StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Mobile Phones, IT-Security and E-commerce - Essay Example

Cite this document
Summary
"Mobile Phones, IT-Security and E-commerce" paper examines key points on the use and the advances of mobile phones, e-commerce, and IT-security aiming to explain their development internationally. For businesses, technology is related to the organizational performance…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Mobile Phones, IT-Security and E-commerce
Read Text Preview

Extract of sample "Mobile Phones, IT-Security and E-commerce"

Mobile phones, IT-Security and E-commerce Introduction Cell phones were primarily introduced in order to respond to specific needs – mainly for helping professionals to communicate when there is no phone available and a critical business issue needs to be discussed. However, communication is part of the daily life and not just a business need. In this context, the transformation of cell phones to an indispensable tool of communication can be characterized as expected; cell phones today have become a necessity but the margins of their role have been expanded more than initially estimated. In fact, in their initial forms, cell phones had specific and limited operational potentials; today cell phones have development a lot in order to respond to their new role as a primary mode of communication – an indicative example is the BlackBerry, a cell phone with advanced capabilities – for instance the Organiser or the GPS (referring to the Smartphone features, see the firm’s website); on the other hand, the fact that mobile phone has become the primary mode of communication has led to another problem: the social life of people takes new forms; the isolation of individuals is promoting; in this context, the mobile phone is no longer just a convenience; this change of the role of mobile phones should be reviewed. It should be noted that the above initiative is expected to face strong opposition if taking into consideration the fact that mobile phone is regarded as related with daily life at such a level that the warnings on the risks from its extensive use are ignored – like in the case of ‘electrosensitivity’ a health problem related with the use of mobile phone (Rubin et al., 2008, p.1). On the other hand, even in cases that rules were set for the use of mobile phone (for instance, when driving) these rules were not applied (Walsh et al., 2008, p.1893). Current paper examines key points on the use and the advances of mobile phones, e-commerce and IT-security aiming to explain their development internationally. 2. Mobile phones – key advances and limitations 2.1. Airtexting Airtexting offers the ability to communicate ‘in silence’ – i.e. without actually speaking. This means that the people around are not likely to notice the specific activity; however, in practice this benefit of airtexting is lost because of a severe disadvantage: the ability of anyone near the sender to read the text of the message. At this point a dilemma is set? Is privacy of higher importance than the need for communication? It depends on each person’s perceptions and experiences. From a personal view, I would characterize this feature as promoting the violation of privacy; in fact, through the development of such initiatives the sense of non-existence of privacy is growing. Gradually, the privacy will be severely affected – it has already suffered severe pressure and violations, whereas the communication – related activities are strongly supported and promoted (LaRue et al., 2010). Moreover, the violation of privacy through the mobile phone can be developed in various ways; an example is the tracking of the mobile phone (Mathieson, 2005, p.19). The specific issue is also highlighted in the study of Marias et al., (2006) where it is noted that ‘location privacy is important, since position information is considered as personal information’ (Marias et al., 2006, p.211). In accordance with the above, the rejection of airtexting would not use to the limitation of communication rights; on the other hand, the development of airtexting would support the elimination of privacy – since privacy is violated and this fact is not considered as a crime then neither the violations of privacy under different circumstances would be punished. 2.2 Use of mobile phone in the classroom The use of mobile phone within the classroom is in opposition with the school’s rules; more specifically, the school’s policy on mobile phone use is that mobile phones should be turned off when entering a classroom. The specific policy can be characterized as justified taking into consideration the fact that students would not be able to concentrate on the delivery of the lesson if they would be free to exchange messages or talk through the mobile phones. In the same context, airtexting would be included in the above prohibition; even if the whole process does not involve in speaking still there is lack of concentration on the delivery of the lesson. For this reason, airtexting should be included in the school’s rule that orders to turn off the mobile phones in classroom – no exception should be made for airtexting. The use of mobile phones in schools has been an issue extensively examined in the