EBK COMPUTER SCIENCE
EBK COMPUTER SCIENCE
13th Edition
ISBN: 8220106892572
Author: BRYLOW
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 0, Problem 15SI

Explanation of Solution

“No”, it is neither ethical nor legal to broadcast the phone’s location to other parties or strangers without the consent of the consumer.

Introduction to GPS (Global Positional System):

The Global Positioning System termed as GPS, uses satellites to determine the current physical location.

It was originally created by the U.S. Department of Defense to improve military navigation. It is now available for consumer and used in cars, smartcards, handheld computers, and cell phones.

GPS helps to search a desired location for specific landmarks, such as restaurants and gas stations within a specific radius to current location. It also provides convenient turn-by-turn driving instructions to the destination.

Privacy invasion by smartphones due to location sharing:

This technology brings value to its users. However, it has caused a significant decrease in privacy. A combination of GPS data and cell tower triangulation can reveal the current location of smartphone.

According to the Electronic Frontier Foundation, “Location information collected by cellphone companies can provide an extraordinarily invasive glimpse into the private lives of cellphone users.”

Mobile phone companies have the ability to exploit the information and get an extraordinary insight into the private lives of their mobile customers. Some companies sell this information to other companies with an interest to get personal data, choices and buying patterns.

Unwanted tracing and sharing personal location can lead to fraud, hindrance in social life and several other security concerns for famous personalities and others.

Hackers can break into servers and steal usernames, email addresses, phone numbers and hashed passwords of authorized lawmakers, investigation agents or secure information of national advisors and users.

Mobiles numbers, credit card details, and email addresses can be compromised along with shared location because the companies gather all the data along with location.

Criminal and miscreants can get vital information of users and can abuse the person, mentally and financially. The life of users can also be at stake if data gets leaked to terrorist organizations.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
I would like to know about the following concepts: 1. defragmentation 2. disk management 3. hardware RAID
Node.js, Express, and Nunjucks Templates?
CIT244 Program Project 3 Assignment As with any assigned program, do not wait until the last minute to start. Start early in the week the program is due so you can ask questions if you get stuck Node.js and Express and Nunjucks Templates We have gotten to the good stuff. There is a program similar to this assignment given as the last example in the lecture notes for the week that discusses node static files. This program will take more time that previous assignments. There are several examples you should study first, particularly the pizza order example program available in the examples programs folder for the week discussing static files. You should study and run the pizza order program before trying this program. The pseudo-company is called Sun or Fun, which offers cheap flights from Louisville to either Miami or Vegas. Here's a video of how it should work. NOTE: You will hear or see references to Handlebars in this video. We used to use Handlebars, but it will be Nunjucks that we…
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage
Text book image
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning