Impact of Edge Computing on Mobile Apps

Verified

Added on  2020/05/28

|9
|3746
|76
AI Summary
This assignment examines the effects of edge computing on mobile applications. It delves into research papers discussing quantifiable impacts on mobile app functionality, including performance enhancements and security considerations. The focus is on understanding how edge computing reshapes the landscape of mobile application development and deployment.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Survey of IS Theory
Assessment 2 – Part B
1/25/2018
COIS11011 Foundations of Business Computing
Kym Cook
S0290305

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
Question 2. Apply Porter’s value chain.................................................................................................1
Question 3. Explain how the internet works..........................................................................................1
Question 4. Explain why master data....................................................................................................2
Question 5. Why should information.....................................................................................................2
Question 6. Why are advertisers............................................................................................................2
Question 7. Discuss the ways in which..................................................................................................3
Question 8. Investigate the role of.........................................................................................................3
Question 9. How do customer relationship............................................................................................4
Question 10. Why is planning so...........................................................................................................4
References.............................................................................................................................................5
Document Page
Question 1. Why are businesses becoming
Why are businesses becoming so dependent on mobile application? Provide specific
examples to support your answer.
ANSWER
Mobile applications are the most famous applications in this era of internet. The mobile
applications help to access the internet very fast which mainly has a limit in desktops and
other physical devices (Kim et al., 2014). The applications of mobile are playing an important
role for the businesses that deals with large customers and the workforce that rely on
convenience access of information. Customers are spending most of their times online and
with other social media on their mobile phones. The time that is spend by the users on their
mobile phones has increased about 575% in past three years and among them 80 % of the
user spend their mobile time using the apps of the phone. The center of mobile apps is the
Internet of Things and the applications that are used by the customer usually responsive
websites. So, businesses use mobile applications to expand their business and services among
the people. They want to connect with their users and engage them in their business. The
business can emerge many opportunities by the mobile applications (Song et al., 2014).
Businesses in Australia also use mobile apps so that they can invigorate the value of business
proposition and also enhance their interaction with the customers. Example of business who
uses mobile applications is The Nook who uses mobile application for their business
enhancement.
Question 2. Apply Porter’s value chain
Apply Porter’s value chain model to Big W (www.bigw.com.au). What is Big W’s
competitive strategy? Describe Big W’s business model. Briefly describe the tasks that Big
W must accomplish for each primary value chain activity.
ANSWER
Big W follows a simple strategy to enhance their business. Their strategy is to develop a
team, improve the processes of the company, and then reduce the cost. They also develop a
cohesive brand and update the offering of the product (Mohajeri et al., 2014). The last
strategy is to refresh all their stores at right time. Porter’s five forces are competitive rivalry,
buyer power, threat of submission, supplier power, and the threat to new entries. All the
online shopping sites that are used face a huge competitive rivalry among themselves. As
there are numerous number of online shopping sites, Big W faces many challenges from
other companies as well. Porter’s five model defines competitive rivalry for Big W to provide
best quality product and give best service to their customers. Big W must give discounts on
their products on all their stores and sites to attract more customers. The next force on
Porter’s model is the new entry threat. Many new companies are establishing every day and
that is the difficulty that is faced by Big W. They feel the insecurity of being getting
diminished. Big W has to give best service and offers to their customers so that the customers
do not get their products from other online sites (Bornemann & Wiedenhofer, 2014). The
next is the supplier power in Porter’s model. Always there exists an uneasy relation between
the supplier and the company. Big W can make the relation between them better and make
new policies and strategies in their transaction process. The fourth force in Porter’s model is
the buyer power. The ultimate power is in the hand of customer when it comes to shopping
Document Page
products online. If the customer is not satisfied with the quality of product or the quality of
services provided by the company, the user will not buy anything from that site in future. The
price of the product also plays an important role in the buyer power. The buyer has the power
to change their choice from one to another as there are huge numbers of choices available
with them. There is also threat of substation in the forces of Porter’s model. There are
numerous numbers of similar products that are available in the market. Big W has to suppress
all those quality of products to sustain in the market.
