Blackberry and iPhone: Exploits of Smartphones

Introduction

Mobile phones have become an inevitable companion for people in the modern era. The new generation is using various kinds of mobile phones for communication. From telephones to iPhones, the developments in technology have changed the vision as well as way of life. Years back, mobile phones were an amazing technology for the common people, but nowadays it has become so common. There are many models of mobile phones.

An important advantage of these phones is that they have made communication very easy. Their widespread use helps the public to be in touch with one another easily and they have access to any person in the world. The trends in mobile technology changed the entire concept of mobile phones and different models are entering the market. Recently, people have changed their preference from ordinary cell phones to Smartphones, and it has become a status symbol and matter of pride in society. These phones facilitate a lot of advantages like texting, picturing messaging, access to the Internet, banking, purchasing etc.

The most recent trend in cell phones brings a union of tone of voice, video and data connections. By joining together information with amusements and leisure, these mobile phones are the latest style in the developing path of infotainments. The latest models of cell phones are not only for voice, but it has changed the mode from voice call to video calls. Smartphone introduction has now modified the mobile set to a full-grown minicomputer.

It includes MP3 systems, video recording system like real movie reels, radio and TV entertainments etc at the punch of mobile keys besides digital cameras with several pixels and high speed internet. So, we cannot confine them within the scope of the word mobile phones. Such are the new trends in mobile phone technologies and their development into the Smartphone.

The most important producers of mobile phones include Nokia, Samsung, Sony Ericsson and Motorola. But these mobile giants now face stiff competition because of the new trends. The first generation or 1G technology has disappeared from history. In the new era, third generation or 3G technology is conquering the hearts of mobile users. The firms which are active in making cell phones with most up-to-date 3G utilities are making good profits. Smartphones like Blackberry and iPhone are now coming with larger displays, touch screen and virtual keyboards. These keyboards are easy to use and are able to being restructured and modified by the users.

The operating system is very crucial in every Smartphone in the present day world. Unfortunately, it remains a fact that some people misuse such technologies. It is not the problem with the technology as such but it is because of the anti-social elements among public who create a bad image about the new technologies. Smartphones such as Blackberry and iPhone in the possession of such people are misused by them creating a threat to the security of people as well as nations. Another risk is that hackers can manipulate the technology of smartphones and can mount an attack. Blackberry is vulnerable to compound attacks and leak of private data or misuse of the same.

For this, the signature and code signing keys can be acquired at cheaper rates. The customer could be simply deceived by sending very exclusive messages by a function that makes to bond to the internet for legal intention. These are highly subjected to SMS harassments that permit the hackers to send SMS through the contaminated mechanism and to obtain entry to the code giving them open internet admission and the actual user has to pay for these. These signed functions can send emails and read incoming mails. They can add, delete or alter the contact details and can unlock the TCP/IP links. These details can be sent to any other application by the attackers.

In recent times, there was an assault that gave the strangers straight admission to business structures and network information through a connected Blackberry or new personal digital assistant, avoiding every applied outside contact obstructions. The attack uses Trojan code based on a Blackberry proxy attack (BBProxy). Blackberry devices are typically connected to a corporate network through a persistent tunnel implemented via a protected VPN that prevents the communication from being inspected by an external process. This connection is terminated within the network at the corporate Blackberry server. The effect of this connection is to make Blackberry essentially part of the internal network, regardless of Blackberrys connection point (Blackberry exploit: An open door to your corporate network, 2009, p.1).

iPhones also stand the chance of attack by viruses and information can be extracted covertly. This will lead to code and signature exploitation and wireless exploitations. Unauthorized calls from Blackberry and iPhones have, in many cases, caused threats to the security of nations. Some nations are even contemplating the banning of Blackberry to avoid the threat of terrorists using this modern technology for their ulterior motives. In many instances the countries have not been able to trace data from Blackberry and this leaves scope for anyone to use this opportunity, and it makes it easy for the terrorists to plan and execute violence. Countries like India have asked Blackberry owners to start their network tracking system in those nations itself to get the details. Based on the survey of Trend Micro, some Smartphone owners have already encountered hacking of bank details.

IPhones have inherent security dangers caused due to software errors that can reveal the clients information. There can also be exploitation of passwords leading to several attacks. These hits will be able to be noticed by some of the IDS/IPS systems. There are some possible remedies for these exploitations. The use of alarms or security alerts will help to decrease attacks and exploitations.

Literature Review

Introduction

Blackberries and iPhones contain effective software and technology. Smartphones such as Blackberry and iPhone recommend are high end devices designed to help people by providing them suitable platform for exchange of information and associated facilities. This is an up to date space of cross cultural and imaginative outlook. Blackberry and iPhone are mobile phones that provide more progressed connectivity than an up to date basic characteristic of feature phone. These Smartphones run entire operating systems. Because the product is technologically innovative, research has to be conducted to determine issues consisting of the environment of the marketplaces, motivation, outlook, preferences and purposes.

Logan Jackson, in his Articles called How Smartphones Have Evolved, states that Cell phones have progressed a lot in the past decade in comparison to its initial launch. Some of the Smartphones have turned out to be extremely complicated and technologically advanced. There is high demand for smart phones nowadays. Current smart phones have some kind of operating system (OS) and are able to have new apps installed on them. They can either be open source or be like the iPhone and be totally proprietary, meaning you cant easily program your own apps or easily download whatever you want for free.

So, if given the choice, open source is definitely better, no matter what the Apple fan boys will tell you. The Symbian OS is currently the most well-known open source OS, but Googles Android system is becoming more popular as well (Jackson, 2010, para.3). He also says that, a number of Smartphones also have been manufactured with GPS attributes which operate by means of satellite so that it will not get misplaced or lost.

Even though a smart phone does not maintain satellite supported GPS, they can still make use of maps or somewhat identical equipments to estimate the place it is housed on the basis of cell phone tower stationing. So, smart phones are indeed much like miniature laptops in a sense (even smaller than net books). Which one you decide to buy depends on what you need it to do. If you plan to type a lot, I would personally recommend you get one with a QWERTY keypad, and avoid phones that only have on-screen touch screen keyboards because those will make your screen dirty all the time (Jackson, 2010, para.6).

According to Art Rosenberg in his Article called, Consumer UC, Smartphones, CEBP Drive NexGen Customer Service, the speedy acceptance of multimodal, personalized or modified smartphones, customers and company clients, get the chance to make use of UC for equally inbound and outbound genuine -point communications among clientele, endeavor action-takers, and computerized trade applications will be increasing considerably. The idea behind the Apps Store of wireless service suppliers can be comprehensive to the endeavor portals to assist individual purchasers admittance to a variety of mobile consumer submissions.

The computerized trade procedure can observe the position of submission metrics and proactively start a modified consumer contact by way of a selection of customer interfaces on the basis of convenience or consumers preference. (Consumer UC, Smartphones, CEBP Drive NexGen Customer Service by Art Rosenberg. Published in the year January 25, 2010). The iPhone 3GS (now new and improved with no space between the 3G and S) has been out in parts of the world for a full week, and hackers are already looking for exploits in order to jailbreak and unlock the device to set it free. Fortunately for iPhone 3GS owners not content with being confined, famed iPhone hacker George Hotz claims to have found an exploit in the latest Apple phone (Yam, 2009, para.1).

According to Tanmay Sasvadkar in his Article called, The Best Smartphones Ever, Palm is too a large forename in the smart phone category and it is actually tough to overlook this manufacturer for the reason that they have provided us some tremendous handsets. (Best Smartphones ever by Tanmay Sasvadkar.)

William Deutsch in his Article called, Threats against Smartphones Are Rising, talks about the security of Smartphones. He says that, as smart phones turn out to be a larger fraction of our existences, we wait for the victorious attacks in opposition to them to amplify. Many people carry an illusion that smart phones such as iPhone and BlackBerry are immune to start virus threats. For this reason, virus protection software is not a mainstream industry when it comes to these types of devices. Not only do smart phones enclose a gold mine of individual and corporate data, they may offer a right of entry position into business networks. As an effect, wait for smart phones hits to give attention on stealing the data on an exacting phone, or utilizing them to enter a network. (Threats against Smartphones are rising by William Deutsch.)

Research Methodology

Research problem

The topic of exploiting by Smart Phones is a very interesting research topic. Smart Phones are wireless mobile devices which offer a number of special additional features in comparison to featured phones which are used only for making calls like the internet connection and other computer applications. The research problem is to research on the negative issues relating to smart phones like the Blackberry and iPhone and its involvement in several criminal cases.

Research Design

There are two research methodologies which are generally used for the purpose of research: Quantitative and Qualitative. The topic of exploitation of smart phones is more of a topic which can be qualitatively researched. Research design is a framework in which the research situation is analyzed so that an appropriate research method can be adopted. Careful analysis and stated facts were collected for the purpose of this research design. The role of Smartphones in a number of criminal cases in a number of countries was considered like the cases of financial scams and cases of child pornography. Many financial scams and child pornography cases reported in UAE were conducted by using Smartphones.

Developing a research plan

The research plan is a significant ingredient that is to be developed after selecting the research design and narrowing down to research problem. The research plan of any study should comprise of research on objectives, problems, concepts and obtaining the details of various techniques that are involved in the successful completion and deriving the most appropriate findings of a particular study. The contextual background was identified as different countries and the priority areas for the purpose of the research were the cases reported in various parts of the world.

Research was conducted in universities, offices, mobile phone corporations, security agencies, detective agencies etc, in order to understand the negative issues and exploitation of smart phones such as Blackberry and iPhones. Smart phones are more effective than mobile phones due to their utility as a device with diverse applications. However, these equipments are being used to fan violence, cyber crime and terrorism and are vulnerable to disruption of communication. Affordable mobile internet  smart phones and data servicesexist today in wealthier societies and could be near universal in the next generation (Akhtar & Arinto, 2009, p.vii).

Smart phones offer uninterrupted, uncontrolled 24 x 7 internet service, which while being beneficial, also runs several risks too.

Selection of Qualitative over Quantitative for this specific research

Mobile phones and smart phones are an integral part of our society in the present day. Therefore, the research topic of study needs to be perceived as a social science topic of study. The research topic involves the issue of investigating many people from different areas of research such as universities, offices, smart phone agencies, detective and security agencies etc. Therefore, there is a lot of human involvement and hence the type research which can be more appropriate is qualitative methodology. Blackberry users are at a risk of weakening the power of concentration and are creators of Brain Sickness. Therefore the notion is do not make yourself blackberry slave or vibrating tone (Blackberry bad effect: Behind the positive, smartphones side effects can endanger our health, 2010, para.6).

Qualitative research

The main qualitative method that is used for the purpose of this research is case study analysis. For this purpose, previous cases of smart phones causing danger to security concerns have been analyzed. It has been found that there were many instances where have caused smart phones danger by transmitting information because the smart phones use advanced technologies. The use of advanced technologies in smart phones like Blackberry leads to the copying of secret information easily and its wide internet usage transmits information faster than any other service. Sensitive corporate data on smart phones will probably draw only a small number of very targeted attacks; but it only makes sense that security pros expect attack trends on mobile devices to mirror trends for all other computing environments (What happens next: A giant hamster wheel of pain, 2009, p.31).

Thus, the case study used in the qualitative research provides a better analysis of previous cases and is thus more helpful in helping the research. There is several criminal case instances reported in Abu Dhabi such as child pornography and financial scams which has led the Abu Dhabi government to consult a team of experts from the MET laboratory in London by which they can learn how to retrieve and extract data of crimes done through using Smartphones.

The forensic experts are learning how to combat the increasing crimes using Smartphones. Smartphone crimes were highly prevalent in US also. Ed Stroz who worked in the Stroz Friedberg had detected a number of Smartphone crimes and had served for a huge period in the US federal bureau of investigation. Many digital crime cases were hacked by Stroz, the most important being the case of a Russian criminal who committed a burglary in Citibank.

Smartphone are used today in forgery, fraud and defamation cases. Symbian Smartphones forensics is a new study found out to enforce law in digital crime cases. Private and confidential information can be transferred using Smartphones. These Smartphones arte highly advanced and can transfer highly confidential and private information of celebrities and they can be associated with several criminal cases. Several countries have faced failures in detection of crimes because of their inability to hack the data stored in the internal memory card of the Smartphones. But now technologies have been developed for seizing the data stored in the internal memory of the Smartphones to detect the crimes and to understand the background of crimes.

Mustaque Ahamad who is the director of the Atlanta-based centre for technology-security expertise and education is of the opinion that Smartphones are used in gaining private health records of celebrities like politicians and are then misused in crimes. He is of the opinion that the battery power available in Smartphone slows down the detection process in criminal cases and hampers the investigation process.

Analysis and results

Smart phones are those that are much significant today, and have captured the market at a rapid pace. It has quickly replaced the feature phone and the current survey says that 40% of consumers are now using smart phones.

Exploitation within the learning environment

As a greater majority of students are interested in using sophisticated technology for digital education and e-learning, equipments like smart phones and iPhones stand to gain quick popularity among the student population. They also prefer to use Smartphones to play songs, videos, taking photographs and for multimedia storage, with USB connector and enjoy the entertainment during free hours.

The popularity that these modern gadgets enjoy will influence not only the student themselves, but also a generation, other students and in a few cases, the family members. Thus the study will need to encompass a wider specter of population. One has to also consider the misuse of these equipments by students. These topics incorporated risk analysis, medical proceedings and the explosive related subjects in the country. It was mainly as a catalyst in generating certain information on the same.

For example, a student report shows how to be an immigrant to different countries and the criminal lessons by the Kray brothers, various graphical lessons which makes or contributes to difficult questions that are to be answered. On the other hand, the humorous elements for the resources as the fun making elements can help the students for the completion of the assignments and then submitting the assignment to the various social networking like the Twitter, Facebook, Orkut etc. This will contribute for enjoyment for student and the good results can be achieved by them.

Students see the use and effortlessness as the smartphones chief reward. One student specified that it is easy to handle and use. Besides, it is good for data transfer at the highest possible speed and easy in accessing the information. The major disadvantage centers on the deficient video format suitability among the smartphone and computer. Therefore, the transferring rates are not compatible with each other. The email and internet services are popular and are added advantages in comparison to the featured phones and these phones create a kind of the revolution in the cyber era.

Smart phones are found to run the risk of being used by children to watch pornography and also possibility of , the sending various porn sites through the blue tooth and the other 3G accessories besides with these phones in possession , the children receive the freedom accessing the sites and getting adequate information on various pornographic sites. In the current era schools and other educational institutions are banning smart phones because these are being misused.

The various threats faced by the smart phones are the

Allowing unauthorized access

This allows the accessing of the iPhone or BlackBerry though access is restricted. The password, applications or services have been hacked. This helps in accessing much of the information from the domain and storing of the information in other cache memory.

Diverting the calls

With the advent of the new techniques, attackers or hackers can divert any phone calls and then make use of the same to make calls. Calls can also be forwarded and they are given to the service provider and the charges applicable are much higher than the regular rate.

Malware propagation

Malware is a mechanism that can cause harm to the device. Such attacks can affect only a particular mobile customer. However, large scale assaults can be accumulated to immobilize communal services. The malware propagation is a serious threat people need to be careful as this can cause exploitation among the Wi-Fi network and the cross service exploitation on cyber and cellular networks. The whole the number of 911 calls placed by people using wireless phones has radically increased. Public safety personnel estimate that about 50 percent of the millions of 911 calls they receive daily are placed from wireless phones, and that percentage is growing (Liu, et al, 2009, p.6).

Blackberry product sales are found to be at a quick decrease in the current report as there is much fear of banning of smart phones in various countries. Many of the countries have warned against the use of such phones and sales have decreased rapidly. A Canadian based seller of the iPhone reports so.

Conclusion

Students, criminals and hackers are found to be accessing of the of various services multimedia accessible on the smart phone as they are the influential enablers for the service. Phone companies would persist in expanding the gadget for various kinds of people performing various tasks and they are useful for the understanding the activity. Mobile computer systems such as PDA and smart phones are becoming popular due the ease and comfort they provide. Along with this development, there is an increase of spiteful behavior with these mobile systems, such as in sequence escape, service burglary, and power collapse.

Besides the threats posed against personal mobile users, it also paves the way for more serious problems such as disabling of significant communal replicated corporal systems that are associated to the wireless communications. Normally people do not recognize the gravity of such situations. The portable devices, even with safety mechanism, are still susceptible to a set of vigilantly crafted attacks. Taking Linux-base phones as an illustration we show that this vulnerability not only makes it possible to attack individual mobile devices such as restricted resources, defense mechanisms, and divert phone calls, but also can be used to commence scattered denial-of-service attack next to significant communal services such as 911.

Reference List

Akhtar, S., & Arinto, P. (2009). Digital review of Asia Pacific 2009-2010. IDRC, p.vii. Web.

Blackberry bad effect: Behind the positive, smartphones side effects can endanger our health. (2010). Tommy. Web.

Blackberry exploit: An open door to your corporate network. (2009). Jefferson Wells, p.1. Web.

Jackson, L. (2010). How smartphones have evolved. Articles Base. Web.

Liu, L., et al. (2009). Exploitation and threat analysis of open mobile devices. Google Docs, p.6. Web.

What happens next: A giant hamster wheel of pain. (2009). CSO, p.31. Web.

Yam, M. (2009). iPhones 3GS exploit found for jailbreak and unlock. Toms Guide. Web.

