Pearson eText for Computer Science: An Overview -- Instant Access (Pearson+)
Pearson eText for Computer Science: An Overview -- Instant Access (Pearson+)
13th Edition
ISBN: 9780137503216
Author: Glenn Brookshear, Dennis Brylow
Publisher: PEARSON+
Expert Solution & Answer
Book Icon
Chapter 0, Problem 15SI

Explanation of Solution

“No”, it is neither ethical nor legal to broadcast the phone’s location to other parties or strangers without the consent of the consumer.

Introduction to GPS (Global Positional System):

The Global Positioning System termed as GPS, uses satellites to determine the current physical location.

It was originally created by the U.S. Department of Defense to improve military navigation. It is now available for consumer and used in cars, smartcards, handheld computers, and cell phones.

GPS helps to search a desired location for specific landmarks, such as restaurants and gas stations within a specific radius to current location. It also provides convenient turn-by-turn driving instructions to the destination.

Privacy invasion by smartphones due to location sharing:

This technology brings value to its users. However, it has caused a significant decrease in privacy. A combination of GPS data and cell tower triangulation can reveal the current location of smartphone.

According to the Electronic Frontier Foundation, “Location information collected by cellphone companies can provide an extraordinarily invasive glimpse into the private lives of cellphone users.”

Mobile phone companies have the ability to exploit the information and get an extraordinary insight into the private lives of their mobile customers. Some companies sell this information to other companies with an interest to get personal data, choices and buying patterns.

Unwanted tracing and sharing personal location can lead to fraud, hindrance in social life and several other security concerns for famous personalities and others.

Hackers can break into servers and steal usernames, email addresses, phone numbers and hashed passwords of authorized lawmakers, investigation agents or secure information of national advisors and users.

Mobiles numbers, credit card details, and email addresses can be compromised along with shared location because the companies gather all the data along with location.

Criminal and miscreants can get vital information of users and can abuse the person, mentally and financially. The life of users can also be at stake if data gets leaked to terrorist organizations.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Do you believe that persons who have disabilities benefit from using the internet? Please explain any possible technology that might assist persons with disabilities. Should the source code for assistive technology be made public?
Computer science Today's generations of mobile devices and personal computers are distinguished and linked by their ability to interact wirelessly.
What exactly is a GPS receiver used for, and why are they included into mobile devices like smartphones in the first place?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage