StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Mobile Computing and Social Networks - Term Paper Example

Cite this document
Summary
The paper “Mobile Computing and Social Networks” will look at the mobile computing and social networks, which have increasingly become popular around the world. There are thousands of iPhone Apps, iPad Apps, that have been developed to perform a myriad of tasks and processes…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Mobile Computing and Social Networks
Read Text Preview

Extract of sample "Mobile Computing and Social Networks"

 Mobile Computing and Social Networks Introduction Inarguably, technology advancements that have been witnessed in the recent years have changed the way people live and conduct business. Particularly, the advancements have changed the way people perform a myriad of tasks and processes. Internet technology is one of the major technological advancement that has significantly changed how people do business and live (Rainie and Wellman, 2012). Recent years have witnessed internet technology being used extensively in mobile devices such as mobile phones and iPads. Mobile computing and social networks have increasingly become popular around the world. There are thousands of iPhone Apps, iPad Apps, and Android Apps that have been developed to perform a myriad of tasks and processes. These applications use mobile and web-based technologies majorly in turning communication into interactive communications and dialogue(s) among organizations, individuals, and communities around the world (Hinchcliffe et al, 2012). The fact that mobile computing and social networks have witnessed exponential growth within a very short period of time compared to other communication and business tools in the history of human beings is nearly incontestable (Rainie and Wellman, 2012). This fact is evidenced by the statistics indicating that while it took about 13 years for television to attract close to 50 million viewers and approximately 38 years for radio to attract nearly 50 million listeners, internet technology only took about 4 years only for to attract over 50 million participants. Social networking sites such as Facebook and Twitter much shorter time; about one and a half years to attract the same number of participants (Hinchcliffe et al, 2012). Mobile computing has witnessed a more robust growth in recent years. While initially most of the mobile applications were games that were intended for playing on mobile devices, they have gained popularity as businesses ponder whether some of their business process applications running on desktop platform and the Web can be redesigned to run on mobile devices that run on desktop platforms and the Web could be redesigned to run on mobile devices (Rainie and Wellman, 2012). In order to have a better understanding of mobile computing and social networks, this paper will discuss mobile-based applications and their various aspects relating to access and processing of data. The first aspect to address is in regard to the effectiveness and efficiency mobile-based applications provide to capture geo-location data and customer data, and quickly upload to a processing server without users having to use a desktop system. Presently, there are numerous smartphones and iPhones that use applications and specific processes relating to mobile devices (Kumar and Rahman, 2012). Considering the advancements that have been made in mobile computing, as well as in regard to social networks, many companies around the world are making preparation for the use of mobile-based applications using tools that can capture geo-location data and customer data. Apple iPhone and Android smartphone platforms are the mostly used currently for this purpose and this has seen huge expansion of their market. Available evidence indicate that these applications have been successful in capturing geo-location data; they have been successful in tracking driving behaviors, providing unbiased feedback during driving, and measuring acceleration among others (Dye, 2011). This information has been helpful by companies such as insurance firms in logging of potentially dangerous driving activities and mapping where dangerous activities have occurred. It has been reported that some insurance companies have used these apps to record casualty and property claims. As a result of this, insurance firms have been able to bypass the laborious process of using laptops or desktops in filing or documenting claims (Mulvihill, 2012). Mobile-based applications have also proved to be effective and efficient in capturing geo-location data and customer data, and quickly uploading to a processing server without using desktop system as evidenced by users’ ability to take photos of documents such insurance and driver’s license and send directly to carriers when purchasing a vehicle (Lumsden, 2013). Apart from motor vehicle dealers and insurance companies, airline companies and other players in the airline use mobile-based application in capturing geo-location and consumer data. Players in the airline industry are increasingly using geolocation tools and smartphone and iPhone apps to enhance their efficiency and effectiveness. For example, Lufthansa Airline Company offers its customers the ability of downloading its smartphone app in order to use social networks (MacVittie, 2012). Through this application, passengers are able to share information regarding their journey with other customers and other users via social networks. Also, the application accords the users the opportunity of virtually checking into lounges, airports, as well as the airline’s flights. The mobile-based applications enable users to broadcast their location at a given time via social networks sites such as Twitter, Foursquare, and Facebook by “checking in” (Kumar and Rahman, 2012). The effectiveness and efficiency of mobile-based applications to capture customer and geolocation data is enhanced by other technological developments; for example, user’s location can be determined via GPS or radio location so the application can indicate nearby locations to check into such as restaurants and public buildings among others. In addition, these applications are efficient and effective to an extent that they can enable users to navigate addresses on the internet, as well as search for locations and addresses through applications such as foursquare. As a result, users including drivers can easily and quickly navigate to locations they have identified on websites and through other applications (Mulvihill, 2012). The benefits realized by consumers because of the ability to gain access to their own data via mobile applications have already been identified in the preceding discussion. It is worth noting that those benefits are significantly related to the efficiency and effectiveness of mobile-based applications to capture customer data and geolocation data (Dye, 2011). While there are notable benefits, there are challenges associated with developing applications that run on mobile devices because of the small screen size. The primary challenge relates to development of applications for mobile devices to deal with the issue of limited or relatively smaller screen size. Even though it could be argued that the issue of developing and designing devices for Android smartphones and Apple iPhone is difficult as the preconceived notion that there are permanent difficulties in developing and designing these mobile-based applications. It should be noted that this challenge is considerably addressed through a new technique for smartphone web app and mobile app developers called responsive design (MacVittie, 2012). This concept is based on the emerging responsive architecture which provides spaces and rooms to have capacity to adjust automatically according to the flow and number of people within it. It makes reference to the process of developing and designing websites that have the capacity to react to actions of the users and to detect the medium where the site is presently being watched so as to provide the ideal experience possible to the user in regard to readability and navigability (Lumsden, 2013). Mobile-based applications developers and IT departments are constantly faced with the dilemma of which methods to use in deciding which platform to support, that is, Android, Windows Phone, iPad, or iPhone. It is no longer enough for IT departments to let employees do quick web searches or email checks to decide how to tackle the decision of choosing which platform to support (Kumar and Rahman, 2012). They are required to stake out an application development strategy and need to take the lead in optimizing processes of business for mobility. If a company wants to enhance its competitiveness and improve value and bring admiration from existing and potential employees, they should recognize the mobile app trends. Leaders of mobile-based applications such as Apple, Samsung and Nokia should be cognizant of the mobile trends while deciding which platform to support. While deciding which platform to support, developers should not stand pack and let each business unit passively do its own thing with development of mobile-based applications. There are a number of viable app development platform choices including mobile-optimized browser apps, a hybrid approach, native client apps that place a native user interface around HTML application (Mulvihill, 2012). Making decision on which platform to support requires IT departments that are starting out should recognize that there will numerous trials and errors with the development cycles. Designing suitable content for an increasingly diverse array of platforms and devices needs a more comprehensive upfront strategy that takes into account context and delivery of creating more value for the users (Dye, 2011). In respect to the aspect of screen sizes of smartphones and the common perceptions regarding them, experience has to be considered. If content is to be consumed across space, platforms, and time, developers have to think about how to dice and slice the content for several experiences. Developers cannot just put all the content on mobile-based applications similarly as it looks on the web site. It is important for developers to consider how users and people in general are going to interact with mobile applications. There is need for developers to adapt as smartphones and technology to evolve as deciding on which platform to support. It is also important for developers to have keen understanding regarding who is consuming the mobile content. This is because without such an understanding, companies can overwhelm users with enormous clutter and minimal integration between functions and features (MacVittie, 2012). In addition to focusing on methods of deciding which platforms to support and thee focus on planning and preparation for the development of apps, it is also critical for developers to prepare and focus more on the approach of dealing with the ways of providing high availability for iPhones and smartphone users. It is appreciated that mobile applications require high availability because end users need to have continuous IT and IS systems access (Lumsden, 2013). Therefore, mobile applications need high availability because end users require continuous access to IS and IT systems. High availability is designed and developed to protect end users of mobile-based applications against unplanned and planned service interruptions. Typically, unplanned service interruptions are triggered by system’s technical problems. On the other hand, planned service interruptions include upgrades, often necessitated with maintaining peak service and performance (MacVittie, 2012). Some of the ways that iPhone and smartphone app developers and designers can plan for, as well as implement solutions that will address the quandary of high availability are creation of partnerships with third-party firms or companies that would facilitate monitoring of transactions all the time, as well as providing back-end support for storage of data (Dye, 2011). Development of mobile applications with high availability is supported by several companies; companies such as Amazon Web Services provide reliable and unique services that mobile app developers and designers can utilize. Companies such as Amazon Web Services help to lift the potential roadblocks that relate to issues of high availability (Mulvihill, 2012). As such, users can take advantage of instances where they can run their most demanding applications, whether it is