Free Essay SamplesAbout UsContact Us Order Now

ISM Case Study 2

0 / 5. 0

Words: 275

Pages: 1

103

ISM Case Study 2
Name
Institution

ISM Case Study 2
The harmful software is an example of a risk associated with mobile phones. The owner may download the software from opensource android applications or files from the internet (Bidgoli, 2018). Secondly, a user may unknowingly subscribe to a billing text-messaging service. These services charge the user a specific amount of money every time they interact with the service. Also, a mobile phone owner may be coerced to reveal their personal information through electronic mails or text messages. It is difficult to determine the legitimacy of a link sent to a phone which increases the risk of phishing (Bidgoli, 2018). Lastly, malicious parties may use popular software to track the activities of a specific mobile phone user. As a result, these parties may be able to control the phone activities from a remote location.
Mobile phones can establish the location of a specific user even when they have turned off their location settings. According to Nield (2018), mobile devices have multiple sensors that can determine the particular location of a user. Application manufacturers use this information to improve the experience of the user, but they have the autonomy to decide how much of the data to log into their servers. Another way that mobile devices can determine the location of the user is through applications in the phone. Some apps like Airbnb can track the location of the user to get better travel listings for them (Nield, 2018). Allowing an application to view the images on the device also means it can track the location as many photos contain geotags.

Wait! ISM Case Study 2 paper is just an example!

As a result, phone users need to take particular measures to protect their devices against these security threats and also maintain their privacy. First, customers should employ the use of a password or fingerprint login to allow access into the phone. Therefore, unwanted parties may be unable to access sensitive information from their devices. Also, it is vital to limit the location settings on the device (DeCloss, 2018). One can achieve this by turning off the location settings for most applications unless it is necessary to keep them. Recently, many browser applications prompt the user to save their passwords or credit card information to help improve the browsing experience. However, this might increase the chances of a malicious party accessing this information. It is advisable, therefore, to refrain from saving the data or instead of using a password manager. Finally, a user should ensure they never leave their phone unattended as it might increase the chances of theft or hacking.

References
Bidgoli, H. (2018). MIS. S.L.: Cengage Learning Custom P.
DeCloss, D. (2018, January 23). 5 Smart Ways to Protect Your Phone and Maintain Your Privacy. Retrieved from HYPERLINK “https://techspective.net/2018/01/23/5-smart-ways-protect-phone-maintain-privacy/” https://techspective.net/2018/01/23/5-smart-ways-protect-phone-maintain-privacy/
Nield, D. (2018, August 28). All the Ways Your Smartphone and Its Apps Can Track You. Retrieved from HYPERLINK “https://gizmodo.com/all-the-ways-your-smartphone-and-its-apps-can-track-you-1821213704” https://gizmodo.com/all-the-ways-your-smartphone-and-its-apps-can-track-you-1821213704

Get quality help now

Top Writer

Kara Perkins

5.0 (463 reviews)

Recent reviews about this Writer

Love StudyZoomer! Sometimes my week is so busy that I can’t find time for all tasks, especially for such creative ones as the case study. I don’t want to do my homework in a rush, so I used their database, and it was the perfect match! Thank you, guys!

View profile

Related Essays

Antivirus Software

Pages: 1

(275 words)

BCG Matrix

Pages: 1

(275 words)

Virus vs Content Filtering

Pages: 1

(275 words)

Personal Identity

Pages: 1

(275 words)

Ethics and public service

Pages: 1

(275 words)

Assignment 3: Apple versus Samsung

Pages: 1

(275 words)

Uber Eats

Pages: 1

(275 words)