Need help with your Discussion

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

glass
pen
clip
papers
heaphones

answer question about the essay

answer question about the essay

answer question about the essay

Question Description

— First read this ESSAy this this and i have 4 questions I want you to answer them each one (one paragraph ).

ESSAY :

Apps having Access to our Personal Data?

Instagram, Snapchat, Facebook, Twitter, Uber, and Postmates. One if not all of these apps should sound familiar. We use these apps to get to destinations, post pictures, communicate with others, and make getting food easier. Pressing “Allow”, “Give Permission”, or “Have Access” is something we have all done when setting up these apps. Ever since, we have heard things about these huge corporations having the ability to access more than what they need to. They can tap into our phone calls, text messages, and more. We clearly do not support this decision because it is simply an invasion of privacy. However, in order for these apps to function correctly they will need access to some of our personal data. As us being the app downloader have the power to either reject it or accept it.

The reason apps need entry into our features is so the app can work properly and be reliable. In the article “Why do apps demand access to our photos and other data?”, by Dr Peter Bentley discusses the reasoning for it and why it may need access to personal information. Bentley states, “When an app needs to process some data, it must ask you for permission first. This is normally for perfectly sensible reasons: a photo-editing app needs access to your photos, or a voice recorder needs access to the microphone. Sometimes an app may want access to more personal information because it is trying to gather data that could then be used for marketing” (Bentley). It does make sense a photo editing app will need to see your photos in order to interact with them. Or an app taking you somewhere such as Lyft or Uber needing your location. Now the reason an app wants personal information is to collect data for marketing as shown earlier. Although that does seem a little weird there is of course a “Don’t Allow” option for this and you can go along with the app.

Now while there is reasoning apps need access to obvious things, there is a side where they want access to more. The question is why. These system permissions can either carry normal access or dangerous access. In the article “What really happens when you allow an app to access your photos”, by Lottie Gibbons shows the risks that you may have when allowing an app to get into more private things on your phone. Gibbons covers the dangerous access people have come across, “Dangerous permission groups, however, can give apps access to things like your calling history, private messages, location, camera, microphone, and more” (Gibbons). Gibbons also included how Anthony Van Der Meer, a documentary filmmaker had done a social experiment on the topic of this. He allowed somebody to steal his phone with the “Find My Phone” app and had the ability to spy on the “thief’s” life through the camera and microphone. In addition, Gibbons makes it clear when an app has access to the camera or microphone it can do much more with it. “When a user grants an app access to their camera and microphone, the app could do the following; access both the front and the back camera, record you at any time the app is in the foreground, take pictures and videos without telling you, upload the pictures/videos it takes immediately, and run real-time face recognition to detect facial features or expressions” (Gibbons). So while we do believe these app corporations do need specific features of our phones to make the app work properly, they can run with what they have.

App corporations want us to download the app, but we can’t seem to trust what they will have access to. Yet, we also would like to download these apps whether it is to connect with others, get food, post what we have been up to, or get a ride. The way we can both have these apps comfortably and enjoy them would be to read what apps want access to. At the end of the day there is a choice of allowing, not allowing, or simply erasing an app. While reading “When You Should (and Shouldn’t) Share Your Location Using a Smartphone”, by Brian X. Chen shows when it’s appropriate to give an app access to something and when it’s being taken too far. Chen was involved in an accident and his wife was able to find where he was on what highway because of his location. He shows when and who you should share your location with for your personal safety. One of his examples is for parents, if their child is receiving their first phone and you want to keep tabs on them to make sure they are safe, sharing their location through iMessage or Google Maps is a good tool. Chen also states another example, but for couples, “Consider using Apple’s Find My Friends, Facebook Messenger or Google Maps to share your location occasionally with your romantic partner. Location sharing can be useful for being considerate of your partner’s time and space. For example, I am less inclined to text my partner when I see she is at the office or driving on a freeway, but I am more inclined to text when I see she is at the grocery store to ask her to pick something up” (Chen). Now Chen shares when not to share your location, “For safety reasons, avoid sharing your location publicly. Google makes it easy to publish a web link where anyone can follow your live location. To fend off the creepers, send the link only to the intended recipients; avoid posting it on public sites like Twitter or Facebook” (Chen). He later goes on to talk about how we should know our limits. We, as the app consumers know when to decline something and we have the right too.

(I was still working on a conclusion)

Works Cited

  • Bentley, Peter. “Why Do Apps Demand Access to Our Photos and Other Data?” BBC Science Focus Magazine, www.sciencefocus.com/science/why-do-apps-demand-access-to-our-photos-and-other-data/.
  • Gibbons, Lottie. “What Really Happens When You Allow an App to Access Your Photos.” Liverpoolecho, 22 Sept. 2018, www.liverpoolecho.co.uk/news/liverpool-news/what-really-happens-you-allow-15186255.
  • Chen, Brian X. “When You Should (and Shouldn’t) Share Your Location Using a Smartphone.” The New York Times, The New York Times, 12 July 2017, www.nytimes.com/2017/07/12/technology/personaltech/using-location-sharing-apps.html.

  • you will read the work of at least one and respond to that person, with 1. What problem you see the writer identifying, 2. Which Points of View you see being brought in to the paper, 3. what Common Ground the writer is proposing, and 4. What support you see for that common ground. Your thoughts on their argument aren’t necessary; there’s no need for praising the writing with things like “good job” or “I like this.” Rather, the way to help is to tell a writer what you perceive in their writing. From there, they can think about what changes are necessary. These answers should be in full paragraphs, incorporating quotes from the writing you’re commenting on, so the writer knows where your attention is focused.

HERE ALL THE QUESTIONS :

1. What problem you see the writer identifying,

2. Which Points of View you see being brought in to the paper, 3.

what Common Ground the writer is proposing, and

4. What support you see for that common ground.

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

We Can Write It for You! Enjoy 20% OFF on This Order. Use Code SAVE20

Stuck with your Assignment?

Enjoy 20% OFF Today
Use code SAVE20