Mobile Application Report: Analysis of Two Research Papers

Verified

Added on  2022/11/13

|9
|1798
|203
Report
AI Summary
This report presents an analysis of two research papers concerning mobile applications. The first paper, by Hoehle and Venkatesh (2015), focuses on mobile application usability, detailing conceptualization and instrument development. The second paper, by He, Chan, and Guizani (2015), investigates mobile application security, specifically addressing malware threats and defenses. The report compares the methodologies, findings, and advantages/disadvantages of each paper, highlighting differences in approach and outcomes. The analysis includes a discussion of the research methods employed, such as the use of datasets and qualitative methodologies, and the comparison of factors influencing usability and security risks. The report concludes with recommendations and suggestions for future research directions, emphasizing the importance of both usability and security in the development and deployment of mobile applications. It provides a comprehensive overview of the current state of mobile application research and its implications for developers and users.
Document Page
Running head: MOBILE APPLICATION
Mobile Application
Name of the Student
Name of the University
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2
MOBILE APPLICATION
Table of Contents
Introduction to the topic...................................................................................................................3
Introduction to both papers..............................................................................................................3
Methodology used in both papers....................................................................................................3
Comparison of both papers..............................................................................................................4
Comments on advantages and disadvantages of both papers..........................................................6
Recommendation.............................................................................................................................6
Conclusion.......................................................................................................................................7
References........................................................................................................................................8
Document Page
3
MOBILE APPLICATION
Introduction to the topic
Innovative advances have been reshaping the century in another structure. There have
been different shrewd gadgets built up that have been changing the way of life of individuals.
One of these brilliant gadgets are cell phones. This report has been centered around two research
papers dependent on versatile applications. A basic examination and correlation of the two
papers have been done in this report.
Introduction to both papers
The two papers investigated in this report are Hoehle and Venkatesh, (2015). Portable
application ease of use: Conceptualization and instrument advancement and He, Chan and
Guizani (2015). Versatile application security: malware dangers and resistances. Bothe the
papers have concentrated on the portable application in present day days. The main paper
portrays about versatile application convenience conceptualization utilizing instruments for
overview with 10-step method. The second paper portrays about security issues in versatile
application and its answers. There different security issues discussed in the paper that bargains in
the portable applications.
Methodology used in both papers
As research done by Hoehle and Venkatesh, (2015), client experience of Apple has been
taken as information for directing the examination. This has driven rules for creating
conceptualization of portable application ease of use. For accomplishing the target, the scientist
has gathered fThe datasets including content legitimacy (n=138), pretest (n=440), approval
(n=408) and cross-approval (n=412). The nomo-intelligent legitimacy of this instrument has
been created by testing its impact on two results. The second paper have helped in recognizing
Document Page
4
MOBILE APPLICATION
various attacks on the adaptable applications including spyware strike, Worm-based ambush,
botnets and DDoS ambushes (Kim et al., 2015). The second research done by He, Chan, S.
what's more, Guizani, (2015), examines about the dangers and dangers in the portable
applications. The scientists has utilized subjective methodology in this examination. Information
has been gathered from different online journals, articles and books identified with versatile
application security dangers and arrangements.
Comparison of both papers
In a general sense, compact malware revelation systems are either signature based or of
course variation from the norm based. There have been different procedures incorporated into the
ease of use of the portable application in the market. Different variables have been incorporated
into the absence of portable application ease of use including outside and interior elements.
(Hoehle and Venkatesh 2015). The Android and iOS stages have been recognizing the portable
application improvement in the market. Be that as it may, in the second paper there have been a
few security issues and dangers have been talked about. The security dangers to the cell phones
have been identified with the information and data put away in the advanced cells. Different
assaults including the eDDoS assault have been prominent among the programmers.
Programmers used to assault cell phone s utilizing an unsafe malware and infections (Hoehle,
Aljafari and Venkatesh 2016). Different techniques have been acquainted with relieve these
issues in the mobile telephones and its applications. There have been a few antivirus and
firewalls. Therefore, simply compelled acknowledgment capacity is given while imperative
resources are required. Such a procedure may not be feasible (Stoyanov et al. 2016).
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5
MOBILE APPLICATION
Comments on advantages and disadvantages of both papers
There have been various strategies fused into the convenience of the flexible application
in the market. There have been fitting getting ready and customer rules gave in the investigation
to understanding the use of the compact applications. There have been need in the miobile
convenience by customers at various measurements. Various factors have been fused into the
nonattendance of versatile application usability including external and inside segments. (Hoehle
and Venkatesh 2015).The reason for circulation of different customer rules have been suitably
prompted in the customer manual. Imaginative advances have been reshaping the century in
another structure. The Android and iOS stages have been perceiving the flexible application
improvement in the market. In any case, in the second paper there have been a couple of security
issues and perils have been discussed. The security perils to the PDAs have been related to the
data and information set away in the propelled cell phones. Various ambushes including the
eDDoS attack have been outstanding among the developers. Software engineers used to attack
PDA s using a ruinous malware and contaminations (Hoehle, Aljafari and Venkatesh 2016).
Various procedures have been familiar with reduce these issues in the cell phones and its
applications. There have been a couple antivirus and firewalls (Lee et al. 2016). The second
paper have helped in distinguishing different assaults on the portable applications including
spyware assault, Worm-based assault, botnets and DDoS assaults. In this way, a few spam
applications used to gain admittance to the cell phones and a few information and data used to be
get broken from the cell phones (Kim et al., 2015).
Recommendation
Both the papers have attempted well to basically break down the idea of versatile
applications. The revelations have noteworthy repercussions for specialists since we perceived
Document Page
6
MOBILE APPLICATION
fundamental comfort parts in the particular situation of adaptable applications. The instrument
could be used by specialists to focus to-be-made, to-be-completed, additionally, existing
adaptable applications. For example, associations could use The flexible application comfort
conceptualization what's progressively, related instrument in all times of the structure
improvement life cycle including the examination organize, examination likewise, plan arrange,
application execution stage and application upkeep mastermind.
Conclusion
As a result of the no matter how you look at it scattering of PDAs, purchasers anticipate
that simple should utilize and well-organized convenient applications from master centers in
various organizations. Up until this point, essentially nothing orderly help has been offered to
evaluate existing flexible applications or in arranging new adaptable applications. Our stir
developed a conceptualization and related review instrument subject to Apple's general customer
experience decides that can help such an endeavor. Our work in like manner fills in as a model
that uses the framework proposed by MacKenzie et al. (2011), yet with specific alterations that
we observed to be essential.
Document Page
7
MOBILE APPLICATION
References
Balaam, M., Comber, R., Jenkins, E., Sutton, S. and Garbett, A., 2015, April. FeedFinder: a
location-mapping mobile application for breastfeeding women. In Proceedings of the 33rd
Annual ACM Conference on Human Factors in Computing Systems (pp. 1709-1718). ACM.
Hoehle, H. and Venkatesh, V., 2015. Mobile application usability: Conceptualization and
instrument development. Mis Quarterly, 39(2).
Hoehle, H., Aljafari, R. and Venkatesh, V., 2016. Leveraging Microsoft׳ s mobile usability
guidelines: Conceptualizing and developing scales for mobile application usability. International
Journal of Human-Computer Studies, 89, pp.35-53.
Kim, E., Corte-Real, M. and Baloch, Z., 2016, April. A deep semantic mobile application for
thyroid cytopathology. In Medical Imaging 2016: PACS and Imaging Informatics: Next
Generation and Innovations (Vol. 9789, p. 97890A). International Society for Optics and
Photonics.
Kim, S.J., Wang, R.J.H. and Malthouse, E.C., 2015. The effects of adopting and using a brand's
mobile application on customers' subsequent purchase behavior. Journal of Interactive
Marketing, 31, pp.28-41.
Lee, Y.J., Qu, W., Singh, S., Kim, D.Y., Kim, K.H., Kim, S.H., Park, J.J. and Cho, G.H., 2016.
A 200-mA digital low drop-out regulator with coarse-fine dual loop in mobile application
processor. IEEE Journal of Solid-State Circuits, 52(1), pp.64-76.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8
MOBILE APPLICATION
Malisa, L., Kostiainen, K. and Capkun, S., 2017, March. Detecting mobile application spoofing
attacks by leveraging user visual similarity perception. In Proceedings of the Seventh ACM on
Conference on Data and Application Security and Privacy (pp. 289-300). ACM.
McCarroll, M.L., Armbruster, S., Pohle-Krauza, R.J., Lyzen, A.M., Min, S., Nash, D.W.,
Roulette, G.D., Andrews, S.J. and von Gruenigen, V.E., 2015. Feasibility of a lifestyle
intervention for overweight/obese endometrial and breast cancer survivors using an interactive
mobile application. Gynecologic oncology, 137(3), pp.508-515.
Shameli, A., Althoff, T., Saberi, A. and Leskovec, J., 2017, April. How gamification affects
physical activity: Large-scale analysis of walking challenges in a mobile application.
In Proceedings of the 26th International Conference on World Wide Web Companion (pp. 455-
463). International World Wide Web Conferences Steering Committee.
Song, J., Baker, J., Wang, Y., Choi, H.Y. and Bhattacherjee, A., 2018. Platform adoption by
mobile application developers: A multimethodological approach. Decision Support Systems, 107,
pp.26-39.
Stoyanov, S.R., Hides, L., Kavanagh, D.J. and Wilson, H., 2016. Development and validation of
the user version of the Mobile Application Rating Scale (uMARS). JMIR mHealth and
uHealth, 4(2), p.e72.
Tarute, A., Nikou, S. and Gatautis, R., 2017. Mobile application driven consumer
engagement. Telematics and Informatics, 34(4), pp.145-156.
Xu, C., Peak, D. and Prybutok, V., 2015. A customer value, satisfaction, and loyalty perspective
of mobile application recommendations. Decision Support Systems, 79, pp.171-183.
Document Page
9
MOBILE APPLICATION
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]