electronic commerce
 entertainment.(game playing,)
3 Mobile Users
 Text messaging or texting
 Smart phones,
 GPS (Global Positioning System)
 m-commerce
 NFC (Near Field Communication)
4 Social Issues
With the good comes the bad, as this new-found freedom brings with it many
unsolved social, political, and ethical issues.
       Social networks, message boards, content sharing sites, and a host of
other applications allow people to share their views with like-minded
individuals. As long as the subjects are restricted to technical topics or hobbies
like gardening, not too many problems will arise.
       The trouble comes with topics that people actually care about, like politics,
religion, or sex. Views that are publicly posted may be deeply offensive to some
people. Worse yet, they may not be politically correct. Furthermore, opinions
need not be limited to text; high-resolution color photographs and video clips
are easily shared over computer networks. Some people take a live-and-let-live
view, but others feel that posting certain material (e.g., verbal attacks on
particular countries or religions, pornography, etc.) is simply unacceptable and
that such content must be censored. Different countries have different and
conflicting laws in this area. Thus, the debate rages.
       Computer networks make it very easy to communicate. They also make it
easy for the people who run the network to snoop on the traffic. This sets up
conflicts over issues such as employee rights versus employer rights.
Many people read and write email at work. Many employers have claimed the
right to read and possibly censor employee messages, including messages sent
from a home computer outside working hours. Not all employees agree with
this, especially the latter part.
Another conflict is centered around government versus citizen’s rights.
A new twist with mobile devices is location privacy. As part of the process of
providing service to your mobile device the network operators learn where you
are at different times of day. This allows them to track your movements. They
may know which nightclub you frequent and which medical center you visit.
Phishing ATTACK: Phishing is a type of social engineering attack often used
to steal user data, including login credentials and credit card numbers. It occurs
when an attacker, masquerading as a trusted entity, dupes a victim into
opening an email, instant message, or text message.