Technology & Trend Monitoring: Mobile & Wireless, Big Data, Smart Home, Security Challenges

Verified

Added on  2023/06/10

|17
|6373
|467
AI Summary
This study explores the emerging trends in mobile & wireless technologies, big data challenges, smart home technologies, and security challenges in information technology landscape. It critically evaluates the impact of these trends on the existing information systems. The study also analyzes the challenges associated with big data technologies and their impact on information systems. It provides insights into the technologies enabling smart homes and the possible challenges. The subject of the study is technology & trend monitoring, and the course code is not mentioned. The study is relevant to the field of information technology and can be useful for students pursuing courses in this field.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Technology & Trend
Monitoring

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
TABLE OF CONTENTS
INTRODUCTION .........................................................................................................................1
MAIN BODY...................................................................................................................................1
Critically evaluating the emerging trends relating to mobile and wireless technologies within
Information Technology landscape........................................................................................1
Analyzing the big data technologies and challenges associated with it and impact on existing
Information systems...............................................................................................................4
Describing the technologies enabling “Smart Home” along with technology enablers &
possible challenges ................................................................................................................7
Discussing the emerging security challenges, new threat vectors and vulnerabilities along with
counter-measure these new threats.......................................................................................10
CONCLUSION .............................................................................................................................12
REFERENCES..............................................................................................................................14
Document Page
INTRODUCTION
Technology is basically concerned with having the practical application of the devices
so that objective of gaining greater efficiency & effectiveness can be achieved. In the current
era, there are various technological advancement which are required to taken into the
consideration so that effectual processing can be developed. There are different kinds of the
advantages which can be achieved by having the various form of the technologies into the
consideration that involves getting greater efficiency, higher speed, proper communication
process, etc. In order to get the advanced life style by possessing effectual processes information
technology getting the higher level of support which is enabling particular sector to achieve
significant growth & development. Emerging technologies are positively affecting the overall
commercial and non-business based process so that effective functioning can be done properly.
There are various technologies that has been emerged and enabled such as accelerometer,
cameras, microphone, etc. which is helpful in attaining the distinct ability to get access to virtual
platform via reducing complexities. These all is providing assistance in having higher benefits to
coordinate with changing circumstances.
The currents study will pay attention on having the significant information regarding the
emerging trends related to mobile and wireless technologies within Information Technology
landscape. Recent investigation will emphasize on critically reviewing the Big Data technologies
and challenges associated with it. It will focus on describing the technologies enabling smart
home by addressing address the technology enablers & possible challenges such as problems of
automation and data privacy in turn depth understanding about the particular industry can be
derived.
MAIN BODY
Critically evaluating the emerging trends relating to mobile and wireless technologies within
Information Technology landscape
In the current era, the utilization of the technology has increased due to the various
types of the benefits so that effectiveness in the greater manner can be derived (Alseadoon and
et.al., 2021). Mobile due to the higher awareness of the prevailing awareness has inclined which
is enabling users to get the significant ability to accomplish their requirements in higher manner.
The main reason behind this is the higher inclined speed to attain n the particular tasks in turn
greater compliance with the prevailing complicated processes has become possible. There are
1
Document Page
various emerging trends relating to the mobile & wireless technologies within information
technology landscape. There are various trends that are prevailing in the market so that various
needs which are changing frequently can be adopted.
The mobile edge computing is related with offering the computing environment that can
be used to deploy applications & services as well as to store and processes content in proximity
to mobile users (Becker and et.al., 2019.). The trends in the mobile Edge Computing as an
emerging technology involves high refresh, 5G, high megapixel camera, 4.5 nm processor, etc
which are allowing to make the device highly effective in turn greater efficiency can be
provided. There are various form of the features which are basically possessed by the smart
phones that involves higher speed, storage capacity, versatile display, built in security,
maximum m mobility with 5G, etc which helps in getting the proper ability to communicate in
higher manner (Top Mobile Technology Trends in 2022, 2021). In addition to this, the trends in
the wireless technological network comprises having CBRS, dynamic spectrum sharing & open
RAN. On the basis of this it can be mentioned that there are various form of the trends that are
prevailing in the mobile & wireless technology which comprises having the such features, etc so
that greater positive impact on the IT can be provided.
Artificial intelligence is one of the significant trend that is emerging into the wireless
technologies such as smart watches, phone, etc that involves Alexa, Siri, cortana &
google assistant so that proper hand free use can be derived (Koripi, 2020).
Location based technology is found in wireless& mobile which tend to provide the
ability to track the location by getting the consent from the users. This allows to get the
insights about the locations which aids in achieving the marketing campaigns, etc which
promotes the ability to build good business activities.
Augmented & virtual reality which is highly taken into the process by the various social
media apps that shows various filter options. This helps the various apps to get success
by creating the entertainment content so that creating brand awareness, app download,
higher customer engagement and revenue can be achieved.
Mobile IOT Apps which is emerging in the current era that is due to higher development
of internet of things application so that remote management of connected devices to
monitor reading of sensor, analyzing data, etc can become possible.
2

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Mobile payments is one of the significant trend that is prevailing in the current era which
helps in getting the higher efficiency in financial transaction so that higher productivity
in conducting e-commerce transaction can become possible (Xiao-Shu, 2019). Cloud
based mobile application aids in resolving the problem so that storage space for the
seamless functioning of an app that can quickly be downloaded is trending.
5G connectivity is helpful in executing the technologies such as IOT, Air, AR & cloud
computing into mobile so that enhancing wireless connectivity for having inclined
communication can be exerted. This can promote speed, low latency, connectivity,
bandwidth, etc can be achieved.
In the technological development there is wearable technology impact on app
development which is expanding use in case of businesses so that tighter connection
between brands & users can be attained. Enhanced mobile security is having the ability
in managing confidential so that excellent data protection can be exerted by having the
block chain into consideration.
Mobile devices syncing with homes helps in having improved consumers' experience
with homes which comprises having with air conditioning & heating within an app that is
aids in controlling temperate. This is basically having the integration with mobile
technology.
Enhanced transportation apps are taken into the process as the logistic industry actively
incorporate so that broad categories of mobile solution for consumer & businesses so that
huge potential for app development so that growth & development industry has become
possible.
Cross platform mobile development is basically found as a solution dominate mobile app
market which is helping in achieving the required level of equally compatible with all
platforms. (Barmpatsalou and et.al., 2018)
Bio metric technology reshapes mobile apps which ensures protection. In current era,
there are different form of the requirements such as safe guarding the pass word, other
confidential information for which the much emphasis is provided on having security via
using bio metric.
On the basis of this it can be interpreted that these are the trends that are emerging in the
mobile computing edge which helps in gaining significant ability to the users to have higher
3
Document Page
effectiveness in conducting various form of the transaction. There are distinct form of the
objectives such as possessing the effective technology so that major level of the positive impact
on processing can be derived (Barua and Mondal, 2019). The emerging trends have the
favorable influence on the overall technological industry as greater coordination with the overall
requirements of current requirement of the world can be attained. There are distinct form of the
benefits by having these trends can be derived which involves having faster g response to
queries, reducing time spent on paper work, inclined just in & real time control, tighter
communication between clients, etc. These have enabled to get the advanced technological
implementation so that effectual functioning can be derived. With respect to this, it can be
mentioned that there is higher level of efficiency due to the emerging trends relating to mobile &
wireless technologies within information technological landscape. These are enabling in gaining
the advanced level of the technological advancement in monitoring & controlling data so that
attaining significant growth and development of businesses and other areas can be found.
Analysing the big data technologies and challenges associated with it and impact on existing
Information systems
Big data is related with having the set of large and complex data that is basically can
be in both structured and unstructured format (Kushwaha, Kar and Dwivedi, 2021). In the
current era, big data is highly taken into the practice for accomplishing various form of the
benefits in turn attaining the reliable ability to evaluate & interpreted the data so that strategic
business decision can be formulated this tens in achieving appropriate competitiveness to
complete tasks in highly effective & precise manner. There are few trends which are prevailing
in big data that has strong level of the impact on the informational technology industry. It is
considered to be one of the significant technology which is found as power tool that reshapes
numerous business processes and operational across the world. The big data is rapidly expanding
IoT network, data products, quantum computing and use for hyper personalization in turn
effective functioning can be achieved. There is hyper cloud platform that helps in increasing
data generation & storing so that greater effectiveness can be achieved. Big data helps in
attaining the effective performance by gaining the good level of action as it possesses the
various trend that involves data as service, responsible & smart artificial intelligence, predictive
analytics, quantum & edge computing, natural language processing h, dark data, data fabric,
summing it up.
