Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Cell phone effects in society research
The major impact of using cellphones
Effects of cell phone use in our society
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Cell phone effects in society research
Whenever we sit in the subway, eat in the restaurants, work in the offices, or study in the classrooms, it seems that we can always see people play around their cell phones. Cell phone is used extraordinary frequently and widely and takes an important role in people’s daily life. The crowd use cell phones to do a bunch of things, such as calling, texting, searching the Internet, taking photos, using GPSs to get directions and so on. Individuals have large demand for those cell phone’s utilities. However, the enormous demand will also bring notable privacy threat to the public. There is a contradiction between cell phone users’ demands and privacy threats as well as the necessity for those users to learn to how to balance the two things. More specifically, people need to learn to balance the contradiction between their snapshots sharing demand and following potential exposure issue; the contradiction between the demand of using GPS service utility and location tracking threat by organizations or companies; even the contradiction between their will of containing criminal activities and the exposure threat of their personal information. The snapshots utility of cell phone can cause privacy issue if people upload their photos from their cell phone albums to the Internet. The use of photo taking utility is very common for camera phone users to record their daily life because cell phone is portable and nearly every cell phone has a camera lens, it enables them to take photos anywhere and anytime. Therefore, people will always hold their cell phones to take photos for catching beautiful and meaningful moments. As a consequence, most people would like to share their photos on the Internet, such as Facebook, Twitter, Instagr... ... middle of paper ... ...e/Public Boundaries.” Knowledge, Technology & Policy Fall 2009: 161-171. Print. “What is GPS?”, “GPS Location Privacy.” Official U.S. Government information about the Global Positioning System. National Coordination Office for Space-Based Positioning, Navigation, and Timing. Feb 11, 2014. Web. April 30, 2014. Reades, Jonathan. “Finite State Machines: Preserving Privacy When Data-Mining Cellular Phone Networks.” Journal of Urban Technology No.1, April 2010: 29-40. Print. “Difference Between a Prepaid Phone and a Phone with a Contract.” Electronics, Cars, Fashion, Collectibles, Coupons and More | eBay. eBay Incorporation. August 20, 2013. Web. April 30, 2014. Gow, Gordon A., and Jennifer Parisi. “Pursuing the Anonymous User: Privacy Rights and Mandatory Registration of Prepaid Mobile Phones.” Bulletin of Science, Technology & Society Feb. 2008: 60-68. Print.
When one looks around in public it is almost impossible not to see someone who is talking, texting, or playing a game on a cell phone. When someone sends a text, the phone company saves it in a data bank where it sits waiting to be u...
Privacy is a complex concept with no universal definition as its meaning changes with society. Invasion of privacy occurs when there is an intrusion upon the reasonable expectation to be left alone. There has been a growing debate about the legitimacy of privacy in public
Security versus privacy is becoming a major issue in today’s society. Recently, the National Security Agency has been the victim of scrutiny due to allegations of espionage. Similar claims not only stem from the authority, but also come from the public as well. For example, one is enjoying a night out in a restaurant when a group of teenagers arrives. Before it is noticed, some of the teenagers take photos with a cell phone. The picture encompasses most of the area occupied; therefore, every person in that general area is included in it. A few moments later, one teen uploads that picture to various social media websites to share along with captions stating the current location. Although not a single person gave consent, pictures are being circulated with thousands of strangers in the innumerable realms of the internet. Not only are these pictures all over the web and an invasion of privacy, but people viewing those pictures are able to discover recent whereabouts with the simple click of a button. Due to technology’s rapid advancements, similar acts such as these are becoming nearly inevitable. But, these are the very same advancements that help us live in a free and open society. In order to avoid intrusions yet maintain safety, restrictions should be put upon consumer devices, capabilities of security devices, and government abilities.
The personal connection Americans have with their phones, tablets, and computers; and the rising popularity of online shopping and social websites due to the massive influence the social media has on Americans, it is clear why this generation is called the Information Age, also known as Digital Age. With the Internet being a huge part of our lives, more and more personal data is being made available, because of our ever-increasing dependence and use of the Internet on our phones, tablets, and computers. Some corporations such as Google, Amazon, and Facebook; governments, and other third parties have been tracking our internet use and acquiring data in order to provide personalized services and advertisements for consumers. Many American such as Nicholas Carr who wrote the article “Tracking Is an Assault on Liberty, With Real Dangers,” Anil Dagar who wrote the article “Internet, Economy and Privacy,” and Grace Nasri who wrote the article “Why Consumers are Increasingly Willing to Trade Data for Personalization,” believe that the continuing loss of personal privacy may lead us as a society to devalue the concept of privacy and see privacy as outdated and unimportant. Privacy is dead and corporations, governments, and third parties murdered it for their personal gain not for the interest of the public as they claim. There are more disadvantages than advantages on letting corporations, governments, and third parties track and acquire data to personalized services and advertisements for us.
