Friday, April 20, 2012

Adversary of Privacy

By Paul Fray


Mobile phones are an important part of the lives of individuals in many societies around the world. It's the most common method of communication and it has taken on more functions because of technological improvements of the Twenty-first century. It is now able to not only send out text messages but additionally multi multi-media items, such as recordings, video files, pictures, among others. These are contributed, uploaded and also sent to other folks for various purposes. This is by itself fine however in a globalized world of technology wherein cyber crimes are a truth there is a difficulty. A person frequently saves and stores lots of personal information within their mobile. This is not always risk-free.

The digital age has also blessed technology as well as talent that are keen on hacking into gadgets. This means information stored inside them may be accessed, ripped off and illegitimately spread via the messaging network or perhaps the internet. This seriously ignores a person's right to privacy.

This kind of right is out there to protect information on a person which he or she does not want to make public or even would otherwise demean and defame their great name. The problem is when such material in which pertains to one is digitally saved in his or her cell phones and such is actually taken without having their permission or abused after obtaining with authorization.

In can be said that the cell phone is a means by which ones privateness, is limited, reduced and even dropped. It can be also argued that it's the most potent and customary method of undermining a persons privacy. But the same can be stated of any mode of interactions.

Almost every system that facilitates interaction can be quite a target for those who would want to breach the privacy of individuals. Users of today should be very careful to counter this danger. As the mobile phone becomes the key tool associated with interaction, it should be utilized with caution unless one inadvertently reveals his or her privacy to kinds of attack.




About the Author:



No comments:

Post a Comment