Sunday, January 5, 2020

An Analysis of Cell Phone Technology, Security, and...

An Analysis of Cell Phone Technology, Security, and Individual Rights In this technology driven era, I question what effect cell phones are having on our lives as American citizens? To investigate this, I read two articles. The first reading was â€Å"Mobile Phone Tracking Scrutinized† by Nikki Swartz originally published in the Information Management Journal for March/April 2006, and the second reading was â€Å"Reach out and Track Someone† by Terry J. Allen, originally published by In These Times on May 15, 2006. In her article, Swartz questions the legality of using a cell phone’s GPS system as a tracking device in situations when crimes are involved. She argues the potential violation of Fourth Amendment rights and describes loopholes our†¦show more content†¦She is concerned about defining the line where obtaining the data becomes relevant and material to the ongoing investigation in comparison to just probable cause. In contrast, Allen’s passion is to protect citizen’s privacy. She is eager to blame c apitalism of the telecom companies. Allen presents a good argument about a case when a young woman was murdered and the cell phone tracking record of the suspect’s activities on the night of the murder, led to his arrest, not an actual call. She also has difficulty with the Justice Department warrantless wiretapping because getting a search warrant can mean dangerous delays (p1). Her concern is that the government can track a cell phone anywhere, even if not during an actual call. Swartz and Allen both question how much information cell phone companies should store. Swartz seems to appear more accepting of its use where Allen fears the location information can be released easily, possible without regard to privacy. I find Allen’s view almost entirely negative. She is upset the average consumer is unaware the telecommunications companies unjustly share information with the government. When information is stored by email on a cell phone, more than just a personâ€℠¢s whereabouts can be traced. Allen doesn’t mention any cases where cell phone tracking data was used to prevent harmShow MoreRelatedThe Value Of Digital Privacy In An Information Technology Age1799 Words   |  7 Pagesan Information Technology Age Introduction Individual citizens rights to digital privacy continue to be to challenged by the increasing need for national security one the one hand, and the increasing digital vigilance many companies are putting into place to protect themselves while learning more about their customers. These factors are a volatile catalyst that continues to change the ethical, legal and personal landscape rights of digital privacy in the information technology age. The depthRead MoreThe Concept Of Data Security1630 Words   |  7 PagesIntroduction The concept of data security is not new to anyone. It refers to those technologies which have been discovered so as to keep the important data safe and out of reach from anyone undesirable. This has been done so as to keep the data safe from any intruders who could get into the computer system through hacking. As a result of advancements in the field of information technology, most data is kept on devices or in the clouds. With the help of such techniques, any unauthorized person couldRead MoreThe Implementation of Technologies in Relation to Social Control – Surveillance Camera and the Big900 Words   |  4 PagesThe Implementation of Technologies in Relation to Social Control – Surveillance Camera and the Big Brother Society. The New Media and the Loss of Privacy. Media technologies were embraced by people as the means of easing their lives. However, if one does not know or take measures to use this technology properly, then one risks his life being abused by technology (Doyle, 2010, p. 4). Have you noticed that you regularly receive targeted ads as they offer you goods and services you used to surf forRead MoreThe Concept Of Data Security1601 Words   |  7 PagesIntroduction The concept of data security is not new to anyone. It refers to those technologies which have been discovered so as to keep the important data safe and out of reach from anyone undesirable. This has been done so as to keep the data safe from any intruders who could get into the computer system through hacking. As a result of advancements in the field of information technology, most data is kept on desktops or in the clouds. With the help of such techniques, any unauthorized person couldRead MoreGlobal Positioning Systems Gps On Cell Phones1703 Words   |  7 Pages The GPS technology allows the locations of users to be determined accurately and there are many advantages to allow GPS tracking systems on cell phones such as finding friends, family members, maps and places to visit. Furthermore, cell phone GPS have proven useful in saving lives during emergencies. In this matter, it is important to mention that the United States of America Federal Communications Commission have made a E-911 application and E112 in Europe which requires cell phone companiesRead MoreHow Much Radiation Levels Of Millerem The Public1704 Words   |  7 Pagesmillerem the public consumes on a daily basis and how much is safe or not to the point where an individual can get radiation poisoning. We will be analyzing at how much daily activities does per year by simple task such as getting an X-ray three times a year or heating food in a microwave. And we will be looking at how many people are constantly with their phone because some even tend to sleep with their phone right next to them due to needing an alarm clock. Our team is dedicated to expand knowledge toRead MoreThe Value of Digital Privacy in the Information Technology Age1283 Words   |  5 PagesAnalysis and Insights On The Value of Digital Privacy In the Information Technology Age Introduction The need for ensuring the security of nations and enterprises on the one hand and the need for protecting the privacy of individuals on the other, are creating a myriad of conflicts regarding ethics, laws and personal rights. Never before in the history of modern society has there been such a strong emphasis on capturing, analyzing, categorizing and using personal data that had been highly protectedRead More Computers and Homeland Security Essay735 Words   |  3 PagesComputers and Homeland Security After the terrorist attacks on September 11, 2001 security became a major concern for citizens and of course lawmakers. Unsure of what could happen next we were all afraid. Homeland Security encompasses policies, laws, organizations, and procedures designed to protect the rights and freedoms inherent in the US Constitution. Homeland defense which is sometime interchanged with Homeland Security deals with extra-territorial threats and preemptive operationsRead MoreNew Product Launch Marketing Plan Essay1187 Words   |  5 PagesExecutive Summary Apple, the iconic technology company, has continuously captured the cell phone market with its new and innovative features, products, and services. This iconic brand status has allowed them to maintain higher prices for the higher-quality products. However, the competition is quickly able to copy and then enhance new technological innovations, and is doing it at less-expensive prices than Apple. This has caused a shift in the cell phone market, and Apple is losing share. ThisRead MoreShanzhai1496 Words   |  6 Pagesï » ¿Shanzhai (â€Å"Bandit†) Mobile Phone Companies: The Guerrilla Warfare of Product development and Supply Chain Management. By: John Rediehs, Malini Seelan, Rama Paidi 1 Table of Contents Introduction Page. 2 Case Analysis Page. 2 Suggestion/Implementations Page. 4 Conclusion Page. 5 References Page. 6 2 Introduction Shanzhai (â€Å"Bandit Cell Phone†) is shaping the entire thought process of development, marketing, and technology in the largest c ell phone market in the world. A market that has long been dominated

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.