Mobile Camera Phones - Dealing with Privacy, Harrassment, and Spying/Surveillance Concerns

Mobile Camera Phones - Dealing with Privacy, Harrassment, and Spying/Surveillance Concerns

Christopher Abood
ISBN13: 9781599049434|ISBN10: 1599049430|EISBN13: 9781599049441
DOI: 10.4018/978-1-59904-943-4.ch136
Cite Chapter Cite Chapter

MLA

Abood, Christopher. "Mobile Camera Phones - Dealing with Privacy, Harrassment, and Spying/Surveillance Concerns." Electronic Commerce: Concepts, Methodologies, Tools, and Applications, edited by Annie Becker, IGI Global, 2008, pp. 1733-1741. https://doi.org/10.4018/978-1-59904-943-4.ch136

APA

Abood, C. (2008). Mobile Camera Phones - Dealing with Privacy, Harrassment, and Spying/Surveillance Concerns. In A. Becker (Ed.), Electronic Commerce: Concepts, Methodologies, Tools, and Applications (pp. 1733-1741). IGI Global. https://doi.org/10.4018/978-1-59904-943-4.ch136

Chicago

Abood, Christopher. "Mobile Camera Phones - Dealing with Privacy, Harrassment, and Spying/Surveillance Concerns." In Electronic Commerce: Concepts, Methodologies, Tools, and Applications, edited by Annie Becker, 1733-1741. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-943-4.ch136

Export Reference

Mendeley
Favorite

Abstract

This chapter discusses the growing inappropriate use of mobile camera phones within our society. There are two areas of concern that are dealt within this chapter. The first concern deals with individual privacy and the use of mobile camera phones as a tool of harassment. The second concern deals with organizations seeking to prevent industrial espionage and employee protection. This chapter outlines how these devices are being used to invade individuals’ privacy, to harass individuals, and to infiltrate organizations. The author outlines strategies and recommendations that both government and manufacturers of mobile camera phones can implement to better protect individual privacy, and policies that organizations can implement to help protect them from industrial espionage.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.