ads that contain material depending on the information gathered. The information gathered or shared can make a profile about you that include a lot of information. In December 2010 an investigation of 101 apps done by wall street journal came up that 56 apps take your phones ID number, 47 took the location of the phone and 5 took the costumers age, sex, and other private information like the contact list or phone number (Brooks, 2011). One issue around programs and their ability to discuss and sell customer data is that many programs do not have privacy policies. Even if it has, the small shape of a smart phone screen along with complicated and long policies make the policies both hard to read and to know the content (privacyrights. org, 2012). Some services, for example Facebook, are very clear in their privacy policy and you can realize what is going on when you sign up (if you really look at it). They also generally gather information for their own requirements, rather than anything nefarious, but they still gather a lot of information. In Facebook’s situation, they have enough of your private details that it consistently causes fear about their privacy methods. Facebook is also providing you an opportunity to elect on your capability to elect on upcoming website changes (including privacy change). As we’ve described before, Facebook trails fairly much a lot of what you do on the internet, and they may even offer some of that details. Facebook is fairly dull about this in their privacy Plan. Facebook’s privacy methods modify so often. With Facebook especially, you need to fear about third party applications and games since they may accidentally give away your details as well (klosownski, 2012). Google is fairly up-front for the fact that they gather information from you to make their services work in a better way. They do it in order to be able to keep your information in synchronize across gadgets, provide you intended ads, and provide customized search details to you based on your record. Based on Google privacy Plan, they discuss your details with sector administrators, for exterior handling and lawful reasons. They also discuss non-personally recognizable details with their associates this could consist of your record, ad opinions, and other familiar information (google/privacy rights). Twitter’s privacy Plan is actually fairly powerful (and transparent) in comparison to many of social networking sites, but as we’ve outlined before, Tweets is still monitoring what you do on internet to be able to provide your customized material and ads. Your account is also not private by standard, which not only indicates anyone can examine it out, but also that your twitter posts may end up in the library of congress at some point. As for what we know till now, rough twitter posts can stay on permanently and harm you in the real world (twitter/privacy rights, 2012)Drop box has a somewhat strong privacy Policy, but workers still have computer file level access to your information in the case of a DMCA take down ask for which in theory means they could look at your folders or files at any time. The other big storage space services follow in this regard (dropbox/privacy rights, 2012)Skype has been charged of revealing information before, and it has also been charged of eavesdropping on your telephone calls. As Skype’s privacy plan notices, your information, voicemail messages, and video mail messages, is saved for up to 90 days, and they will give any information they obtain over to government authorities when needed (skype/privacy rights, 2012)When it comes to synchronizing, when we synchronize to Facebook contacts if someone is saving his phone number on his Facebook it is automatically saved on the phone as a contact so now maybe half of your Facebook friends even if some of them you don’t know you could have their phone number without even their agreement (Gallagher, 2012). A person who benefits entry to your smart phone can actually set up surveillance spyware. Online search for ” smartphone spy” draws up application that guarantees it doesn’t rely if the customer tries to remove their tracks by removing their information. This versatile spy application records the actions immediately after they occur and stores them to a small invisible file on the phone. The file is then submitted to your web-based account (Kiles, 2011). Even more frightening, some spyware can turn on your cell phone’s microphone and photographic camera, using it to detect and see what exactly is going on around you. Spyware can also monitor and track your place. Unfortunately, it’s very hard to be able to detect spyware by yourself (Urban & Hoofnaggle, 2012). In short we can’t live without our smartphones but on the other hand we can’t also bear the fact that our privacy is being invaded, so here are some methods in order to be able to prevent invading our privacy by smartphones. First you can put a password to protect your phone, and make sure to use a strong password. Second, do not let your smartphone to automatically remember any password you enter because this password could be easily tracked by hackers. Third, use the lockout feature which enables your phone to lock automatically after sometime without being used. Finally, you can install security software which can wipe out the data after you lock your phone (privacyrights. org, 2012)You can also prevent being hacked or easily tracked by downloading trusted applications and reading the whole license of agreement which will let you know what the application is capable of retrieving on your phone, some license agreement would include that the application will be able to track your phone calls and could look through your contacts (Mardigian, 2013).

Thank's for Your Vote!
Invading our privacy by smart phones information technology essay. Page 1
Invading our privacy by smart phones information technology essay. Page 2
Invading our privacy by smart phones information technology essay. Page 3
Invading our privacy by smart phones information technology essay. Page 4
Invading our privacy by smart phones information technology essay. Page 5
Invading our privacy by smart phones information technology essay. Page 6
Invading our privacy by smart phones information technology essay. Page 7

This work, titled "Invading our privacy by smart phones information technology essay" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Invading our privacy by smart phones information technology essay'. 15 September.

Reference

AssignBuster. (2022, September 15). Invading our privacy by smart phones information technology essay. Retrieved from https://assignbuster.com/invading-our-privacy-by-smart-phones-information-technology-essay/

References

AssignBuster. 2022. "Invading our privacy by smart phones information technology essay." September 15, 2022. https://assignbuster.com/invading-our-privacy-by-smart-phones-information-technology-essay/.

1. AssignBuster. "Invading our privacy by smart phones information technology essay." September 15, 2022. https://assignbuster.com/invading-our-privacy-by-smart-phones-information-technology-essay/.


Bibliography


AssignBuster. "Invading our privacy by smart phones information technology essay." September 15, 2022. https://assignbuster.com/invading-our-privacy-by-smart-phones-information-technology-essay/.

Work Cited

"Invading our privacy by smart phones information technology essay." AssignBuster, 15 Sept. 2022, assignbuster.com/invading-our-privacy-by-smart-phones-information-technology-essay/.

Get in Touch

Please, let us know if you have any ideas on improving Invading our privacy by smart phones information technology essay, or our service. We will be happy to hear what you think: [email protected]