Mobile Application for Study Material
VerifiedAdded on 2023/04/04
|8
|1554
|276
AI Summary
This report discusses the concept of mobile applications for accessing study material and solved assignments. It analyzes two research papers on mobile communication and explores the benefits and security issues of using mobile applications. The methodology used in both papers is also discussed. The report concludes with recommendations for utilizing mobile applications in the education sector.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Mobile Application
Name of the Student
Name of the University
Name of the Student
Name of the University
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
Introduction to the topic...................................................................................................................3
Introduction to both papers..............................................................................................................3
Methodology used in both papers....................................................................................................3
Comparison of both papers..............................................................................................................4
Comments on advantages and disadvantages of both papers..........................................................6
Recommendation.............................................................................................................................6
Conclusion.......................................................................................................................................7
References........................................................................................................................................8
Introduction to the topic...................................................................................................................3
Introduction to both papers..............................................................................................................3
Methodology used in both papers....................................................................................................3
Comparison of both papers..............................................................................................................4
Comments on advantages and disadvantages of both papers..........................................................6
Recommendation.............................................................................................................................6
Conclusion.......................................................................................................................................7
References........................................................................................................................................8
Introduction to the topic
Mobile communication have been helping in reshaping the telecommunication industry in
the market. This has been affecting the lifestyle of human beings in the society. There have been
smart devices developed in the market including smart phones. This report is focused on two
research papers based on mobile communication. This have been helping understanding the
concept of mobile application and its benefit in the market.
Introduction to both papers
There have been two research papers analyzed in the report including Chua et al. (2018)
and van Emmerik, Berings and Lancee (2018). These papers have reflected mobile applications
in the recent world. The main aim of the first paper has been discussing in the application of
mobile using 10-step procedure. The basic principle of this strategy has been focused in the
report. The second paper discusses about the security issues in the mobile applications. The
security issues in the mobile application have been causing huge data loss to users. The paper
have discussed about different types of mobile application attacks in the market. The iOS and
Android stages in the mobile environment have been discussed in the paper. The security issues
in the mobile application have been impacting the brand value of various mobile companies in
the market. Several types of mobile attacks including DDoS attacks, cyber-attacks and malware
attacks have been discussed in the paper. Mobile engineers have been researching to trap this
malware and viruses for reducing cyber-attacks over mobile phones.
Methodology used in both papers
As research done by Hoehle and Venkatesh, (2015), both research papers have used
qualitative method by collectim dara from online journals and articles. The experience of client
Mobile communication have been helping in reshaping the telecommunication industry in
the market. This has been affecting the lifestyle of human beings in the society. There have been
smart devices developed in the market including smart phones. This report is focused on two
research papers based on mobile communication. This have been helping understanding the
concept of mobile application and its benefit in the market.
Introduction to both papers
There have been two research papers analyzed in the report including Chua et al. (2018)
and van Emmerik, Berings and Lancee (2018). These papers have reflected mobile applications
in the recent world. The main aim of the first paper has been discussing in the application of
mobile using 10-step procedure. The basic principle of this strategy has been focused in the
report. The second paper discusses about the security issues in the mobile applications. The
security issues in the mobile application have been causing huge data loss to users. The paper
have discussed about different types of mobile application attacks in the market. The iOS and
Android stages in the mobile environment have been discussed in the paper. The security issues
in the mobile application have been impacting the brand value of various mobile companies in
the market. Several types of mobile attacks including DDoS attacks, cyber-attacks and malware
attacks have been discussed in the paper. Mobile engineers have been researching to trap this
malware and viruses for reducing cyber-attacks over mobile phones.
Methodology used in both papers
As research done by Hoehle and Venkatesh, (2015), both research papers have used
qualitative method by collectim dara from online journals and articles. The experience of client
during using Apple has been used as data in first paper. For achieving the objective, the
researcher has assembled fThe datasets including content authenticity (n=138), pretest (n=440),
endorsement (n=408) and cross-endorsement (n=412). There have been utilizing of smart
authenticity of the instrument for identifying the outcomes and results of the papers. The second
paper has helped in minimizing the attacks over the mobile phones. There have been various
methods discussed in the paper that might help in minimizing the cyber-attacks in the mobile
applications (van Emmerik, Berings and Lancee 2018). The use of software and antiviruses in
the mobile applications have been helping in maintaining keen approach in the development if
firewall against attacks in the mobile devices. The first paper has be reflecting the use of the iOS
interface of the users in the market. Data has been assembled from various online diaries, articles
and books related to flexible application security threats and game plans.
