Jump to content

User:GMUITEstudentXX

From Wikitech

William Gause

Eugene Lord

IT 102

9/12/18

The Development and Impact of Smartphones.

"By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on https://oai.gmu.edu/mason-honor-code/ and as stated, I as student member of the George Mason University community pledge not to cheat, plagiarize, steal, or lie in matters related to academic work. In addition, I have received permission from the copyright holder for any copyrighted material that is displayed on my site. This includes quoting extensive amounts of text, any material copied directly from a web page and graphics/pictures that are copyrighted. This project or subject material has not been used in another class by me or any other student. Finally, I certify that this site is not for commercial purposes, which is a violation of the George Mason Responsible Use of Computing (RUC) Policy posted on http://copyright.gmu.edu/?page_id=301 web site."

Introduction:

In today’s society, it seems like everyone has a cell phone or smartphone devices. It is uncommon to see someone out in public that is not carrying their mobile devices. People are now connected with devices and are able to communicate with people around the world. Mobile devices have impacted the lives of millions of adults and children of all ages. Smartphone and other portable devices have many benefits with its social attributes they created. However, have one’s social life connected directly to smartphone use can have negative effects. Smartphones are continuing to innovate and expand upon their hardware and software.

Background and Development:

In the United, States Cell phones went to shelves in 1983. The first brand of the cell phone is called Motorola DynaTAC 8000x which was manufactured by Motorola Inc. The design of this cell phone was bulky, brick shaped, and had a long antenna to get a signal. The pricing on these phone were expensive with their price ranging around four thousand dollars. In 1993, the first true Smartphone came out from IBM and Bellsouth. This device was the first include a touchscreen, a calendar, contacts and other features. While it was expensive, technology over time became more powerful and cheaper to sell for the market. In the third generation of Smartphones, Internet access became more accessible and fast enough where phones could send or receive data for texting at a good pace. Furthermore, the ability to send or receive data at a fast rate allowed users to send email and photos to other user. With the worldwide spread of mobile device mainstream brands like Apple’s Iphone and Samsung’s Galaxy smartphones became the top two brands with all sorts of apps and features. Most mobile phones have standards for what features are including texting, touchscreen, ability to make calls, and ability to keep people's contact information. Smartphones are made up of metal parts, glass screening material and use computer chips in order to function. Smartphones in way are like desktop/laptop computers, they have graphics card for the graphical image and to load HD picture quality. Mobile graphics cards are inferior to desktop graphics card due to the size, price for power and portability. Smart phones also use CPUs to give the phone set instructions in order to function and contains both primary and secondary memory for storage.

Technology use and impact:

Smartphones have become an important part of many people lives. The mass appeal of smartphone and mobile devices are due to that that those devices have computer features and phone function all in one. People are able to connect their cell phones through Wi-Fi and internet networks. Social media applications like Twitter, SnapChat, and Facebook became addictive apps that many young people tend to use. Now users can see what their friends are doing, send photos, and communicate with each other without meeting in person. Apps like YouTube is a common source of entertainment where users can watch videos. Quadir states that “today, 75% of people globally have access to a cell phone. Of the six billion subscriptions worldwide, 77% are held by people in developing countries. Despite the great disparities among high and low income regions globally, there is a reasonable parity in access to cell phones.” The majority of people have easy access to cell phones due to all the features, affordable application/ hardware, and connect with other people. While the most would use smartphone devices to entertain themselves, others have different uses of technology. Teachers use smartphone(s) technology to engage their students with educational activities. Teachers in public schools, can use applications like Kahoot to keep their students engaged while learning.

Security:

Smartphones are a global phenomenon and many people use their devices in their daily lives. Smartphones are capable of containing, retrieving and sending data at fast rates. Information can spread to people in a matter of seconds. If users are not careful their personal information can leaked out or hacked easily. Modern phones holds users personal information like their credit card, address, current location, access to their photos and info on the people they connect with like friends and family. Jones, Beth H; Heinrichs, Lynn R from The Journal of Computer Information Systems  informs that “The Georgia Tech Information Security Center (GTISC) identified "threats to VoIP and mobile devices" as one of the top five threats to information security from problems such as malware, eavesdropping, phishing, and stolen or lost devices.” Phishing on mobile devices happens when someone’s personal data is being stolen by replying a text which typically has a link, using app which takes the data and information that is stored in the device and through emails. Malware attacks on mobile devices to damage or disrupt their device(s).  A less technical way to hack into someone’s smartphone is by having access to it and the passcode to use the device. While there are programs implemented into device they do have limitations. Since companies like Apple and Samsung all have their operating system being used in their mobile devices. That can cause some issues in implementing security applications to each manufactured phone since each operating system is different to coded. Park, Jong Hyuk; Yi, Ki Jung; Jeong, Young-sik from Electronic Commerce Research they state that “Unlike in the PC environment, security technologies in the smartphone environment have their limitations in applying key technologies such as vaccines and firewalls in a single application.” Modern smartphones do have security features to keep phones more protected. If stolen the thief needs to know the pass code to get access to it and there is a tracker to know the phone’s current location if connected. Furthermore, to keep your devices protected it is recommended not to answer text from strangers until you know who it is 100%. When traveling, always keep your devices in a bag just in case a person dropped it since pocket thief is possible and pockets themselves are not the best. Finally each device has security applications added to further protect the user’s data when he or she are using a website or app.  

Social:

Smartphone devices have become essential to the newer generation’s social lives and adults of all ages. Easy access to social media and the internet made it easy for people to form new relationships and share their stories. Furthermore, smartphone devices allow users to fulfill their social needs of being important or connected.  Malik, Tariq Mahmood; Shahzad, Muhammad from, Journal of the Research Society of Pakistan mentions that “Nowadays. The smartphone is altering the ways in which youth/users communicate with each other, have fun, finding information, and manage their everyday schedule.” These devices are efficient in multitasking which allows users to keep in touch and stay in task if they set a schedule. When people do more activities then they happy and that allows them engage with others freely.  Malik, Tariq Mahmood; Shahzad, Muhammad states that one measurement of success of mobile technology in the developed countries is that many people “cured” their loneliness in the world. One major factor is that the internet is fast and made it possible to communicate with people from voice to text in the blink of an eye. While mobile technology has some positive effects on people social lives, there are effects that can hinder their social performance. Due to its popularity, many public schools have banned students from using their phones to avoid distractions in class. In college, students are often seen with their phones as they are glue to it from one destination to another. Interactions with students are not as often unless they see one of their friends or classmates. Most people are gaining a habit of constantly looking on their cell phones to check social media or their text messages. People abilities to interact with someone in person had become more difficult as they lacked the ability for interpersonal engagement. Saunders Medlock from South University claims mobile devices allow people to communicate without ever seeing each other or hearing a voice”, and this can affect how people can communicate verbally or nonverbally. “We will have a generation that has no clue how to read any of these cues.”

Legal:

The growth of mobile technology has also raised the concerns in terms of legal issues and ethics. Privacy laws are crucial with technology including smartphone devices. It protects people's privacy rights from companies taking their information and giving to third party sources. Unfortunately, privacy laws are not enforced in every country. Just recently, Japan launched their data privacy law in 2017 called Protection of Personal Information [APPI] that protects data volume data breaches, and stop illegal sale of personal data (International Publication page 6) Certain data providers allow users to have of the option of what data can be sent to third party companies thanks to privacy laws. However, even when a smartphone is on, the network carriers can see the location of the smartphone using triangulation methods (Frith 114-115). Law enforcement can investigate a person phone with a warrant but in other cases cannot snoop through the investigated user’s phone. Businesses have legal issues they have to worry about as well. Mobile technology allows employers and employees to have the flexibility to work at their homes or at their workplace. A company ether lets their employees use their personal devices, work issued device, or not allow them at all. An employee mobile devices can potentially hold confidential or protected information of the company. Companies are only allowed to remove classified information on a mobile device is if a person is fired or resigned and is not allowed to have access to the information anymore (Herz). However, an employer needs to be careful of what data they remove on a person’s device or work’s issued device. Furthermore, the employer needs to make sure that the employees who use a phone/mobile device are not using apps that uses cloud storage where data could be leaked from a virus, malware, or phishing. Not all companies allow their employees or employers use their personal device to keep their data safe.  

Conclusion and Future:

Smartphone devices will continue to sell to the mass market with everlasting growth and new technologies implemented in each new releases. New security features like finger scanning to get access to the phone have been added to new Apple’s IPhone. Millions of people will continue to use smartphone devices to fulfil their desires. Smartphone devices lets people connected with world, entertain themselves with mobile apps, chat with friends, and share their stories on social media. Smartphones can have negative effects on one’s social that can hurt their interpersonal communication skills. While each mobile technology have security programs and features to protect a user, it does not guarantee full protection from hackers, scammers, and thieves. Smartphones have made the biggest impact since the creation of person desktop computers.

Work Cited

Park, J. H., Yi, K. J., & Jeong, Y. (2014). An enhanced smartphone security model based on

information security management system (ISMS). Electronic Commerce Research, 14(3),

321-348. doi:http://dx.doi.org/10.1007/s10660-014-9146-3

This article written by a multitude of writers who, discusses, about how security managements works with mobile devices. It talks on how security is development on mobile devices. The potential danger of not protecting the phone and all the information stored in one device. The writers discussed what type of security attacks can occur externally and internally. The main model is ISMS that used to protect mobile phones.

Arefin, M. S., Islam, M. R., Mustafi, M. A. A., Afrin, S., & Islam, N. (2017). IMPACT OF

SMARTPHONE ADDICTION ON ACADEMIC PERFORMANCE OF BUSINESS

STUDENTS: A CASE STUDY. Independent Journal of Management & Production,

8(3), 955-975. doi:http://dx.doi.org/10.14807/ijmp.v8i3.629

These writers wrote an article talking about the benefits and issues with cellphone technology in schools. They did a case study on analyzing students on their performance in school base on their technology life. They also analyzing young students’ addiction and what makes them attached to their devices. The main issue with being over attached to cell phone did impact some of the students’ social abilities.

Quadir, I. Z. (2013). Adam Smith. Economic Development, and the Global Spread of Cell

Phones.

Proceedings of the American Philosophical Society, 157(1), 67-91. Retrieved from

https://search.proquest.com/docview/1459215481?accountid=14541

Mobile phone has increase in e-commerce sales since the smartphones became a widely popular. Many first world countries all mobile apps and sites connected to the internet and grown for their success. Furthermore, smartphone help increased their connectivity with the people they are around. The ease of a device can be use for all sorts of daily tasks like texting and reading the news. Many lives are impacted positivity to smart phone devices.

William L. Hosch. Smartphone. Encyclopædia Britannica. Encyclopædia Britannica, inc. July

20, 2018. https://www.britannica.com/technology/smartphone

The first smartphone was created in 1993 by IBM. The device was a solid state memory that had simple features like address book and touchscreen control. When it was first released it was expensive to the mass. As time went on development smartphone devices have become cheaper and include all sorts of features. The article is an overview of the beginning and growth of smartphone devise.

Malik, T. M., & Shahzad, M. (2016). USAGE PATTERNS AND IMPACT OF SMARTPHONE

ON SOCIAL BEHAVIOUR OF YOUTH. Journal of the Research Society of Pakistan,

53(2) Retrieved from

https://search.proquest.com/docview/1863565305?accountid=14541

This is a study on young children outside of school with their smartphone devices. The article goes over on all the traits children show when they are using a smartphone device. Some do display their concerns with the younger generation constantly relying on their phone for social and entertainment purpose. Interpersonal social skills are decreasing as time passes on. The core of this article to discuss the benefits and concerns with mobile devices on children.

Jones, B. H., & Heinrichs, L. R. (2012). DO BUSINESS STUDENTS PRACTICE

SMARTPHONE SECURITY? The Journal of Computer Information Systems, 53(2), 22

30. Retrieved from https://search.proquest.com/docview/1293109741?accountid=14541

This is a study on if business students use security practices on their smartphone device. The title alone was interesting to read and points out many outcomes of their study. Majority use standard security practices on their smartphones like a pass code. However, only using the basics will not mean their phones be safe.  

Herz, C. (2014, May 18). NH LEGAL PERSPECTIVE: Widespread use of smartphones, tablets

creates legal issues. New Hampshire Sunday News Retrieved from

https://search.proquest.com/docview/1526199714?accountid=1454

  Many companies now must worry about their internal assets due to technology growing. Companies must give out their own devices to the employees since using person devices is to risky for the company. Many worries that when an employee will leak out their information and not much can be done since it is a personal device. Furthermore, any approach might go against privacy laws. Some company polies forbid any us of personal devices at all. The article show an interesting view on business and their adaptions to smartphones.  

Mobile Phones and Society - How Being Constantly Connected Impacts Our Lives. Southern

University.

https://www.southuniversity.edu/whoweare/newsroom/blog/mobile-phones-and-society

how-being-constantly-connected-impacts-our-lives-137313

This is an article that discuss the university’s concerns about the social aspects of students and people with their devices. Most professors who were interviewed mention that kids in the future will lack proper in person social ethics like eye contact, and emotions. The article had many great quotes from Doctors and Professors. They mention mainly the problems they have and their experiences.

Frith J.F. (2015) Smartphones as Locative Media. Malden, MA. Polity Press.

Modern smartphones often now have tracking devices used for GPS and knowing a contacts location. This of course has a lot of security concerns if someone hacks into a phone and receive the user’s information. Many companies are required to protect their user’s rights and cannot leak out information to a third party. The book also explains how on the tracking features work and the origins. The potential danger of tracking devices in general has many people concerned.

Smartphone Privacy.

https://www.privacyrights.org/consumer-guides/smartphone-privacy

This is the privacy right polices that all citizens in Untied States must follow. Data providers are required to protect their user’s privacy rights and cannot sell the information to third parties. Police can investigate a phone if evidence are coming from a phone and have a warrant. Users have the right for what information can be stored with the provider. This site allows everyone to obtain the rules on privacy rights and it is the law.  

(July/August 2017). ECM’s Move to the Cloud: Good News for Business, IG Pros. IM

Publication

Cloud is becoming more prominent in the new technology world and is growing each day. Organizations and companies are investing with the cloud to sell to the consumer or use for internal uses. The cloud allow data to be stored virtually and the space can be unlimited depending on the price point. This magazine article demonstrates the growth and excitement of cloud technology for business. This also has a effect on smartphone users and how they can use the cloud.