Behavior of Mobile Communication Devices Users’ Statisfaction Level

In: Computers and Technology

Submitted By Ellesar
Words 7139
Pages 29
BEHAVIOR OF MOBILE COMMUNICATION DEVICES USERS’ STATISFACTION LEVEL

A Research Developed in Fulfilling the Course Completion of Managerial Data Analysis

by Daniel Vincent Hadikrisno December 2011 .

STATEMENT BY THE AUTHOR

I hereby declare that this submission is my own work and, to the best of my knowledge, contains no material previously published or written by another person.

Jakarta, 18th of December 2011

( Daniel Vincent Hadikrisno )

ABSTRACTION

The main purpose of this research is to study the behavior of mobile communication device customers; what affects their decision in deciding to purchase and use a particular mobile communication device over the other. This is done by analyzing their statisfaction level towards their current mobile communication device based on factors that the writer have determined beforehand. The data are gathered using questionnaires that are distributed to young adults and adults who are currently using at least one of the three most popular mobile communication devices in Jakarta: Blackbery, iPhone, and Android. The data are then gathered and transformed into three different regression model, where test of significances can be taken towards them. The result is that the three mobile communication devices are each fulfilling a different specific need of the customers. These differences are actually their competitive advantage over their direct competitors. Therefore, should a new product would like to be released, make sure that it fulfills a specific custoemers’ need that have not been fulfilled by any existing product; or if its possible, consider to invent a new need for the customers.

TABLE OF CONTENTS
TABLE OF CONTENTS LIST OF TABLES CHAPTER I INTRODUCTION 1.1 1.2 1.3 1.4 1.5 OVERVIEW IDENTIFICATION OF PROBLEMS RESEARCH PURPOSE SIGNIFICANCE OF STUDY LIMITATIONS 4 5 6 6 6 7 7 7 8 8 9 9 11 11 11 12 13…...

Similar Documents

Communication Technology the Mobile Phone

... the Guards or the Ambulance Service where to find you. DISADVANTAGES Mobile Phones can also have disadvantages. Mobile Phones have made life impersonal; people spend so much time on their Mobile Phones that they have no time to personally connect with friends and family. Also people tend to send a happy birthday text or a happy Christmas text rather than sending someone a card anymore. People can find it very disrespectful and rude if they are trying to have a face to face conversation with someone and they are constantly texting on their phone. It makes the other person feel neglected and unimportant. Another disadvantage of the Mobile Phone is that parents are finding their children to be more distant and uninterested in spending quality time with the family as they are always texting or ringing their friends. Another disadvantage especially in teenagers and children is bullying through the Mobile Phone. Mobile Phones seem to have become the new weapon of choice for bullies. Many pay-as-you-go Mobile Phones can be bought over the counter and do not require proof of identity, nor is any record kept of the new owner. Another disadvantage of a Mobile Phone is certain incidents on safety. Drivers still seem to use be talking and texting while driving, and this has serious consequences to themselves and other road users. The driver is not fully concentrating on the road and is putting the lives of themselves and other drivers and pedestrians in...

Words: 1023 - Pages: 5

Network Access Control: User and Device Authentication

...IT@Intel Brief Intel Information Technology Computer Manufacturing Enterprise Security Network Access Control: User and Device Authentication August 2005 Intel IT is piloting new security methods to provide network access control by authenticating devices as well as users. Since networking has evolved to support both wired and wireless access, securing corporate networks from attack has become ever more essential. Therefore, to effectively enforce network access control policies in a proactive manner, we are developing a method to authenticate users and devices before they connect to the network. Network Access Control at Intel • Over 90,000 employees worldwide • 80 percent of knowledge workers are mobile and unwired • Over 50,000 remote access users Background As a global corporation, Intel IT supports more than 90,000 employees and contractors all over the world, and 80 percent of our knowledge workers are mobile and unwired. Network access depends more and more upon wireless LANs and WANs, as well as virtual private network (VPN) remote access. All of these technologies have the potential to open our network perimeter to threats. When we considered the threat of viruses and worms, it was evident that we needed additional controls to secure the enterprise network and its information assets from unauthorized devices and unauthorized people. Figure 1 shows how we could authenticate devices and users as part of the authentication pyramid. Figure 1...

Words: 1319 - Pages: 6

Assistive Communication Device

...Research proposal on Assistive Communication Device My research proposal is based on my own teaching experience of working with a special needs student “Nakita” who was born with downs syndrome. I have been this little girls TA since she was three years old, now she is in the second grade and is eight years old. This little girl is the apple of my eye, and while I am in school my world revolves around her. I am her momma when she is in school, and she is always making sure I am around her or she can see me even when she is on the playground. Over the past four years I have seen this little girl blossom with her communication skills however, she still has a hard time getting her friends and teachers or anyone else understand her wants and needs. When she first came to our school, she was nonverbal and knew a few words through sign other than that she would make grunts or point to what she wants. We have both learned through each other how to communicate to each other. She has taught me some sign language and I have taught her some in return. I have become her communication device and can communicate for her. The problem I see is that I will not always be with her, and she needs to be able to communicate on her or through the help of an assistive communication device. My research paper will be based on certain assistive communication devices for non-verbal downs syndrome students, just like my own student “Nakita”. Our school is a small public school that houses...

Words: 3295 - Pages: 14

User

...User DYING, DEATH AND GRIEF: CHAPLAIN PAUL G. DURBIN, PH.D.: TRIBUTE TO DR. ELIZABETH KUBLER-ROSS (2004): THEORIST ON GRIEF DIES AT 78: DR ELIZABETH KUBLER-ROSS DIES AT 78:  [New Orleans Times-Picayune: Aug 26, 2004: The Associated Press] ELISABETH KUBLER-ROSS DIES AT AGE 78 ON AUGUST 24, 2004: [From Elisabeth Kubler-Ross website: http://www.elisabethkublerross.com/ ]: (Taken from a seminar manuscript "Dying, Death and Grief"  By Chaplain Paul G. Durbin, Ph.D.) From the Book of Ecclesiastes, the 5th verse of the 9th chapter, we read, "For the living know that they shall die." Life is but a short journey from the cradle to the grave. For some death comes early in life, for others in the middle years and for some it comes with old age. Whatever period of life death occurs, it comes to all. Death is the great equalizer for it comes to the rich and poor, the loved and unloved, the happy and the sad, to the male and female, the good and the bad. In some cases death can be postponed or delayed, but eventually it comes to all. None of us are exempt as we realize that one day, we too must die. Dying, death and bereavement are fundamental and pervasive aspects of the human experience. We can only achieve fullness of living by understanding and appreciating these realities. The absence of such understanding and appreciation may result in unnecessary suffering, loss of dignity, alienation and diminished quality of living. Though education about dying, death and bereavement should be...

Words: 1192 - Pages: 5

Mobile Shopping Behavior

...SPSS Project: Mobile Shopping Econometrics Table of content 1 Introduction 1 2 Questionnaire: Mobile … 1 3 Descriptive and demographic data 1 4 Hypothesis 1 4.1 Hypothesis 1: 1 4.2 Hypothesis 2: 1 4.3 Hypothesis 3: 1 4.4 Hypothesis 4: 1 5 Conclusion 1 References 2 Appendix II 1 Introduction With more than 1.08 billion smartphone users in the world, the mobile world and especially the smartphone consumption is expanding at a rapid pace. For what do people use its mobile devices? Just for talking or even to make purchase decisions inside a physical store? What role does the people’s age play in this investigation? In order to understand the world of smartphone users, we applied some meaningful data from the Princeton Survey Research Associates International (PSRAI) about the device ownership and cell phone usage during purchase decisions and analyzed it with SPSS. Having observed and compared the data, we used statistical test of hypotheses to receive decision rules for such equitation. First of all we formulated some null hypotheses (Ho), which states that there is difference from the hypothesized value and the corresponding alternative hypotheses (H1) the opposite of the null hypotheses. Since we will never know for sure which of the two hypotheses is true, our decision will include errors: Type 1 Error and Type 2 Error. The lowest level of significance tells us the...