Computers, tablets, cellphones and all modern tenchnology has decrease our expectations of privacy in this digital age. People don't care anyone for their privacy, they only want the benefits that modern technology has brought to them. In the essay, “Privacy is Overrated” by David Plotz (2003), argues that it is sometimes good to be open and not be bother by privacy. In Jack Shafer's (2010) essay, “The Invasion of the Cookie Monster” he argues that we are the ones to be blame for the lost of our online privacy. The didgital age has created an extremely big problem of privacy for people.
Privacy does not have a single definition and it is a concept that is not easily defined. Information privacy is an individual's claim to control the terms under which personal information is acquired, disclosed, and used [9]. In the context of privacy, personal information includes any information relating to or traceable to an individual person [ 1]. Privacy can be defined as a fundamental human right; thus, privacy protection which involves the establishment of rules governing the collection and handling of personal data can be seen as a boundary line as how far society can intrude into a person's affairs.
"Privacy and the Internet: Intrusion, Surveillance and Personal Data." International Review of Law, Computers & Technology Oct. 1996: 219-235.
First of all, what does the government do to secure this private information? The answer is very little. There are bascially two different laws that effect privacy. These two laws are the Privacy Act of 1974 and the Freedom of Information act. At a first inspection the two laws seem to work against each other. In short the Privacy Act of 1974 keeps information in government records concerning individuals discreet. The Privacy Act of 1974 gives the individual the rights to see and copy files that the federal government maintains on him or her. It also gives the right to know who else has access to that information, and to request a change to any information that is not accurate. The most important part of this law is the fact that the government is not allowed to use any information for any purpose other than the one for which it was initially collected. This is important and will be addressed later on.
Across the nation, people use cell phones daily to interact and communicate socially with each other. Unbeknownst to the average cell phone user, 4 billion people worldwide use cell phones daily. According to an article from ABCNews, people check their phones one hundred fifty times a day. People are not just using the cell phone for messaging or voice calls, but they are also mainly taking and sharing photos with them; 500 million photos are shared each day through social media such as Facebook, Twitter, Instagram, and Snapchat. Apparently in our country, fifteen percent of Americans admit to sharing most or everything online (ABCNews). All of these statistical facts prove that ...
Many people in today’s society rely on technology to help us with our daily lives and help us stay connected to family, friends, and other people. The advancements in today’s cell phone technology is very complex and made to be efficient for their owners, allowing them to surf the net and IM message people instantly. Cellphones in particular have developed very fast in the past 15 years. From my childhood, cell phones have evolved from the old school Nokia bricks that allowed texts, calls, and simple graphic games, to todays I-Phones that have higher computable capabilities than some computers. In the United States alone, there is an estimated population of around 297 million people, and 197 million people are subscribed to cell phone companies (Starr). With so many people in today’s society with so much power and opportunity in the palm of their hands, we shouldn’t forget that “With great power comes great responsibility” –Voltaire.
With text messaging, email, and social media, all of which are already fairly popular, becoming more popular by the day, digital privacy is becoming a vital issue. This is why the problem between Apple and the FBI is an important issue, and one that calls for attention. In the words of Middleton “The first thing many users do in the morning is check their BlackBerry, and the device remains with them throughout the day, until they go to bed.” The thing is, this is not a behavior limited to BlackBerry users. Many people who have cellphones, smartphones in particular, are practically attached to them at the hip. As a result of this level of dependence, many people have a veritable boatload of information on their cellphones. Credit card numbers, important emails, all of their contacts, to name but a few. Some people have their entire lives stored on their phones. If it is a phone used regularly for business, it may have most to all of the business’ pertinent information stored on one device. This is why cell phone security, and being able to trust that the information on your phone is being kept safe, is so important
The issue on privacy is extremely controversial in today’s world. As the United States’ use of the internet, a global web of interconnected computer networks, expands, so does its problem with privacy invasion. With the U.S. pushing for new laws governing internet use, citizens are finding their privacy being pulled right from underneath them. Web users are buying and selling personal information online as well as hacking users for more information. One may argue that there is no such thing as privacy on the internet, but privacy is a right among Americans, and should be treated as such.
LeRoux, Yves. "Privacy concerns in the digital world." 03 Oct 2013. Computer Weekly. 24 April 2014 .
In a world of Facebook and LinkedIn and YouTube and OKCupid and Google and IPhones and Ipads and Kindles and all the other hundreds of sites and devices designed to garner personal information, data-mine your information, to better advertise, sell, inform, and connect you with the people or the places that you want to experience. The wonderful world of the Internet helps connect millions of people with millions of other people in milliseconds all day, every day. All the swapping and sharing of information create a world of transparency, deception, fraud, and identity confusion. Avatars, aliases, and profiles are the ways most people advertise their goods and services and themselves. With this consideration an erosion of privacy has changed our culture in ways that some predicted years ago and some that are new to our era. This paper will explore some primary regarding how technology causes the changes in privacy and what are the effects brought on by these changes.
Staff, Proquest. At Issue: Technology and Privacy. N.p.: ProQuest LLC, 2013. Web. 5 Dec. 2013. .