country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Question:

Discuss about the Research Ethics on Smartphone hacking simulation in real Workplace Environment.
 
 

Answer:

Introduction

The study deals with the research topic on Smartphone hacking simulation or testing in real workplace environment (Vaioleti 2016). Smartphone growth as well as adaptation is increasing at rapid pace because of rich and versatile functionality. In addition, the versatility as well as convenience of these devices is used n similar devices such as Personal Digital Assistants or Mobile Internet Devices. In recent times, smartphones is not used only for talking rather it give other functions like that of Pager, GPS, MID and MP3 as well as provides range of services such as reading e-books, entertainment, electronic banking (Taylor, Bogdan and DeVault 2015). The current segment explains the research topic and describes the pros and cons of research at the same time.

Research Background

Mobile operating system has already been use starting from the creation of first mobile phone but those of operating systems for targeting specific devices. In addition, most of the new devices used come with improved operating systems but need improvements from the view of an ordinary user. In an ideal world, it is known that every mobile developer desire to build an applications by testing its performance on a simulator that completely imitate the way as software behave on a mobile device (Taylor, Bogdan and DeVault 2015).

 


When the mobile developer work in the in-browser Platform, it is needed to click on “run” for viewing on the applications on an iPhone, tablets, android devices and windows phone (Kunde, McMeniman and Parker 2013). Within the simulator, it is important to look at different types for each mobile operating system. The mobile developer can get a sensible thought on the manifestation as well as performance of applications by switching between the types of devices. There are various types of devices that is similar to in-browser experience that are available for testing and cannot be accessed to the fancy device specific chrome. Some advantage of ethical hacking is to help in discovery of crimes through use of internet. Ethical hacking provides safety to banking as well as monetary establishments (Taylor, Bogdan and DeVault 2015). In addition, this hacking helps to detect as well as prevent cyber terrorism. In actual, everything depends upon the dependability of the ethical hacker. Hacktivism means hacking for a reason that comprises of hackers with a communal or supporting agenda. These hackers sends message through their hacking action as well as gaining visibility for their reason at the same time (Smith et al. 2015).

Pros and Cons of research

Research has now become one of the most opted method by any business at the time of selecting ways for carrying out the alteration in the plans or the products so that there is modify that reflects on the development as well as enhancement of the business enterprise (Smith 2015). In the recent times, researcher conducts online research based on internet sources. Some of the pros and cons of research is as follows:

Pros

  • Access to large sample data- One of the advantage of research is admission to large sample data. The data that is obtainable on the internet based on large scale assessment where the research helps business as well as revenue of the business enterprise. It is known that research will help company for conducting survey as the data is readily available online that increases the trustworthiness of the data (Silverman 2016).
  • More diverse samples in research- It is noted that the sample obtainable online are far more varied than the one that are accessible in the offline. This data will help in achieving online research as well as implementing in the research in making decisions for improving the revenue and performance in a company (Taylor, Bogdan and DeVault 2015).
  • Reduced data entry errors with research- The data that is accessible online are already coded. Hence, no error is noticed at the time of data entry that saves time and reduces troubles (Panneerselvam 2014).
  • Cost saving research- The data is already accessible online and there is no need to think about the cost for conducting research. There is no cost incurred at all because in online research, data are generated on the internet and look for permission for using the data in case it is copyrighted (Taylor, Bogdan and DeVault 2015).

Cons

  • More than one participant for a study- One of the disadvantages of research is more than one contributor for a study. The data that is accessible online is vast as well as infinite as there are many people who study one study and there could be huge amount of data that are made accessible online (Page 2013).
  • Dropped out study topic- One of the limitations of research is dropping out study topics. The data that is available online may not be complete as it compels the matter that has dropped out the study that leaves the data unfinished. Accessing data becomes difficult that is been put off the record (Mackey and Gass 2015).
  • Increased dependency factor

Ethics Issues, integrity and safety issues and risks

Ethical issues

At the time of conducting the research, the researcher needs to conduct the research in an ethical way (Kunde, McMeniman and Parker 2013). The researcher should be maintaining confidentiality of information where they cannot leak any of the information to the third-party. The researcher should be collecting valid and reliable data without any kind of manipulation. In the present study, researcher will be using secondary data from potential sources such as peer-reviewed journal articles, academic books and authentic websites. The researcher should be extracting data from updated as well as reliable sources that links with the research topic (Taylor, Bogdan and DeVault 2015).

 

Integrity

Research integrity means active adherence to the ethical principles as well as professional standards that is essential for the responsible practice of research. Researcher should adopt principles and practices as personal credentials. The researcher should be honest, trustworthy at the time of collecting data for the particular research study. Integrity is one of the aspects of moral character as well as experience. In addition, it is all about commitment to intellectual honesty as well as personal responsibility for ones actions and range of practices that features responsible research conduct.

Safety issues

At the time of conducting research study, the researcher need to consider the ethical as well as safety implications of different aspects of research.

Risks

Researcher faced risks at the time of conducting research that need to be corrected in the near future. The researcher had limited financial resources that restrict them to use of expensive tools and techniques for the present research study.

 

Different types of ethics issues and risks

  • Casuist Research Problem- One of the type of issue in research is casuist research problem as it relates to the determination of right and wrong in questions of conduct or conscience after analyzing moral dilemmas by applying general rules as well as careful distinction of special cases.
  • Difference Research Problem- One of the types of issues in research is difference research problem that typically asks question on whether there is difference between two or more groups or treatments. By that, the type of problem statement are mainly used when the researcher need to compare or contrast two or more phenomenon. It is considered as common approach for defining a problem in the behavioral sciences.
  • Descriptive Research Problem- One of the types of issues in research is descriptive research problem that typically ask question after underlying the purpose for describing the significance of the situation, existence of a distinct activities.
  • Relational Research Problem- One of the types of issues in research is rational research problem where it suggests a relationship between two or more variables for investigating purpose. It is the underlying purpose that actually investigated the qualities or features that are connected in some or other ways.

Response plan to the issues and risks

The Ethical Hacking procedure needs to be planned in advance. In addition, all technological, organization as well as planned issues needs to be taken into account. Furthermore, planning is essential for any amount of testing starting from a simple password for penetration test on a web application. It is important to keep backup for any data where the testing may be called off unexpectedly (Glesne 2015). A well-developed plan takes into account some of the information that is listed below:

  • Specific systems need to be tested
  • Risk involvement
  • Preparation of schedule for carrying test and proposed timeline
  • Gathering and exploring knowledge of the systems at the time of testing
  • Discovery of vulnerability
  • Specific deliverables that takes into account security assessment reports as well as higher level account that outlines the general vulnerabilities to be addressed that goes along with oppose events. It is needed for implementing at the time of selecting systems for testing with the most crucial or vulnerable systems (Taylor, Bogdan and DeVault 2015).
 


The overall hacking methodology takes into account different steps that include:

  • Step 1- Reconnaissance- The first step of hacking methodology is reconnaissance that means preliminary survey for gaining information that is known as foot-printing. In addition, the role of hacker is to collect information about any corporation where the person is going to hack (Gast and Ledford 2014). In this particular phase, different tools are used such as network mapping as well as network and vulnerability scanning tools.
  • Step 2- Scanning- The second step of hacking methodology is scanning where the hacker tries to make a blueprint of the goal network. In addition, the blueprint takes into account IP address of the target network (Taylor, Bogdan and DeVault 2015).
  • Step 3- Enumeration- The third step of hacking methodology is enumeration that looks at the ability of the hacker for convincing some servers that can give information that is important to them for making an attack (Flick 2015).
  • Step 4- Gaining Access- The fourth step of hacking methodology is gaining access that is the actual hacking phase where the hacker gains access to the system. It is the hacker who actually uses the information that they collect in the pre-attacking phase (Kunde, McMeniman and Parker 2013).
  • Step 5- Maintaining Access- The fifth step of hacking methodology is maintaining access where the hacker is inside the system. In this phase, the hacker is in a position where they can upload some file as well as download some of them (Bort-Roig et al. 2014).
  • Step 6- Creating Tracks- The sixth step of hacking methodology is creating tracks where the hacker eliminates the physical evidence of his or her hacking the scheme (Case et al. 2015).

Conclusion

From the above study, it is noted that that the research topic on Smartphone hacking simulation/testing in real workplace environment is properly explained in the study. The analysis properly explains the background study of how Smartphone hacking simulation is performed in a real workplace environment. In the study, advantages as well as disadvantages of research are explained in accordance to the research topic. Ethics that need to be taken into account by the researcher are properly explained in the research study. Researcher should be ethical at the time of conducting the research that aligns with the research topic Smartphone hacking simulation/testing in real workplace environment.

 

Reference List

Bort-Roig, J., Gilson, N.D., Puig-Ribera, A., Contreras, R.S. and Trost, S.G., 2014. Measuring and influencing physical activity with smartphone technology: a systematic review. Sports Medicine, 44(5), pp.671-686.

Case, M.A., Burwick, H.A., Volpp, K.G. and Patel, M.S., 2015. Accuracy of smartphone applications and wearable devices for tracking physical activity data. Jama, 313(6), pp.625-626.

Flick, U., 2015. Introducing research methodology: A beginner's guide to doing a research project. Sage.

Gast, D.L. and Ledford, J.R. eds., 2014. Single case research methodology: Applications in special education and behavioral sciences. Routledge.

Glesne, C., 2015. Becoming qualitative researchers: An introduction. Pearson.

Kunde, L., McMeniman, E. and Parker, M., 2013. Clinical photography in dermatology: Ethical and medico?legal considerations in the age of digital and smartphone technology. Australasian Journal of Dermatology, 54(3), pp.192-197.

Mackey, A. and Gass, S.M., 2015. Second language research: Methodology and design. Routledge.

Page, T., 2013. Smartphone technology, consumer attachment and mass customisation. International Journal of Green Computing (IJGC), 4(2), pp.38-57.

Panneerselvam, R., 2014. Research methodology. PHI Learning Pvt. Ltd..

Silverman, D. ed., 2016. Qualitative research. Sage.

Smith, J.A. ed., 2015. Qualitative psychology: A practical guide to research methods. Sage.