Question 3. Explain how the internet works
Explain how the internet works. Assume you are talking with someone who has no
knowledge of information technology.
ANSWER
All the computers that are connected to the internet have some unique address. The addresses
of the internet are in aaa.aaa.aaa.aaa form where aaa must be some numbers from the range 0-
255. This address of the internet is commonly known as IP address (Griffiths et al., 2016). An
IP address of the systems is used to connect the systems to the internet. If the internet is
connected through an ISP (Internet Service Provider). These ISP are assigned as temporary IP
address in the duration of the session. When a system wants to connect the other system
through internet and wants to transmit some messages, then the IP addresses are generated.
This transfer is possible with protocol stack. The protocol stack of TCP/IP protocol is mostly
used for communication process (Wallace, 2015). The application layer in the TCP/IP
protocol has protocol that is specific to the applications which includes www, e-mail, and
FTP. The transmission control of the protocol layer directs the packets of data to particular
application using a port number. The internet protocol layer directly directs the packet of data
to particular computer by the use of the IP address and lastly the hardware layer converts the
binary packet of data in to networking signals.
Question 4. Explain why master data
Explain why master data management is so important in companies that have multiple data
sources.
ANSWER
Master Data Management is used in business to eliminate all the same type of data that are
inconsistent and redundant in the organization. More than 27 % of the organization’s revenue
is wasted because of inaccurate master data management (Schoenherr & SpeierPero, 2015).
The master data of an organization is a management which has all the details of the
customers, sellers, and products of the organization. Organizations now a days struggle to
implement the information system which facilitate and supports the requirement of the
business. Most of the companies claim that they can analyse only 12 % of the data that are
available with them. This leads to miss out the rest 88 % of data. Master Data Management
provides the company with seamless information across the multiple channels. They help to
understand the customer in a better way. All the operations can be viewed properly with all
the data assets that are available with the organization (Gudivada, Rao & Raghavan, 2014).
Master Data Management helps to keep the data safe and gives very high quality of data. All
the systems that are used by the company are connected by using Master Data Management.
The tool of master data combines all the system of the organization.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Question 5. Why should information
Why should information security be prime concern to management?
ANSWER
There are many importance of information security in a management. Information security is
considered as a prime concern to any kind of management. This is because the information
security helps to secure all the information which includes the digital, information that are
paper-based, company secrets, the data that are stored on the cloud, intellectual property and
many more personal information of the employees working in the organization (Soomro,
Shah & Ahmed, 2016). Installing and maintaining an information security also gives a good
protection to the network against the cyber-attacks. Information security also gives a
framework to the organization to manage its data safely and securely all in a single system.
All the technological risks and also other threats including ineffective procedures and staffs
that are poorly informed can also be mitigated by information security. The management who
uses security threats can manage the risks evolving in the organization that are held inside the
organization as well an in the environment. Managements of organizations spend lot of
money in securing their network which might not even be successful (Lin, 2014). Information
system helps to reduce the cost of managing the risks that are associated with the
organization. The integrity of information on the network of the organization, availability,
and confidentiality of data are all protected by the information security management system.
The culture of the organization is also improved by information security system.
Question 6. Why are advertisers
Why are advertisers so interested in social networks?
ANSWER
Social media helps to recognize the brand of the company. Advertisers generally increase the
visibility of the company they are working for. Social media is one of the best way to the
voice of the brand. Social media also increases the loyalty of the brand. Social media helps to
connect with the customers and the customers are mostly loyal to the brands which they see
in the social media. The plan and strategy of social media can influence the morphing
customers to be a brand loyal customer (Fulgoni & Lipsman, 2014). With all the
advertisements that are done by advertiser on social media gives more new opportunities to
the brand and can access old customers, recent customers as well as all the new customers.
This also improves the interaction process with the customers. The conversation rate with the
customer is increased with the help of social media. The humanization element of social
media is the most important feature of social media. The advertisers can make the brand more
humanized by the interactions that are made in the social media (Ashley & Tuten, 2015). On
social media, the brand generally acts like people and people are doing businesses with other
people who are the customers of the company. Social media improves the credibility and the
trust of the brand.
Question 7. Discuss the ways in which
Discuss the ways in which Wi-Fi is being used to support mobile computing and m-
commerce. Describe the ways in which Wi-Fi is affecting the use of mobile phones for m-
commerce.
Document Page
ANSWER
Mobile computing is known as a wireless connection of the real time that is usually done in
between some mobile device and some different computing elements which generally
includes intranet and internet. Mobile commerce is also known by the term m-commerce
which includes transactions that are done on mobile devices (Hu et al., 2016). The wired
computing traditional method is being replaced by mobile commerce and wireless
technologies. The entire IT field is reshaped by wireless infrastructure of mobile computing
and m-commerce. Wireless communication enables to make some productive use of the time
that is normally wasted. Wireless communication on m-computing as well as m-commerce
helps to work even while travelling. The devices having wireless communication allows the
user to carry the system with them making the system more flexible (Khodashenas et al.,
2017). The wireless technology also helps to schedule the work time around professional and
personal obligations. Wireless technology generally has higher bandwidths that are relatively
inexpensive. Mobile phones are used more for m-commerce with the use of Wi-Fi because it
makes the user to work in much easier way. The user can carry their smart phones anywhere
they want to and work more efficiently.
Question 8. Investigate the role of
Investigate the role of the web in human resources management.
ANSWER
Web plays an important role in management of human resource. Technology has changed and
has influenced mostly in the HRM (Human Resource Management) sector of an organization.
The web technology has changed the roles of professionals in human resource management
to large extent (Helmreich & Merritt, 2017). The functions of the HRM department are
performed electronically by the web technology so that the performance of the HRM is
increased and the professionals perform efficiently. With the help of web technology the
HRM can response to their managers, employees, and client very fast. The web technology is
used for all the activities that are done by the human resource team. The activities that are
controlled by web technology in HRM are creation of employment application, employee
enrolments, and benefits, and training that are done by e-learning. The professionals of HRM
are experiencing more transparency, comprehensiveness, and clarity with the web
technology. Web technology also can help the management of human resource by awaring
the professionals of the latest trends that exists in policy making, employment practices, and
the activities of the industry (Marchington et al., 2016). All the relevant regulations and laws
that are available are to be known by the professionals of HRM. The web technology has
enabled all the clients and the employees of the organization to connect with HRM and have
an interaction with them and the whole world.
Question 9. How do customer relationship
How do customer relationship management systems help organisations achieve customer
intimacy?
ANSWER
The customer relationship management has become very important with the increase of
growth of internet and the web. The Customer Relationship Management returns the business
to make personal marketing (Khodakarami & Chan, 2014). Through CRM the businesses can
interact with the customer and can have feedback as well from the customers. Through
Document Page
Customer Relationship Management, previous track record of the customers can be kept
which includes the previous purchases, wants, and needs so that each of the customer gets
offer from the company. The approach of CRM is to increase the intimacy of the customer
with the company. CRM consists of a simple idea which mainly deals with customers in
different way because all the customers have different needs and the value of different
customers is different. The customer strategy is improved by implementation of CRM and
also the sale of the company is increased (Eichorn, 2017). CRM is used to customer intimacy
because the services of the employees becomes more productive and decrease the gap bridge
in between the seller and the customers.
Question 10. Why is planning so
Why is planning so important in supply chain management?
ANSWER
Planning is an important role in management of supply chain. Planning of Supply Chain
Management helps to predict the future of selling and the requirements that will be needed to
balance the demand and supply of the products and services (Stadtler, 2015). The first stage
of SCM is planning which is considered as one of the most important categories of the
software of SCM. Planning is important for Supply Chain because it provides modelling of
supply chain, distribution, supply network planning, and design of the planning. Planning
directly impacts on the revenue of the company. So, planning is considered as the most
important factor of Supply Chain Management. Companies having poor planning generally
leads to loss of the company or revenue loss. Planning allows businesses so that they can
operate with their processes smoothly and then to minimize their expenses (Christopher,
2016). The companies mainly turn to their customers for their improvement and the
feedbacks of the customers are most important for their improvement. So, planning is
considered as the most important part of the Supply Chain Management.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Ashley, C., & Tuten, T. (2015). Creative strategies in social media marketing: An exploratory
study of branded social content and consumer engagement. Psychology &
Marketing, 32(1), 15-27.
Bornemann, M., & Wiedenhofer, R. (2014). Intellectual capital in education: a value chain
perspective. Journal of Intellectual Capital, 15(3), 451-470.
Christopher, M. (2016). Logistics & supply chain management. Pearson UK.
Eichorn, F. L. (2017). Internal customer relationship management (IntCRM) a framework for
achieving customer relationship management from the inside out. Management (open-
access), 2, 1.
Fulgoni, G., & Lipsman, A. (2014). Numbers, please: Digital game changers: How social
media will help usher in the era of mobile and multi-platform campaign-effectiveness
measurement. Journal of Advertising Research, 54(1), 11-16.
Griffiths, M. D., Van Rooij, A. J., Kardefelt-Winther, D., Starcevic, V., Király, O., Pallesen,
S., ... & King, D. L. (2016). Working towards an international consensus on criteria
for assessing Internet Gaming Disorder: A critical commentary on Petry et al.
(2014). Addiction, 111(1), 167-175.
Gudivada, V. N., Rao, D., & Raghavan, V. V. (2014, June). NoSQL systems for big data
management. In Services (SERVICES), 2014 IEEE World Congress on (pp. 190-197).
IEEE.
Helmreich, R. L., & Merritt, A. C. (2017, November). 11 Safety and error management: The
role of crew resource management. In Aviation Resource Management: Proceedings
of the Fourth Australian Aviation Psychology Symposium: v. 1: Proceedings of the
Fourth Australian Aviation Psychology Symposium. Routledge.
Hu, W., Gao, Y., Ha, K., Wang, J., Amos, B., Chen, Z., ... & Satyanarayanan, M. (2016,
August). Quantifying the impact of edge computing on mobile applications.
In Proceedings of the 7th ACM SIGOPS Asia-Pacific Workshop on Systems (p. 5).
ACM.
Khodakarami, F., & Chan, Y. E. (2014). Exploring the role of customer relationship
management (CRM) systems in customer knowledge creation. Information &
Management, 51(1), 27-42.
Khodashenas, P. S., Ruiz, C., Siddiqui, M. S., Betzler, A., & Riera, J. F. (2017). The role of
Edge Computing in future 5G mobile networks: concept and challenges. Cloud and
Fog Computing in 5G Mobile Networks, 349.
Kim, J., Park, Y., Kim, C., & Lee, H. (2014). Mobile application service networks: Apple’s
App Store. Service Business, 8(1), 1-27.
Document Page
Lin, H. C. (2014). An investigation of the effects of cultural differences on physicians’
perceptions of information technology acceptance as they relate to knowledge
management systems. Computers in Human Behavior, 38, 368-380.
Marchington, M., Wilkinson, A., Donnelly, R., & Kynighou, A. (2016). Human resource
management at work. Kogan Page Publishers.
Mohajeri, B., Nyberg, T., Karjalainen, J., Tukiainen, T., Nelson, M., Shang, X., & Xiong, G.
(2014, October). The impact of social manufacturing on the value chain model in the
apparel industry. In Service Operations and Logistics, and Informatics (SOLI), 2014
IEEE International Conference on (pp. 378-381). IEEE.
Schoenherr, T., & SpeierPero, C. (2015). Data science, predictive analytics, and big data in
supply chain management: Current state and future potential. Journal of Business
Logistics, 36(1), 120-132.
Song, J., Kim, J., Jones, D. R., Baker, J., & Chin, W. W. (2014). Application discoverability
and user satisfaction in mobile application stores: An environmental psychology
perspective. Decision Support Systems, 59, 37-51.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs
more holistic approach: A literature review. International Journal of Information
Management, 36(2), 215-225.
Stadtler, H. (2015). Supply chain management: An overview. In Supply chain management
and advanced planning (pp. 3-28). Springer Berlin Heidelberg.
Wallace, P. (2015). The psychology of the Internet. Cambridge University Press.
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]