4
Document Page
In the information technology, big data is considered as one of the crucial technique that
helps in gaining the precise conducting of the organizational activities so that higher effectuates
can be provided (Saritas and et.al., 2021.). There is trend of having more data so that inclined
diversity drive advances in processing and rise of edge computing. In the current era, there are
various requirements of the business which helps in achieving the significant approach by using
the big data into the consideration that permit complying with advanced technology. Hybrid
clouds focuses on having the excellent flexibility more data deployment options by moving the
processes between private & public clouds. Dark data is one of the trend that is prevailing in
market which tend to offer the ability to the organization to not to get the insights of prediction
so not involved in any analytical system. Data fabric provides assistance in having the consistent
functionality across a variety of endpoints in both on premises & could computing (Humayun,
and et.al., 2020). This helps in achieving the proper information that data fabric tend to simplify
& incorporates data storage which enables to have access & sharing of data in distributed
information environment. Edge computing brings computing network that reduces the amount
of long distance connection so that boosting data streaming, real time, etc so that proper
functioning to have massive data by consuming less bandwidth usage. On the basis of this it can
be interpreted that these are the crucial trends that are prevailing in big data that is giving
significant level of benefits in turn greater processing can be derived.
Big data is highly utilized by organizations for complying with the trends such as
market requirements, identification of problems, etc so that achieving competitiveness can
become possible (Haoxiang and Smys, 2021). It has certain challenges which are required to
focused for gaining the depth understanding which hampers the objective accomplishing of
using big data. The one of the largest drawback that is required to be focused is having the lack
of knowledge possessing professionals, improper understanding about the massive data, etc. In
addition to this, it has the challenges such as data growth issues, having confusion while big data
tool selection, integration from a spread of sources, security of data, etc. Data encrypting &
segregation real time monitoring, obstacle of privacy breaches, etc which are leading to create
the number of challenges in organization that ted to impact negative. These are the few
challenges which leads to create the various issues for the firms as ineffective ability to
coordinate with requirements of clients such as offering higher level of lack of satisfaction to
organizational trustworthiness which hampers the processing of the firm. These tend to offer
5

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
adverse impact on informational technological industry as lower effectiveness in meeting the
goal of implementing the big data to collect, analyze and monitoring can not be done properly.
Data integration, lack of the skilled processes, effective governance and security, etc
(Top Major Challenges of Big Data, 2022). In case of the big data becomes difficult which
require the firm to pay attention on resolving issues in turn greater effectiveness can be derived.
Information technology is one of the rapid growing sector as various advance technologies are
given by it for resolving the irrelevant issue. Big data is taken into the process for making the
strategic decision which does not become possible due to the availability of the mentioned
challenges. On the basis of this it can be interpreted that there are few lacking areas of the big
data which is required to be taken into the consideration so that effectual processing in turn
meeting the competitive position by eliminating its negative impact.
In the recent era of the technology advancement it is important for the firm to pay
attention on possessing the big data so that effectual processing to get competitiveness can
become possible (Valtanen, 2021). It is positively influencing the exiting information systems
which involves improving the internal efficiencies and operations though automation robotic
process exertion can become possible. It helps to manage data sets so large & complex so that
inadequate to capture, curate, manage and process the data with the reasonable amount of time
can become possible. Thee are various form of the information system that are basically taken
into the process which involves having transaction processing, decision, knowledge
management, learning management, data base management and office information system. This
all requires the big data information so that effectual processing by taking the strategic decision
can be made through ensuring that effective functioning can be exerted (Benzidia, Makaoui, and
Bentahar, 2021). There are various form of the information system that require big data so that
effectual processing along with having data into the consideration can be taken into the process.
The current processing Is giving higher level of the focus on having the effective functioning of
big data which require generating insights & making well information decisions, discovering
trends, improving productivity so that opportunities or gaining greater innovation can be exerted
to enhance deficiency of the existing processing. On the basis of this, it can be interpreted that
there are different form of the big data that helps in gaining the appropriate functioning so that
effective information based action can be taken to provide various opportunities for growth.
6
Document Page
Describing the technologies enabling “Smart Home” along with technology enablers & possible
challenges
The trend in the current environment has been highly technological friendly which tend
to offer the various form of the benefits to the people. The main reason behind having the
compliance with the technological advancement is to get the higher efficiency & easiness in
accomplishing the day to day activities without facing any complications .The lifestyle of people
have become highly busy which require them to get the significant functioning with the use of
the technology in turn higher ability o accomplish the objectives can become possible.
There are different form of the technologies which are enabling to have smart home so
that effective automation based automation can become possible. The smart home can be done
by having the utilization of the technologies such as WIFI, Bluetooth, Radio frequency, Zigbee,
Z wave, Infrared, LIFI, UPB, INSTEON, thread, etc (Which home automation technology you
should choose? 2021). There are distinct form of the benefits which can be accomplished by
people by taking the these technologies into the consideration. Smart home is one of the crucial
need of the people in current time as it enables to have the various benefits such as protecting
belonging, keeping eye on the crucial things, etc. On the basis of this it can be interpreted that
there are different form of the objectives which can be accomplished by possessing the distinct
type of the technologies for making home smart that involves eases to make improvement in
lacking areas, etc. Few common smart home technologies such as smart speakers & displays,
plugs, home security cameras, locks and heating & cooling actions (Ma, Guerra-Santin and
Mohammadi, 2020). On the basis of this it can be mentioned that these aids in coordinating with
prevailing requirements.
WiFi is one the significant technology that is used for designing smart home appliances
so that effective networking can be exerted. It drains the batteries of a battery operated
network faster in comparison n to other protocols (Coventry and Branley, 2018).
Bluetooth is popular protocol that is taken into the execution for having the automation
so that short distance-communication like switching on or off of doors, bulbs, etc can be
done effectively. The best part of this technology is that it can be connected with
multiple devices so that higher connecting features can be derived.
Radio frequency is one of the significant protocol that is used for automation so that
gadgets can be controlled be with help of transmitter and receiver. It works by sending
7
Document Page
the on and off commands to the receiver where the loads are connected. It is used for
providing straightforward solutions to remote h controlled appliances.
Zig Bee is one of the advanced protocol that is taken into the used for the home
automation technology so that gaining ability to conduct the activities with having
wireless technology. Z Wave is as well procedure which is connected to the radio
frequency in turn offering the energy saving solutions with wireless devices to make
communication faster and compatible devices.
Infrared is standard technology which is used as the protocol for possessing remote
control activities so that significant accomplishing of higher quality based practices can
become possible.
Li-Fi is an acronym for light fidelity so that electro magnet spectrum used for
communication so that distinct form of the advantages can be derived. This form of the
technology is basically used over blue tooth, WiFi, IR specifically in more energy
conscious offices & homes. This utilizes visible lights, infrared & ultra violet instead of
radio waves.
UPB is basically associated with universal power line Bus that is utilized in home for
wiring systems which aids in transmitting the signals to home automation devices and
used manually.
INSTEON is the hybrid protocol that is used for both wireless and wire based feature so
that overcoming the challenges of conducting daily practices can be exerted effectively.
This can be connected to both the new and old devices which tend to offer the significant
ability to have speed of setting up activities with hassle free arrangements so that
effectual functioning can be exerted by having smart home practices.
NFC is concerned with having the near field communication which is set of
communication protocols that enables to have communication between two electronic
devices which are wireless (Berry and Berry, 2018).
Thread is IP based smart option for home automation that has the feature of two hundred
and fifty devices using noticeably light power. This provides the ability to coordinate
with the h battery operated devices so that functioning with low networking power can
be exerted.
8

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
On the basis of the provided information it can be mentioned that there are different
form of the technologies which are basically used for attaining the goal of having higher
effectiveness to conduct the practices like switching on or off light, air condition, etc. there are
distinct enablers for the smart home which involves window, doors, blinds, light, switches,
heating, air conditioning, clothes washer, dryers, utility meters, TV, BD player, audio systems,
surveillance cameras, etc. In potential there are various enablers for the smart homes that tend to
help in gaining the appropriate information to coordinate with prevailing circumstances (Ullah
and et.al., 2019). In addition to this, it can be mentioned that these are the things that are
involved as the enabler which can be categorized as home appliances, lighting control, room air
conditioners and smart home security, etc. These tend to give the significant ability to coordinate
with the having proper solutions for having seamless and security based home.
On the other side, it can be mentioned that there are certain challenges as well that can
be arisen due to the execution of the technologies for having smart home.
The one of the major issue that can be faced by the user of the smart home is that lack of
interoperability can be occurred. Installing many devices sh & platforms can lead to the
unfortunate realization n that gadgets won't communicate with each other. This can offer the
threat of inappropriateness so that effectual processing can be derived (Liang and Liu, 2018).
Hacking through cloud is the major threat of security that can harm the daily practices of
individual and misuse the sensitive information that can be stored on internet accessible system.
This can offer the security threat to the home-owner which tend to give ineffective ability to
misuse the data which comprises having video data for cameras, etc. There are possibilities of
misusing information of home for threatening which can offer challenges in using the same.
Batteries drain too fast which tend to give set it and forget it features of many infomercial
products so that connect gadgets are only smart when the there is battery. In addition to this, the
other possible challenge that can be faced by the user of particular smart home devices which
involve granting permission without understanding the fine print. The main reason behind this
challenge is to get the significant permission is to have the ability to coordinate with the
permission so that personalization services can be offered. High cots is the another issue which
might be faced by the user as stiff and mass adoption can make it expensive, security
vulnerabilities are plentiful which is due to the higher investment and maintenance expenses.
9
Document Page
On the basis of the provided information it can be mentioned that there are various form
of the benefits which can be derived by implementation of smart hoe technologies that tend to
offer higher convenience, proper coordination with requirements, etc. there are certain
limitations as well which tend to result in lack of privacy & security issues that are required to
be eliminated via using the major course of actions.
Discussing the emerging security challenges, new threat vectors and vulnerabilities along with
counter-measure these new threats
Cyber security is having the protection of internet connected systems such as soft, hard
ware and data from the threats so that issues regarding the security & privacy can be maintained.
In the current era, there are different kinds of the challenges which are arising due to the
prevailing awareness of hacking mechanism, etc. These challenges have the adverse level of
impact o accomplishing the objectives of the various devices. These are issue are required to be
overcome in order to get the effective processing in turn greater positive impact on the working
of organization can be derived (Talwar and et.al., 2021). This challenges involve software
supply chain security, etc.
The one of the significant challenge that is required to be highlighted involve cloud
vulnerabilities that leverage applications and storing sensitive e data related to their employees
and business on cloud. It has the adverse level of impact on the functioning of the companies
which has the major level of impact on the overall functioning of the organization. AI enhanced
cyber security which is highly used by the particular hackers and fraud conducting actions which
can affect the overall functioning of business due to the complex and adaptive malicious
software. AI fizzing and machine learning poisoning are set to be had the big extent of cyber
security threats. Smart contact hacking is concerned with using the higher level of connections
of conducting software programs that ca result in vulnerabilities and make easy for criminals to
hack the contact. Social engineering attacks are used by attackers to trick victims m into the
surrendering sensitive information such credit card details, login insights., etc. this is done by
phishing attacks. In the cyber security there is threat of having fake video or audio recording
that criminals use for illicit purposes. For example- deepfake video of Obama that uses AI diver
which is concerned with fake news that is basically found as threat of the cyber security.
In the potential time the issue of the cyber security is related with having the significant
issues regarding the inability to coordinate with the prevailing requirements of privacy &
10
Document Page
security. An attack of vector is the method of gaining unauthorized access to a network system
which can be used for extracting data so that accomplishing the objective of misusing the
information can become possible. This is related with having the significant information which
can offer the threat to the organization. The challenges involve third parties involvement which
can lead to the misuse of the potential of 5G network that formulate cyber threat. An increase
rate of mobile malware, artificial intelligence that can be controlled by some other person, The
growing population of IoT devices, ransomware attacks, non control over the phishing & super
attacks, growth of hacktivist, configuration mistakes, cloud vulnerabilities, poor data
management, etc. Drone jacking is one of the new wave disturbing cyber security which has
resulted into the prevailing situation.
From the evaluation of the overall cyber security crimes it can be mentioned that there
are various distinct form of the trends in the particular field is prevailing which has the impact
on the overall processing of organizations. There is execution of the weaponization of firmware
attacks, personalized phishing attacks, supply chain threats, etc which has the major level of the
impact in adverse manner. There is lack of awareness regarding cyber security, geo targeted
phishing attacks, health sector attacks, poor cloud security, increased threats to education, IoT
vulnerabilities, mobile devices cyber security loopholes, etc (Gunduz and Das, 2020). These are
the major challenges which are affecting overall processing of the organization. On the basis of
this it can be mentioned that these are the major security challenge that leads the issues
regarding the prevailing circumstances of safety of data. The main reason that can be found
behind rise of the threat is due to the increased application usage of mobile, and other smart
devices which leads to create threat of the security & privacy. On the basis of this, it can be
interpreted that the set of the cyber security threat comprises denial of service, emote, man in the
middle, malware, SQL injection , password attacks, etc.
These can be improved by having impact of remote work is related with having the
allowance of employees to work from home in the times of COVID which tend to offer
information regarding password, policies, etc that involved unplanned cloud migration and swift
procurement of IT products and services to newly remote landscape which gives threat of
security (Andronie and et.al., 2021). Ransomware is one of the most common threat that tend to
attack plague organization with data left h and economic blow due to the cost of recovering
from these threats. In this higher emphasis is provided by criminals on extortion attacks so that
11

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
blackmailing company is exerted. Increase use of multi factor authentication is the best practice
that can be adopted of avoiding the issues regarding data breaches and multicious attack which
aids in developing security can be developed. Continued rise of AI is having machine learning is
helpful in gaining the appropriate ability to build automated security systems that replaces the
human intervention and eliminated the analyzed risk so that effective privacy can be developed.
The other technologies which can be used for overcoming the issues regarding the cyber security
which involve artificial intelligence, behavioral analytics, embedded hardware authentication,
block chain and zero trust model. These all play crucial role in overcoming the issues of cyber
security. In addition to this, data privacy as discipline, inclined possessing of the professional
for offering the corrective cyber security, need for chief security officers, time data visibility,
investing into the hyper automation for security,
On the basis of the provided information it can be interpreted that these are the security
issue which can be arisen due to mentioned action. For gaining the relevant & reliable actions by
mentioned technologies so that that proper improvement can be exerted. This helps in
understanding that such vulnerabilities can majorly affect so taking suitable actions can aid in
gaining competitiveness. This is helpful in gaining the competitiveness in industry by taking the
major action of the growth & development in industry via eliminating those aspects which are
hampering growth & development of firm.
CONCLUSION
From the above report it can be concluded that in the current era, technological
advancement is highly accepted by the people favorably which is influencing the development
of information technology sector. The current study has given emphasis having the significant
emerging trends relating to mobile and wireless technologies within Information Technology
landscape that involves Artificial intelligence, location based technology, augmented & virtual
reality, mobile IOT apps, etc. which favorably affect the IT landscape. . In addition to this, the
current report has given emphasis providing insights about big data challenges which involve
lack of knowledge, etc. recent investigation has emphasized on n having technologies smart
home that involves NFC, ZigBee, Z Wave, Li-FI, INSTEON, radio frequency, blue tooth, etc.
These all leads to the challenges of the security which involves threat of data stealing, etc. In the
current era, the higher emphasis has been provided on gaining the information regarding the
various challenges prevailing due to the security issue which is arising due to higher
12
Document Page
involvement of usage of devices, etc. This challenges involve configuration mistakes, non
control over the phishing & super attacks, ransomware attacks growth of hacktivist, cloud
vulnerabilities, etc which create the major threats to the companies, individuals, etc. that has the
major level of the affect the overall processing of security & privacy.
13
Document Page
REFERENCES
Books and Journal
Alseadoon, I. And et.al., 2021. Migration of existing software systems to mobile computing
platforms: A systematic mapping study. Frontiers of Computer Science. 15(2). pp.1-25.
