Technical and Professional CommunicationTechnical
Technical and Professional CommunicationTechnical
Name
Institution
REPORT: POSITION & RECOMMENDATION PAPER 2
Table of Contents
Introduction...............................................................................................................................................3
Brief background.......................................................................................................................................4
Security threats and risks associated with 5G.....................................................................................6
Benefit of the 5G network to communication and ecommerce.............................................................7
Image...................................................................................................................................................7
Assertion of the thesis..........................................................................................................................8
Overview of sides....................................................................................................................................9
Security threats and risks associated with 5G.........................................................................................9
Image:................................................................................................................................................11
Conclusion................................................................................................................................................11
Recommendation.....................................................................................................................................12
Reference..................................................................................................................................................13
Appendix..................................................................................................................................................14
REPORT: POSITION & RECOMMENDATION PAPER 3
Introduction
holds a vital role in the development of mobile communication systems and E-commerce.
According to a report by Palandöken (2017), network technology will be based on the IEEE
standards way above the 4G standards and presents additional benefits compared to the 4G
network. Indeed, this advancement promises to increase the internet speeds, increase data per
user, and more broadband for users within a fixed region. The rapid development from 1G to 5G
technology presents significant counterproductive effects. For countries such as the United
States, 5G could potentially breach the military’s ability to perform intelligence, surveillance.
This poses a substantial threat to national security and U.S. military operations. Also, Chinese
companies are responsible for the construction of 5 G network. Experts warn that the 5G network
(Shoebridge, 2018). The implication of the network to national security attracts the attention of
the Federal government (Kaska, Beckvard, and Minárik, 2019). As a critical stakeholder,
governments are concern with the counterproductive effects of the implementation of the 5G
network. In this report, the focus is on how the benefits of 5G network technology potentially
Brief background
voice transmission. Over time, new technology allowed for the transmission of multimedia
messages and Internet connectivity. The late 1900s ushered the world to mobile communications,
which paved the way for the growth from 1 G to 5G (Botton and Lee-Makiyama, 2018). With 5
G, the previous challenges that limited communication capacity has been enhanced. Also, the
rate of data transmission will significantly increase, thus lowering the cost. Other potential
The rapid development of the wireless network has caught the United States unaware.
Though the government has a comprehensive development data management and control policy,
the 5G network has presented entirely new security concerns that were unforeseen in the already
existing policies. For instance, wireless communications technology poses challenges with the
electromagnetic spectrum. It follows that 5 G network will significantly increase the volume of
data exchanged daily. The amount of data exchanged in the 4G network is stored in the
electromagnetic spectrum. However, with this transition, there is an imminent threat of a rapid
increase in the amount of data exchanged. As it is currently, there are no policies that govern the
management of data in the electromagnetic spectrum. With an increase in data, the government
faces threats such as cybersecurity attacks and manipulation of the large quantities of unlimited
REPORT: POSITION & RECOMMENDATION PAPER 5
Data management is vital in the field of Technical and Professional communication. The
comparison of risks and benefits of the 5G network is integral in the management of operations
almost all modern companies. With the rapid growth towards globalization, companies have
identified the need to conduct business over the internet. Therefore, 5G internet is a handy tool in
enhancing the level of engagement on a global scale. It for this reason that key global business
players such as social media platforms, international e-commerce companies begin to question
the interplay between the impact of the 5G network on their data management operations and
business. Data management is a fundamental issue in global trade. For a multination business,
the obligation to safeguard the client’s data is embedded in the use of internet technology. With
the transition to 5G technology, companies are likely to rapidly receive large amounts of data
within a limited number of times (Oppitz and Tomsu, 2018). This poses a significant challenge
in how the data will be handled and safeguarded. For instance, Amazon is one of the leading e-
commerce. The company amasses a large amount of consumer data. This data includes persona
information. Therefore, it is sensitive data that must be stored and safeguarded adequately as per
the regulatory requirement for compliance with personal privacy. One of the main approaches
that such companies use to reduce the risk of breaching personal privacy requirements is by
minimizing the storage of personal data. This significantly reduces the chances of misusing the
data and also lowers the related compliance cost. Therefore, with 5G, more rapid and high
quantity data will demand that companies enhance their data management approaches through
increasing surveillance, staff, and infrastructure on more modern data management systems.
REPORT: POSITION & RECOMMENDATION PAPER 6
Cybersecurity is one of the security threats of 5G. 5G can allow for real-time location tracking
and surveillance. The University argues that the 5G network has stingrays that act aa cell towers
that spy on mobile users and increases their vulnerability to cyber-attacks. According to the
University, the network makes it possible for attackers to find temporary network identifiers of a
mobile phone. Consequently, attackers can use this information to establish the paging
occasions, which makes it possible for them to track a mobile user’s location. While such
vulnerability still exists in the 4G network, the research argues that 5G makes it easier because it
National security is one of the important emerging issues in the roll-out of the 5G.
Security scholarly research by the National Intelligence has established that there is a complex
link between the implementation of 5G network technology and the associated security risks.
The research argues that 5G supports various access networks such as 4G and Wi-Fi and is
therefore likely to inherit all the security challenges. Each access network has its unique
cybersecurity needs. 3G and 4G wireless networks have vulnerable network architecture. For
mobile devices, the government provides leisure for the spectrum as a measure that protects
individuals from eavesdropping on voice, data, and video communication. There is a myriad of
security risks that the network poses if the network s not segmented. However, there are still
A group of internet experts and ecommerce enthusiasts support the rollout of the 5 G
network. The positive impact of the network cannot be compared to the mere challenges
hindering its rollout. It is projected that 5G will significantly boost sales through eCommerce
with over $12 billion. Research by Oppitz and Tomsu (2018), supports the idea that faster speed
internet will increase mobile browsing and thus enhance mobile purchases within the e-
commerce sector. Oppitz and Tomsu’s claim is supported by the fact that upon the rollout of 5G,
internet traffic from mobile phones recorded its all-time highest in Europe, China, and the United
States. For a modern business that has embraced and optimized their online presence, a high-
speed internet enhances the interaction of the online business platforms the businesses.
Image; https://www.enginess.io/insights/5g-what-to-expect
5G internet is 100 times faster when compared to 4 G. This makes it easy for online
shoppers to interact with online e-stores. According to research by Bakir, Chniti, and Zaher
REPORT: POSITION & RECOMMENDATION PAPER 8
(2018), 61% of online shoppers leave items on a cart because of the failure of the internet to
complete transactions. With the help of 5G, business optimizes the user’s navigation through
A group of internet experts and ecommerce enthusiasts support the rollout of the 5 G
network. The positive impact of the network cannot be compared to the mere challenges
hindering its rollout. It is projected that 5G will significantly boost sales through eCommerce
with over $12 billion. Research by Oppitz and Tomsu (2018), supports the idea that faster speed
internet will increase mobile browsing and thus enhance mobile purchases within the e-
commerce sector. Oppitz and Tomsu’s claim is supported by the fact that upon the rollout of 5G,
internet traffic from mobile phones recorded its all-time highest in Europe, China, and the United
States. For a modern business that has embraced and optimized their online presence, a high-
speed internet enhances the interaction of the online business platforms the businesses.
5G internet is 100 times faster when compared to 4 G. This makes it easy for online
shoppers to interact with online e-stores. According to research by Bakir, Chniti, and Zaher
(2018), 61% of online shoppers leave items on a cart because of the failure of the internet to
complete transactions. With the help of 5G, business optimizes the user’s navigation through
The benefits of 5G network technology outweigh critical risks and security threats. To
begin with, the threat of national and cybersecurity has already started with 5G. It is an inherent
problem that has been existence since the discovery of information transmission. The national
REPORT: POSITION & RECOMMENDATION PAPER 9
intelligence asserts that 4 G remains the most vulnerable network to security breaches compared
to all other systems (Arfaoui, Bisson, Blom, Borgaonkar, Englund, Félix, and Papay, 2018). This
is because of the nature of the network’s architecture. However, with 5 G, there a variety of
enhanced additional security features that make the network more secure.
