Question:
Discuss about the Research Ethics on Smartphone hacking simulation in real Workplace Environment.
The study deals with the research topic on Smartphone hacking simulation or testing in real workplace environment (Vaioleti 2016). Smartphone growth as well as adaptation is increasing at rapid pace because of rich and versatile functionality. In addition, the versatility as well as convenience of these devices is used n similar devices such as Personal Digital Assistants or Mobile Internet Devices. In recent times, smartphones is not used only for talking rather it give other functions like that of Pager, GPS, MID and MP3 as well as provides range of services such as reading e-books, entertainment, electronic banking (Taylor, Bogdan and DeVault 2015). The current segment explains the research topic and describes the pros and cons of research at the same time.
Mobile operating system has already been use starting from the creation of first mobile phone but those of operating systems for targeting specific devices. In addition, most of the new devices used come with improved operating systems but need improvements from the view of an ordinary user. In an ideal world, it is known that every mobile developer desire to build an applications by testing its performance on a simulator that completely imitate the way as software behave on a mobile device (Taylor, Bogdan and DeVault 2015).
When the mobile developer work in the in-browser Platform, it is needed to click on “run” for viewing on the applications on an iPhone, tablets, android devices and windows phone (Kunde, McMeniman and Parker 2013). Within the simulator, it is important to look at different types for each mobile operating system. The mobile developer can get a sensible thought on the manifestation as well as performance of applications by switching between the types of devices. There are various types of devices that is similar to in-browser experience that are available for testing and cannot be accessed to the fancy device specific chrome. Some advantage of ethical hacking is to help in discovery of crimes through use of internet. Ethical hacking provides safety to banking as well as monetary establishments (Taylor, Bogdan and DeVault 2015). In addition, this hacking helps to detect as well as prevent cyber terrorism. In actual, everything depends upon the dependability of the ethical hacker. Hacktivism means hacking for a reason that comprises of hackers with a communal or supporting agenda. These hackers sends message through their hacking action as well as gaining visibility for their reason at the same time (Smith et al. 2015).
Research has now become one of the most opted method by any business at the time of selecting ways for carrying out the alteration in the plans or the products so that there is modify that reflects on the development as well as enhancement of the business enterprise (Smith 2015). In the recent times, researcher conducts online research based on internet sources. Some of the pros and cons of research is as follows:
Pros
Cons
Ethical issues
At the time of conducting the research, the researcher needs to conduct the research in an ethical way (Kunde, McMeniman and Parker 2013). The researcher should be maintaining confidentiality of information where they cannot leak any of the information to the third-party. The researcher should be collecting valid and reliable data without any kind of manipulation. In the present study, researcher will be using secondary data from potential sources such as peer-reviewed journal articles, academic books and authentic websites. The researcher should be extracting data from updated as well as reliable sources that links with the research topic (Taylor, Bogdan and DeVault 2015).
Integrity
Research integrity means active adherence to the ethical principles as well as professional standards that is essential for the responsible practice of research. Researcher should adopt principles and practices as personal credentials. The researcher should be honest, trustworthy at the time of collecting data for the particular research study. Integrity is one of the aspects of moral character as well as experience. In addition, it is all about commitment to intellectual honesty as well as personal responsibility for ones actions and range of practices that features responsible research conduct.
Safety issues
At the time of conducting research study, the researcher need to consider the ethical as well as safety implications of different aspects of research.
Risks
Researcher faced risks at the time of conducting research that need to be corrected in the near future. The researcher had limited financial resources that restrict them to use of expensive tools and techniques for the present research study.
Different types of ethics issues and risks
Response plan to the issues and risks
The Ethical Hacking procedure needs to be planned in advance. In addition, all technological, organization as well as planned issues needs to be taken into account. Furthermore, planning is essential for any amount of testing starting from a simple password for penetration test on a web application. It is important to keep backup for any data where the testing may be called off unexpectedly (Glesne 2015). A well-developed plan takes into account some of the information that is listed below:
The overall hacking methodology takes into account different steps that include:
Conclusion
From the above study, it is noted that that the research topic on Smartphone hacking simulation/testing in real workplace environment is properly explained in the study. The analysis properly explains the background study of how Smartphone hacking simulation is performed in a real workplace environment. In the study, advantages as well as disadvantages of research are explained in accordance to the research topic. Ethics that need to be taken into account by the researcher are properly explained in the research study. Researcher should be ethical at the time of conducting the research that aligns with the research topic Smartphone hacking simulation/testing in real workplace environment.
Reference List
Bort-Roig, J., Gilson, N.D., Puig-Ribera, A., Contreras, R.S. and Trost, S.G., 2014. Measuring and influencing physical activity with smartphone technology: a systematic review. Sports Medicine, 44(5), pp.671-686.
Case, M.A., Burwick, H.A., Volpp, K.G. and Patel, M.S., 2015. Accuracy of smartphone applications and wearable devices for tracking physical activity data. Jama, 313(6), pp.625-626.
Flick, U., 2015. Introducing research methodology: A beginner’s guide to doing a research project. Sage.
Gast, D.L. and Ledford, J.R. eds., 2014. Single case research methodology: Applications in special education and behavioral sciences. Routledge.
Glesne, C., 2015. Becoming qualitative researchers: An introduction. Pearson.
Kunde, L., McMeniman, E. and Parker, M., 2013. Clinical photography in dermatology: Ethical and medico?legal considerations in the age of digital and smartphone technology. Australasian Journal of Dermatology, 54(3), pp.192-197.
Mackey, A. and Gass, S.M., 2015. Second language research: Methodology and design. Routledge.
Page, T., 2013. Smartphone technology, consumer attachment and mass customisation. International Journal of Green Computing (IJGC), 4(2), pp.38-57.
Panneerselvam, R., 2014. Research methodology. PHI Learning Pvt. Ltd..
Silverman, D. ed., 2016. Qualitative research. Sage.
Smith, J.A. ed., 2015. Qualitative psychology: A practical guide to research methods. Sage.
Smith, W.W., Li, X.R., Pan, B., Witte, M. and Doherty, S.T., 2015. Tracking destination image across the trip experience with smartphone technology. Tourism management, 48, pp.113-122.
Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research methods: A guidebook and resource. John Wiley & Sons.
Vaioleti, T.M., 2016. Talanoa research methodology: A developing position on Pacific research. Waikato Journal of Education, 12(1).
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download