StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Use of the Cellular Technology - Essay Example

Cite this document
Summary
The author of the following paper "The Use of Cellular Technology" will begin with the statement that communication is a vital aspect of our daily lives. For both business and personal use, each individual is in need of a means of communication…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful

Extract of sample "The Use of the Cellular Technology"

APPLIED COMMUNICATION (SOCIAL MEDIA) Name of Student Institution Introduction Communication is a vital aspect in our daily lives. For both business and personal use, each individual is in need of a means of communication. The need for communication has led to the invention and advancement of reliable and available information technology. From the simple landline telephone communication, to video conferencing, it is safe to note that communication has come a long way. Over the decade, especially the telephone industries, great advancement of this technology have been witnessed (Solove Rotenberg & Schwartz 2006). The cellular phones have taken over in terms of communication and they are here to stay at least for the near future. In addition, cellular, or rather mobile technology has grown and smart phones are the tip of the technology. The use of the cellular technology is great thanks to their mobility, reliability and finally yet importantly their connectivity especially to the internet. The use, or rather access to the internet was limited to computers with an Ethernet port or a wireless adapter within an area of coverage. However, the use of GSM technology has enabled handheld GSM and CDMA devices to access the internet if their carriers offer these services. The availability and use of the internet has played a major role to the spawn of social media. In addition, the internet is an alternative and affordable way of communication as opposed to telephone calls. Background of Case Social media is the backbone for building new or extending social relations or social network among individuals. People who share common interests, hobbies, activities, and or real life connection can communicate and share their daily experience via social media (Armistead, 2011). The representations of individuals are via user profiles. Individuals create pre-structured profiles to respective social websites by filling in detailed information about their lives. Secondly, they invite or are invited by other users to become friends and socialization begins (Armistead, 2011). To the new generation, social networking is perceived as a new phenomenon and most of this new generation cannot imagine a life without it. From a wider perspective, social media is not just Twitter and Facebook. The history of social media backdates back to the invention of the internet that started as basic computer networks. After the invention of the computer network, and ultimately the internet, communication started. Emails were the fore front mode of communication facilitated by the internet. In basic terms, email involves sending of mail in an electron manner. However, in today’s era, email can involve sending any multimedia content electronically as mail. Other than email, UseNet, the World-Wide-Web (WWW), blog sites, and AOL were other form of social media back in the days. In basic terms, social media are portals in which users can communicate with online. During this time, social media was not a common term and few cases would people socialize on these portals except for emails (Bryfonski, 2012). From the early 2000, Friendster and Myspace sprung up and were labeled as ‘the social media’ sites. They were all the rage but still not as popular as when Facebook and Tweeter took over in the years 2004 and 2006 respectively. It was after these two social websites that the social media began to change the world. As of now, almost ten years after the introduction of these social media portals it is unbelievable that nothing is yet to supersede them in terms of social media. Ideally, Facebook revolutionized the world of social media. It is still the turning point of social media and more people all over the world were looking to open a Facebook account. Two years after Facebook came Tweeter. Unique from Facebook, Tweeter brought with it the concept of real-time services. Ideally, users could post and or share their thoughts, news, or anything and instantly it would be broadcasted. The same concept is available in Facebook with their Live Feed concept of Real-time sharing. These offers the availability of information shared on a real time basis thus making connected friends updated with their peers (Qualman, 2009). Evolution of Privacy Information is vital and the need to have it is vital as well. The world has been reduced to a global village. This implies that information is readily available at the click of a button once it goes online. The ideal term for these is greased data. The availability of this information can and is both useful and a threat. The use of social websites is dependent on the type of the website and the services it offers. Ideally, social websites range from dating websites to networking websites. Different individual have different accounts to different social media websites. The use of social media websites is dependent on an individual and the type website they have subscribed. Ideally, most if not all social media websites are accessible from every part of the globe. The WWW ensures that all online users have access to these social websites (Qualman, 2009). The sole target of the social website is to practically link the most number of individual all over the world. As for usage of these social websites, age is always the factor to be considered. Most adult websites and dating websites insist those individuals who signup be of legal age. The legal age limit is mostly 18 years of age. However, most users, or rather subscribers to these websites are of different age. With not adequate measure to authenticate the age of new and existing users, most if not all social website have an end user agreement that users have to agree to in order to access their services. This is mostly done by the use of a checkbox or radio button that has to be checked or clicked, respectively, before a use can submit their signup information to these websites. Here after, the user is granted access via their profile to the social media. Practically any individual can sign up to any of the available social media website provided they have an internet connection (Himma, 2007). The manner in which these individuals use these social websites is utterly in their hands. The word double-edged sword comes into play at this moment considering that any individual does not monitor the users or rather subscribers. In most cases, users have the ability to communicate with other users and this brings the perception of a completely new virtual world. Different individuals have different motives as far as the use of social media is concerned. There are the uses who just want to network, share ideas, and information, meet, and make new friends. On the downside, there are individuals looking to prey on other individuals. This brings about the issues of cybercrimes. However, cybercrimes is a major term but ideal in any online related crime (Alberta, 2007). Social media offers a way for individual to interact and what better way to break geographical barriers than to use them, social media for communication. Crime minded individuals could plot their crimes via communication on these websites. Buglers can monitor and even communicate with their targets on social media and even get insight of their whereabouts. Sexual offenders can lure their targets using these social media, and the list is endless. Bottom line, the individuals’ information from these social media is not credited and anybody can be whoever they desire to be on social media. No one accounts for all the information that is provided by social media. However, most social media employ a verification technique in which users verify their identity by use of email address and or mobile numbers. After that, no additional verification technique is available. However, the hands of the level of information online users share are dependent on the users. Most social media employ security measures in which users can limit who had access to their profile and to what information they can access. In addition, these social media go to length to ensure other individuals who are not intended to do so do not easily access user accounts. However, security, especial information security is not full proof (Freeman & Peace 2005). Backlash The effects of social media are both positive and negative. Ideally, the main principle behind social media is to connect and ensure individuals remain connected to one another. Peers, friends, family, and or colleagues can share information regardless whether it is personal or work related. Therefore, the ability of social media to enable or rather facilitate the above is a positive effect. However, among the major negative effects of social media is addiction. Users can easily get addicted to these social media. Affected users spend most of their time on these websites and neglect from pursuing or doing any other tasks. In addition, addicted individuals mostly suffer sleep deprivation and all the implication that come with it. Furthermore, children subscribed to these websites, the contents posted by other individual might contain scenes of violence and or sex. These can have vast negative effects on kids and teenagers. In addition, this exposure of indecency adds up to a negative impact on the entire society. Finally yet importantly, users share information that might pose threats to them. All cybercrimes are based on social engineering and the information on these websites can be used against individuals are their related peers (Malone, 2005). Business on the other hand have benefited from these social networks. From recruiting to advertising, business organizations conduct part if not all of their business online. The coverage of major social websites is global and thus businesses have a global market share at their hands to exploit. This saves on advertisement and communication costs of businesses, which is greatly encouraged at all times. Nonetheless, businesses have also suffered greatly at the cost of social websites. The targeted customers might not be potential customers and hence many human resources can be wasted in attending to these customers who might not be serious in doing any form of business. In addition, most cybercrimes are organized on social websites for example the Anonymous group of hackers. They had all their plans and recruitment on social websites and finally the attacks were on targeted businesses. Finally, as discussed above, addiction can lead to individual wasting time on social media. In business, if employees waste time resources on these social media, this implies that no business is conducted and the business suffers a loss at the end of the day (Freeman & Peace 2005). The legal implications of social media are enormous. Ideally, the issue of copyright infringement tops the list. Individuals tend to copy and share information and multimedia they find on the internet freely. This is done without the knowledge of any copyright protection covering the information or multimedia. Despite many cases going unpursued, the legal implications, if followed on the issue of copying and sharing online content can be of great negative effects to either an individual or an organization. Other than copyright infringement, posting or rather sharing content is common on these social websites. Individual can post inappropriate content on the social media that can land them in trouble with the law. In addition to sharing content, social media provide the means for people to share their thoughts to others. This can be through posting or tweeting it publically on their walls or via IM. Bottom line is individuals feel a sense of privacy and in the dark when communicating via social media especially via I. this brings out the honesty in them to speak up their minds to their peers (Malone, 2005). Ideally, this, when exposed can and has landed both individuals and organizations in legal trouble. Finally yet importantly is the issue of privacy. Privacy as far as information is concerned is a major and very sensitive topic. The data protection act is explicit on how to handle information. However, information in itself if hard to handle and this brings about the severity of the sensitivity of privacy. Some employees are not aware of the data protection act and what it entails. However, legal actions can be pursued if any of the data protection acts are broken. The future impacts of social media are unclear. However, it is without a doubt that these impacts will both be negative and positive. Even in the near future, information will still be vital in our daily lives. Ideally, the social media has revolutionized the way we communicate and interact. The use of social media can only grow bigger as more user functionalities