User Acceptance Is No Longer a Major Barrier to Wide Use of Wireless Information Systems
In this Module, you are to prepare a 3-5 page paper on only ONE of the following two topics:
"User acceptance is no longer a major barrier to wide use of wireless information systems"
Assignment Expectations
Please note that you're being asked to take one or the other position. Like almost everything, the truth probably depends on lots of things and interactions among them; don't make this more complicated than it is. Just do your research, decide which side of the question better fits the evidence you've found, and write your report accordingly.
Your paper should follow this general outline:
- which statement you're going to support, and a brief paragraph summarizing your reasons.
- summary description of the major user acceptance issues in wireless information systems
- changes in usability of wireless technology over the last few years that are good or bad for the users
- major wireless usability and/or deployment issues that are currently unresolved
You should conclude your paper with somewhere in the vicinity of a page summarizing the involvement of each of the five "computing disciplines" in wireless information technology, and how they interact with each other
Don't forget your cover sheet and appropriate references to any materials that you consult in preparing your paper. See the writing guidance in the syllabus page.
Technology: User Acceptance Is No Longer a Major Barrier to Wide Use of Wireless Information Systems
Name
Institution
User Acceptance Is No Longer a Major Barrier to Wide Use of Wireless Information Systems
Technology is growing very first, and its use is becoming synonymous with very many people worldwide especially in the field of academia. Many people, therefore, are using technology to share ideas online and also to access other information that are online without necessarily getting user acceptance (Danda, Bista, and Yan, 2014). The wireless mode of communication is aiding this process because of a number of reasons. For instance, anybody within a close antenna range can access the information. The wireless devices are also communicating with one another through an infrastructure that is not centrally located. These are just but among the many reasons why user acceptance has ceased to be a major barrier to an extensive use of wireless information systems (Danda, Bista, and Yan, 2014).
Secure transmission for wireless devices and their networks is becoming a major concern as it is seen that one can easily access wireless information without the authorization of its owner. This is so due to the nature of signal broadcast (Danda, Bista, and Yan, 2014). This is because wireless information is likely to serve the targets for attack and as a means for such attacks to be carried out successfully. Even though there are attempts to create security keys in order to regulate the access of wireless information, there are still numerous complains of security failures, which is making the wireless information public without user acceptance. Such attempts include, the establishment of secure keys using conventional channels that are secure or public keys cryptosystems and distribution systems that are later developed to enhance security of wireless information (Unisys, 2010). Despite these attempts, there is still a worrying trend to the use of wireless information without the consent of the users. These worries are as a result of people hacking systems to access wireless information without the authority of their users (Danda, Bista, and Yan, 2014).
Wireless gadgets and devices communicate with each other without using one large infrastructure that is centrally placed. For instance, the application in mobile phone devices like Bluetooth, which share wireless information with gadgets and devices those are in close range with them (Eija, 2009). Owing to this fact, it is very likely that the security nature of such information can be compromised. An example where security can be compromised is where there is connection between two gadgets in sharing information and then another intruder gadget is with its Bluetooth on. There are high chances that the shared wireless information can be gotten by the intruder gadget. Another example is with mobile phone and their network providers (Rosenberg, 2009). There is always a tendency of wireless information like short texts messages to be delivered to the wrong people whom such information are not intended for. In this scenario, since the person sending the information, share same network with the wrong receiver, it may be easy for the message to fail to be delivered to the rightful owner whom it is intended to. This is another reas...