Mobile Computing Essays (Examples)

356+ documents containing “mobile computing”.
Sort By:
By Keywords
Reset Filters

Example Essays

Essay
Mobile Computing and Social Networks There Are
Pages: 10 Words: 3227

Mobile Computing and Social Networks
There are many mobile apps in the market that have been designed to cater for various tasks and processes. Mobile apps were initially designed for gaming but improvements have been made to ensure that they can be used for business purposes. Applications have been designed to improve efficiency of mobile devices. Users have been able to make use of mobile phones to replace devices such as desktop computers and cameras.

Effectiveness and efficiency mobile-based applications

Technological advancements in the field of communication have undergone numerous changes over the decade. Mobile phones conventionally used for basic communication can now be used to conduct more features. The software being used in the mobile devises have enabled the devises to be used for more application than communication. The mobile devices being sold in the market are considered smart phones due to the array of applications that they can undertake. Apple Inc.…...

mla

References

B'Far, R. (2004). Mobile computing principles: Designing and developing mobile applications with UML and XML. New York: Cambridge University Press

Bohner, B. (2009). Disaster Recovery -- Extra Considerations for Extra Technologies. System Inews, (360), 13.

Hernack, B. (2006). Improving Bluetooth Security: What IT Managers and Mobile Device Users Can Do. Information Systems Security, 15(4), 39-42.

Sarno, T. (2010). Choosing the right mobile platform. Apc, 30(9), 100.

Essay
Mobile Computing Assessing Alternatives for
Pages: 8 Words: 2320

It is the most ambitious option yet also the greatest in terms of retaining and gaining customers over time. It would literally include integrating supply chain, pricing, manufacturing, logistics, field service and customer service all together into an enterprise platform. In effect a Service oriented Architecture (SOA) with integration to Cloud Computing services and platforms (Birch, 37) would need to be completed. This would also rely on real-time data from manufacturing and distribution through FID systems integration which would in effect many the entire company customer-centric and demand-driven (Wang, Chen, Xie, 2512, 2513).
ecommendation

Clearly the option of doing nothing is not acceptable as Web 2.0 technologies, the catalyst behind social networks, combined with Web Services and streamlined XML messaging, are revolutionizing the use of mobile computing platforms. To do nothing is invite customer churn given how quickly customer preferences are changing for using mobile computing channels to communicate with, learn…...

mla

References

Bernoff, J., and C. Li. "Harnessing the Power of the Oh-So-Social Web. " MIT Sloan Management Review 49.3 (2008): 36-42.

(see attachment for this reference)

Birch, D. "The future - mobile channel and clouds. " Financial World 1 Dec. 2009

The future - mobile channel and clouds

Essay
Mobile Services Safety Security Usage
Pages: 22 Words: 5950

Many researchers have conducted studies on many aspects of m-commerce and the use of mobile technology by consumers. deuyter, Kleijnen, & Wetzels (2006) stated, "M-commerce has been heralded repeatedly as the new service frontier of the millennium. Present market reality, however, seems to be less optimistic, therefore, the current study explores the factors contributing to the adoption of mobile services in a context of wireless finance" (p. 206).
Organization of the Study

Chapter two will consist of the literature review of published works and research studies on the subject of mobile commerce. There are many points-of-view and definitions of m-commerce and this chapter will attempt to examine the data as it relates to what is also referred to wireless e-commerce.

Chapter three through chapter five will substantiate and provide the details of the research methodology utilized for collecting the data. The collected data will be used to answer the research questions.

The author…...

mla

References

Amin, H., Hamid, M., Lada, S. & Tanakinjal, G. (2006). Undergraduate attitudes and expectations for mobile banking [Electronic Version]. Journal of Internet Banking & Commerce, 11(3), 7-7.

Bhatti, T. (2007). Exploring factors influencing the adoption of mobile commerce [Electronic Version]. Journal of Internet Banking & Commerce, 12(3), 1-13.

Birch, D.G.W. (2007). Near-field is nearly here [Electronic Version]. Journal of Telecommunications Management, 1(1), 55-68.

