Verified Document

Smart Phone Technology Has Been Continually Innovating. Research Paper

¶ … smart phone technology has been continually innovating. This is because many of the applications are more user-friendly and can offer everyone something that is of interest to them. At the heart of these changes, is the battle that is occurring between Google and Apple. In case of the Google Android, there are more free applications and the device is incredibly popular. Evidence of this can be seen with the fact that the 64% of all new programs and applications are designed for the Android. While the Apple I Phone is accounting for just 27% of the total mobile applications that are developed. This is significant, in showing how the markets are shifting with new technology becoming more mobile. (Tongbo, 2012) However, there are major security risks associated with using the either device. This is because the firewall and traditional protections on various applications are weaker. As a result, hackers have been able to directly target any kind of security features, overcome them and have...

This increases the chances that someone could have their most sensitive information compromised. To fully understand what is taking place requires looking at the different tools that are being utilized to gain access to the Android. Once this takes place, is when these vulnerabilities will be exposed (which allows for the company and users to protect themselves). (Tongbo, 2012)
The Strategies Hackers are using to Access the Android

The basic strategy that hackers are using to target Android customers is through: malicious applications and web pages. The utilization of malicious applications is when criminals will trick the user into uploading a specific program on their phone. This can occur, through the developer creating a solution that will work like a Trojan horse (once it is uploaded). While at the same time, they can break into legitimate applications and insert their codes into them. In either case, they can see and access…

Sources used in this document:
Reference

Tongbo, L. (2012). Attacks on Web View. CIS. Retrieved from: http://www.cis.syr.edu/~wedu/Research/paper/webview_acsac2011.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Technology in Education Assessing Three Emerging Technologies'
Words: 1329 Length: 5 Document Type: Essay

Technology in Education Assessing Three Emerging Technologies' Contribution to Learning There are a myriad of new technologies emerging that have the potential to completely re-order and increase the level of learning effectiveness and performance of students. With so many new technologies emerging as diverse as mobile-based learning systems on smartphones to the ability to tailor online learning systems and complete networks, the opportunities for educators to innovate has never been more full

Samsung and Effective Competition in the Smart Phone Market
Words: 885 Length: 2 Document Type: Essay

Samsung competes in a market that is now becoming more commoditized. The overall smart phone market is entering its mature phase. As is characteristic of many firms in this phase, competitors will attempt to steal market share from each other. This occurs because industry growth is slow, and the only way to stay profitable is to take customers from other consumers. Marketing has a very integral role as it relates

Impact of New Technologies and Globalization on the Music Industry...
Words: 2591 Length: 10 Document Type: Essay

New Technologies and Globalisation on the Music Industry The global music industry today is going through a series of disruptive innovations that are changing business models in the short-term and value chains over the long-term. The pervasive influence of the Internet, mobile and streaming technologies, and the shift from CD-based music to digital and online music also signals how quickly the global value chain of the music industry is changing

Five Forces Model Analysis of the Smartphone
Words: 679 Length: 2 Document Type: Essay

Five Forces Model Analysis of the SmartPhone Market The Five Forces Model (Porter, 2008) provides a useful framework for evaluating the dominant competitive forces that influence the size, direction and intensity of competition in a given industry. The Smartphone industry is analyzed in the Five Forces Analysis completed in this paper, and is shown in Figure 1. Smartphone Five Forces Analysis (Apple, Investor Relations, 2012) (Bernoff, Li, 2008) (Lee, Kwak, Kim, Kim, 2009)

Rim Discuss This Product in Terms of
Words: 2239 Length: 6 Document Type: Essay

RIM Discuss this product in terms of its repositioned target market demographics using U.S. Census Data. In regards to U.S. Census Data, the target market demographic show promise. The repositioned product will focus on high level and medium income level people. These individuals tend to be high lifestyle and business professionals. The product is full of applications and latest operating system that is helpful for professionals and other business persons to accomplish

Strategic Research Project: Apple Strategic
Words: 1684 Length: 5 Document Type: Research Paper

The Porter Five Forces Model has also shown these strengths and their ability to provide the company with resilience in the face of significant competitive threats. Weaknesses include too much fo a dependence on the iPhone and iPad products, a lack of products at the low-end of the market, and a lack of control of the gray market in China for their products (Apple Investor Relations, 2012). The opportunities

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now