Advertisement

Mobile Systems and Their Intractable Social, Ethical and Security Issues

  • Joseph Migga Kizza
Chapter
Part of the Texts in Computer Science book series (TCS)

Abstract

This chapter begins by presenting rather a frightening and quickly evolving mobile telecommunication and computing technologies; their unprecedented global reach and inclusion; unparalleled social, financial, and cultural prowess; and the yet to be defined social, moral, and ethical value systems. We discuss the crucial role of the mobile operating system and survey the current mobile devises and their anchoring mobile operating systems. The discussion then settles on the main themes of the book, that is, the ethical and security issues in the mobile ecosystem. We discuss the troubling issue of the mobile ecosystem, the location-based tracking system (LTS). This technology, in three types, is troubling because it is being used by merchants, law enforcement agencies and almost everyone else who needs to know where you and your smart electronic device are. We note that while users of smart devices may not be aware, these technologies have huge ethical and privacy implications. In our discussion, we focus on the security and threat to individual privacy, for even in public places individuals deserve some privacy, resulting from the collection, aggregation, and centralization of personal information, without user consent of the user and also in the absence of applicable laws. On security issues in the ecosystem, we note that mobile devices are increasingly holding and storing more private data like personal and business and they are roaming in public spaces on public networks with limited security and cryptographic protocols to protect the data. Also because of the fact that these devices have the ability to roam on several networks, there is a wider sphere of attack beset by geographical, legal, and moral differences. We note that the penetration trend of these smart mobile devices is not limited to faraway rural places but more scaring is their rapid penetration on enterprise IT spaces where security is paramount for any device.

Keywords

Global Position System Mobile Device Online Social Network Window Phone Mobile Operating System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
  2. 2.
    Everything you need to know about each mobile OS (operating system)—parts1–4. http://www.fusedblog.com/everything-you-need-to-know-about-each-mobile-os-operating-system-part-1-of-4-series-40-symbian/
  3. 3.
    Komisky M Mobile device security II: handheld operating systems. Bluefire. http://www.datamation.com/mowi/article.php/3575316/Mobile-Device-Security-II-Handheld-Operating-Systems.htm
  4. 4.
    Richard D Why android is so popular? http://ezinearticles.com/?Why-Android-Is-So-Popular?&id=7011641Google Scholar
  5. 5.
  6. 6.
    Wang JL, Loui MC Privacy and ethical issues in location-based tracking systems. http://students.cse.unt.edu/∼ry0049/LP3.pdf
  7. 7.
    How radio frequency identification tags will help retailers, from supply chains to store shelves. MIT Technology Review, March 2004 [Online]. Available: http://www.technologyreview.com/computing/13509/. Accessed 2 Oct 2008
  8. 8.
    Hoh B, Gruteser M, Xiong H, Alrabady A (2006) Enhancing security and privacy in traffic-monitoring systems. IEEE Pervas Comput 5(4):38–46CrossRefGoogle Scholar
  9. 9.
  10. 10.
    Lin D, Loui MC (June 1998) Taking the byte out of cookies: privacy, consent, and the Web. Comput Soc 28(2):39–51Google Scholar
  11. 11.
    Rachels J (1995) Why privacy is important. In: Johnson DG, Nissenbaum H (eds) Computers, ethics & social values. Prentice Hall, Upper Saddle River, pp 351–357Google Scholar
  12. 12.
  13. 13.
  14. 14.
  15. 15.
  16. 16.
    Android malware DroidDream how it works. Lookout mobile security blog (2011) http://blog.mylookout.com/2011/03/android-malware-droiddream-how-it-works
  17. 17.
    Types of bluetooth hacks and its security issues. http://hassam.hubpages.com/hub/
  18. 18.
  19. 19.
  20. 20.
  21. 21.
  22. 22.
    Adhikari R Encryption on the go, part 1. TechNewsWorld. http://www.technewsworld.com/story/75245.html
  23. 23.

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  • Joseph Migga Kizza
    • 1
  1. 1.Department of Computer Science and EngineeringUniversity of TennesseeChattanoogaUSA

Personalised recommendations