Mobile Computing: Opportunities, Challenges, and Benefits Analysis
VerifiedAdded on  2020/03/07
|9
|2198
|170
Report
AI Summary
This report delves into the opportunities of mobile computing in the modern business landscape, examining its impact on productivity, communication, and cloud adoption. It explores the benefits of mobile computing, such as increased efficiency and improved customer satisfaction, while also addressing the challenges of mobile cloud computing and security concerns. The report analyzes emerging issues, the adoption of Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS), and provides insights into how businesses can leverage mobile computing to enhance their operations. The research methodology includes a qualitative approach, utilizing interviews and questionnaires to gather data from various institutions. The report concludes by emphasizing the importance of mobile computing for business growth and development, while also acknowledging the need for robust security measures.

Opportunities Making Business with Mobile Computing
Name
The Name of the Class (Course)
Professor (Tutor)
The Name of the School (University)
The City and State where it is located
Date
Name
The Name of the Class (Course)
Professor (Tutor)
The Name of the School (University)
The City and State where it is located
Date
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

MOBILE COMPUTING 2
Table of Contents
Introduction................................................................................................................................2
Project Objective....................................................................................................................3
Project Scope..........................................................................................................................3
Literature Review.......................................................................................................................4
Research Design and Methodology...........................................................................................6
Research Limitations..............................................................................................................7
Time Schedule (Research plan).............................................................................................7
Conclusion..................................................................................................................................7
References..................................................................................................................................8
Introduction
In the modern era, the enterprises, in most cases, are demanded to send their workers
out of the offices to push the sales and increase brand awareness, at the same time
communicate anywhere, anytime. This has significantly increased the need for the use of
mobile devices or simply mobile computing. (ValleyExpetec, n.d.) Stipulates that it is
imperative to improve productivity in and out of the offices, running the company efficiently
and increasing the competitive advantage. Thus, connectivity of the workers with the
organization through communication is essential. However, businessmen are faced with
different decisions to make; some are complex whereas others are simple. For instance,
leading team may have a role in simply deciding whether to embrace mobile computing, and
sometimes it gets tricky on deciding which mobile platform to adopt. However, it remains
vital adopting the mobile computing with an aim of elevating the efficiency of information
transfer, and overcoming mobile storage space (Shon, et al., 2014). That is, mobile
computing has adopted cloud storage that can keep large amounts of data. Therefore, mobile
cloud computing (MCC) has helped businesses to overcome the barrier of storage capacity.
Table of Contents
Introduction................................................................................................................................2
Project Objective....................................................................................................................3
Project Scope..........................................................................................................................3
Literature Review.......................................................................................................................4
Research Design and Methodology...........................................................................................6
Research Limitations..............................................................................................................7
Time Schedule (Research plan).............................................................................................7
Conclusion..................................................................................................................................7
References..................................................................................................................................8
Introduction
In the modern era, the enterprises, in most cases, are demanded to send their workers
out of the offices to push the sales and increase brand awareness, at the same time
communicate anywhere, anytime. This has significantly increased the need for the use of
mobile devices or simply mobile computing. (ValleyExpetec, n.d.) Stipulates that it is
imperative to improve productivity in and out of the offices, running the company efficiently
and increasing the competitive advantage. Thus, connectivity of the workers with the
organization through communication is essential. However, businessmen are faced with
different decisions to make; some are complex whereas others are simple. For instance,
leading team may have a role in simply deciding whether to embrace mobile computing, and
sometimes it gets tricky on deciding which mobile platform to adopt. However, it remains
vital adopting the mobile computing with an aim of elevating the efficiency of information
transfer, and overcoming mobile storage space (Shon, et al., 2014). That is, mobile
computing has adopted cloud storage that can keep large amounts of data. Therefore, mobile
cloud computing (MCC) has helped businesses to overcome the barrier of storage capacity.

MOBILE COMPUTING 3
However, almost all MCC architectures has security risk. This means retrieving the data calls
for strict measures (Shon, et al., 2014).
Due to the ever-increasing amount of data and the need to reach the consumers at
their places, the business person needs to move from place to place. According to
(ValleyExpetec, n.d.) employees of any institution should be given a chance to maximize
their productivity. Cloud computing is the essential key, that gives the employees and
consumers an opportunity to access vital information, anytime anywhere. Therefore, it is
imperative to understand mobile computing, challenges of mobile cloud computing, their
impact, and more importantly its benefits.
Project Objective
The research will evaluate the opportunities of mobile computing in the modern era,
and some of the emerging issues in mobile computing. By doing so, the research will give the
trend of mobile computing; the opportunities offered and how it can boost the revenues of an
organization.
Project Scope
To achieve the research objectives, the study will carry out a strategic analysis of the
mobile computing in an organization. In agreement with (PR Newswire, 2013) the strength,
weakness, opportunities, and threats (SWOT) analysis will be carried out. Thus, security
trends for cloud computing, network connectivity, and elasticity, Authentication and
authorization among others, will be the basis of the research. The research will evaluate how
different institutions on have adopted the use of mobile computing, which strategies have
been used to make the use of mobile computing successful and at the same time cheap. Thus,
However, almost all MCC architectures has security risk. This means retrieving the data calls
for strict measures (Shon, et al., 2014).
Due to the ever-increasing amount of data and the need to reach the consumers at
their places, the business person needs to move from place to place. According to
(ValleyExpetec, n.d.) employees of any institution should be given a chance to maximize
their productivity. Cloud computing is the essential key, that gives the employees and
consumers an opportunity to access vital information, anytime anywhere. Therefore, it is
imperative to understand mobile computing, challenges of mobile cloud computing, their
impact, and more importantly its benefits.
Project Objective
The research will evaluate the opportunities of mobile computing in the modern era,
and some of the emerging issues in mobile computing. By doing so, the research will give the
trend of mobile computing; the opportunities offered and how it can boost the revenues of an
organization.
Project Scope
To achieve the research objectives, the study will carry out a strategic analysis of the
mobile computing in an organization. In agreement with (PR Newswire, 2013) the strength,
weakness, opportunities, and threats (SWOT) analysis will be carried out. Thus, security
trends for cloud computing, network connectivity, and elasticity, Authentication and
authorization among others, will be the basis of the research. The research will evaluate how
different institutions on have adopted the use of mobile computing, which strategies have
been used to make the use of mobile computing successful and at the same time cheap. Thus,
You're viewing a preview
Unlock full access by subscribing today!

