All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Mobile Computing and Social Networking, Term Paper Example

Pages: 10

Words: 2872

Term Paper

Assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system

A number of entities carry out activities that call for the use of mobile applications in the collection and transmission of data in real time. The development of mobile applications capable of uploading data directly to the server without the need of using a desktop system has made it possible for people in the field to transmit data to a central server in a timely way. It is true that some locations are  far  from desktop systems and this results to a challenge in terms of the speed of transmitting data to a central location where processing can be carried out. With this in mind, having a platform that offers faster and secure data transfer makes it a necessity for such people locate at far away distances. This has enabled data to be transmitted in a quick way and faster decision making (Munoz 2006).

Mobile applications are capable of capturing voluminous data relating to customers from the fields. This data is then transmitted directly to a secure server where the information is used for management decision making. The companies do not have to worry about data loss because in the event that the device is lost or damaged in the field data is secure. Data loss is minimized in such a scenario making it less risky for an entity. In the recent past, mobile computing has become the preferred computing platform for most organizations because of their ease of use and wide range applicability (Munoz 2006).

Application developers have been able to develop products that are customized to the user’s specific needs. This has increased use of such applications in most industries that handle large volumes of data. It is evident that through the use of such applications, companies are capable of knowing the reactions of customers to different strategies taken. This makes it possible for companies to develop better strategies that suit their specific needs. The market place is constantly changing, and companies need to adapt to changes in a fast way (Munoz 2006).

Companies are required to stay up to date with the changing trends and customer preference of they are to remain competitive. Having the right information at the right time will enable companies respond to the changing needs of customers in a timely manner and improve their product or service offering. Mobile applications have enabled companies distribute products to where there are required avoiding shortages and enabling them maintain customer loyalty. Customer information is sent immediately to the server and the company can make necessary changes to meet to the customers’ needs (Vivoni 1999).

Sales people do not have to travel to other locations in search of desktop computing, and this reduces the costs tremendously improving the overall profitability of the company. Mobile applications have enabled the dispatch of information to other user of the application enabling their coordination of activities. A sales person in one geographical location can easily communicate with another at a different location to help in serving the customers better.  This makes it possible to move products from one location having low demand to another where they are highly demanded and therefore satisfying the customers’ demands on a timely manner (Vivoni 1999).

Some mobile applications are capable of locating the population density of an area and relay this information to a company server. The company can use this information to develop marketing programs for the selected location. These devices can be used to collect and relay timely data to be used to determine the consumer behavior of a particular location (Vivoni 1999).

Mobile applications have enabled networking making it possible to retrieve mapping as well as database information in real time for effective decision making. This has made it cheap for entities handling massive volumes of data because all they need is a mobile device and an application instead of investment in an entire network. The use of client server architecture enables ease of information access and a large repository of information that enables better performance and operations. This enables better control of information control and monitoring making it an ideal platform for businesses to carry out their activities (Vivoni 1999).

Evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications.

Accessing own data through mobile applications is beneficial to consumers in that they are capable of ordering customized products. A company is capable of marketing its products to a specific target market especially where there is interaction with the user through a customized channel. A company can be able to analyze voluminous data relating to their promotion campaigns in real time. Customers are enlightened through access to their own information using mobile devices. This means, consumers are empowered to make the right decisions relating to what they want to purchase and in what quantity. Consumers can monitor trends in the market and make an informed decision on when to purchase products and at what quantities (Vivoni 1999).

These gadgets are always at the most convenient location for customermaking it easier for a customer to get the information he likes by just making a click. This takes shorter time compared to the one who is using desktops as he will have to check whether the system is well set up before he even starts it. The customer saves adequate time that is necessary for undertaking other chores. The shopping experience becomes more friendly and enjoyable to the customer. The customer in this case feels that they control their shopping and this will help them allocate their time to other activities.

These are more potable compare for example; laptops and a customer can use the devices to access information about the goods he likes from the comfort of where he is. There is growth in the level of control that the customer has over the shopping experience. Most transactions are done currently over the internet. The penetration of mobile applications has enabled customers carry out their shopping more conveniently at their most preferred place and time.

A customer will be able to access information about the products they like from various companies at any time he likes. This will enable him to compare the product features and their prices from various companies in the right time before placing an order. Mobile applications have changed the shopping experience totally because customers do not have to visit the store for window shopping. The availability of timely data has made it easier for customers to use real time or near real time data in their shopping experience. The customers are informed of the availability of products they desire, the distribution and costs (Vivoni 1999).

Examine the challenges of developing application data run on mobile devices because of the small screen size

It is difficult to display relevant data on certain products with additional features. A customer relies on the information before purchasing a product. Also in cases where illustrations about the product are required, some features may not be visible to the customer well. In such cases, the customer might be forced to use desktops or pay a visit to the showrooms to have a close look at the product offered which in turn may be costly. Downloading speed may be slow especially where the information about the product may be accompanied by some illustrations and this may be time consuming.

