Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 7: ISSUES AND CHALLENGES IN MOBILE COMPUTING - Coggle Diagram
Chapter 7: ISSUES AND CHALLENGES IN MOBILE COMPUTING
Lack of Standards:
Mobile platform lacks standardized APIs and interfaces.
Vendors implement behaviors differently.
Some vendors create entry-level phones with fewer features.
Device fragmentation:
Different screen aspect ratios.
Varying screen sizes.
Varying features across devices.
Connectivity:
Disconnections are common.
Low bandwidth due to shared network resources.
Heterogeneous network connections.
Security risks are higher in wireless communication.
Portability:
Low power consumption is crucial.
Risks to data include physical damage and unauthorized access.
Limited storage capacity due to physical constraints.
Rapid Technology Growth:
Mobile technology evolves rapidly.
Devices become obsolete quickly.
New releases of operating systems introduce new features and APIs.
Open Handset Alliance has released multiple Android OS versions within a year.
Bring Your own Device Policy (BYOD)
Encourages employees to use personal devices for accessing enterprise systems and data.
The need for BYOD:
Organizations face pressure to keep up with rapid-paced mobile computing advancements.
Maintaining corporate mobile devices is costly and they quickly become outdated.
Employees prefer using their own devices for familiarity and flexibility.
BYOD allows employees to access corporate networks and work on personal devices.
Some companies offer allowances or subsidies for compatible mobile devices.
Advantages of BYOD:
Reduces costs for companies and service firms.
Simplifies maintenance of corporate mobile devices.
Companies only need to maintain server-side services.
Improves employee satisfaction.
Takes advantage of new devices and features.
Disadvantages of BYOD:
Employee devices may be infected with viruses or malware, risking corporate network security.
Corporate data stored on employee devices may fall into wrong hands.
Employee devices may contain malware compromising corporate network security.
Common BYOD Policies:
Employees must sign BYOD policy agreements before accessing corporate networks.
Policies may include restrictions on cameras, strong PIN/password requirements, device traceability, app installation, and data storage.
BYOD Policy Problems:
Ensuring employee adherence to policy.
Ensuring use of strong passwords and data storage practices.
BYOD Solution: Mobile Device Management (MDM):
MDM tools ensure employee compliance with BYOD policies and safeguard corporate data on employees' devices.
Common Components of BYOD Policy:
Acceptable Use
Allowed Device and OS Types
Reimbursement Policy
Security Measures
Liabilities and Risks
Ethical Issues and Privacy Concerns
Developers should avoid collecting Personal Indefinable Information (PII) directly.
If PII collection is necessary, inform users through a privacy policy.
Take steps to protect PII as developers are liable for its security.
Loss of PII can lead to identity theft or fraudulent use.
Legal Acts concerning PII:
Personal Data Protection Act 2010 (PDPA) regulates the processing of personal data.
Non-compliance penalties range from RM100k - 500k and/or 1 – 3 years imprisonment.
PDPA covers principles like notices, disclosure, retention, security, access, and data integrity.
Protection of PII:
Notify users about data collection and transmission.
Explain the purpose and usage of collected data.
Provide opt-out mechanisms for data removal.
Disclose data retention length and third-party data sharing.
Best Practices when collecting PII:
Don’t Bait and Switch: Use data for the original intended purpose only.
Get users consent: Inform users about data collection, purpose, and retention.
Only disclose crucial data: Disclose data to third parties only for contract fulfillment.
Do not keep data longer than necessary: Long-term data retention increases legal liabilities.
Location and Privacy:
Location reporting is common in mobile applications and falls under PII.
Disclose whether location information is stored locally or on remote servers.
Encrypt connections for location detection features to prevent data leakage.
Location and Privacy: Best Practices:
Request permission from users to detect location.
Do not share location without explicit user permission.
Provide options for users to limit location visibility.
Avoid caching user locations on the device unless necessary for GPS lock
Future of Mobile Computing
Rapid growth and advancement of technologies in mobile computing.
Anticipated emergence of amazing products in the field.
Features of Future Mobile Computing Devices:
Hardware:
Lighter
smaller
improved energy management.
Enhanced user interface.
High bandwidth facility for faster data transfer.
Improved radio technology and antennas.
Integration of compact-sized integrated circuitry.
Increases in computer processor speeds.
Shift in industrial paradigm towards end-to-end information systems.
More interactive interactions facilitated by mobile devices.
Utilization of artificial intelligence in mobile computing.