Introduction
The Apple Corporation seems to
effortlessly lead in technology advancements that attract millions of
customers, and with the newest iCloud development, there is nothing stopping
its success. With the invention of this easy-to-use back up and synchronization
system, Apple users are able to retrieve data from multiple devices.
It is beneficial in being simple and
easily accessible; however, there are some legal, ethical, and security issues
that must be noted when using the service. However, with emerging technology
comes further research. With the ongoing research on the iCloud service, Apple
workers will be able to hurdle over these issues.
Background
iCloud is one of the newest, most
brilliant services created by the Apple Corporation. It functions as a backup
system on Apple products, such as the iPhone or iPad. Instead of having to go
through the trouble of remembering to back up files such as music, photos, and
other files like these, data on the device is automatically backed up through
iCloud every time the piece of equipment is plugged in and connected to the
Wi-Fi network (Smith, 2011). This service also helps the Apple user stay in
sync with each device. By having this backup system, the material is put “in
the cloud” and is able to be transferred from one Apple device to another
through a wireless connection (Smith, 2011).
The term “iCloud” comes from the
term used by technicians called the “cloud”. When data is put in the cloud, the
data is placed in a server, where it is made available everywhere. The “i” in
front of it is a trademark by Apple, producing the name iCloud. Streaming
photos, storing documents, saving app data, and syncing music has been made ten
times easier due to this service.
Potential
Benefits
With the introduction of iCloud,
backup, storage, and sharing will be easier than ever. One important benefit is
the simplicity of backup. The Apple user no longer has to think about storing
files since backup is now as simple as charging the device. All files and apps
are automatically stored once the device is plugged in and connected to a Wi-Fi
connection.
Another
benefit is the simplicity of syncing information, such as music and files. It
is an extreme hassle to use USB devices and online drop boxes, or even email.
When using iCloud, all data is put into the “cloud”, and can be retrieved by
another device through any iCloud account. iCloud automatically syncs the
content and makes it accessible to devices such as the iPad, iPhone, Mac, iPod
touch, or Apple PC (Baran, 2011). It takes the physical work and thought
processes out of the equation.
This
service is beneficial because of its cost as well—absolutely free. With the
purchase of an Apple product accessible to iCloud, the offer comes at no cost,
relieving the pockets of those using online drop boxes or spending money on USB
devices. This product can also be beneficial to the Google Android or Microsoft
user, pushing the makers to make advancements similar to iCloud.
Legal
and Ethical Issues
With the introduction of iCloud and
the smoothness of sharing data from one device to another come many legal and
ethical issues when using this service. One large legal issue is the illegal
sharing of music from one device to another. “In 2001, the U.S. Supreme Court
ruled in favor of the music industry…declaring free music file-swapping illegal
and in violation of music copyrights held
by recording labels and artists” (Campbell, Martin, & Fabos, 2012). However
with the iCloud service, sharing music files is easier and faster. By backing
up iTunes on one device, they are accessible on another device, enabling the
user to have that information saved on multiple pieces of technology. The user
has the ability to then share music with others by accessing their iCloud
service on foreign computers, or even the old-fashioned way by using USBs and
email to share data.
Also, ethics kicks in through the
sharing of other people’s personal information, such as private photos or
videos. For example, one user can send another user a very personal photo. Once
the device is plugged in, that photo is backed up and made available on other
devices. If someone is granted access to that device or attacks the device,
they may them have the power to release that personal photo or information to
the public, causing extreme moral or ethical issues. Although the iCloud
service can be resourceful in multiple positive ways, it can also be
resourceful in numerous negative ways as well.
Security
Concerns
For the most part, the iCloud
service is very secure due to the password protected security, and the fact
that the information is only available to Apple products that the user signs
into iCloud on. However, not everything is 100% secure when it comes to
technology. One security concern is about software attackers. If granted
temporary access by implanting malware, an attacker can access iCloud documents
stored locally, causing it to either spread stored personal information or add
files to the iCloud system that could potentially harm the Apple product
(Dhanjani).
Also, Apple workers have the power
to access files stored in the iCloud, lessening security of personal
information that has been backed up. Although it is highly unlikely, “data to
the iCloud infrastructure is encrypted during transmit,” giving Apple access to
personal files with the ability to view the (Dhanjani). Also, if the iCloud
service is used on an Apple device that is not that user’s personal device that
data could be backed up automatically to the device once that user’s personal
device is plugged in.
For these reasons, Apple strongly
recommends that personal information should not be stored on any device.
Personal information could include social security numbers, banking
information, occupational information, and other forms of information such as
these.
Social
Problems
With all advancements in technology
comes the lessening of social engagement with people and the surrounding community.
As if the public is not already into their iPhones, iPads, and iPods too much,
this service causes people to never want to remove themselves from their
devices. Now that data is made available through multiple devices, there is no
need to listen to music or watch movies in groups due to the easy sharing
though the iCloud service.
