Computer Science An Overview Ap Edition
Computer Science An Overview Ap Edition
13th Edition
ISBN: 9780134891729
Author: J. Glenn Brookshear, Dennis Brylow
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 0, Problem 15SI

Explanation of Solution

“No”, it is neither ethical nor legal to broadcast the phone’s location to other parties or strangers without the consent of the consumer.

Introduction to GPS (Global Positional System):

The Global Positioning System termed as GPS, uses satellites to determine the current physical location.

It was originally created by the U.S. Department of Defense to improve military navigation. It is now available for consumer and used in cars, smartcards, handheld computers, and cell phones.

GPS helps to search a desired location for specific landmarks, such as restaurants and gas stations within a specific radius to current location. It also provides convenient turn-by-turn driving instructions to the destination.

Privacy invasion by smartphones due to location sharing:

This technology brings value to its users. However, it has caused a significant decrease in privacy. A combination of GPS data and cell tower triangulation can reveal the current location of smartphone.

According to the Electronic Frontier Foundation, “Location information collected by cellphone companies can provide an extraordinarily invasive glimpse into the private lives of cellphone users.”

Mobile phone companies have the ability to exploit the information and get an extraordinary insight into the private lives of their mobile customers. Some companies sell this information to other companies with an interest to get personal data, choices and buying patterns.

Unwanted tracing and sharing personal location can lead to fraud, hindrance in social life and several other security concerns for famous personalities and others.

Hackers can break into servers and steal usernames, email addresses, phone numbers and hashed passwords of authorized lawmakers, investigation agents or secure information of national advisors and users.

Mobiles numbers, credit card details, and email addresses can be compromised along with shared location because the companies gather all the data along with location.

Criminal and miscreants can get vital information of users and can abuse the person, mentally and financially. The life of users can also be at stake if data gets leaked to terrorist organizations.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Mountain Rescue Teams Climbing mountains is a popular leisure activity in Great Britain that is enjoyed by a very large number of people every year. However, this hobby can be dangerous, especially when participants have not prepared adequately. Every year some people have to be rescued while in the mountains in Great Britain. These rescues are conducted by teams of volunteers affiliated to the Mountaineering Trust. The teams search on foot. They navigate using maps prepared by Ordnance Survey, the official map-making body of the British government. Ordnance Survey maps have grids that allow anywhere in Great Britain to be located to the nearest 100 meters using a grid reference. If necessary, the teams request assistance from the Royal Air Force (RAF), which provides search and rescue helicopters from its bases across Great Britain. The DatabaseThe location, name, and height of every mountain is stored. The location is taken to be the grid reference of the summit and serves as a…
Do you believe that persons who have disabilities benefit from using the internet? Please explain any possible technology that might assist persons with disabilities. Should the source code for assistive technology be made public?
An intelligent terminal is one that can do calculations locally.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage