Computer Science: An Overview (13th Edition) (What's New in Computer Science)
Computer Science: An Overview (13th Edition) (What's New in Computer Science)
13th Edition
ISBN: 9780134875460
Author: Glenn Brookshear, Dennis Brylow
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 0, Problem 15SI

Explanation of Solution

“No”, it is neither ethical nor legal to broadcast the phone’s location to other parties or strangers without the consent of the consumer.

Introduction to GPS (Global Positional System):

The Global Positioning System termed as GPS, uses satellites to determine the current physical location.

It was originally created by the U.S. Department of Defense to improve military navigation. It is now available for consumer and used in cars, smartcards, handheld computers, and cell phones.

GPS helps to search a desired location for specific landmarks, such as restaurants and gas stations within a specific radius to current location. It also provides convenient turn-by-turn driving instructions to the destination.

Privacy invasion by smartphones due to location sharing:

This technology brings value to its users. However, it has caused a significant decrease in privacy. A combination of GPS data and cell tower triangulation can reveal the current location of smartphone.

According to the Electronic Frontier Foundation, “Location information collected by cellphone companies can provide an extraordinarily invasive glimpse into the private lives of cellphone users.”

Mobile phone companies have the ability to exploit the information and get an extraordinary insight into the private lives of their mobile customers. Some companies sell this information to other companies with an interest to get personal data, choices and buying patterns.

Unwanted tracing and sharing personal location can lead to fraud, hindrance in social life and several other security concerns for famous personalities and others.

Hackers can break into servers and steal usernames, email addresses, phone numbers and hashed passwords of authorized lawmakers, investigation agents or secure information of national advisors and users.

Mobiles numbers, credit card details, and email addresses can be compromised along with shared location because the companies gather all the data along with location.

Criminal and miscreants can get vital information of users and can abuse the person, mentally and financially. The life of users can also be at stake if data gets leaked to terrorist organizations.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Computer science Today's generations of mobile devices and personal computers are distinguished and linked by their ability to interact wirelessly.
When you hear the word "email," what are some of the first things that pop into your head? What takes place after an email has been delivered after it has been sent from the sender's inbox? Make a list of everything that you are aware of today that you were unaware of in the past. It would pique my curiosity to find out if anyone has any insight into the circumstances that lead to these inequalities, as it would pique my interest to see if anybody does. Within your firm, is there a variation in the level of complexity from one model to the next?
IT Describe the current use of voice information systems.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning