Since motion detectors are not currently permission protected, apps can extract motion sensor data and send it to sophisticated computer programs that can relate that data to specific, potentially invasive information about a user, such as finger taps on certain areas of the screen.ģ. Researchers have proposed that such apps would show a user a camera icon several times, then, once the user is comfortable with the button’s location and function, switch to a video camera icon to gain access to the smartphone’s microphone as well as the camera. ![]() ![]() For example, an app could trick a distracted user into allowing it to capture imagery and audio data, rather than just imagery data. Other apps could be deceptive in the way that they ask for permission to collect certain data. If similar apps are devised in the future, those apps could pose a potential threat to users. Possible student response: Researchers have designed invasive, proof-of-concept apps that perform some functions while also secretly extracting other sensor data. In what ways can downloaded apps use a smartphone to potentially spy on a user without the user’s knowledge or permission? Motion detectors, such as accelerometers and gyroscopes, are not currently permission-protected.Ģ. These devices can also detect and store data on screen touches and keystrokes, fingerprints, proximity of objects to the screen, light levels, barometric pressure, acceleration, vibration, rotation, magnetic fields, gravity and GPS signals. Possible student response: Smartphones can capture and store images, video and sound (including human speech). What type of information can smartphones sense and measure? What type of sensors are not currently permission-protected? Finally, all groups should work together to answer the questions below.ġ. Each “section expert” should summarize his or her section of the article so that the new group has a summary of the whole article. Next, assign new groups, each including at least one “section expert” from each of the original four groups. Allow time for each expert group to discuss and summarize its segment. The sections include: “Message revealed,” “Tagalong,” “Sensor safeguards” and “The price of privacy.” Each group should also be assigned to read the introduction. For example, divide your class into four groups, and assign each group a section to become an expert on. ”ĭue to the length of the article, you may want to assign each section of the article to a specific group of students.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |