Ways to Stop Cell Phones Hacking

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

I have chose an article that is based on a technological innovation or application of technology. The article was published in the New York Times on 28th September, 2011. It highlights the way the technological companies are going to stop cell phone hacking. There are recent increased incidences of phone hacking that have led to the innovation of software by different anti hack and malware protection companies to protect phones from such incidences (Pierce, 2007).

There are many issues of the article that are related to the concepts discussed in the text. The article firstly stresses out the concept of demand as explained in the textbook whereby the increased hacking activities have led to increased demand of computer protection and mobile protection software (Miller, 2011). In the recent past, hacking activities have mostly been involved in computers. They include desk top computers, work computers or laptops where hackers send viruses that siphon up one’s information (Kroenke, Gemino and Tingling, 2008).

However, due to the establishment of companies that have designed software to prevent us from the effects of these viruses, this problem has been kept at bay. This has, therefore, created a business opportunity and a highly profitable industry as well as business opportunity within the Information technological world. However, now the hackers have taken step forward and began to hack cell phones. It was only recently that hacker hacked the phones of famous people such as Scarlet Johansson and Prince William and were able to siphon out photos and messages to make money out of them (Pierce, 2007).

This, therefore, means that these hackers are able to hack into any cellphone and still any information saved within the cellphone. In today’s world people are using cell phones more regularly and it has become more of a necessity than just a luxury. People save their important dates there, their regular time schedules, all their contacts, their appointments, their email addresses sometimes even their passwords (Kroenke, Gemino and Tingling, 2008). Cell phones are being designed today to make them as personal as possible allowing a user to save all their important details in there. Thsu, if a hacker could hack someone’s cell phone with his social security number, his passwords and other important information, they would be able to do a lot of harm to a victim (Miller, 2011). That is why, antivirus software companies such as Kaspersky, AVG, McAfee, Sophos, Symantex have come up with a way to protect phones from being hacked (Pierce, 2007).

This article directly put emphasis on the concept of forces of demand as per the Textbook whereby the growing trends of insecurity in storing information in the phones has led to a need of people to feel safe with storing information in their phones. Therefore, this has led to a demand of software or a way to protect phones from being hacked. Hence, this has led to more software security companies coming up such as Kaspersky and Avira (Miller, 2011).

McAfee has released software that protects your PC and smartphone at the same time from malicious malware and also against being hacked. AT&T limited in conjunction with another Information The department of defense has also encouraged these antivirus software companies to come up with a way to protect devices especially mobile phones that possess android software from hacking and malware attack as they are the most vulnerable software (Kroenke, Gemino and Tingling, 2008).

The article under analysis dwells on the issue of increasing returns as the cases of phones’ attacks by hacker’s increases; there will be a sharp increase in the demand of this antivirus software to phones, therefore, the antivirus software companies will raise the price of this commodity. Although it is in the view of many that their phones cannot be hacked as they only protect their computers from hacking, mobile phone operators are more predisposed to being hacked since a mobile operator is more prone to downloading fishy applications and clicking on malicious links.

References

Kroenke, M., Gemino A. & Tingling P. (2008). Experiencing MIS. Updated Second Canadian Edition. Web.

Pierce, C. (2007). Information Technology and Business. Cambridge, MA: Harvard University Press. Web.

Miller, Cain C. (2011). Technology companies see opportunity in stopping cellphone hackers. New York Times. Web.

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!