The Security Risk Issues of Smart Phones on a Global Level (A Case Study of the President of the United States, Barack Obama)
Journal Title: Scholars Journal of Economics, Business and Management - Year 2017, Vol 4, Issue 8
Abstract
Abstract:During this modern age of technology, security risk issues of smartphones have increased recently, despite the high adoption of smartphones globally, with different ages of users and with a wide variety of smartphone functionalities and services, such as, video calls, multimedia services, and Bluetooth and Global Positioning System (GPS). User data and sensitive information has become more general and pervasive, because users have to agree on providing some of the personal details, for example, an email address in order to download an app in addition to software use, such as Viber and WhatsApp. Furthermore, users do not know if the mobile data accessed by application providers is legal or not. All these reasons make for an easy penetration of smartphones and the manipulation of personal information of users, either through malware or hackers. However, these risks will not stop in the future, as they evolve and grow with the development of technology. Moreover, it is not legally acceptable. Consequently, this report discusses the diffusion of smartphones, with an analysis of the increasing security risks of using smartphones globally. Also, this report covers security risk statistics and examples, in addition to focusing on the security threats aspects from malicious software and attacks by hackers. FlexiSpy and Ikee.B are examples of virus software. Usually consumers do not achieve the main purpose of using smartphones such as accessing their bank account and online shopping because of the worry of these threats. For example, 12 million Americans had their identity stolen. Furthermore, it affects businessmen, politicians and employees in companies. This paper focuses on legal and technical solutions which can control and manage the risks. Therefore, users and companies need to use some of these important legal measures and techniques when using smartphones in order to protect their devices from attacks. For example, users are advised to register with legal data protection companies and buy only legal copies of software security. Finally, the research discusses some legal security applications for users. Keywords:Smartphone, security risks issues, threats, malicious software, BYOD
Authors and Affiliations
Mr. YaseenMyasar Fathi
Investigating the impact of using accounting ratios SS a tool for measuring performance
Abstract: The paper investigates the impact of using accounting ratios as a tool for measuring performance using the time series analysis and annual data from 2009 to 2012. The Z-score model was used to determine the com...
Drivers of Crop Distribution and DurationDiversification among Smallholder Farmers in Kenya
Agriculture is the most important sector in the Kenya. Crop farming in MathiraEast District is characterized by different forms of diversification. However, there is little knowledge on specific drivers of diversificatio...
Chengdu and Chongqing High-Speed Impact on Regional Cooperation of Local Government
High-speed rail as an advanced means of transportation, which inevitably have important implications for regional economic activities taking place within the space. Opening of the high-speed railway on regional spatial s...
The Effect of Exchange Rate on Agricultural Commodity and Pricing on Nigeria: 2009-2014
This study on the Effect of Exchange Rate on Agricultural Commodity and Pricing on Nigeria: 2009-2014 is carried out of necessity. The exchange rate volatility in Nigeria has reached the level that even market women who...
The Relationship between Job Satisfaction & Employee Turnover Intention in Zimbabwean Rural District Councils
Abstract:The study sought to investigate the relationship between job satisfaction and employee turnover intention in Zimbabwean rural district councils. The major variables in the study related to job satisfaction were...