73 Using WhatsApp messenger The study was carried out to determine whether smartphone users who used WhatsApp chat knew and understood the applications security threats concerning their readiness chat with persons who are not recorded in their list of contact. The results of the interview showed that 80 percent of the participants did not chat with strangers or people who were not listed in their contacts and 65 percent stating that they did not store their WhatsApp dialogs because they think their discussions were not of any importance. Many participants reckoned that the application was safe to use. Only a small proportion disagreed. To test their security awareness, the participants were interrogated on whether they knew their data was …show more content…
Thirty percent of the participants indicated ever losing a smartphone while thirty five percent admitted having used applications to lock their phones. Additionally, about half of the interviewees mentioned they that they did not believe anyone could access their smartphone and data if they were locked. Some of the participants attested to experiencing data loss due to theft and a larger percentage of 70 stating they had experience smartphone damage during loss. Moreover, when they were asked about what their greatest worry would be should they lose their smartphone, some indicated they were not even sure there were consequences while others thought their personal photos was what they were concerned about the most. 3.76 Sensitivity of stored data Quite a few questions were asked mainly to identify how sensitive and the kind of information that are stored in participants’ smartphones. The results showed that forty percent of our interviewees were concerned about attackers accessing their smartphones for their pictures. It also indicated that participants sent pictures on their WhatsApp application without any concerns about the security implications. Only twenty percent admitted having backups of their data while a lot more about seventy percent really cared about systematic backups of their data. 3.77 Wireless (Wi-Fi) networks The research found out
According to a recent study by the Pew Research Center, nearly two-thirds of the United States adults own a smartphone, which is up from 35% in 2011 (Anderson and Posts). As the acceptance of smartphones expand, many question whether it will have an adverse impact on our lives. Author Nicholas Carr indirectly criticizes the use of a smartphone; however, smartphones, such as Apple’s iPhone can have both positive and negative impacts on a population.
“More than three billion people worldwide now use the internet (Time), and 80 percent of them access if from their smartphones” (Smart Insights). A smartphone is a mobile phone that performs many of the functions of a computer, typically having a touchscreen interface, and much more. There is an abundant amount of smartphone brands out there in the world and while they all cost different prices, they all perform the same job. Each person uses their smartphone for various reasons, whether it’s for work or to make calls or texts. Smartphones have changed society in various ways, both good and bad. Although countless individuals think that smartphones have ruined American society, smartphones have actually benefited society because of more safety precautions, information on hand, and entertainment.
Smartphones and tablets are both widely used by more than half of the population worldwide. They deliver speed, convenience, resourcefulness, and enjoyment through the millions of applications that anyone with basic or advanced programming knowledge can make. These applications are available through the IOS and Android markets. Although smartphone and tablet applications provide individuals with information, useful services and entertainment such as maps, Facebook, and even music players such as Pandora, they can also invade an individual’s privacy. Some researchers warn that there are actually a high percentage of smartphone applications that may threaten privacy. Every application must go through compliance requirements and it can be said that most people will not install and/or download any application that they don’t and/or wouldn’t trust. One of the largest concerns for application privacy is the ability for the device to gather personal information on the owner of the device and even additional information from the contact list. Some applications are believed to gather information such as phone numbers and even web habits. The smartphone and tablet alike have changed the way people communicate, work, and find their way through the world, carrying with them what could possibly be the latest tracking device.
“Furthermore, 15 percent of those surveyed said the iPhone was turning them into a media addict; 30 percent called it a "doorway into the world"; 25 percent found the phone "dangerously alluring" and 41 percent said losing their iPhone would be "a tragedy." (Citied by Dan Hope, TechNewsDaily 2010).
Over the last four decades, mobile devices have become the trademark of our society.cell phones and other mobile devices have inundated our society At any given time; we can see drivers talking or texting in a moving vehicle. According to Brenner (2013), 87% of American adults and 78% of teenagers own a cell phone. The scary part is that almost two-thirds of
The Personal Integrity that is considered to relate to the information posed by Smartphone, can have many reference selections
Performing everyday tasks have become much simpler here in the 21st century. With advances in technology making it possible to live such easy lives, the world is now at humanities fingertips. People can now keep their entire lives with them in their pockets in the form of a cell phone; but due to the fact that technology is so new and advanced, no one has been able to deal with the major issues of having this luxury, such as privacy violations of personal information and who should be allowed to access this information when in a time of need. In recent news, the FBI has filed a court case against one of the largest technological companies, Apple, for not allowing them access into a phone to further an investigation. This case has asked more
“Your new phone, like your old one, will become your constant companion and trusty factotum.” In “How Smartphones Hijack Our Minds”, Nicholas Carr convinces readers that smartphones have taken over the way we think. By including various studies, proven facts and insightful word choice. Carr uses statistics, evidence and detail to persuade his readers that smartphones are taking over our mind, “the smartphone has become a repository of the self.” Carr uses statistics by mentioning multiple studies, such as a 2015 Gallup survey, “more than half of iPhone owners said that they couldn’t imagine life without the device,” similar to imagining life without a brain.
In today’s times, the smartphone is important to communicate. Having a smartphone could mean a matter of survival – particularly when traveling abroad, searching for directions, updating reports for work, connecting with friends, family and etc. The product I pick is the iPhone. When the iPhone was launched it rocks the world of every person. The appearances of the iPhone to Americans become a trend in smartphone history. The first smartphone to become a choice set of being sleek and user friendly. The iPhone affects Americans psychologically of having the idea how convenient to surf the internet using a portable device. Therefore, the iPhone became a personal handheld computer device to have easy access to browse the internet. Moreover, consumers
From my point of view, everyone has to be aware of any security breaches, issues with system logging as each time that happens someone may gain more and more information about you. We also have to think about what applications we are using do they have a license, is the application going to hack your phone?!... we all need to keep our information as safe as possible and away from hackers and fraudsters, therefore, applications should be made very carefully if they need to use the person’s data to find out daily activity of the person’s.
Everyday, our smartphones are becoming more and more part of our dress code. In America, over sixty-eight percent of the United States population owns some type of smartphone. The average American uses about 2 gigabytes of data each month. Also, the average
Nowadays, technology is speeding our way of communication and the way in which we handle our personal lives. Zdziarski (2008) described, “How the iPhone has quickly become a market leader in technology and has been a big success around the world” (preface.iX). The iPhone has become a very useful tool in many aspects of people lives. However, people should be aware that this device can store a great amount of data in its memory and that if you ever lost or had it stolen all off your personal and professional information can be available to whoever has it in their hand.
Thesis; Along with the efficiency mobile devices render, come along its risks, in which raises substantial security and privacy concerns. It’s important to be aware of the possible threats a mobile can have, along with knowing what and how to secure information, as well as trying to prevent threats from happening.
Smartphones have become an ubiquitous item across the globe and with them a ubiquitous societal problem. Since the introduction of the first smartphone in 2007, the world has changed for better and for worse. Never before had information been able to spread so quickly and easily. Since the smartphone’s genesis, the accessibility to information, communication and smartphones themselves have only been innovated upon to make the world wide network we have today. As technology increases and the competition between manufacturers escalates, more and more people obtain a smartphone. There are advantages to the globalisation that smartphones have achieved, though it is not all for the better. The explicitly observable drawbacks to the use of smartphones have proven them to be a hindrance to the wellbeing of society.
Cell phone privacy is defiantly a problem. (“Cell phone data latest threat to privacy” page 1 of 1) Many people are having issues with it, it is getting out of control. I myself have had some difficulties keeping the information on my phone private and to myself. There are multiple different cases of cell phone privacy invasions. Cases can be as small as a friend reading your personal texts, (“Cell phones and the Expectation of Privacy” page 1 of 1) others can be as severe as someone turning on your microphone and listening to every word that comes out of your mouth. Obviously there are some other issues going on with phones, sometimes it can be preventable.