literature; it is supported that many educational sites do not have policies in regard to the use of mobile phones (Lever et al., 2007, p.1133); at the next level, the potential use of mobile phone for communicating with the family is considered to be a constraint for the development of strict rules in schools regarding the use of mobile phones (Chen et al., 2009, p.179) 2.3 Functionality – personal experience and views My cell phone apart from the standard functionalities, i.e. of making and receiving phone calls, supports the following activities: taking photos and checking e-mail messages. By my opinion, the perfect cell phone would have the functions support by the BlackBerry Smartphone plus the ability to support software similar to that used by computers – referring not only to the software addressing common office needs, like the Microsoft Office, but also more complex software, like the Photoshop. Moreover, a perfect mobile phone would not require charging so frequently; it could be charged once a month. 2.4 Mobile phones as exclusive tools of communication In the future, mobile phones will become the standard phones; the land-based phone line will be then deleted; in this case the access of Internet from home would be included in the mobile services; this prospect could offer the following advantage: the individual that has made an arrangement for an Internet connection will be able to use this connection not only in house but also outside; no extra charges would exist. However, another problem would be that most mobile phones would be replace in order to support the specific technology. By my view, this initiative would be quite important in terms of the variety and the quality of services available to these services’ user. 3. Benefits of Cloud Computing, Virtualisation, Green Computing and Thin Client Computing The advances in the area of IT technology have offered the chance to decrease the operational costs and to protect the environment. Other benefits have been also results for businesses that have implemented IT systems, which are based on advanced technology. Green Computing is such a scheme. Green computing aims to ensure the use of a firm’s computing systems ‘with least possible amount of power’; Green computing benefits the firms, the community and the environment in the context described below: a) it helps to reduce the power needs of computers – which can be extremely high (see also Figure 1, Appendix), b) it helps to reduce the energy cost (Wang, 2010, p.2), c) it helps to reduce a firm’s needs on cooling infrastructure (in order to respond to the increased heat of the computing systems), Wang, 2010, p.2, d) it helps to increase the customer value and the business value (Harmon et al., 2009, p.1707) and e) it permits the further development of data centers across a specific area – under the terms that the energy needs of existing data centers are decreased (Wang, 2010, p.333). Virtualisation is another technological scheme that offers significant benefits to its users. The specific scheme allows to the user of a computer to run two different operational systems – simultaneously – allowing an important save in costs for servers; for this reason, the specific technology can be characterized as a valuable solution for firms that want to increase their system’s performance without reducing its safety. It should be noted that ‘virtualisation extends the battlefield (referring to the battle between the security services and the malware opponents) by introducing a new level of abstraction, the VMM or hypervisor’ (Skapinetz, 2007, 4); the structure of Virtualisation is presented in Figure 2, Appendix., where both forms of virtualisation, the software and the hardware virtualisation are explained. In addition to the above, the scheme of thin client could be also mentioned; the thin client is a term which refers to a specific computer system and is used in order to describe ‘a shift back toward centralized computing while maintaining the benefits offered by the PC revolution’ (Pippard, 2010, p.2); the major advantage of thin client compared to a common computer system is that the thin client ‘does not have a hard drive, it needs no software loaded on it locally, and, it stores no data. Instead, applications are executed on powerful servers’ (Pippard, 2010, p.2). The specific device, the thin client, has quite simply requirements of activation and operation; it needs just to be plugged in; then it starts to operate with no further process (of course it is required that its user is logged in). The thin client can lead to the limitation of a firm’s operational costs since there will be no need for hardware and software – or other similar technology. Finally, the cloud computing scheme would be taken into consideration as a potential suggestion if the update of the firm’s existing system would be decided. In accordance with a definition given by IBM (2009) ‘Cloud computing is a style of computing whose foundation is the delivery of services,software and processing capacity using private or public networks’ (IBM, 2009, p.1). The benefits of the cloud computing can be summarized as follows: a) with the cloud computing managers can emphasize on the development of their firm – rather than trying to assess the firm’s computer problems (IBM, 2009, p.8), b) cloud computing ‘promotes IT optimization so that IT resources are configured formaximum cost-benefit’ (IBM, 2009, p.9) and c) it helps to reduce a firm’s operational costs; at the same time it support innovation across the organization. 4. IT Auditing 4a. IT Auditing and e-commerce IT audit is required in order for a firm’s IT systems to perform effectively; the performance of a specific e-commerce scheme will be also negatively affected in case that the necessary phases of audit have not been developed. The specific issue is highlighted in the study of Smith (2004, p.106); in the above study it is made clear that an e-commerce site can perform successfully only if it is appropriately audited; the relevant checklist includes questions referring to the quality of the e-commerce site’s configuration, the support of the site by the Internet, the existence of an extranet and so on (Smith, 2004, p.106). On the other hand, an e-commerce system is of significant importance for an organization; for this reason it is necessary that its auditing is developed with particular importance; this issue is highlighted by Pathak (p.99) who notes that managers in firms that have an e-commerce system should understand the importance of employ IT auditors; the intervention of IT auditors on the monitoring of e-commerce sites is important ‘because of additional risks associated with e-commerce systems and the resulting need for strong control procedures’ (Pathak, p.99). 4b. IT Auditing – analysis of characteristics IT auditing ensures that the various aspects of a particular IT system are aligned with the existing legal rules that refer to the specific sector; in order to ensure the quality of IT systems, the IT Governance Institute and the Office of Government Commerce (UK) developed a series of standards/ practices that are used in order to identify or guarantee the quality of IT systems, these standards have been categorized as follows: the COBIT, the ITIL and the ISO 17799 standards; these standards support the organizational performance and help to the increase of transparency in all organizational activities (IT Governance Institute, 2005, p.9). COBIT is one of the above schemes; it is used in order to guarantee that the firm will achieve its objectives (IT Governance Institute, 2005, p.12). In the context of COBIT, IT auditing is related with specific domains, like ‘a) Plan and Organize b) Acquire and Implement, c) Deliver and Support and d) Monitor’ (IT Governance Institute, 2005, p.12). Using the COBIT standards, the IT auditing develops the following merits: a) the use of information across the organization is improved and further developed, b) enterprise management becomes more effective; the firm’s governance is set as a priority and all the necessary measures for the improvement of organizational performance can be taken, c) the information required for the development of the organization is made available, d) the firm’s IT system is effectively and adequately protected, e) the firm can choose to further develop its online presence and f) the firm can choose to change certain of its organizational activities without affecting its performance – since its systems is under continuous control there would be no issue of damage. However, IT auditing can also have demerits, like the following two: a) mistakes in the IT audit can have severe effects on the organizational performance; failures in the specific sector could lead to the development of false assumptions regarding the condition of the firm’s IT system which is therefore exposured to high risks, b) the assumptions developed by the IT auditing team are usually not cross – examined; in this way, the risk for a failure is increased; the firm has to accept in advance the potential of this risk, which is known as the audit risk (Arens et al., 2006, p.109). 5. E-commerce 5.1. E-commerce and social networking E-commerce can be used in order to promote a series of different business activities; an area where e-commerce has been particularly successful has been the social networking, the communication among people – no matter if they are familiar or not – using the Internet. When developed through the e-commerce, the social networking is related with the achievement of a specific target, for example the e-dating services (Livermore et al., 2008, p.14) 5.2 E-commerce and e-shopping The main role of e-commerce is the promotion of products/ services to the market; e-shopping, i.e. the online purchase of goods is considered to be the most close concept to the e-commerce scheme. E-shopping, like e-commerce, is based on the exchange of money for specific products; however, the role of these two concepts is different: e-shopping refers to the acquisition of products for money, i.e. it is an activity developed by an individual or a firm periodically, from time to time for specific needs; on the other hand, e-commerce emphasizes on the development of sale – related activities on a permanent basis and as part of the trade (Sun et al., 2004, p.1). 5.3 Integration of social networking and e-shopping E-shopping could be integrated with social networking but under specific terms; because of the nature of social networking the incorporation of commercial rules in the specific activity would not be possible unless this reference would involve to suggestions towards the members of a social networking team in regard to specific product. In other words, the member of a social group could choose to prefer the products of a specific firm; this would be an arrangement incorporating the social networking and the e-shopping. 6. Conclusion The advances of technology offers to individuals and firms the chance to develop their activities in accordance with their needs; for individuals technology has become not just a tool for serving specific needs, like the needs of communication served through the mobile phone, but also a tool for changing their style of life. For businesses, technology is related with the organizational performance; using the appropriate technology a firm can improve its position towards its competitors, like in the cases of virtualisation and e-commerce or increase its participation in the needs of the community, like in the case of Green computing. The needs that the technology will serve each time have to be prioritized using appropriate criteria; at the next level, the relevant schemes of technology will be introduced trying to achieve the best possible balance between benefits and costs. References Arens, A., Elder, R., Beasley, M., 2006, Auditing and assurance services: an integrated approach. Beijing : Qing hua da xue chu ban she Barnett, J., Timotijevic, L., Shepherd, R., Senior, V., 2007. Public responses to precautionary information from the Department of Health (UK) about possible health risks from mobile phones. Health Policy, Volume 82, Issue 2, July 2007, pp. 240-250 Chen, Y., Katz, J., 2009. Extending family to school life: College students’ use of the mobile phone. International Journal of Human-Computer Studies, Volume 67, Issue 2, pp. 179-191 Harmon, R., Auseklis, N., 2009, Sustainable IT Services: Assessing the Impact of Green Computing Practices, PICMET 2009 Proceedings, August 2-6, Portland, Oregon, USA IT Governance Institute – Office of Government Commerce (2005) Aligning COBIT, ITIL and ISO 17799 for Business Benefit: Management Summary LaRue, E., Mitchell, A., Terhorst, L., 2010. Assessing mobile phone communication utility preferences in a social support network. Telematics and Informatics Lever, K., Katz, J., 2007. Cell phones in campus libraries: An analysis of policy responses to an invasive mobile technology. Information Processing & Management, Volume 43, Issue 4, pp. 1133-1139 Livermore, C., Setzekorn, K., 2008. Social Networking Communities and E-Dating Services: Concepts and Implications. Idea Group Inc (IGI) Marias, G., Kazatzopoulos, L., Delakouridis, C.,, 2006. Applying privacy on the dissemination of location information. Telematics and Informatics, Volume 23, Issue 3, pp. 211-225 Mathieson, S., 2005. Mobile phone tracking threatens privacy. Network Security, Volume 2005, Issue 3, pp. 19-20 Pathak, J., 2005. Information technology auditing: an evolving agenda. Springer Rubin, J., Cleare, A., Wessely, S., 2008. Psychological factors associated with self-reported sensitivity to mobile phones. Journal of Psychosomatic Research, Volume 64, Issue 1, pp. 1-9 Skapinetz, K., 2007. Virtualisation asa blackhat tool. Network Security, pp.4-7 Smith, E., 2004. Control and security of E-commerce. Gordon Edward Smith Sun, Z., Finnie, G., 2004. Intelligent techniques in E-Commerce: a case based reasoning perspective. Springer Walsh, S., White, K., Hyde, M., Watson, B., 2008. Dialling and driving: Factors influencing intentions to use a mobile phone while driving. Accident Analysis & Prevention, Volume 40, Issue 6, pp. 1893-1900 Wang, D., 2010. Meeting Green Computing Challenges, Teradata, A division of NCR, pp. 1-4 Wei, R., 2008. Motivations for using the mobile phone for mass communications and entertainment. Telematics and Informatics, Volume 25, Issue 1, pp. 36-46 Online sources BlackBerry, 2010, available at http://uk.blackberry.com/devices/features/ IBM, 2009, The benefits of cloud computing, available at ftp://public.dhe.ibm.com/common/ssi/sa/wh/n/diw03004usen/DIW03004USEN.PDF Pippard Inc. (2010) Bringing virtualization and thin computing technology to pos, available at http://www.pippard.com/pdf/virtualized_pos_whitepaper.pdf Appendix Figure 1 - Thermal Guidelines for data processing environments (source: Wang, 2010, p.2) Figure 2 – Hardware and software virtualisation (source: Skapinetz, 2007, p.2) Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“E-Commerce and IT Security Essay Example | Topics and Well Written Essays - 2500 words”, n.d.)
E-Commerce and IT Security Essay Example | Topics and Well Written Essays - 2500 words. Retrieved from https://studentshare.org/miscellaneous/1565793-e-commerce-and-it-security
(E-Commerce and IT Security Essay Example | Topics and Well Written Essays - 2500 Words)
E-Commerce and IT Security Essay Example | Topics and Well Written Essays - 2500 Words. https://studentshare.org/miscellaneous/1565793-e-commerce-and-it-security.
“E-Commerce and IT Security Essay Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/miscellaneous/1565793-e-commerce-and-it-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Mobile Phones, IT-Security and E-commerce

An Assessment of the Vulnerabilities of the iPhone

An Assessment of the Vulnerabilities of the iPhone ... he various six steps in the vulnerability analysis help in the easy identification and the evaluation of the various vulnerabilities found in the various steps where the identification is necessary.... ... ... ... The RMF consist of certain steps, where the each of the steps has to undergo the vulnerability analysis and assessment....
20 Pages (5000 words) Dissertation

The Impact of Mobile Devices on Cyber Security

In the wake of the twenty-first century, which has been characterized by the increased use of mobile phones, measures have been undertaken to ensure the security of online data.... This includes anonymous use of mobile phones, which is not restricted in some countries.... This book report "The Impact of mobile Devices on Cyber Security" examines the impact of mobile devices on cyber security.... Users' little knowledge and the growing malicious acts complexity continue to be the most threatening vulnerabilities associated with mobile devices....
9 Pages (2250 words) Book Report/Review

E-Commerce in the Life of Qatari Women

It has been found that the women of Qatar are connected to the internet and e-commerce like never before.... On average, the households in Qatar own 3 mobile phones, one smartphone, and two computers.... This research paper "e-commerce in the Life of Qatari Women" seeks to shed light on the problems faced by Qatari women in using e-commerce in their daily life.... In order to address the objectives, the study will carry out a survey of 10 people so as to know their perceptions of e-commerce....
8 Pages (2000 words) Research Paper

The Mobile Operating System

mobile phones today are used for personal and professional purposes.... mobile phones today are used for personal and professional purposes.... I would take up the latest versions of the preferred operating systems on today's mobile phones.... Other operating systems that may be available including phones that use a lower version of the upgraded ones as on date and less used operating systems have not been included as either they have already been improved upon or their use will be phased out, thus rendering their analysis insignificant in the quest for a better operating system....
8 Pages (2000 words) Dissertation

E Commerce: A Critical Analysis of the Sales Method of Mobile Phone in the U.K

The aim of the project was to thus critically analyze the method of retailing in UK and China and seek the advantages and disadvantages of each system such as on and off line to suggest best practices which can be adapted for on line selling of mobile phones in China.... Detailed questionnaires have been administered to a relatively large size of population in China as well as the UK comprising of mobile phone users.... In addition mobile phone sellers in both the countries have been interviewed to provide their point of view....
59 Pages (14750 words) Dissertation

Mobile Commerce

According to Barnes (2002), commercial services that can utilize mobile phones and other portable devices should be expanded.... This is well provided by mobile phones and other mobile devices.... Tarasewich (2003) points out that in M-commerce, there are websites called Wandering Atrial Pacemaker (WAP) that are developed specifically for mobile devices and mobile phones.... Websites that are enabled by WAP display catalogues of products available for users of mobile phones worldwide....
8 Pages (2000 words) Coursework

Considerations to Be Met When Designing the Mobile Commerce Page

As the paper outlines, with figures of over 700 million of these mobile phone users using their mobile phones to browse the internet, representing thirty percent of the total mobile phone owners population, mobile web browsing may be well on its way to becoming the next internet platform that is most dominant.... The author of the paper "Considerations to Be Met When Designing the mobile Commerce Page" will begin with the statement that еhere are currently more than three billion mobile phone users in the world, while a thousand are being added to the service per minute....
7 Pages (1750 words) Essay

The Design of the Mobile Commerce

t is apparent that the web site design used for computers does not apply in mobile phones.... WAP technology is used in mobile phones.... The paper "The Design of the Mobile Commerce" is a great example of a report on e-commerce.... The paper "The Design of the Mobile Commerce" is a great example of a report on e-commerce.... phones with big screens can contain large content while those with small screens can only support little content (Etheredge, 2010)....
10 Pages (2500 words)
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us