Skip to main content

Mobile Systems and Their Intractable Social, Ethical and Security Issues

  • Chapter
  • First Online:
Ethical and Social Issues in the Information Age

Part of the book series: Texts in Computer Science ((TCS))

Abstract

This chapter begins by presenting rather a frightening and quickly evolving mobile telecommunication and computing technologies; their unprecedented global reach and inclusion; unparalleled social, financial, and cultural prowess; and the yet to be defined social, moral, and ethical value systems. We discuss the crucial role of the mobile operating system and survey the current mobile devices and their anchoring mobile operating systems. The discussion then settles on the main themes of the book, that is, the ethical and security issues in the mobile ecosystem. We discuss the troubling issue of the mobile ecosystem, the location-based tracking system (LTS). This technology, in three types, is troubling because it is being used by merchants, law enforcement agencies, and almost everyone else who needs to know where you and your smart electronic device are. We note that while users of smart devices may not be aware, these technologies have huge ethical and privacy implications. In our discussion, we focus on the security and threat to individual privacy , for even in public places individuals deserve some privacy, resulting from the collection, aggregation, and centralization of personal information, without user consent of the user and also in the absence of applicable laws. On security issues in the ecosystem, we note that mobile devices are increasingly holding and storing more private data like personal and business and they are roaming in public spaces on public networks with limited security and cryptographic protocols to protect the data. Also, because of the fact that these devices have the ability to roam on several networks, there is a wider sphere of attack beset by geographical, legal, and moral differences. We note that the penetration trend of these smart mobile devices is not limited to faraway rural places but more scaring is their rapid penetration on enterprise IT spaces where security is paramount for any device.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wikipedia. Usage share of operating systems. https://en.wikipedia.org/wiki/Usage_share_of_operating_systems

  2. Ms. Smith (2017) Android now the world’s most popular operating system. Pivacy Secur Fanatic, 3 Apr 2017. www.csoonline.com/article/3187011/mobile-wireless/android-is-now-the-worlds-most-popular-operating-system.html

  3. Open Handset Alliance. Wikipedia. https://en.wikipedia.org/wiki/Open_Handset_Alliance

  4. Mobile cyber threats: a joint report. Kaspersky Labs and Interpol, Oct 2014

    Google Scholar 

  5. Jason Haln. Android claims 81.5% of the global smartphone OS market in 2014, iOS dips to 14.8%. Digital Trends, 28 Feb 2015. www.digitaltrends.com/mobile/worldwide-domination-android-and-ios-claim-96-of-the-smartphone-os-market-in-2014/

  6. Wikipedia. Mobile operating system. https://en.wikipedia.org/wiki/Mobile_operating_system#2010s

  7. Wang JL, Loui MC (2009) Privacy and ethical issues in location-based tracking systems. In: ACM Digital Library. ISTAS’09 Proceedings of the 2009 IEEE International Symposium on Technology and Society, pp 1–4, May 18–20, 2009, IEEE Computer Society Washington, DC, USA ©2009

    Google Scholar 

  8. How radio frequency identification tags will help retailers, from supply chains to store shelves. MIT Technology Review, March 2004 Hoh B, Gruteser M, Xiong H, Alrabady A (2006) Enhancing security and privacy in traffic-monitoring systems. IEEE Pervas Comput 5(4):38–46

    Google Scholar 

  9. Lin D, Loui MC (1998) Taking the byte out of cookies: privacy, consent, and the Web. Comput Soc 28(2):39–51

    Article  Google Scholar 

  10. Rachels J (1995) Why privacy is important. In: Johnson DG, Nissenbaum H (eds) Computers, ethics & social values. Prentice Hall, Upper Saddle River, pp 351–357

    Google Scholar 

  11. Mobile threat report. Juniper Networks. Feb 2012

    Google Scholar 

  12. Keller M (2001) JailbreakMe 3.0: How does it work? PCWorld, 6 July 2011

    Google Scholar 

  13. Bradley T (2011) DroidDream becomes android market nightmare. PCWorld, 12 Mar 2011

    Google Scholar 

  14. Mobile device attack. http://whatis.techtarget.com/definition/mobile-device-attack

  15. Hassam Types of bluetooth hacks and its security issues. https://hubpages.com/technology/Types-Of-Bluetooth-Hacks-And-Its-Security-Issues

  16. BlueDump. https://trifinite.org/trifinite_stuff_bluedump.html

  17. Mobile devices expose company data to severe vulnerabilities. Helpnetsecurity, 10 Apr 2012. www.helpnetsecurity.com/2012/04/10/mobile-devices-expose-company-data-to-vulnerabilities/

  18. Brandenburg M (2012) Mobile device security overview. Search Mobile Computing. June 2012. http://searchmobilecomputing.techtarget.com/tutorial/Mobile-device-security-overview

  19. Wikipedia. http://en.wikipedia.org/wiki/Mobile_device_management

  20. Adhikari R Encryption on the go, part 1. Tech News World. www.technewsworld.com/story/75245.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joseph Migga Kizza .

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kizza, J.M. (2017). Mobile Systems and Their Intractable Social, Ethical and Security Issues. In: Ethical and Social Issues in the Information Age. Texts in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-70712-9_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-70712-9_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-70711-2

  • Online ISBN: 978-3-319-70712-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics