Mayor (2011) commented on the essential fact that with the advancement of technology now days tracking system has reached to a social boom. This helps in observing or following a person or any object as per the location data displayed on the location tacking models. This is capable of depicting and tracking down the actual position with its latitude and longitudinal position.
1.1) Aims of the Research Work
The aim of the research work is to find out the effectiveness of the tracking system of mobiles in depicting the actual position of the mobile by Samsung. It also aims in reducing the crimes to certain extent. Moreover it also aims in understanding the operation of cell phone tracking by tracking the objects or the person.
1.2) Objectives of Research Work
- To understand the efficiency and effectiveness of mobile tracking system for locating ad positioning the mobile phones.
- To understand the importance of it in reduction of the crimes to the maximum extent.
H0: The usage of mobile tracking system helps in monitoring the activities of the person or phones.
H1: The usage of mobile tracking system does not help in monitoring the activities of the person or phones.
2) Literature Review
According to opinion and outlook of Bhatia and Hilal (2012) the mobile tracking system involves in bugging, tracking, interception as well as monitoring the mobile phones along with its users. It focuses towards the interception as well as recording the conversations as well as messages received and sent in and by the phone respectively. This helps in securing and tracing out several users of the cell phone those are doubted to be involved in crimes and terrorism. Moreover, it also helps in tracking the lost phones for monitoring as well as collection of data.
2.2) Advantages of Mobile Phone tracking Systems
Emergency Services: The GPS tracker in the phone helps in determining the GPS system of the phone extensively. This can easily trace the location of the device and hence can allocate the position of the phone in the nearby police stations or fire brigade centers if necessary (Rice and Pearce, 2015).
Tracking terrorists: Now day’s terrorism has taken a major concern in today’s world. Tracking is done in order to keep a track of the current location of the device as well as recording the conversations and messages when required.
Management of Business: At the time of making business issues, the higher officials can easily keep a track on the employees to see and monitor the amount of time they spend behind the mobile phones (Hoffner et al. 2015).
Privacy Concerns: At the time of dislocation of mobile phones or theft of it, the mobile phone tracker helps in maintaining the privacy as well as tacking down the lost phones. This helps the users to retrieve their lost phones to the maximum extent.
2.3) Mobiles Spying Software
Neumayer and Stald (2014) commented that this helps in allowing the remote observation as well as spying the activities occurring in the phones. The remote alerts received on the phone helps in capturing any kind of terrorism or criminal activities. Moreover it also helps in receiving the messages that captures the conversations to the maximum extent.
Mobile tracking service is one of the most demanded devices in today’s tech savvy world. This section discusses about the various advantages of the mobile tracking systems along with mobile spying software that helps in monitoring the activities of the mobile phones.
3) Research Methodology
3.1) Research Approach
Kim and Sohn (2015) commented that research approach is the principles along with the theories that helps in understanding the research work vividly. For this research work, the inductive research approach is considered that helps in connecting the theories along with the principles for the research work.
3.2) Research Design
As commented by Ho and Wu (2013) the research design is basically the blueprint and outline of the research work that helps in successfully achieve the research work. This research work takes into account the descriptive research work that helps in completion of the research work.
3.3) Research Philosophy
In order to accomplish the research work successfully the research philosophy that is used by the researcher is interpretative research design. This helps in diversification as well as in-depth understanding of the knowledge.
3.4) Data Collection Methods
Primary and secondary data collection methods are used.
3.5) Sample Size
10 developers of this software and 50 users are interviewed.
3.6) Research Ethics
Codes of conduct, rules and regulations need to be followed significantly.
Time barrier and monetary constraints are the major limitations.
Bhatia, S. and Hilal, S. (2012). Determination of Mobile Phone Tracking using various Softwares. International Journal of Computer Applications, 53(17), pp.17-24.
Ho, Z. and Wu, S. (2013). Cloud Computing and Mobile Audit Tracking-Using Intelligent Cell Phone as Controller. AMM, 418, pp.59-62.
Hoffner, C., Lee, S. and Park, S. (2015). "I miss my mobile phone!": Self-expansion via mobile phone and responses to phone loss. New Media & Society.
Kim, S. and Sohn, K. (2015). Graph-Based Spam Image Detection for Mobile Phone Spam Image Filtering. International Journal of Software Innovation, 3(4), pp.72-86.
Mayor, S. (2011). Mobile phone tracking could help target aid after disasters, study shows. BMJ, 343(sep05 2), pp.d5646-d5646.
Neumayer, C. and Stald, G. (2014). The mobile phone in street protest: Texting, tweeting, tracking, and tracing. Mobile Media & Communication, 2(2), pp.117-133.
Rice, R. and Pearce, K. (2015). Divide and diffuse: Comparing digital divide and diffusion of innovations perspectives on mobile phone adoption. Mobile Media & Communication.