are added to existing platforms to keep up with the demand. Technology advancements will definitely pave way for new way of doing things. This will imply that newer ways of committing social media related crime would arise (Roythornes, 2011). Resulting Impact Information is power and with it comes responsibilities. However, in an attempted to safe guard ourselves from all the negative implications associated with social media, we should be educated on their threats. Researching on existing and upcoming social media related crimes is the ideal step to safeguarding ourselves. Secondly, there are software products that help in safeguarding individuals from computer crimes not necessarily social media related crimes. These software products, such as, antivirus, internet security, and any other security software can be utilized to minimize potential threats. Furthermore, we should avoid subscribing to random, and or rather not common social media. Most importantly, individuals should be cautious about the information they share to others on social media. Knowing that any information provided by other users might not necessarily be true is vital. Finally is the non-discloser of any account accessibility information to anyone. The sharing of information is common in social media and over the years, users have always shared security threats and or breached pertaining social media. It is advised that users read these messages and try to authenticate their validity when they come across this information (Malone, 2005). In order to protect ourselves, it is vital that we limit the information we share about others and ourselves on social media. In addition, being informed on the current legal issues pertaining the social media we are signed to is important. Different social media have different terms and conditions of use. It is mandatory that all users read and understand all the user agreements on the social media they are have subscribed. Knowing and understanding of the data protection act is important as well. The data protection act gives an overview of how data and information should be handled by both individuals and organizations. Knowing how the information you have shared with other can be used and cannot be used is mandatory. This offers a sense of in control on all our actions on these social media (Wood & Solomon 2009). Privacy is among the most sensitive aspect in relation to information. The level of privacy in offered on social media varies. Most social media encourage the use of personal information for individuals to build their profiles. Access to this information from others and any other information they share brings about the aspect of privacy. It is without a doubt that the information we put on our profiles can be accessed. Social media employ security aspects on their applications to safe guard user data and information. These social media host once this information, the use to which it can be used if limited by the data protection act. However, the issue of control of data and in which users’ data can be retained and or disseminated to other third parties. A good example was when user email addresses were spammed after the mail addresses were retrieved from Quechup. Bottom line is there are numerous factors that can undermine data and information privacy on social media. Primarily, the level or amount of information that we disclose to these sites is one. Secondly, the level of protection offered by these social media on the data collected from their users can be minimal (Roythornes, 2011). This can lead to leakage of sensitive information if the security the social media s compromised. Finally yet importantly, third parties frequently acquire and use personal information from most social networks. As for the current generation, it is vital that they be aware of all potential threats prone to social website and the extent to which they can be affected by these threats (Wood & Solomon 2009). Conclusion Social websites have revolutionized our modern way of interactions. They offer an escape route to different virtual world that we can go and interact with new and old peers at the click of a button. It is hard to imagine a life without social media now that many have experienced it. However, with all these ability to interact comes a greater responsibility. Personal information is vital and the need to safe guard it starts with ourselves. We should take the first initiative to safeguard ourselves and the information we share to others on these social media. References Solove, D. J., Rotenberg, M., & Schwartz, P. M. (2006). Privacy, information, and technology. New York: Aspen Publishers. Armistead, L. (2011). Proceedings of the sixth International Conference on Information Warfare and Security: Academic Pub. International Ltd. Alberta Children and Youth Initiative. (2007). Information sharing guideline. Edmonton, Alta.: Alberta Children and Youth Initiative. Qualman, E. (2009). Socialnomics: How social media transforms the way we live and do business. Hoboken, NJ: Wiley. Bryfonski, D. (2012). The global impact of social media. Detroit, MI: Greenhaven Press. Wood, N. T., & Solomon, M. R. (2009). Virtual social identity and consumer behavior. New York: M.E. Sharpe. Himma, K. E. (2007). Information ethics. Bradford: Emerald. Freeman, L., & Peace, A. G. (2005). Information ethics: Privacy and intellectual property. Hershey, PA: Information Science Pub. Roythornes Solicitors. (2011) The employment law dangers of Social Networking. http://www.opportunitypeterborough.co.uk/bondholder/events/the-employment-law-dangers-of-social-networking (Retrieved 4 May 2013). Malone, S. (2005) CLARIFICATION: AOL Instant messenger users waive right to privacy http://www.pcpro.co.uk/news/70262/clarification-aol-instant-messenger-users-waive-right-to-privacy (Retrieved 4 May 2013) Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Applied Communication Essay Example | Topics and Well Written Essays - 2750 words, n.d.)
Applied Communication Essay Example | Topics and Well Written Essays - 2750 words. https://studentshare.org/media/2061840-applied-communication
(Applied Communication Essay Example | Topics and Well Written Essays - 2750 Words)
Applied Communication Essay Example | Topics and Well Written Essays - 2750 Words. https://studentshare.org/media/2061840-applied-communication.
“Applied Communication Essay Example | Topics and Well Written Essays - 2750 Words”. https://studentshare.org/media/2061840-applied-communication.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Use of the Cellular Technology

4G Cellular Communication

The technology launched the use of circuit-switched data communication that enhanced use of the digital communication rather than the analog system.... The fourth generation cellular communication (4G) is an advanced technology that has introduced wireless communication.... The technology provides high speed and quickens transmission of data from one place to another, hence making mode of communication be fast.... The potential abuse of the technology occurs when individuals fail to follow the regulations provided by the technology....
6 Pages (1500 words) Research Paper

Cellular Network and Smartphone Application Security

the cellular networks quickly worked their way into the arena and today it is the most competitive field.... This paper ''Cellular Network and Smartphone Application Security'' discusses that as the world stepped into the 21st century, cell phones became a common technology for laymen.... Types of Cellular Networks 2G Stands for second-generation wireless telephone technology it's known as Personal Communications Service, or PCS, in the United States....
7 Pages (1750 words) Report

Cellular Networks Comparison

Some the cellular networks include; UMTS, EV-DO, LTE, WiMax and Satellite (Kostas 38)2.... LTE is still on Continual architecture network improvement radio technology and its functional component was tested publicized and the achievement of a 4G trial where it succeeded an extreme packet its strength broadcast rate of about 5 Gbit/s in the downlink consuming 100 MHz frequency bandwidth to a wireless place stirring at 10 km/h while LTE weakness might be distortion as well as streaming signal....
5 Pages (1250 words) Essay

Wireless Technology

Telephony is the construction, development and application that deploys communication and information between two or more parties through the use of wires and the device known as the telephone.... Mobile telephony is similar but without the use of ‘wires'.... These cellular phones offer services that are made possible by cellular phone companies that offer carrier technology which enables information transfer through sound, data and even visual information....
4 Pages (1000 words) Assignment

Cellular Phone Use While Driving: A Death Sentence

This is part of the cellular phone's appeal.... Brooklyn, Ohio; Hilltown, Conshohocken, and Lebanon, Pennsylvania all have banned the use of cellular phones while driving.... ith technology vastly growing, we can't help but acknowledge the drastic risk that is beginning to form.... arvard Center for Risk Analysis was commissioned by AT&T Wireless Communications to run a risk-benefit analysis on cellular phone use while driving....
4 Pages (1000 words) Essay

Cellular Networks and Wireless Data Applications

They are:- Global System for Mobile Communications (GSM' and- Code Division Multiple Access (CDMA)The network technology used in both the above varies.... In order to select a preferable network technology that suits the individual needs, understanding the difference between both technologies is very important.... GSM technology became popular in America whereas the CDMA technology gained popularity in the outer parts of America and various other parts of the world....
11 Pages (2750 words) Essay

Mobile Plus Group Ltd market analysis

iving them the freedom to use at most, three different Networks at once to contact their clients without having to switch phones offers efficiency and savings from the costs of buying another cellular phone.... In this case, business people tend to switch from one SIM to the other just to avail of the promos whenever they use their cellphones to call their wide array of clients who use different Networks....
7 Pages (1750 words) Research Paper

Mobile Addiction as a Contemporary Problem

Features for internet access that facilitate use of social media,… One of the effects of addiction to mobile technology, according to a study by Yen et al.... Features for internet access that facilitate use of social media, games, text messages, and voice calls are examples that promote addiction.... percent of the investigated adolescents had severe Addiction to mobile technology April 16, Addiction to mobile technology Mobile addiction is a contemporary problem as children, adolescents have wide access to mobile devices, and producers of the devices continue to invent and incorporate features and applications that capture users....
2 Pages (500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us