Ways to Stop Cell Phones Hacking Essay (Critical Writing)

Exclusively available on Available only on IvyPanda® Made by Human No AI

I have chose an article that is based on a technological innovation or application of technology. The article was published in the New York Times on 28th September, 2011. It highlights the way the technological companies are going to stop cell phone hacking. There are recent increased incidences of phone hacking that have led to the innovation of software by different anti hack and malware protection companies to protect phones from such incidences (Pierce, 2007).

There are many issues of the article that are related to the concepts discussed in the text. The article firstly stresses out the concept of demand as explained in the textbook whereby the increased hacking activities have led to increased demand of computer protection and mobile protection software (Miller, 2011). In the recent past, hacking activities have mostly been involved in computers. They include desk top computers, work computers or laptops where hackers send viruses that siphon up one’s information (Kroenke, Gemino and Tingling, 2008).

However, due to the establishment of companies that have designed software to prevent us from the effects of these viruses, this problem has been kept at bay. This has, therefore, created a business opportunity and a highly profitable industry as well as business opportunity within the Information technological world. However, now the hackers have taken step forward and began to hack cell phones. It was only recently that hacker hacked the phones of famous people such as Scarlet Johansson and Prince William and were able to siphon out photos and messages to make money out of them (Pierce, 2007).

This, therefore, means that these hackers are able to hack into any cellphone and still any information saved within the cellphone. In today’s world people are using cell phones more regularly and it has become more of a necessity than just a luxury. People save their important dates there, their regular time schedules, all their contacts, their appointments, their email addresses sometimes even their passwords (Kroenke, Gemino and Tingling, 2008). Cell phones are being designed today to make them as personal as possible allowing a user to save all their important details in there. Thsu, if a hacker could hack someone’s cell phone with his social security number, his passwords and other important information, they would be able to do a lot of harm to a victim (Miller, 2011). That is why, antivirus software companies such as Kaspersky, AVG, McAfee, Sophos, Symantex have come up with a way to protect phones from being hacked (Pierce, 2007).

This article directly put emphasis on the concept of forces of demand as per the Textbook whereby the growing trends of insecurity in storing information in the phones has led to a need of people to feel safe with storing information in their phones. Therefore, this has led to a demand of software or a way to protect phones from being hacked. Hence, this has led to more software security companies coming up such as Kaspersky and Avira (Miller, 2011).

McAfee has released software that protects your PC and smartphone at the same time from malicious malware and also against being hacked. AT&T limited in conjunction with another Information The department of defense has also encouraged these antivirus software companies to come up with a way to protect devices especially mobile phones that possess android software from hacking and malware attack as they are the most vulnerable software (Kroenke, Gemino and Tingling, 2008).

The article under analysis dwells on the issue of increasing returns as the cases of phones’ attacks by hacker’s increases; there will be a sharp increase in the demand of this antivirus software to phones, therefore, the antivirus software companies will raise the price of this commodity. Although it is in the view of many that their phones cannot be hacked as they only protect their computers from hacking, mobile phone operators are more predisposed to being hacked since a mobile operator is more prone to downloading fishy applications and clicking on malicious links.

References

Kroenke, M., Gemino A. & Tingling P. (2008). Experiencing MIS. Updated Second Canadian Edition. Web.

Pierce, C. (2007). Information Technology and Business. Cambridge, MA: Harvard University Press. Web.

Miller, Cain C. (2011). Technology companies see opportunity in stopping cellphone hackers. New York Times. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, May 26). Ways to Stop Cell Phones Hacking. https://ivypanda.com/essays/ways-to-stop-cell-phones-hacking/

Work Cited

"Ways to Stop Cell Phones Hacking." IvyPanda, 26 May 2020, ivypanda.com/essays/ways-to-stop-cell-phones-hacking/.

References

IvyPanda. (2020) 'Ways to Stop Cell Phones Hacking'. 26 May.

References

IvyPanda. 2020. "Ways to Stop Cell Phones Hacking." May 26, 2020. https://ivypanda.com/essays/ways-to-stop-cell-phones-hacking/.

1. IvyPanda. "Ways to Stop Cell Phones Hacking." May 26, 2020. https://ivypanda.com/essays/ways-to-stop-cell-phones-hacking/.


Bibliography


IvyPanda. "Ways to Stop Cell Phones Hacking." May 26, 2020. https://ivypanda.com/essays/ways-to-stop-cell-phones-hacking/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1