Mobile Based Applications and Geolocation
This term paper will access the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. I will evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications. I will examine the challenges of developing applications that run on mobile devices because of the small screen size. I will describe the methods that can be used to decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android. I will access how mobile applications require high availability because end users need to have continuous access to IT and IS systems. I will discuss ways of providing high availability. Finally I will discuss how mobile devices are subjected to hacking at a higher rate than non-mobile devices, and methods of making mobile devices more secure.
Mobile Computing and Social Networks
The issue of how mobile-based applications are at capturing customer data and tools that utilize geolocation technology, must begin with the overall situation of smartphone app usage and specific processes made in connection with mobile devices. Mobile device usage and the applications for the collection of user data has been predicted that by 2020 will be more than three billion mobile devices making 450 billion mobile transactions per year on the world wide web. (Apple, 2013) (Google, 2013) The current set of projections for 2020 is made based on future trends in the mobile market space,and is based the large number of companies that are taking note and preparing to use mobile based apps utilizing geolocat...
... middle of paper ...
...ed from www.bloomberg.com: www.bloomberg.com
www.usnews.com. (2013). Retrieved from www.usnews.com: www.usnews.com
Attractions, I. A. (2013). Iaapa.org. Retrieved from Iaapa.org: www.Iaapa.org
Cockerell, L. (2012). Retired, Executive Vice President of Operations for the Walt Disney World Resort. (M. Fafard, Interviewer)
Eckwilen, S. (2013). Senior Programmer Scientific Systems Disney. (J. Rosensteel, Interviewer)
Genix, J. (2012). Entertainment Leader. (J. Rosensteel, Interviewer)
Green, G. (2012). Entertainment Leader Disney's Animal Kingdom. (J. Rosensteel, Interviewer)
Hayes, P. (n.d.). Operations Manager. (J. Rosensteel, Interviewer)
Michael Fafard, I. (2013). International Certivied Attractions Executive. (J. Rosensteel, Interviewer)
Walt Disney Company. (2012). Walt Disney Company. Retrieved from Walt Disney Company: www.disney.com
Today many companies do their business directly from the iPhones. Business people and non-business people alike are using the iPhone in order to achieve most of their office work or maintain contact with their family and friends. For example, in the commercial sectors most employees nowadays execute many of their tasks from anywhere and not necessarily have to go to their office and login into their computers. By using the iPhone employees can create important documents, save important announcements and do important transactions by using the iPhone. On the other hand, people who are not in the business sectors use the iPhone for their personal use. For example, talk with their family, friends, or spend time doing web searching in different areas that they are interested in.
For most people, not having a cell phone is unimaginable and without one we feel disconnected from the world. The leading device that helps us survive and navigate through this current hi-tech world is the Apple iPhone. With features like 3G network capability and remote database access it offers full computer functionality in the palm of a hand. Besides voice calls and text messages, the iPhone allows for full web browsing, email, and allows the installation of applications to further enhance usability through its own AppStore. But what if one wanted to push the iPhone’s capabilities beyond the limit of what Apple is willing to provide? The answer can be found in our other world, the cyber-world.
Leber, J 2012. Questions for Mobile Computing | MIT Technology Review. [online] MIT Technology Review. Available at: [Accessed 22 May. 2014].
Global Positioning System (GPS) technology has been on the market for a number of years now. Originally developed by the military for logistical tracking and navigation, it has seen a number of applications for personal and commercial uses in recent years, with more coming down the development pipeline. GPS uses a constellation of low earth orbit satellites to determine the exact longitude, latitude and altitude of the user or vehicle with the tracking monitor. This location is determined by using trilateration between at least three, and preferably four satellites overhead.
Smartphone usage continues to soar as more and more users rely on their devices to perform routine tasks. This lets law enforcement agencies use location services to learn more about criminal activities; in addition, if you were injured, your cell phone would be able to automatically report your location to authorities. However, not all companies track their users for the sole person of bettering the greater good. Major technology companies such as Apple, Google, and Android take advantage of all those using their phones to stay connected and “on the grid”. The Web grid lets these companies track your routine activities so they can sell the analyzed information back to advertisers who will then customize their advertisements to target you specifically. In 2011, The Wall Street Journal discovered that Apple and Google were collecting personal and private location data on their iPhones or Android users. While Apple transmits your location back to central services every 12 hours, Google is capable of transmitting your location and
As we continue into the twenty-first century, one has to consider the importance of technology and its ever-growing influence in today’s world. Technology has allowed us to eliminate the physical boundaries of geography and create a space where data can be relayed throughout the world in a blink of an eye. In other words, communication has become part of a daily necessity. The use of cellular phones has grown exponentially since it was first made available to the public in 1984, when they were still large, bulky, and expensive. Today, almost everywhere you go, everybody has a cell phone. Sizes, shapes, and features vary, but they grow smaller and faster every year. It is not just the technology of phones that one must analyze, but the mobile service that is provided as well. In the United States, we have three major existing wireless service providers: AT&T Wireless, Verizon Wireless, Sprint, and T-Mobile. These carriers sell their service along with phones that are manufactured by Motorola, LG, Nokia, Blackberry, Apple, Samsung, and many more. We will focus on Verizon Wireless and how they utilize technology. We will also address the role of management, real estate, and future endeavors that lie ahead.
When devices were first equipped with global positioning systems, it was for the benefit of the people, but now it has become the opposite. Researchers can use the data taken from the Signaling System Seven to predict where people will be going next, revolutionizing the mastery of tracking. It is nearly impossible to prevent this unnecessary nuisance that these appliances provide, leaving those who are strongly against tracking to live in uneasiness. It doesn’t stop at tracking either as stated in Peter Maass’s article “That's No Phone. That's My Tracker.”, “Thanks to the explosion of GPS technology and smartphone apps, these devices are also taking note of what we buy, where and when we buy it, how much money we have in the bank, whom we text and e-mail, what Web sites we visit, how and where we travel, what time we go to sleep and wake up -- and more” (5). These devices are gaining more from us then we are from them, and as a consumer, this is outrageous. Appliances that were invented for enjoyment and entertainment have now been turned into something we should all
According to mobile industry analysts, the future global market for smartphones will be to reaching more than 650 million in upcoming years. The global smartphone market is dominated by Android, with 61 percent of the total market share and iOS from Apple with 20.5 percent of the global the total market share in 2014. This growth can be determined by factors including less demanding product cost, improved handset design and functionalities, emergence of internet data network technologies, adjustment and upgrade of operating systems. Consumer familiarity about the advantages offered by these devices, especially email and e-transactions, amongst others, would directed to smaller markets in the industry. Smartphones will be facing the concerns of demand in developing countries, especially Asia-Pacific. Emerging countries including will be expected to register significant increase in smartphone usage. (Global Data,
Alan Braverman – Senior Executive Vice President, General Counsel, and Secretary of The Walt Disney Company
Location-Based Service (LBS) is one of the most popular mobile services today, which offers wide range of services that are based on information about the physical location of a user or device. Typical LBS includes real-time turn-by-turn directions, find Points of Interest (POI) or social network services such as Facebook, Foursquare, Loopt, and Qype. However, user location privacy of is a major concern in today's mobile applications and there has been significant research dedicated to address this issue. Various location privacy preserving mechanisms (LPPMs) have been used to preserve the privacy of the location information of mobile users. This survey aims to present the privacy preserving mechanisms employed in the Location based services. Moreover, the LPPMs are classified into cryptographic and non-cryptographic mechanisms, and taxonomy of the mechanisms is also discussed. Furthermore, the classification and comparison of different mechanisms are presented based on the probability distribution attack. Also the strengths and weakness of different mechanisms are highlighted.
The significance of mobile applications, app stores, and closed vs. open app standards to the success or failure of mobile computing is that present day mobile users are very fond of applications. Generally, applications enrich the experience of using the device and allow for so many tasks and activities to be done all through your mobile device. When all that you need is on your mobile device, there is no requirement to have a desktop PC anymore. Applications also distinguish a company’s offerings from their competitor’s, giving them an edge when wanting to stand out in the marketplace (Laudon & Laudon 2014).
Gralla, Preston. "Smartphone Apps: Is Your Privacy Protected?" Computerworld. N.p., 7 July 2011. Web. 22 Apr. 2014.
The world today is a result of centuries of evolution; one of the major adaptations is technology, specifically the invention of the smartphone. The smartphone is a cellular phone that has the capabilities of performing similar functions to that of a computer (Oxford Dictionaries’ online dictionary, n.d.). The smartphone is owned by youth for the most part; however, adults and seniors are also turning toward using this device. This in turn demonstrates the popularity of this marvelous device, and is the reason why it is constantly monitored by its users. The continuous evolving of the populations' wants and needs such as communication, searching of information, entertainment and recording, makes owning a smartphone essential, and beneficial as it is portable, reliable and efficient.
Mobile devices are being exposed to a record number of security threats with potentially alarming statistics indicating a 400 percent increase in Android malware for example, while Wi-Fi connections are also being increasingly targeted. While the conventional desktop PC will still continue to serve important functions at both consumer and professional levels, there is an expectation that mobile devices will become the predominant form for accessing both personal and professional content it is understandable that cyber criminals have begun focusing on mobile devices which have at the same time grown their user base while substantially consolidating the operating system variants which makes the surface area for a potential attack substantially larger (...
Have you ever asked yourself, what the world would be like if there weren’t any mobile applications. Society is impacted by the new development in technology daily. Someone is always claiming that their inventions will revolutionize the world, but no invention has had more success over the years, in the cellular world than mobile applications. People all around the world use millions to billions of applications daily for personal and business uses. For example, social networking which is use by all generations of people. It has an influence the way we purchase cell phones, in order to have the capability. With the creation of different smartphones and tablets, comes the demand for more mobile applications. This causes competition among application builders. Mobile applications are designed to its user making their experience less complicated. Mobile applications have their advantages and disadvantages, depending on its design and designer. They can be created to be very simple or complex, depending on its intended function. Has society benefited from the usages of mobile applications or is it just a distraction. What impact do mobile applications have on society.