- Posted by: essay
- Category: Free essays
The study involves three major groups of subjects, including IT professionals, experts studying the problem of cyber crimes and wireless technologies, and average users, who have experience of using wireless technologies. In fact, the choice of subjects for the current study is very important because they should represent different views and standpoints, which should be taken into consideration in the course of the detailed analysis of the findings of the study. All subjects are of different age, race, gender, and cultural background. At the same time, IT professionals and experts are of approximately the same educational level, although they may have different specialization within their field of work. As for users, the subjects for the current study were selected in such a way that they could present possibly broader social groups of different age, gender, origin, cultural background, educational background, occupation but what united them all was the use of wireless technologies and devices. This was the major condition for the selection of subjects for the current study. The diversity of subjects involved in the current study was intentional because, in such a way, the study can provide the researcher with the broader view on the problem and open different ways to the solution of the problem of the study. The diversity of subjects of the study contributes to the better understanding of the essence of the problem, namely the current situation in regard to the development of wireless technologies, existing threats and possible ways of their prevention and solution of existing problems in the field of using wireless technologies, devices and networks.
The involvement of IT professionals in the current study was essential because IT professionals have a profound knowledge of wireless technologies and, what is more, they can forecast the further development of wireless technologies. At the same time, they work with wireless technologies and they develop them, to a significant extent. Therefore, they should be aware of possible risks and threats wireless technologies are exposed to at the moment as well as they can forecast what threats and risks to wireless technologies can emerge in the future.
In addition, IT specialists can use their professional experience, skills and abilities to assess adequately strengths and potential of wireless technologies. In such a way, they can correlate existing strengths and advantages of wireless technologies compared to conventional technologies and risks and threats wireless technologies may be exposed to. Through the involvement of IT professionals in the current study, it is possible to obtain the expertise opinion on the current development of wireless technologies, their future and technical risks and threats wireless technologies may face. custom research paper
At the same time, IT professionals have an extensive experience of developing and using wireless technologies. Therefore, they know probably better than other subjects the essence of wireless technologies and their actual potential. Moreover, they know how technologies will develop in the future because it is IT professionals, who develop ITs that are currently implemented or will be implemented in the nearest and distant future. Therefore, the study of wireless technologies and threats they are exposed to along with the development of effective strategies of data protection would be impossible without the involvement of IT professionals.
In this regard, the involvement of experts was also important. To put it more precisely, experts involved in the current study work in different fields, including education, journalism, technology science, and other fields but what was the uniting criterion that was common to all experts involved in the current study was their in-depth knowledge and study of the problem of using wireless technologies. The involvement of experts from different fields, who work on the problem of using wireless technologies, contributes to the large-scale analysis of actual problems, difficulties and challenges wireless technologies are currently facing or may face in the future. In addition, experts’ opinion can help to find possible solutions to current problems of wireless technologies, especially in terms of the enhancement of data protection. In actuality, experts involved in the current have extensive knowledge of wireless technologies because they work and study wireless technologies in details. Therefore, they can enhance the opinion of IT specialists and reveal new aspects of using and protection of wireless technologies from such threats as natural disasters, hacking/cracking, and illegal computer activities.
All participants of the study signed the informed consent as they were informed on the purpose of the study and their role in the study, whereas they were promised to maintain their confidentiality and anonymity.
At the same time, experts can provide the researcher with a broader view on wireless technologies, threats they are exposed to and their solutions. In this regard, it is important to place emphasis on the fact that experts conduct the detailed study of wireless technologies, threats and their prevention. However, unlike IT specialists, experts working on the problem of wireless technologies can provide a more objective and critical view on wireless technologies. What is meant here is the fact that IT specialists are often involved in the production or use of wireless technologies. Therefore, their opinion concerning wireless technologies, threats they are exposed to and ways of their solution are, to a certain extent subjective, because, as a rule, they ground their judgments on their empirical knowledge, whereas experts tend to ground their judgments concerning wireless technologies on their studies and critical evaluation of their findings concerning wireless technologies.
In this regard, average users are more subjective than experts but still they provide very important information concerning practical aspects of using wireless technologies. To put it more precisely, average users have a subjective opinion concerning wireless technologies. However, it is average users, who use wireless technologies on the regular basis. In fact, they are the end users of wireless technologies and it is for the average users wireless technologies are developed for. Therefore, the current study cannot ignore the opinion of average users on wireless technologies, possible threats and ways of their solution.
However, average users may be helpful mainly in terms of identification of existing threats and certain problems or advantages of using wireless technologies, whereas their professional and educational background cannot make their opinion on the prevention of threats to wireless technologies and data protection reliable and valid in terms of the current study. Nevertheless, average users can reveal possible errors made by IT specialists or experts in their judgments concerning practical implementation of wireless technologies. In such a way, the involvement of average users contributes to the better understanding of practical aspects of using contemporary wireless technologies that is very important for the study of threats associated with wireless technologies and strategies of data protection and elimination of threats associated with wireless technologies.