Free Essay

Smart Phones

In:

Submitted By ocasper82
Words 2658
Pages 11
In today’s world, smart phones play an important role for many people and businesses. People use smart phones because it allows them to do many tasks on the go, checking e-mail, viewing bank statements and balances even social networking. For many it has also become a status symbol. To own the latest iPhone or Android is no longer about just function, many of the phones features are never even understood or used. It is about the bragging rights. To stand amongst your friends and family and hold up the shiny new phone and feel superior. The real question though, is are these new phones really better for us, or are they making us better targets for identity theft, privacy invasion and hacking attempts.

There have been several changes to phone technology since the cell phone was invented in the 1970’s and used the analog system of sending information. The analog system was unencrypted and could be intercepted by anyone with common electronic devices available at Radio Shack. Next was iDen (Integrated Digital Enhanced Network), which used digital waves instead of analog. It has evolved into what we know now as Nextel’s Push-to-Talk feature. More secure than analog, but still easy to intercept and decode. TDMA (Time Division Media Access) was implemented by AT&T in the 1990’s. It featured a voice security that enabled encryption on your phone based on your voice. However if you enabled it, your phone would not work because AT&T never installed the software on their servers.

GMS (Global System Mobile, recently renamed Global System for Mobile Communications) is the current leading system used in the world today. It uses a smart chip or SIM card that stores your data and information and can be transferred between phones. This system uses a digital encryption between your phone and the base tower, and then sends the information over the providers network, re-encrypts it at the tower and decrypts it at the receiving phone. While this seems secure, anyone on the providers network has complete access to your information, conversations and data. The government, any organization with access to the providers switching stations or even a suitably motivated hacker can access your information as well.

Lastly CDMA (Code Division Multiple Access) is used by several US based phone companies. This system uses encryption locked by a set of electronic ‘keys.’ In theory this would be a very secure system as only the holders of these ‘keys’ would be able to access the information stored and transmitted by your phone. However the keys are not kept secret. While not public domain, any hacker willing to spend a few hours can easily obtain many codes.

This certainly makes you want to go out and buy a phone doesn’t it? In modern society phones are no longer phones. They have become miniature computers in the hands of every Tom, Dick and Harry of the planet. You do not expect everyone with a car to be a mechanic. You do not expect everyone with a toilet to be a plumber. You certainly do not expect parents to be able to provide all the medical treatment their child will ever need. Yet phone companies do expect you to be the systems administrator for your own private network, or your cell phone. Fortunately there are very simple steps that can reduce your cell phones footprint on the digital world.

SIM Cards are used by AT&T and T-Mobile in the United States. SIM stand for Subscriber Identity Module and is a small plastic chip with your stored phone number personal information, text messages and other data. What makes these cards useful is you can take it out of one phone and insert it in another. The new phone will then use the data from the chip to send and receive calls. While this feature sound great, the problem is that all of you information sits on that card. The longer the card is used, the larger footprint it leaves on the digital world. Picture the SIM Card as a receipt from your local store. You use it for a year and the receipt is six inches long with 24 items of your personal information and data on it. Use it for two years and it is a foot long and has over 48 items of your personal information and data on it. Now imagine someone that has used the same SIM Card from their original Android or iPhone and still has it for the latest model. Every bank account, text message and social networking site is recorded. All of your passwords, routing numbers, addresses and contacts are stored. Remember when you or your significant other was feeling frisky and took that provocative photo and sent it to you, well it is on that card to! Now when I say it is on the card, all of the data is not actually on the card. The card has a unique number assigned to it and can be used to pull up all of your information. The data is stored on an encrypted network that is easiest to access with your card. It can be hacked, but retrieving the data is significantly harder that way.

There is a very simple fix for this. You can buy your big fancy phone from what ever provider you want. However when they break out the SIM Card to install it stop them. You can buy pre-paid SIM Cards with limited minutes and data on them, just like a phone card. Just like a phone card it is possible to reload them. These cards still store the data like the one your carrier would have provided, however it is not tied to your name or personal information. Your carrier will probably not enjoy you using a pre-paid SIM, and you will have to pay full price for the phone since you are not going to be using their services, but when you use up all of the minutes and data on the SIM card, you dispose of it and install a new one. The trick is to use the card up with in two months of installing it. On average it takes 3 to 5 months for a SIM card to be fully integrated into the system and make its information accessible to would be thieves and hackers. The easiest way to get a hold of this data is with the physical SIM card and the appropriate hardware and software. So this leads to the proper method of disposal.

