Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
Triangle Article Analysis:
Apple acts on iPhone tracking bug
1.2 Security
How secure is the information being stored?
The log of the users tracked locations could be easily accessed once synced to a computer.
Goes hand-in-hand with Privacy & Anonymity. Who is able to access this information?
1.3 Privacy & Anonymity
Who can see this data and how much of it?
The service is opt-in but many are/were unaware that their movements were being tracked and may not want that information to be seen by some or any.
How much of the information can be seen by the service provider(app developer)? This is not explained in the article but you may be revealing a little too much of your whereabouts to the application developers.
1.7 Surveillance
Could the government or other agencies/corporations be watching you?
If you give app developers permission to track your location they could see where you are when the application is up.
Let's say the FBI gets a warrant to search all of your personal objects they could access your computer obtain the log of your locations with date and time and use that information against you or for you.
Strand two: Application to Specific Scenario
2.5 Home & Leisure
Most people use their iOS devices
(iPhone & iPad) for personal uses (playing games, communication). They usually take their device where ever they go whether they should be there or not. The log of data would mostly be logging what they are doing in their leisure time. This leisure time might include doing illegal or morally irresponsible activities.
Strand Three: IT Systems
3.1 Hardware:
iPhone, iPod, iPad, Computer for sychronization
3.2 Software:
iOS, log decoder, iTunes, bug
Foursquare, MobileMe
3.4 Internet:
The Internet, Wifi hotspots, Cell towers
3.5 GPS chip in the phone
3.6 Multimedia and digital media:
file in which the log is saved,
3.7 Databases:
Database in which wifi hotspots and cell tower locations are saved
The End
Stakeholders
iOS users
http://talkingpointsmemo.com/images/man-computer-fbi-raid.jpg
Law Enforcement Agents (FBI)
Application developers
Apple employees
http://www.make-noise.com/trendspottings/wordpress/wp-content/uploads/2009/04/pleasure_genius20080327.jpg
http://www.tekgoblinmedia.com/wp-content/uploads/white-iphone-snapped-new-york-0.jpg
Strand 1
Strand one: Social and Ethical Significance
Strand 2
Stakeholders
Strand 3
http://www.blogcdn.com/www.engadget.com/media/2007/01/apple-iphone-official-1.jpg
(cc) image by nuonsolarteam on Flickr