The effects of mobile devices on cybersecurity - Essay Example

Comments (0) Cite this document
Summary
According to Musara and Fatoki (2010), in order to make optimum utilization of time, modern people increasingly rely on the convenience and flexibility provided by advanced technologies. In…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
The effects of mobile devices on cybersecurity
Read TextPreview

Extract of sample "The effects of mobile devices on cybersecurity"

Download file to see previous pages The development of the mobile technology has significantly changed the way people live. It played a notable role in making modern life convenient and flexible. The mobile technology grew rapidly that it took hardly ten years to enter the mainstream use, and, when compared to the growth of telephones this growth was unusually fast. According to Cisco’s 2013 global mobile data forecast (2014), today the number of mobile devices equals the number of humans on the planet. The mobile technology fact sheet published by the Pew Research Center (2014) indicates that 90% of American adults own a cell phone, 58% of them own a smartphone, 32% own an e-reader, and 42% own a tablet computer. It is interesting to note that 67% of cell phone users check their phones frequently for calls, messages, or other alerts when while their phones do not ring or vibrate. There are another 44% of cell users sleeping with their phones next to the bed so as to make sure that they do not miss any call, message, or update. The fact sheet also reflects that 29% of cell users consider their cell phone as “something they cannot imagine living without” (The mobile technology fact sheet, Pew Research Center, 2014).
The term cybersecurity refers to the process of providing security to devices such as computers, cell phones, smartphones, and tablets, as well as the whole internet. In the current world, promoting cybersecurity is of great importance because modern people increasingly depend on computer networks to store and transfer their confidential data/information. Magid (2014) says that since such sensitive personal data is exposed to computer networks, hackers or other cyber criminals may intrude into the privacy of network users and empty their bank account if proper cybersecurity measures are not in place. Business enterprises are no exception to such cyber challenges. Hence, ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The effects of mobile devices on cybersecurity Essay”, n.d.)
The effects of mobile devices on cybersecurity Essay. Retrieved from https://studentshare.org/english/1684506-the-effects-of-mobile-devices-on-cybersecurity
(The Effects of Mobile Devices on Cybersecurity Essay)
The Effects of Mobile Devices on Cybersecurity Essay. https://studentshare.org/english/1684506-the-effects-of-mobile-devices-on-cybersecurity.
“The Effects of Mobile Devices on Cybersecurity Essay”, n.d. https://studentshare.org/english/1684506-the-effects-of-mobile-devices-on-cybersecurity.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF The effects of mobile devices on cybersecurity

Allowing Mobile Devices In The Office

...of mobile devices should not be allowed without any limitation being put in place. Some of the limitations are when, where and how the device should be used by employees. Introduction Mobile devices introduction will have negative and positive effects in the working environment. These devices will allow workers carry out their duty from their home or away from the office. Workers are in great support in use of these devices arguing they have a positive effect. The devices have shown great impact in improving production when used in correct way. Questions have also been...
9 Pages(2250 words)Essay

Using Mobile Technology and Mobile devices in the workplace

...of employees, telecommunicating can provide a platform for more flexibility and an off from working place rules and policies which include formal office hours and dress code. Pertinently, it is believable that relief from such policies and rules can result to flexible functioning of employees whereby they can perform more efficiently. With this respect, their performance increases which in turn increases the productivity of an entire company. At SC Technology, employees require the introduction of mobile technologies and mobile devices to bring about effective presentation and flexible training of either employees or any other intended personnel (Brennen, 2011). New...
9 Pages(2250 words)Essay

Mobile email devices

...effective an organisation in implementing revolutionary change in the workplace. This can be justified by the presence of emails that are accessible everywhere through modern mobile communication gadgets. This is an obvious justification on how an organisation has successfully changed the workplace and at some points the attitudes of its people. Mullins therefore is correct with his stand that an organisation has significant contribution to the change of one’s life and attitude at how work has to be carried out. The existence of Blackberry for instance as an efficient email device is a clear picture of how an organisation maximises its control advantage over its employees. Organisation’s...
6 Pages(1500 words)Essay

Novel Mobile devices

...? 20 February, Novel mobile devices What are novel mobile devices? Novel mobile devices, as the name indicates are mobile devices that are essentially atypical, unique and conform to the modernistic standards. The devices can be unique in any way. There is no fixed rule to render a device as novel. A device having a new feature in it that can benefit the users in any potential way is quite qualified to be called as the novel device. Novel mobile devices are introduced by manufactures in the market every now and then. Quite frequently, new designs come with newer properties and better usability that outshine the former models. For example, data was originally carried in floppy discs. Later, USBs drove floppy discs out of the market... and...
2 Pages(500 words)Essay

