Abstract
This article aims to highlight some of the stakes and challenges associated with the security of personal data when using the phone, which has become a preeminent tool of our time (private). Dealing with clones underscores the uncertainty of data confidentiality. This article has two parts. Question and challenges regarding clarification of concepts and data security apart from the introduction and the conclusion.
Reference
- Atlan, H. et al., 1999, Le clonage humain, Paris, Edition du Seuil.
- Caelen, J. et Couraz, J., 2009, Interaction homme-machine multimodale : quelques problèmes. Bulletin de la communication parlée n°2.
- CARON, A. et CARONIA, L., 2005, Culture mobile. Les nouvelles pratiques de communication, Montréal, PUM
- Joëlle COUTAZ, 1990, Interface homme-ordinateur : conception et réalisation, Paris, Dunod.
- MONTAGUT, J., 2008, Le clonage, Paris, Edition Idées reçues, 2008.
- www.celltrackingapps.com
- www.commentcamarche.com
- www.googlescholar.com
- www.theconversation.com
- www.wikipedia.ord
- www.lipn.univ-pparis13.fr
Carlin MBUNDANI WATALU
Bachelor in Information and Communication Sciences, Multimedia Researcher. DEA student at the University of Kinshasa, Faculty of Letters and Human Sciences, Department of SIC, Congo
Received: 28-11-2022, Accepted: 05-01-2023, Published Online: 22-02-2023