Premium Essay

Mobile Technology and Privacy

In: Other Topics

Submitted By sreeranjani
Words 7224
Pages 29
Privacy and Culture: Comparative study of privacy issues with respect to mobile technology in India and America
Sreeranjani K Pattabiraman

Abstract
The past decade has witnessed a huge shift in the development of mobile technology which has led to privacy issues, murmurings of which started surfacing only in recent years. A lot of research has been carried out by academicians on mobile technology and its impact on society. There have also been comparative studies on how privacy has changed for people over the years with the boom of social networking sites and smart phones. But, there has not been a substantial study or analysis conducted on how people's privacy has been directly affected by the ever-increasing population boom of mobile-phone users.
This comparative study analyzes the concept of privacy with respect to mobile surveillance and draws upon prior work in the field of mobile surveillance, ranging from popular press on government surveillance in India and USA and case studies in these two countries related to people’s view on privacy, to the works of ACLU (American Civil Liberty Union) in USA and Stop CMS (Central Monitoring System) in India. The study is built around the analysis and comparison of the issue of mobile surveillance in both the countries, how people dealt with this, and the role of culture in determining people’s view on privacy. It also proposes suggestions for how future research can be carried out in the field of mobile surveillance.
Keywords
Privacy, surveillance, culture, mobile technology, society, ACLU, CMS
Introduction
The widespread use of mobile phones in the past decades have led to various developments in the field of communication. There has been a lot of positive development in the field of communication in both developing and developed countries. But, at the same time there has also been negative impacts too. The...

Similar Documents

Free Essay

Moblie Phones

...Mobile technology should be banned in classrooms. Discuss In recent years, technology has developed rapidly and in most countries classrooms have been computerized hence making studying more eventful. Mobile technology is the technology used for communication and these technology devices are portable such as laptops, mobile phones and tablets. This essay will discuss the advantages and disadvantages brought by the use of mobile technology in the classroom by arguing on one hand that it is beneficial to use mobile technology in classrooms since students can prepare for the future and Shared access to files with learners, but on the other hand mobile technology will be a distraction in a classroom because these mobile devices can be a distraction and privacy issues. To begin with, the future is about access, anywhere learning and collaboration, both locally and globally. Teaching and learning is going to be social. Schools of the future could have a traditional cohort of learners, as well as online for learners living across the country or the world also since most businesses and households will be operating with modern technology and in the future which makes the lifestyle of students, families, employees and employers tranquil. Therefore using modern technology to aid education would be beneficial for learners to prepare for the future. However mobile technology can be a distraction in a classroom because these technologies can access various types of applications......

Words: 605 - Pages: 3

Free Essay

Mobile Computing

...Mobile Technology and Social Networking in the Health Sector Introduction Rapid technological advances have brought about a new twist of operation in the health segment. Mobile computing devices and other portable devices such as iPods and iPads have redefined the relationship between computers and human beings. These technological advances signify substantial evidence of departure from computational paradigms, which necessitated users to explicitly interact with computing systems to achieve the expected results. The health sector is also demonstrating its pursuit to be in tandem with the changing technology. By using advanced methods, which are not substitutes, but techniques to improve monitoring of patients health, the sector has demonstrated the efficiency of the use of technology to monitor patients’ status even while at home. This global integration of operations from different applications enables data sharing, via image, and voice outputs. According to Magal and Word (2011), patient monitoring is indispensable to any health facility. Several departments are equipped with electrical and computing devices that facilitate the monitoring of patient status. Not only are these facilities meant for use in the health centers, but also, technology has opened up other platforms through which patients can share their experiences with other patients of similar conditions, and monitor their health progress without the need of visiting health centers physically. Comparison of......

