4. "The [location] data
can be used to show
an ad for a store to a
potential customer
who is nearby, a
technique that
boosts store traffic
40%, according to
Mobile Marketing
Association
research."
Dwoskin, Elizabeth. "Where Were You 3 Minutes Ago? Your Apps Know."
Wall Street Journal. Dow Jones & Company, 23 Mar. 2015. Web. 02 June
2016.
Photo: Canva.com
5. How does this
work?
"Location services are taken care of with
a magnetometer for detecting magnetic
North and some form of GPS chip or a
related variant to plot your position on
the map."
?
Caddy, Becca. "Here's How Your Phone Is Tracking You Right Now." TechRadar. Limited Quay House, 9
Apr. 2016. Web. 02 June 2016.
Photo: Pixabay
6. There are many sensors in our phones
that help them to seamlessly and
quickly meet our needs.
"The number of sensors on
your phone should not
concern you, but the
number of apps using that
sensor data should."
Caddy, Becca. "Here's How Your Phone Is Tracking
You Right Now." TechRadar. Limited Quay House, 9
Apr. 2016. Web. 02 June 2016.
Photo: Pixabay
7. quietlyintroduced iBeacon into location services
on iOS 7.It's a technologythat can track your
position and movements in places like
"APPLE
Golbeck, Jennifer. "This App Tracks You While You Shop." Slate Magazine. N.p., 28
Jan. 2014. Web. 02 June 2016.
stores and
restaurants."
Photo: Canva.com
8. Shopkick is one of the apps that uses
iBeacon to track customers...
"If you are using
Shopkick at a store with
iBeacon, it also knows
where you are in a store,
where you linger, and
what products you are
interested in."
Golbeck, Jennifer. "This App Tracks You While You
Shop." Slate Magazine. N.p., 28 Jan. 2014. Web. 02 June
2016.
Photo: Pixabay
9. We tell our devices everything...
"People don't seem to feel like themselves unless
they share a thought or feeling, even before it is
clear in their mind. "
Turkle, Sherry. "The Documented Life." The New York Times. The New York
Times, 15 Dec. 2013. Web. 02 June 2016. Photo: Pixabay
10. Facebook
is another example of technology knowing in
depth information about our personal lives
"Whenever you sign up for a Facebook account, it asks permission to look
at your email contacts if you’re on a computer, or your phone contacts if
you’re on a smartphone. When you grant the site permission, it searches
your contacts for users already on the network, and it searches other
users’ uploaded contacts for you. That gives it a very primitive outline of
your social circles: who you know, but not how you know them or how
well."
Dewey, Caitlin. "How Facebook Knows Who Your Friends Are, Even Better
than You Do | Toronto Star." Thestar.com. N.p., 4 Apr. 2015. Web. 02 June
2016.
Photo: Pixabay
11. The Facebook app listens in on phones
in the US in order to show users ads
that pertain to their lives
"Facebook says its app does listen to what's
happening around it, but only as a way of
seeing what people are listening to or
watching and suggesting that they post
about it. "
Beall, Abigail. "Facebook Starts Tracking Nonusers across the Internet: Site
Begins Targeting Ads at People Not Signed up to the Social Network." Mail Online.
Associated Newspapers, 01 June 2016. Web. 02 June 2016.
Photo: Pixabay
12. When our devices have so much access to our
personal lives it can be incredibly dangerous
Hackerscangainaccesstopersonalinformation
anddevices,asisevidencedbythehackingof
anOhiocouples'babymonitorin2014
Photo: Pixabay
"Home, Hacked Home." The Economist. The Economist
Newspaper, 12 July 2014. Web. 02 June 2016.
13. "When you carry a cell phone, it is
constantly sending signals about
where you are. It "pings" nearby cell-
phone towers about every seven
seconds so it can be ready to make
and receive calls. When it does, the
phone is also telling the company
that owns the towers where you are
at that moment — data the
company then stores away
indefinitely."
Cohen, Adam. "What Your Cell Phone Could Be Telling the Government."
Time. Time Inc., 15 Sept. 2010. Web. 02 June 2016.
Photo: Pixabay
14. This means that the government,as well as other
organizations,can potentiallyget ahold of personal
information quite easily
Cohen, Adam. "What Your Cell Phone Could Be Telling the
Government." Time. Time Inc., 15 Sept. 2010. Web. 02 June 201Photo: Pixabay
15. Hacked medical devices are one of
the biggest cyber security threats
Hackers
couldpotentiallyhackinto
insulinpumpsandsurgical
robots,doingrealharmtothose
whorelyonthesedevices
Photo: Pixabay
Ossola, Alexandra. "Hacked Medical Devices May Be The Biggest
Cyber Security Threat In 2016." Popular Science. Popular Science,
23 Nov. 2015. Web. 02 June 2016.
16. Sofar,therehasneverbeenareportofa
hackedmedicaldevicebut
it is estimated that the security
around medical devices is about a
decade behind the overall standard.
Ossola, Alexandra. "Hacked Medical Devices May Be The Biggest
Cyber Security Threat In 2016." Popular Science. Popular Science,
23 Nov. 2015. Web. 02 June 2016.Photo: Pixabay
17. Apositivetomobiletrackingisthatparentsare
abletocheckontheirchild'swellbeing
This free app lets family members track one
another in real time. One great feature
automatically lets family members know
when someone has entered a predefined
location, like home or school. You can choose
two such spots. So when the kids come home
after school, Life 360's app automatically
checks them in and sends an alert to show
they've made it.
Life360
Webster, Scott. "Four Ways to Share Your Exact Location with
Family (and Why)." CNET. CBS Interactive, 10 Feb. 2016.
Web. 02 June 2016. Photo: Pixabay
18. TeenSafe App
Along with tracking a child's whereabouts, "the app can work
covertly and show what kids are posting on social media as well as
deleted texts and messages sent via popular apps such as Kik,
WhatsApp and Snapchat."
Morris, Regan. "Child Watch: The Apps That Le
Parents 'spy' on Their Kids." BBC News. BBC, 2
Jan. 2015. Web. 02 June 2016.Photo: Pixabay
19. As with most things, there are
positives and negatives to our
devices knowing our information.
As long as people are diligent about keeping their
privacy settings updated, there is little need to worry
about anything bad happening with regards to our
personal information.
Photo: Pixabay