Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

o Explain the use of mobile applications in the industry. Do not tell me what mo

ID: 3671907 • Letter: O

Question

o Explain the use of mobile applications in the industry. Do not tell me what mobile
technology is but rather how it enhances or assists the defined industry. So this is
the use of mobile apps in the industry based on your topic and in the industry as a
whole.
o Include the following in your discussion.
o The effects, benefits, challenges, and other legal and ethical issues associated with
use of the information technology you identified;
o Next, identify and discuss three companies within the industry with successful
implementation/use of mobile applications. (how are they using the mobile apps
etc.)
o When discussing the companies include how the company has benefited,
challenges, legal and ethical issues with the technology that they have
implemented.
o Include external links to the three companies that you discuss in the paper. The
links should be embedded in the text of the report not just listed. This may include
a link to the organization or the technology that they are using.
o Add at least four graphics that enhance the content of the paper. The graphics
must be pertinent to the topic and must be integrated. Be sure to cite all images
that are not your own.
o Add a chart. The chart must be pertinent to the topic. This chart may be created
by you or something you found in your research. However, it must be cited properly
if it is not your original work. This means you cannot recreate a chart that you find
online!

Explanation / Answer

Use of moblie applications in industry

-> Smart Notifications
One of the most convenient factors of a mobile app is receiving smart notifications. These allow a worker to immediately know when something important has happened, and it doesn’t matter if they are sitting at their desk or are on the go. This causes recruiters to have faster response time (both responding to candidates and discussing the matter with their team), and can lead to a shorter, more effective recruitment process.
-> Easily Shareable with Team Members
It’s much easier for two people to discuss an issue while sitting next to each other in a quiet office than it is when they’re on opposite sides of the planet. But, whether they’re nine time zones apart or sitting in a noisy train car, they probably have a mobile phone within reach. An app designed for the situation allows them to see real time comments and adjustments made by their colleagues, whether or not they have the time do discuss the issue on the phone.
->Strong Searching and Data Parsing
It’s a common concern about whether or not an applicant tracking system (ATS) can read multiple file types, and we assure you that they can. So, it doesn’t matter how candidates submit their information, you’ll be able to quickly search through all documents for whatever terms you are looking for.
Now that it’s clear all file types can be read, the ATS allows for the resume, cover letter, and any other documents to all be mixed together. The mobile app gives the recruiter the opportunity to easily organize, search, and view them on their phone or tablet without additional apps.

As much as information technology is important to our lives, it is facing some serious ethical challenges, and it is up to the IT experts and users of information technology to be ready for these challenges. As more emerging information technologies pop up on the market, most of the IT experts and users do not know how to go about the challenges brought by these technologies. Information technology is facing one of its biggest challenges which are lack of privacy, security, copyright infringement and increased computer crimes. This has stimulated criminals to exploit users of IT basing on the lope holes left in these technologies. Since information technology speeds the access and flow of information, many businesses and organizations are at risk of losing this data because experienced criminals can easily tap that information for their personal use.
Also unfaithful employees can use information technology to archive their personal goals which might be harmful to an organization. IT is not bad by its self, but the way humans use the tools provided by information technology has brought some serious challenges. Below I have listed detailed topics on 5 Ethical Challenges of Information Technology
Security: With tools like the internet, hackers have found it very easy to hack into any computer or system as long as it is connected on internet. Hackers can easily use an IP (Internet Protocol) address to access a user’s computer and collect data for selfish reasons. Also the wide spread of internet cookies which collect information whenever we use the internet , has exposed IT users to high risks of fraud and conflicting interests. Many big companies use these cookies to determine which products or service they can advertise to us. When it comes to online banking, the transfer of money can easily be interrupted by a hacker and all the money will be transferred to their desired accounts , which affects both the bank and the customers who is using online banking technology.

Privacy Issues: As much as information technology has enabled us to share and find relevant information online,. It has also exploited our freedom of privacy. Their so many ways our privacy is exploited, (1) use of internet webcams, experienced computer users can turn on any webcam of any computer online and they will have access to your private life, many celebrities have been victims of these online stalkers. A good example is Dharun Ravia former Rutgers University student who was spying on his roommate through a webcam. Read more on this story here ……. (2) use of social networks, the main concept of these networks is to connect with new and old friends then share your life with them, however, the loop hole in this , is that when ever some one access your shared life data like photos , they can like it and send it their friends who are not your friends, which might expose you to users with wrong intentions to use your data, also some companies are known for spying on their employees via these social networks.

Copyright Infringement: Information technology has made it easy for users to access any information or artifact at any given time. With the increased development of music sharing networks and photo bookmarking sites, many original creators of these works are losing the credibility of their works, because users of IT can easily gain access and share that data with friends. Free music and file downloading sites are popping up on internet every day , lots of original work like music albums, books , are being downloaded for free. In this case one legitimate user will purchase the book , software, web template or music album, and they will submit it to a free download site where others will simply just download that data for free. It is good news for the users because it saves them money, but it harms the original creator of these works. The government has closed some of these sites like MEGAUPLOAD.COM , but many are popping up using funny URLs.

Increased pressure on IT experts. Since information technology systems have to run all the time, pressure is mounted on IT experts to ensure the accuracy and availability of these systems. Many big organizations which need to operate 24 hours will require a standby IT team to cater for any issues which might arise during the course of operation. This pressure results into stress and work overload which some times results into Imperfection.