Words: 807 - Pages: 4

Individual Behavior and Communication

...RUNNING HEAD: INDIVIDUAL BEHAVIOR AND COMMUNICATION Individual Behavior and Communication University of Phoenix Individual Behavior and Communication Individual behavior can be explained by multiple factors such as environment and genetics. People spend a large amount of their time at the workplace. There are elements within the organization that can affect how an individual behaves and listed in this paper are 9 aspects and how each affects individual behavior within 5 selected organizations: Arrowhead Water, 7-Eleven, AT&T, Chevy Chase Bank and The Grand Harbor Resort and Waterpark. Demographic Differences Demographic differences of companies result from companies expanding their business from local or regional to global corporations. While companies like The Grand Harbor and Chevy Chase Bank provide services to diverse group of customers, they have not attempted to operate their business globally. Other companies such as AT&T, Arrowhead and 7-Eleven have opted to maintain offices in a global environment. These companies also serve a diverse group of customers in the United States as well as throughout the world. As a result, the companies are able to adapt to the culture, customs, and attitudes of their customers and provide services based on the needs of the customers. Diversity “Diversity can be defined as a characteristic of a group of people suggesting differences among those people on any relevant dimension” (Hitt, Miller...

Words: 2352 - Pages: 10

Mobile Device Attacks

...Mobile Device Attacks and Their Effect on Your Personal Privacy CIS 4680- Security Issues Paper (Group 6) Over the last decade, smartphones have become more and more popular as the new handheld PC. With its processing power catching up with the PC, it brings much convenience to people’s daily life from fast access to latest information to efficient financial activities. However, with this increase in use of these functions, more security threats have aroused surrounding smartphones. As the mobile operation systems in different devices become more, it is opens more possibility for fast virus propagation and large scale damage. There have been several attacks targeting smartphones and it is a trend that hackers are moving the battlefield from PCs to smartphones because of promising profit and smartphones’ limitations for antivirus work. Hackers are migrating to the new smartphone platform for many reasons. Not only is the profit from smartphone hacking increasing, but as more consumers link their personal accounts (email, social networking, financial, etc.) to their smartphones, the private information of the users opens a window of opportunity. Hackers can infect smartphones to record phone calls, send and delete data messages, and spy on your phone’s activity. It does not only pose great security threats, but also causes an economic loss to common users. This definitely becomes a major issue when businesses are also taking advantage of the portable PC power of...

Words: 3045 - Pages: 13

Mobile Device

...Mobile Devices Now days, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tied to printer cables and other peripheral device connection. This is very important in a doctor’s office because patients and doctors move from room to room depends on the type of test they are doing. Having mobile device makes it easier for them to do their jobs easier and it can even help cut wiring costs (Patricia & Donna, 2008). In the other hand there are many risks inherent in using wireless and mobile technologies. Wireless networks face the same threats as conventional wired network because intruders who gain access to information systems via wireless communication can bypass firewall protection and expose patient’s information and data. Besides lunching denial of service attacks, insert viruses or malicious code, disable operations, most importantly they can violate the privacy of patients and even steal their identities.  Risk of using wireless or mobile technology makes it easier to come up with a plan is place to try preventing further actions. This open connectivity brings with it risks, however, some of which are similar to those in...

Words: 671 - Pages: 3

Behavior and Communication

... programs in place to motivate this behavior ("Disney Careers", n.d.). Since the organization as a whole is centered on customer service and communication, the positive culture dictates that communication in any shape or form is acceptable and encouraged. All employees including management practice effective communication and create an environment where effective communication is the norm. The values of the Walt Disney organization are realized, taught, and practiced by everyone within the organization. This organization is a pillar for other organizations and its success serves as a foundation for other organizations ("Disney Careers", n.d.). They teach not only their employees, but other organizations the keys to success from their experiences. Walt Disney is a successful organization because of their culture, communication, and values. They believe in being the best, strive to be the best every day, and teach others to be the best. They encourage individuality while working towards a common goal; be the best in the business. References Disney Careers. (n.d.). Retrieved from http://disneycareers.com/en/working_here/culture Talking Point the Disney Institute Blog. (n.d.). Retrieved from http://disneyinstitute.com/blog/blog_posting.aspx...

Words: 417 - Pages: 2

M1 Business Communication Level 3

...M1 All the different techniques used by Urban Outfitters to communicate all have benefits and negatives. The techniques are; websites, newsletters and brochures. Websites are a good way to communicate because, one, it reaches a wide audience especially as Internet shopping is on the rise. It’s accessible to anyone, anywhere, anytime. It is the easiest form of communication to receive. Disadvantages are that they’re unreliable if information isn’t updated regularly. Websites may crash and become unavailable which wouldn’t happen with the other communication techniques. Having a bad publicity on a website is very bad as every customer can see it online and could ruin the brands reputation. The next strategy is Newsletters. Advantages of these are helping the brand to promote what they’re selling by getting newsletters out to customers. This is a quick easy and cheap process as well. Design the newsletter and send it to customers. This also benefits those who don’t have access to the Internet at home. Newsletters help the customers to understand the business and feel apart of it this means they are more likely to purchase. Newsletters can be creative and fun which is a very enticing attitude from the business and will encourage customers to buy into the brand. Newsletters are not only cheap but can also gain you money by placing advertisements inside them. Usually newsletters can only be sent if you give your email address to the company. This means only existing...

Words: 944 - Pages: 4

Case Study: Mobile Device Security and Other Threats

...Case Study: Mobile Device Security and Other Threats Strayer University Authors Note This paper was prepared for CIS 502 – Theories of Security Management Abstract Mobile communication and computing devices are integral part of today’s business. This provides the executives the opportunity to work from virtually anywhere anytime and became one of the most valuable tools to make business communications. However, due to the nature and size of the device and communication methods, the devices are prone to be lost or compromised and can fall into the hands of unauthorized persons, which makes these devices a very big security concern for the businesses. In this paper the nature of IT related threats faced in 2014 are discussed along with the security issues of mobile devices. a) Security threats presented within the “Security Threat Report 2014” report: The security report of Sophos (Security Threat Report 2014 Smarter, Shadier, Stealthier Malware. (n.d.). Retrieved August 19, 2014, from https://blackboard.strayer.edu/bbcswebdav/institution/CIS/502/1144/Week8/sophos-security-threat-report-2014.pdf) highlights the emerging security risks in the world. It the report, they have identified the following concerns for 2014: a. More efficient Botnets: The botnets become more resilient and stealth by the year 2014. Along with many known attributes, the sharing and copying botnet codes have resulted in emerging new botnets which are being used for various...

Words: 1993 - Pages: 8

Mobile Communication Application

... Mobile communication Application: Security Exploit For SQLite Database Pankaj Arora Raushan kumar Student (MCA), Student (MCA), Rukmini Devi Institute of Rukmini Devi Institute of Advanced Studies, Rohini, New Delhi. Advanced Studies, Rohini, New Delhi. Hidden.brain.key1@gmail.com kraushan6102@gmail.com ABSTRACT In the previous years a new area of messaging applications has come up. These applications allows users to make free calls, video calls and send text messages over the internet instead of traditional communication methods which includes SMS,MMS and voice calls. While there are millions of users which are using these services but a very little attention has been paid over the security measure. In this paper we analyses one of the most popular mobile messaging application (Hike,) and evaluate the security flaws in it. We find that application uses user’s phone number as a unique key for the verification of account. Finally, practical results show...

Words: 1288 - Pages: 6

Impacts of Mobile Communication Use

... to the market. g. 2007, the first ever iPhone was released in June making an immediate favorite among its users. 3. Social Impacts of the Technology - Sociology a. Mobile communication has taken the place of actual face time interaction b. Through the generations cell phones were developed as a means of communication while being away from home in the event of emergencies. Even when cell phones were more acceptably used for making more personal calls away from home the intended purpose was to make calls, check the time, and have a calendar. Cell phones have now been turned into smartphones allowing a person to call, text, tweet, take a selfie, update their status, check in on social media, and so on. c. Making phone calls or a trip to a friend’s house to see how they are doing is a thing of the past, we now look up Facebook on our phone and we’ll be sure to see a status update telling us all we need to know. d. Rosen explains, ”One sociologist has noted that parents who do this are implicitly commenting on their own sense of security or insecurity in society. “Claiming to care about their children’s safety,” Chantal de Gournay writes, “parents develop a ‘paranoiac’ vision of the community, reflecting a lack of trust in social institutions and in any environment other than the family.” As a result, they choose surveillance technologies, such as cell phones, to monitor their children, rather than teaching them (and trusting them) to behave......

Words: 551 - Pages: 3

Mobile Device Security and Other Threats

... could be prevented or treated using antitoxin. Through the discovery made by these men the reported tetanus cases in the US has decline at a drastic rate, from “several thousand cases in the late 1940’s to 27 cases and two deaths in 2005”. Several factors have contributed to the decline in tetanus morbidity and mortality, including the widespread use of tetanus toxoid during world war II–containing vaccines since the late 1940s Although cases in the US has decline, in developing countries around the world Tetanus cases are still at a high level (5). Most of these cases occur during child birth when the umbilical stump of a new mother becomes contaminated. Other times during delivery mother who did not possess sufficient circulatory antitoxin to secure the infant’s safe passage by transplacental transfer. To reduce the effect of the infant being in danger, it will require the execution of a three-branched strategy: vaccination of women of childbearing age, clean delivery, and application of topical antimicrobials (destroy the growth of microbes) to the umbilical stump (4). Disease When a person is first infected with tetanus the symptoms usually takes from two to six days to appear after the wound has been infected. Some common symptoms are chills, difficulty swallowing, headache, jaw and neck stiffness, sore throat, low fever, restlessness, irritability, and stiff arms and legs. At the early stages it may seem like a regular fever but as time goes by the fever increases...

Words: 1288 - Pages: 6

User

...ALDAR PARTNERSHIP PROGRAMME “Aldar Corporate” “Building the Nation” THE PARTNERSHIP PROGRAMME • • Aldar brings you the possibility to become an exclusive partner of “Aldar Corporate”. Partnering with Aldar provides an exceptional opportunity to strengthen and increase your company’s visibility and awareness as well as and reinforce its recognition among thousands of people. The Partnership of Aldar is part of Aldar’s strategic Partnership Programme, the first of its type in the UAE. This programme is beyond a traditional Partnership and takes branding to a deeper level of holistic sponsorship and business integration. It is a combination of business generation opportunities, innovative branding, communication and promotions. IMG is the exclusive marketing and sales agency of this programme. • • GENERAL INFORMATION Aldar’s Description The Emirate’s premier real estate development, management and investment company. Aldar’sVision Help develop Abu Dhabi into an international business market and tourist destination by establishing Abu Dhabi as the UAE’s most dynamic forward-thinking real estate market by creating unique and prestigious developments that can be used as a benchmark of quality, whilst adhering to the cultural and natural heritage of the city. Aldar’s Portfolio of Projects and Properties • Aldar owns over 50 million square metres of land in strategic locations through the Emirate • Diverse development portfolio of residential, office...

Words: 1805 - Pages: 8