0% found this document useful (0 votes)
55 views14 pages

Technical and Professional CommunicationTechnical

This document discusses the costs and benefits of rolling out the 5G internet network in the United States. It notes that 5G promises faster speeds and increased data capacity but also poses new national security risks, as it could be exploited by adversaries for intelligence gathering and cyberattacks. While 5G benefits communication and e-commerce, implementing it without proper safeguards could threaten U.S. military operations and breach large amounts of consumer data. The document examines both sides and ultimately aims to determine if the benefits of 5G outweigh the security risks.

Uploaded by

Rosana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views14 pages

Technical and Professional CommunicationTechnical

This document discusses the costs and benefits of rolling out the 5G internet network in the United States. It notes that 5G promises faster speeds and increased data capacity but also poses new national security risks, as it could be exploited by adversaries for intelligence gathering and cyberattacks. While 5G benefits communication and e-commerce, implementing it without proper safeguards could threaten U.S. military operations and breach large amounts of consumer data. The document examines both sides and ultimately aims to determine if the benefits of 5G outweigh the security risks.

Uploaded by

Rosana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Running head: REPORT: POSITION & RECOMMENDATION PAPER 1

Report: Position & Recommendation Paper

Name

Institution
REPORT: POSITION & RECOMMENDATION PAPER 2

Table of Contents
Introduction...............................................................................................................................................3
Brief background.......................................................................................................................................4
Security threats and risks associated with 5G.....................................................................................6
Benefit of the 5G network to communication and ecommerce.............................................................7
Image...................................................................................................................................................7
Assertion of the thesis..........................................................................................................................8
Overview of sides....................................................................................................................................9
Security threats and risks associated with 5G.........................................................................................9
Image:................................................................................................................................................11
Conclusion................................................................................................................................................11
Recommendation.....................................................................................................................................12
Reference..................................................................................................................................................13
Appendix..................................................................................................................................................14
REPORT: POSITION & RECOMMENDATION PAPER 3

Introduction

Cost-benefit analysis of rolling out of 5 G internet in the United States.

           The demand for faster internet is an essential technological development in the

advancement of communication in the world. 5G is a new wireless network technology that

holds a vital role in the development of mobile communication systems and E-commerce.

According to a report by Palandöken (2017), network technology will be based on the IEEE

802.11 ac standard of broadband technology. It is an advancement of the mobile communication

standards way above the 4G standards and presents additional benefits compared to the 4G

network. Indeed, this advancement promises to increase the internet speeds, increase data per

user, and more broadband for users within a fixed region. The rapid development from 1G to 5G

technology presents significant counterproductive effects. For countries such as the United

States, 5G could potentially breach the military’s ability to perform intelligence, surveillance.

This poses a substantial threat to national security and U.S. military operations. Also, Chinese

companies are responsible for the construction of 5 G network. Experts warn that the 5G network

infrastructure increases the vulnerabilities to cyberattacks, military, and industrial espionage

(Shoebridge, 2018). The implication of the network to national security attracts the attention of

the Federal government (Kaska, Beckvard, and Minárik, 2019). As a critical stakeholder,

governments are concern with the counterproductive effects of the implementation of the 5G

network. In this report, the focus is on how the benefits of 5G network technology potentially

outweigh critical risks and security threats. 


REPORT: POSITION & RECOMMENDATION PAPER 4

Brief background

           The transitional development of network telecommunication can be traced back to only

voice transmission. Over time, new technology allowed for the transmission of multimedia

messages and Internet connectivity. The late 1900s ushered the world to mobile communications,

which paved the way for the growth from 1 G to 5G (Botton and Lee-Makiyama, 2018). With 5

G, the previous challenges that limited communication capacity has been enhanced. Also, the

rate of data transmission will significantly increase, thus lowering the cost. Other potential

benefits include reduced power consumption and improve spectrum efficiency. 

           The rapid development of the wireless network has caught the United States unaware.

Though the government has a comprehensive development data management and control policy,

the 5G network has presented entirely new security concerns that were unforeseen in the already

existing policies. For instance, wireless communications technology poses challenges with the

electromagnetic spectrum. It follows that 5 G network will significantly increase the volume of

data exchanged daily. The amount of data exchanged in the 4G network is stored in the

electromagnetic spectrum. However, with this transition, there is an imminent threat of a rapid

increase in the amount of data exchanged. As it is currently, there are no policies that govern the

management of data in the electromagnetic spectrum. With an increase in data, the government

faces threats such as cybersecurity attacks and manipulation of the large quantities of unlimited

data in the electromagnetic spectrum. 

      
REPORT: POSITION & RECOMMENDATION PAPER 5

Importance of 5G transition to the discipline of Technical and Professional communication.

            Data management is vital in the field of Technical and Professional communication. The

comparison of risks and benefits of the 5G network is integral in the management of operations

in this discipline. Technical and Professional communication is a field that is applicable in

almost all modern companies. With the rapid growth towards globalization, companies have

identified the need to conduct business over the internet. Therefore, 5G internet is a handy tool in

enhancing the level of engagement on a global scale. It for this reason that key global business

players such as social media platforms, international e-commerce companies begin to question

the interplay between the impact of the 5G network on their data management operations and

business. Data management is a fundamental issue in global trade. For a multination business,

the obligation to safeguard the client’s data is embedded in the use of internet technology. With

the transition to 5G technology, companies are likely to rapidly receive large amounts of data

within a limited number of times (Oppitz and Tomsu, 2018). This poses a significant challenge

in how the data will be handled and safeguarded. For instance, Amazon is one of the leading e-

commerce. The company amasses a large amount of consumer data. This data includes persona

information. Therefore, it is sensitive data that must be stored and safeguarded adequately as per

the regulatory requirement for compliance with personal privacy. One of the main approaches

that such companies use to reduce the risk of breaching personal privacy requirements is by

minimizing the storage of personal data. This significantly reduces the chances of misusing the

data and also lowers the related compliance cost. Therefore, with 5G, more rapid and high

quantity data will demand that companies enhance their data management approaches through

increasing surveillance, staff, and infrastructure on more modern data management systems. 
REPORT: POSITION & RECOMMENDATION PAPER 6

Security threats and risks associated with 5G

           Purdue University has established several vulnerabilities in the 5G network technology.

Cybersecurity is one of the security threats of 5G. 5G can allow for real-time location tracking

and surveillance. The University argues that the 5G network has stingrays that act aa cell towers

that spy on mobile users and increases their vulnerability to cyber-attacks. According to the

University, the network makes it possible for attackers to find temporary network identifiers of a

mobile phone. Consequently, attackers can use this information to establish the paging

occasions, which makes it possible for them to track a mobile user’s location. While such

vulnerability still exists in the 4G network, the research argues that 5G makes it easier because it

delivers lower costs.

            National security is one of the important emerging issues in the roll-out of the 5G.

Security scholarly research by the National Intelligence has established that there is a complex

link between the implementation of 5G network technology and the associated security risks.

The research argues that 5G supports various access networks such as 4G and Wi-Fi and is

therefore likely to inherit all the security challenges. Each access network has its unique

cybersecurity needs. 3G and 4G wireless networks have vulnerable network architecture. For

mobile devices, the government provides leisure for the spectrum as a measure that protects

individuals from eavesdropping on voice, data, and video communication. There is a myriad of

security risks that the network poses if the network s not segmented. However, there are still

limited regulations that govern such a level of control.


REPORT: POSITION & RECOMMENDATION PAPER 7

Benefit of the 5G network to communication and ecommerce

           A group of internet experts and ecommerce enthusiasts support the rollout of the 5 G

network. The positive impact of the network cannot be compared to the mere challenges

hindering its rollout. It is projected that 5G will significantly boost sales through eCommerce

with over $12 billion. Research by Oppitz and Tomsu (2018), supports the idea that faster speed

internet will increase mobile browsing and thus enhance mobile purchases within the e-

commerce sector. Oppitz and Tomsu’s claim is supported by the fact that upon the rollout of 5G,

internet traffic from mobile phones recorded its all-time highest in Europe, China, and the United

States. For a modern business that has embraced and optimized their online presence, a high-

speed internet enhances the interaction of the online business platforms the businesses.         

Image; https://www.enginess.io/insights/5g-what-to-expect
    

           5G internet is 100 times faster when compared to 4 G. This makes it easy for online

shoppers to interact with online e-stores. According to research by Bakir, Chniti, and Zaher
REPORT: POSITION & RECOMMENDATION PAPER 8

(2018), 61% of online shoppers leave items on a cart because of the failure of the internet to

complete transactions. With the help of 5G, business optimizes the user’s navigation through

websites with the enhanced load time. 

Assertion of the thesis

           A group of internet experts and ecommerce enthusiasts support the rollout of the 5 G

network. The positive impact of the network cannot be compared to the mere challenges

hindering its rollout. It is projected that 5G will significantly boost sales through eCommerce

with over $12 billion. Research by Oppitz and Tomsu (2018), supports the idea that faster speed

internet will increase mobile browsing and thus enhance mobile purchases within the e-

commerce sector. Oppitz and Tomsu’s claim is supported by the fact that upon the rollout of 5G,

internet traffic from mobile phones recorded its all-time highest in Europe, China, and the United

States. For a modern business that has embraced and optimized their online presence, a high-

speed internet enhances the interaction of the online business platforms the businesses.              

           5G internet is 100 times faster when compared to 4 G. This makes it easy for online

shoppers to interact with online e-stores. According to research by Bakir, Chniti, and Zaher

(2018), 61% of online shoppers leave items on a cart because of the failure of the internet to

complete transactions. With the help of 5G, business optimizes the user’s navigation through

websites with the enhanced load time. 

           The benefits of 5G network technology outweigh critical risks and security threats. To

begin with, the threat of national and cybersecurity has already started with 5G. It is an inherent

problem that has been existence since the discovery of information transmission. The national
REPORT: POSITION & RECOMMENDATION PAPER 9

intelligence asserts that 4 G remains the most vulnerable network to security breaches compared

to all other systems (Arfaoui, Bisson, Blom, Borgaonkar, Englund, Félix, and Papay, 2018). This

is because of the nature of the network’s architecture. However, with 5 G, there a variety of

enhanced additional security features that make the network more secure. 

           Subscriber privacy is one of the security mechanisms for the network that supports its

architecture. That is to say, internet users have the option of updating a public key that is tamper-

proof. This is just one among several other security measures that the network has included

enabling users to secure their browsing and online transactions. From Gomes, Iivari, Ahokangas,

Isotalo, Sahlin, and Melén’s analysis, the cybersecurity risks of the 5G network are not as severe

as is perceived. The impact of cyber risk that 5G poses can be mitigated. On the other hand, the

issues of national security are a policy-related issue that can also be mitigated. According to a 5G

risk assessment report by the Congressional Research Service, the cybersecurity threats of the

network outweigh the risks it poses on national security. The research states that most

cyberattacks take advantage of an individual’s poor cyber hygiene and not due to a lack of

government control. Indeed, placing the security burden on a user is an unrealistic expectation

Overview of sides

Security threats and risks associated with 5G

                Research has demonstrated that all cybersecurity threats, such as real-time tracking and

surveillance, are mitigatable factors. As cited by Geller and Nair (2018), 5G has a variety of

subscriber privacy security mechanisms that allow users to update their public key. It is argued

that the role of securing personal privacy is not only the role of the user but also the network and
REPORT: POSITION & RECOMMENDATION PAPER 10

broadband service provider. Subscriber privacy is just one among many cybersecurity measures

that 5G has applied to reduce the risk of attack. It is, therefore, sufficient to state that the

cybersecurity risks of the 5G network are not as severe as is perceived.    

            The threat of national security is a complex issue that involves a variety of measures and

stakeholders. According to the National Intelligence, national risk assessments have established

that enacting policies that govern spectrum management can effectively control the risk f 5G on

national security (Li, Zhao, Zhou, Ding, Chen, Wang, and Zhang, 2017). The Department of

Defense holds a significant portion of the National Usable spectrum in American. That means

that the government still hold significant control of the 5G network. 

           Benefit of the 5G network to communication and ecommerce outweigh the perceived

threats. Though the threats are real, the positive impact of the network cannot be compared to the

mere challenges hindering its rollout. Already, companies have recorded their first revenue from

e-commerce. First speed internet boosts sales through e-commerce. There is a lack of

understanding among business companies on the role of 5G in ecommerce and communication.  

           5G internet is 100 times faster when compared to 4 G.  The National Institute for

Standards and Technology (NIST) Cybersecurity Framework argues that the establishment of

cybersecurity standards will play a significant role in encouraging companies to adopt a 5G

network (Levy, 2015). The policies support the development of best business practices such as

the adoption of consumer rights to protection. Further, the statistics that 61% of online shoppers

leave items on cart asserts the role that the internet plays in supporting e-commerce transactions.

