Preview

Social Security

Good Essays
Open Document
Open Document
707 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Social Security
"What your cell phone could tell about you might astound you. Cell phones store many different kinds of information. Personal details, the photos and files you choose to put into your phone, and text messages you have sent received are obvious examples. However, global positioning system (GPS) information will also tell others where your phone is and, therefore, where you are likely to be, or even where you might be going. The call data in your phone shows what calls you made and received, while your phone book shows the people you know and gives their phone numbers. In short, your cell phone is a mobile encyclopedia- about you!" Stated by Debra Wu in Source 2. Nowadays everything is about technology but it is it really safe to be giving …show more content…
The author stated in source 2 "Downloading and installing an application (or app, for short) could endanger your data privacy, too, if the app collects information from your cell phone without your permission. Some apps explicitly ask for permission to access your cell phone in different ways." This also means that some apps are not safe because they take in your personal information from your phone and your privacy is in danger. Hackers all over the internet waiting for something like this to happen because they see it as a opportunity When using the internet use the right websites so your personal information is …show more content…
In source 3 the author states "If SSNs are publicly displayed, as is the case in some educational establishments when posting grades, for instance, privacy of personal data suffers. The SSN is also at risk of being copied and used illegally elsewhere. This identity theft, as it is called, may be carried out for different reasons, such as obtaining unauthorized credit, income tax refunds, and social and healthcare benefits. For these reasons, a number of schools and universities have now stopped using the SSN as a student identifier. Others, at least, give students the option to choose another form of identification." Which also means that your social security number is one of the most important information of yours that hackers look for so you cannot use this on your social network account because it will not be safe. So keeping your social security number away from the internet is something you should always look out for.

In conclusion, people can protect their personal information if they don't use the wrong websites, don't give out all their most important information, and keep there social security away from social networking. People must know the website their using because most social networks are not trusted. Also, do not give out your important personal information because there are a lot of cyber criminals. Last but not least do not give out your

You May Also Find These Documents Helpful

  • Good Essays

    Mckinnell talks about ways that parents and social networking companies can help teenagers protect their personal information they share online. The author advises social networking companies to…

    • 862 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cell phones have become the leading source of communication in the world. However, it is not just phone calls or e-mails anymore, someone might take down time to play angry birds or candy crush saga. If your cell phone is left on and completely unattended someone, knows your location. Over 200 million Americans who own a cell phone have been watched on a data base created by the cell phone company, keeping track of tower signals, recording conversations, and making copies of text messages and emails. Even the United States government has gone to the extent to using cell phone information when coming to court evidence and alibies. Parents are becoming technologically aware and are using tracking abilities to keep an eye on their children and their whereabouts. The question remains, where can you draw the line between…

    • 718 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The article That's no phone. That's my tracker., from The New York Times explains how our phones are being used to track and record us. “Every year, private companies spend millions of dollars developing new services that track, store and share the words, movements and even the thoughts of their customers.” (Ohm, 2012). Just like the Telescreens were used to monitor and track every person's movements these phones or should I say trackers are used in the same way. “The surveillance and privacy implications are quite simple. If someone knows exactly where you are, they probably know what you're doing...constantly check and record the location of all phones on their Network.” (Maass, 2012). They don't only track they also record everything you do and the faces, they also use the information recorded from you to advertise and sell…

    • 806 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Needless to say, that cell phones have evolved from being “bricks” to smartphones that can even track our location. The question is, have cell phones stopped being just cell phones? Or are they devices which allow others access into our privacy? The article, “That’s No Phone. That’s My Tracker” written by Peter Maass and Megha Rajagopalan, claims that phones have ceased to be just cell phones and should now be considered trackers. Now that cell phones have GPS locators installed in them, they can have the knowledge of our whereabouts. That being said, having the GPS locators in smartphones, has the feasibility to violate anyone’s privacy because, “If someone knows exactly where you are, they probably know what you are doing… it’s possible to predict your future whereabouts” (Maass, Rajagopalan). Furthermore, this quote can be easily referred to the government and there has been some speculation that the government not only uses our smartphones to track us but they also listen to our conversation via our own devices. Similarly, the novel 1984 includes a government, otherwise known as Big Brother, which keeps track of its party members at all times. They even have…

