Skip to main content

Home/ ITGS News/ Group items tagged mobile device

Rss Feed Group items tagged

Noreen C

More Than Half of Mobile Apps Not Secure, Report Says - 5 views

  •  
    An article about the unsafe nature of many mobile phone applications including commerce and finance related apps. This article allows the reader to see the increasing problem of security holes of these apps and sites like Twitter who were hit with the same problems, such as "cross site scripting."
  • ...3 more comments...
  •  
    Security in this day an age has become a major problem. The protection of hardware, software, machines, and networks from unauthorized access is becoming increasingly harder because hackers have gotten smarter in identifying the security holes of these programs. Mobile phone applications are just one of their latest hits. More than half of the applications on mobile phones are considered unsafe and therefore vulnerable to security attacks. Third party codes were even more devastating with a "81 percent failure rate." Commerce and finance related apps did just as poorly, both exceeding just about the half way mark. The process of fixing these security holes has become quicker over, however, not quick enough. It takes sixteen days on average to fix the problems and this is rather long time in a society that can get and bit of information in the palms of their hands in nano seconds. Hackers are also going into other user's profiles, or creating fake profiles in order to spread "cross site scripting." This was recently seen as a problem for Twitter and it's users. Tweets were changed into different colors, and there were unwelcomed pop-ups that would appear to users when they clicked on a Tweet. This would then publish the original script on that user's page without their knowledge, or consent. This is a problem that has taken over mobile apps, resulting in "51 percent of all vulnerabilities." The stakeholders of this issue are mainly the users. However, it is also a problem for the companies who created the application and those who are fixing it when it goes down, if not the creator. In the world of applications on mobile phones, things are expanding quickly and largely. However, with this great expansion, there are downsides when more than half are deemed not secure. Although there are various apps that are safe, our need to have everything in our sight available to us, even the most seemingly useless app, has driven us to put our devices, privacy,security, and
  •  
    Please go back and "cache" this page.
  •  
    It will not let me, it says I need to upgrade my subscription in order to do so. Also, the last part of the comment is cut off. Here is the continuation: "authenticity at risk. The coolest apps that are so desired, many not be the coolest things on the market these days. Let's not let our wants surpass our judgment of these problems."
  •  
    Actually, if you click on the link to the article (the one in blue) and bookmark it again (it won't loose your previous work) you can click the Cache box and it will actually cache it. Try it. Normally, you would cache it the first time you bookmark it, but that technique works after the fact.
  •  
    In a way, downloading an app or downloading anything in fact is like interviewing a book or finding a reliable source. It's always better to pick from an author or publisher you know about. Usually, more well known companies will release an app and if there are a lot of people complaining about it, then they will fix it. It takes patience and control to wait for a better version to come out so that you know its safe. Additionally, people should take more caution into the apps they are using and what kind of information they are registering in it.
Madeline Brownstone

Healthcare Industry Turns to DeviceAnywhere to Bring their Products and Services to the... - 0 views

  • Quality of service can't be left to chance for any healthcare provider developing mobile applications.  However, this is especially true when the health insurance company is part of the largest single health carrier in the United States, providing health care services to more than 25 million consumers with a network of approximately 590,000 physicians and care professionals nationwide. For an organization of this size, they often select technology partners such as DeviceAnywhere, who share their company's commitment to excellence and innovation.
  • Not surprisingly, security and reliability resonate as two of the top priorities for Sensei Inc. as well.  As a provider of innovative mobile and Web-based solutions that prompt consumers at point-of-decision moments to make healthier eating, medical and lifestyle choices, Sensei relies on DeviceAnywhere to ensure that their consumers receive their personalized nutrition and health counseling on a consistent and confidential basis. After all, when customers count on Sensei mobile programs for critical reminders to take their medications or make on-the-spot decisions related to healthy eating choices, there is no room for error in downtime or compatibility issues between users' devices and networks.
  •  
    Not a legit news source, actually a puff piece for Deviceanywhere. However, it points to issues around mobile phone use in health services.
Daniell S

'One app for all' effort launches - 1 views

  •  
    This is an article about a European team creating an app can be downloaded on to any internet connected communications device. However, even after being presented with 10m euros, this group of 22 organizations hasn't yet received help from companies such as Apple. Apple still wishes to be different from others.
  •  
    This meets the requirements for the IT triangle because within the article it refers to some companies not accepting this application. Within strand 1 the issue of The digital divide and equality of access comes up. Within the article i learned about the organizations who are trying to make this app for all people with internet connected devices. This shows that the Apple company is at a sort of disadvantage for being behind in this new "App for all" program. By staying out of they will not be allowing the app created to the devices the company has created. This also related to Strand 2. In this app it will created to work on what ever people desire the app to work on. This is expressed in the article through "The idea would enable a given app to work, for example, on a web-ready television, in a car and on a mobile, no matter the makers of the devices." It would work on all of these things listed. This is represented through "Home and Leisure" and "Political Process". It would relate to "Home and Leisure" because the app can connect to computers and cell phones. It can also relate to the political process, with Apple not really wanting to get involved with the project. The relation between this article and Strand 3 is that this article involves Personal and Public Communications. This app can be downloaded by just about anyone with a internet connected device. The stakeholders in this situation would be the people using the apps. Another stakeholder would be the 22 organizations creating the app. The other stakeholders would the Companies who are allowing this app into their device;.
Madeline Brownstone

BBC NEWS | Technology | Software blocks car phone users - 0 views

  •  
    "A safety device which prevents drivers using mobile phones by automatically intercepting calls and text messages when they are moving has been unveiled. The software tells callers the person they are trying to reach is driving and asks them to leave a message. "
Madeline Brownstone

Technology News: Handheld Devices: Road Warning: Swarms of Texting Teens Ahead - 1 views

  •  
    "Textecution, for example, is an app for the Android platform that uses GSP technology to disable a phone's text function when the device is traveling more than 10 miles per hour. Jonathan Young, developer of Textecution, told TechNewsWorld he originally thought up the app when his teenage son was getting ready to get his driver's license. "This is a huge problem, and parents are finally becoming aware of it," he said. "Sure, you can preach to your children, but what they do when they are not around you is another "
sarah d

Mobile Malware Targeting Smartphones - 1 views

  • A comparison of these statistics to the worldwide smartphone population places the number of infected devices globally in the millions. Because the vast majority of these infections are designed to be stealthy and the fact few smartphones have Anti-Malware applications, most infected users are unaware their devices have been compromised.
    • sarah d
       
      i dont know if this counts as examples. i think it might be too broad.
Jaymee C

(A Note from the Editor) Healthcare for the Poor? There's an App for That (EMDM archive... - 0 views

  • Researchers at the University of California, Berkeley (UC Berkeley), have turned a smart phone into an imaging device that can identify and track diseases.
  • Many developing countries lack access to clinical-quality microscopes necessary for even basic diagnostics. The CellScope essentially leapfrogs this technology by allowing health workers to take high-resolution images using a tube-like extension that attaches to the mobile phone’s camera.
  • The research team in Berkeley has successfully imaged malaria and tuberculosis using the CellScope system.
  • ...4 more annotations...
  • “If we are to improve healthcare in the developing world,” says Fletcher, “rather than buy big microscopes and put them in local health centres, which often don’t exist in those countries, we can use technology to leapfrog and make microscopy portable.”
  • “A Doctor in Your Pocket,”
  • Project Masiluleke uses a form of texting to blast millions of messages each day urging people across the country in their local language to get in touch with the national AIDS hotline.
  • mobile phones are very personal: a message on your phone forces you to think and maybe act in a way that a billboard or radio ad does not.
  •  
    "Researchers at the University of California, Berkeley (UC Berkeley), have turned a smart phone into an imaging device that can identify and track diseases."
Madeline Brownstone

Washington Times - Telemedicine allows for long-distance diagnoses - 3 views

  • While outwardly expensive — installation can range between $2.5 million and $3.5 million — and, to some, a seemingly excessive measure, the off-site support operation has shown itself in studies to be cost-effective in a relatively short period of time. Recovery of patients was faster, mortality rates in ICUs were lower, patients' stays were shorter, thereby shaving hospital costs by 24.6 percent, and fewer intensivists were needed.
  •  
    The breakthrough is your mobile phone, the house call of tomorrow," says Dr. Jay Sanders, a protege of Dr. Bird, referring to the possibility of sending images from a high-tech personal digital assistant device.
  •  
    The breakthrough is your mobile phone, the house call of tomorrow," says Dr. Jay Sanders, a protege of Dr. Bird, referring to the possibility of sending images from a high-tech personal digital assistant device.
Madeline Brownstone

Bus Accidents :: North Carolina Injury Lawyer Blog - 0 views

  •  
    "Virginia Tech Transportation Institute recently reported that large truck drivers increase their crash risk by 23 times when they text and drive. Merely reaching for communication device or dialing a cell phone increased the chance of a car accident or a truck collision by six times. The AAA Foundation for Traffic Safety says that more than 1 million auto crashes a year that happen in North American can be linked to driver inattention."
Mohammad A

iPhone takes a trip to \"return to sender\" - 1 views

  •  
    Chinese people wait in line for each of the new Apple iPhone releases, buy them at premium price of $600, and send it back to where it was made to get it unlocked.
  •  
    Chinese people wait in line for each of the new Apple iPhone releases, buy them at premium price of $600, and send it back to where it was made to get it unlocked.
  •  
    This article meets the requirements for an IT article because, to begin with, it discusses one of the main IT systems, the cellphone (a sophisticated phone such as the iPhone however). It is reliable because it comes from a new source such as the New York Times, which has a reputation of giving reliable information to its readers. The time that the article was written is as recent as can be (less than 24 hour news, meaning that it involves one of the main issues and impacts that affect society on a greater scale today). There are stakeholders involved - the people responsible for the social/ethical issue(s), the people being affected by it, and the people becoming involved as a result of the impacts of these issues. Therefore it can be stated that this article meets all the requirements for ITGS. The social and ethical issues that result from this IT situation are significant to what it led to. One of the main issues that revolves around this issue is the digital divide and equality of access. Once the iPhone is "unlocked", the user has access to many digital streams of data; data in which regular iPhone users do not have access too, or they are unable to stream it. Integrity is also one of the main social and ethical issues; the IT device in question (an Apple iPhone) was "tampered with" and has therefore lost most of its value as well as its originality. People and machines, although it is a social and ethical issue that affects almost all IT systems, it can also be said that it is relevant to this situation as well. The people who are unlocking the iPhone are on this "digital treadmill" in which their life revolves around the database and access to digital information. Information that is so immense and updated so quickly that it can be overwhelming sometimes, yet provide the user with an extensive amount of knowledge, which is often put into good use. The specific scenario that this IT system and its impacts are based upon is politics and government. The act
Mariam B

Cisco Security Exec Cheers on Android's Security Flaws - 0 views

  •  
    This article discusses the security flaw that is present in the current mobile device, Android. The Android is easily able to download applications onto the phone, however certain applications may contain Trojan horses and other malicious malware. This impacts businesses and employment because large companies allow their employees to use the Android during work in order to record, send and transmit important information. However with lack of security, certain applications may have the ability to leak sensitive and private company information to others. This impacts the stakeholders: which includes the company whose information is being leaked and the employee that is using the device to store their data and send files to one another. Due to the lack of security that is enabled on the applications and the phone, certain applications make it harmful to store private company data. This becomes an issue of security because the applications are not secure and therefore the phone cannot be used for business purposes because the lack of security causes a threat on privacy as well. Solutions to this are a closed application approval process which is what apple does with its application- each one is viewed in order to see if it is secure. This step should be taken with the applications that are on the Android as well in order to make it more secure.
Madeline Brownstone

A new way of looking at the world - CNN.com - 0 views

  •  
    "An emerging set of tools is making it easier than ever to track and compile all sorts of "data" and display it in a way that's relatively easy to understand. You can now point your mobile phone at a street and instantly get ratings for restaurants. Or type in your address and find reports of crimes that may have occurred in your neighborhood. It's even possible to track emotions on a national and global scale."
Madeline Brownstone

Text Messages in China to Be Scanned for 'Illegal Content' - NYTimes.com - 2 views

  •  
    ""It really is quite a program to seize control of all the new forms of media, one by one," said Jeremy Goldkorn, editor and publisher of Danwei.org, an English-language Web site about the Chinese media and Internet that is currently blocked in China. "It has been a bad half year for censorship.""
Saida K

How to make sure your smartphone payments are secure - 0 views

  •  
    This news article specifies the considerations of using a cellphone to make secure payments. In order to make secure transactions using one's cellphone, a certain procedure must take place. Of course, the mobile phone must have access to the internet, and will go to any website of their choice in which they find something they want to buy, or to simply pay a bill. Also, this can be done using an "application" such as PayPal. PayPal is technically more secure considering that a consumer would only have to write they're credit card information in one place. But with so many people using it, it becomes easier for hackers to access this data, especially with vast quantities of money in the savings. Afterwards, no matter which way you started a transaction, encryptions are always used to transform the that so that only the consumer and business company can read the transaction with the decryption. One possible stakeholder is the consumer whom is indeed effected by making payments using their mobile devices. It's only been recently that they began trusting the internet using a computer, but using the internet via cellphone is a new change that must take time to adjust to. But they are effected since hackers can easily take their money. Plus a third party, can occur during the process of the transaction while the consumer is using another window, and might not notice that they're information is not only going to the business itself. These are all issues of security.
Saida K

Communicating During Emergencies - 0 views

  •  
    The USAID and FCC are currently working together trying to find the best ways to take advantage of telemedecine during natural disasters. Yet, it's not really the idea of promoting it's usage for many nations have already began using it to recover and aid those whom were highly wounded, or even those who weren't harmed to make sure they continue being healthy through telemedicine. The point of the unity between these two organizations is to improve it's usage so that connectivity is best no matter the type of natural disaster. It has been noticed that connectivity was a problem, causing an issue of reliability since doctors can no longer contact their patients due to loss in service. The telemedicine depends on the wireless networks available. Because a natural disaster has occur, many of these networks are no longer available since satellite dishes are destroyed and no longer work. Plus, many of the computers can become damaged internally and cause inaccaurate data within a telemedicine database. More than a millions dollars was given to the National Library of Medicine (NLM) so that improvements could be made immediately, in order to prevent the upcoming disasters. This will be tested during actual disasters, and later be improved after studying it's effects on network connections. But currently, computer scientists are creating the telemedicine to be provided on mobile devices such as a cell phone which can easily use RFID to track were a person is, or barcode scans to scan patient's papers to be sent into the medical field. This form of mobile telemedicine will impact greatly towards natural disasters for the reason that is mobile, unlike computer desktops.
Karen M

Ease of use more important than price - 0 views

shared by Karen M on 15 Sep 09 - Cached
  • Cellphones, smartphones and other mobile devices
    • Karen M
       
      These are the IT systems that are going to be discussed in this article.
  • small business owners attach a high value to the benefits of staying in touch with clients and colleagues at all times, wherever they are,
    • Karen M
       
      These are the benefits of using smartphones. However, the Social and Ethical Issue may be "Equality of Access" because it is possible that not everybody could afford one of these phones.
    • Karen M
       
      This also shows us the Area of Impact, "Business and Employment." Business people are the ones who use the phones in order to stay connected with their clients.
  • Dependable, easy-to-use and high-quality mobile solutions pay for themselves quickly by enabling small businesses to be more responsive, efficient and productive, and allowing them to do more with fewer resources.”
    • Karen M
       
      This is a description of the IT systems.
  • ...2 more annotations...
  • ‘Maintenance’ and ‘Reliability’
    • Karen M
       
      These elements need to be worked on in order to make these phones even better.
  • business benefits of being in touch with clients and other business stakeholders are perhaps even more important than they are for their larger competitors.
    • Karen M
       
      This explains the benefits for the people who are being affected by these smartphones.
Madeline Brownstone

BBC News - Schools must embrace mobile technology - 0 views

  •  
    "The gap between those schools embracing technology and those not is getting bigger, he said. "
T Graham

AFP: Taiwan unveils hydrogen-powered mobile phone chargers - 0 views

  • Taiwanese researchers said Friday they have developed hydrogen-powered mobile phone chargers
    • T Graham
       
      Hydrogen is a natural resource, it can be used over and over again. Hydrogen also doesn't give off any pollution in the air or give off any toxic waste.
  • "We will continue to improve the invention. We hope the hydrogen-powered device can replace current cell phone recharge systems in 2012."
    • T Graham
       
      Do they mean for all people who use cellphones, or just the users in Taiwan?
  • The charger will be key to the Taiwan government's endeavour of carving out a space for itself in future energy generation
    • T Graham
       
      Taiwan is mixing this technological move with its business endeavors and profit potential. This is mix of business and employment and environment.
Madeline Brownstone

In Rural Africa, a Fertile Market for Mobile Phones - NYTimes.com - 0 views

  • When the battery dies, Mr. Rutagumirwa, a 50-year-old farmer, walks just over four miles to charge it so he can maintain his position as communication hub and banana-disease tracker for his rural neighbors.
    • Madeline Brownstone
       
      The need for electronic devices in rural areas of the world require creative solutions to keeping the machines charged.
sarah d

Technologies - Cell-phone college classes face hurdles - 0 views

  • campus technology officials expect most college course material soon will be accessible on mobile devices
    • sarah d
       
      This relates to teh area of impact, education. If courses can be taken via cell phones, education will be very different.
  • courses via cell phone
    • sarah d
       
      This phrase tells us that cell phones are the IT system being discussed in this article.
1 - 20 of 32 Next ›
Showing 20 items per page