The Newest Gadget in Action: Anything Locator Application for iPhone

Concerning the Design: Its not What It Seems

Introducing a gadget with an original design is one of the keys to the success of the given technological novelty. Therefore, the peculiarities of the Locator Application for iPhone are of crucial importance for the publics perception.

Taking into consideration the elements that add to the stylishness and the functionality of the given gadget one must admit that the features of the given Locator Application for iPhone offer a balanced and well thought-out idea.

Speaking of the aesthetic look of the gadget, one must mark the sleek look of the black surface and the glittering chrome internal components, which add incredible smoothness to the entire device. The blue light striking when the device receives the signals adds a certain element of high-tech and makes the gadget look more impressive, whereas the hole in the left upper corner allows both to decorate the device and to make sure that its secure.

It is essential that the design of the Locator Application for iPhone also presupposes high functionality of the device. Only 2 square, the given gadget fits ones hand perfectly well, yet is not too light owing to the rubber bottom that adds certain weight to it, both literally and metaphorically.

With the help of the LED display, one can see the battery life, which is quite important and convenient. It is important that the gadget can run for three days without recharging. In addition, the innovation that allows to plug the battery for charging into the car, computer or wall socket is also quite fresh.

Protection: Reinforcing the Security System

Because of the controversies concerning the high rates of competition in the modern gadgets market, a specific protection strategy must be worked out to provide the maximum security for the Locator Application for iPhone; otherwise, it is highly probable that the other companies could plagiarize the given gadget.

When speaking of the gadget protection, it is necessary to consider the Intellectual Property rights. Documenting the development of the gadget and obtaining the patent for the development of the Locator Application for iPhone, one can efficiently avoid the possible violations of the copyright law and make certain that no accidents of plagiarism could occur.

Therefore, patenting the Locator Application for iPhone is absolutely necessary for the project to be completely safe from the plagiarism of the ideas and the concept.

Beware the Competitors: No Trespassers Allowed

Because of the large number of the competitors in the given market, one must take considerable care of the plausible attempts on outrunning the given device. Therefore, the list of the competitors in the given sphere is to be made. Moreover, the weaknesses of the latter are to be marked. Hence, the strategies for the integration of the Locator Application for iPhone into the market can be offered.

Among the most widespread competitors to consider, such Apple products as the Dealer Locator Application for iPhone that assists in finding the closest Continental service provider should be considered (Tucker).

To counter the given applications, it is necessary to introduce a larger number of locations in the digital map of the Anything Locator Application for iPhone. Therefore, high efficiency of the device will enjoy wide popularity in the market. Learning the strengths of the competitors, one can improve the current gadget and succeed in the world market.

Works Cited

Tucker, Laura. Useful iPhone Locator Apps& Never Lose Your Phone Again. MakeTechEasier, 25 Apr. 2011, Web.

The iPhone Usage for Educational Purposes

Technology Standard (1): Technology Operations and Concepts

  1. The attached artifact is the iPhone that can be successfully used in the learning environment. It can be a very valuable means of education as it helps students save their time when looking for information for assignments, always get the necessary help from tutors through the Internet, and use various applications to enhance their learning opportunities.
  2. Using the iPhone for educational purposes can open access to many facilities, such as online libraries and databases, as well as online lectures or look up campus maps. The artifact provides the opportunity both for teachers and students to keep abreast of the growth in technology knowledge and develop the necessary skills to operate the knowledge in the educational environment.
  3. The usage of the Technology Standard (1) provides the necessity to learn more about modern technologies and innovations. Thus, I will use them to organize learning activities, for example, using avatars, social software, and Peer-to-peer technologies can help work out effective training strategies.

Technology Standard (2): Planning & Designing Learning Environments

  1. Technology Hardware and Software provide additional help when organizing and planning a learning environment. The artifact demonstrates how technologies can be used to meet different students needs, assess their level of knowledge, and plan for the management of technology resources to organize the learning of parts of speech.
  2. The attached artifact demonstrates how teachers should plan and organize students activities to enhance their understanding of the parts of speech and how the usage of technology can be applied to adopt the assignments to students with different levels of knowledge.
  3. I will use PowerPoint presentations as one of the ways to assess students, Multimedia tools to broader the educational activities, and e-mailing as a means of communication and controlling of students progress.

Technology Standard (3): Teaching, Learning, and the Curriculum

  1. The attached artifact demonstrates how teachers can use technology to address the content of the lesson and make learning more creative.
  2. The PowerPoint presentation is an effective means to develop students creativity, skills of working with hardware and software and raise their interest in the subjects. It can be used when learning languages, as well as other subjects.
  3. I will use PowerPoint presentations to raise the interest of students in my lesson, assess them and perform individual, as well as group tasks to develop skills of teamwork. Also, it can be used to prepare students for incorporating other technologies in the classroom.

Technology Standard (4): Assessment and Evaluation

  1. The artifact, Presentation Rubric demonstrates how students projects (PowerPoint) presentations should be assessed. It presents a detailed explanation of how a teacher should assess every aspect of a students work.
  2. The artifact serves as a great example of how the assessment must be organized to meet the standard. In a structured and appropriate manner, it demonstrates how teachers and students should approach the assessment of tasks performed with the help of technology resources, interpret results, and assess their skills. This approach can be applied not only to PowerPoint presentations but to working with other applications as well.
  3. My further goals are to use the approach provided in the artifact. Introduce into the teaching practice working and assessing students with the help of technology, and work out detailed requirements to tasks that presuppose using technologies so that students know what is expected from them.

Technology Standard (5): Productivity and Professional Practice

  1. The attached artifact perfectly demonstrates how technology can be used to enhance the productivity and professional practice of teachers. It also demonstrates how technology can be applied to self-assessment and communication with peers and partners.
  2. To meet this standard, the artifact can be successfully applied. For example, the teacher can make a comparative analysis of his/her performance when creating a table of performed professional practices. Thus, he/she will be able to evaluate the performance, define future goals and strategies for future professional development.
  3. My future goals related to this standard is to use technologies to assess my accomplishments, as well as the accomplishment of my students. Application of the technology to increase my productivity and define strategies for life-time learning to constantly develop my skills and reflect professional practices which will allow me to know what I should aspire to.
  1. The artifact provided perfectly demonstrates how social, health ethical, and human issues deal with the use of technology in the learning environment. It demonstrates that excessive use of technology can cause some problems with health. Thus, the artifact shows that the approach to the use of technology in class should be taken into consideration and teachers must know the techniques how to prevent health problems and organize learning activities so that technology was not a threat to the students health.
  2. Meeting this standard is essential as we live in a multicultural society and technology should contribute to communication and affirm diversity. In this light, all students should have equitable access to the technology used in class to contribute to their learning activities.
  3. My future goals are to use technology to enhance communication between students with diverse backgrounds and abilities, as well as work out effective practices which will take into consideration health, social and human issues to create a healthy and friendly educational environment.

IPhone 5S Instructional Manual

Introduction

In this instructional manual, the details pertaining to the iPhone 5s series of apple phones is outlined. Figure 1 is a schematic representation of the phone. The manual explains the basics of operating the phone. Also, the manual illustrates how to get started with respect to the phones operations. Details pertaining to the use of Siri and other features of the phone are elaborated with the intention of making the application of the machine easy (Eunson 23).

iPhone 5s overview
Figure 1

Features and Accessories

The iPhone 5s has several features and accessories which make up for the phones operations. As indicated in Figure 1, the phone has a total of 12 features. In point form, the features are as follows:

  • A face time camera.
  • An isight camera.
  • A rear microphone.
  • A SIM card tray.
  • A speaker.
  • A lightning connector.
  • A home button.
  • Sleep/wake button.
  • Headset jack.
  • Volume buttons.
  • Bottom microphone.
  • Multi-touch display.
  • Receiver microphone.
  • A face time camera.

The iPhone 5s also comes with a number of accessories which aid in the operations of the phone. The main accessories that come with the phone include the following:

  1. An Apple headset: The phone work with the Apple EarPods to allow one to listen to music and videos and to make phone calls.
  2. A connecting cable: The cable, also known as a USB, connects the phone to an external computer for synchronization purposes. The cable is also used to charge the phone.
  3. An Apple USB power adaptor: The adaptor is used in conjunction with the connecting cable to power up the phone
  4. SIM eject tool: This accessory should be used to eject a SIM card from the tray

Getting Started

There are a number of processes that should be followed before one can use the iPhone. In this section, the preliminary actions are outlined:

Installing the SIM

An iPhone 5s uses a Nano-SIM card for the purposes of making use of the cellular services. The services include making phone calls and internet connectivity the SIM card is inserted into the phone through the SIM card tray using the eject tool mentioned.

