Mobile Phones and Crime: The Protective Effect of Mobile Network Infrastructures

2019 ◽  
Vol 36 (4) ◽  
pp. 933-956
Author(s):  
Patrick Felka ◽  
Cristina Mihale-Wilson ◽  
Oliver Hinz
2020 ◽  
Vol 7 (6) ◽  
pp. 163-166
Author(s):  
Shriyash Mohril ◽  
Mahipal Singh Sankhla ◽  
Swaroop S Sonone ◽  
Kapil Parihar ◽  
Rajeev Kumar

These days mobile phones have become associated with elementary a part of our life, this is often one in every of the foremost necessary mediums for communication. Consequently, several portable towers are planted to hide additional areas, particularly in huddled cities and concrete areas. Now, the bottom stations made on these locations have transceivers that employ mistreatment frequency (RF) waves to determine communication among users within the mobile network. Because of the variety of base stations needed it will increase with bigger portable use with market competition, and with new technological capabilities. The microwave frequencies utilized in mobile communication cause thermal and non-thermal effects and leave a negative impact on the biological system. The quantity of RF-EMW radiation energy absorbed by human tissue depends on the frequency, intensity, polarization, and period of exposure. The EMR is recognized because of the major reason behind cancer. This review paper presents the potential biological and medicine health effects of high-intensity portable tower radiation.


The sensitive nature of mobile network forensics requires careful organization of the investigative processes and procedures to ensure legal compliance and adequate privacy protection. Investigations in mobile networking environments can be conducted for two main purposes: (1) to reconstruct criminal activities facilitated by a use of a mobile service and (2) to attribute malicious attacks targeting the normal operation of the mobile infrastructure. In both cases, investigators need to know the concepts introduced in the previous chapters to operationalize any mobile network related investigation. This chapter elaborates the legal framework, the general investigative principles, and evidence types characteristic for investigations in mobile network infrastructures.


2022 ◽  
pp. 51-68
Author(s):  
Vijay Prakash ◽  
Lalit Garg ◽  
Luke Camilleri ◽  
Joseph Curmi ◽  
Darren Camilleri

5G is a new universal wireless standard, a new form of mobile network engineered to bring everyone and everything virtually together. 5G is not only for mobile phones, but it is also the foundation for virtual reality (VR), the internet of things (IoT), and autonomous driving, connecting many electronic devices to the internet. Having good healthcare is very important as it affects all parts of human life and social well-being. Moreover, it is crucial to have a great healthcare system if we want economic growth, workforce productivity, and society to advance. Despite all the hard work done by scientists and medical professionals, today's healthcare is mainly inefficient, and a significant overhaul is required. This chapter discusses the primary advantages, including the 5G's main features in healthcare and their limitations and probable solutions and applications to the latest scenario.


Author(s):  
Dickinson C. Odikayor ◽  
Ikponmwosa Oghogho ◽  
Samuel T. Wara ◽  
Abayomi-Alli Adebayo

Dual-SIM mobile phones utilize technology that permits the use of two SIMs at a time. The technology permits simultaneous access to the mobile network services. Its disruptive nature is with reference to the mobile phone market in Nigeria and other parts of the world. Earlier market trend was inclination to “newer” and “better” phones, in favour of established single-SIM mobile phone manufacturers like Nokia and Samsung. Introduction of dual-SIM phones mainly manufactured by Chinese mobile phone manufacturing firms propelled user preference for phones acquisition which permits dual and simultaneous access to mobile network. This technology has compelled its adoption by established manufacturing names in order that they may remain competitive. It is a clear case of a disruptive technology, and this chapter focuses on it need, effects, and disruptive nature.


Curationis ◽  
2015 ◽  
Vol 38 (2) ◽  
Author(s):  
Jennifer Chipps ◽  
Christoph Pimmer ◽  
Petra Brysiewicz ◽  
Fiona Walters ◽  
Sebastian Linxen ◽  
...  

Background: Empirical studies show the value of mobile phones as effective educational tools to support learning in the nursing profession, predominantly in high income countries.Problem statement: The rapidly increasing prevalence of mobile phone technology in Africa nourishes hopes that these tools could be equally effective in lowly resourced contexts, specifically in efforts to achieve the health-related Millennium Development goals. The purpose of this study was to investigate the perception and use of mobile phones as educational and professional tools by nurses in lowly resourced settings.Methodology: A quantitative survey using self-administered questionnaires was conducted of rural advanced midwives.Results: Fifty-six nurses (49.6%) from the 113 rural-based midwives attending an advanced midwifery training programme at the University of KwaZulu-Natal, South Africa, filled in a questionnaire. The results showed that, whilst nurses regarded their technology competences as low and although they received very little official support from their educational and professional institutions, the majority frequently used mobile functions and applications to support their work and learning processes. They perceived mobile devices with their voice, text, and email functions as important tools for the educational and professional activities of searching for information and engaging with facilitators and peers from work and study contexts. To a lesser extent, the use of social networks, such as WhatsApp and Facebook, were also reported.Conclusion and recommendation: It is concluded that educational institutions should support the appropriate use of mobile phones more systematically; particularly in relation to the development of mobile network literacy skills.


2017 ◽  
Author(s):  
Haripriya Mukundarajan ◽  
Felix J H Hol ◽  
Erica A Castillo ◽  
Cooper Newby ◽  
Manu Prakash

AbstractThe direct monitoring of mosquito populations in field settings is a crucial input for shaping appropriate and timely control measures for mosquito-borne diseases. Here, we demonstrate that commercially available mobile phones are a powerful tool for acoustically mapping mosquito species distributions worldwide. We show that even low-cost mobile phones with very basic functionality are capable of sensitively acquiring acoustic data on species-specific mosquito wingbeat sounds, while simultaneously recording the time and location of the human-mosquito encounter. We survey a wide range of medically important mosquito species, to quantitatively demonstrate how acoustic recordings supported by spatio-temporal metadata enable rapid, non-invasive species identification. As proof-of-concept, we carry out field demonstrations where minimally-trained users map local mosquitoes using their personal phones. Thus, we establish a new paradigm for mosquito surveillance that takes advantage of the existing global mobile network infrastructure, to enable continuous and large-scale data acquisition in resource-constrained areas.


2012 ◽  
pp. 617-624
Author(s):  
Dickinson C. Odikayor ◽  
Ikponmwosa Oghogho ◽  
Samuel T. Wara ◽  
Abayomi-Alli Adebayo

Dual-SIM mobile phones utilize technology that permits the use of two SIMs at a time. The technology permits simultaneous access to the mobile network services. Its disruptive nature is with reference to the mobile phone market in Nigeria and other parts of the world. Earlier market trend was inclination to “newer” and “better” phones, in favour of established single-SIM mobile phone manufacturers like Nokia and Samsung. Introduction of dual-SIM phones mainly manufactured by Chinese mobile phone manufacturing firms propelled user preference for phones acquisition which permits dual and simultaneous access to mobile network. This technology has compelled its adoption by established manufacturing names in order that they may remain competitive. It is a clear case of a disruptive technology, and this chapter focuses on it need, effects, and disruptive nature.


Author(s):  
Aprillya Lanz ◽  
Daija Rogers ◽  
T. L. Alford

In March of 2018, about 500,000 desktop computers were infected with cryptocurrency mining malware in less than 24 hours. In addition to attacking desktop computers, malware also attacks laptops, tablets, mobile phones. That is, any device connected via the Internet, or a network is at risk of being attacked. In recent years, mobile phones have become extremely popular that places them as a big target of malware infections. In this study, the effectiveness of treatment for infected mobile devices is examined using compartmental modeling. Many studies have considered malware infections which also include treatment effectiveness. However, in this study we examine the treatment effectiveness of mobile devices based on the type of malware infections accrued (hostile or malicious malware). This model considers six classes of mobile devices based on their epidemiological status: susceptible, exposed, infected by hostile malware, infected by malicious malware, quarantined, and recovered. The malware reproduction number, RM, was identied to discover the threshold values for the dynamics of malware infections to become both prevalent or absent among mobile devices. Numerical simulations of the model give insights of various strategies that can be implemented to control malware epidemic in a mobile network.


Sign in / Sign up

Export Citation Format

Share Document