Andronie, M. and et.al., 2021. Sustainable Cyber-Physical Production Systems in Big Data-
Driven Smart Urban Economy: A Systematic Literature Review. Sustainability. 13(2).
p.751.
Barmpatsalou, K. and et.al., 2018. Current and future trends in mobile device forensics: A
survey. ACM Computing Surveys (CSUR). 51(3),. pp.1-31.
Barua, H.B. and Mondal, K.C., 2019. Approximate computing: A survey of recent trends—
bringing greenness to computing and communication. Journal of The Institution of
Engineers (India): Series B. 100(6). pp.619-626.
Becker, C and et.al., 2019. Pervasive computing middleware: current trends and emerging
challenges. CCF Transactions on Pervasive Computing and Interaction. 1(1). pp.10-23.
Benzidia, S., Makaoui, N. and Bentahar, O., 2021. The impact of big data analytics and artificial
intelligence on green supply chain process integration and hospital environmental
performance. Technological forecasting and social change. 165. p.120557.
Berry, C.T. and Berry, R.L., 2018. An initial assessment of small business risk management
approaches for cyber security threats. International Journal of Business Continuity and
Risk Management. 8(1). pp.1-10.
Coventry, L. and Branley, D., 2018. Cybersecurity in healthcare: A narrative review of trends,
threats and ways forward. Maturitas. 113. pp.48-52.
Gunduz, M.Z. and Das, R., 2020. Cyber-security on smart grid: Threats and potential
solutions. Computer networks. 169. p.107094.
Haoxiang, W. and Smys, S., 2021. Big Data Analysis and Perturbation using Data Mining
Algorithm. Journal of Soft Computing Paradigm (JSCP). 3(01). pp.19-28.
Humayun, M. and et.al., 2020. Cyber security threats and vulnerabilities: a systematic mapping
study. Arabian Journal for Science and Engineering. 45(4). pp.3171-3189.
Koripi, M., 2020. Key characteristics of mobile applications and trends in mobile app
Industry. International Journal of Research and Applications. 7(25).
Kushwaha, A.K., Kar, A.K. and Dwivedi, Y.K., 2021. Applications of big data in emerging
management disciplines: A literature review using text mining. International Journal of
Information ManagUllah, F. and et.al., 2019ement Data Insights. 1(2). p.100017.
Liang, T.P. and Liu, Y.H., 2018. Research landscape of business intelligence and big data
analytics: A bibliometrics study. Expert Systems with Applications. 111. pp.2-10.
Ma, C., Guerra-Santin, O. and Mohammadi, M., 2021. Smart home modification design
strategies for ageing in place: a systematic review. Journal of Housing and the Built
Environment. pp.1-27.
Saritas, O and et.al., 2021. Big data augmentated business trend identification: the case of
mobile commerce. Scientometrics. 126(2). pp.1553-1579.
Talwar, S. and et.al., 2021. Big Data in operations and supply chain management: a systematic
literature review and future research agenda. International Journal of Production
Research. 59(11). pp.3509-3534.
Ullah, F. and et.al., 2019. Cyber security threats detection in internet of things using deep
learning approach. IEEE access. 7. pp.124379-124389.
14

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Valtanen, K., 2021, March. Design challenges of developing a blockchain-enabled smart home.
In 2021 Conference on Information Communications Technology and Society
(ICTAS) (pp. 34-39). IEEE.
Xiao-Shu, W., 2019, April. Progress and Trends in Mobile Cloud Computing Research.
In Journal of Physics: CHaoxiang, W. and Smys, S., 2021onference Series (Vol. 1187,
No. 5, p. 052004). IOP Publishing.
Online
Top Major Challenges of Big Data. 2022. [Online]. Available through:
<https://www.upgrad.com/blog/major-challenges-of-big-data/>
Top Mobile Technology Trends in 2022. 2021. [Online]. Available through: < https://www.sam-
solutions.com/blog/top-mobile-technology-trends/>
Which home automation technology you should choose? 2021. [Online]. Available through:
<https://www.techaheadcorp.com/blog/home-automation-technologies/>
15
1 out of 17
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]