Ways to Stop Cell Phones Hacking Essay (Critical Writing)

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Mar 13th, 2024

I have chose an article that is based on a technological innovation or application of technology. The article was published in the New York Times on 28th September, 2011. It highlights the way the technological companies are going to stop cell phone hacking. There are recent increased incidences of phone hacking that have led to the innovation of software by different anti hack and malware protection companies to protect phones from such incidences (Pierce, 2007).

We will write a custom essay on your topic a custom Critical Writing on Ways to Stop Cell Phones Hacking
808 writers online

There are many issues of the article that are related to the concepts discussed in the text. The article firstly stresses out the concept of demand as explained in the textbook whereby the increased hacking activities have led to increased demand of computer protection and mobile protection software (Miller, 2011). In the recent past, hacking activities have mostly been involved in computers. They include desk top computers, work computers or laptops where hackers send viruses that siphon up one’s information (Kroenke, Gemino and Tingling, 2008).

However, due to the establishment of companies that have designed software to prevent us from the effects of these viruses, this problem has been kept at bay. This has, therefore, created a business opportunity and a highly profitable industry as well as business opportunity within the Information technological world. However, now the hackers have taken step forward and began to hack cell phones. It was only recently that hacker hacked the phones of famous people such as Scarlet Johansson and Prince William and were able to siphon out photos and messages to make money out of them (Pierce, 2007).

This, therefore, means that these hackers are able to hack into any cellphone and still any information saved within the cellphone. In today’s world people are using cell phones more regularly and it has become more of a necessity than just a luxury. People save their important dates there, their regular time schedules, all their contacts, their appointments, their email addresses sometimes even their passwords (Kroenke, Gemino and Tingling, 2008). Cell phones are being designed today to make them as personal as possible allowing a user to save all their important details in there. Thsu, if a hacker could hack someone’s cell phone with his social security number, his passwords and other important information, they would be able to do a lot of harm to a victim (Miller, 2011). That is why, antivirus software companies such as Kaspersky, AVG, McAfee, Sophos, Symantex have come up with a way to protect phones from being hacked (Pierce, 2007).

This article directly put emphasis on the concept of forces of demand as per the Textbook whereby the growing trends of insecurity in storing information in the phones has led to a need of people to feel safe with storing information in their phones. Therefore, this has led to a demand of software or a way to protect phones from being hacked. Hence, this has led to more software security companies coming up such as Kaspersky and Avira (Miller, 2011).

McAfee has released software that protects your PC and smartphone at the same time from malicious malware and also against being hacked. AT&T limited in conjunction with another Information The department of defense has also encouraged these antivirus software companies to come up with a way to protect devices especially mobile phones that possess android software from hacking and malware attack as they are the most vulnerable software (Kroenke, Gemino and Tingling, 2008).

The article under analysis dwells on the issue of increasing returns as the cases of phones’ attacks by hacker’s increases; there will be a sharp increase in the demand of this antivirus software to phones, therefore, the antivirus software companies will raise the price of this commodity. Although it is in the view of many that their phones cannot be hacked as they only protect their computers from hacking, mobile phone operators are more predisposed to being hacked since a mobile operator is more prone to downloading fishy applications and clicking on malicious links.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

References

Kroenke, M., Gemino A. & Tingling P. (2008). Experiencing MIS. Updated Second Canadian Edition. Web.

Pierce, C. (2007). Information Technology and Business. Cambridge, MA: Harvard University Press. Web.

Miller, Cain C. (2011). Technology companies see opportunity in stopping cellphone hackers. New York Times. Web.

Print
Need an custom research paper on Ways to Stop Cell Phones Hacking written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2024, March 13). Ways to Stop Cell Phones Hacking. https://ivypanda.com/essays/ways-to-stop-cell-phones-hacking/

Work Cited

"Ways to Stop Cell Phones Hacking." IvyPanda, 13 Mar. 2024, ivypanda.com/essays/ways-to-stop-cell-phones-hacking/.

References

IvyPanda. (2024) 'Ways to Stop Cell Phones Hacking'. 13 March.

References

IvyPanda. 2024. "Ways to Stop Cell Phones Hacking." March 13, 2024. https://ivypanda.com/essays/ways-to-stop-cell-phones-hacking/.

1. IvyPanda. "Ways to Stop Cell Phones Hacking." March 13, 2024. https://ivypanda.com/essays/ways-to-stop-cell-phones-hacking/.


Bibliography


IvyPanda. "Ways to Stop Cell Phones Hacking." March 13, 2024. https://ivypanda.com/essays/ways-to-stop-cell-phones-hacking/.

Powered by CiteTotal, online referencing maker
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1