Think of the SIM card as a hard disk drive for a computer and take the same steps you would for the HDD as you do for the SIM card. Start with immersion in water for an hour. The SIM is smaller and less water tight than the HDD so this will be long enough. Next place it between two electro magnets. You may be thinking, where does the average Joe get electro magnets? Any speaker in your home or car that runs on electricity is essentially an electro magnet. Remove the casing, play your favorite music while the card is between two speakers back to back. Failing that if you work at a store that uses security devices to deter shoplifting, the device at the cash register is an electro magnet. Tape the card to the underside for your shift and retrieve it afterwards. You will then want to physically damage the SIM card. Break it in half, crack the yellow/gold part, scratch it any method that physically disfigures it will work. Your wondering why not just break it in half and forget the other steps? Because you can place the pieces back side by side and read all the information around the break and still retrieve a majority of the data. The final step before putting the SIM card in the garbage is to place it in alcohol, gasoline or a similar product. This removes anything that may be left on the surface, from data to a protective coating on the SIM. It also removes fingerprints if you are that worried. You can now place the SIM card in the trash and not worry about your data being retrieved.

So you now have a nice pile of pre-paid SIM cards in a drawer and successfully gotten rid of your old carriers SIM card properly. All of a sudden OMG LOL , there is a new phone out, JUST RELEASED!!! You absolutely must have this phone, if not you will be the laughing stock of the entire world. So you shell out the six hundred dollars on the new phone, which most of the features will be unavailable because your SIM is not registered to some big name company, so the app store will not work. But you have your social status symbol and that is all that matters in today’s society any ways right? Since you use a SIM card, it is safe to just toss the old phone away because nothing was stored on it. Wrong. Many phones come with both an internal storage and a removable storage. The removable storage usually comes as an SD micro card, easily removed from either the side of the phone, or under/beside the battery. But what to do with the internal storage? A simple factory reset will not delete everything. There have been several studies where an organization will buy old cell phones off E-bay, Amazon or from local stores. All of the phones were said to be free of all information. The organizations which purchased the phones were able to get data from ALL of the phones. This ranged from the old owners name and address to text messages and songs to bank card numbers and passwords.

The simplest way to ensure that no one can get your information off of your old phone is to destroy the phone. Run it over repeatedly. Smash it with a hammer until nothing is left bigger than a penny. Burn it in a bonfire. You can get very creative with this, but you have to ensure that it is completely and thoroughly destroyed. Some phones use more than one internal storage unit. Some will store information on the memory. If you do not feel like venting your frustrations on your old phone, you can also call the manufacture or the service provider who sold it to you. They can walk you through step by step methods that are supposedly able to remove all data from the offending phone. You can try this, but the only sure fire way to ensure the data is gone is by destruction.

Say you can not live with out access to the app store because the latest game of throwing rabid skunks at buildings had to be downloaded, or you want to butcher zombies with a Muppet wielding a flyswatter. This means going back to the big name SIM card from a national carrier, or switching to a provider which doesn’t use SIM cards. Earlier I mentioned a brief history of the different types of systems developed for cellular security. GMS (SIM card phone) and CDMA (non SIM card phones) are the two most prevalent in the United States today. While you can use pre-paid SIM cards for the GMS system to feel a little more secure, there is no such option for the CDMA. Your phone is registered and imprinted with your data, unless you are using pre-paid SIM-less phones. You may be thinking that you are screwed and there is noting you can do about it. The truth of the matter is that it is easier for the data to be intercepted (by the government, thieves or hackers) with a wire tap at a tower or server that to decrypt it in its digital form.

