Nt1310 Unit 2 Journal

Improved Essays
1. Title of Article: Keep Your Phone Safe: How to Protect yourself from wireless threats
2. Authors: N/A
3. Source: http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm
4. Year of Publication: 2013
5. Volume Number: n/a
6. Issue Number: n/a
7. Page Numbers: n/a
8. Has the article been peer reviewed? n/a
Introduction Section
9. What is the problem/hypothesis?
Although smartphones provide wonderful advantages and conveniences through services, access to it all requires users to give access to sensitive information to various providers.
10. How does the research fit into the context of its field? Is it for example, attempting to settle a controversy? Show the validity of a new technique? Open up a new field of inquiry?
…show more content…
Were the measurements appropriate for the questions the researcher was approaching? n/a 14. Were the measures in this research clearly related to the variables in which the researchers were interested? n/a 15. If human subjects were studied, do they fairly represent the populations under study? n/a Results
16. What were the major results of the experiment?
The article summarized that millions of mobile users need better security protection due to intrusive apps and malicious software.
17. Describe the information presented in any tables and/or figures.
64% of those surveyed do not use a screen lock, while 39 perfect of those surveyed do not use any protective measures at all.
18. Were enough of the data presented so that you feel you can judge for yourself how the experiment turned out?
Yes, the site provided infographics for the results of the survey taken.
19. Did you see patterns or trends in this data that the author did not mention? Were there problems that were not addressed?
No
20. What were the major conclusions?
Mobile data threats are exacerbated by the fact that most users do not take any protective measures to try and protect their data.
21. If discussed, how do the conclusions relate to the work of others?

Related Documents

  • Decent Essays

    Nt1310 Unit 4

    • 239 Words
    • 1 Pages

    Unclear points: 1. What is the purpose of F.2 in the context? 2. Why the rpm of 46, 48 were used, and the 48 rpm was chosen during the validation check? 3.…

    • 239 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6 Journal

    • 1188 Words
    • 5 Pages

    “Oh my Perry! Have you ever realized how the cell wall is just like the brick walls and the fences in the zoo? The cell wall protects and supports the cell, as the brick walls and the fences, they keep the animals from running away and people that aren't suppose to be there out.” “You know what Phineas? I think your right!!…

    • 1188 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6

    • 470 Words
    • 2 Pages

    Protecting ones privacy is something that many people desire and will go to great lengths to protect it. Privacy for most people starts with electronic communications and the smartphone is at the top of that list. Earlier this week SIRIN Labs announced the launch of the SOLARIN, a super phone of sorts - one that the company says is the worlds first truly smartphone. The phone geared towards the travelling business professional, is meant to ultra secure while at the same time not compromising on looks and usability. The company boasts that the device has over 2,500 inner components, and superior exterior compared to any other smartphone on the market - they believe its the best mobile phone in the world.…

    • 470 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    While she does not say what the questions were she does talk about their results: she found that those who owned cell phones with text capability (not those who necessarily used it, just had it) had more grammatical errors such as “leaving apostrophes out of contractions”, using “r” instead of “are”, and providing shorter answers than those whose cell phones did not have texting capabilities. While she does talk a lot about grammar she does not mention how the content of the answers of those who had texting capabilities compared to those without; and while those with text capability provided shorter answers than those without you don’t know whether that was bad or not, as it is possible to have a 100 page paper be barely F- quality while a two page paper on the same subject is A+…

    • 1526 Words
    • 7 Pages
    Improved Essays
  • Decent Essays

    Technology has changed a lot over the years, but has it changed for the better? Many people think it has not. All over the world, people are on their cellular devices. Little do they know that the government can see everything they do and search on their phone. Therefore, I propose a 28th Amendment to the United States Constitution stating that Technology privacy will now be issued among everyone and the government will no longer have access to anyone's history.…

    • 433 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Response Essay Rewrite In recent times, Apple and the FBI have been arguing over the creation of software that would be able to reveal encrypted information. The author of the article Biting Apple Bruises Privacy Rights, argues the idea that by forcing Apple to hack their product will result in future violations of security and privacy. Personally, I strongly agree with the writer’s belief that forcing companies to reveal secured information is completely unwarranted and should not be allowed under any circumstance.…