Brown, L. (n.d.). Observational Field Research. Retrieved January 24, 2009 from, http://www.socialresearchmethods.net/tutorial/Brown/lauratp.htm

Essay
Mobile and Cloud Computing
Pages: 8 Words: 3517

Mobile & Cloud Computing
Cloud Computing

Author's note with contact information and more details on collegiate affiliation, etc.

This paper will define cloud computing and mobile cloud computing even while there is no current consensus on their definitions as it is a newly forming field of study and technology. The paper will additionally describe the utility and the structure of mobile cloud and cloud computing. Furthermore, the paper will address topics within the area of mobile cloud and cloud computing that are ripe for intensive research and elucidation. The paper will conclude by offering a sort of philosophical and economical cost-benefit analysis of mobile cloud and cloud computing, as well as select an area of research within this field -- specifically security and privacy issues in mobile and cloud computing use.

The Internet is a piece of technology that has forever changed society. Within its short history, the Internet has changed the experience…...

mla

References & Related Works:

Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., & Zaharia, M. (2010) "A View of Cloud Computing." Communications of the Association of Computing Machinery, 53(4), 50 -- 58.

Birman, K., Chockler, G., & van Renesse, R. (2008) "Towards a Cloud Computing Research Agenda." LADIS Conference, Available from 2012 January 21.

Grossman, R.L. (2009) "The Case for Cloud Computing." IEEE Computer Society, Available from 2012 January 19.

Huang, D. (2011) "Mobile Cloud Computing." IEEE COSMOC MMTC E-Letter, Available from 2012 January 21.

Essay
Mobile Adhoc Networks Manet the
Pages: 13 Words: 3549

Much work remains to enable a seamless
Integration, for example that can extend IP to support mobile network devices. (Chlamtac, Conti, and Liu, 2003)

4G is stated to begin with the assumption "that future networks will be entirely packet-switched, using protocols evolved from those in use in today's Internet." (Chlamtac, Conti, and Liu, 2003) It is reported that a 4G wireless network that is all IP-based "has intrinsic advantages over its predecessors." (Chlamtac, Conti, and Liu, 2003)

IP is stated to be both compatible with and independent of "the actual radio access technology" meaning that 'the core 4G network can be designed and evolves independently from access networks. Using IP-based core network also means the immediate tapping of the rich protocol suites and services already available, for example, voice and data convergence, can be supported by using readily available VoIP set of protocols such as MEGACOP, MGCP, SIP, H.323, SCTP. Finally the…...

mla

Bibliography

Macker, J. And Corson, S. (1999) Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. Network Working Group. Naval Research Laboratory, January 1999. Online available at:  http://www.ietf.org/rfc/rfc2501.txt 

A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks (2006) Silcon.com

Springer Science+Business Media. 10 May 2006.

Gaertner, Gregor and Cahill, Vinny (2004) Understanding Link Quality in 802.11 Mobile Ad Hoc Networks," IEEE Internet Computing, vol. 8, no. 1, pp. 55-60, Jan./Feb. 2004,

Essay
Mobile Devices Networking Performance and Security Related Issues
Pages: 7 Words: 2206

Abstract - With regard to security, the major issue is that most mobile devices are targets that are in line to face attacks. Mobile devices face a range of threats that capitalize on several susceptibilities usually obtained in such devices. Lack of encryptions is a major threat to security of mobile device networks. Information such as text messages and electronic messages that are sent using a mobile device are more often than not unencrypted. Furthermore, numerous mobile device applications lack such encryptions over the networks for transmission and reception and therefore simplify the process of data interception. Malware is an additional problem regarding mobile device networks. It is simple for mobile device users to download malware through games and security patches and also through online advertisements. Consequently, this makes it significantly easy for data interception owing to spyware and Trojans. The lack of security software is also a major issue.…...

Essay
Mobile Phone Policy for Protecting Data and IP
Pages: 2 Words: 592

Mobile Device Security PolicyA hand-held mobile device security policy is crucial for any company that values the protection of its intellectual property and confidential data (Zafar, 2017). In today\\\'s fast-paced business environment, employees are increasingly using their personal smart phones and tablets for work-related tasks, and it is essential that a comprehensive policy is in place to mitigate the risk of data breaches and loss of intellectual property. What follows is this companys policy, which is applicable for both company-owned and employee-owned devices.This policy prohibits of the use of unapproved apps, such as third-party cloud storage services, on company-owned devices. This is important because these apps may not have the same level of security as the apps approved by the company and may put sensitive information at risk. Additionally, the policy restricts the use of the camera and other functions, such as Bluetooth, on company-owned devices to prevent the unauthorized…...

mla

ReferencesAldawood, H., & Skinner, G. (2019). Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues. Future Internet, 11(3), 73.Zafar, H. (2017). Mobile computing and hand?held devices at work. The Wiley Blackwell handbook of the psychology of the internet at work, 195-210.

Essay
Mobile and Wireless Portal Eweek com Is a
Pages: 3 Words: 795

Mobile and Wireless Portal
eWeek.com is a one of the top portals that is dedicated to providing technology-related news to readers all over the world. It is the digital version of the eWEEK magazine that discusses technology trends, latest apps, evaluations and business decisions that are made with technology as the underlying element. It provides comprehensive information about the world of technology and this has helped it to create a niche market for the magazine and its parent company.

Description of the portal's structure

The portal has a simple design that is appealing to readers. The core emphasis in this website is content and so the entire design revolves around the content that is published here. The site has been divided into numerous categories to make it easy for people to look up what they want quickly and effortlessly. The broad categories in the site include news, reviews, storage, security, desktops/notebooks, mobility, application…...

mla

References

Mobile and Wireless Technology -- News and Reviews. (2011). Retrieved from:  http://www.eweek.com/c/s/Mobile-and-Wireless/

Essay
Arby Fields Computing Networking and Information Technology
Pages: 12 Words: 4378

Arby Fields: Computing, Networking, And Information Technology Hardware and Software ecommendations
Fields Comprehensive Youth Services Inc. (FCYS) is a small nonprofit company based in southern California that serves adolescent male who are dependent and delinquent minors. FCYS has thirty employees. This study addresses the computing needs of the organization including hardware and software requirements as well as requirements for information technology security in the organization.

The purpose of this study is to identify computing hardware and software requirements for Fields Comprehensive Youth Services, Inc. In addition to the requirements of the organization for information technology security to protect the system chosen for implementation. This organization is presently utilizing four desktop computers purchased in 2005. The organization needs to purchase a solution that will accommodate future needs of cloud computing and to enable internal file sharing among multiple client sites. Another problem the organization faces is the manner in which documents are saved…...

mla

References

"File organization tips: 9 ideas for managing files and folders," (n.d.). Microsoft At Work. Retrieved online: http://www.microsoft.com/atwork/productivity/files.aspx#fbid=DGw21-iW9OY

"Software Requirements for Office 365," (2013). Retrieved online: http://onlinehelp.microsoft.com/office365-enterprises/ff652534.aspx

Belding-Royer, Elizabeth M; Al Agha, Khaldoun; Pujolle, G. (2005) "Mobile and wireless

Bright, P. (2013). Windows XP, Internet Explorer 6, Office 2003 enter their final support year. Arstechnica. Retrieved online: http://arstechnica.com/information-technology/2013/04/windows-xp-internet-explorer-6-office-2003-enter-their-final-support-year/

Essay
Apriori a Mobile Product Recommendation System Interacting
Pages: 2 Words: 569

APriori
A Mobile Product Recommendation System Interacting with Tagged Products

Reischach, F., Guinard, D., Michahelles, F., & Fleish, E. (2009). A Mobile Product Recommendation System Interacting with Tagged Products. Pevasive Computing and Communications, 1-6.

The article pertains to a design for a communication system that lets peers share opinions and recommendations about products or services using their mobile phone. Users of the system, APriori, will leverage some of the potential inherent in technologies usch as auto-ID-enabled mobile phones that are either barcoded or potentially outfitted with RFID chips. Using peer reviews for purchasing decisions is not a new phenomenon by any means. Online companies like the retailer Amazon has allowed consumers to provide their reviews and opinions about products for years and most of the larger online retailers have also done the same. APriori's niche seems to be the fact that these reviews can be entered and accessed via a mobile phone and…...

Essay
Cloud Computing and Technology
Pages: 2 Words: 619

Cloud Computing Governance
There are many issues and implications that must be taken seriously when it comes to cloud computing. While the possibilities and capabilities that are newly or more significantly realized by cloud computing are fascinating and voluminous, so too are the security risks and ethical quandaries that can and do come up when it comes to the subject. With that in mind, this report shall cover two main topics that are related to cloud computing. The first is how cloud computing is and should be influenced by corporate governance and the broad impact of cloud computing on mobile computing will be assessed as well. While there are immeasurable benefits and perks to moving to a cloud-based solution, there are security, logistical and ethical concerns that must be address.

Analysis

When it comes to corporate governance, the main thing to keep in mind is that the laws and regulations that must be…...

mla

References

Speed, R. (2016). IT Governance and the Cloud: Principles and Practice for Governing Adoption of Cloud Computing. Isaca.org. Retrieved 15 August 2016, from  http://www.isaca.org/Journal/archives/2011/Volume-5/Pages/IT-Governance-and-the-Cloud-Principles-and-Practice-for-Governing-Adoption-of-Cloud-Computing.aspx 

Technopedia. (2016). What is the difference between cloud computing and mobile computing?. Techopedia.com. Retrieved 15 August 2016, from  https://www.techopedia.com/7/29697/technology-trends/what-is-the-difference-between-cloud-computing-and-mobile-computing

Essay
Cloud Computing and Computing
Pages: 25 Words: 7745

isk, isk Management Strategies, and Benefits in Cloud Computing
SITUATIONAL ANALYSIS

PEMISE STATEMENT

KEY DEFINITIONS

SEVICE AND DEPLOYMENT MODELS

BENEFITS OF CLOUD COMPUTING

SECUITY ASPECTS

Storage

eliability

Virtualization

Trust

Physical Security

Legal Compliance

CLOUD COMPUTING ISKS

ISK Management STATEGIES

Vendor Evaluation

Centralized Information Governance

Other Organization-Level Measures

Individual-Level Security Measures

Cloud computing model

Cloud computing service and deployment models

ISO/IEC broad categories

The emergence of cloud computing has tremendously transformed the world of computing. Today, individuals, organizations, and government agencies can access computing resources provided by a vendor on an on-demand basis. This provides convenience, flexibility, and substantial cost savings. It also provides a more efficient way of planning disaster recovery and overcoming fluctuations in the demand for computing resources. In spite of the benefits it offers, cloud computing presents significant security concerns, which users must clearly understand and put strong measures in place to address them. Users are particularly concerned about the privacy and confidentiality of their information as well as the integrity and capacity of the vendor. Cloud computing may…...

mla

REFERENCES

Abiodun, A. (2013). A framework for implementation of risk management system in third party managed cloud. Journal of Information Technology & Economic Development, 4(2), 19-30.

Ahmed, N., & Abraham, A. (2013). Modeling security risk factors in a cloud computing environment. Journal of Information Assurance and Security, 8, 279-289.

Alali, F., & Yeh, C. (2012). Cloud computing: overview and risk analysis. Journal of Information Systems, 26(2), 13-33.

Alijani, G., Fulk, H., Omar, A., & Tulsi, R. (2014). Cloud computing effects on small business. Entrepreneurial Executive, 19, 35-45.