massively powering popular mobile, gaming, or social app or supporting high-transaction enterprise applications for consumers. Such support also help IT departments to make high availability issue less dangerous in regard to causing major disruptions in daily processes and transactions for the mobile app user. In addition, the requirements of high availability vary depending on the mission and business of a particular organization. For example, seller of gift merchandise may need 24/7 high availability during high season, while an insurance firm may need high availability during working hours only (Lumsden, 2013). With the advent of internet technology and advancements in mobile computing and social networks, the issue of privacy and security has become increasingly critical. Users and developers of mobile applications and social networks are becoming more and more concerned about the issue of confidentiality, privacy and security (MacVittie, 2012). This is because most of the mobile-based applications and social networks have compromised security and privacy measures. This threat is further compounded by the reality of hackers who tend threaten security and privacy of users. Mobile devices are subjected to hacking at a higher rate compared to non-mobile devices. The issue of security has continued to receive a lot of discussion among mobile app designers and developers. Since mobile devices tend to be more vulnerable to hacking compared to non-mobile devices, the issue of security has become more prevalent particularly due to increasing adoption rate of smartphone (Kumar and Rahman, 2012). New data estimates that there has been about 17 percent increase in smartphone usage by employees within the last three years. It is estimated that nearly half of the world population will be using smartphone in the next six years. Due to the high adoption rates, the possibility of compromised security of users will increase. The challenge of security in mobile-based applications is evidenced by the fact that mobile malware has become a very profitable industry. Premium text billing is the most common tactic that malware writers to compromise mobile users security especially through financial fraud on mobile. The issue of security is intertwined with that of privacy. It has been established that privacy of mobile applications users is one of the major issues facing mobile-based applications. A significant portion of security and privacy issues in recent years have arisen from aggressive advertising techniques such as pushing out-of-app ads and accessing private and confidential information without the consent of the users (Mulvihill, 2012). Considering the reality of security and privacy issues related to mobile-based applications, there have been concerted efforts particularly among apps developers and designers, as well as mobile service providers to address these issues (Dye, 2011). So, what are the ways of making iPhone and smartphones more secure? It is very important that one exercises caution when downloading applications. Users should only download applications from trusted sources such as the App Store and Google Play. More importantly, users should cautiously read users review, as well as verify whether the developer is trusted. It is also advisable that users should be wary of applications that make a promise of paying up for free. Since users are largely responsible for their privacy and security while using mobile devices, they should check for any suspicious activity on their devices. Most mobile malwares tend to interfere with phone billing as it may impute charges (Lumsden, 2013). Therefore, as a security measure, users should regularly review their phone bill so as to confirm if they have been irregularly charged or not. Mobile phone users particularly smartphone and iPhone users should be aware of the fact that their devices are more vulnerable to hacking and therefore they should be cautious especially when downloading and using apps. They should adhere to the already discussed measures in order to make their mobile devices more secure (Kumar and Rahman, 2012). Conclusion It is clear from the above discussion that mobile computing and social networks have gained remarkable prominence around the world in recent years. Mobile-based applications are used extensively for various purposes by users. As has been noted, there are thousands of iPhone Apps, iPad Apps, and Android Apps that have been developed to perform a myriad of tasks and processes. The paper has discussed in details the various aspects relating to mobile-based applications: effectiveness and efficiency, benefits, challenges, methods used in deciding which platform to support, ways of providing high availability, and methods of making mobile devices more secure. References Dye, J. (2011). Mapping out A Mobile Strategy: CreatingContent That Delivers Value On-The-Go. EContent, (2), 16 Hinchcliffe, D et al. (2012). Social Business By Design: Transformative Social Media Strategies for the Connected Company. Jossey-Bass. Kumar, A. V. S., & Rahman, H. (2012). Mobile computing techniques in emerging markets: Systems, applications and services. Hershey, PA: Information Science Reference. Lumsden, J. (2013). Developments in technologies for human-centric mobile computing and applications. Hershey, PA: Information Science Reference. MacVittie, L. (2012). Geolocation and Application Delivery. F5 Networks, Inc 1-8 Mulvihill, A. (2012). 10 Things to Know About Location-Based Services. Information Today, (2), 1 Rainie, H., & Wellman, B. (2012). Networked: The new social operating system. Cambridge, Mass: MIT Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Mobile Computing and Social Networks Term Paper”, n.d.)
Mobile Computing and Social Networks Term Paper. Retrieved from https://studentshare.org/information-technology/1482852-term-paper-mobile-computing-and-social-networks
(Mobile Computing and Social Networks Term Paper)
Mobile Computing and Social Networks Term Paper. https://studentshare.org/information-technology/1482852-term-paper-mobile-computing-and-social-networks.
“Mobile Computing and Social Networks Term Paper”, n.d. https://studentshare.org/information-technology/1482852-term-paper-mobile-computing-and-social-networks.
  • Cited: 0 times

