Skip to main content
Top

Hint

Swipe to navigate through the chapters of this book

2016 | OriginalPaper | Chapter

12. Elastic Extension Beyond the Traditional Computer Network

Mobile Systems and Their Intractable Social, Ethical, and Security Issues

Author : Joseph Migga Kizza

Published in: Ethics in Computing

Publisher: Springer International Publishing

Abstract

This chapter—Ethical, Privacy and Security Issues in the Mobile Ecosystems begins by presenting rather a frightening and quickly evolving mobile telecommunication and computing technologies, their unprecedented global reach and inclusion, unparalleled social, financial and cultural prowess and the yet to be defined social, moral and ethical value systems. We discuss the crucial role of the mobile operating system and survey the current mobile devises and their anchoring mobile operating systems. The discussion then settles on the main themes of the book, that is the ethical and security issues in the mobile ecosystem. We focus on the most troubling issue of the mobile ecosystem, the location –based tracking system (LTS). This technology, in three types, is troubling because it is being used by merchants, law enforcement agencies and almost everyone else who needs to know where you and your smart electronic device are. We note that while users of smart devices may not be aware, these technologies have huge ethical and privacy implications to users of these devices. In our discussion, we focus on the security and threat to individual privacy, for even in public places individuals deserve some privacy, through the collection, aggregation and centralization of personal information, without user consent of the user, and also on the absence of applicable laws. Use of LTS technologies increases the risks to the privacy and security of individuals. On security issues in the ecosystem, we note that mobile devices are increasingly holding and storing more private data like personal and business and they are roaming in public spaces on public networks with limited security and cryptographic protocols to protect the data. Also because of the fact that these devices have the ability to roam on several networks, there is a wider sphere of attack beset by geographical, legal and moral differences. We note that the penetration trend of these smart mobile devices is not limited to far away rural places but more scaring is their rapid penetration on enterprise IT spaces where security is paramount for any device.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference Hoh B, Gruteser M, Xiong H, Alrabady A (2006) Enhancing security and privacy in traffic monitoring systems. IEEE Pervas Comput 5(4):38–46 CrossRef Hoh B, Gruteser M, Xiong H, Alrabady A (2006) Enhancing security and privacy in traffic monitoring systems. IEEE Pervas Comput 5(4):38–46 CrossRef
6.
go back to reference Lin D, Loui MC (1998) Taking the byte out of cookies: privacy, consent, and the web. Comput Soc 28(2):39–51 CrossRef Lin D, Loui MC (1998) Taking the byte out of cookies: privacy, consent, and the web. Comput Soc 28(2):39–51 CrossRef
7.
go back to reference Rachels J (1995) Why privacy is important. In: Johnson DG, Nissenbaum H (eds) Computers, ethics & social values. Prentice Hall, Upper Saddle River, pp 351–357 Rachels J (1995) Why privacy is important. In: Johnson DG, Nissenbaum H (eds) Computers, ethics & social values. Prentice Hall, Upper Saddle River, pp 351–357
Metadata
Title
Elastic Extension Beyond the Traditional Computer Network
Author
Joseph Migga Kizza
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-29106-2_12

Premium Partner