Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Cell phone effects in society research
The major impact of using cellphones
Effects of cell phone use in our society
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Cell phone effects in society research
Whenever we sit in the subway, eat in the restaurants, work in the offices, or study in the classrooms, it seems that we can always see people play around their cell phones. Cell phone is used extraordinary frequently and widely and takes an important role in people’s daily life. The crowd use cell phones to do a bunch of things, such as calling, texting, searching the Internet, taking photos, using GPSs to get directions and so on. Individuals have large demand for those cell phone’s utilities. However, the enormous demand will also bring notable privacy threat to the public. There is a contradiction between cell phone users’ demands and privacy threats as well as the necessity for those users to learn to how to balance the two things. More specifically, people need to learn to balance the contradiction between their snapshots sharing demand and following potential exposure issue; the contradiction between the demand of using GPS service utility and location tracking threat by organizations or companies; even the contradiction between their will of containing criminal activities and the exposure threat of their personal information. The snapshots utility of cell phone can cause privacy issue if people upload their photos from their cell phone albums to the Internet. The use of photo taking utility is very common for camera phone users to record their daily life because cell phone is portable and nearly every cell phone has a camera lens, it enables them to take photos anywhere and anytime. Therefore, people will always hold their cell phones to take photos for catching beautiful and meaningful moments. As a consequence, most people would like to share their photos on the Internet, such as Facebook, Twitter, Instagr... ... middle of paper ... ...e/Public Boundaries.” Knowledge, Technology & Policy Fall 2009: 161-171. Print. “What is GPS?”, “GPS Location Privacy.” Official U.S. Government information about the Global Positioning System. National Coordination Office for Space-Based Positioning, Navigation, and Timing. Feb 11, 2014. Web. April 30, 2014. Reades, Jonathan. “Finite State Machines: Preserving Privacy When Data-Mining Cellular Phone Networks.” Journal of Urban Technology No.1, April 2010: 29-40. Print. “Difference Between a Prepaid Phone and a Phone with a Contract.” Electronics, Cars, Fashion, Collectibles, Coupons and More | eBay. eBay Incorporation. August 20, 2013. Web. April 30, 2014. Gow, Gordon A., and Jennifer Parisi. “Pursuing the Anonymous User: Privacy Rights and Mandatory Registration of Prepaid Mobile Phones.” Bulletin of Science, Technology & Society Feb. 2008: 60-68. Print.
According to Rosen, the main reason why people acquire a cell phone is because of security. After the tragic event that occurred on September 11, 2001 in the United States cell phones started to play an important role in our lives. Rosen states that after this e...
When one looks around in public it is almost impossible not to see someone who is talking, texting, or playing a game on a cell phone. When someone sends a text, the phone company saves it in a data bank where it sits waiting to be u...
Privacy is a complex concept with no universal definition as its meaning changes with society. Invasion of privacy occurs when there is an intrusion upon the reasonable expectation to be left alone. There has been a growing debate about the legitimacy of privacy in public
The personal connection Americans have with their phones, tablets, and computers; and the rising popularity of online shopping and social websites due to the massive influence the social media has on Americans, it is clear why this generation is called the Information Age, also known as Digital Age. With the Internet being a huge part of our lives, more and more personal data is being made available, because of our ever-increasing dependence and use of the Internet on our phones, tablets, and computers. Some corporations such as Google, Amazon, and Facebook; governments, and other third parties have been tracking our internet use and acquiring data in order to provide personalized services and advertisements for consumers. Many American such as Nicholas Carr who wrote the article “Tracking Is an Assault on Liberty, With Real Dangers,” Anil Dagar who wrote the article “Internet, Economy and Privacy,” and Grace Nasri who wrote the article “Why Consumers are Increasingly Willing to Trade Data for Personalization,” believe that the continuing loss of personal privacy may lead us as a society to devalue the concept of privacy and see privacy as outdated and unimportant. Privacy is dead and corporations, governments, and third parties murdered it for their personal gain not for the interest of the public as they claim. There are more disadvantages than advantages on letting corporations, governments, and third parties track and acquire data to personalized services and advertisements for us.
Security versus privacy is becoming a major issue in today’s society. Recently, the National Security Agency has been the victim of scrutiny due to allegations of espionage. Similar claims not only stem from the authority, but also come from the public as well. For example, one is enjoying a night out in a restaurant when a group of teenagers arrives. Before it is noticed, some of the teenagers take photos with a cell phone. The picture encompasses most of the area occupied; therefore, every person in that general area is included in it. A few moments later, one teen uploads that picture to various social media websites to share along with captions stating the current location. Although not a single person gave consent, pictures are being circulated with thousands of strangers in the innumerable realms of the internet. Not only are these pictures all over the web and an invasion of privacy, but people viewing those pictures are able to discover recent whereabouts with the simple click of a button. Due to technology’s rapid advancements, similar acts such as these are becoming nearly inevitable. But, these are the very same advancements that help us live in a free and open society. In order to avoid intrusions yet maintain safety, restrictions should be put upon consumer devices, capabilities of security devices, and government abilities.
Computers, tablets, cellphones and all modern tenchnology has decrease our expectations of privacy in this digital age. People don't care anyone for their privacy, they only want the benefits that modern technology has brought to them. In the essay, “Privacy is Overrated” by David Plotz (2003), argues that it is sometimes good to be open and not be bother by privacy. In Jack Shafer's (2010) essay, “The Invasion of the Cookie Monster” he argues that we are the ones to be blame for the lost of our online privacy. The didgital age has created an extremely big problem of privacy for people.
"Privacy and the Internet: Intrusion, Surveillance and Personal Data." International Review of Law, Computers & Technology Oct. 1996: 219-235.
First of all, what does the government do to secure this private information? The answer is very little. There are bascially two different laws that effect privacy. These two laws are the Privacy Act of 1974 and the Freedom of Information act. At a first inspection the two laws seem to work against each other. In short the Privacy Act of 1974 keeps information in government records concerning individuals discreet. The Privacy Act of 1974 gives the individual the rights to see and copy files that the federal government maintains on him or her. It also gives the right to know who else has access to that information, and to request a change to any information that is not accurate. The most important part of this law is the fact that the government is not allowed to use any information for any purpose other than the one for which it was initially collected. This is important and will be addressed later on.
LeRoux, Yves. "Privacy concerns in the digital world." 03 Oct 2013. Computer Weekly. 24 April 2014 .
Many people in today’s society rely on technology to help us with our daily lives and help us stay connected to family, friends, and other people. The advancements in today’s cell phone technology is very complex and made to be efficient for their owners, allowing them to surf the net and IM message people instantly. Cellphones in particular have developed very fast in the past 15 years. From my childhood, cell phones have evolved from the old school Nokia bricks that allowed texts, calls, and simple graphic games, to todays I-Phones that have higher computable capabilities than some computers. In the United States alone, there is an estimated population of around 297 million people, and 197 million people are subscribed to cell phone companies (Starr). With so many people in today’s society with so much power and opportunity in the palm of their hands, we shouldn’t forget that “With great power comes great responsibility” –Voltaire.
The issue on privacy is extremely controversial in today’s world. As the United States’ use of the internet, a global web of interconnected computer networks, expands, so does its problem with privacy invasion. With the U.S. pushing for new laws governing internet use, citizens are finding their privacy being pulled right from underneath them. Web users are buying and selling personal information online as well as hacking users for more information. One may argue that there is no such thing as privacy on the internet, but privacy is a right among Americans, and should be treated as such.
Staff, Proquest. At Issue: Technology and Privacy. N.p.: ProQuest LLC, 2013. Web. 5 Dec. 2013. .
Snyder, S.. "Google Maps: An Invasion of Privacy?." Time. Time Inc., 12 June 2007. Web. 15 Apr. 2014.
Technology has advanced tremendously over the past decade, and appears to be advancing at a rapid pace each and every day. The social media is growing just as rapidly. Social media is an interaction between individuals that want to exchange information, photographs, and ideas in different types of networks. Social media users include people of all ages. These people have various experiences, have different cultures, and have various technical skills. (Brandtzaeg 1008) The social media depend on net-based technologies to generate the network for users to share. Social media includes everything that has to do with the Internet. By using the Internet, users can communicate with people locally and worldwide. People are no longer required to travel across the world to experience another culture. This can be done with social networking. The types of social media today come with many different types of communication such as social blogs, wall-postings, songs, photographs, and podcasts. The communication between users is informational, interactive, and also educational. However, unfortunately, most social networking sites keep track of all the interactions that take place, and this is a concern about Internet privacy for Facebook, Twitter, Google, and other social media users. Not only do they keep track of all interactions by the users, they also own all the content, including pictures that the users upload. The social network keeps this information on the user, even if the user deactivates their account with that particular site. Most users do not have any idea that the operator of the networking service keeps this information, and has access to all pictures and tags. By not having adequate security...
In a world of Facebook and LinkedIn and YouTube and OKCupid and Google and IPhones and Ipads and Kindles and all the other hundreds of sites and devices designed to garner personal information, data-mine your information, to better advertise, sell, inform, and connect you with the people or the places that you want to experience. The wonderful world of the Internet helps connect millions of people with millions of other people in milliseconds all day, every day. All the swapping and sharing of information create a world of transparency, deception, fraud, and identity confusion. Avatars, aliases, and profiles are the ways most people advertise their goods and services and themselves. With this consideration an erosion of privacy has changed our culture in ways that some predicted years ago and some that are new to our era. This paper will explore some primary regarding how technology causes the changes in privacy and what are the effects brought on by these changes.