Mobile technology is a technology that uses mobile phones, mobile computing and miscellaneous portable electronics devises systems and networks. It is more efficient in the platform where many transmitters have the capability of sending data in a single channel at the same time. The code division multiple access (CDMA), allows many users to utilize single frequencies because it always restricts the notable interference of the frequencies from two or more sources (Global Trend of Mobile Wireless Technology,” 2013). It involves mobility in consideration to the geographic division of the coverage of the communication area into the cells and possibly within the cells. This is so since a mobile phone operates like a bidirectional radio that allows simultaneous transmission and reception.
It is an efficient technology since mobile phones are fitted with internet connectivity and this makes it easy and possible for the users to transfer files, through the Bluetooth device and through the wireless connection (“4G Wireless Internet Communication Technology,” 2013). The internet connection also enables the user to download important information as well as files. This has even made it easy for one to locate different places on the globe through the aid of the Global Positioning System (GPS). As the leader of the security team, it is possible to configure the security details and connections in every phone of the members in the security assessment team.
Through the mobile technology, members of the security assessment team are able to search for the locations of the buildings that seem to be challenging and impossible to locate. This can be done by use of google maps that enable them to locate the places via their phones. Unlike the laptops, it is important to note that mobiles are portable and efficient in there usage. It is within the powers of the security leader to configure all the security details in the mobile phones, which are in harmony with the main server in the office to that of the team members. This will help effectively collaboration of the members, even though they may be in different buildings (Lerner, 2013). This will help to solve the problem of communication and collaboration problems within the security assessment team since their phone is fitted with internet services for linkages that enable them to access inspection reports. At any point that information is gathered, an immediate feedback is directly channeled to the main office.
In the modern workplace, mobile technology is indispensable. Even though mobile technology offers a wide range of benefits, it also comes along with considerable risks to business transactions. It is therefore prudent to consider its advantages and disadvantages within the security assessment team (Pulkkis, n.d). The benefits of using mobile technology in such operations include fact that it has a higher efficiency and productivity of staff. In the like manner, it also enhances the quality and flexibility of services that are provided to the customers, as it further facilitates increased ability to communicate in and out of the specified workplace. Moreover, it also improves the networking capabilities and this will upgrade the effective connectivity and collaboration between the members of the security assessment team.
In like manner, mobile technology experiences several disadvantages that should not be overlooked. It is expensive in the sense that costs since new technologies and there devises are costly to purchase and they require constant maintenance and upkeep, yet he requires a good capital base. It also comes along with distractions in the workplace in the sense that, as the range of technologies and devices rapidly increases their potential to disrupt the productivity and workflow in the business (“Global Trend of Mobile Wireless Technology,” 2013). It requires the additional training of the staff members since the technology keeps on changing daily and this requires one to incur the cost. Mobile technology also comes along with the challenge of increased information technology security needs because the portable devices are always vulnerable to security risks like theft, especially if they contain sensitive data.
It is important to note that with the aforementioned benefits of mobile technology, it is more efficient and easy to coordinate the operations and the collaboration within the members of the security assessment team. The question of trust may be the only challenge with this kind of technology. Some of the members of the security agency if not all, may collude amongst themselves to sabotage the operations of the team leader especially if they are not in good terms (MISSING-VALUE, n.d.). At some point, the network systems may be weak at the point when it is urgently needed to conduct operations. This may derail or delay the operational activities and make the customers lose trust in the company in question.
Computer wizards vast with the information technology may also interfere with the operational systems of the security agencies in case the information that is needed may affect their business activities (Pulkkis, n.d). These may also happen if they need to be a source for money from the security agency that is conducting the research. The internet connectivity in some regions may also be slow thus affecting the operating system thus forcing the security personnel to work outside the given period thereby lowering their competency with regard to reporting delivery.
In conclusion, it is indeed true to note that mobile technology is a good system of operation within business transactions due to its efficiency and productivity. It helps in connecting people of different localities within the globe and reduces the distances that are involved. This does not disqualify the fact that the disadvantages are so severe and may overrun the advantages if not properly planned if not well managed in the proper manner. The cost of management may be so demanding at the time when the company may be experiencing bankruptcy. The increased information technology, as well as the additional training of the staff, may be considered burdensome with regard to time.
4G Wireless Internet Communication Technology. (2013). Wireless Mobile Internet Security, 439-465. doi:10.1002/9781118512920.ch13
Global Trend of Mobile Wireless Technology. (2013). Wireless Mobile Internet Security, 63-80. doi:10.1002/9781118512920.ch3
Lerner, T. (2013). Mobile Technology and Security. Mobile Payment, 39-60. doi:10.1007/978-3-658-03251-7_4
MISSING-VALUE, M. (n.d.). Mobile Devices and Technology Security. Technology Security and National Power, 201-226. doi:10.4324/9781315130736-9
Pulkkis, G. (n.d.). Security of Symbian Based Mobile Devices. Advances in Enterprise Information Technology Security. doi:10.4018/9781599040905.ch003