StudentShare solutions
Triangle menu

Why Mobile Phone Conversations Are Never Private - Essay Example

Not dowloaded yet

Extract of sample
Why Mobile Phone Conversations Are Never Private

The privacy of mobile phones for instance, has been a predominant topic in the field of feminist media studies (Baker, 2006, p.1). Through the use of mobile phones, many people have been subjected to unwarranted infringement of personal privacy depending on the gender of the individual and this has led to various studies aimed at investigating how different genders use mobile phones and how the use of these devices has contributed to politically-motivated social history (Hijazi-Omari & Ribak, 2008, p.154). This paper seeks to explore the relationship between the use of mobile phones by teenage girls and the resulting privacy issues. The paper will further focus on the contemporary media practices and how they have influenced different people’s lives depending on their genders. Moreover, the paper will examine the various elements of insecurity applicable in the use of mobile phones and how these pronounce the privacy complexities (Stuart, 2007, p.1). Eavesdroppers, hackers and thieves Despite the conventional privacy belief associated with the use of mobile phones, their use has actually exposed many people to the traps of unintended and self privacy infringing illegal use (Stuart, 2007, p.2). Today, the use of mobile phones has increased to a level that it does not matter where you are or what you are doing but whether your hands are free to hold the handset to your ears for conversation as long as the other person is ready to communicate. The freedom brought by the use of mobile phones has highly influenced the social structures of various communities and even cultures that never used to communicate physically can now access and communicate to the other party devoid of the cultural barriers (McRobbie, 2007, p.720). In this regard, feminist populations in communities that do not allow women to freely mingle with men have been able to freely communicate with their male counterparts without the culturally defined blockages. However, it is imperative to note that the use of mobile phones has also worked to fuel various illegal activities since other people are able to intercept the communication between the users of mobile phones making the communication media vulnerable (Baker, 2006, p.1). Given the frequency of use and the location of the users of mobile phones, eavesdroppers, hackers and thieves have found it easy to access the mobile phone devices and this enables them to plan and execute their illegal acts without the consent of the mobile phone users (Stuart, 2007, p.1). In many occasions people share their experiences and even personal information with the other users of mobile phones without considering their location and whether there are people around them who could use such information for other purposes. Take for example the use of mobile phones in a cyber cafe or even in a foods store. In these places, different people come for different purposes and some people can access other electronic equipments like lap tops and other computer devices (Krotz, 2011, p.2). When an individual either in a line waiting to be served or already enjoying the services of the facility begins to communicate with another person sharing individual experiences and personal information, another person in the same place could easily record the personal information and even schedules and this will aid their planning and execution of illegal acts (Earle, 2010, p.1). Eavesdroppers, hackers and thieves have made the use of mobile phones less private as should be according to the conventional beliefs (Privacy Rights Clearinghouse, 2010, p.2). In this regard, hackers have shown that they don’t actually need the physical mobile devise to track and utilize personal information of the owner of the mobile phon ...Show more

Summary

Why Mobile Phone Conversations Are Never Private
Contemporary technological advancements have brought with them devastating experiences and incremental causes of social complexities. …
Author : jordonnitzsche
Why Mobile Phone Conversations Are Never Private essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Why Mobile Phone Conversations Are Never Private"
with a personal 20% discount.
Grab the best paper

Related Essays

Business Plan for Mobile Phone Recycling
Products and Services 05 3. Target Market 05 4. Market Research 07 5. Business Model 07 6. Competitive Analysis 08 6.1 Major Competitors 09 6.2 SWOT Analysis of ABC Recycle Company 10 6.3 Key to Success 11 7. Operations and Logistics 12 7.1 Production 12 7.2 Delivery 12 7.3 Payment 12 7.4 Suppliers 13 7.5 Premises 13 7.6 Equipment 13 7.7 Transport 13 7.8 Legal Requirement 14 7.9 Insurance 14 7.10 Management and Staff 14 8.
14 pages (3500 words) Essay
VoIP Vs Cell Phone (revsion)
The Federal Communications Commission (2010) for instance posits that “some VoIP services may only allow you to call other people using the same service. Also, some VoIP services only work over your computer or a special VoIP phone.” These are in doubt, great portability limitations to the use of VoIP.
3 pages (750 words) Essay
Monitoring U.S. citizens' phone conversations to detect potential terriorist threats
This catastrophe not only brought to fore the potential terrorist threats to the US lives and property, but also resulted in the placement of Homeland Security concept aimed at mitigating such threats (White, 2005). Yet, this in no way justifies the monitoring of US citizens’ phone conversations to detect potential terrorist threats.
2 pages (500 words) Essay
The Mobile Phone Market in China
With new industrialization capacity and growth in education and jobs availability, consumer discretionary incomes are rising in China that has created a new breed of buyer. China is emerging from its traditionalist past and taking a more capitalistic approach to lifestyle, considering ostentatious and generic consumption to be lifestyle fulfilment opportunities.
16 pages (4000 words) Essay
Mobile Phone Marketing
The biggest problem with this advertising tool is that customers usually harbour very high levels of intimacy with their mobile phones and hence any strategy chalked out to exploit the medium of mobile phone has to be customer sensitive (Hendery 2). Anything done to interact with the mobile phone owners will have to be cautious about the possibility of being viewed as an unnecessary and perhaps illegal intrusion.
4 pages (1000 words) Essay
The UK Mobile Phone Business
Kanter (1995:71) on his work of "Mastering Change" argues that success in the present day business is not for those companies that re-engineer the way they do things, or for those fixing the past. According to Kanter (1995) such an action will not constitute an adequate response.
4 pages (1000 words) Essay
Innovation and change (Mobile phone industry )
Factors coming under political environment that have impacted the change and growth of mobile phones are (Tutor2u n.d): Mobile phones have been
6 pages (1500 words) Essay
Monitoring U.S. citizens' phone conversations to detect potential terriorist threats
Yet, this in no way justifies the monitoring of US citizens’ phone conversations to detect potential terrorist threats. Such provisions threaten the quintessential American way of life. Liberty and freedom have always been a
2 pages (500 words) Essay
Mobile phone safety
However, there is overwhelming evidence to prove that indeed, mobile phones do not cause cancer. This paper seeks to prove that cell phones are safe for use and do not cause cancer. Cell phones cannot cause cancer since the radio frequency they emit is weak
2 pages (500 words) Essay
Investigate mobile phone hacking techniques
(Cheng) Hacking of smart phone is an open to discussion drill whereby a moderator advances entrance to a specific’s mobile phone over a
3 pages (750 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation