StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Impacts of Mobile Devices on Cyber Security - Assignment Example

Cite this document
Summary
The study “The Impacts of Mobile Devices on Cyber Security” aims at finding out the impacts of mobile devices such as smartphones, tablets, and iPads, on cybersecurity. This is because the increase in the number of mobile phone users to 4 billion worldwide also increases the risks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.8% of users find it useful
The Impacts of Mobile Devices on Cyber Security
Read Text Preview

Extract of sample "The Impacts of Mobile Devices on Cyber Security"

The Impacts of Mobile Devices on Cyber Security The Impacts of Mobile Devices on Cyber Security Introduction The study aims at finding out the impacts of mobile devices such as smart phones, tablets, and iPads, on cyber security. This is because the increase in the number of mobile phone users to 4 billion worldwide also increases the risks associated with the practice (Harknett, & Stever, 2011). The increase in mobile phone threats arises from the fact that the current mobile phone devices in the industry perform similar functions to computers. These numerous uses of mobile phones leave information technology managers unable to manage the soaring threats, yet they may have high impacts on individuals and companies (Rose, 2003). The research will study the impacts of mobile devices on cyber security in Banda town that is located in the United States. This town is expected to have numerous users because it is located in the US, which has a high population of about 312 million (Shabtai, Fledel, Kanonov, Elovici, Dolev, & Glezer, 2010). The study will concentrate on colleges and universities in the region, because these institutions have numerous students who use mobile devices both at school and at home. The school administrators also use mobile phones to communicate with teachers and other supporting staff. Rationale of the Study Gaoyue (2013), the senior colonel of Nautilius Institute for security and sustainability, argues that the common uses of the internet include purchasing items in online stores, downloading music, sharing information oN social media platforms such as Face book, Twitter, and LinkedIn, paying electricity and water bills, and accessing television networks. These uses indicate that consumers post their personal information such as name, income, location, and credit card number on the cyber space. This information is personal meaning that it should only be accessed by the owners and other authorized people. However, since mobile phones perform functions that are similar to those of computers, it means that the information of consumers faces the threat of lack of privacy due to cyber threats. The cyber threats include viruses, malicious software, hacking, exposure of secrets, and network fraud (Wright, Dawson, & Omar, 2012). These cyber threats have impacts on consumers and companies that use the mobile devices to share information and purchase goods. Therefore, it is essential to study the impacts of the threats that mobile device users face; this will help in advising companies and consumers on how they can protect themselves from the hazards. Significance of the Research The results of the study will enable teachers and students to identify the risks that they face when using mobile phones and computer tablets. An understanding of the threats that users face when sharing information on cyber space will enable the institutions and students to be interested in securing their information on the internet. This will also enable the schools to gain efficiency in their functions because they deal with numerous students whose information may be unmanageable if handled manually. Students and administrators will also understand the reason why they should not share their confidential information openly in social media. This is because social media, which is the most widely used, and it may also, be the most harmful (Kelly, 2012). Apart from helping students and schools in Banda region, the results of the study will also increase the knowledge of cyber security to readers of the project who are interested in the topic. The readers are mainly information technology technicians will understand the nature of insecurity in cyber space and formulate new techniques of reducing the hazards. Researcher Presupposition This topic interests me because I have a passion for discovering new ideas in my field of study. Since cyber space is a virtual world, I am interested in understanding the security in this place so that I can inform the society and my fellow information technologists about this issue. I believe in the theory of egoism, which argues that a people do what interest them more than other things (Nardi, & O’Day, 1999). Although this theory has been criticized for encouraging crime among those who are interested in it, I believe that it should be taken more positively because it motivates people who aim at improving the welfare of the society. The fact that I am a scholar has also motivated me to pursue this topic so that I can help the society in solving challenges. Literature Review This section reviews the available literature about cyber space security. The study will analyze the previous literature review that was carried out in previous classes. The analysis will enable the research to identify concepts and issues to consider during the actual study. The Internet and Identity Theft According to Sund (2007), identity theft is one of the security threats that exist in cyber space. Identity theft is a situation where people pretend to be others by using their information (Hurlburt, Voas, & Keith, 2010). Sund (2007) argues that this threat arises when consumers use mobile devices that are not registered. This means that the registration of mobile devices enables security and mobile agencies to identify the users of certain devices. Registration of the devices enables consumers to use them only for lawful purposes because disguising personality is impossible in this case (Postman, 1992). Sund (2007) also argues that the main impact of identity theft on consumers include financial loss. Criminals who disguise their identity in mobile cyberspace are mainly money oriented meaning that they use the information of the people that they steal to benefit themselves financially. An example of identity theft occurs when a person steals the credit card and mobile phone belonging to an unregistered user. The thief steals the personal information of the victim from the mobile phone and uses it to contact that person’s bank. The thief then withdraws money from the credit card and uses it to pay for personal needs (Eeten, & Bauer, 2009). Sund advises governments to ban the use of unregistered mobile devices because it will reduce cases of identity theft and financial loss on victims. Sund fails to identify the fact that a mobile thief may still use the information of others for financial gains even when devices are registered. Threats of Mobile Services Threats that face mobile devices include viruses and malicious software from unregistered companies (Brechbuhl, Bruce, Dynes, & Johnson, 2010). Hazards such as malicious software invade mobile devices and extract personal information of users. Drew (2012) argues that the threats of mobile services mostly face companies that use accounting software such as quick books to record transactions. Drew (2012) argues that the threats arise from the use of cloud computing and linkages of business networks. The researcher fails to identify the impacts of viruses and malicious software in accounting. The impacts of these threats to companies that use mobile devices in accounting include loss of information of stakeholder such as creditors and debtors. This is because the viruses interfere with the efficient working of the device, and they crash the mobile phones, iPads, and tablets. The crushing occurs when the virus destroys the original operating system of the devices. The loss of information on the devices by companies leads to financial losses. Companies that trade with dishonest debtors and creditors may incur higher costs in repaying debts because of the threats that face mobile services (Ruggiero, 2011). E-commerce and Social Networking Applications E-commerce refers to the trade that takes place electronically between buyers and sellers of items (Wright, Dawson, & Omar, 2012). The companies that carry out this business have websites where users shop for products that interest them and purchase online. Social media, on the other hand, refers to applications such as Face book and Twitter that consumers use to share personal information with friends and families. The use of e-commerce and social networks exposes users to privacy threats from unknown locations. Cyber criminals use Uniform Resource Locators (URL) to track consumers and their information (Kelly, 2012). According to Alberts and Hayes (2003), most of the social media users fail to determine the trustworthiness of URLs before clicking on them, and this leads to high theft of consumer’s information from these sites. Consumers lose their private information by clicking on the links, and the stolen data may be used for online criminal activities such as hacking. This exposes victims to the threat of being imprisoned accidentally (Drew, 2012). Consumers who use e-commerce also face the threat of information theft and loss of finances. Alberts and Hayes (2003) fail to identify the threats of e-commerce and social media that face businesses. The threats that face companies include financial losses, negative publicity, and loss of sales, profits, and market share. Smart Phones and Cyber Attacks Smart Phones are mobile phones that perform similar functions with computers; for example, the devices download music and pictures, and they send and receive emails using programs such as opera mini (Trainor, Ahamad, Alperovicth, Conti, & Davis, 2012). The devices also have large memories that support numerous applications such as Microsoft office word, power point, and online games such as motor car and bike racing. Ruggiero (2011) argues that smart phone rarely secure their devices using anti-virus and firewall software, and some of the devices do not encrypt the data of users. These events expose the users of mobile phones to threats of malicious applications and software, which may lead to the loss of the devices. Cyber Crime Mobile devices also face the risk of cyber crimes such as hacking and access to pornographic materials (Gaoyue, 2013). Hacking takes place when individuals manipulate a network to find its weaknesses. After determining the weaknesses of a network, hackers access information of consumers without authority and they may alter it for their benefits. This is similar to pornography where the providers of this illegal service sell materials for financial gains. The effects of these actions are similar to those of social networks and they include loss of finances and personal information. Pornography also exposes the victims to imprisonment for breaking of the laws of the country because it is an illegal business (Kelly, 2012). Research Design This section explains how the research will collect, analyze, and present data. The methods used determine the validity and reliability of the conclusions of the research. The research will be quantitative, meaning that it will collect primary data, which will be used for analysis and conclusion from the field. The research will use quantitative analysis because this method ensures that there is no bias in the analysis and conclusion. Bias is eliminated in the quantitative research because the study analyzes information from third parties. This means that the results of the study are free from the researcher’s judgment. The limitation of quantitative research is the lack of cooperative respondents (Bernard, 2013). The researcher in quantitative study is responsible for collecting information from respondents. The researcher prepares the questions to ask the respondents. After collecting information from the field, the