No matter what phone or carrier you end up using there are some safety precautions you can take that are universal. When downloading applications from a marketplace, look at the permissions it requires. If you are downloading a calculator, does it need access to your contact lists? Does a game need SMS and data usage? If it looks like it is asking for something that the app should not need, do not download it. Creating malware is easy for people with even minimal programming knowledge. You simply download a working app, modify the source code to include anything from spyware to a virus. Upload the app back to the market place and people will download it with out even verifying if it is the app they thought it was.

Speaking of spyware, it is possible for anyone to purchase spyware programs legally. Using it on the other hand can be anywhere from illegal to a gray area of the law. Many parents use applications to track their children, believe it or not this is spyware. It installs on the phone, monitors calls, data and even physical location. It is designed to not show up in the installed app list, nor will it appear on the list of apps running. There are dozens of stories of both men and women installing a tracker on their significant others phone, catching them in a lie or cheating, then either splitting with them if it was a casual relationship, or getting a divorce if they were married. The interesting part is if the software was installed with out consent, the person caught can easily win any divorce settlement for infringement of rights, infringement of privacy and several other laws. It is ironic that these same programs that can get phone users in trouble are being actively used by the government for ‘homeland defense.’

Everyone knows about spyware, malware and virus. There are many other things phone users do not even think of. Have you ever ordered something over the phone using your credit card numbers? Now have you ever done this on a bus, in a café or other public location. Giving this information verbally over the phone also gives it to everyone in earshot, and they did not do anything even remotely illegal to get it!

When using Wi-Fi, everything you send is sent through the network you are connected to. That network may or may not store any or all of the data sent and received during this time. Be wary when using public hotspots, it could be someone phishing for your information.

Your phone can start recording at any time, whether it is taking photos, capturing video or just the microphone. Anything from a glitch in the system to you bumping the buttons or touch screen can send unwanted information anywhere.

One of the scariest, and least likely things your phone is capable of is remote targeting. You have seen in the movies where someone points a device at something and calls in an airstrike or a missile? All that device is doing is giving off radio waves that are reflecting off the target, effectively ‘painting’ it. Your cell phone is constantly sending and receiving radio waves and those can be use for pin point accuracy.

So now that you know exactly what your phone is capable of is it worth it to own one? While the inherent risks are many and the opportunity to be exploited grows with ever advancing technology, simple steps and constant vigilance can make you less of a target. Simply know what you are using, verify the needs of applications, do not buy second hand phones, do not sell your old phone and if your phone has a locking code or pattern, use it. Your phone is not safe if you leave it wide open. Finally, if you are not planning on using the phone, don’t just turn it off, remove the battery. The best hacker and the nosiest government can’t access a device with out power to it.

Similar Documents

Premium Essay

Smart Phone

...have become a popular target among hackers and malware producers. It is a high-reward business because most people are unaware that their cellphone is just as vulnerable to cyber attacks as their desktop computer. Think about all of the things that you do on your cellphone, and then imagine a worst case scenario we can keep our cellphones, and our data, safe. ---->The most obvious threat to the security of our smartphones is simply for the device to falls into the wrong hands. As silly as this sound, most cases of smartphone data theft begins with a lost or stolen phone. The first line of defense is common sense. Don't put your phone down in a public place, and don't leave it where it is easily grabbed. In short, treat your phone as you would your wallet. In case your phone does get snatched by a passing evildoer, the next step is to make sure that you have a secure screen lock. For Blackberry, iOS and Windows phones use a secure password. Something that's easily remembered, but not easily guessed. If it includes personal information such as your name, birthday or address it is not safe. For Android users, make sure that your unlock pattern is relatively complex and crosses over itself. If not, somebody can deduce your pattern from the repeated smudge marks on your...

Words: 255 - Pages: 2

Premium Essay

Further of Smart Phones

...technology and built it into their most innovating product. Verizon now offers a Super Smartphone that can truly do it all. This new Super Smartphone is like no other phone, and has unimaginable technology. The Super Smartphone created by Verizon will change the way we live, work, and play. This amazing product will lead Verizon to new opportunities and growth. Verizon’s Super Smartphone In today’s world, everyone has a cell phone. We depend on our phones to do everyday things. We rely on our phone to communicate with others and we also use them for entertainment. Many communications companies can offer you a pretty good phone, but only Verizon can offer you the Super Smartphone that is capable of truly doing it all. Our phones have already replaced our clocks, cameras, weather channel, maps, mail, and even our banking. The Super Smartphone is built with everything that a regular smartphone has. For example, on a regular smart phone you can make a call, send a text, take a picture, make a video, check the weather, get directions, check your e-mail, surf the web, and anything else that is available on an app. Many people believe that a multitasking phone is a super smartphone, but there is a major difference in this new product. Verizon’s Super Smartphone, allows you to do more than that. With this new phone you can bring your small screen to life. With a click of a button, a...