Smith, W.W., Li, X.R., Pan, B., Witte, M. and Doherty, S.T., 2015. Tracking destination image across the trip experience with smartphone technology. Tourism management, 48, pp.113-122.

Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research methods: A guidebook and resource. John Wiley & Sons.

Vaioleti, T.M., 2016. Talanoa research methodology: A developing position on Pacific research. Waikato Journal of Education, 12(1).

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Smartphone Hacking Simulation. Retrieved from https://myassignmenthelp.com/free-samples/smartphone-hacking-simulation.

"Smartphone Hacking Simulation." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/smartphone-hacking-simulation.

My Assignment Help (2018) Smartphone Hacking Simulation [Online]. Available from: https://myassignmenthelp.com/free-samples/smartphone-hacking-simulation
[Accessed 30 May 2020].

My Assignment Help. 'Smartphone Hacking Simulation' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/smartphone-hacking-simulation> accessed 30 May 2020.

My Assignment Help. Smartphone Hacking Simulation [Internet]. My Assignment Help. 2018 [cited 30 May 2020]. Available from: https://myassignmenthelp.com/free-samples/smartphone-hacking-simulation.


At MyAssignmenthelp.com, we are committed to deliver quality assignment assistance in the fastest way possible. To make our service delivery fast, we have hired subject matter experts to work on different subject specific assignments. We have hired experts who owe in-depth knowledge in their respective subjects. As per their expertise, they provide geography assignment help, Physics assignment help, Strategic assignment help, history assignment help, art architecture assignment help and assistance with other subjects as well.

Latest Management Samples

MRKT20052 Marketing Management And Digital Communications 3

Download : 0 | Pages : 4

Answer: Background Information The beverage industry specializes in the production of drinks, in particular those beverages that are ready to drink (Chen, 2012). The making of beverages varies depending on beverages being produced. Nexba is an Australian-based company specializing in beverages (Beverages, n.d) The launch of the company took place in 2010 by Troy Douglas and Drew Bilbe The story of Nexba can be traced bac...

Read More arrow

MGT3203 Managing Across Borders

Download : 0 | Pages : 8
  • Course Code: MGT3203
  • University: Murdoch University
  • Country: Australia

Answers: 1: Critically evaluate two different journal articles  Globalization has rendered immense challenging situations among the business organizations in running their entire process of business successfully in various multinational countries. While expanding the business in different geographical boundaries the business organizations cannot be restricted within specific cultural border. Business experts have to implement cross ...

Read More arrow

ME5306 Racing Team Management For Communication Plan And Project Budget

Download : 0 | Pages : 16
  • Course Code: ME5306
  • University: Brunel University London
  • Country: United Kingdom

Answer: Project purpose  The purpose of the project is designing and manufacturing of a racecar for the organization named Renault. The project will describe the execution plan for constructing the racing car in the present racing sports market. The project will include the project scope, objective, constraints and assumptions. The report will identify the project milestones and deliverables based on which the project schedule will be deve...

Read More arrow

SH4003 Culture, Society And Ethics For Sociological Conceptual Framework

Download : 0 | Pages : 11
  • Course Code: SH4003
  • University: Southern New Hampshire University
  • Country: United States

Answer: Introduction  The term “Society”, in the sociological conceptual framework, in general refers to a group of people who interact with each other under a common cultural framework, with the cultural bond being on the basis of gender, race, religious beliefs or the personal and professional activities. However, over time, with the global scenario getting more inclusive and with phenomena like that of Globalization and te...

Read More arrow

K23041 Building Surveying

Download : 0 | Pages : 16
  • Course Code: K23041
  • University: De Montfort University
  • Country: United Kingdom

Answer: Introduction Building Assessment A building assessment has been defined as being a quantitative performance that can be put in usage as one attempts to evaluate prevailing constructions or fresh structure designs. The assessment usually cover features of a building such as site in terms of drainage, paving, Topography, retaining walls, curbing, and lighting, Windows and Walls generally termed as building envelope, Structural, Interio...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,323,991

Orders

4.9/5

Overall Rating

5,075

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2632 Order Completed

100% Response Time

Albert Ambrosio

MSc in Nursing

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2115 Order Completed

97% Response Time

Kimberley Chen

MPA in Accounting

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

248 Order Completed

100% Response Time

Lloyd Bernabe

MSc in Accounting

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

285 Order Completed

99% Response Time

Eugene Baranowski

MBA in Supply Chain

London, United Kingdom

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

it was good assessment which help in the getting good marks thanks to the team for your effort

flag

User Id: 276635 - 29 May 2020

Australia

student rating student rating student rating student rating student rating

Awesome work guys. love your efforts. keep going. more assignments on your way. thank you

flag

User Id: 351294 - 29 May 2020

Australia

student rating student rating student rating student rating student rating

Reliable service when you need that little help with your academics, very professional and knowledgable team.

flag

User Id: 326577 - 29 May 2020

Australia

student rating student rating student rating student rating student rating

I Loved it website.its so trustworthy and it’s customer service also so good. It helps me to get higher marks.

flag

User Id: 365685 - 29 May 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?