Thursday, August 8, 2019
Mobile Technology Essay Example | Topics and Well Written Essays - 1250 words
Mobile Technology - Essay Example Smart phones such as the iPhone do not support SIM cards that have not been activated for the specific phone as at the time of its acquisition, and this implies that it is often impossible to share the phone with any other person who has not registered the SIM card with the phone. The buyers of this smart phone are also restricted by some limitations slapped on them by the manufacturers, which unnecessarily bind them on how they operate the phones. For example Apple users are required to subscribe to them for two years and. Moreover, the iPhone lacks applications that can be applied by third parties or what is usually known as third-party applications as it only has web-based applications. This makes it difficult for parties to install the applications on their own. The power requirements of smart phones are also higher as compared to other conventional phones in the data market. The extra power requirement translates to large batteries which are bulky for the phones thus shorter per iods of usage and also added expenses on electricity bill.The sustained use of smart phones has been found to be the major cause of eye strain to individuals especially teenagers. The daily use of mobile technology gadgets such as the smart phones and e-readers causes the muscles in the eyes to tighten up and dry. The cause of this is because smart phones have smaller screens as compared to other devices like laptops and thus have smaller sizes of font leading to squinting in order to get the best view of what is written on the screen of the phone. The other cause of eye strains is failure by the users of the mobile technology to adopt the recommended screen distance when using the mobile devices making the eyes to work harder than it should leading to the strain. In addition, as already stated at the introduction, the major challenge on the use of smart phones is the lack of security of data and privacy in their use. This stems from the fact that smart phones can easily be compromised through attacks from the internet that may come in the form of viruses, worms and Trojans (Newman 29). This infection may also come from compromised personal computers at the time of synchronizing data while other forms can infect similar phones through Wireless Personal Area Networks (WPAN). Smart phones that have been attacked become sources of malicious attacks to the telecommunication sectors, for example, the smart phones can be used to manipulate smart phone zombies to send marketing or junk messages through short messaging as spams. The compromised phone spams free of any costs thus irritating owners who may not desire to receive such messages (Miller 228). Furthermore, mobile phone technology has been used to steal identities or conduct what is usually known as spoofing. Identity theft through smart phones is easy as once a smart phone has been compromised, the attacker uses the ownerââ¬â¢s identity to conduct any activity in the stolen name or identity. An attacker who has stolen the identity of a smart phone owner can use Voice-Over-Internet Protocol from the internet and make use of a smart phone zombie to pretend to be the owner of the calls made. Additionally, smart phones have also been used for remote wiretapping where a smart phone zombie records the conversation of the real owner and report to those that are spying on the actual
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.