Decharms, Christopher. "Mobile security technology." U.S. Patent No. 9,820,120. 14 Nov. 2017. Retrieved from https://doi.org/10.1145/3077286.3077563
Decharms' document provides knowledge about computer-based technologies that are used to ensure the security of mobile users. The technology is used by mobile users whenever they are in danger. Also, if one visits an area with a prevalence of criminal activities, it is advised to utilize mobile technology to engage suitable remote parties. The users can use remote monitoring, video conferencing, and imaging to connect with other people who can respond when attacked, such as family members and police. The techniques can be applied through the use of phones, and wearable computing equipment such as GoPro, Looxcie, as well as GOOGLE GLASS. Also, personal digital assistants (PDAs) can as well be used.
Decharms provides practical ways to protect people through the use of mobile technology. The author offers various techniques that can be utilized to ensure safety through mobile technologies, even when in remote areas. The technology proves to be useful since it can store the recorded data in both the user's device and the respondent team. Thus, in case of any danger, emergent help can be offered. The technology is also suitable for the military to track their progress in their workstations and decide when to provide backups. Similarly, given that almost every individual has a mobile phone, especially teenagers, Decharms' work can help the world minimize cases of criminality.
The content offered by Decharms on mobile technology is essential to my information technology project. The journal provides coherent information regarding the utilization of information technology on mobile devices and how to connect to more than two people if one is in danger. The Decharms; work can be incorporated in our class discussion to aid in understanding mobile technology and its setbacks.
Bitton, Ron, et al. "Taxonomy of mobile users' security awareness." Computers & Security 73 (2018): 266-293. Retrieved from https://doi.org/10.1016/j.cose.2017.10.015
According to Bitton, the increase in smartphones has increased the risk of attacks on personal data. Some mobile users are not aware that installing applications in their phones increases the chances of exposing their personal information to cyber thieves. Also, some mobile users store their sensitive data on their phones. If the installed applications have viruses and malware, then the data can be easily accessed and used to commit crimes. Some social engineering thieves can also retrieve the data and use it to steal the mobile user's money. However, educating the public about the safe use of mobile phones can help reduce cases of fraud. Some of the technological factors to be considered when ensuring safe mobile use include apps and browsing.
Bitton's work on mobile security provides insight into what goes on in our society. Some mobile users are not aware of the effective ways of using their mobile phones, which endangers their privacy. Installation of applications without researching their sources is one of the primary issues that result in data breaches. Similarly, the content browsed in the phone can be detrimental to the user's privacy, mainly if it contains malware. According to Britton, if only the public can be enlightened on the safer ways to use their mobile phones through technological applications, then the issues of mobile security can be solved.
Britton's work on mobile security will help me research my project. The content on mobile security is both practical for classroom learning and application in real life. My peers often complain of receiving malicious content in their phones from unknown sources. Thus, the information will significantly impact my peers in our class. Also, the topic of safe mobile use should be incorporated into our curriculum to improve mobile security in society.
Cite this page
Annotated Bibliography Example on Mobile Security Technology: Protection for Mobile Users. (2023, Nov 02). Retrieved from https://proessays.net/essays/annotated-bibliography-example-on-mobile-security-technology-protection-for-mobile-users
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Illustration of Ideal Work Environment Essay
- The Influence of Groups in Ancient Societies and Cleopatra's Leadership Essay
- Essay on Preventing Workplace Violence: What I Learned at the Conference
- Essay Example on Conflict in Organizations: Types, Causes, Effects and How to Address
- Paper Sample on Leadership Transformation: Capitol Middle School in Baton Rouge, LA
- Meaning of Cell Phones - Free Report Sample
- Applying Nelson Mandela's Leadership Skills to My Leadership - Essay Sample