Words: 1570 - Pages: 7

Premium Essay

12211

...E-commerce 2014 business. technology. society. tenth edition Global Edition Chapter 1 Introduction to E-Commerce Kenneth C. Laudon Carol Guercio Traver Copyright © 2014 Pearson Education Copyright © 2014 Pearson Education Class Discussion Puma Loves Social, Mobile, Omni How effective do you think Puma’s Web site is as a retail e-commerce site? How does Puma use social media to support its business? How does what it does on its Facebook page differ from what it does on its Twitter page and YouTube channel, and vice versa? E-commerce Trends 2013–2014 Expansion of social, local, and mobile e-commerce Mobile platform begins to rival PC platform Continued growth of cloud computing Explosive growth in “Big Data” E-books gain wide acceptance Continued growth of user-generated content Copyright © 2014 Pearson Education Copyright © 2014 Pearson Education 1 The First 30 Seconds First 17 years of e-commerce Just the beginning Rapid growth and change What Is E-commerce? Use of Internet and Web to transact business More formally: Digitally enabled commercial transactions between and among organizations and individuals Technologies continue to evolve at exponential rates Disruptive business change New opportunities Copyright © 2014 Pearson Education Copyright © 2014 Pearson Education E-commerce vs. E-business E-business: Digital enabling of transactions and processes within a firm, involving information systems under firm’s control...

Words: 1107 - Pages: 5

Free Essay

Privacy and Technolgy

...People’s pace of life is increasingly fast. Numerous people depend on modern technology for work and entertainment because it is more efficient. For instance, Facebook is the most popular social network website in the world, but use of Facebook is becoming a controversial issue as it has potential hazards that threaten users’ privacy. Facebook is a great innovation since it makes people easily contact friends and families, but when users upload their personal information on profile pages, their privacy may be confirmed by strangers. Nevertheless, some people believe that users’ privacy can be protected with technological tools. Although some technology experts claim that companies can protect users’ personal information, modern technology is an invasion of privacy. Using modern technology allows other people to track users’ movements, so it invades people’s privacy. GPS devices can reveal users’ physical location information to others. Leah Yamshon, the author of “Mobile Apps Can Compromise Your Privacy” suggests that if people use GPS technology without sufficient understanding of the system, their movements may be easily tracked by other people (par. 1). Using GPS devices without controlling data transition processes may let other people easily know users’ location, yet most consumers do not know how to control data transition processes. Dishonest people can also steal users’ location information though smart phone applications. Patrick Leahy, the chairman of Senate......

Words: 1368 - Pages: 6

Premium Essay

Impact of Technologies on Teenagers

...The Impact of Technologies on Teenagers An Assignment Submitted by Name of Student Name of Establishment Class XXXX, Section XXXX, Spring 2013 Nowadays, information technologies play a significant role in the modern world. Information technologies have a long history. Some technologies were created a few years ago, while some technologies are comparatively new. Technologies have penetrated all spheres of human activities: education, politics, trade, medicine, and this list can be prolonged. Television and phones are considered to be the primary technologies which appeared in the life of human beings. New technologies were produces in great amounts. Nonetheless, people used those technologies to simplify the process of fulfilling domestic duties. T. K. Derry et. al. mentioned that “domestic housing, though it followed on the whole traditional forms, made use of new materials and new techniques of mass production” (Derry et. al., 1961, p. 403). With further development of information technologies, many other technologies appeared. The main of them are the following ones: iPhones, iPads, and many others. Technologies have produced a great impact on teenagers: phones, television, Internet, and video games have many advantages and disadvantages; they are able to make people technologically informed, but they produce a negative impact on people’s health simultaneously. The invention of mobile phones has produced a great impact on people all over the world:...

