Explanation of Solution
“No”, it is neither ethical nor legal to broadcast the phone’s location to other parties or strangers without the consent of the consumer.
Introduction to GPS (Global Positional System):
The Global Positioning System termed as GPS, uses satellites to determine the current physical location.
It was originally created by the U.S. Department of Defense to improve military navigation. It is now available for consumer and used in cars, smartcards, handheld computers, and cell phones.
GPS helps to search a desired location for specific landmarks, such as restaurants and gas stations within a specific radius to current location. It also provides convenient turn-by-turn driving instructions to the destination.
Privacy invasion by smartphones due to location sharing:
This technology brings value to its users. However, it has caused a significant decrease in privacy. A combination of GPS data and cell tower triangulation can reveal the current location of smartphone.
According to the Electronic Frontier Foundation, “Location information collected by cellphone companies can provide an extraordinarily invasive glimpse into the private lives of cellphone users.”
Mobile phone companies have the ability to exploit the information and get an extraordinary insight into the private lives of their mobile customers. Some companies sell this information to other companies with an interest to get personal data, choices and buying patterns.
Unwanted tracing and sharing personal location can lead to fraud, hindrance in social life and several other security concerns for famous personalities and others.
Hackers can break into servers and steal usernames, email addresses, phone numbers and hashed passwords of authorized lawmakers, investigation agents or secure information of national advisors and users.
Mobiles numbers, credit card details, and email addresses can be compromised along with shared location because the companies gather all the data along with location.
Criminal and miscreants can get vital information of users and can abuse the person, mentally and financially. The life of users can also be at stake if data gets leaked to terrorist organizations.
Want to see more full solutions like this?
Chapter 0 Solutions
Computer Science: An Overview (13th Edition) (What's New in Computer Science)
- Adaptation is a term used to describe changes that are made to computers and phones, such as the internet.arrow_forwardIntelligent terminals can calculate locally.arrow_forwardIn today's world, a large number of individuals use social media. In a professional setting, this technology is applied.arrow_forward
- When we do a search using Google, the search engine quickly returns millions of websites that are related to our query in only one millisecond.arrow_forwardcomputer science- What are the primary motivators for advertisers (particularly those in the tourist and hospitality industries) to adopt digital advertising?arrow_forwardThere is no way to share photos. You want to include pictures of a home that is for sale when you send an email to your real estate partner. Every time the email message is sent, it is denied by an automated response because the files are too large. How do you intend to spend the remainder of the day?arrow_forward
- Internet applications make two types of Internet services available to users. Is there anything distinguishing one of these services from the others?arrow_forwardAn intelligent terminal may be defined as one that has the capacity to do local computations.arrow_forwardcomputer science - The Internet has influenced many aspects of our culture.The Internet has a lot of benefits, but it also has some drawbacks.What are the most major benefits of the Internet, as well as the problems it has caused?arrow_forward
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning