This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Government

influence of the government of shifting to modern technology usage

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

influence of the government of shifting to modern technology usage

In our current society, the use of modern technology has prompted the government to shift to digital ways of offering services to its citizens. The benefits ascertained from the use of the new technology surpasses the traditional method of granting government services to the nation. In emphasizing this, several other changes have been made in the government sector to strengthen the use of technology in offering services. For example, the connected government act is one of the amendments recently passed to validate this ambition. With the increased advancements in the use of the internet and its benefits, the government website is no longer seen as a tool of acquiring information but as one with several other benefits to a people’s nation.

Clear guidelines and stipulations on the creation of mobile websites of the government are listed in the connected government act. The acts require the apps enlisted for government websites are acceptable in the mobile phones’ screens, unlike in the past, where they were designed only to suit the computer screens, which limited the number of individuals benefiting from the website. The use of the smartphone by almost the entire generation in today’s society has made it easy for people from all walks of life to be able to access government information in mobile phones. As a result, the use of computers and laptops has been minimized from the usage of portable smartphone devices.

Don't use plagiarised sources.Get your custom essay just from $11/page

Several creative and innovative apps with additional benefits to society, have been developed through the influence of the government of shifting to modern technology usage. Relevant services achieved from the new generated apps has prompted improved relations between the government and its citizen. For instance, FDA field detectives easily locate data that helps them in identifying and analyzing threats associated with food supply in a particular location by addressing the matter using the FDC-Map application. Moreover, people recently diagnosed with aids can quickly locate areas for HIV care or, rather, those demanding to know their HIV status can know where to get their test done using the state app commonly referred to as an HIV care service care locator (Otto, 2014).

Thanks to google for easing inspection work. The see, tap, fix app is a google smart glass designer tool significantly used by the government to offer beneficial services. For any building desired to be used by the government for official purposes, it must be thoroughly inspected in terms of the efficiency of lighting, seats, and projectors by the scheduled inspectors before it is granted. The use of google glass inspectors has reduced the work done by inspectors by enabling them to use pictures taken from the building by scanning through a barcode and submit tickets or choose to include a speech that senses problems. The scanned information is notified in the Amazon-based cloud directly, unlike in the past, where inspectors needed to jot down notes regarding the building before entering the data into the ticketing system for approval. Google glass inspector’s usage can be achieved without jotting down notes, unlike the previous encounters by inspectors.

Individuals undergoing traumatic stress ailments in their life stages can now relieve and manage themselves by getting PTSD counseling without the help of a therapist by using the TSD coach, who is a government online service app that provides such critical services. The use of online services has prompted the agriculture department to develop the ASK Karen app, which helps in sensitizing issues regarding food poisoning and other matters of food safety affecting the nation. The TSD coach and ASK Karen app are among the many other apps evident in federal websites that enable the government to deliver protected services to its people in a more efficient way (Kerrigan, 2015).

From the future projection perspective, it is perceived that the number of smartphone users is likely to be higher, meaning that about 270 million users out of the estimated 330 million population in 2021 will have the capability of using mobile services. Therefore, the government should prepare to utilize its services to the estimated 80% population to enhance efficiency in service provision. Increase the usage of mobile phones by American citizens ensures that they get first-hand information and services from the government without many struggles. This will, in return, create a good rapport between the government and its people. Moreover, improving the efficiency of government applications ensures improved feedback from the people; thus, present challenges are mitigated in time while providing quality services to the nation.

Federal government requirements and recommendation for mobile security architecture

Customs of generating government apps with respect to the various sectors were introduced in 2011 by the federal government to the national government agencies to ensure better, and quality services were delivered to Americans. A report was published by the CIO council of the state to foster the development of the state’s mobile architecture.

One of the significant issues of concern between web application developers and users is security concerns. This is backed up by private and confidential information by users, which should be well taken care of for efficiency in rendering government services. The conceptual architecture of mobile security is uniquely created to enable the protection of users’ data such that information encrypted in mobile services is made private, easily accessible, and uphold honesty. The cellular architecture also combines features of initiatives from the state mobile safeties (Council, 2013).

in upholding the security of the mobile application, a step by secure step procedure is made in all stages. In achieving this, one individual should be identified to oversee that all recommendations and steps of developing mobile applications are adhered to (Vigliarolo, 2018). In case one person is involved in developing the app, then he should be entrusted to the security of the app.

The developer in charge of the security of the app should ensure that the information collected is well identified and reserved. Moreover, the developer should minimize the collection of unnecessary data by retaining only what is needed. Since platforms do not efficiently implement all features needed, it is necessary for developers to research and rely on various platforms to protect their data from malicious people (Council,2013).

Industry’s recommendations for security architectures and risk reduction

Unlike other digital devices, smartphones are more prone to abuse and misuse, evident from their flexibility and nature of communication networks. Today, mobile services are widely known by many for personal management, unlike in the past where client-server personnel controlled mobile circulation. As a result, the vulnerability of mobile phones and their apps has raised many concerns about security. People with malicious intentions, including hackers, can easily access information on mobile applications running on unprotected public wifi (Gallagher, 2013).

The increased developments of tools used for developing network applications have made it certain for developers to comprehend applications easier by combining it with web servers and utilizing Amazon services such as the recently launched backend system. In most cases, assimilating application developments with web servers often lead to information endangerment on a frequent basis from all kinds of attack as it is usually done without internalizing security trustworthy (Gallagher, 2013).

To improve on security matters, the application developers should switch to using the OWASP mobile security project. It entails all details of resources relevant to web developers and the security crew during the development and maintenance of a safe network application. To facilitate the development of a secure application, it is necessary to group the various likely risks and run developmental mitigation measures to enhance security matters.

OWASP helps app developer’s identity the top ten recent factors affecting the validity of mobile applications using features such as mobile top ten. As a result, matters of security identified can easily be dealt with by developers and the affected organizations by identifying the issues at hand and working on them immediately before they affect the whole system. The mobile security feature is also an important component of app securities development as it manually used validating apps and converse manufacturing for iOS and Android smartphones. It can be used by both developers and those conducting app testing. In improving the efficiency of developing applications, it is necessary for developers to utilize noble features such as the android CK scheme, seraphim droid, great tool project, mobile security verification standard, and checklist (Gallagher, 2013).

Best practice recommendations for building security into mobile applications

In ensuring safe mobile applications it is necessary to incorporate unsurpassed practices to ensure improved safety matters as well as act as future references. One of the best approaches in securing a secure mobile application is by introducing an application safety audit to oversee the threats likely to arise from the running of applications by developers (Gallagher, 2013). Blackfire and new relic are among the many instrumental apps used in ensuring appropriate logging, thus ensuring valid data stored can reach many people in urgency using Linux Syslog assistive keys.

Initiating current monitoring and safety of application security is an important step in ensuring early detection of possible risks and proposing mitigation measures at early phases. This helps in stopping dangerous losses resulting from information leakage (Mathew, 2017).use of security running platform enables early detection of risks in applications.

Data encryption should be part and parcel of app developers to ensure only users have all the information in one place. Encryption is necessary for controlling the number of people accessing data. Moreover, updating encrypted data reduces data breaches. According to Mathew (2017), it is the mandate of web developers to ensure that data is updated up to date to reduce and solve security matters.

Summary

According to Mathew (2017), increased malicious habits in the data sector can only be halted by regular updating of encrypted as it is prone to increased landscape changes. The government plays a huge role in ensuring that the security of data is respected despite the rapid developments in the mobile technology field.

Creating digital data is important for data acquisition and dissemination anywhere, anytime, globally. However, risks arising from breached data can be harmful to a government. It is for this case that the government should utilize its monetary values by providing the best services to prevent man from negatively manipulating the information at hand (Mathew, 2017). Implementing the safety of mobile applications is almost impossible to measure, evident from increased hacking techniques of androids and iPhones that deactivate security apps made by manufacturers.

Despite the limitations accrued from the security of applications, immense benefits are achieved from it. It is common for security matters to arise since the technology of mobile networks is facing improvements. Individuals benefiting from such applications should pay keen details on best conducts such as data collection and storage to ensure improved protection of their data, which in return benefits the general safety of mobile data applications (Sullivan, 2018). The government should strive to improve the delivery and security of its services to its citizens to improve its efficiency in delivering, especially in the future, since mobile applications users will be used by many.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask