As with most areas of computing, security in mobile computing is a paramount concern. This includes securing the user’s information on the mobile device, encrypting the information during the transmission of the data to the server, and securely storing th

computer science

Description

NCU-Week 3 - Assignment: Search and Review Literature related to Mobile Computing-Due February 28th (If you can turn in earlier please let me know).

 

Log In Credentials:

Website: https://ncuone.ncu.edu/

 

Username: R.Fields5765@o365.ncu.edu

 

Password: Ap1@8w0j!Fd_n*H9p

 

 

Previous Next 

Instructions

As with most areas of computing, security in mobile computing is a paramount concern. This includes securing the user’s information on the mobile device, encrypting the information during the transmission of the data to the server, and securely storing this information on the backend server. Security vulnerabilities in mobile computing may not only affect a user’s perception of an app, but may also leave an organization open to legal and ethical dilemmas.

One manner in which mobile apps provide security and privacy to a user is through their use of permissions. On both Android and iOS devices, permissions protect an app from accessing sensitive information or functionality—such as reading SMS messages, accessing a user’s contacts, or placing phone calls. App permissions have received a significant level of research in recent years from a variety of perspectives, including user comprehension of permissions and using permissions to properly protect against malicious software.

An older, but still very popular, work available in the NCU ACM Library is titled “Android Permissions Demystified.” Please read this work, included in this week’s Books and Resources, to understand some of the primary challenges related to mobile permissions and security. Your task for this week is to use the NCU Library and find a recent (published within the past two years) work that discusses any area of mobile permissions, including user perception/compression, malware protection, updated permission models, or best practices. In your analysis of this work, you should include the following:

·         What is the significance of the problem this work is attempting to address?

·         What is the process this work uses to address the issue?

·         What are some improvements/future work you would propose?

·         What are some challenges to making these improvements?

·         What are some related works to this topic, and how do they differ from the analyzed work?

Length: 5-7 pages not including title page and references

Your assignment should demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards. Be sure to adhere to Northcentral University's Academic Integrity Policy.

Upload your document and click the Submit to Dropbox button.

 

 

Mobile Computing: Introduction

Reflect in ePortfolioSubmit FeedbackDownload

 

Mobile computing is a vast topic area, ranging from mobile application development to the large enterprise systems that support these applications. Understanding how this complicated mobile ecosystem can be developed, utilized, and maintained is an important role for many technical managers. This week, you will research and analyze the motivations for mobile systems, the important considerations of their development, and their application to business organizations. The critical review of the literature provides a foundation of knowledge for you to continue investigating research-worthy problems both in the course and throughout your program of study.

Proper design and infrastructure are paramount for any technology project, but can be especially important when using mobile systems. There are typically several concerns that must be addressed when integrating mobile systems into an existing infrastructure. Some of the most paramount concerns are maintainability, compatibility, and scalability.

Be sure to review this week's resources carefully. You are expected to apply the information from these resources when you prepare your assignments.

 

 

Books and Resources for this Week

 

·         Atkins, A. S., Ali, A., & Shah, H. (2006). Extending e-business applications using mobile technology. Proceedings of the 3rd International Conference:

Link

 

You have viewed this topic

·         Picco, G. P., Julien, C., Murphy, A. L., Musolesi, M., & Roman, G.-C. (2014). Software engineering for mobility: Reflecting on the past, peering into

Link

 

You have viewed this topic

·         Felt, A. P., Chin, E., Hanna, S., Song, D., & Wagner, D. (2011). Android permissions demystified. In Proceedings of the 18th ACM Conference on Compute

Link

 


Related Questions in computer science category


Disclaimer
The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.