Comparison of both papers
Both papers have been focusing in the utilization of the mobile applications in the
market. There have been various benefits of utilizing mobile application in the market. The
second paper has been based on the security issues in the mobile application. The user
experience of the using mobile phones have been discussed in the paper. There have been
combined approach of the security issues in the mobile applications have been generalized.
Various factors have been discussed in the paper that are related with the security issues in the
mobile applications (Lundberg et al. 2018). This have been maintaining keen approach in the
development if the firewalls and security patches in the network. There have been various
application of mobile have been discussed in the papers. Both platform including android and
ios have been discussed in the paper. The advantages of using both platform in the application
development have been discussed in the papers. Various journals have been discussed and
researcher has assembled fThe datasets including content authenticity (n=138), pretest (n=440),
endorsement (n=408) and cross-endorsement (n=412). There have been utilizing of smart
authenticity of the instrument for identifying the outcomes and results of the papers. The second
paper has helped in minimizing the attacks over the mobile phones. There have been various
methods discussed in the paper that might help in minimizing the cyber-attacks in the mobile
applications (van Emmerik, Berings and Lancee 2018). The use of software and antiviruses in
the mobile applications have been helping in maintaining keen approach in the development if
firewall against attacks in the mobile devices. The first paper has be reflecting the use of the iOS
interface of the users in the market. Data has been assembled from various online diaries, articles
and books related to flexible application security threats and game plans.
Comparison of both papers
Both papers have been focusing in the utilization of the mobile applications in the
market. There have been various benefits of utilizing mobile application in the market. The
second paper has been based on the security issues in the mobile application. The user
experience of the using mobile phones have been discussed in the paper. There have been
combined approach of the security issues in the mobile applications have been generalized.
Various factors have been discussed in the paper that are related with the security issues in the
mobile applications (Lundberg et al. 2018). This have been maintaining keen approach in the
development if the firewalls and security patches in the network. There have been various
application of mobile have been discussed in the papers. Both platform including android and
ios have been discussed in the paper. The advantages of using both platform in the application
development have been discussed in the papers. Various journals have been discussed and
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
referenced in paper that help in validating the authenticity of the papers in the market. The use
of journals and articles have been helping in enhancing the data and information regarding the
mobile applications.
Comments on advantages and disadvantages of both papers
There have been different procedures combined into the comfort of the adaptable
application in the market. Along these lines, a couple of spam applications used to pick up
induction to the mobile phones and a couple of data and information used to be get parted from
the PDAs (Kim et al., 2015). There have been fitting preparing and client rules gave in the
examination to understanding the utilization of the minimal applications. There have been need
in the miobile comfort by clients at different estimations. Different variables have been
intertwined into the nonattendance of flexible application convenience including outside and
inside portions. (Cipresso et al. 2018).The purpose behind course of various client rules have
been appropriately provoked in the client manual. Creative advances have been reshaping the
century in another structure. The basic principle of this strategy has been focused in the report.
The second paper discusses about the security issues in the mobile applications. The second
paper have helped in recognizing various strikes on the convenient applications including
spyware ambush, Worm-based attack, botnets and DDoS ambushes. The security issues in the
mobile application have been causing huge data loss to users. The paper have discussed about
different types of mobile application attacks in the market. The iOS and Android stages in the
mobile environment have been discussed in the paper. (Hoehle, Aljafari and Venkatesh 2016).
Different strategies have been acquainted with lessen these issues in the mobile phones and its
applications. There have been a couple antivirus and firewalls (Zeman et al. 2018).
of journals and articles have been helping in enhancing the data and information regarding the
mobile applications.
Comments on advantages and disadvantages of both papers
There have been different procedures combined into the comfort of the adaptable
application in the market. Along these lines, a couple of spam applications used to pick up
induction to the mobile phones and a couple of data and information used to be get parted from
the PDAs (Kim et al., 2015). There have been fitting preparing and client rules gave in the
examination to understanding the utilization of the minimal applications. There have been need
in the miobile comfort by clients at different estimations. Different variables have been
intertwined into the nonattendance of flexible application convenience including outside and
inside portions. (Cipresso et al. 2018).The purpose behind course of various client rules have
been appropriately provoked in the client manual. Creative advances have been reshaping the
century in another structure. The basic principle of this strategy has been focused in the report.
The second paper discusses about the security issues in the mobile applications. The second
paper have helped in recognizing various strikes on the convenient applications including
spyware ambush, Worm-based attack, botnets and DDoS ambushes. The security issues in the
mobile application have been causing huge data loss to users. The paper have discussed about
different types of mobile application attacks in the market. The iOS and Android stages in the
mobile environment have been discussed in the paper. (Hoehle, Aljafari and Venkatesh 2016).
