e port slp.pdf

27
THE SMARTPHONE JOLISA FRANCIS, ELEANOR QUACH, ALEXANDRA BAREFOOT, JEREMY MCIVER

Upload: alexandrabarefoot

Post on 28-Sep-2015

27 views

Category:

Documents


1 download

TRANSCRIPT

  • THE SMARTPHONEJOLISA FRANCIS, ELEANOR QUACH, ALEX ANDRA BAREFOOT, JEREMY MCIVER

  • History of the SmartphoneCoined in 1997

    1992 IBM-Simon Personal Commuter- $800

    1999 Research In Motion- Blackberry

    Early 2000s- HTC, Windows, Blackberry, Sidekick Mainly used for email & work

    2007 Apple- iPhone - $200 Multimedia functions- iOS

    Content > business

  • 0%

    20%

    40%

    60%

    80%

    100%

    Without their smartphone 3

    hours/day

    Rathercommunicatewith someone

    for the firsttime through

    text

    text and drive Can find theirway homewithout a

    smartphone

    College Students

    50 year old and up

    How much the average college student depends on their smartphones:

  • The Popularity of Smartphone

    5% - 50% penetration Landline: 45 years Mobile: 7 years Smartphones: 4 years

    Nielsen reports that about 40% of US population are smartphone owners and this number is expected to reach 61% by 2016

    Smartphone today vs. television in 1950s

    Fig. 1 Graham Bell And His Invention

    (Alexander Graham Bell)

    Fig. 2 Smartphones Popularity

    (Times Change)

  • Experience Stores Also called Touch points Create a lifestyle

    Fig. 5 Inside Samsung Experience Store

    (First Impression)

    Fig. 4 Apple Store

    (Think Different: How Apple Store Seduces You)

  • Word- of- Mouth Produce a limited amount of their products

    Loyal Customers

    Fig. 6 People In Front Of Apple Store(Lee, Cody)

    Fig. 7 The Media(Bloggers Agencies Brand)

    Fig. 8 Loyal Customer(Reed, Brad)

    Fig. 9 Word of mouth is one of the oldest forms of advertising

    (Dysthe, Sarah)

  • How Does Business World Integrate Smartphone?

    In-app advertisements

    Google new update favored mobile-friendly websites

  • Pros

    Increase workers productivity

    Workers flexibility

    Business efficiencies

    Company profits

    Fig. 10 Using Smartphone In Subway

    (How News Apps)

  • Cons

    Decrease productivity

    Create Stress

    Introduce computer viruses to work computer networks

  • Signs of a hacked smartphone:Strange texts

    Unauthorized use Change of call history, sent text messages and other unusual activity.

    Service disruptions Abruptly dropped calls can be a failed hacking attempt.

  • Smartphone Hacking

    It would take an amateur hacker less than 20 hours to hack into your smartphone.

    A professional hacker would only need under 4 hours, to steal all of your information without you even knowing.

    MacDonald, Claire. Smartphone Users Unaware of Hacking Risks. Digital image.

  • Applications

    Most apps once they are downloaded share the phones unique ID number, the phones location, and the users age and gender.

    Track the exact location of the cell phone user at any given time.

    Remotely send SMS commands to lock/unlock the cell phone usage or delete call history, photos and videos from the target phone at any time.

  • Easiest smartphone to hack:CNET an electronic consumer, did a study which revealed that android phones are easier to hack into than apple phones using an IOS system.

    When comparing the two phones, the only way to break into an IPhone was if it was jail broken.

    However, to hack into an android all you would need is to be linked to the phone through Wi-Fi or Blue-tooth.

  • Privacy from Cellphone Providers

    Service providers like AT&T, Sprint, Verizon, and T-Mobile collect phone data, but don't tell you exactly what data they collect, the reasons they collect it, and their data retention policies.

    The information that they collect are all calls made, the numbers that you receive calls from, emails sent, bill copies and much more.

  • Government

    Law enforcement can tap into the locations of smartphones, and ask wireless providers to turn over days worth of location data, and implant tracking devices.

    They can also request all the data your smartphone provider has collected about you.

    Yeo, Julian. Hacking Your Smartphone: Dont Forget To Watch out for Apps. Digital image.

  • How to: Prevent HackingDont automatically connect to any available Wi-Fi connections.

    Turn off Bluetooth when around places like Hotels, Malls and restaurants

    Dont store information on your phone like pins, social security numbers, and bank information

    Dont automatically remember login passwords for access to email, and other accounts.

  • Agenda

    Rumored health hazards

    Effects of cell phone use

    Ways to reduce cell phone exposure

  • (the-open-mind.com)

    (www.techrepublic.com)

  • Rumored Health HazardsBrain dysfunction

    Brain tumors

    Sleep disorders

    Attention Deficit Disorder

    Interference with cardiac pacemakers

  • Effects of Cell Phone useCell phones emit low radiofrequency (RF) energy levels

    These levels are safe and undetectable

    Prolonged exposure is the real concern

    High RF levels emit excess heat

    This leads to increased body/tissue temperature

    Eyes are especially vulnerable to RF energy due to low blood flow.

  • How to reduce RF exposureHands-free kit like a Bluetooth set or headphones

    Utilize speaker mode often

    Limit time spent using your smartphone

  • Societys overdependencehttps://www.youtube.com/watch?v=pxlIE7fc-Vs

  • Child smartphone use Digital NativesStunts social development

    Creates distress

    Detrimental in toddlers

  • NomophobiaNo-mobile-phone phobia

    Effects 58% of men & 47% of women

  • Fighting NomophobiaTurn your phone off daily

    Balance screen time and in-person time each week

    Try a technology fast every month

    Place your phone at least 15 feet away from you when you sleep at night.

  • ConclusionSocial convenience vs. social health

    Balance

    Convenience vs. security

    Unknown health hazards

    Its important to understand how smartphones affect and relate to human psychology before

    these technologies are so fully ingrained that its hard to recall what life was like without them.

  • Works citedKovach, Sue, ed. ""The Hidden Dangers of Cell Phone Radiation." Life Extension Magazine Aug. 2007: 1-13. Web. 25 Feb. 2015

    MacDonald, Claire. Smartphone Users Unaware of Hacking Risks. Digital image. 10 Mar. 2013. Web. 12 Apr. 2015.

    "Privacy Rights Clearinghouse." Privacy Rights Clearinghouse - Cellphone Privacy. 10 Mar. 2013. Web. 12 Apr. 2015.

    Reducing Exposure: Hands-free Kits and Other Accessories. www.fda.gov. US Food and Drug Administration, n.d. Web. 25 Feb. 2015

    Whitney, Lance. "IOS Scores as Most Secure Mobile OS in Spyware Report - CNET." CNET. CBS Interactive Inc, 10 Apr. 2015. Web. 12 Apr. 2015.

    Yeo, Julian. Hacking Your Smartphone: Dont Forget To Watch out for Apps. Digital image. 10 May. 2014. Web. 12 Apr. 2015. . 2015.