Words: 1700 - Pages: 7

Premium Essay

Strayer Cis500

...MOBILE COMPUTING ANS SOCIAL NETWORKING Mobile Computing and Social Networking CIS 500-Information Technology for Management Professor Clifton Howell February 23, 2014 Mobile Computing and Social Networking U S Healthcare costs have been on the rise for over 50 years, and have increased at an alarming rate of 2-3 times the norm within the past six years. This is one profession where mobile computing has had a substantial impact, and this paper will compare and contrast the monitoring of patient vital signs using mobile computing technology to in-patient visits to doctors’ offices or hospitals; it will analyze the advantages and disadvantages of using mobile computing technology to monitor patients; assess the security concerns with regard to the transmission of personal medical information over wireless networks; and assess the use of social networking for group support for patients with similar medical concerns. Mobile Computing and Social Networking In today’s society, emerging developments in technology have greatly impacted the healthcare industry, especially when it comes to patient care and the monitoring of their vitals. Traditionally, patients communicate their health concerns to their physicians, who in turn schedule an appointment and conduct a series of tests and relay the results to the patient. When the tests dictate the need to monitor a patient’s vital signs, due to resultant findings, the patient is required to check in to a local......

Words: 1099 - Pages: 5

Premium Essay

Managing Business and Information Technology

...Name: Yip Wing Tak Student ID: 13032581D Department: LMSS Introduction With the advancement of technology, location-based commerce is gaining in popularities among companies and one of the newest trends is to use location-based advertising which could more precisely to target the potential customers. Location-based advertising is a newly emerging form of advertising which integrates mobile advertising with location-based services. Using this technology, customers locations could be pinpointed and location-specific advertisements could be sent to their mobile devises. According to Emarker (2014), the number of smartphone users in the world have surpassed 1 billion in 2012 and totaled 1.75 billion in 2014. It is also expected that the adoption of smartphone will continue on a fast-paced trajectory through 2014. As more and more people in the globe are using smartphone in this time and age, companies are grabbing chance to penetrate into the location-based advertising so to increase the chance to hit the right potential customers. Source: http://www.emarketer.com/Article/Smartphone-Users-Worldwide-Will-Total-175-Billion-2014/1010536 How location-based advertising works? Location-based advertising is divided into 2 types, which is the opt-in and opt-out approach. For the Opt-out advertising, it refers to a not requested service which allows companies to target customers until they no longer want to advertisement to be sent to them. (Aaron,Strout, 2011) This is...

Words: 1386 - Pages: 6

Premium Essay

Employee Monitoring

...Employee Monitoring: Employer Safeguard or Invasion of Privacy? Sarah L. Voorhees Employee privacy has been a controversial topic especially with the rise in internet usage, the popularity of social media increasing, and the addition of GPS to mobile devices. With these advances in technology there are numerous ways for employers to monitor their employees’ time at work. According to Evans (2007) as many as eighty percent of the employers, who employ twenty percent of the American population, monitor employees’ telephone conversations, e-mails, and voicemails. Global Positioning Systems (GPS) technology has made tracking the whereabouts of employees easier rather than tracking only information passed between employees and other individuals. The United States does offer privacy laws to help safeguard employees’ expectations of privacy; however, the laws are formatted around the physical realm such as desk drawers or an employee’s home, not an employee’s computer files or even social networking site (Riego, Abril, & Levin, 2012). It has become apparent that social media is here to stay. Social networking sites such as Facebook and Twitter have changed how people communicate in their daily lives and even how organizations do business. Employers have begun using social networking sites not only to market themselves but also as a human resource tool, making themselves accessible to potential customers and employees alike. Some of the ways employers have begun utilizing......

Words: 1661 - Pages: 7

Premium Essay

Mobile Technology

...Today Mobile Technology is one of the most widely used technologies in the United States. This consists of all types of portable technology such as cell phones, laptops, iPad, etc. . Being confine to specific place to conduct business is a thing of the past. Business now can be done on the go, with faster communication, flexibility and availability right at your fingertips. The benefits of Mobile Technology are beyond recognition. The way one lives, breathes and thinks is centered on Mobile Technology. So, if one wants to know what the future could hold for Mobile Technology, below are some hints: * Faster shopping service * Automated check list generator * Insurance Claims on the go * Information on the go * Automatic filtering service * Real life automated video/recording service * Automatic turn off/on service * Automatic order service Today’s society is all about the three c’s communication, connection and convenience and Mobile Technology provides that in spades. From young to old almost everyone has at least a cell phone, laptop, iPad or something of the sort. Mobile Technology is at the top of its game and this paper will explore what we could be seeing in the next coming weeks, months, or years. The Future of Mobile Technology Mobile Technology has become the way one lives, breathes and thinks. Look around there’s very few people without at least a cell phone, laptop, iPad or something of the sort. The benefit of Mobile......