Essay
Mobile Commerce on Home Control System
Pages: 6 Words: 1893

home control system using mobile commerce -- or, how your cell phone can connect you to your home when you are away from home
For better or for worse, the cell phone technology has changed modern communication and modern life. Mobile communication systems have undoubtedly made modern human beings more 'connected' to one another, or at least more able to talk to, or to reach one another, at any point in time. Now, an individual with a 'switched on' cell phone can always be accessed through the use of mobile cell phone technology -- barring any interference from poor connections or poor service, of course! However, besides simply being able to talk to others more easily, mobile phones can also make it easier to access other aspects of one's daily existence, from one's calendar, list of frequently called numbers, and yes, one's home.

The ability of mobile commerce to connect consumers…...

mla

Works Cited

Forbes.com Staff. "Nortel Networks." (February 19, 2004). Forbes.com Retrieved on February 19, 2004 at site= http://biz.yahoo.com/n/N/NT.html http://www.investorguide.com/cgi-bin/browse1.cgi?tick=NT&

"Home Control Systems." (2004). Electronic House Magazine. Retrieved on February 4, 2004 at  http://www.electronichouse.com/default.asp?NodeId=1200 

'Motorola." (February 18, 2004). Business.com. Retrieved on February 4, 2004 at   / 'Motorola: and Leading Developers Add Multimedia and Connectivity to Feature Phone Reference Design. (2004). CNBC.com. Retrieved on February 4, 2004 at http://www.investorguide.com/cgi-bin/browse1.cgi?tick=MOT& site= http://news.moneycentral.msn.com/ticker/rcnews.asp?Symbol=MOT http://www.business.com/directory/telecommunications/motorola,_inc/profile 

'Market Report -- In Play." (February 19, 2004). Briefing.com. Retrieved on February 4, 2004 at site=http://www.investorguide.com/cgi-bin/browse1.cgi?tick=MOT&

Essay
Virgin Mobile E-Business Assessing Lessons
Pages: 5 Words: 1582

S. government the right to track the statistics of every phone call made in the U.S. And especially in prepaid and pay-as-you-go cell phones vs. consumer privacy is a continued debate. The fact that those looking to do illegal transactions and not have their numbers traced prefer prepaid phones due to their lack of accountability is putting Virgin Mobile USA in an ethical bind. They cannot willingly give up consumer data, only to the extent the Patriot Act requires it. The ethics of this are challenging when the reliance on customer data for new business growth is also taken into account. The need for transparency and the defining of trust-based measures of performance and privacy is critical however for Virgin Mobile USA to hold onto their customers (McCole, Ramsey, Williams, 2010)
Conclusion

Virgin Mobile USA shows how to successfully implement a Joint Venture that includes system and process integration. The focus on…...

mla

Bibliography

Joseph a Bellizzi. (2000). Drawing prospects to e-commerce Websites. Journal of Advertising Research, 40(1/2), 43-53.

Fletcher, M.. (2009, March). How to create the perfect e-commerce website. Revolution,60-61,63.

Ghandour, a., Benwell, G., & Deans, K.. (2010). Measuring eCommerce Website Success. Interdisciplinary Journal of Contemporary Research in Business, 1(12), 21-41.

Gomez, J., & Lichtenberg, J.. (2007). Intrusion Detection Management System for eCommerce Security. Journal of Information Privacy & Security, 3(4), 19-31.

Essay
Cloud Computing Will Be Discussed to Show
Pages: 26 Words: 9986

cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public.
In completing a dissertation, it is very hard to go through the challenges that it requires. From the start and until this moment, I had gone through many challenging stages. The challenges that I faced were deciding the topic, reading various journals and articles, narrowing down focus within a large area, getting information on cloud computing, which all required time and effort. Despite the strong tasks that I faced, I finally made it and the 'final product' is about to be released. I feel extremely happy to have this chance to learn through the process since…...

mla

2009. Benefits, risks and recommendations for information security. Internet document.

2010. Cloud Computing Security. Viewed 30 April 2010.  http://www.computer.org/portal/web/computingnow/spcfp6 

2010. Cloud Computing: IT's role in governance. Viewed 30 April 2010. http://blog.bluelock.com/blog/benefits-of-cloud-computing

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now