Mobile Camera Phones - Dealing with Privacy, Harrassment, and Spying/Surveillance Concerns

Mobile Camera Phones - Dealing with Privacy, Harrassment, and Spying/Surveillance Concerns

Christopher Abood
ISBN13: 9781591408178|ISBN10: 1591408172|EISBN13: 9781591408185
DOI: 10.4018/978-1-59140-817-8.ch047
Cite Chapter Cite Chapter

MLA

Abood, Christopher. "Mobile Camera Phones - Dealing with Privacy, Harrassment, and Spying/Surveillance Concerns." Handbook of Research in Mobile Business: Technical, Methodological, and Social Perspectives, edited by Bhuvan Unhelkar, IGI Global, 2006, pp. 666-674. https://doi.org/10.4018/978-1-59140-817-8.ch047

APA

Abood, C. (2006). Mobile Camera Phones - Dealing with Privacy, Harrassment, and Spying/Surveillance Concerns. In B. Unhelkar (Ed.), Handbook of Research in Mobile Business: Technical, Methodological, and Social Perspectives (pp. 666-674). IGI Global. https://doi.org/10.4018/978-1-59140-817-8.ch047

Chicago

Abood, Christopher. "Mobile Camera Phones - Dealing with Privacy, Harrassment, and Spying/Surveillance Concerns." In Handbook of Research in Mobile Business: Technical, Methodological, and Social Perspectives, edited by Bhuvan Unhelkar, 666-674. Hershey, PA: IGI Global, 2006. https://doi.org/10.4018/978-1-59140-817-8.ch047

Export Reference

Mendeley
Favorite

Abstract

This chapter discusses the growing inappropriate use of mobile camera phones within our society. There are two areas of concern that are dealt within this chapter. The first concern deals with individual privacy and the use of mobile camera phones as a tool of harassment. The second concern deals with organizations seeking to prevent industrial espionage and employee protection. This chapter outlines how these devices are being used to invade individuals’ privacy, to harass individuals, and to infiltrate organizations. The author outlines strategies and recommendations that both government and manufacturers of mobile camera phones can implement to better protect individual privacy, and policies that organizations can implement to help protect them from industrial espionage.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.