Words: 1398 - Pages: 6

Premium Essay

Employee Monitioring

...Running head: EMPLOYEE MONITORING 1 Employee Monitoring: Employer Safeguard or Invasion of Privacy? Sarah L. Voorhees EMPLOYEE MONITORING Employee Monitoring: Employer Safeguard or Invasion of Privacy? Employee privacy has been a controversial topic especially with the rise in internet usage, the popularity of social media increasing, and the addition of GPS to mobile devices. With these advances in technology there are numerous ways for employers to monitor their employees’ time at work. According to Evans (2007) as many as eighty percent of the employers, who employ twenty percent of the American population, monitor employees’ telephone conversations, emails, and voicemails. Global Positioning Systems (GPS) technology has made tracking the whereabouts of employees easier rather than tracking only information passed between employees and other individuals. The United States does offer privacy laws to help safeguard employees’ expectations of privacy; however, the laws are formatted around the physical realm such as desk drawers or an employee’s home, not an employee’s computer files or even social networking site (Riego, Abril, & Levin, 2012). It has become apparent that social media is here to stay. Social networking sites such as Facebook and Twitter have changed how people communicate in their daily lives and even how organizations do business. Employers have begun using social networking sites not only to market themselves but also as a human resource tool,......

Words: 1694 - Pages: 7

Premium Essay

Mobile Computing and Social Networks

...Assignment 3: Mobile Computing and Social Networking CIS 500 November 24, 2013 Introduction The U.S. market for advanced patient monitoring systems has grown from $3.9 billion in 2007 to $8.9 billion in 2011 and is forecast to reach $20.9 billion by 2016, according to a study by Kalorama Information. Efforts to reduce costs in healthcare, avoid emergency room overcrowding, and prepare for a growing number of elderly patients in the years to come are a few of the drivers for the adoption of these systems. (Remote Patient Monitoring, 2012) Compare and contrast monitoring of patient vital signs using mobile computing technology to in-patient visits to the doctor’s office or hospital. Advances in remote patient monitoring include new peripherals, real-time audio and video for "face-to-face" interaction between clinicians and patients, and devices that are expected to transmit data to a physician's EMR system. The use of smart phones and broadband-enabled devises has allowed patients to do their own monitoring of vital signs and body functions and upload them to their medical provider’s clinical servers. For example, a glucose monitor that can also track a patient's blood pressure, another trend is the increasing use of patient monitoring systems that come with data processing applications and equipment that use algorithms to evaluate monitoring measurements for a patient's specific condition. (Remote Patient Monitoring, 2012)   Hospitals and physician’s offices are...

Words: 1468 - Pages: 6

Premium Essay

Communication

...communicate with one another much different than how our parents used to communicate with one another. The critical forms of communication I will be focusing on are cell phones and social networking. An analysis of this emergence in communication technology reveals that while communication in our generation is much different and more advanced than it was in our parents’ generation, it is a positive change overall. The first form of communication I will be analyzing is the telephone. I will give a short history of this device. The telephone was invented by Alexander Graham Bell in 1876 using a bar magnet, a coil of fine wire, and a thin metal disk. Over time, this device was perfected and features such as the telephone dial were invented. This allowed each phone to be assigned a unique telephone number, or address. Nowadays, the dial has been replaced by a tone telephone, making phones much more advanced. You can see these advances for yourself in modern mobile phones, such as iPhones and Androids. The first mobile phone call was made in 1946 using the Bell System’s Mobile Telephone Service. Shortly after in 1956, the world’s first partly automatic car phone system was developed in Sweden. Then, in 1973, Motorola began selling mobile phones at $3,995 a piece that...

