Share
Explore BrainMass

Web 2.0 and Technology of the Future

1. What are the most common security risks associated with mobile banking?
2. How is targeted advertising done wirelessly?
3. How has Web 2.0 changed the behavior of Internet users? Why is Web 2.0 referred to as the Social Web?
4. Why do businesses find ROI metrics to be so compelling?
5. How might artificial intelligence play a role in the evolution of the future Web?

Solution Preview

Hi there,

Please find the enclosed helping material. Feel free to let me know if you need further assistance.

Class discussion questions
1. What are the most common security risks associated with mobile banking? 

2. How is targeted advertising done wirelessly? 

3. How has Web 2.0 changed the behavior of Internet users? Why is Web 2.0 referred to as the Social Web? 

4. Why do businesses find ROI metrics to be so compelling? 

5. How might artificial intelligence play a role in the evolution of the future Web?

Answer:

1. What are the most common security risks associated with mobile banking?
- The mobile threat landscape is continuously evolving, and institutions and consumers alike are wary of the risks. Below are some of the potential risks issues related to mobile banking [1]:
• Mobile Malware - Trojans, viruses and rootkits migrating from traditional online banking and designed specifically for the mobile marketplace. Researchers see an increase in mobile malware development - in pace with market growth.
• Third-Party Apps - Consumers love their smart phone and tablet applications, but often these apps come from third parties with questionable security practices. Or worse, the apps are created by fraudsters and loaded with malware.
• Unsecured Wi-Fi - The unsecured wireless network is a toll-free highway for fraudsters to gain access to mobile devices, either to seize control of or gain access to account information.
• User Behavior - Consumers are prone to download third-party apps, use unsecured wireless networks, open and click links in SMS text messages and e-mails, and lose their mobile devices. Mobile-use behavior is creating a suite of vulnerabilities, and fraudsters are eager to take advantage.

2. How is targeted advertising done wirelessly? 

- Wireless advertising needs wireless networks, mobile technology and infrastructure, systematic marketing and advertising solutions. Here, we discuss the existing approaches and technologies supporting wireless advertising [2].

Data Accessibility
There are two different data access methods - push and pull. They are different because they use different approaches to delivery data to the end users. Push data refers to a data access approach in which wireless data are delivered a user's mobile device without the user requests.

In push data approach, the wireless data is sent to mobile devices as a short burst of text. These short text messages, sometimes called alerts, are frequently generated and delivered based on a user's profile or current location.
Pull data refers to a data access approach in which wireless data are delivered to users upon their requests. A typical example of pull data is that a user accesses the wireless Internet, and receives wireless ads when the user browses a specific page with ads. „

Data Environment
Wireless advertising currently supports visual and audio data access. Visual data access is ...

Solution Summary

The most common security risks associated with mobile banking is given. The targeted advertising done wirelessly is given.

$2.19