Take a moment to think about how much time you spend using the Internet each day. Think about your use of social media on a daily basis. Consider the shopping you complete using an online vendor. Think about how and where you use your smartphone or tablet each day.
Discuss the following:
•How much of your personal information and data are collected on a daily basis?
•How often are your data collected on a daily basis?
•What types of personal data are collected, used, and stored on a daily basis?
•What are the personal data used for once they are collected?
•Who knows where you are each day?
•Are we willing to give up certain types of freedom to have more convenience?
•Who is tracking your location data on a daily basis?
•In the aftermath of 9/11 and the changes to laws dealing with GPS on mobile devices, do you feel that Internet service providers (ISPs) should be able to turn on GPS to help find you in a disaster.
Once you have collected a few thoughts about your daily Internet use and your location data, share your thoughts with your peers. Discuss with your peers if you feel that individuals should embrace this new era of data sharing as a reality of a new data-based culture
……………………………………………………………………………………………………
ASSIGNMENT COMPLETED AT https://capitalessaywriting.com
MAKE YOUR ORDER AND GET THE COMPLETED ORDER
Technology: Personal Data
(Course Instructor)
(University Affiliation)
(Student’s Name)
The Risks to Privacy When Using Smartphones
The revolutions in the mobile communications have led to creation of mobile phones that are virtually able to do anything. Smartphones come with various applications, which can be a source of threats to individual privacy (Gralla, Sacco, & Faas, 2011). Many people lose many data due to exposure of their personal data to unsuspecting individuals. The increase in the number of smartphone users has increased the amount of data, leading to an exponential growth in threats and vulnerabilities.
We lose huge amount of data on a daily basis through our Smartphones. Smartphones are filed with numerous applications, such as online shops, social media applications, the location trackers and browsers (Boyles, Smith, & Madden, 2012). Most of these applications expose the smartphone users to data breach. Some of the data that is lost on the daily basis include personal identity, the unique identification number of the mobile device, one’s location, photos, access to contacts and our browser habits. Most of these information are accessed and stored by the applications and are combined by the ad networks to built strong profiles about the smartphone user and sell such data to the marketing companies. Sometimes, hackers in phishing, which often leads to lose of money, use the data that we lose, such as identity and financial data. Most applications have a tracking system, where they are able determine one’s location. In addition, the government security agencies and telecommunication companies store huge amount of data regarding our location on a daily basis. However, I would be willing to give up some of the privacy in return for certain services such as security, which is offered by government security agencies. For instance in the aftermath of the September 9/11 attack, the changes in the laws has made it possible for the internet servic…………………………………….
…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
ASSIGNMENT COMPLETED AT CapitalEssayWriting.com
MAKE YOUR ORDER AND GET THE COMPLETED ORDER