Words: 1483 - Pages: 6

Free Essay

Communication and Technology

...Communication and Technology Carlos LR CJA 304 September 9, 2013 Michael O'C   Communication and Technology Specialized databases in the criminal justice system According to "History of Fingerprints" (n.d.), in 1901, Sir Edward Henry, an Inspector General of Police in Bengal, India, develops the first system of classifying fingerprints. This system of classifying fingerprints was first adopted as the official system in England, and eventually spread throughout the world. Since then there has been an enormous leap forward on the process used for identifying a person through finger prints. The process went from a lengthy detail examination of a finger print under a magnifying glass; to taking a person finger prints through a Live Scan machine and waiting for the results to return in the matter of seconds. It was not until 1905 that the United States Armed Forces adopted the finger print as a valid form of identification. It was subsequently use by police agencies. By 1980, the first computer database of fingerprints was developed in the United States. It was known as the Automated Fingerprint Identification System, (AFIS). In the present day, there are nearly 70 million cards, or nearly 700 million individual fingerprints entered in AFIS (AFIS. n.d.). Specialized Databases Firefighters, emergency medical services, and law enforcement personnel depend on receiving accurate and prompt information to perform their duties. Radio communications are limited to only......

Words: 985 - Pages: 4

Premium Essay

Mobile Computing

...Mobile Computing and Social Networking Personally speaking, doctor’s visits have has always been dreadful. From having to dedicate a section of my schedule for the visit, to the long waiting times in the lobby, it has always been an inconvenience. These inconveniences are soon to become a thing of the past with the emergence of mobile computing technologies. Mobile computing is user to computer interaction by which device is can be used on the move and is not bound to a stationary location by wires. Mobile computing involves mobile communication, mobile hardware, and mobile software (Sweet, 2010). This rising technology’s biggest impact can be seen in today’s healthcare infrastructure. This technology allows a user to track and retrieve their health stats on demand. Doctors now have the ability to retrieve these same stats from medical databases created to store their patients’ records. In today’s fast paced world, everything is accessible on demand usually through mobile devices. This trend is also very prevalent in health care. People can now track their vitals, such as blood pressure, blood glucose levels, oxygen levels, and heart rate all from the convenience of their wireless or mobile devices. When comparing mobile computing and in patient visits, the most obvious difference between the two is how convenient mobile computing has made monitoring patient vitals. No longer have patients had to be on-site for doctors to view how well they are doing. In the past it could...

Words: 1018 - Pages: 5

Premium Essay

Privacy vs National Security

...Privacy Rights The privacy of the individual is the most important right. Without privacy, the democratic system that we know would not exist. Privacy is one of the fundamental values on which our country was founded. There are exceptions to privacy rights that are created by the need for defense and security. When our country was founded, privacy was not an issue. The villages then were small and close. Most people knew their neighbors and what was going on in the community. They did not have drunk drivers, terrorist, or any other threat of changing the way they lived. The transportation that most people had access to were horses. Today there are autos that can be fatal if not controlled. Speed limits and licenses are two examples. The government we have in place maintains and organizes our society. The elements of control are often viewed as violations of privacy. These elements are meant to protect us from irresponsible people and from hurting themselves. The laws that are in place still give privacy without invading personal lives. Privacy is only violated when people feel they are being violated. Jonathan Franzen writes this example of his feelings about privacy. “One of my neighbors in the apartment building across the street spends a lot of time at her mirror examining her pores, and I can see her doing it, just as she can undoubtedly see me sometimes. But our respective privacies remain intact as long as neither of us feels seen.” If......

Words: 637 - Pages: 3