Subscriber privacy is one of the security mechanisms for the network that supports its
architecture. That is to say, internet users have the option of updating a public key that is tamper-
proof. This is just one among several other security measures that the network has included
enabling users to secure their browsing and online transactions. From Gomes, Iivari, Ahokangas,
Isotalo, Sahlin, and Melén’s analysis, the cybersecurity risks of the 5G network are not as severe
as is perceived. The impact of cyber risk that 5G poses can be mitigated. On the other hand, the
issues of national security are a policy-related issue that can also be mitigated. According to a 5G
risk assessment report by the Congressional Research Service, the cybersecurity threats of the
network outweigh the risks it poses on national security. The research states that most
cyberattacks take advantage of an individual’s poor cyber hygiene and not due to a lack of
government control. Indeed, placing the security burden on a user is an unrealistic expectation
Overview of sides
Research has demonstrated that all cybersecurity threats, such as real-time tracking and
surveillance, are mitigatable factors. As cited by Geller and Nair (2018), 5G has a variety of
subscriber privacy security mechanisms that allow users to update their public key. It is argued
that the role of securing personal privacy is not only the role of the user but also the network and
REPORT: POSITION & RECOMMENDATION PAPER 10
broadband service provider. Subscriber privacy is just one among many cybersecurity measures
that 5G has applied to reduce the risk of attack. It is, therefore, sufficient to state that the
The threat of national security is a complex issue that involves a variety of measures and
stakeholders. According to the National Intelligence, national risk assessments have established
that enacting policies that govern spectrum management can effectively control the risk f 5G on
national security (Li, Zhao, Zhou, Ding, Chen, Wang, and Zhang, 2017). The Department of
Defense holds a significant portion of the National Usable spectrum in American. That means
threats. Though the threats are real, the positive impact of the network cannot be compared to the
mere challenges hindering its rollout. Already, companies have recorded their first revenue from
e-commerce. First speed internet boosts sales through e-commerce. There is a lack of
5G internet is 100 times faster when compared to 4 G. The National Institute for
network (Levy, 2015). The policies support the development of best business practices such as
the adoption of consumer rights to protection. Further, the statistics that 61% of online shoppers
leave items on cart asserts the role that the internet plays in supporting e-commerce transactions.
Indeed, optimizing the performance of the internet will increase the number o transactions that
Image: https://www.givainc.com/blog/index.cfm/2019/7/24/5-Key-Changes-Made-to-the-NIST-
Cybersecurity-Framework-V11
computer systems. The framework is a flexible foundation which companies can adopt and
Conclusion
The benefits of 5G network technology outweigh the risks associated with national and
support communication. Though the government focuses on the threats of security, there are
REPORT: POSITION & RECOMMENDATION PAPER 12
many significant opportunities it creates for effective governance. The network has eliminated
the high latency that users of e-commerce services experience when conducting purchases on the
mobile application. The future of e-commerce is anchored on the development of 5G. The
the phase of emerging privacy concerns, the flow of information from the consumer to the
manufacturer does not end with e-commerce transactions. Currently, retailers and manufacturer
have shifted their marketing mechanisms to social media, with the advent of 5G, companies can
now boost sales through intensified marketing over social media platforms.
Recommendation
various stakeholders. The role of government in this critical process is to control the information
flow through spectrum management. Indeed, the threats that the government and other
stakeholders cite are real. However, 5g internet provides mechanisms to ensure that issues of
cyber and national security are perfectly addressed. To support this course, the government is
responsible for formulating policies that govern the privacy and security of information. It can
This approach is designed to support the value chain across all spheres of the e-commerce
business life cycle. The private stakeholders such as local mobile broadband service providers
engagement of the associated stakeholders, and the private sector can also propose a policy that
will standardize the 5G in managing networked assets. The policies will enhance spectrum
Reference
Arfaoui, G., Bisson, P., Blom, R., Borgaonkar, R., Englund, H., Félix, E., ... & Papay, J. (2018).
Botton, N., & Lee-Makiyama, H. (2018). 5G and national security after Australia's telecom
Geller, M., & Nair, P. (2018). 5G Security Innovation with Cisco. Whitepaper Cisco Public, 1-
29.
Gomes, J. F., Iivari, M., Ahokangas, P., Isotalo, L., Sahlin, B., & Melén, J. (2018). Cyber
Kaska, K., Beckvard, H., & Minárik, T. (2019). Huawei, 5G, and China as a security
Framework In Action!
Li, R., Zhao, Z., Zhou, X., Ding, G., Chen, Y., Wang, Z., & Zhang, H. (2017). Intelligent 5G:
Communications, 24(5), 175-183.
Oppitz, M., & Tomsu, P. (2018). Future Technologies of the Cloud Century. In Inventing the
Shoebridge, M. (2018). Chinese cyber espionage and the national security risks Huawei poses to
Bakir, H., Chniti, G., & Zaher, H. (2018). E-Commerce price forecasting using LSTM neural
Appendix