Abstract
The purpose of this document is to provide an overview on the growth on mobile phone and PDA devices and use in business-oriented modern day life style. The explosion of smartphones in enterprise and personal computing heighten the concerns of security and privacy of users. Now a day’s use of mobile is in every walk of life like shopping, trading, paying bill and even using internet banking. But with these facilities some draw backs are also there. Recent studies have shown that applications can host new types of malware. This discussion explores smartphone security through several research works and how user himself can avoid from data hacking and other insecurities.
Highlights
The main intention of this manuscript is to give an impression on the growth of mobile phone and Personal Digital Assistants (PDAs) devices, which are indispensable for our business-oriented modern day lifestyle
Rapid technological progress is the answer to these issues, and it is envisaged that M-commerce will be much more widely accepted in the future. [17]. Another important issue that needs the attention of mobile network operators is to decide and What the importance of emerging world of M-Commerce if it is restricted for businessto-business or business-to-consumer and/or consumer-toconsumer transactions or will expand their services to act as a reservoir for offering credit for airtime, or for goods and can provide loans or billing services to intermediary companies
It has been resolved that the mobile handheld devices are productivity enhancing tools and bring many benefits for the enterprise but at the same time they are devoid of many risks for organization’s security as a considerable amount of confidential corporate and personal data can amass on a wireless handheld device having enough potential to seek the interest of an attacker
Summary
The main intention of this manuscript is to give an impression on the growth of mobile phone and PDA devices, which are indispensable for our business-oriented modern day lifestyle. This document put emphasis on those technology risks that are associated with using these devices as well as available safeguards to diminish any problems This information will help organizations to improve their levels of security and to decrease such occurrences concerning the use of these handheld wireless devices. [9] Internet connectivity has helped accelerate the tendency of mobile phones from ‘voice-centric to data-centric’ networking systems. These two worlds are gradually converging to support each other. [21] From 2010 on a majority of the cellular networks started undertaking switch-over from the existing third generation communications systems (3G) to the fourth generation systems (4G) This (4G) system mostly incorporates broadband IPbased heterogeneous multimedia services that let users use diverse networks on an anytime and anywhere basis. This (4G) system mostly incorporates broadband IPbased heterogeneous multimedia services that let users use diverse networks on an anytime and anywhere basis. [22] The 4G system is a modified version of third generation mobiles and certainly is a ‘must have’ gadget for the organization. [18]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have