CHECK THESE SAMPLES OF Mobile Computing and Social Networks

Mobile Computing and Social Network

mobile computing and social Network mobile computing and social Network Introduction Mobile computing can be referred to the process of human-computer interaction where a computer device is expected to travel during its usage.... According to Uwe Vieille, “mobile computing is the ability to use computing capability without a pre-defined location and/or connection to a network to publish and/or subscribe to information” (as cited in Balakumar, 2012)....
5 Pages (1250 words) Research Paper

Mobile Computing Technology

hellip; However, within the current system, mobile computing and social networking has proven to be a paradigm shift by which almost every aspect of society is impacted.... As a function of discussing and analyzing this to a further degree, the following analysis will seek to answer for key questions concerning the prospect of engaging in further utilization of mobile computing and social networking as a means of effecting healthcare to the patient; comparing and contrasting the monitoring the patient vital signs using mobile computer technology to inpatient visits, analyzing the advantages and disadvantages of using mobile computing technology to monitor patients, assessing the security concerns with regards the transmission of personal medical information over wireless networks, and assessing the use of social networking for group support for patients with similar medical concerns....
4 Pages (1000 words) Essay

The Effectiveness and Efficiency of Mobile Based Applications

 This has caught up among today's youth and social networking sites which they commonly used by providing us the ability to track or let friends know where we are, to identify certain specific joints frequented by them, and book tickets in cinema halls.... Mobile networks are also creating phones that are increasingly better and tougher to intrude into or hack thus correspondingly increasing the capability of mobile devices and their applications.... This paper ''The Effectiveness and Efficiency of mobile Based Applications'' tells that Experts predict that by 2020 there will be more than three billion mobile devices making 450 billion mobile transactions (Chordas 2012: 14)....
12 Pages (3000 words) Essay

Mobile Computing and Mobile Computing Security

The report "mobile computing and Mobile Computing Security" discusses the advantages of mobile computing technologies and features of mobile computing security.... nbsp;Mobile computing involves the use of computing and communications devices to transfer data and other forms of communications.... hellip; It also refers to use the use of compact, portable computing devices such as laptops, pocket computers, Personal Digital Assistants (PDA's), and other similar devices using wireless technology (“mobile computing”, 2006)....
6 Pages (1500 words) Report

The Current State of the Art in Mobile Computing

The paper "The Current State of the Art in mobile computing" discusses that mobile computing is an important area of electrical engineering and computer science that lead to the development of devices crucial for challenging patterns and creating new consumer and business ideas.... hellip; With the increase in the number of devices that support mobile computing technology, there is an increasing need to impose and ensure security since mobile computing devices usually store a tremendous amount of data and storage capacities are increasing with the continued shrinking of circuits and advancement in Standard State Drive (SSD) technologies....
9 Pages (2250 words) Essay

The Wealth of Networks: How Social Production Transforms Markets And Freedom

This literature review "The Wealth of networks: How Social Production Transforms Markets And Freedom" discusses the human society that has been transformed into a networked public due to the increased advancements in technology and the widespread of Internet usage.... To date, modern researchers in various fields have come with new definitions on networks, but they have relied on research work that has existed for the last two centuries.... Albert-Laszlo Barabasi is one such modern researcher who has redefined the concept of networks based on research work done for the past 250 years....
8 Pages (2000 words) Literature review

Next Generation Mobile Computing

The coursework called "Next Generation mobile computing" describes the role and characteristics of smart devices.... This paper outlines future trends in mobile computing, next generation mobile computing, regulatory issues surrounding mobile computing.... hellip; The description above can be widened to comprise of other types of devices like PDAs, mobile phones as well as tablet technology together with other usage situations, with the definition further encapsulating the more traditionally commercial aspects of mobile computing....
12 Pages (3000 words) Coursework

Privacy in Mobile Social Networks

IntroductionInformation from the social networks has found its use in many ways which was not expected in the beginning.... IntroductionInformation from the social networks has found its use in many ways which was not expected in the beginning.... The main focus of this paper will be on privacy on the social networks.... The social networks that are online are used by many people around the world today.... The growth of applications which brings together online social networks and mobile computing applications has enabled the occurrence of applications which are unique in their requirements and also which are hard to understand because they are hard to understand (Eagle, & Pentland, 2005)....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us