Explanation of Solution
“No”, it is neither ethical nor legal to broadcast the phone’s location to other parties or strangers without the consent of the consumer.
Introduction to GPS (Global Positional System):
The Global Positioning System termed as GPS, uses satellites to determine the current physical location.
It was originally created by the U.S. Department of Defense to improve military navigation. It is now available for consumer and used in cars, smartcards, handheld computers, and cell phones.
GPS helps to search a desired location for specific landmarks, such as restaurants and gas stations within a specific radius to current location. It also provides convenient turn-by-turn driving instructions to the destination.
Privacy invasion by smartphones due to location sharing:
This technology brings value to its users. However, it has caused a significant decrease in privacy. A combination of GPS data and cell tower triangulation can reveal the current location of smartphone.
According to the Electronic Frontier Foundation, “Location information collected by cellphone companies can provide an extraordinarily invasive glimpse into the private lives of cellphone users.”
Mobile phone companies have the ability to exploit the information and get an extraordinary insight into the private lives of their mobile customers. Some companies sell this information to other companies with an interest to get personal data, choices and buying patterns.
Unwanted tracing and sharing personal location can lead to fraud, hindrance in social life and several other security concerns for famous personalities and others.
Hackers can break into servers and steal usernames, email addresses, phone numbers and hashed passwords of authorized lawmakers, investigation agents or secure information of national advisors and users.
Mobiles numbers, credit card details, and email addresses can be compromised along with shared location because the companies gather all the data along with location.
Criminal and miscreants can get vital information of users and can abuse the person, mentally and financially. The life of users can also be at stake if data gets leaked to terrorist organizations.
Want to see more full solutions like this?
Chapter 0 Solutions
EBK COMPUTER SCIENCE
- EX:[AE00]=fa50h number of ones =1111 1010 0101 0000 Physical address=4AE00h=4000h*10h+AE00h Mov ax,4000 Mov ds,ax; DS=4000h mov ds,4000 X Mov ax,[AE00] ; ax=[ae00]=FA50h Mov cx,10; 16 bit in decimal Mov bl,0 *: Ror ax,1 Jnc ** Inc bl **:Dec cx Jnz * ;LSB⇒CF Cf=1 ; it jump when CF=0, will not jump when CF=1 HW1: rewrite the above example use another wayarrow_forwardEX2: Write a piece of assembly code that can count the number of ones in word stored at 4AE00harrow_forwardWrite a program that simulates a Magic 8 Ball, which is a fortune-telling toy that displays a random response to a yes or no question. In the student sample programs for this book, you will find a text file named 8_ball_responses.txt. The file contains 12 responses, such as “I don’t think so”, “Yes, of course!”, “I’m not sure”, and so forth. The program should read the responses from the file into a list. It should prompt the user to ask a question, then display one of the responses, randomly selected from the list. The program should repeat until the user is ready to quit. Contents of 8_ball_responses.txt: Yes, of course! Without a doubt, yes. You can count on it. For sure! Ask me later. I'm not sure. I can't tell you right now. I'll tell you after my nap. No way! I don't think so. Without a doubt, no. The answer is clearly NO. (You can access the Computer Science Portal at www.pearsonhighered.com/gaddis.)arrow_forward
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.Computer ScienceISBN:9781337569798Author:ECKERTPublisher:CENGAGE LPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning