Verified Document

GPS Assessing Global Positioning Systems Thesis

While this presents enterprises with unequalled levels of potential productivity gains, it also presents security and privacy challenges as well. In the context of cyber foraging, the issues of ethicacy and opt-in meet head-on, as the use of servers to cache locations and define locational preferences and habits of consumers. For these privacy reasons and the untested nature of location-aware advertising services, it is anticipated that GPS-enabled networks such as these will require exceptional high levels of security so that no spoofing or authentication-based impersonation occurs (Soylemezoglu, Zawodniok, Cha, Hall, et al., 2006). Despite these limitations and concerns however the ability to tailor systems that take into account preferences defined through specific taxonomies and then integrate them with GOPS data presents unique opportunities to further capitalize on this technology. Assessing the Value of GPS and its Limitations

In conclusion, GPS has proven to be invaluable for a series of consumer commercial and government-based applications. While consumer-based uses have the greatest awareness due to advertising and marketing strategies aimed at educating the general public about its value, the greatest gains are occurring in the enterprise arena (Gaukler, zer, Hausman, 2008). This is because process efficiencies and gains have multiplicative effects throughout an organization, and serve as the basis for greater profitability over time.

Despite this value however there are several drawbacks of GPS. First is the issue of its accuracy and reliability. While ECC and CRC-based data checks are incorporated into its data communications protocol there are still error-ridden transmissions that can in the case of enterprise use, can cost millions of dollars in lost productivity. There is also the limitation of how quickly GPS data can be transmitted through the GNSS. There is a result often signal delay, atmospheric disturbance at Ionospheric transmission levels, and multipath signal corruption as well (GPS Management Application, 2009). The bottom line is that while GPS is delivering valuable locational and velocity-specific data that serves as the foundation for entirely new business models and potentially industries,...

(2009). GPS Success. Quality, 48(1), 44. Retrieved March 20, 2009, from ABI/INFORM Global database. (Document ID: 1641384741).
Scott Bradner. (2009, February). Google's Latitude: Not new, but worrisome. Network World, 26(7), 19. Retrieved March 20, 2009, from ABI/INFORM Global database. (Document ID: 1651334401).

Gary M. Gaukler, zalp zer, Warren H. Hausman. (2008). Order Progress Information: Improved Dynamic Emergency Ordering Policies. Production and Operations Management, 17(6), 599-613. Retrieved March 21, 2009, from ABI/INFORM Global database. (Document ID: 1597180901).

GPS Management Application. (2009, February). Transmission & Distribution World, Retrieved March 21, 2009, from Business Source Premier database.

Hoon Jung, Keumwoo Lee, Wookwan Chun. (2006). Integration of GIS, GPS, and optimization technologies for the effective control of parcel delivery service. Computers & Industrial Engineering, 51(1), 154. Retrieved March 21, 2009, from ABI/INFORM Global database. (Document ID: 1164913161).

Young-Bae Ko, Nitin H. Vaidya. (2000). Location-Aided Routing (LAR) in mobile ad hoc networks. Wireless Networks, 6(4), 307-321. Retrieved March 20, 2009, from ABI/INFORM Global database. (Document ID: 403870921).

Michael G. Malloy. (2003, September). Meridian IQ buys U.S. operations of Hong Kong 3PL GPS Logistics. Transport Topics,(3555), 46. Retrieved March 19, 2009, from ABI/INFORM Trade & Industry database. (Document ID: 437848211).

M. Satyanarayanan, 2000, Caching Trust Rather Than Content. M. Satyanarayanan. School of Computer Science, Carnegie Mellon University, Operating Systems Review. Volume 34, No. 4, October 2000

Soylemezoglu, MJ Zawodniok, K Cha, D Hall, et al. (2006). A testbed architecture for Auto-ID technologies. Assembly Automation, 26(2), 127-136. Retrieved March 20, 2008, from ABI/INFORM Global database. (Document ID: 1040959371).

Daoqin Tong, Carolyn J. Merry, Benjamin Coifman. (2009). New Perspectives on the Use of GPS and GIS to Support a Highway Performance…

Sources used in this document:
References

Michelle Bangert. (2009). GPS Success. Quality, 48(1), 44. Retrieved March 20, 2009, from ABI/INFORM Global database. (Document ID: 1641384741).

Scott Bradner. (2009, February). Google's Latitude: Not new, but worrisome. Network World, 26(7), 19. Retrieved March 20, 2009, from ABI/INFORM Global database. (Document ID: 1651334401).

Gary M. Gaukler, zalp zer, Warren H. Hausman. (2008). Order Progress Information: Improved Dynamic Emergency Ordering Policies. Production and Operations Management, 17(6), 599-613. Retrieved March 21, 2009, from ABI/INFORM Global database. (Document ID: 1597180901).

GPS Management Application. (2009, February). Transmission & Distribution World, Retrieved March 21, 2009, from Business Source Premier database.
Cite this Document:
Copy Bibliography Citation

Related Documents

Geographical Information Systems in Armed
Words: 3271 Length: 12 Document Type: Research Proposal

Knowing in advance the terrain, the vegetation, and the water sources prepares the mission teams with the knowledge to confront the elements associated with the geographical conditions of the site. Analysis provides information for determining in advance the best sites to set up base camps, where the terrain is less vulnerable to hostile advances. It demonstrates in advance how supplies will most efficiently and expeditiously be delivered to the

Forest Fire Management Systems and
Words: 17324 Length: 63 Document Type: Term Paper

It was then important to see the degree at which technology and training played a role in combating each fire. 1.2.4.Rationale of the Study What is that can be gained from this study? The reasoning behind such a study is born out of a need to provide better training for fire fighters so that fire management systems will improve and reduce the amount of loss due to the fire. By studying

Environmental Pollution and Safety
Words: 10866 Length: 40 Document Type: Capstone Project

pros outweigh the cons of airport navigational systems upgrades. Specifically, the study conducts analysis of the perceived costs and benefits of maintaining legacy versus next generation (Nextgen) aviation terminal navigation systems (NAVAIDS). The study tests the hypothesis that the cost-benefit ratio of upgrading NAVAIDs to Nextgen systems justifies the expense when compared to continuing to use existing legacy systems. The null hypothesis is that the cost-benefit ratio of upgrading

Cyber Security Vulnerabilities in Space Vehicles
Words: 4220 Length: 14 Document Type: Dissertation or Thesis complete

Cyber Security Vulnerabilities in Space Vehicles Cyber Security VulnerabilitiesAbstract 1Introduction 3Background 4Overview of Space systems 4The developing threat in Cyberspace 5Space Vehicles attack surface 6Cyber Security Vulnerabilities in Current Space Systems 6Advanced Persistent Threats 7Improperly secured ground facilities 11Space Segments Vulnerabilities 12Small Satellites Vulnerabilities 12Current Cyber Security Mitigation Techniques 13Conclusion 16AbstractThe advancement of innovations, views, and funding alters the outer milieu by making it more accessible to many individuals. The

22 Federal and State Law Enforcements Role to Enforce Computer-Based...
Words: 1162 Length: 3 Document Type: Term Paper

Law Enforcement and Computer-Based Crime Before beginning any discussion regarding the consequences of employee monitoring, it is crucial to first develop a working knowledge of precisely what this blanket term actually entails. Simply put, employee monitoring is deliberate surveillance by an employer which is used to track various behaviors, such as a worker's visitation rate to certain websites, as well as to transcribe and archive written correspondence in the form of

Geolocation Technology and Privacy Issues
Words: 3759 Length: 12 Document Type: Term Paper

Geolocation of the user based on the user's Internet protocol (IP) address. Location-based service companies that specialize in identity protection use this approach, and IP addresses, blocks of IP addresses and credit card billing addresses can all be used to develop a location profile. 2. Personal computer/web browser identification examines the hypertext transfer protocol (HTTP) browser header and other information from the user's computer or device, and compares them to

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now