Activation of the Phone

The activation process requires a live network. To this end, a wireless network or the cellular network becomes necessary. The following steps should be undertaken:

  • Connect to an internet network (Wi-Fi or cellular).
  • Create an Apple ID.
  • Enter the necessary passcode.
  • Set up an iCloud account.
  • Ensure all the necessary features are turned on.

Phone Usage

Making a phone call

The process of making a phone call begins with the selection of a contact from the phonebook. One can either use the Siri software to select a contact or scroll to the phone book manually. Using Siri one needs only utter the phrase, call Tom and the contact will be called.

Accepting a call

One accepts a call by sliding or tapping on the green icon that appears on the screen. The red icon that appears is meant for declining a phone call.

Siri

Siri is the software that is used to carry out a number of operations on the phone. The software works on the principle of voice control. Siri works for all the operations on the phone. The voice command requires the phones owner to issue commands while speaking into the speaker. For instance, one can ask Siri to show photos. The same prompts the phone to open the gallery and show all the necessary photos. Siri helps make the use of the phone easier and faster.

Camera

The camera allows for the recording of the videos and capturing of photos. Using Siri or a manual operation, the user can use either the front or rear camera. Once the application opens one can choose between the video option and the still pictures option. The red button that appears allows one to carry out the intended option.

Messaging

The phone has the option of sending messages via SMS, E-mails or multi-media messages. The messages are sent via a typing mechanism that is accessed on the phones keypad. The messages are displayed on the screen. The messaging mechanism works for other messaging applications that are downloaded from the internet.

Applications

The applications are stored in a folder names applications some of the applications range from weather, social media and financials. The following is a list f the applications that come with an iPhone 5s:

  • Compass.
  • Passbook.
  • ITunes store.
  • Compass.
  • Passbook.
  • Stocks.
  • Clock.
  • Maps.
  • Social media.

The applications are accessed from the iTunes app store and they require one to register themselves o the online platform.

Safety, Handling, and Support

An iPhone should be handled with care. Considering that it is made with glass, plastic and light metal. The device also has sensitive electronic components. The use of a damaged iPhone has the potential cause injury in case one is concerned about scratching the surface of iPhone the use of a case or cover advised. The phone should not be opened in an attempt to repair unless one is a professional. Disassembly of the phone may lead to damage and may also lead to injury to the user. In case the phone gets damaged, malfunctions one should contact an Apple Authorized Service Provider.

Any attempt to replace the phones battery by oneself. Such attempts may damage the battery. Consequently the phone would eventually overheat. The lithium-ion battery in phone should be replaced trained agent from an Apple Authorized Service Provider. Once replaced the battery should be recycled. Incineration of the battery is not advised. The use of an iPhone in some circumstances can be distractive and result in danger to the user. The use of the phone should be avoided when one is cycling, driving or handling of machinery.

Works Cited

Eunson, Baden. Business Writing, Milton: Wiley, 2007. Print.

IPod vs. iPhone: Extended Features and Popularity

It is not a secret that the Apple iPhone is the most recognizable and popular phone on the planet. However, it is not the most affordable one. It seems that for those who want to enjoy the benefits of the iPhone or just to get acquainted with iOS, Apple created the iPod younger brother  iPod music player.

The iPod is almost twice cheaper than the iPhone with a similar memory. It suggests a significant difference in the functional quality. Speaking of his personal experience, Shalin notes both advantages and disadvantages of iPod: small, portable, and had a good battery life, but had only one audio jack (114). Even though the iPod has a most of the iPhone functional, Apple had to remove some of the characteristics and components. Processor set to iPod, generally similar to the processor of the corresponding model of iPhone.

However, another important component of almost any portable device is a screen. It made by Retina technology but has a smaller angle of view (Shanklin par. 7). Also, the colors on the iPod screen seem dull and lifeless. The mentioned shortcomings are noticed only at the direct comparison of the two screens, as, before comparison, pictures on the iPod screen are clear and bright. Due to Retina technology, it is almost impossible to discern individual pixels, in other words, there is no graininess.

Another evident difference is a camera. The camera module installed in iPhone suits for casual shots on the street or in a company. iPhone copes well with shooting in optimal conditions. Probably, the camera installed in the iPod is just for a show, because it is practically useless while the front camera of both devices does a good job with its responsibilities. The player is also installed with 256 MB of RAM memory against of 512 the iPhone (Yoffie and Merrill). This difference is visible when a person uses games and applications, but unnoticeable during web surfing. Pages in Safari browser are opening slower. For example, finger zoom is rather inconvenient (Engst and Josh Centers par. 5). Partially, the problem might be solved by the installation of the other Web browsers.

Kwan reveals the reason for the iPod popularity in the world: it is capable of storing thousands of songs in such a tiny package (par. 5). Many people believe that the iPhone has two speakers. In fact, it is not. What appears to be the second speaker is a microphone. Therefore, there is no stereo on both the iPhone and iPod. However, the phone speaker louder and better than those of the phone, and using volume function in iTunes, one could make it sound better.

It goes without saying that the sound quality of the headphones should be noted. iPod is a player; therefore, it seems to sound ideal, but it worse than iPhone sound. For example, during the listening to the music in.alac format, some audio player errors become obvious. iPad produces treble and bass in an inappropriate way. However, it could easily play simple compositions of pop or chanson. The listening to more sophisticated styles such as classic, jazz, metal, or rock requires another powerful and high-quality sound source. If you have a smartphone, and you wanted an iPod as a supplement for music, just wait until Apple Music comes out on your platform of choice, advised Tinari (par. 10). iPod seems to be the ideal device for those who are not prepared to purchase and use two gadgets at the same time.

In conclusion, the iPod would suit people unpretentious to the quality of the music.

Works Cited

Engst, Adam C., and Josh Centers. TidBITS Articles. 2014. Web.

Kwan, Michael. LoveToKnow. n.d. Web.

Shalin, Hai-Jew. Enhancing Qualitative and Mixed Methods Research with Technology, Hershey, PA: IGI Global, 2015. Print.

Shanklin, Will. Apple IPod Touch (6th Generation) vs. IPhone 6. 2015. Web.

Tinari, George. Cult of Mac. 2015. Web.

Yoffie, David B., and Travis D. Merrill. IPod vs. Cell Phone: A Mobile Music Revolution? Boston, MA: Harvard Business School, 2008. Print.

The iPhones Main Features and Productivity

Since the innovation of the flip phones the iphone is the other gadget that has taken tech to the next level. This refers to a type of a Smartphone that was established and is sold by Apple incorporated. It has a variety of internet apart from multimedia applications that set it apart from other gadgets of its caliber. The main features that it does posses include camera, music player, and voicemail just to mention but a few.

One can check mail, browse or utilize Wi-Fi connectivity. In enhancing the user interface, the gadget has a multi touch screen with a virtualized keyboard. The sophistication of the iPhone is reiterated by Jacko (422) who is of the opinion that the exquisite look of the gadget coupled with the touch screen effectiveness has made many other firms come groping for the success of this firm.

The order by Apples CEO that touch screens be investigated formed the grounding for the invention of the iphone. In collaboration with AT&T, Apple came up with the iphone in a deal costing about 150million dollars in the period running to over 30 months.

The initial design was rejected before Cingular gave Apple the discretion to produce the iphone in house. Unveiling of the iphone to the public happened on 9th of January 2007. However, sales for the gadget started out on June 29th 2007 in the US. In the spring of 2008, the gadget found its way into the Germany, France and UK markets.

At the inception of the iphone in 2007, there wasnt many features save for the fact that it was cute looking and one could see the caller. With further updates, persons can stream music videos directly from MTV, get their way in new locations by the use of GPS and has created better utilities for online shoppers.

Of late one can order commodities online at the comfort of their palms. Online banking is now very possible with the new updates on the iphone. Previously, security was an issue in terms of concerns raised by depositors as they could not trust engaging in online transactions.

Payments can now be made easier just as much as account balances can be confirmed online. Facilities have now been incorporated in the iphone so that the gadget can detect noise and automatically time out. This benefits parents who would not want their unknowing children messing up with the gadgets. Puzzle solving is now backed up by music plus a horst of other games that are 3D. Since the inception of the iphone, insurance can be done to guard against theft of the iphone at the click of a button.

Now if you thought you were going to queue at your insurance firm for this, be relieved. The gazillion exquisite applications available on the iphone cannot all be mentioned here. This is just but a tip of the iceberg. According to the Wall Street Journal (1), Apple has plans of coming up with an even faster iphone. Moreover, one can easily access tools to do a publishing of texts, photos or blogs anywhere at any time. (Rich 16)

Even with technology soared by the iphone, society has had various opinions to express towards the gadget. Many and sundry are of the opinion that addiction is eminent with the iphone.

Productivity in other aspects of life has greatly been lowered since people spend much time head down on the gadgets browsing here, chatting there and emailing everywhere. There has hence been complaining of user dependency as persons view it as yet an extension of peoples brains. People have ended up being very disconnected as natural socialization is diminished.

This does not mean that the iphone has only elicited negative responses. Others thank the gadget for entertainment and convenience for the activities is assured to them. A section of society has therefore considered the iphone to be the dream gadget with access to a myriad of applications.

Other people still dont view it so useful since they dont use most of the applications presented by the gadget. At the same time the gadget has been hailed for a sense of simplicity, ease of use and consistency (Jacko 422). Just barely a week ago, another new one from Apple called the iPad has been launched. Technology seems to be going high and high and definitely the iPhone is not the end of it.

Works Cited

Kane Yukari, Tsai Ting-i & Sheth Niraj. New iPhone Could End AT&Ts U.S. Monopoly. Wall street journal digital network. Retrieved from on 6th April 2010.

Jacko Julie. Human-Computer Interaction. New Trends. Berlin: Springer Verlag, 2009. Print.

Rich Jason. Blogging for Fame and Fortune. New York: Entrepreneur Press, 2009. Print.

IPhone Product Life Cycle Analysis

Abstract

The product life cycle (PLC) is one of the most crucial methods describing the processes of development, introduction, growth, maturity, and decline of a product. When entrepreneurs are leading their products through these five stages, they often apply the 4P method that stands for product, price, promotion, and place to create an effective business plan (Sradersmar, 2019). Further, each stage of the PLS of the iPhone, applying the 4P method will be described.

Development

  • Product: Interestingly, the development of the iPhone started as a part of a project aimed to create an alternative for a PC mouse.
  • Place: The US-based project had the codename Project Purple, and in its framework, the Model 035 was developed, which included a touchpad allowing its users to pinch, scroll and zoom without pressing any keys (Jones, 2020). After the iPod appeared, the developers made sure that consumers will never give up their mobile phones for anything (Jones, 2020).
  • Promotion: Hence, in 2005 Apple released the Rokr E1 in partnership with Motorola (Jones, 2020).
  • Price: This new mobile phone was quite a chip and compatible with iTunes and allowed to store and play the music but had severe technical limitations.

Introduction

  • Product: The company moved on and finally presented the first iPhone.
  • Promotion: It happened on 29 June 2007; the device had a thick, unbreakable Gorilla Glass screen and excellent technical specifications (Jones, 2020).
  • Price: Although the initial price was high  $499 for 4 GB and $599 for 8 GB memory storage, by the end of the year, Apple sold 6 million units (Jones, 2020).
  • Place: The product was mainly being sold in the US, UK, and Germany, and somewhat later, it reached consumers from the Netherlands, Belgium, and France (Jones, 2020). It had overwhelming success and instantly conquered the market.

Growth

  • Price: Several months after the release, the initial price for the iPhone was lowered dramatically.
  • Promotion: A discount of $200 was a good move, even though Apple had to give $100 gift vouchers to its fans who bought the phone for $599 (Jones, 2020).
  • Product: Besides, the introduction of 3G in 2008 was another wise decision (Jones, 2020).
  • Place: Apple was striving to reach its targets  make the iPhone faster, cheaper, more compatible with third-party apps, and available in more countries.

Growth Continuation

  • Product: Therefore, the company introduced the iOS2, App Store, and new software, allowing third-party apps.
  • Price: The price was lowered once more when the iPhone 3G was released on 11 July 2008  to $199 for 8GB and $299 for 16GB storage space (Jones, 2020).
  • Place: Now, it was sold in 21 countries throughout Western Europe and North America (Jones, 2020).
  • Promotion: Next month, countries from South America and Central Europe expanded this list.

Maturity

  • Place: In 2010 the device could be purchased worldwide, and the price was set and remained unchanged.
  • Price: Now it was $199 for less storage memory and $299 for more (Jones, 2020).
  • Product: Besides, the product was still gaining new features, like 4G, Wi-Fi, Siri, more memory storage, and longer battery life (Jones, 2020).
  • Promotion: The price went higher only for iPhone 7, iPhone X, and iPhone Pro models in 2016-2019 (Jones, 2020). The product had never reached the decline stage, mainly because the developers tumbled to start raising the price while introducing new features to engage wealthier customers.

References

Jones, M. (2020). . History Cooperative. Web.

Sradersmar, A. (2019). . TheStreet. Web.

Blackberry and iPhone: Exploits of Smartphones

Introduction

Mobile phones have become an inevitable companion for people in the modern era. The new generation is using various kinds of mobile phones for communication. From telephones to iPhones, the developments in technology have changed the vision as well as way of life. Years back, mobile phones were an amazing technology for the common people, but nowadays it has become so common. There are many models of mobile phones.

An important advantage of these phones is that they have made communication very easy. Their widespread use helps the public to be in touch with one another easily and they have access to any person in the world. The trends in mobile technology changed the entire concept of mobile phones and different models are entering the market. Recently, people have changed their preference from ordinary cell phones to Smartphones, and it has become a status symbol and matter of pride in society. These phones facilitate a lot of advantages like texting, picturing messaging, access to the Internet, banking, purchasing etc.

The most recent trend in cell phones brings a union of tone of voice, video and data connections. By joining together information with amusements and leisure, these mobile phones are the latest style in the developing path of infotainments. The latest models of cell phones are not only for voice, but it has changed the mode from voice call to video calls. Smartphone introduction has now modified the mobile set to a full-grown minicomputer.

It includes MP3 systems, video recording system like real movie reels, radio and TV entertainments etc at the punch of mobile keys besides digital cameras with several pixels and high speed internet. So, we cannot confine them within the scope of the word mobile phones. Such are the new trends in mobile phone technologies and their development into the Smartphone.

The most important producers of mobile phones include Nokia, Samsung, Sony Ericsson and Motorola. But these mobile giants now face stiff competition because of the new trends. The first generation or 1G technology has disappeared from history. In the new era, third generation or 3G technology is conquering the hearts of mobile users. The firms which are active in making cell phones with most up-to-date 3G utilities are making good profits. Smartphones like Blackberry and iPhone are now coming with larger displays, touch screen and virtual keyboards. These keyboards are easy to use and are able to being restructured and modified by the users.

The operating system is very crucial in every Smartphone in the present day world. Unfortunately, it remains a fact that some people misuse such technologies. It is not the problem with the technology as such but it is because of the anti-social elements among public who create a bad image about the new technologies. Smartphones such as Blackberry and iPhone in the possession of such people are misused by them creating a threat to the security of people as well as nations. Another risk is that hackers can manipulate the technology of smartphones and can mount an attack. Blackberry is vulnerable to compound attacks and leak of private data or misuse of the same.

For this, the signature and code signing keys can be acquired at cheaper rates. The customer could be simply deceived by sending very exclusive messages by a function that makes to bond to the internet for legal intention. These are highly subjected to SMS harassments that permit the hackers to send SMS through the contaminated mechanism and to obtain entry to the code giving them open internet admission and the actual user has to pay for these. These signed functions can send emails and read incoming mails. They can add, delete or alter the contact details and can unlock the TCP/IP links. These details can be sent to any other application by the attackers.

In recent times, there was an assault that gave the strangers straight admission to business structures and network information through a connected Blackberry or new personal digital assistant, avoiding every applied outside contact obstructions. The attack uses Trojan code based on a Blackberry proxy attack (BBProxy). Blackberry devices are typically connected to a corporate network through a persistent tunnel implemented via a protected VPN that prevents the communication from being inspected by an external process. This connection is terminated within the network at the corporate Blackberry server. The effect of this connection is to make Blackberry essentially part of the internal network, regardless of Blackberrys connection point (Blackberry exploit: An open door to your corporate network, 2009, p.1).

iPhones also stand the chance of attack by viruses and information can be extracted covertly. This will lead to code and signature exploitation and wireless exploitations. Unauthorized calls from Blackberry and iPhones have, in many cases, caused threats to the security of nations. Some nations are even contemplating the banning of Blackberry to avoid the threat of terrorists using this modern technology for their ulterior motives. In many instances the countries have not been able to trace data from Blackberry and this leaves scope for anyone to use this opportunity, and it makes it easy for the terrorists to plan and execute violence. Countries like India have asked Blackberry owners to start their network tracking system in those nations itself to get the details. Based on the survey of Trend Micro, some Smartphone owners have already encountered hacking of bank details.

IPhones have inherent security dangers caused due to software errors that can reveal the clients information. There can also be exploitation of passwords leading to several attacks. These hits will be able to be noticed by some of the IDS/IPS systems. There are some possible remedies for these exploitations. The use of alarms or security alerts will help to decrease attacks and exploitations.

Literature Review

Introduction

Blackberries and iPhones contain effective software and technology. Smartphones such as Blackberry and iPhone recommend are high end devices designed to help people by providing them suitable platform for exchange of information and associated facilities. This is an up to date space of cross cultural and imaginative outlook. Blackberry and iPhone are mobile phones that provide more progressed connectivity than an up to date basic characteristic of feature phone. These Smartphones run entire operating systems. Because the product is technologically innovative, research has to be conducted to determine issues consisting of the environment of the marketplaces, motivation, outlook, preferences and purposes.

Logan Jackson, in his Articles called How Smartphones Have Evolved, states that Cell phones have progressed a lot in the past decade in comparison to its initial launch. Some of the Smartphones have turned out to be extremely complicated and technologically advanced. There is high demand for smart phones nowadays. Current smart phones have some kind of operating system (OS) and are able to have new apps installed on them. They can either be open source or be like the iPhone and be totally proprietary, meaning you cant easily program your own apps or easily download whatever you want for free.

So, if given the choice, open source is definitely better, no matter what the Apple fan boys will tell you. The Symbian OS is currently the most well-known open source OS, but Googles Android system is becoming more popular as well (Jackson, 2010, para.3). He also says that, a number of Smartphones also have been manufactured with GPS attributes which operate by means of satellite so that it will not get misplaced or lost.

Even though a smart phone does not maintain satellite supported GPS, they can still make use of maps or somewhat identical equipments to estimate the place it is housed on the basis of cell phone tower stationing. So, smart phones are indeed much like miniature laptops in a sense (even smaller than net books). Which one you decide to buy depends on what you need it to do. If you plan to type a lot, I would personally recommend you get one with a QWERTY keypad, and avoid phones that only have on-screen touch screen keyboards because those will make your screen dirty all the time (Jackson, 2010, para.6).

According to Art Rosenberg in his Article called, Consumer UC, Smartphones, CEBP Drive NexGen Customer Service, the speedy acceptance of multimodal, personalized or modified smartphones, customers and company clients, get the chance to make use of UC for equally inbound and outbound genuine -point communications among clientele, endeavor action-takers, and computerized trade applications will be increasing considerably. The idea behind the Apps Store of wireless service suppliers can be comprehensive to the endeavor portals to assist individual purchasers admittance to a variety of mobile consumer submissions.

The computerized trade procedure can observe the position of submission metrics and proactively start a modified consumer contact by way of a selection of customer interfaces on the basis of convenience or consumers preference. (Consumer UC, Smartphones, CEBP Drive NexGen Customer Service by Art Rosenberg. Published in the year January 25, 2010). The iPhone 3GS (now new and improved with no space between the 3G and S) has been out in parts of the world for a full week, and hackers are already looking for exploits in order to jailbreak and unlock the device to set it free. Fortunately for iPhone 3GS owners not content with being confined, famed iPhone hacker George Hotz claims to have found an exploit in the latest Apple phone (Yam, 2009, para.1).

According to Tanmay Sasvadkar in his Article called, The Best Smartphones Ever, Palm is too a large forename in the smart phone category and it is actually tough to overlook this manufacturer for the reason that they have provided us some tremendous handsets. (Best Smartphones ever by Tanmay Sasvadkar.)

William Deutsch in his Article called, Threats against Smartphones Are Rising, talks about the security of Smartphones. He says that, as smart phones turn out to be a larger fraction of our existences, we wait for the victorious attacks in opposition to them to amplify. Many people carry an illusion that smart phones such as iPhone and BlackBerry are immune to start virus threats. For this reason, virus protection software is not a mainstream industry when it comes to these types of devices. Not only do smart phones enclose a gold mine of individual and corporate data, they may offer a right of entry position into business networks. As an effect, wait for smart phones hits to give attention on stealing the data on an exacting phone, or utilizing them to enter a network. (Threats against Smartphones are rising by William Deutsch.)

Research Methodology

Research problem

The topic of exploiting by Smart Phones is a very interesting research topic. Smart Phones are wireless mobile devices which offer a number of special additional features in comparison to featured phones which are used only for making calls like the internet connection and other computer applications. The research problem is to research on the negative issues relating to smart phones like the Blackberry and iPhone and its involvement in several criminal cases.

Research Design

There are two research methodologies which are generally used for the purpose of research: Quantitative and Qualitative. The topic of exploitation of smart phones is more of a topic which can be qualitatively researched. Research design is a framework in which the research situation is analyzed so that an appropriate research method can be adopted. Careful analysis and stated facts were collected for the purpose of this research design. The role of Smartphones in a number of criminal cases in a number of countries was considered like the cases of financial scams and cases of child pornography. Many financial scams and child pornography cases reported in UAE were conducted by using Smartphones.

Developing a research plan

The research plan is a significant ingredient that is to be developed after selecting the research design and narrowing down to research problem. The research plan of any study should comprise of research on objectives, problems, concepts and obtaining the details of various techniques that are involved in the successful completion and deriving the most appropriate findings of a particular study. The contextual background was identified as different countries and the priority areas for the purpose of the research were the cases reported in various parts of the world.

Research was conducted in universities, offices, mobile phone corporations, security agencies, detective agencies etc, in order to understand the negative issues and exploitation of smart phones such as Blackberry and iPhones. Smart phones are more effective than mobile phones due to their utility as a device with diverse applications. However, these equipments are being used to fan violence, cyber crime and terrorism and are vulnerable to disruption of communication. Affordable mobile internet  smart phones and data servicesexist today in wealthier societies and could be near universal in the next generation (Akhtar & Arinto, 2009, p.vii).

Smart phones offer uninterrupted, uncontrolled 24 x 7 internet service, which while being beneficial, also runs several risks too.

Selection of Qualitative over Quantitative for this specific research

Mobile phones and smart phones are an integral part of our society in the present day. Therefore, the research topic of study needs to be perceived as a social science topic of study. The research topic involves the issue of investigating many people from different areas of research such as universities, offices, smart phone agencies, detective and security agencies etc. Therefore, there is a lot of human involvement and hence the type research which can be more appropriate is qualitative methodology. Blackberry users are at a risk of weakening the power of concentration and are creators of Brain Sickness. Therefore the notion is do not make yourself blackberry slave or vibrating tone (Blackberry bad effect: Behind the positive, smartphones side effects can endanger our health, 2010, para.6).

Qualitative research

The main qualitative method that is used for the purpose of this research is case study analysis. For this purpose, previous cases of smart phones causing danger to security concerns have been analyzed. It has been found that there were many instances where have caused smart phones danger by transmitting information because the smart phones use advanced technologies. The use of advanced technologies in smart phones like Blackberry leads to the copying of secret information easily and its wide internet usage transmits information faster than any other service. Sensitive corporate data on smart phones will probably draw only a small number of very targeted attacks; but it only makes sense that security pros expect attack trends on mobile devices to mirror trends for all other computing environments (What happens next: A giant hamster wheel of pain, 2009, p.31).

Thus, the case study used in the qualitative research provides a better analysis of previous cases and is thus more helpful in helping the research. There is several criminal case instances reported in Abu Dhabi such as child pornography and financial scams which has led the Abu Dhabi government to consult a team of experts from the MET laboratory in London by which they can learn how to retrieve and extract data of crimes done through using Smartphones.

The forensic experts are learning how to combat the increasing crimes using Smartphones. Smartphone crimes were highly prevalent in US also. Ed Stroz who worked in the Stroz Friedberg had detected a number of Smartphone crimes and had served for a huge period in the US federal bureau of investigation. Many digital crime cases were hacked by Stroz, the most important being the case of a Russian criminal who committed a burglary in Citibank.

Smartphone are used today in forgery, fraud and defamation cases. Symbian Smartphones forensics is a new study found out to enforce law in digital crime cases. Private and confidential information can be transferred using Smartphones. These Smartphones arte highly advanced and can transfer highly confidential and private information of celebrities and they can be associated with several criminal cases. Several countries have faced failures in detection of crimes because of their inability to hack the data stored in the internal memory card of the Smartphones. But now technologies have been developed for seizing the data stored in the internal memory of the Smartphones to detect the crimes and to understand the background of crimes.

Mustaque Ahamad who is the director of the Atlanta-based centre for technology-security expertise and education is of the opinion that Smartphones are used in gaining private health records of celebrities like politicians and are then misused in crimes. He is of the opinion that the battery power available in Smartphone slows down the detection process in criminal cases and hampers the investigation process.

Analysis and results

Smart phones are those that are much significant today, and have captured the market at a rapid pace. It has quickly replaced the feature phone and the current survey says that 40% of consumers are now using smart phones.

Exploitation within the learning environment

As a greater majority of students are interested in using sophisticated technology for digital education and e-learning, equipments like smart phones and iPhones stand to gain quick popularity among the student population. They also prefer to use Smartphones to play songs, videos, taking photographs and for multimedia storage, with USB connector and enjoy the entertainment during free hours.

The popularity that these modern gadgets enjoy will influence not only the student themselves, but also a generation, other students and in a few cases, the family members. Thus the study will need to encompass a wider specter of population. One has to also consider the misuse of these equipments by students. These topics incorporated risk analysis, medical proceedings and the explosive related subjects in the country. It was mainly as a catalyst in generating certain information on the same.

For example, a student report shows how to be an immigrant to different countries and the criminal lessons by the Kray brothers, various graphical lessons which makes or contributes to difficult questions that are to be answered. On the other hand, the humorous elements for the resources as the fun making elements can help the students for the completion of the assignments and then submitting the assignment to the various social networking like the Twitter, Facebook, Orkut etc. This will contribute for enjoyment for student and the good results can be achieved by them.

Students see the use and effortlessness as the smartphones chief reward. One student specified that it is easy to handle and use. Besides, it is good for data transfer at the highest possible speed and easy in accessing the information. The major disadvantage centers on the deficient video format suitability among the smartphone and computer. Therefore, the transferring rates are not compatible with each other. The email and internet services are popular and are added advantages in comparison to the featured phones and these phones create a kind of the revolution in the cyber era.

Smart phones are found to run the risk of being used by children to watch pornography and also possibility of , the sending various porn sites through the blue tooth and the other 3G accessories besides with these phones in possession , the children receive the freedom accessing the sites and getting adequate information on various pornographic sites. In the current era schools and other educational institutions are banning smart phones because these are being misused.

The various threats faced by the smart phones are the

Allowing unauthorized access

This allows the accessing of the iPhone or BlackBerry though access is restricted. The password, applications or services have been hacked. This helps in accessing much of the information from the domain and storing of the information in other cache memory.

Diverting the calls

With the advent of the new techniques, attackers or hackers can divert any phone calls and then make use of the same to make calls. Calls can also be forwarded and they are given to the service provider and the charges applicable are much higher than the regular rate.

Malware propagation

Malware is a mechanism that can cause harm to the device. Such attacks can affect only a particular mobile customer. However, large scale assaults can be accumulated to immobilize communal services. The malware propagation is a serious threat people need to be careful as this can cause exploitation among the Wi-Fi network and the cross service exploitation on cyber and cellular networks. The whole the number of 911 calls placed by people using wireless phones has radically increased. Public safety personnel estimate that about 50 percent of the millions of 911 calls they receive daily are placed from wireless phones, and that percentage is growing (Liu, et al, 2009, p.6).

Blackberry product sales are found to be at a quick decrease in the current report as there is much fear of banning of smart phones in various countries. Many of the countries have warned against the use of such phones and sales have decreased rapidly. A Canadian based seller of the iPhone reports so.

Conclusion

Students, criminals and hackers are found to be accessing of the of various services multimedia accessible on the smart phone as they are the influential enablers for the service. Phone companies would persist in expanding the gadget for various kinds of people performing various tasks and they are useful for the understanding the activity. Mobile computer systems such as PDA and smart phones are becoming popular due the ease and comfort they provide. Along with this development, there is an increase of spiteful behavior with these mobile systems, such as in sequence escape, service burglary, and power collapse.

Besides the threats posed against personal mobile users, it also paves the way for more serious problems such as disabling of significant communal replicated corporal systems that are associated to the wireless communications. Normally people do not recognize the gravity of such situations. The portable devices, even with safety mechanism, are still susceptible to a set of vigilantly crafted attacks. Taking Linux-base phones as an illustration we show that this vulnerability not only makes it possible to attack individual mobile devices such as restricted resources, defense mechanisms, and divert phone calls, but also can be used to commence scattered denial-of-service attack next to significant communal services such as 911.

Reference List

Akhtar, S., & Arinto, P. (2009). Digital review of Asia Pacific 2009-2010. IDRC, p.vii. Web.

Blackberry bad effect: Behind the positive, smartphones side effects can endanger our health. (2010). Tommy. Web.

Blackberry exploit: An open door to your corporate network. (2009). Jefferson Wells, p.1. Web.

Jackson, L. (2010). How smartphones have evolved. Articles Base. Web.

Liu, L., et al. (2009). Exploitation and threat analysis of open mobile devices. Google Docs, p.6. Web.

What happens next: A giant hamster wheel of pain. (2009). CSO, p.31. Web.

Yam, M. (2009). iPhones 3GS exploit found for jailbreak and unlock. Toms Guide. Web.

Iphone Demand and Supply Theories

Introduction

While bringing various commodities into the market, suppliers have to find a way to bring in a commodity of good quality in order to attract a good market but the most important knowledge to have is how to avoid losses at the same time satisfy the consumers of the product.

All this knowledge will have to be an application of the economics demand and supply theory. This means that the producer will have to satisfy the consumers demand for the product and at the same time producce the commodity at a price that he will be satisfied.

This period makes analysis of how it has been behaving in the market clear. An analysis of Iphones in the market for the past few years explains better how the theory of supply and demand works. This paper therefore, discusses the economics theory of demand and supply while applying the theory in how the production, demand and sale of Iphones have been in the last few years.

The Rise of Iphone

Since the launch, of the Iphone, it is evident that the demand of the product has been increasing, and there is fear that the latter may be overlapping the supply of the product. According to the laws of demand and supply, this behavior can be seen as a positive demand shift.

In definition, it is a point where the demand of a product increases. Cases of increase in demand may occur during holiday seasons, or when a product becomes more popular in a market. The law of demand states that when the value of either a good or service is low, then the demand is high.

However, when the price of a commodity is high, then the demand of that product decreases. On the other hand, when the price of a commodity is high, then the supply of that commodity is high, and when the price is low, the supply is also low. This falls under the supply law.

When there is a shift in demand, either negatively or positively, there will be a definite need for change in price and quantity of thee product to have a balanced equilibrium point. In other words, when if the consumers for a particular product increase, there should be an increase in supply of that product.

In the same case, according to the demand and supply law, when there is a demand shift, there should be an increase in the equilibrium price as well as the equilibrium quantity of that product. In the case of the production of the Apple Iphone, it seems that the supply of the product has been having trouble meeting the increased demand for the product. According to reports last year, it has been a fear that due to increased demand that outruns the supply; Apple may lose its consumers to alternative phones1 (Deffree 45).

Factors Affecting Supply And Demand of The Iphone

In economics, the increase or decrease of a commodity pricing can be caused by several factors. In the supply law, if the production of a commodity is low, then the pricing is low. Other causes of a commodity pricing decrease include the ability to produce the commodity with cheaper means.

In the case of the Apple firm, the pricing of the iphone has gone incredibly low. For instance, the Iphone 3G today coasts over $200 less than when it was launched. In addition, the phone is said to have better applications in terms of speed among others.

This slash of pricing has been caused by the improvement in technology in that there has the firm has found easier means to produce and even better quality product. Therefore, in the question of pricing of the Apple Iphone, the Firm might have followed the law of demand and supply.

With the popularity of the product, it has been evident that the demand for the product continues to increase, and therefore in a demand supply curve, there should be a demand shift on the right side of the graph. According to the demand supply law, with a shift in demand, the price as well as quantity of a product should increase.

If it fails to increase, the graph may suffer an in-equilibrium. This might be happening in the sale of the Iphone because there is a hiked demand for the product; yet, the supply has not met the former. In the case of the prices, Apple might be using a unique strategy in that the older version of Iphones continue to reduce in prices, but other better versions of the same phone are brought to the market, at a higher price.

For instance, the Iphone 3 has continued to be supplied only at a cheaper price. Better yet, Apple has recently launched its newest Iphone 4 at a higher price. Somehow, the firm seems to try balance the price equilibrium by introducing the newest make of the Iphone in a hiked price. However, the firm might still have a problem in governing the quantity equilibrium, and there might be an evident shortage in supply of the popular product.

Elasticity or Inelasticity of Demand of a Product

In the question of elasticity or inelasticity of demand of a product, Apples Iphone should be easy to analyze. In the first place, elasticity in demand of product relies on several factors which include, accessibility or availability of products that can substitute the basic commodity, income of the consumer which enables him to consume the good and time that a consumer may use to stop using a particular commodity.

In the case of Apples products, the Iphone is an elastic product on demand. This is because the product is in a competitive market whereby consumers may opt to use other smart phones with similar applications. So, if the price of the Iphone goes high beyond the consumers meet, then, it is very easy for them to look for substitute products. At the same time, if the supply of the product is low, then the sale of the product would not be successful because consumers may opt to look for alternative products.

According to the economics theory of pricing and revenue, it is only logical that if the prises of a product increase, then the revenue should increase. With the improvement in technology, Apple has been able to produce high quality product which have quite a show of demand.

Even though, the prices of the new products including the Iphone4 and the new Mac handbook are high, consumers seem to be quite interested in the product. The hiked prices of the new products should therefore, bring an impact in revenue during a particular period. According to the companys reports, the revenue has risen from $99.9 billion to $108 billion as at the year20112 (Zielenzier 3).

Conclusion

In my opinion, Apple may have success in increasing prices of some of its products ,which is an, eventual gain in the company. In the law of demand and supply, the company seeks to reach different markets with different products and at varied prices, which in my opinion, seem to stabilize the supply and demand equilibrium.

Works Cited

Deffree, Suzanne. IPhone 4 supply and demand issues could hurt Apple brand. New York: Cengage Learning, 2011. Print.

Zielenziger, David. Apples Report: Annual Revenue Tops $108 Billion. International Business Times. Ibtimes. 2011. Web.

Footnotes

1 Deffree, Suzanne. iPhone 4 supply and demand issues could hurt Apple brand. New York: Cengage Learning, 2011.

2 Zielenziger, David. Apples Report: Annual Revenue Tops $108 Billion. 2011. Washington : International business times.

IPhone Production and Its Impact on Community

Introduction

Apple Inc. is one of the biggest and most valuable global corporations. Most of its recognition, brand value, and profit comes from the sale of its iPhone smartphone devices. The production of the iPhone product is a complex multi-stage process which impacts local communities and creates global phenomena that have long-lasting consequences for society and the environment.

Components

The iPhone is a highly complex device that consists of numerous components which originate from all over the world. Apple is considered to have developed a system considered the epitome of a globalized supply chain economy. Many of its connection and power components, such as the LTE modem, wi-fi module, and battery are made in China. Storage, cameras, and displays are made in Japan. Meanwhile, the processor and RAM are developed and produced in South Korea. The parts are made of metal, conductors, and rare earth minerals which are mined in specialized locations in China and California. The extensive nature of this supply chain requires precise coordination with external firms and governments to ensure a stable delivery of components to the manufacturing location.

Workers

The iPhone is produced through a combination of machine and human labor in factories that are specifically outfitted for production line assembly. One of the most well-known corporations known for iPhone manufacturing is Foxconn, based in China. The company employs thousands of local Chinese workers in its Shanghai and Shenzhen factories. These workers commonly live in company-provided dormitories, in poor conditions and overwhelmingly strict discipline. This includes a rigid schedule with public humiliation or grounds for dismissal for the smallest offenses. Workers are often not permitted basic human comforts or rights, such as to use the restroom.

The environment is extremely high pressure, leading to a noticeable rate of suicides.1 Despite being a large Chinese national company, Foxconn violates numerous labor laws, including hiring underage employees and forcing upward of 70 hours per week, while falsifying documentation.2 Overall, the employees in Foxconn factories are lower class, wage employees which the company views as largely expendable.

Impact on Community

More than half of the tens of millions of iPhones that Apple sells each year are produced at a Foxconn factory complex in Zhengzhou, China. It employs approximately 350,000 people and has become a microcosm of its own, being labeled as iPhone City by local residents.3 It has had a significant impact on the local community and livelihoods of residents. In 2010, the area was underdeveloped farmland, until the government bought it for the factory. Since then, the area has developed a large infrastructure, both commercial and residential. The economic impact is far-reaching as the complex not only attracts local residents but also myriads of Chinese populations following the trend of urbanization as they move to the city to work for Foxconn.

Generally, the factory has led to an increase in wages and lifestyle quality in the area. Salaries range from $300-$700 which is a significant increase over $150 for factory salaries a decade ago.4 However, these residents still live as a lower class and sometimes in poverty and are usually unable to afford such luxurious products as an iPhone. The livelihood of practically every resident and business for tens of miles around the factory is dependent on the choices of Foxconn and popularity of iPhones which require such investments for their production.

The iPhone device has had a significant impact on communities in the decade since its release. It has stimulated a societal by being gradually developed into the ultimate digital device which is used simultaneously for communication, entertainment, mobile computing, and much more.5 The iPhone is used in all aspects of life and society, ranging from private use to professional and business purposes.

Problems with Factory

The biggest issues with Apples iPhone production factories are its labor rights abuses. In 2012, almost 150 workers climbed the room of the factory building and threatened to commit mass suicide as a protest against horrifying working conditions. A similar attempt occurred in 2010 with 18 people jumping and resulting in 14 deaths. The negotiations lasted for almost three days until a compromise was reached.6

A recent protest in 2017 saw hundreds of workers blockade the entrance to the factory as a protest against unpaid wages. Despite attempts by managers to hide the situation, it became a public relations crisis for Apple, forcing it to intervene.7 This suggests that production factories for the iPhone have negative impacts on the local worker population, resulting in large protests to correct injustices by using Apples global brand as a platform.

Costs of Production

The iPhone product is considered to be a high tier, a luxurious smartphone with prices ranging from $700 to upward of $1200 depending on the model and characteristics. Foxconn carries a significant amount of influence as a corporation, even in the United States. A Foxconn plant built in Wisconsin has led to a significant shift in utility distribution. The counties bordering the plant requested a diversion of water from Lake Michigan to fulfill the needs of the plant. Furthermore, the EPA relaxed its limits on both air and water pollution coming from the factory in exchange for the supposed economic value of the factory.8

A power utility bought land to build a substation for the plant and supporting infrastructure. However, the project is estimated to cost $117 million, and the utility company will distribute the cost amongst the 5 million residents it serves over the next several years by incrementally raising prices.9 Under the pretense of economic growth that Foxconn brings to a region and its status as the primary manufacturer of iPhones, it uses its influence to accrue significant social costs, regarding utilities, environmental impact, and other services. Foxconn rarely bares the expense burden of utility projects, pollution impacts, and maintenance of roads outside its immediate vicinity.

Environmental Impact

It is common knowledge that production as well as disposal of smartphones has a significant environmental impact. Apple is relatively transparent with its products, releasing an environmental report for each model it produces. The new iPhones are estimated to create between 57 and 79 kg of CO2 each in its lifetime. The majority 80% coming from production, 2% for transportation, 1% recycling, and approximately 17% from customer usage.10

In the last decade, Apples issues with environmental impact have been extensive. These ranged from one of the largest dependences on coal (54.5%) to power its data centers and manufacturing to the use of toxic, non-degradable materials in its components. In 2013, various environmental organizations accused Apples manufacturing partners of extensively polluting local water supplies and tropical forests. In recent years, Apple has focused on optimizing its devices and production process to remain as environmentally friendly as possible. Reduced use of arsenic and PVC, along with a higher reliance on renewable energy.11 It suggests that company leadership is considering the extensive consequences of the manufacturing process.

Conclusion

Apples iPhone device is evidently one of the most important global brands and products. It undergoes a complex process of development and production with various components and extensive social costs. Furthermore, the manufacturing facilities play a vital role in the economy and society of whole countries. Therefore, every time one purchases an iPhone, it is essential to consider the path it has traversed.

Bibliography

Associated Press. Utility Buys Wisconsin Land for Substation to Power Foxconn. StarTribune, 2018. Web.

Gottsegen, Gordon.  CNet, 2017. Web.

Jacobs, Harrison, and Annie Zheng.  Business Insider, 2018. Web.

Kamenetz, Anya.  FastCompany, 2014. Web.

Karcz, Anthony.  Forbes, 2017. Web.

Kinetz, Erika.  Business Insider, 2017. Web.

Merchant, Brian.  The Guardian, 2017. Web.

Moore, Malcom. . The Telegraph, 2012. Web.

Price, David.  Macworld, 2017. Web.

Sun-Times Editorial Board.  Chicago Sun-Times, 2018. Web.

Footnotes

1. Brian Merchant, Life and Death in Apples Forbidden City, The Guardian, 2017. Web.

2. Anya Kamenetz, A Day in The Life of an iPhone Factory Worker, FastCompany, 2014. Web.

3. Harrison Jacobs and Annie Zheng, Tens of Thousands of Chinese People Live at the Mercy of Apples Factories  And They Dont Even Work There, Business Insider, 2018. Web.

4. Ibid.

5. Anthony Karcz, 10 Years with the iPhone: How Apple Changed Modern Society, Forbes, 2017. Web.

6. Malcom Moore, Mass Suicide Protest at Apple Manufacturer Foxconn factory, The Telegraph, 2012. Web.

7. Erika Kinetz, Workers at iPhone Supplier in China Protest Unpaid Bonuses, Business Insider, 2017. Web.

8. Sun-Times Editorial Board, Editorial: A Big Factory Gets to Pollute, and You Get to Wheeze, Chicago Sun-Times, 2018. Web.

9. Associated Press, Utility Buys Wisconsin Land for Substation to Power Foxconn, StarTribune, 2018. Web.

10. Gordon Gottsegen, The iPhone X Wont (Totally) Destroy the Environment. Heres Why, CNet, 2017. Web.

11. David Price, Why Apple Was Bad for the Environment (And Why Thats Changing), Macworld, 2017. Web.