...INTRODUCTION 1 2. IMPACTS OF THE MOBILE PHONE ON SOCIETY 2 2.1 Impacts on Society in The Past 2 2.2 Positive Impacts on Society in The Present 3 2.3 Negative Impacts on Society in The Present 5 2.4 Positive Impacts on Society in The Future 7 2.5 Negative Impacts on Society in The Future 8 3. ENVIRONMENTAL IMPACT OF CELLPHONES 12 3.1 Lifecycle of the Cellphones 12 3.2 Cellphone Accessories 14 3.3 Energy Consumption in Internet Applications 16 4. IMPACTS OF THE MOBILE PHONE ON HUMAN HEALTH 19 4.1 Positive Impacts on Human Health in The Past 19 4.2 Negative Impacts on Human Health in the Past 19 4.3 Positive Impacts on Human Health in the Present 20 4.4 Negative Impacts on Human Health in the Present 23 4.5 Positive Impacts on Human Health in the Future 26 4.6 Negative Impacts on Human Health in the Future 27 5. CONCLUSION 28 Works Cited 29 1.INTRODUCTION Mobile phones are spreading around the world faster than prior communication technologies including the television and the internet [1]. They have been adopted faster than any other technology ever introduced to human history [2]. According to the International Communication Union (ITU), from 2005 and 2009, the number of mobile phone subscribers doubled going from 34 subscribers for every 100 inhabitants to 68, respectively. Subscriptions continue to rise questions are raised, it is important to explore the society which consumes such a technology [3]. Mobile phones went from being mere voice communication...
Words: 9103 - Pages: 37
...Mobile Computing and Social Networking [Name] Dr. Danielle Babb CIS500 November 21, 2012 Abstract Mobile computing has allowed great strides in the care and monitoring of patients. Medical personnel are able to obtain real-time data on patient vital signs via mobile networks. Network integrity and data assurance are important factors in the delivery of vital statistics for patient care. Social network support forums provide a source of interaction with those with similar health concerns. Mobile Computing and Social Networking The use of mobile computing technology to monitor patient vital signs is a critical step forward to help keep people healthy and to improve healthcare outcomes. This technology has transformed the lives of patients by cutting down the amount of time one spends in a doctor’s office for basic monitoring services. Mobile devices, when loaded with the appropriate applications, are useful in transmitting information such as blood pressure, glucose readings or even temperature back to medical offices. Medical personnel can then track a patient’s condition and if need be, have them come in if their vital signs are not positive. This could avert a trip to the hospital in some cases. In a survey of American consumers, 61% said they would like self-monitoring devices that remotely sends information to their doctors. (Mobile Technology Allows for Remote Patient Monitoring, 2012) Network Management Mobile technology has made great strides...
Words: 1376 - Pages: 6
...Introduction to Bluetooth People are always seeking for more efficient, more secure, and less expensive communication tools. Bluetooth is one of them, which is developed for years and used in various areas with many interesting functions and applications. Bluetooth is a wireless technology that is a combination of hardware, software, and interoperability requirements. Some characteristics and advantages of Bluetooth technology includes reasonably reliable, high simplicity, allow both data and voice communication, free of charge, has no physical installation required, more mobility and flexibility, and less power consumption. Some limits of Bluetooth technology is the distance and size of transmission. Of course, technologies are rapidly developing; Bluetooth 3 came up two years ago and allows the wireless transfer of large files and as videos. In general, all these characteristics provide it with strong potential in future development. Medical Industry In medical industry, the integration of Bluetooth on PC’s and PDA’s allows staff to access the patient’s detailed records updated in real time, and because less paperwork was needed, it also provides a faster diagnostic. Before, most of the devices in the hospital are fixed in a certain place, which limits the patient’s activities in that certain area. Now, more and more applications are coming out for remote patient monitoring. With the release of “the firstBluetooth v4.0 profile specification” in June 2011, there are already over...
Words: 1103 - Pages: 5
...programs. •Development of telehealth policy initiatives aimed at improving care access and quality health services. •Promotion of knowledge exchange regarding best telehealth practices. Telehealth is an invaluable addition to multiple care settings. Store-and-forward programs provide the smaller hospital to draw upon the knowledge of its much larger counterparts (HHS, 2013). As such, teleradiology and teledermatology programs are of particular interest to critical care facilities and rural health centers (HHS, 2013). Applications such as teleradiology and remote EKG services carry a greater likelihood of being covered by third party payers as they do not typically involve direct patient contact (HHS, 2013). Home monitoring and patient education can bridge gaps in the care of chronic illnesses, allowing these and similar programs can benefit ambulatory or primary care environment (HHS, 2013). Telehealth programs like these are effective in minimizing the distance between modes of rural care be it stabilizing trauma patients or offering ongoing contact with...
Words: 2405 - Pages: 10
...WHITE PAPER Copyright © 2011, Juniper Networks, Inc. 1 MOBILE DEVICE SECURITY— EMERGING THREATS, ESSENTIAL STRATEGIES Key Capabilities for Safeguarding Mobile Devices and Corporate Assets 2 Copyright © 2011, Juniper Networks, Inc. WHITE PAPER - Mobile Device Security—Emerging Threats, Essential Strategies Table of Contents Executive Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....
Words: 3536 - Pages: 15
...size, using less power and performing more advanced calculators. In 2007 apple released their Iphone to achieve the next goal in computing. This new type of communication tool, called smart phone, is generally referred to as a phone, which is poor labelling. A Smartphone is a handheld computer, which can place phone calls. Although the term Smartphone was first used in 1992, apple was the first company to release a Smartphone to a wider audience. This evolution is led by computer manufacturers and software companies and not handset manufacturers, which have controlled the market thus far. One competitor to apple Iphone OS is the android OS. Android originates from a small software company, acquired by Google and is now owned by open handset alliance (OHA), where Google is a member. OHA has over a hundred member companies such as mobile operators semiconductor companies handset manufacturers, software companies and commercialisation companies. Android is an emerging mobile technology still in the development phases. Early releases of the SDK have been made available to the mobile developer community to start writing applications before handsets are available on the market. Fully featured Android handsets are expected to start shipping towards the end of 2008 or early 2009. Android is a new mobile platform based on Java running on top of a Linux kernel. For now, Java is the only development language available, but eventually Android may support other programming languages...
Words: 7822 - Pages: 32
...The wearable computing market: a global analysis By Jody Ranck CONNECTED CONSUMER Table of contents EXECUTIVE SUMMARY INTRODUCTION HISTORY FITNESS AND WELLNESS DEVICES European sector Other areas of fitness WEARABLES IN THE ENTERPRISE ENVIRONMENT OPTICAL WARE SKIN SENSORS DISABILITY TECHNOLOGIES FASHION AND ALTERNATIVE PARADIGMS FOR COMPUTING THE INTERSECTION OF WEARABLES, GAMING AND ENTERTAINMENT AUGMENTED REALITY AND WEARABLE TECHNOLOGIES TRENDS COMPANIES TO WATCH KEY TAKEAWAYS ABOUT JODY RANCK ABOUT GIGAOM PRO FURTHER READING 3 4 6 7 8 9 9 10 12 13 15 17 18 19 22 24 25 25 26 The wearable computing market: a global analysis July 2012 -2 - CONNECTED CONSUMER Executive summary “During a Formula 1 race a driver experiences wrenching forces of more than 4.5G. His heart rate may exceed 180 beats per minute and his blood pressure could rise by half. With soaring temperatures inside the cramped cockpit he will also dehydrate, typically losing 2–3 litres of water during the race. Yet the driver must concentrate well enough to achieve lap times that might vary by just a tenth of a second. This is tough, on both mind and body. Hence it is not just the performance of the car itself which an array of sensors keeps an eye on, wirelessly transmitting data about the engine, suspension and so on to the pit crews. The drivers’ own vital signs are constantly monitored, too.” —Economist, Nov. 3, 2011 Wearable computing, or wearables, has recently moved from the realm...
Words: 7393 - Pages: 30
...Cisco Virtualization Experience Infrastructure (VXI) Reference Architecture October 5, 2010 What You Will Learn Enterprise IT departments are pressured to control costs, improve manageability, enhance security, and speed-up the deployment of new capabilities while supporting a consistent user experience across diverse endpoints. Desktop virtualization (DV) has become a popular solution for addressing these needs. With hosted DV, the end-user’s desktop experience (operating system, applications, and associated data) is abstracted from the physical endpoint and centralized. The user’s desktop image is hosted as a virtual machine on a data center server. Users can access hosted virtual desktops from anywhere through DV appliances, smart phones, tablet computers, laptop and desktop computers, and other clients. Organizations deploying DV face many challenges, as the DV technologies potentially affect the entire IT infrastructure. To address these challenges, Cisco has developed Cisco® Virtualization Experience Infrastructure (VXI), a comprehensive architecture for desktop virtualization. Cisco VXI, which uses three existing Cisco architectures, includes designs for virtualized data centers, virtualization-aware borderless networks, and virtualized workspaces, and the critical services needed to support these architectures. Cisco VXI reduces the total cost of ownership (TCO), streamlines operations, simplifies management, and positions organizations for growth. This document describes...
Words: 5886 - Pages: 24
...International Journal of Education and Research Vol. 1 No. 10 October 2013 The effects of Cell phone use on the study habits of University of Zimbabwe First Year Faculty of Arts students. Leslei Kahari ABSTRACT The objective of this study is to examine the effects of cell phone use on the study habits of University of Zimbabwe 1st year Faculty of Arts students. The research was carried out using questionnaires distributed to 200 students who own cell phones .The questionnaires collected demographic information about the respondents, cell phone type preferences, uses of cell phones during study, predominant usage during study and information about challenges facing students in using mobile phones for study purposes. The results showed significant gender differences in several aspects of cell phone use .The results also revealed that cell phone use has negative and positive effects on the study habits of university students depending on usage patterns .The study concluded that despite the challenges faced by students ,cell phones unlike other educational innovations are firmly rooted in the society in which education and institutions are part of and ignoring the use or applications of this technology would be ill-advised. Key words: Cell phone, study habits, University of Zimbabwe INTRODUCTION This study investigates the effects of cell phone use during study on the study habits of University of Zimbabwe 1st year Faculty of Arts students. Many students starting university...
Words: 5810 - Pages: 24
...The effects of Cell phone use on the study habits of students. ABSTRACT The objective of this study is to examine the effects of cell phone use on the study habits of students. The research was carried out using questionnaires distributed to 200 students who own cell phones .The questionnaires collected demographic information about the respondents, cell phone type preferences, uses of cell phones during study, predominant usage during study and information about challenges facing students in using mobile phones for study purposes. The results showed significant gender differences in several aspects of cell phone use. The results also revealed that cell phone use has negative and positive effects on the study habits of university students depending on usage patterns .The study concluded that despite the challenges faced by students ,cell phones unlike other educational innovations are firmly rooted in the society in which education and institutions are part of and ignoring the use or applications of this technology would be ill-advised. INTRODUCTION This study investigates the effects of cell phone use during study on the study habits of students. Many students starting university do not always possess the prerequisite skills to cope with the challenges of the new and changing learning environment. An environment where they are expected to study without being told specifically what or when to study. Ultimately their success or failure within university courses is determined...
Words: 5615 - Pages: 23
...Feedback Another type of ambiguous communication in a task-oriented setting is the exchange of feedback messages. Since e-mail is proven to be very practical in the exchange of documents (e.g., Sullivan, 1995) it has also become more common to deliver feedback on these documents by e-mail. Feedback messages can be considered ambiguous because they have an objective, critical component, but also a motivational component in the form of constructive feedback. In organizations, feedback is considered as a first step to improvement and personal development. This makes it an important resource fuelling our motivation at work (Bakker & Demerouti, 2007). However, if information is likely to be negative, media choice can be crucial in delivering the feedback (Fulk & Mani, 1986). In our western society it is not done to send negative personal feedback by e-mail. In such a situation, F2F interaction is preferred. The question is, what is in best concern of the employee? The space between the sender of the feedback (manager) and the receiver (employee) is regulated by the context of the interaction and by the history of the relationship between the two (Lave, 1993). Positive feedback is not that difficult to deliver because it usually makes the receiver happier. Media choice is also no issue, since positive messages are less ambiguous and more easily interpretable than negative messages. However, many people have a natural reluctance in communicating undesirable feedback, which is in...
Words: 5577 - Pages: 23
...Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 2, Issue. 3, March 2013, pg.18 – 25 RESEARCH ARTICLE An Automated Biometric Attendance Management System with Dual Authentication Mechanism Based on Bluetooth and NFC Technologies Samuel King Opoku Computer Science Department, Kumasi Polytechnic, Ghana samuel.k.opoku@gmail.com Abstract— Attendance Management System (AMS) is the easiest way to keep track of attendance for community organisations for day-to-day monitoring of attendance and manpower analysis. AMS comes in four types. These are Manual, Biometric, Card-based or E-Commerce systems. This paper presents the implementation of an AMS that is based on Bluetooth and NFC technologies in a multi-user environment. It uses fingerprint and the Bluetooth address of the NFC-enabled phone of the user to authenticate the identity of the user. A Java based desktop application receives the NFC tag IDs, other information associated with the mobile phone and the user and submits them to an analyser for the interpretation of the user’s behaviour. Key Terms: - Attendance Management System, Authentication, Biometric, Bluetooth, Mobile Phone, NFC. I. INTRODUCTION Attendance Management System (AMS) is the easiest way to keep track of attendance for community organizations such as school clubs, scouting units, church groups, business...
Words: 3797 - Pages: 16
...An eGain White Paper Customer Support Megatrends and Next Practices 2010 Update © 2010 eGain Communications Corporation. All rights reserved. “May you live in interesting times!” The popular Chinese saying invokes both a blessing and a curse—depending on what you make of it. These are interesting times for customer support executives. As the rise of the Internet (and now, mobile Internet) and social networks collide with forces of globalization, support organizations find themselves in the eye of the storm. They are buffeted by powerful winds of change, ranging from the dramatic migration of most phone business to the Web to the high-profile outsourcing of agent positions to low-cost countries. To add to it, CxOs are redefining expectations from their service and support operations as they seek to build competitive advantage through distinctive customer service. This white paper discusses the eight megatrends transforming customer support organizations today. Resistance is futile. Taking a passive stance is like trying to ignore a tsunami. Megatrends are not fads; they won’t go away after a while. The trick is to embrace change and stay ahead of these trends instead of getting swept away. So what are these megatrends? Megatrend 1: Customer is royalty; her wish must be your command Megatrend 2: Change is the only constant with mergers, acquisitions, consolidation, outsourcing, and offshoring Megatrend 3: Your agents need 20 pound megabrains...
Words: 5356 - Pages: 22
...IDENTIFICATION AND AUTHENTICATION 10 5.3 IDENTIFIER MANAGEMENT 10 5.4 AUTHENTICATOR MANAGEMENT 10 5.5 ACCESS CONTROL POLICY AND PROCEDURES 11 5.7 ACCESS ENFORCEMENT 12 5.8 INFORMATION FLOW ENFORCEMENT 13 5.9 SEPARATION OF DUTIES 13 5.10 LEAST PRIVILEGE 14 5.11 UNSUCCESSFUL LOGIN ATTEMPTS 14 5.12 SYSTEM USE NOTIFICATION 14 5.13 SESSION LOCK 15 5.15 SUPERVISION AND REVIEW — ACCESS CONTROL 16 5.16 REMOTE ACCESS 16 5.17 USE OF EXTERNAL INFORMATION SYSTEMS 17 6. SECURITY AWARENESS AND TRAINING POLICY AND PROCEDURES 18 6.1 SECURITY TRAINING 19 7. AUDIT AND ACCOUNTABILITY POLICY AND PROCEDURES 19 7.1 AUDITABLE EVENTS 19 7.2 CONTENT OF AUDIT RECORDS 20 7.3 AUDIT STORAGE CAPACITY 20 7.4 AUDIT MONITORING, ANALYSIS, AND REPORTING 20 7.5 TIME STAMPS 21...
Words: 19387 - Pages: 78
...The Future of the Internet A Compendium of European Projects on ICT Research Supported by the EU 7th Framework Programme for RTD European Commission I nform ati on S oc i et y and M ed ia Europe Direct is a service to help you find answers to your questions about the European Union New freephone number * 00 800 6 7 8 9 10 11 Certain mobile telephone operators do not allow access to 00800 numbers or these calls may be billed. In certain cases, these calls may be chargeable from telephone boxes or hotels. «The views expressed are those of the authors and not necessarily those of the European Commission or any of its officials» A great deal of additional information on the European Union is available on the Internet. It can be accessed through the Europa server (http://www.europa.eu). Cataloguing data can be found at the end of this publication. ISBN 978-92-79-08008-1 © European Communities, 2008 Reproduction is authorised provided the source is acknowledged. Printed in Belgium PRINTED ON CHLORE FREE PAPER The Future of the Internet A Compendium of European Projects on ICT Research Supported by the EU 7th Framework Programme for RTD European Commission I nform ati on S oc i et y and M ed ia ••• 2 Preface 5 priorities identified by the Internet Governance Forum: openness, security, access, diversity and critical Internet resources. The use of the Internet in public policies will considerably grow in areas such as education, culture, health and e-government...
Words: 66329 - Pages: 266