Since confidentiality is an issue, smartphone transmissions signals can be hacked by accidental broadcast. Third party snooping, can hack blue tooth signals that transmit confidential information. Stolen phones create a threat to business and the community through fraud. Training employees can be a measure to minimize the risks that poses a threat to cell phones. Some measures to help in information security could be aimed to data encryption, passwords, software, network security solutions and service companies offering voice encryption.
Along with my attention, the author also grabs fear right out of me. Instead of stating the facts about tracking citizens through their cell phones, the author appears to be standing right in front of my face, warning me about the facts. This article was also easier for me to follow. I thought that the first article said companies could find you wherever you are. After the second article told me you had to be in range of a tower, I went back to the first article and noticed my assumption was wrong.
In 2007, 81 percent of the U.S. population owned a cell phone, a 20 percent increase compared to 2002.” In a current figures according to MSNBC Sullivan (2008), “The cell phone industry, ... has some 137 million paying customers in the United States…” The growth for phone ownership is off the charts and along with the enormous sales of the units, technology has kept pace. Cell phones of 2008 have gadgets integrated to make them more desirable and can be as powerful as a laptops with some accessories. Cell phones include a variety of useable devices ranging from cameras, GPS, text messaging, mp3 players and access to the internet. With all this built into a device that will fit into the palm, According to Compu-KISS (2008),
• Even more seriously they may be groomed by individuals or paedophile rings that use the internet and mobile technology to identify and target potential victims. Sexual predators may use fake information to get close to children or young people i.e. a false name, age and information. Dr Tanya Byron outlined in her 2008 report ‘Safer
Communications revolution – number of telephone doubled/ number of radios increased from 60,000 to 10 million. Stock market – Wall Street boomed (a 'bull' market) with many people buying shares to make a profit. Many new businesses were 'floated' on the stock market such as skyscrapers, highways and urban development. Skyscrapers became a symbol of wealth and boom in America in 1920’s this was showing that the prosperity was shared across the country The industry boomed for several reasons such as; Population growing rapidly increased demand for consumer goods. Abundant raw materials such as coal iron and oil allowed cheap
Using one or more ethical theories as a framework, discuss the following: Should companies be responsible for the unemployment caused by their information systems? Since the 1980’s there has been an exponential growth in technology. The 1980’s and 1990’s saw the release of the personal computer, cds, mobile phones and most importantly the internet. It did not take long for these technologies to become integral in the way that most companies across the world operated. According to Reisinger (2012) the adoption of mobile platforms of computing is “ten times greater than PC adoption at that technology's rapid-growth phase in the 1980s.” The growth in these technologies has allowed many companies to utilise the use of information systems that reduce the number of people the company needs to employ.
For example, the average age of online gamers are 25-44 years of age, which includes about 95 million people or more that play online games. Therefore, the online gaming industry will continue to grow as the access to broadband internet expands and the variety of games increases. In America’s gaming industry, there are about 100 companies sharing combined revenue of 11.8
Identity Theft or Identity Fraud As a result of the expansive evolution of technology and its easier than ever access, (the Internet) identity theft has grown significantly over the last two decades. Identity theft is now the fastest growing crime in the United States. (Federal Trade Commission) A. Identity theft has grown rapidly and significantly over the past two decades. 1.
A person would probably not be able to walk a block or more without seeing at least 3 cell phones. The explosion of cell phones mp3’s and computers is massive. Every year cell phone companies launch at least 15 new phones and gadgets for people to use. And companies like dell and Macintosh are always adding new features to computers. The technology industry is a multi billion dollar market, and it is a worldwide business.
CyberTurfing is the online equivalent of Astroturfing, differentiated by the online medium in which the deception is being spread. CyberTurfing is often harder to detect due to the lack of transparency that exists online. The global reach of the internet also increases the scope of people that may be deceived. For example, CyberTurf messages are being spread on Twitter through the use of Honey Pots; fake accounts that are preprogrammed to tweet, reply and direct message users, whom usually have great influence on the platform. Usually, these accounts are easy to detect but more advanced Honey Pots have shown emotional intelligence capabilities like that of humans.