Mobile devices in the workplace

...?INTERNAL MEMO October 6, Mobile devices in the workplace: A research proposal Summary Developments in mobile devices have led to their extensive application in workplaces and during work hours. This leads to lost quality and quantity in time towards lower productivity. This proposal seeks to conduct a research to investigate significance of the effects of mobile device applications in the workplaces for effective human resource management. Introduction Development in technology has led to availability of mobile devices that can be conveniently carried to, and be used in workplaces. This paper seeks to explore the use of mobile devices in the workplace. It aims at determining the level of use of mobile devices during office hours... and the...
3 Pages(750 words)Research Paper

Mobile Cybersecurity

...Evaluation’, Deliverable 4, Flexible and Non-Intrusive User Authentication for Mobile Devices, Eduserv Foundation, August 2008. This research work is about the possible secured frameworks. ‘Companies see risk of removable media but still turn a blind eye’, Pointsec News Release, 8 June 2006, Available: www.checkpoint.com/press/pointsec/2006/06-08.html Consumer Choice, Apps and Virtualization Impact Mobile Cybersecurity Publication info: Targeted News Service [Washington, D.C] 21 May 2013. http://search.proquest.com/docview/1353441929?accountid=458 Cost of Lost Laptop (Source: Kensington) Credant Technologies (September, 2008). ‘Credant Technologies: Almost 60,000...
15 Pages(3750 words)Research Paper

Case Study 1: Mobile Devices

...CASE STUDY MOBILE DEVICES Case Study Mobile Devices Affiliation Table of Contents Risks Inherent In the Use of Wireless and Mobile Technologies 3 Plan for Monitoring and Analysis 4 Backups 4 Services installed 4 Firewall 5 Strong Password 5 Recommendation 5 References 6 Introduction Wireless technology offers a number of advantages for the businesses as well as individuals. Without a doubt, it offers an excellent support for the businesses to generate revenue and improve business processes. Additionally, at the present, computers, other systems, devices, such as PDAs and smart phones can be connected wirelessly. However, a un-protected...
2 Pages(500 words)Case Study

Cybersecurity

...Cybersecurity Your Topic 3 - Some mental health and criminal justice professionals contend that hacking is an"addiction," and causes obsessive, risk taking behavior in a manner similar to illegal narcotics - hackers hack to "get high" from the thrill of breaking into a system and getting away with it. Should policymakers look towards treatment, rather than incarceration, as the disposition of hacker cases? Why or why not? The study conducted by Solmaz, Bell and Saygili (2011) is interesting. At first, after reading the article, there seems to be a dilemma between hacking as a form of addiction, which requires treatment to just simply being a criminal case. But going through further to their findings, it became clearer...
2 Pages(500 words)Coursework

Cause-Effect Analysis

...The Effects of Mobile Devices on Cybersecurity WRTG 101S Introduction The modern mobile devices have enhanced functionality, and havebecome invaluable tools of communication. Some of these devices include Smartphones, tablet PCs and Personal Digital Assistants (PDAs) among others. Given that these devices have large memory capacities and are integrated to the internet, they are used in similar ways as personal computers. These devices are now being used for strong sensitive information such as credit card details, bank account information and business information. Unfortunately, this...
4 Pages(1000 words)Essay

Mobile Devices & Applications

...Mobile Devices and Applications: Mobile Development and Emerging Standards Table of Contents TASK 3 0 Introduction 32.0 Detailed Observations 3 2.1 Mobile Design and HCI Techniques 3 2.2 4G Technologies 4 2.3 Mobile Sensors and Utilization 6 2.4 Applications and Future Directions 6 TASK 2: 7 3.0 Case 7 3.1 Purpose: 8 3.2 Intended audience: 8 4.0 Design Requirements: 8 5.0 Design Considerations: 8 6.0 Interfaces 9 6.1 Web application interface: 9 6.2 Modularization of web app: 10 6.3 User interface: 10 6.4 Architecture of Proposed App 11 6.5 Mobile application: 11 6.5 Database Model: 12 TASK 3: 12 7.0 Testing 12 7.1 Purpose 12 7.2 Testing...
7 Pages(1750 words)Lab Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic The effects of mobile devices on cybersecurity for FREE!

Contact Us