Mobile devices have screens of different sizes and developing an application that suits all devices can be a challenge. Some mobile devices use operating systems that are not compatible with readily available applications. The way one product is displayed on a device screen can be decidedly different from the way it is displayed on another. Some product pictures can be too large to be seen properly on the screen of a mobile device. This means that application developers have to incorporate a number of features that make it possible to enlarge and scroll the pictures to have a better view.

Another significant challenge is that at times, the customer can only view but cannot update or request for products from the mobile device. This means that the customer will have to use a desktop system to complete their transactions. The inability of data to fit the screen properly is a turn off because the customer does not concentrate on the exercise properly. This is because they have to stop and scroll downwards to access more information. Mobile application developers have to incorporate new technology in developing some application. This can be quite expensive, and customers may be required to download the applications at an additional cost(Munoz 2011).

Describe the methods that can be used to decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android.    

Choosing the right platform to use an application can be a challenge to most developers. It is evident that customers have mobile devices that are different and developing an all suit application can be a challenge. The penetration of different devices in the market place makes it difficult to satisfy the needs of the different users. This means that developers have to look into the trend for the penetration of these mobile devices. In the recent past, the use of smart phones for transactions has increased. Most application developers have shifted their attention to developing applications that can be used in a wide variety of these devices

Application developers should make the necessary considerations while developing applications to be used by mobile devices. The first factor that should come into their mind is the intended use of the application. The muse will determine the level of interaction needed with the customer. The user friendliness and wide applicability are among the foremost considerations made while developing mobile applications. Developers need to first test their applications on numerous devices to determine the best. Such a device should be allowed for a wider range of use and a wider scope of application. The device should ensure that the data is user friendly and attractive to the user (Muttik 2011).

Mobile applications require high availability because end users need to have continuous access to IT and IS systems. Discuss ways of providing high availability.

Mobile devices are susceptible to loss either through theft, dropped or being left behind at some locations. Occasionally managers carry, and other company top officials carry laptops containing sensitive information around. Mobile phones are carried daily by the managers increasing their chances of being lost. The loss of such devices can be dangerous because these devices contain sensitive data that can be used against the company. To be on the safe side, companies should develop a mechanism that protect it against loses of such devices. It is necessary to educate the owners’ or users of mobile devices of the importance of security and the need of protecting their devices against theft or being lost. The users should be aware of the importance and impact the information stored in their devices has on the company.

All mobile devices should have passwords to avoid any unnecessary access of information by unauthorized persons. Even though, most of the devices have an inbuilt password protection system third party applications can be used to offer higher levels of security access. This will make it difficult for individuals to access valuable data in the devices therefore securing such data against people who many use it against the company. A mobile management system can be installed to enforce reasonable security form data stored or transmitted by the devices. This system should incorporate all mobile devices and other wireless devices that are used by the employees of an entity.

It is necessary to determine the files that can and cannot be downloaded by every individual that uses a mobile device. Rules should be established that govern downloading of such files. The established rules should be enforced by all ways available to the company. These means may include port locking, regulating data from exposure and protection of the company’s most sensitive data. Encryption should be done on specific files or the mobile device entire contents depending on the security needs for transmitting and storing sensitive information on the devices (Munoz 2011).

Connection security standards involving all transmissions to mobile devices should be enforced to ensure that all transmissions are secure. Companies can also use firewalls and virus protection in all mobile devices, and these should be up to date always in order to be effective. The updates should be downloaded regularly from a central server that is trusted and reliable. A mobile device should incorporate a lock and kill capability. This will ensure that once a device is reported missing, and an attempt is made using such device to connect to the company network, or a device does not connect within a specified period, the data should be wiped out automatically in memory of the device. Mobile devices use should be logged in order to access sensitive data. This will ensure that such data is not accessed by unauthorized persons, and any access is controlled and known (Munoz 2011).

Mobile devices are subjected to hacking at a higher rate than non-mobile devices. Discuss methods of making mobile devices more secure.

Most of the mobile devices perform numerous functions that involve internet access, voice calls, text messaging, voice calls, access to computers and networks and emails. A number of these devices include near field communication abilities allowing the user to perform transactions using the debit or credit cards or even using the devices as an ID or keycard. In today’s mobile society, the use of mobile computing cannot be overemphasized because these devices are taking the place of desktop computers because of their accessibility. These devices are known to increase the productivity of organizations, but they pose a significant challenge to organizations (Smith 2011).

The use of mobile devices has made it possible to access personal sensitive and private information stored in them. From the nature of these devices, it is difficult to implement physical controls. Organizations of late have seen an increase in the use of personal mobile to carry out business responsibilities has increased the risk exposure of most organizations. Mobile devices have a substantial benefit to an organization because of their portability capabilities, and this is the reason as to why the risks of such devices are high (Smith 2011).

The ability of mobile devices to store enormous volumes of data can be a challenge in the event of unauthorized access of such data through devise theft, loss or interception of transit data. These devices are capable of carrying malware that can be used for malicious activities. Chances of eavesdropping and location tracing are high because mobile devices do have cameras and onboard microphones (Smith 2011).

To overcome the above challenges, organizations should ensure that mobile devices protection is their primary task. An organization can undertake the following to secure its mobile devices and protect its self against any risks that result from the muse of such devices. A policy on information storage using mobile devices should be developed. Such a policy should incorporate personal devices that are used for business purposes (Smith 2011).

The security of mobile devices is paramount, and this means that these devices should be kept secure. At the same instance, control the data stored in such devices to minimize the loss in the event that there is a breach in the security of the device. Sensitive data should not be stored in the devices, but in a secured central location where access is restricted to a limited number of people. Passwords and personal identification numbers should be used to access the devices (Smith 2011).

Where a device is used specifically for business purposes, the password policy developed by the organization should be followed. It is good practice to disable services and features not used for instance Bluetooth, GPS and Wi-Fi and where such are in use, the default password should be changed. Storage encryption should be enabled to protect stored data in the event that the mobile device is stolen or lost. Install antivirus into mobile devices if it is available to detect or prevent malware designed specifically for mobile devices (Smith 2011).

Application software and systems should be patched because it is possible to update them in order to control known vulnerabilities. Applications should be downloaded from vendor authorized sites. Other sites that offer free games should be avoided because they are sources for malware. Where downloads are used, it is necessary to follow the policies developed by organization in relation to downloading applications. Attachments from un-trusted sources should not be opened. It is advisable not to follow links that lead to un-trusted sources. In the event that you lose your devise, it is good practice to report this to your organization or carrier. When you dispose off your devise, it is necessary to wipe out all data contained in it (Smith 2011).

References

Muttik Igor, (2011). Securing mobile devices present and future. From <http://www.mcafee.com/us/resources/reports/rp-securing-mobile-devices.pdf>.

Munoz, D., Lara, F. B., Vargas, C., and Enriquez-Caldera, R, (2009). Position Location Techniques and Applications. Academic Press

Smith D. Thomas, (2011). NYS office of cyber security monthly security tips newsletter, vol 6 issue 6. From <http://www.dhses.ny.gov/ocs/awareness-training-events/news/documents/2011-06.pdf>.

Vivoni R. Enrique, Richard CamilliReal-time streaming of environmental field data Computers & Geosciences 29 (2003) 457–468. From <http://www.whoi.edu/cms/files/Vivoni_and_Camilli_2002_47236.PDF>.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Term Paper Samples & Examples

5 Ways Intersectionality Affects Diversity and Inclusion at Work, Term Paper Example

I have always been interested in politics and how the government functions as a young man. I now have a plethora of information and understanding [...]

Pages: 5

Words: 1355

Term Paper

Combating Climate Change Successfully Through COP26 Glasgow 2021, Term Paper Example

The 26th conference of the parties COP26 held in Glasgow in 2021 was a significant moment in global politics to pursue the participation of various [...]

Pages: 9

Words: 2580

Term Paper

Telehealth, Term Paper Example

Telehealth technology has been increasingly used as a means of providing healthcare services to patients, especially during the COVID-19 pandemic. The use of telehealth technology [...]

Pages: 3

Words: 848

Term Paper

Impact of Spanish, Mexican, and Anglo Social Ordering on Mexican-American Culture in California, Term Paper Example

Since California has been ruled by the Spanish, the Mexicans, and the English, the culture of Mexican Americans in the state has evolved at various [...]

Pages: 7

Words: 1809

Term Paper

Empowerment and Social Change, Term Paper Example

The films Calendar Girls (2022) and Raise the Bar (2021) explore empowerment and social change themes. Both films revolve around female protagonists who challenge stereotypes [...]

Pages: 2

Words: 642

Term Paper

Directed Energy Ethics, Term Paper Example

Introduction The use of directed energy weapons is controversial, with many arguing for and against them. Directed energy weapons are a type of weapon that [...]

Pages: 18

Words: 4973

Term Paper

5 Ways Intersectionality Affects Diversity and Inclusion at Work, Term Paper Example

I have always been interested in politics and how the government functions as a young man. I now have a plethora of information and understanding [...]

Pages: 5

Words: 1355

Term Paper

Combating Climate Change Successfully Through COP26 Glasgow 2021, Term Paper Example

The 26th conference of the parties COP26 held in Glasgow in 2021 was a significant moment in global politics to pursue the participation of various [...]

Pages: 9

Words: 2580

Term Paper

Telehealth, Term Paper Example

Telehealth technology has been increasingly used as a means of providing healthcare services to patients, especially during the COVID-19 pandemic. The use of telehealth technology [...]

Pages: 3

Words: 848

Term Paper

Impact of Spanish, Mexican, and Anglo Social Ordering on Mexican-American Culture in California, Term Paper Example

Since California has been ruled by the Spanish, the Mexicans, and the English, the culture of Mexican Americans in the state has evolved at various [...]

Pages: 7

Words: 1809

Term Paper

Empowerment and Social Change, Term Paper Example

The films Calendar Girls (2022) and Raise the Bar (2021) explore empowerment and social change themes. Both films revolve around female protagonists who challenge stereotypes [...]

Pages: 2

Words: 642

Term Paper

Directed Energy Ethics, Term Paper Example

Introduction The use of directed energy weapons is controversial, with many arguing for and against them. Directed energy weapons are a type of weapon that [...]

Pages: 18

Words: 4973

Term Paper