Buy essay on Wireless Technologies: Threats and Data Protection

Today, the development of wireless technologies raises a number of problems, although threats and risks associated with wireless technologies are under-researched. The current study focuses on the analysis of the current development of wireless technologies and existing risks and threats. Methods used in the study are interviews, questionnaires and focus groups. Subjects involved in the study were IT professionals, experts in wireless technologies, and average users. The study findings prove the fact that the major threats wireless technologies are exposed to are human-related mainly, including hacking/cracking and illegal computer activities. In addition, it is possible to identify natural disasters as potential threats to the stable functioning of wireless technologies. The study concludes that the enhancement of wireless technologies is needed along with the development of new information systems protecting wireless technologies from external threats.

TABLE OF CONTENTS

CHAPTER 1. An Introduction to the Study 9
Background of the Problem 10
Statement of the Problem 10
Purpose of the Study 11
Significance of the Problem 11
Nature of the Study 11
Research Questions 11
Hypotheses 12
Theoretical Framework 12
Definition of Terms 12
Assumptions 13
Limitations 13
Delimitations 14
Summary 14
CHAPTER 2. Review of the Literature 15
Documentation 15
Literature Review 15
First Subtopic – Heading level Three 16
Second Subtopic – heading level 3 16
Summary 17
Conclusion 17
CHAPTER 3. Research Methodology 18
Research Design 18
Scope of the Research 19
Primary and Secondary Approaches and Sources 19
Research Questions 19
Hypotheses 20
Dependent and Independent Variables 20
Population 20
Geographic Location 22
Instrumentation 22
Data Collection 22
Data Analysis 23
Flexibility of Interpretation 23
Validity and Reliability 24
Research Difficulties 24
Researcher Involvement 24
Data Interpretation 25
Data Structuring and Coding 25
Summary 25
CHAPTER 4. Discussion 26
Conclusions 26
Recommendations 26
References 28
Appendixes 29
A. Survey Instrument One 29
B. Informed Consent Form 31

buy essay

CHAPTER 1
AN INTRODUCTION TO THE STUDY

Background of the problem

Today, the use of wireless technologies becomes more and more popular but the wide application of wireless technologies raises a number of problems related to their secure and reliable performance. In fact, wireless technologies have emerged since the late 1990s – early 2000s but developers of wireless technologies did not always take into consideration possible problems that may arise in the course of the implementation of wireless technologies, such as WLAN. In actuality, the main problem related to the use of wireless technologies is their reliability and security because often wireless securities are vulnerable to the unauthorized access, whereas, in case of natural disasters, they often fail to perform their functions properly. In such a context, the main question of the current research arises: what the major risks and threats contemporary wireless technologies are facing and what the effective ways of the protection of data and improvement of information security are.

Statement of the Problem

The emergence of information technologies and telecommunication systems contribute to the wider introduction of wireless technologies, which facilitate the communication and data sharing, but, on the other hand, they raise the problem of the data protection and private information security.
Purpose of the Study

In terms of the current study, it is possible to identify three major problems or threats that can undermine the performance of wireless technologies, including natural disasters, hacking and cracking, and cyber crimes. These problems can be divided into two major groups, including natural disasters and human-induced disasters. Natural disasters may lead to failures in the stable performance of wireless technologies, for instance, when signals and microwaves fail to be transmitted under the impact of the weather conditions. However, today, human induced disasters, caused by hacking/cracking or illegal cyber activities, are more serious because they lead to information breaches, identity theft, unauthorized access to private information and other problems, whereas wireless technologies often fail to provide the high level of security to users.
Significance of the Problem

In such a situation, it is extremely important to explore the major threats wireless technologies are currently facing as well as to develop effective ways of prevention of these risks and threats for the reliable and stable performance of wireless technologies. Therefore, the research focuses on three variables, including natural disasters, hacking and cracking, and illegal computer activities or cyber crimes related to the use of wireless technologies. At this point, it is important to place emphasis on the fact that the emergence of new information technologies and wireless technologies opens wider opportunities for their wide application in different fields of human life. However, on the other hand, numerous threats wireless technologies may raise and face in the course of their mass implementation are often underestimated. Hence, the risk of information breaches and unreliable functioning of wireless technologies persists, whereas risks, threats and their prevention should be studied in details to make functioning of wireless technologies and their mass application effective and user-friendly.
Nature of the Study
The nature of the study section is also called a synopsis of the research design. This section is a forum for distinguishing the design used to investigate a problem from other research designs that have been utilized in previous studies, or could have been utilized in this study. This section puts the study in context with similar types (e.g., other scholarly manuscripts). The appropriateness of the design is justified by how it accomplishes the goals of the study as delineated in the Problem Statement section.
To begin typing this section, click once in the gray field.
Double-click to delete textbox
Research Questions
The development of wireless technologies raises several questions:
• What are advantages of wireless technologies over traditional technologies?
• What are the threats wireless technologies are vulnerable to?
In this regard, it is possible to distinguish three major domains of the study:
• Natural disaster
• Hacking/cracking
• Illegal computer activities
Hypotheses
In such a context, it is possible to suggest the hypothesis that the development of wireless technologies outpaces the development of means of the protection of data and private information, making wireless networks and technologies vulnerable to external and internal threats, including the negative impact of natural disasters, hacking/cracking, and illegal computer activities. On the other hand, wireless technologies may need the development of new information system, which have the higher degree of protection and which are capable to protect data and private information stored and transmitted with the help of wireless technologies.
Theoretical Framework

The problem of the wireless technologies will be studied in terms of the qualitative analysis and study involving interviews, questionnaires and focus groups. The study focuses on the use of qualitative methods to asses and forecast the risks and threats to wireless technologies and methods of their prevention.

Definition of Terms

Wireless technology – technology that does not need wire connection
Information technology – technology involving computing technology, software and telecommunication systems
Network – a group of computers or other devices connected together by either wired or wireless technologies
Hacking /cracking – illegal access to information stored on computers or in databases, through cracking passwords and information system
Illegal computer crime – crimes committed using computer technology leading to harmful results for individuals or organizations
Natural disaster – any disaster that occurs under the impact of environmental, natural factors



Author: essay
Professional custom essay writers.

Leave a Reply