Showing Page:
1/9
APPENDICES
COMPUTER
APPLICATION
TECHNOLOGY
Privacy and the use of smartphones
Protection of privacy when using ICT’s
2022
SHEFICK NKUNA
Edge view Academy
1/30/2022
Showing Page:
2/9
Table of content
1. Introduction
2. Task definition
What is the current situation ?
What will be the focus and purpose (desired outcome ) of my
investigation be ?
How will I go about conducting the investigation, considering the
PAT requirements ?
3. Focus question
4. Discussion and analysis (body)
5. Findings
6. Conclusion
7. Bibliography
Appendices (1 - Folder structure, 2-Appendices, 3
Declaration)
Showing Page:
3/9
INTRODUCTION
What is privacy and use of smartphone?
Privacy is suppose to things that are kept closely to you and only known by you
,unless you decide to give permission to someone to access your privacy but without
your permission no one is allowed to access your privacy. To describe privacy in a
short way ,it is something that contains all your personal life things, your likes and
dislikes. With the use of smartphones, smartphones have advanced rapidly over the
past years. With the advancement of the internet technologies and its applications,
smartphones are not only used for making phone calls but also for internet usage
such as sending and receiving emails, chatting , sharing, photos and documents
,reading news ,browsing the internet and online selling and buying
Showing Page:
4/9
TASK DEFINITION
What is the current situation?
Some experts believe that smartphones pose privacy risks because they can be easily be turned into
surveillance devices without impairing functions. They also say that smartphones can be used as
tracking devices by private hackers , the government ,or cloud service provider .A smartphone’s
motions might reveal what a user is typing or it might disclose a someone’s location
What will be the focus and purpose (desired outcome) of my
investigation be ?
In this investigation ,my main focus will be on how people are affected by the use of smartphones
based on the privacy side . Also look at the challenges and implications associated with the
protection of privacy and the use of smartphones
How will I go about conducting the investigation, considering the
PAT requirements
Based on the requirements of the investigation, information will be gathered from multi sources e.g.
websites, newspaper articles, interviews e.t. c this information will then be written down in a word
document and the use of a spreadsheet will be needed. All information must be backed up for
security purposes, the use of the cloud or flash drive may be used for storing my work
Who is the information for (target audience)?
The target audience for the information I will gather will be mostly for the youth and mid age
people, as for many old people don’t use smartphones they mostly prefer old telephones which are
much safer than smartphones
Showing Page:
5/9
FOCUS QUESTION
How have smartphones affected people in terms of their privacy?
Showing Page:
6/9
DISCUSSION AND ANALYSIS(BODY)
Showing Page:
7/9
FINDINGS
Showing Page:
8/9
CONCLUSION
Showing Page:
9/9
BIBLIOGRAPHY
Folder structure
SHEFICK
NKUNA
PHASE 1
SOURCES
PLANNING
PHASE 2
PHASE 3

Unformatted Attachment Preview

APPENDICES 2022 COMPUTER APPLICATION TECHNOLOGY Privacy and the use of smartphones Protection of privacy when using ICT’s SHEFICK NKUNA Edge view Academy 1/30/2022 Table of content 1. Introduction 2. Task definition • • • What is the current situation ? What will be the focus and purpose (desired outcome ) of my investigation be ? How will I go about conducting the investigation, considering the PAT requirements ? 3. Focus question 4. Discussion and analysis (body) 5. Findings 6. Conclusion 7. Bibliography Appendices (1 - Folder structure, 2-Appendices, 3 Declaration) INTRODUCTION What is privacy and use of smartphone? • Privacy is suppose to things that are kept closely to you and only known by you ,unless you decide to give permission to someone to access your privacy but without your permission no one is allowed to access your privacy. To describe privacy in a short way ,it is something that contains all your personal life things, your likes and dislikes. With the use of smartphones, smartphones have advanced rapidly over the past years. With the advancement of the internet technologies and its applications, smartphones are not only used for making phone calls but also for internet usage such as sending and receiving emails, chatting , sharing, photos and documents ,reading news ,browsing the internet and online selling and buying TASK DEFINITION What is the current situation? Some experts believe that smartphones pose privacy risks because they can be easily be turned into surveillance devices without impairing functions. They also say that smartphones can be used as tracking devices by private hackers , the government ,or cloud service provider .A smartphone’s motions might reveal what a user is typing or it might disclose a someone’s location What will be the focus and purpose (desired outcome) of my investigation be ? In this investigation ,my main focus will be on how people are affected by the use of smartphones based on the privacy side . Also look at the challenges and implications associated with the protection of privacy and the use of smartphones How will I go about conducting the investigation, considering the PAT requirements Based on the requirements of the investigation, information will be gathered from multi sources e.g. websites, newspaper articles, interviews e.t. c this information will then be written down in a word document and the use of a spreadsheet will be needed. All information must be backed up for security purposes, the use of the cloud or flash drive may be used for storing my work Who is the information for (target audience)? The target audience for the information I will gather will be mostly for the youth and mid age people, as for many old people don’t use smartphones they mostly prefer old telephones which are much safer than smartphones FOCUS QUESTION How have smartphones affected people in terms of their privacy? DISCUSSION AND ANALYSIS(BODY) FINDINGS CONCLUSION BIBLIOGRAPHY Folder structure SOURCES PHASE 1 SHEFICK NKUNA PLANNING PHASE 2 PHASE 3 APPENDICES Name: Description: ...
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4