Different strategies have been acquainted with lessen these issues in the mobile phones and its
applications. There have been a couple antivirus and firewalls (Zeman et al. 2018).
Recommendation
Both the papers have endeavored well to essentially separate the possibility of flexible
applications. The disclosures have vital repercussions for masters since we saw key solace parts
in the specific circumstance of versatile applications. The instrument could be utilized by pros to
center to-be-made, to-be-finished, furthermore, existing versatile applications. For instance,
affiliations could utilize The adaptable application comfort conceptualization what's logically,
related instrument in all seasons of the structure improvement life cycle including the
examination sort out, examination similarly, plan organize, application execution stage and
application upkeep engineer.
Conclusion
Because of the regardless of what you look like at it dissipating of PDAs, buyers foresee
that basic ought to use and efficient advantageous applications from ace focuses in different
associations. Up until this point, basically nothing deliberate assistance has been offered to
assess existing adaptable applications or in masterminding new versatile applications. Our blend
built up a conceptualization and related audit instrument subject to Apple's general client
experience concludes that can help such an undertaking. Our work in like way fills in as a model
that utilizes the structure proposed by MacKenzie et al. (2011), yet with explicit adjustments that
we saw to be fundamental.
Both the papers have endeavored well to essentially separate the possibility of flexible
applications. The disclosures have vital repercussions for masters since we saw key solace parts
in the specific circumstance of versatile applications. The instrument could be utilized by pros to
center to-be-made, to-be-finished, furthermore, existing versatile applications. For instance,
affiliations could utilize The adaptable application comfort conceptualization what's logically,
related instrument in all seasons of the structure improvement life cycle including the
examination sort out, examination similarly, plan organize, application execution stage and
application upkeep engineer.
Conclusion
Because of the regardless of what you look like at it dissipating of PDAs, buyers foresee
that basic ought to use and efficient advantageous applications from ace focuses in different
associations. Up until this point, basically nothing deliberate assistance has been offered to
assess existing adaptable applications or in masterminding new versatile applications. Our blend
built up a conceptualization and related audit instrument subject to Apple's general client
experience concludes that can help such an undertaking. Our work in like way fills in as a model
that utilizes the structure proposed by MacKenzie et al. (2011), yet with explicit adjustments that
we saw to be fundamental.
References
Balaam, M., Comber, R., Jenkins, E., Sutton, S. and Garbett, A., 2015, April. FeedFinder: a
location-mapping mobile application for breastfeeding women. In Proceedings of the 33rd
Annual ACM Conference on Human Factors in Computing Systems (pp. 1709-1718). ACM.
Chua, C., Wakefield, M., Mui, R. and Huang, W., 2018, October. Designing an Anxiety Self-
regulation and Education Mobile Application for High School Students. In International
Conference on Cooperative Design, Visualization and Engineering (pp. 270-275). Springer,
Cham.
Cipresso, P., Pedroli, E., Serino, S., Semonella, M., Tuena, C., Colombo, D., Pallavicini, F. and
Riva, G., 2018. Assessment of Unilateral Spatial Neglect using a free mobile application for
Italian clinicians. Frontiers in psychology, 9.
Hoehle, H. and Venkatesh, V., 2015. Mobile application usability: Conceptualization and
instrument development. Mis Quarterly, 39(2).
Hoehle, H., Aljafari, R. and Venkatesh, V., 2016. Leveraging Microsoft׳ s mobile usability
guidelines: Conceptualizing and developing scales for mobile application usability. International
Journal of Human-Computer Studies, 89, pp.35-53.
Kim, E., Corte-Real, M. and Baloch, Z., 2016, April. A deep semantic mobile application for
thyroid cytopathology. In Medical Imaging 2016: PACS and Imaging Informatics: Next
Generation and Innovations (Vol. 9789, p. 97890A). International Society for Optics and
Photonics.
Balaam, M., Comber, R., Jenkins, E., Sutton, S. and Garbett, A., 2015, April. FeedFinder: a
location-mapping mobile application for breastfeeding women. In Proceedings of the 33rd
Annual ACM Conference on Human Factors in Computing Systems (pp. 1709-1718). ACM.
Chua, C., Wakefield, M., Mui, R. and Huang, W., 2018, October. Designing an Anxiety Self-
regulation and Education Mobile Application for High School Students. In International
Conference on Cooperative Design, Visualization and Engineering (pp. 270-275). Springer,
Cham.
Cipresso, P., Pedroli, E., Serino, S., Semonella, M., Tuena, C., Colombo, D., Pallavicini, F. and
Riva, G., 2018. Assessment of Unilateral Spatial Neglect using a free mobile application for
Italian clinicians. Frontiers in psychology, 9.