researcher will analyze the data and write a report that will consist of the findings, conclusions and recommendations (Christensen, 2013). Data Collection Strategies The research will use questionnaires to collect data. A questionnaire is a document that contains questions that respondents answer independently. The questionnaire will consist of open and closed-ended questions. The open ended questions are those that allow respondents to give their opinion while closed-ended questions are those that give alternative solutions. Respondents have no freedom to give their opinion in closed ended questions (Bernard, 2013). The researcher will collect data from college and university students in Banda by administering them with the permission of school administrators. The researcher will collect the data with the help of two or three friends who will help in carrying the questionnaires and clarifying questions to students who will not understand some concepts. The study will ensure that that the results are valid and reliable by choosing students and administrators to fill in the questionnaires randomly. This is because random sampling involves selects respondents by chance, meaning that it eliminates bias (Christensen, 2013). Data Analysis Strategies The research will analyze data using coding, a method that assigns numbers to the alternative solution in the questionnaire. The analysis will check for consistency of the information provided by respondents to ensure that it is reliable. This will be by comparing the answers given in different questions. The respondents will be classifies into students and various administrator groups so that the analysis can determine the consistency of the results. This ensures that the analysis is valid and reliable (Bernard, 2013). Ethical Considerations The research will experience ethical issues such as privacy, consent, and deception from respondents (Bernard, 2013). The study will ensure that it maintains the privacy of respondents by not publishing it in the report. The study will also use the information of respondents only for the analysis. The research will obtain consent from various school directors before administering questionnaires. The study will also obtain permission to use certain locations for administering the questionnaires to the respondents in the various schools. While obtaining consent from school administrators, the research will explain the reason for the study and how the finding will help in making conclusions. This will ensure that there is no deception. The study will also include a short letter on the questionnaires that will explain the reason for obtaining data from them to ensure that they take part in the research without fear (Christensen, 2013). References Alberts D.S., & Hayes, R.E. (2003). Power to the Edge: Command and Control in the Information Age. Washington: Command and Control Research Project, Office of the Secretary of Defense. Bernard, H. R. (2013). Social research methods: Qualitative and quantitative approaches. Los Angeles: SAGE Publications. Brechbuhl, H., Bruce, R., Dynes, S., & Johnson, E. (2010) Protecting Critical Information Infrastructure: Developing Cybersecurity Policy. Information Technology for Development, 16(1). 83-91. Christensen, L. B. (2013). Research Methods. Harlow: Pearson. Drew, J. (2012). Managing cyber security risks: Mobile and cloud open doors to opportunities threats. Journal of accountancy, 31(5). 566-566. Eeten, M., & Bauer, J. (2009). Emerging Threats to Internet Security: Incentives, Externalities and Policy Implications. Journal of Contingencies and Crisis Management, 17(4). 221-232. Gaoyue, F. (2013). Threats to cyber space and responses. Nautilius institute for security and sustainability. Retrieved from http://nautilus.org/napsnet/napsnet-special-reports/threats-to-cyberspace-and-responses/#axzz2lGPbPCfw Harknett, R., & Stever, J. (2011). The New Policy World of Cybersecurity, (N. Roberts, Ed.). Public Administration Review, 455-460. Hurlburt, G., Voas, J., & Keith, W.M. (2010). Mobile applications: The fifth cycle. IT Professional Magazine, 12(6), 56-60. Kelly, B. B. (2012). Investing in a centralized cyber security infrastructure: Why "hacktivism" can and should influence cyber security reform. Boston University Law Review, 92(5), 1663-1711. Nardi, B. A., & O’Day, V. L. (1999). Information ecologies: Using technology with heart. Cambridge: MIT Press. Postman, N. (1992). Technopoly: The surrender of culture to technology. New York: Vintage Books. Rose, E. (2003). The errors of Thamus: An analysis of technology critique. Bulletin of Science, Technology and Society, 23, 147-156. Ruggiero, P. (2011).Cyber Threats to Mobile Phones. Pittsburgh: United States Computer Emergency Team. Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., & Glezer, C. (2010). Android: A comprehensive security assessment. IEEE Security & Privacy, 8(2), 35-44. Sund, C. (2007). Towards an international road-map for cyber security. Online Information Review, 31(5), 566-566. Traynor, P., Ahamad, M., Alperovitch, D., Conti, G. & Davis, J. (2012). Emerging Cyber ThreatsReport 2012. Atlanta: Georgia Tech Information Security Center. Wright, J., Dawson, M.E., & Omar, M. (2012). Cyber Security and Mobile Threats: The Need for Antivirus Applications For Smart Phones. Journal of information systems Technology & Planning, 5(14). 40-60. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Impacts of Mobile Devices on Cyber Security Assignment - 1, n.d.)
The Impacts of Mobile Devices on Cyber Security Assignment - 1. Retrieved from https://studentshare.org/information-technology/1624394-proposal
(The Impacts of Mobile Devices on Cyber Security Assignment - 1)
The Impacts of Mobile Devices on Cyber Security Assignment - 1. https://studentshare.org/information-technology/1624394-proposal.
“The Impacts of Mobile Devices on Cyber Security Assignment - 1”, n.d. https://studentshare.org/information-technology/1624394-proposal.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Impacts of Mobile Devices on Cyber Security