    • 1482 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Chapter 1 Thesis

    • 563 Words
    • 3 Pages

    1) What is the research question? Try to State the problem as concisely as possible. I believe the problem statement is due to the technology of internet and the social impacts of nonprofit organizations, nonprofit organizations may use organizational web sites to promote advocacy and influence civic engagement. However, some researchers have announced that internet would not affect the advocacy and civic engagement.…

    • 563 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Small Claims Court Essay

    • 486 Words
    • 2 Pages

    The article of the Small Claims Court was an article that dissected what television shows like Judge Judy does to the general public and beyond. This article focused on juries that were in Manhattan, the District of Columbia and Hackensack, New Jersey. However, it would have been interesting for the article to have polled other cities that were not in the northeast of the United States. I believe that if they would had used more different regions in the study, it could have been more complete and perhaps different, given that the study could have found more detailed, thorough findings. The reason it may be different in other regions in the United States is, since some other people may not have watched shows like Judge Judy or they…

    • 486 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Imagine a world filled with silence, an environment that exclude people from communicating with one another, and the norm of physical interaction seems abnormalrobots, roaming abandoned streets and depending on installed programs to behave a certain way, just plain old machines burning on energy. The sweet sound of loud busy streets will slowly become inactive and people will soon depend on installed programs on their phone to function a certain way. Humans have regress in their abilities to incorporate their intercommunication skills. This make their life harder to live because people need communication to live an emotionally happy life. If people allow cell phones to rule their life can result in a society that operates only on advance technology, in order to engage in social activities.…

    • 1226 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Final Exam More than 700 million Iphones have been sold globally in 2015 (Costello). Iphones contain an unbelievable amount of personal information. From financial information, to emails, texts, photos, and passwords; imagine all that information being easily accessible to anyone. The FBI is currently trying to convince Apple to give them a “backdoor” to a particular phone. What the FBI fails to realize is how dangerous this could be for anyone else.…

    • 327 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    What issues of validity concern you about this questionnaire? One of the validity concerns would be who filled out the survey? This survey was mailed out, so there was no way for us to ensure who filled it out? Also the state of mind that participant was in.…

    • 447 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In the article, “My enemy’s enemy is my friend” it talks about a case study done at the University of Texas by two people of the name Elliot Arson and Vernon Cope to test a hypothesis that people will like people who dislike the same person as them, or like someone if they like the same people as them. This runs off of the theory that some people may believe that because they share the liking or disliking of someone that they are similar people with the same values and beliefs, this can be derived from the balance theory. When considered, this hypothesis is easily thought of to be accurate. With this hypothesis, there can be many other hidden factors that can play into these situations.…

    • 721 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Introduction This article, Building A “Backdoor” To The iPhone: An Ethical Dilemma, discusses Tim Cook, CEO of Apple, ethical dilemma to safeguard its customer’s trust and digital privacy or assist the U.S. government and the Federal Bureau of Investigation (FBI) to gain access to an iPhone device used by a terrorist to commit a heinous crime against society in the city of San Bernardino, California. In addition, evaluate methods in which managers with power and responsibilities characterized by Badaracco, an ethics professor at Harvard University, as the “dirty-hands problem” and the “right-versus-right” difficulties where “the moral dilemmas of management are, at bottom, clashes among different, conflicting moralities, among very different…

    • 1298 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Apple Vs Fbi Case

    • 1417 Words
    • 6 Pages

    Everyone can relate to this scenario while growing up; in school, one friend made a mistake or broke school’s law and all other friends were also held accountable for one's misdeed. Apple Vs FBI case from last year feels the same way. Somehow one bad guy used Apple’s iPhone, and FBI was asking for backdoor to the iOS operating system so that they can unlock any iPhone. Apple fulfilling FBI request will put hundreds of millions of people at security risk, and it will open the door for massive surveillance which is essentially contradicts the idea of right to privacy and First amendment right to expression. FBI seemed to undermine that, so Apple stood up for their customer and came out against FBI refusing to unlock the iPhone.…

    • 1417 Words
    • 6 Pages
    Improved Essays