Hoehle, H. and Venkatesh, V., 2015. Mobile application usability: Conceptualization and
instrument development. Mis Quarterly, 39(2).
Hoehle, H., Aljafari, R. and Venkatesh, V., 2016. Leveraging Microsoft׳ s mobile usability
guidelines: Conceptualizing and developing scales for mobile application usability. International
Journal of Human-Computer Studies, 89, pp.35-53.
Kim, E., Corte-Real, M. and Baloch, Z., 2016, April. A deep semantic mobile application for
thyroid cytopathology. In Medical Imaging 2016: PACS and Imaging Informatics: Next
Generation and Innovations (Vol. 9789, p. 97890A). International Society for Optics and
Photonics.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Kim, S.J., Wang, R.J.H. and Malthouse, E.C., 2015. The effects of adopting and using a brand's
mobile application on customers' subsequent purchase behavior. Journal of Interactive
Marketing, 31, pp.28-41.
Lee, Y.J., Qu, W., Singh, S., Kim, D.Y., Kim, K.H., Kim, S.H., Park, J.J. and Cho, G.H., 2016.
A 200-mA digital low drop-out regulator with coarse-fine dual loop in mobile application
processor. IEEE Journal of Solid-State Circuits, 52(1), pp.64-76.
Lundberg, O., Berglund Scherwitzl, E., Gemzell Danielsson, K. and Scherwitzl, R., 2018.
Fertility awareness-based mobile application. The European Journal of Contraception &
Reproductive Health Care, 23(2), pp.166-168.
Malisa, L., Kostiainen, K. and Capkun, S., 2017, March. Detecting mobile application spoofing
attacks by leveraging user visual similarity perception. In Proceedings of the Seventh ACM on
Conference on Data and Application Security and Privacy (pp. 289-300). ACM.
van Emmerik, A.A., Berings, F. and Lancee, J., 2018. Efficacy of a mindfulness-based mobile
application: a randomized waiting-list controlled trial. Mindfulness, 9(1), pp.187-198.
Zeman, J.E., Moon, P.S., McMahon, M.J. and Holley, A.B., 2018. Developing a Mobile Health
Application to Assist With Clinic Flow, Documentation, Billing, and Research in a Specialty
Clinic. Chest, 154(2), pp.440-447.
McCarroll, M.L., Armbruster, S., Pohle-Krauza, R.J., Lyzen, A.M., Min, S., Nash, D.W.,
Roulette, G.D., Andrews, S.J. and von Gruenigen, V.E., 2015. Feasibility of a lifestyle
intervention for overweight/obese endometrial and breast cancer survivors using an interactive
mobile application. Gynecologic oncology, 137(3), pp.508-515.
mobile application on customers' subsequent purchase behavior. Journal of Interactive
Marketing, 31, pp.28-41.
Lee, Y.J., Qu, W., Singh, S., Kim, D.Y., Kim, K.H., Kim, S.H., Park, J.J. and Cho, G.H., 2016.
A 200-mA digital low drop-out regulator with coarse-fine dual loop in mobile application
processor. IEEE Journal of Solid-State Circuits, 52(1), pp.64-76.
Lundberg, O., Berglund Scherwitzl, E., Gemzell Danielsson, K. and Scherwitzl, R., 2018.
Fertility awareness-based mobile application. The European Journal of Contraception &
Reproductive Health Care, 23(2), pp.166-168.
Malisa, L., Kostiainen, K. and Capkun, S., 2017, March. Detecting mobile application spoofing
attacks by leveraging user visual similarity perception. In Proceedings of the Seventh ACM on
Conference on Data and Application Security and Privacy (pp. 289-300). ACM.
van Emmerik, A.A., Berings, F. and Lancee, J., 2018. Efficacy of a mindfulness-based mobile
application: a randomized waiting-list controlled trial. Mindfulness, 9(1), pp.187-198.
Zeman, J.E., Moon, P.S., McMahon, M.J. and Holley, A.B., 2018. Developing a Mobile Health
Application to Assist With Clinic Flow, Documentation, Billing, and Research in a Specialty
Clinic. Chest, 154(2), pp.440-447.
McCarroll, M.L., Armbruster, S., Pohle-Krauza, R.J., Lyzen, A.M., Min, S., Nash, D.W.,
Roulette, G.D., Andrews, S.J. and von Gruenigen, V.E., 2015. Feasibility of a lifestyle
intervention for overweight/obese endometrial and breast cancer survivors using an interactive
mobile application. Gynecologic oncology, 137(3), pp.508-515.
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.