Although music sharing can be
illegal in some aspects, it was essential in promoting social skills through
technology. Sites such as MySpace and YouTube gave people a way to share music
and videos through social networking. The use of profiles on these websites
brought out the social side of technology users. However, with the introduction
of iCloud, file sharing is done with little to none social interaction, causing
people to be more social with their computers than their neighbors next door.
With future electronic developments,
worldwide social life is slowly but surely becoming obsolete. By the looks of
how technology is taking over now, the future shows zero promise for any kind
of social interaction.
Future
Required Research
Because iCloud is fairly new, more
research must be done in order to remove primary glitches and lessen customer
complaints. One main required research topic is the iCloud research storage space.
The glitch showed that some accounts had extended storage space with certain
renewal dates further in the future (Durham, 2012). Although existing MobileMe
users were granted temporary extended storage, the online storage for iCloud
was reduced to 5GB. With more research, Apple users may be given extended
storage with the use of iCloud.
Research is also required to tighten
the security of iCloud. Incidents have been noted that hackers have been able
to enter the systems through “the weakness in Amazon’s account security”
(Slivka, 2012). In order to have a more secure system, Apple support employees
are only allowed to send password resets to email addresses on file with the
account and are no longer allowed to set temporary passwords during calls (Slivka, 2012). However, research must be
done to secure iCloud by making associated networks more secure as well.
Conclusion
As previously shown, the iCloud has
the ability to be the most beneficial service for the Apple user today.
File-sharing and backup has now been made simple, as it is done for us when a
device is plugged in, without the user even thinking about it.
Although there are multiple
security, ethical, and social concerns, the pros seem to out-way the cons when
using this service. These concerns can easily be limited by the user by taking
precaution when using iCloud, such as limiting the amount of personal
information that is backed up, and by not sharing the iCloud user account
information with others.
By doing this, the iCloud service becomes
more beneficial than harmful, and once iCloud success begins to grow, the
future of Apple will appear to be brighter than ever.
References
Baran,
D. (2011, June 7). Apple icloud. what it is & the benefits.
Retrieved from http://www.webguild.org/20110607/apple-icloud-what-is-it-what-are-the-benefits
The
online article discusses the different benefits for the Apple user when using
the iCloud
service.
It lists specific examples, which made it extremely resourceful when using this
online
article
during research. It was written in 2011, which is fairly current and the
information in the
article
matched information from other webpages, making the information valid.
Campbell, R., Martin, C. R., &
Fabos, B. (2012). Media and culture with 2013 update: An introduction to
mass communication. (8th ed., p. 78). Boston: Bedford/St.Martin's.
This is a book source. The book gave
information on online music piracy and the illegal state
behind the act. It is resourceful
due to the date the book was written, meaning that the
information is current. It has
disadvantages because it does not refer to iCloud directly.
Dhanjani , N. (n.d.). Apple's
icloud: Thoughts on security and the storage apis. Retrieved from http://software-security.sans.org/blog/2011/12/05/apples-icloud-thoughts-on-security-and-storage/
The web article discusses the
security issues when using the iCloud system. It goes over the
specific security issues such as
hackers and backing up personal information. It is resourceful in
giving pictures of how the security
can be impacted. It lacks specific usefulness in not having the
publishing date of the page written
clearly on the webpage.
Durham, J. (2012, October 1). iOs
6 features: iphone 5 problems continue with new icloud glitch, battery
drainage, static lines, no wifi connectivity . Retrieved from http://www.booksnreview.com/articles/1244/20121001/ios-6-features-iphone-5-problems-continue-new-icloud-glitch-battery-drainage-static-lines-no-wifi-connectivity.htm
This is a news article that gives
information about the new iPhone 5 and the newest iOs 6
features. It resourceful because of
its date, since it was written not that long ago. It gives specific
examples of glitches that have come
about with the introduction of iCloud and the newest
iPhone. The webpage has its
disadvantages due to the fact that it does not specifically focus on
iCloud, but on the iPhone has a
whole.
Slivka, E. (2012, September 24). Apple
flooded with icloud password reset requests amid tightened account security
controls. Retrieved from http://www.macrumors.com/2012/09/24/apple-flooded-with-icloud-password-reset-requests-amid-tightened-account-security-controls/
This
is a website that gives information about the security of the iCloud
technology. The website gives specific examples of the security issues of this
service. It is resourceful because it is fairly new, meaning it has been
written recently. It gives specific examples that are able to be used as
support in the paper.
Smith, J. (2011, October 11). ios
5: What is icloud and what will it do for me?. Retrieved from http://www.gottabemobile.com/2011/10/11/ios-5-what-is-icloud-and-what-will-it-do-for-me/
This
online article branches from an online news website that gives information
about latest mobile news and reviews. The article was resourceful in writing
the “Background” section of the research paper, giving information about the
basics of iCloud. It is somewhat recent, being that it was written in 2011,
which makes it very useful in writing the research paper.
No comments:
Post a Comment