Pervasive Computing Case Study

3912 Words8 Pages

Impact of Mobile and Pervasive Computing Social, Private and Health factor of Human Muhammad Mohsan Raza/MS100400008 MS Computer Sciences Virtual University of Pakistan MS100400008@vu.edu.pk Abstract—Mobile and Pervasive computing comes with idea that it is going to be part of life as if it does not exist and work invisible. It has many benefits but it has some doubts and risk factors involved in it which include Human social factor, privacy factor and risk on overall health. Mobile and Pervasive computing has added ease to all the mentioned factors but also has put risks and hazards to these factors. In this paper some of the major risk related to these factors has been discussed and at the end of the paper a conclusion is derived …show more content…

When we say that mobile and pervasive computing will become essential part of human and will control the life style of the person it is risk that we might lose family and relations. It is a risk that a person will stick to your room and stop interacting and getting socializing will family member as their requirement will be fulfilled by smart devices. It is very lovely that family members sit together and have discussion our requirement and the desires of each other and doing some of the work by yourself give happiness like sharing jokes making cup of coffee for you patting on your head and giving massage on the head or talking to the old father and mother. There is a risk factor involved that as the trend going mobile and pervasive computing may vanish all these feelings and …show more content…

The boundaries and content of what is considered private differ among cultures and individuals, but share common themes. Privacy helps individuals maintain their autonomy and individuality. People define themselves by exercising power over information about them and a free country does not ask people to answer for the choices they make about what information is shared and what is held close. Privacy is most likely the most important and prominent concern when we are taking about mobile and pervasive computing. This is certainly due to the already bigger threat to privacy which is caused use of distributed commercial databases that have very large and personnel record our daily electronic transactions and growing day by day. That might be the reason that ubiquitous computing has now the potential to create an even more invisible and comprehensive surveillance network which is now covering an extraordinary share of our public and private

Open Document