Analyze the impact of technology on a field of study of your choice

The Impact of mobile devices on cyber security The Impact of mobile devices on cyber security The widespread popularity of mobile devices such as Smartphones, tablets, iPhones, and iPads has made modern life more convenient and productive.... Although these devices have become an integral part of the modern life, they raise certain potential challenges to the cyber security.... Despite numerous advantages including high productivity and greater convenience, mobile devices raise severe threats to cyber security....
5 Pages (1250 words) Essay

Cyber Culture and the Digital Age

Subject: 16 August 2013 cyber Culture and the Digital Age With the advent of computer and internet technologies, the modern humans rely heavily on these media for entertainment, education, business as well as interacting with one another through means of social networking.... cyber culture can be perceived as a “new cultural model” that emerges from the widespread use of internet, which has changed the “patterns of social relation, self identify and community” (Ardevol 2)....
7 Pages (1750 words) Essay

The Impact of Mobile Devices on Cyber Security

The author of this essay "The Impact of mobile devices on cyber security" investigates the issues of cybersecurity....   The first impact of mobile devices is the making of cyber security a complex venture with regards to the development and enforcement of effective strategies.... In fact, a majority of modern-day employees prefer working from their personal mobile devices, a trend referred to as “bring your own device” or BYOD by Drew (2012, 44)....
4 Pages (1000 words) Essay

Impact of Technology on Society

In mobile computing, micro sensors are utilized for capturing health data, as they are small size intelligent devices that use works on low power consumption.... Secondly, wrist devices are also used for monitoring health data by integrating sensors, electronic circuits, display… Thirdly, the health care cloths are flexible and can be equipped with the body, as they are stitched from textile technologies, such as fibers equipped with Lastly, health smart homes are utilized instead of separate medical facilities, resulting in significant cost savings....
7 Pages (1750 words) Research Paper

The Impact of Mobile Devices on Cyber Security

hellip; The widespread popularity of mobile devices such as Smartphones, tablets, iPhones, and iPads has made modern life more convenient and productive.... This paper tells that the major advantage of modern mobile devices is that they can be used to perform those daily activities even while the users are on the move.... It is observed that today mobile devices proliferate in corporate environments as these devices can be easily connected to company networks....
5 Pages (1250 words) Essay

The Impact of Mobile Devices on Cyber Security

hus, at such an age where The paper “The Impact of mobile devices on cyber security" is a cogent example of a term paper on technology.... Therefore, this discussion seeks to analyze the impact of mobile devices on cyber security, with a view to establishing whether mobile devices have served to increase or to reduce cyber security threats.... ConclusionIn conclusion, therefore, the impact of mobile devices on cyber security is that it has served to increase cyber security threats....
3 Pages (750 words) Essay

The Impact of Mobile Devices on Cyber-security

"The Impact of mobile devices on cyber-security" paper argues that mobile devices such as smartphones are the most abused by hackers, thus, they need not to be used in storing organizations' information.... In connection to this, the paper will expound on the impact of mobile devices on cyber-security.... By 2013, over 80% of the people in the whole world were using mobile phones and currently, the number of mobile devices in the world exceeds 6 billion....
5 Pages (1250 words) Coursework

Impact of Telephone on Society

Conclusively, the contribution of mobile computing assists and supports the caregivers and health care providers to access patient information on an immediate basis and prescribe, treat a patient regardless of their geographical location, genre, race, religion etc.... In addition, all the discussed healthcare technologies are incorporated with devices that can communicate wirelessly along with high-value delivery, flexibility, quality in terms of health care and opportunity for the patients to cure early....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us