Cell phones are all the rage, everyone has one and wants the newest coolest one. “90% of American adults own a cell phone, and well over half have a smart phone.” (Kresser). Everyone can not go a day without there phone, nine year olds are getting iPhones. What if I told you that these small devices were harmful? These mini computers are invading our privacy, exposing our location to potentially predators, hurting our emotional health, and posing risks with usage in the car.
The app we use everyday can see everything we do. Most of us have 20+ applications on our phones and do not think twice about it, but we all need to be aware of the risks involved in them. We allow some apps to see every little we do on our phone when we accept the terms and conditions when we download. “apps can trace your Web habits, look into your contact list, make phone calls without your knowledge, track your location, examine your files and more.” (Gralla). Almost every app we use invades our privacy in some way. The Apps sell our personal information to advertising companies and marketers. I have deleted some of my favorite apps because of the terms and conditions they have. You might be alright with this but, I am not.
Potential predators and/or stalkers can see our location through our phones. There is technology in the GPS that anyone can you wherever you are down to the tee. They can hack into your phone no problem. There is also risk in posting on social media. If you post a picture on any type of internet it’s out there and anyone can see it, you are giving out your geographical information to the world.
Cell phones are so harmful to our personal well being. They cause poor communication between friends, family, and just day to day interaction...
... middle of paper ...
...l health issues, but there is research being done that phones transmit radiation to us. So mentally and physically these phones are really taking a toll on us.
An obvious reason about the dangers of cell phone usage is while operating a car. Anything from texting to calling to using the GPS is putting you and other drivers at risk. Texting and driving is way too common and causes millions of accidents, injuries, and deaths per year. Almost ¼ of car accidents are caused by texting and driving. Using the phone while driving makes you 23 times more likely to crash and hurt yourself, anyone in the car, and other drivers. It is just too high of a risk to play around with, any kind of cell phone use is unacceptable while driving.
Our addiction to the phone leads to us having no privacy, potentially being hurt or stalked, not having good conversations, and it even kills.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Today, there are many threats to information systems and the information contain contained on the servers by customers and employees. There are major privacies issues facing organizations from hackers, employees, natural disasters, and other threats. Some of the privacies issues can be risk to the sporting goods store and justify the concerns of the CEO. There are security risks and application laws which governs the privacy risks. Security measures can be implement by organizations which can mitigate the risk to private information.... [tags: technology, hackers]
1294 words (3.7 pages)
- Privacy is the ability to maintain what or who can access and see your personal content and information. With that, the idea of privacy is different amongst different cultures and countries, while they all differ, they share common characteristics. The act of sharing ones own personal information is decision one must make on their own. Privacy is a right that all people should have and the government has the responsibility of maintaining that right. Data such as personal emails, bank details, medical records, and passwords need to remain safe and secure to ensure privacy is not invaded.... [tags: Privacy, Privacy law]
714 words (2 pages)
- Viruses and Internet Security Since the creation and development of the Internet, hackers and intelligent software developers have been able to spread viruses that cause great harm to corporations and households. The Internet has been the gateway for hackers into their journey of obstruction. For example, through the loopholes of Microsoft’s IIS services on its server operating system packages, hackers have been able to open “backdoors” into some of the most complex intranet firewall protected networks of the world.... [tags: Web Computers Technology Essays]
2710 words (7.7 pages)
- Have you ever felt violated. Like somebody knew too much about you that they didn’t need to know. Or have you ever felt like someone was watching you. As if somebody knew your every move. Most people don’t normally feel this way; most people feel safe in their general surroundings. Although with the constant use of technology in today’s era, it’s time to ask: Should we, as American citizens, feel as safe as we do. Personal privacy is such a simple phrase for such a complex idea. The definition given in the Merriam-Webster’s dictionary of privacy is, “the quality or state of being apart from company or observation.” And “personal” meaning, “Relating to the person or body.” In other words: set... [tags: technology, privacy, hacking, computer]
1024 words (2.9 pages)
- Today a profound shift in the privacy equation is under way. Technology brings enormous efficiency to the collection, sorting and distribution of personal information. This efficiency has revolutionized countless organizations but it has also increased opportunities for snooping. The ability of computers to sift though personal information may make much of your life an open book, unless privacy policies are implemented. In many countries a large number of records are public, available to anyone.... [tags: Computer Privacy Essays]
368 words (1.1 pages)
- c) Cheetum will probably be able to prove that he took a reasonable amount of steps in order to maintain privacy over his personal file . A public employees ' expectations of privacy ... may be reduced by virtue of actual office practices and procedures, or by legitimate regulation. O’Connor v. Ortega, 480 U.S. 717. “Constitutional protection against unreasonable searches by the government does not disappear merely because the government has the right to make reasonable intrusions in its capacity as employer,” but some government offices may be so open to fellow employees or the public that no expectation of privacy is reasonable.... [tags: Personal computer, Computer, Privacy law, Server]
1293 words (3.7 pages)
- Protecting privacy is considered an essential human right, crucial and important to the protection of liberty. Although privacy is such a massive part of our lives, today’s technology is threatening the safety and privacy of many people (Rotenberg). Cell phones, social media, government, and other forms of technology threaten the lives of many both in their personal life and their life in the workplace (Lazar). We must start to consider ways to help protect privacy more efficiently to protect the lives of people all across the globe.... [tags: Facebook, Privacy, Twitter, Internet]
1407 words (4 pages)
- Internet Security Internet Security is the most important aspect of information technology. It has been years since computer has been invented and to keep the information confidential we have to safeguard this information. The importance of integrating security measures into systems development. Every business has their own security systems to reach their goals of information security. The computer world created security systems in order to reduce risk, maintain confidentiality, ensure the reliability of data resources, and compliance with national security laws and privacy policies and laws.... [tags: Internet Privacy Security Web Essays]
1457 words (4.2 pages)
- Kevin Mitnick Hacking has been around since the birth of computers. When the term hacking was first used, its meaning was not that of how we think of it today. At the origins of computing, a hacker was considered to be just a "creative programmer (Baase, 2003)." Early forms of computer games as well as the beginnings of operating systems were discovered and created by these original hackers. These hackers plunged into systems as a way of an intellectual challenge and to aspire to gain knowledge (Baase, 2003).... [tags: Hacker Hackers Hacking Computers Essays]
979 words (2.8 pages)
- Contrary to the public's belief, emails are not a private or secure form of communication. This general misconception amongst employees has repeatedly resulted in legal quagmires and ethical dilemmas. "It's a situation that arises a million times a day in offices around the world. An employee has something personal to tell a co-worker.... Rather than pick up the phone or wander down the hall, he or she simply types a message on the desktop computer terminal and send it as electronic mail. The assumption is that anything sent by E-mail is private.... [tags: Computers]
1348 words (3.9 pages)