Indeed, optimizing the performance of the internet will increase the number o transactions that

online shoppers run.


REPORT: POSITION & RECOMMENDATION PAPER 11

Image: https://www.givainc.com/blog/index.cfm/2019/7/24/5-Key-Changes-Made-to-the-NIST-
Cybersecurity-Framework-V11

The framework provides guidance to organizations in the development of secure

computer systems. The framework is a flexible foundation which companies can adopt and

customize to meet specific needs

Conclusion

           The benefits of 5G network technology outweigh the risks associated with national and

cybersecurity. 5G network promises to achieve uninterrupted access to online information and

support communication. Though the government focuses on the threats of security, there are
REPORT: POSITION & RECOMMENDATION PAPER 12

many significant opportunities it creates for effective governance. The network has eliminated

the high latency that users of e-commerce services experience when conducting purchases on the

mobile application. The future of e-commerce is anchored on the development of 5G. The

introduction of 5G promises to enhance seamless operation on e-commerce platforms. Even at

the phase of emerging privacy concerns, the flow of information from the consumer to the

manufacturer does not end with e-commerce transactions. Currently, retailers and manufacturer

have shifted their marketing mechanisms to social media, with the advent of 5G, companies can

now boost sales through intensified marketing over social media platforms. 

Recommendation

            The implementation of 5 G internet cannot be effective without the cooperation of

various stakeholders. The role of government in this critical process is to control the information

flow through spectrum management. Indeed, the threats that the government and other

stakeholders cite are real. However, 5g internet provides mechanisms to ensure that issues of

cyber and national security are perfectly addressed. To support this course, the government is

responsible for formulating policies that govern the privacy and security of information. It can

also forester t investment in the appropriate business models for 5G systems. 

This approach is designed to support the value chain across all spheres of the e-commerce

business life cycle. The private stakeholders such as local mobile broadband service providers

can deploy access networks through virtualization technology to advance 5 G. Through

engagement of the associated stakeholders, and the private sector can also propose a policy that

will standardize the 5G in managing networked assets. The policies will enhance spectrum

management and computing resources to establish a collaboration in network technology.


REPORT: POSITION & RECOMMENDATION PAPER 13

Reference

Arfaoui, G., Bisson, P., Blom, R., Borgaonkar, R., Englund, H., Félix, E., ... & Papay, J. (2018).

A security architecture for 5G networks. IEEE Access, 6, 22466-22479.

Botton, N., & Lee-Makiyama, H. (2018). 5G and national security after Australia's telecom

sector security review (No. 8/2018). ECIPE Policy Brief.

Geller, M., & Nair, P. (2018). 5G Security Innovation with Cisco. Whitepaper Cisco Public, 1-

29.

Gomes, J. F., Iivari, M., Ahokangas, P., Isotalo, L., Sahlin, B., & Melén, J. (2018). Cyber

security business models in 5g. A Comprehensive Guide to 5G Security, M. Liyanage, I.

Ahmad, AB Abro, A. Gurtov, and M. Ylianttila, Eds. Wiley, 99-116.

Kaska, K., Beckvard, H., & Minárik, T. (2019). Huawei, 5G, and China as a security

threat. NATO Cooperative Cyber Defence Center for Excellence (CCDCOE), 28.

Levy, Y. (2015). National Institute of Standards and Technology (NIST) Cybersecurity

Framework In Action!

Li, R., Zhao, Z., Zhou, X., Ding, G., Chen, Y., Wang, Z., & Zhang, H. (2017). Intelligent 5G:

When cellular networks meet artificial intelligence. IEEE Wireless

Communications, 24(5), 175-183.

Oppitz, M., & Tomsu, P. (2018). Future Technologies of the Cloud Century. In Inventing the

Cloud Century (pp. 511-545). Springer, Cham.

Shoebridge, M. (2018). Chinese cyber espionage and the national security risks Huawei poses to

5G networks. Macdonald-Laurier Institute for Public Policy.

Bakir, H., Chniti, G., & Zaher, H. (2018). E-Commerce price forecasting using LSTM neural

networks. Int. J. Mach. Learn. Comput, 8, 169-174.


REPORT: POSITION & RECOMMENDATION PAPER 14

Appendix

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy