Please enable JavaScript.
Coggle requires JavaScript to display documents.
Topic 7: ISSUES AND CHALLENGES IN MOBILE COMPUTING - Coggle Diagram
Topic 7: ISSUES AND CHALLENGES IN MOBILE
COMPUTING
Lack of Standards
Vendors tends to implement the
behavior differently
Not all mobile devices are created equally, some
vendors have to give in to market demand.
Developing entry level phones which lacks certain features
present in mid-range or high-end phones
Device Fragmentation
Refers to devices which do not
conforms to certain set of standards
Example
Have different screen aspect ratio
Different screen sizes
Contains features absent in other phones
Poses challenges to application developers as they need to test their application on multiple devices to ensure compatibility
Connectivity
Disconnections
Wireless communication is so susceptible to
disconnection
Low Bandwidth
Network bandwidth is divided among the
users sharing a cell
Heterogeneous Network
Mobile computers encounter more
heterogeneous network connection
Security Risk
Security of wireless communication can be compromised much more easily than that of wired communication
Portability
Low Power
Too small a battery can undermine the value of portability by causing users to recharge frequently, carry spare batteries
Risks to Data
risk of physical damage, unauthorized
access, loss and theft
Small Storage Capacity
Limited by physical size and
power requirement
Rapid Technology Growth
Mobile device has grown rapidly in the last few years
Devices that are bought in 2012 may already be obsolete
by today’s standards
Each new releases introduces new API and features
which may obsolete older devices
Bring Your own Device Policy (BYOD)
Practice where employees are encouraged to make use of their personal devices to access enterprise systems and data
Need for BYOD
Organization/Companies felt the pressure of keeping up with the technology as the advancement of mobile computing has becoming more rapid-paced
The costs of maintaining a series of corporate mobile devices has becoming more costly
The employees would prefer to use their own devices to do their work as it would grants them familiarity and flexibility
Advantages of BYOD
Reduction of costs for Companies and Service Firms
Reduced complexities of maintaining corporate mobile
devices
Companies only has to maintain server side services
Improved employees satisfaction
Take advantages of new devices and cutting-edge features
Disadvantages of BYOD
Employee devices might be plagued with viruses or
Malware
The corporate data might be cached or stored in the
employees’ devices
The employee devices might contain malware or applications which may compromise the security of the corporate network
Common BYOD Policies
Camera are disallowed within working hour
Device must be protected with strong Passwords
Device must be traceable by the organization
Employee must not install dangerous application on their
devices
Employee must not store corporate data in memory card
BYOD Policy problem
How organization ensure Employees would adhere to policy
How company ensure employee would use strong
password
How company ensure employee won’t store
sensitive session in removable Memory card
BYOD Solution:
Mobile Device Management (MDM)
Tool which the organization can use to ensure employee would not breach corporate policies and to safeguard corporate data stored in its employees’ phone
Common Components of BYOD Policy
Acceptable Use
Types of Allowed Device and Operating System
Reimbursement Policy
Security
Liabilities & Risks
Ethical Issues and Privacy Concerns
Legal Acts concerning PII
Personal Data Protection Act 2010 (PDPA)
regulates the processing of personal data in regards to commercial transactions
Developer must ensure
Notify the users which data are being collected and to whom
the data are transmitted
Explain the purpose of Data collection
Explain how the data will be used
Provide an opt-out mechanism for users to remove their data
Explain the length of data retention
Whether or not the data are being sold or transmitted to a 3rd
party
Best Practices when collecting PII
Don’t Bait and Switch
Use data for their original intended purpose
only
Get users consent
Always inform user of which data are being collected, its purpose and for how long the data are going to be kept
Only disclose crucial data
Only disclose data to 3rd party for the purpose of fulfilling contract, do not collect excessive data as it might become a liability
Do not keep data longer than necessary for the intended
purpose
Location and Privacy
Application must disclose whether location information is
stored in the device or on remote server
Any connection that peruse location detection features
must be encrypted to prevent data leakage
Best Practices
Always request permission from users to detect
location
Do not share users location with 3rd party
Always provide option for the users to limit their
location visibility
Do not cache user locations on the device