Thursday, February 27, 2020

Security in New Generation Cell Phones Research Paper

Security in New Generation Cell Phones - Research Paper Example Technology in every new generation provides major improvements from the previous generations. In the cellular communications, there was first the 1G and 2G generations. These generations contributed to the provision of the internet for the mobile phones through the 3G dominated the scene. The third generation cell phone internet had advancements that made it stand up from the earlier versions of 1G and 2G. The 3G had the capacity to converge voice and the data with the wireless internet. This makes it suitable for transmitting data in high quantities. Additionally, migration towards the 4G technology has been witnessed. Regardless of these processes and developments, the security of cell phone remains paramount. Ensuring the security of the cell phones The continuity in the manufacturing and distribution of cell phones leads to the rise in the security risks in different ways. Users of electronic gadgets like cell phones should be more concerned about their safety. Lately, electronic devices such as the Apple’s iPhone latest version and the Google’s Android have committed themselves to the manufacturing and development of cell phones with 3G networks so that they possess the same features and functions of computers. Although this promotes great conveniences, it also comes with severe security risks. Both the new and future generations of cell phones require the setting up and update of security software. This software includes firewalls, anti-virus software, operating system patches, anti-spam software, file encryption, and the anti-spyware software. This requires the observance of the basic home computer internet safety and guidelines. The revolution in the field of information technology has enabled most financial institutions to adopt mobile banking technologies to enlarge their customer bases. Cell phones users are required to conduct their business and financial transactions online. As a result, they will need to store their login passwords w ith the information pertaining to their credit card and personal details. With this trend, there will be more cases of online fraud, identity theft, more spam, digital forgery, data theft, and any other cyber crimes. Besides, it can also lead to the denial of disseminated service attack. This has the risk of disabling the network service supplier. Additionally, cell phones are prone to theft based on their portability compared to desktop computers. Since most theft cases occur unexpectedly, a cell phone user can lose a lot of information and data stored in the mobile device. In the event that the mobile device contains business and financial information of the user, the thief can use it to defraud the user of his or her finances. This is a major security concern. Additionally, the new generation cell phones come with applications that display the user’s location and movements. One such application is the opt-in text advertisements that give information on the whereabouts of t he user round the clock. Hacker stalkers can use this information to trail their victims and even do felony acts to them.

Tuesday, February 11, 2020

Influencing Performance Essay Example | Topics and Well Written Essays - 750 words - 1

Influencing Performance - Essay Example When strategic goals are clearly communicated to the employees, they feel confident and motivated about it. Secondly, â€Å"equal pay for equal work† is an important compensation theory which works towards employee motivation (McIntosh 1998). Inequalities tend to generate between employees when they feel that some other person is getting more for the same work or he/she is not getting adequate compensation for his/her services. It is very important for the organization to observe equity theory of motivation (McShane and Von Glinow 2010) while designing the compensation packages. Also, training and development programmes for employees at different levels work wonders in enhancing performance as they give the employees a chance to increase their skills set. They become more competent to handle more responsibilities with greater enthusiasm and ability which automatically builds upon their positivity towards work. Understanding employee professional and personal needs is the key to their motivation and best performance. Sufficient promotion opportunities, clear goals, mutual working environment and celebrating each and every achievement of employees lies at the heart of bettering the employee performance. Workplace security, safety measures and constructive criticism also form an integral part of this. Describe one method effective leaders can use to improve individual and/or group performance in your organization. Include the role of theory in your discussion. Support your method with a minimum of 1 reference from the literature. Leaders are considered to be effective when they are able to direct the actions of their followers through motivation, planning and judicious implementation of plans. Leaders are considered as role models by the followers because of their charisma or the inherent qualities and values they possess. Leaders are said to be effective when they are able to transfer these to their followers (Leadership Expert webpage 2010). One popular