    • 810 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cell Phone Privacy

    • 655 Words
    • 3 Pages

    C. Cell phones are tracked by GPS and can reveal your location. GPS data can reveal whether a person “is a weekly church goer, a heavy drinker, a regular at the gym, an unfaithful husband, an outpatient receiving medical treatment, an associate of particular individuals or political groups — and not just one such fact about a person, but all such facts” ( Maass).…

    • 655 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Social Security

    • 548 Words
    • 3 Pages

    Ellen Hoffman’s, “Social Security, Will You Get Yours?” is an article that goes over the main issue with social security; will you get your social security when the time comes for you to retire? This article discusses a very real and important topic for every United States citizen who will ever be even remotely dependent on social security for some type of income.…

    • 548 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Master of Sosial Work

    • 387 Words
    • 2 Pages

    *Your Social Security Number will be used by the Office of University Admissions for identification purposes only. The Social Security Number is used to ensure the proper identification of transcripts and other application materials that may arrive under a married or changed name.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cell Phone Impact

    • 978 Words
    • 4 Pages

    The invention of the cell phone and newer smart technology has brought about many positive uses and entertainment but there are many downsides that aren’t as obvious. Cell phones, no matter how useful, still pose many hazards to our health and such as distracting us from other tasks and affecting our bodies. The everyday use of cell phones has many negative effects on individuals and society.…

    • 978 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Mobile Phone

    • 608 Words
    • 3 Pages

    It is clear that mobile phones are an invasion of privacy as they can be hacked, giving criminals access to your data which increasingly is coming to contain financial access data such as credit card numbers, bank account numbers and etc. It is also possible for criminals to “clone” phones, or for them to steal your phone and modify the chip, allowing your details to be used outside your network area. Hackers are now seeing these devices as a new way of making money, a new way of getting data about people. The cell phone hacker can even access your camera phone and speaker, to keep track of your every move.…

    • 608 Words
    • 3 Pages
    Good Essays
  • Good Essays

    government tracking

    • 1009 Words
    • 5 Pages

    Terry Allen’s article gives us a much stronger sense that cell phone tracking technology is…

    • 1009 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    On-line social community is a medium that allow people to connect with their friends and share information, it is a way of networking but it is a social based relationship among its users. People join the social community by creating personal profile which can be set to private or made public, this network is primarily to connect with friends and share information ranging from photos, videos, comments, contact details, etc. However, many users have made their details public without carefully considering the consequence, hence; the on-line social communities have become a danger zone where people fear to tread on due to privacy policies being breached.…

    • 2024 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Identity theft can also be a significant risk of social networking. Personal details like your full name, names of your family members, your phone number, birthday, address,…

    • 1732 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    “Social Security provides benefits as an earned right without a means test or an income test” (Midgley, Livermore, 2009). Social Security is based on contributions from employees to employers also from self-employed workers and pay-as- you- go funding (Midgley, Livermore, 2009). This program was designed to provide income after retirement (Kessler, 2014). Social security was meant to benefit those making less, with more social security than those making more while they work (Kessler, 2014). Social Security was developed to help the elderly and the people in poverty with financial problems. The social security act established two main programs; social insurance and public assistance. Social security covers many policies such as Medicare, Medicaid,…

    • 114 Words
    • 1 Page
    Good Essays
  • Good Essays

    Social Security is truly not an adequate choice for a nest egg that can secure the future of Americans, especially when planning for retirement is not up for consideration. In the early 1930s Social Security arose by working Americans paying into a system that in return should replenish their future. As the main source of retirement during this time the plan includes support for most disability workers, children losing their parents, and the elderly. The sole use of Social Security was the intent of forming a solid structure for retirement and not a method a person should trust entirely (p.24). More than 35 million people paid homage to the plan back in the 1940s and over 50 years later the fund should spill over with money to retire all working…

    • 462 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In public life communication technology serve more advantages than disadvantages. We can find friends through social media or online game sites, we can even find suitable partner through dating sites. The disadvantages are that people can provide false information and exploit the advantages of social media on people public life and cause misunderstanding, loss of properties or sometimes even lives. In private life, the disadvantages are more than the advantages. The advantages are that we can communicate and stay connected with our family or friends online, but it is also easy for hackers to access our personal profile online. Many cases have been reported that…

    • 1087 Words
    • 5 Pages
    Good Essays