Words: 1422 - Pages: 6

Premium Essay

Cell Phones vs Smart Phones

...Study of Mobile Phone Vendors in South East Asia Samana Subedi, Anand Karna Electronics and Communication Engineering, Department of Electrical and Electronics Engineering, nec Nepal Engineering College, nec Changunarayan VDC, Bhaktapur GPO Box 10210, Kathmandu, Nepal Ph: 5090744, 2071153 Fax : 977 -01-5090681 Email: Info@nec.edu.np www.nec.edu.np June 2013 Abstract Mobile phones (from the basic Dumb phones into a Featured phones to a High end Smart phones) are equipped with variety of electronics components and controls, (Hardware and Software assembled together along with different sensors) depending on the type of communication or cellular technologies to be used at. From the past we can see that the hardware level designing and manufacturing of such kind of mobile phone have been done at many countries. One of the biggest challenges in developing and designing such types of embedded system embedding its hardware and software portion for any vendors, is to keep the service oriented features in the phone targeting mass of people before the distribution of the product. The paper will review the facts behind the development of mobile phones, for any mobile phone vendors, from the basic dumb phone into a featured phones and finally into a high end smart phones. But the ultimate focus of this paper will remain in analyzing the basic designing of the mobile phones by any mobile phone vendors and be targeting at the areas that they have reached for commercialization...

Words: 277 - Pages: 2

Premium Essay

Smart Phones Use in Business

...Smart Phones Use In Business Smart phones are utilized in business and personal use. Smart phones are being used personally to keep in contact with families and friends and to assist in school work. The purpose of this report is to show how smart phones have advanced from a personal device to a device utilized by businesses to increase their efficiency and profitability. Today’s smart phones are powerful enough to deliver 95 percent of the functionality of typical information a worker needs during the course of a workday. The need to be tethered to a PC could become a thing of the past sooner than you think. The demand from customers and suppliers will push corporations toward adopting smart phone technology strategies. Today’s rapidly growing rate of technology is a main factor of the overall productivity rate of companies in the United States. These technologies range in many ways from computer systems to the smart phones carried by many executives and their employees every day. These mobile devices are being used to be able to stay on top of personal and business needs through e-mails, reports, appointments, and phone calls. One of the most known and commonly seen examples of this rapidly growing technology we all see every day is the smart phone. The smart phones are becoming a standard accessory that is carried everywhere by people of all ages. Smart phones are even being used more today than laptop computers. They are also being used more than office phones...

Words: 3172 - Pages: 13

Premium Essay

Effects of Smart Phones in the Society

...Introduction A smart phone is a highly developed cell phone which has more applications than the normal mobile phone. It is a personal device that connects to cellular data so as to provide online services. Smart phones have different capabilities in comparison to a normal cell phone. It can check e-mails, make phone calls, and browse the web in its basic form. Examples of smart phones’ operating systems today include, Android (Google), iPhone (Apple), Windows mobile (MS), Blackberry OS (RIM), and S60 (Symbian). These operating systems allow their customers to use different applications for their needs. Smartphone users have an access to the internet. This means that extremely many things can be done by a small device that is portable and one can carry it around everywhere. The users have internet on their pockets (Reed, 2010). The Smartphone is more than a phone and more than a computer. In America, today, 42% of phone users have Smart phones. Smartphone became a revolutionary innovation when Apple released its first generation of Iphone (Reed, 2010). This became a benchmark for Smartphone makers to adhere to in order to gain the market share in the Smartphone market. Today each company is trying to come up with the best smart phones so as to be able to compete with others. IPhone reinvented a Smartphone in 2007. Nowadays, most Smart phones support a number of applications that users can download. For example, Apple’s App Store on iTunes enables program users and developers...

Words: 1218 - Pages: 5

Premium Essay

Smart Phones and Its Effect or Importance

...My review was based on different smart phones and its effect or importance. I did my review on the iPhone and BlackBerry which are two major players in the smart phone market today. The BlackBerry was catered more to the business customers while the iPhone was catered more to the media seeking demographic. Articles that were reviewed by me were written by West & Mace, Groggin, and Middleton. Each article dealt with different smart phones and different effects it has on our lives. With the introduction of mobile devices such as smart phones, the work place is now taken home. According to Middleton “The BlackBerry does give its users a mechanism to exert control over the management of daily communication tasks, but by virtue of its always-on, always-connected nature, it is also reinforces cultures that expect people to be accessible outside normal business hours”.(Middleton 2007) Since the introduction of the device in 1999, the BlackBerry has made a name for itself as a mobile e-mail device for business. The study done by Middleton was to see if using the BlackBerry device in the context of work-life would lead to increase in work-life conflict, and would result in detrimental organization outcomes. The research method that was used was qualitative a qualitative interview with 13 Canadian BlackBerry users. The respondents were chosen through a network of business contacts. They come from different industries, level of job seniority, and their age ranges from mid-20 to...

Words: 1270 - Pages: 6

Premium Essay

Impact of Smart Phones on Social Lives

...and two-thirds of all young adults (66%) now own a smartphone.” According to the same data, more people now own smartphones than basic mobile phones, a majority of adult cell phone owners use their phones to go online, and 17 percent of cell phone owners use their phones as the primary device for their online browsing Teens are more likely than adults to be cell-mostly Internet users. According to the above report Teens and Technology 2013 from the Pew Research Center, a third (34 percent) of girls and 24 percent of boys in the age group 14–17 said they mostly use their cell phones to go online. This is a huge change from just five years ago. The iPhone, the first touchscreen smart phone, came out in the summer of 2007. At that time, feature phones such as the Motorola Razr and the BlackBerry were cutting-edge devices. Checking e-mails and taking blurry small photos were the most sophisticated functions of those feature phones. The capability for web browsing was more an idea than a reality. It also says that, when the iPhone came out with its full touchscreen, however, this instantly changed. Browsing the Web on a phone was not only possible but also manageable and no longer excruciatingly painful. The rapid growth of mobile information access is shown by the increase in worldwide iPhone sales, which went up from 24.61 million phones sold in 2007 to 135.8 million sold in 2012, an increase of more than 5.5 times. Wireless data traffic soared at the same time. Over the five-year...

Words: 675 - Pages: 3

Free Essay

Markting Based Smart Phone

...quantitative research among mobile users to assess attitudes to SMS marketing. Most respondents were concerned about junk messages and wanted to control incoming messages. Initial attitudes to advertising in text messages were negative, but many were prepared to accept advertising in exchange for discounts or promotional offers. INTRODUCTION The development of Internet based m-commerce has been disappointing: restricted sites, slow download, small screens, and the limited number of handsets, currently constrain commercial development. At the same time companies are beginning to recognize the potential of SMS (Short Message Service) text messages, as a low cost, high impact communication medium, that can be received by almost all mobile phone users. Several companies are adopting highly innovative m-commerce strategies using SMS text messaging. 15 billion SMS messages (Cyberatlas 2001a) were sent over GSM (Global System for Mobile Communications) wireless networks during December 2000. It is predicted that worldwide, within three years, there will be 100...

Words: 3717 - Pages: 15

Premium Essay

Smart Phone

...Why use a smart phone? Why use a smart phone ? Everybody has a cell phone and the majority of us have a smart phone. Smart phone plays an important role in our daily life. You can see whenever in the street or metro, millions of people use smart phone. Why smart phones so popular around the world? I will start my topic now, why use a smart phone? It is universally acknowledged that we can use a smart phone not only chat or text with others but also play games, read books, listen to the music, surf on the internet. Sometimes we can even say that smart phone is a small computer. Obviously, we use smart phone as an entertainment tool. Firstly, smart phone can be used as an audio player. It can provide you the music whenever you want , like everyday in the metro, music is necessary for me. Secondly, a smart phone sometimes can be instead of e-book. Although I think that E-book is popular nowadays, you don’t need to buy it if you have a smart phone. In addition, downloading books in phones instead of buying books in stores also means that you are an environmentally friendly person. Simultaneously, many games are free to access if you are tired from work or study. Finally, smart phones can be used in different ways so in my opinion, using a smart phone as an entertainment tool can make our life becomes simple and colorful.  Do smart phones have bad effects on our study? No way! I know that many people have an IPHONE as someone asked last week. For me as an example, I use IPHONE...

Words: 811 - Pages: 4

Free Essay

Smart Phone

...Dhaka Shishu Mela [pic] ASA University Bangladesh Report On Customer satisfaction on Shishu Mela Submitted To MD. Habibur Rahman Lecturer, Faculty of Business Administration ASA University Bangladesh Submitted By Muntasir Mamun Faysal Id: 091-12-0231. Batch & Section: MKT-7A BBA Department, ASAUB Submission Date: 29-07-2012 Letter of Transmittal July 29, 2012. To MD. Habibur Rahman Lecturer, Faculty of Business Administration ASA University Bangladesh Subject: Submission of the Report on customer satisfaction of Shishu Mela Dear Sir, This is a great pleasure for us to submit the report on “Customer satisfaction on Shishu Mela” which is partial requirement of my BBA program. While preparing this report, we tried our best to follow the instructions that you have given us. The entire report is based on our research/survey in Shishu Mela. We have furnished all the things what we have got to know about the Shishu Mela. We shall be highly encouraged if you are kind enough to receive this report. Sincerely yours Muntasir mamun Faysal Bachelor of Business Administration (BBA) ASA UNIVERSITY BANGLADESH Acknowledgement At first we present our due regards to the Almighty, who have provided us the brilliant opportunity to make and complete this report successfully. We would also like to give our hearties thanks to who helped us in their busy working schedule to gather lots of useful information...

Words: 1267 - Pages: 6

Premium Essay

Smart Phone Securities

...Smartphone Security Survey of U.S. consumers Sponsored by AVG Technologies Independently conducted by Ponemon Institute LLC Publication Date: March 2011 Ponemon Institute© Research Report Smartphone Security Survey of U.S. Consumers Ponemon Institute, March 2011 Part 1. Introduction Ponemon Institute is pleased to present the findings of the Smartphone Security Survey: A Study of U.S. Consumers sponsored by AVG Technologies. The goal of the research is to determine consumers’ perceptions about the potential privacy and security risks when using their smartphones. In addition, we wanted to learn if participants in our study care about these risks and if they take security precautions. We surveyed 734 consumers who are 18 years and older and own a smartphone. The risks that we address in our survey concern location tracking, transmission of confidential payment without the user’s knowledge or consent, diallerware (specialized malware unique to smartphones), spyware, viruses from insecure WiFi networks and others. What we learned is that most of the consumers in our study are using their smartphones without understanding that they are exposing their sensitive information to the risks listed above. We also believe the findings of this study signal a potential security risk for organizations because so many consumers surveyed use their smartphones for both business and personal use. With business confidential information stored on these smartphones, organizations should...

Words: 7043 - Pages: 29

Free Essay

Smart Phone Advertising

...The music was pumping and the finger food laid out in abundance one recent evening in a subterranean Manhattan bar, as executives of Pandora Media, the Internet radio service, mingled with some of their most prized new advertisers. Most of the clients, however, were not representing big corporate accounts or multimillion-dollar national campaigns, but rather local businesses whose budget might top off at $20,000 a month. Yet they are the focus of one of Pandora's most important new corporate strategies as it competes with terrestrial broadcasters for a chunk of radio's $17 billion ad market. Pandora's pitch to advertisers is that its technology can cater to consumers with far greater precision than radio -- it can pinpoint listeners by age and sex, ZIP code or even musical taste -- and that as it grows, Pandora will effectively be the top station in many cities. ''A dollar spent on Pandora is better than a dollar spent on terrestrial radio,'' said Tim Westergren, the company's founder and chief strategy officer, nearly shouting at a corner table to be heard above the din of his party. Competing head-to-head with terrestrial radio's armies of local sales staff members will not be easy. But for Pandora, increasing ad revenue is essential. The service went online in 2005, streaming free music tailored to listeners' tastes, and its growth has been explosive. In the last two years, it has gone from 45 million to 125 million registered users, and its revenue has increased...

Words: 1219 - Pages: 5

Premium Essay

Marketing-the Smart Phone Market

...The global Smartphone market is dominated by two major companies, Apple and Samsung. Both globally and within the New Zealand context both companies are using many tactics and strategies such as clever marketing campaigns, market segmentation and product value to win customers and gain a competitive advantage in the market. After analysing both companies and their marketing strategies this essay will make suggestions as to probable strategys for how Apple and Samsung can improve their operations and in turn increase their sales. In general terms, market segmentation “involves dividing a market into smaller segments of buyers with distinct needs, characteristics or behaviours that might require separate marketing strategies or mixes.” (Kotler, Burton, Deans, Brown and Armstrong, 2013). For large companies like Apple and Samsung it is crucial that they know who their customers are and what they are looking for in a product. Markets can be segmented in many ways, for example geographic, demographic and behavioural, the main market segmentations used by both Apple and Samsung are demographic and behavioural. Demographic segmentation focuses on things like age, gender, and income, the latter being the most important for companies when deciding how to price their product. Behavioural segmentation includes benefits sought by customers, loyalty status of the company, and attitudes towards the product, this can be created by the company through advertising. Within the New Zealand...

Words: 910 - Pages: 4

Free Essay

Effects of Smart Phones in the Society

...WORKFORCE New international division of labor Main article: New international division of labour The global workforce, or international labor pool, reflects a new international division of labor that has been emerging since the late 1970s in the wake of other forces of globalization. The global economic factors driving the rise of multinational corporations—namely, cross-border movement of goods, services, technology and capital—are changing ways of thinking about labor and the structure of today's workforce. With roots in the social processes surrounding the shift to standardization and industrialization, post-industrial society in the Western world has been accompanied by industrialization in other parts of the world, particularly in Asia. As industrialization takes hold worldwide and more cultures move away from traditional practices in respect to work and labor, the ways in which employers think about and utilize labor are changing. Labor supply Main article: Labor force The global supply of labor almost doubled in absolute numbers between the 1980s and early 2000s, with half of that growth coming from Asia.[3] At the same time, the rate at which new workers entered the workforce in the Western world began to decline. The growing pool of global labor is accessed by employers in more advanced economies through various methods, including imports of goods, offshoring of production, and immigration.[4] Global labor arbitrage, the practice of accessing the lowest-cost workers from...

Words: 1483 - Pages: 6

Free Essay

A Study on Walton Smart Phone

...AMERICAN INTERNATIONAL UNIVERSITY-BANGLADESH Faculty of Business Administration Assignment Cover Sheet Assign./Case Title: | SWOT analysis of Estee Luder Companies,Inc | Assign./CaseNo: | Click here to enter text. | Date of Submission: | 27 May 2014 | Course Title: | Straregic management | Course Code: | Click here to enter text. | Section: | B | Semester: | Spring | 2013-14 | Degree Program: | MBA | Course Teacher: | Professor DR.M.Mahmodul Hasan | Declaration and Statement of Authorship: 1. I/we hold a copy of this Assignment/Case-Study, which can be produced if the original is lost/damaged. 2. This Assignment/Case-Study is my/our original work and no part of it has been copied from any other student’s work or from any other source except where due acknowledgement is made. 3. No part of this Assignment/Case-Study has been written for me/us by any other person except where such collaborationhas been authorized by the concerned teacher and is clearly acknowledged in the assignment. 4. I/we have not previously submitted or currently submitting this work for any other course/unit. 5. This work may be reproduced,communicated,compared and archived for the purpose of detecting plagiarism. 6. I/we givepermissionforacopyofmy/ourmarkedworktoberetainedbythe Faculty forreviewand comparison,including review by external examiners. 7. I/we understand thatPlagiarism is the presentation of the work, idea or creation of another person as though it is your...

Words: 307 - Pages: 2