MOBILE COMPUTING 4
the researcher will use qualitative research design to determine the most common mobile
computing opportunities in the market.
By the end of the research, there will be a clear pathway, on how the mobile
computing has improved the productivity, connectivity, communication and collaboration,
and creating a paperless environment. The researcher will evaluate the hypothesis and help in
answering the research question. Research question will act as a backbone to all the analysis.
Literature Review
(ValleyExpetec, n.d.) Defines the mobile computing in businesses as the ability to
access office and data remotely and carrying out business activities anywhere anytime.
Therefore, using this technology, the employees are able to remotely access the mails and
data from their comfort, either at home or anywhere outside the organization premises. On
the same note, cloud computing is regarded as the internet technology that gives a virtualized
IT resources (Shon, et al., 2014). Recently, there has been a lot of advancement in
virtualization software which is available for the mobile computing. This means that most of
the companies have adopted mobile computing. In a matter of fact, (Shon, et al., 2014) stated
that for any company to enter or achieve full-fledge growth and development, it must adopt
the technology.
(e Guard Technology Services, 2017) Gives seven simple tips that can help small
businesses incorporate mobile computing in their daily activities. First, the organization can
use Bring-Your-Own-Device (BYOD) strategy to cut down the cost of purchasing the new
hardware. Second, the company needs to adopt a platform that works on both mobile and
apple smartphones. This app should also be easy to upgrade. Third, one can integrate apps
instead of using different platforms that are related, or need a transfer of information from
the researcher will use qualitative research design to determine the most common mobile
computing opportunities in the market.
By the end of the research, there will be a clear pathway, on how the mobile
computing has improved the productivity, connectivity, communication and collaboration,
and creating a paperless environment. The researcher will evaluate the hypothesis and help in
answering the research question. Research question will act as a backbone to all the analysis.
Literature Review
(ValleyExpetec, n.d.) Defines the mobile computing in businesses as the ability to
access office and data remotely and carrying out business activities anywhere anytime.
Therefore, using this technology, the employees are able to remotely access the mails and
data from their comfort, either at home or anywhere outside the organization premises. On
the same note, cloud computing is regarded as the internet technology that gives a virtualized
IT resources (Shon, et al., 2014). Recently, there has been a lot of advancement in
virtualization software which is available for the mobile computing. This means that most of
the companies have adopted mobile computing. In a matter of fact, (Shon, et al., 2014) stated
that for any company to enter or achieve full-fledge growth and development, it must adopt
the technology.
(e Guard Technology Services, 2017) Gives seven simple tips that can help small
businesses incorporate mobile computing in their daily activities. First, the organization can
use Bring-Your-Own-Device (BYOD) strategy to cut down the cost of purchasing the new
hardware. Second, the company needs to adopt a platform that works on both mobile and
apple smartphones. This app should also be easy to upgrade. Third, one can integrate apps
instead of using different platforms that are related, or need a transfer of information from
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

MOBILE COMPUTING 5
one to another. Fourth, the company should tailor platforms or apps to suit the company’s
needs and not necessarily adopt an application because it suited other businesses. Also, the
company should strategically choose the data storage. For instance, if the cloud computing is
used, any device that can access the cloud can be used to change, retrieve, and save the
information. Lastly but not least the application should adopt mobile computing that is
adaptable to new evolution or changes in technology (e Guard Technology Services, 2017).
(ValleyExpetec, n.d.) Stipulates that there are a number of things that an institution
that adopts cloud can reap. Among them, include, maximizing overall productivity, customer
satisfaction improvement, increased communication and collaboration, adopting flexible
working environment, and creating a paperless working environment. It is important to note
that these benefits either increases margin revenue, sales or reduces the cost of production.
This is as suggested by (Shon, et al., 2014).
However, the security of mobile computing in organization remains a problem
regardless of the cloud computing architecture used (Shon, et al., 2014). (Kalyvas, et al.,
2013) Discusses in details security risks that face mobile computing. First, the trending issue
of security is the concern about access control and identity management. This means that
there is a need to establish a federated approach to control and manage identities across the
cloud and other clouds. Second, is the smartphone data slinging, which main issue is
surrounding the retrieval of data ensuring high cases of confidentiality. To overcome this
problem, (Shon, et al., 2014) recommends the use of lightweight and energy efficient security
protocols.
There are three foundational services in cloud computing, platform-as-a-service
(PaaS), Software-as-a-service (SaaS), and Infrastructure-as-a-service (IaaS). However, SaaS
is sometimes considered as a cloud computing delivery model (Kalyvas, et al., 2013). Also,
one to another. Fourth, the company should tailor platforms or apps to suit the company’s
needs and not necessarily adopt an application because it suited other businesses. Also, the
company should strategically choose the data storage. For instance, if the cloud computing is
used, any device that can access the cloud can be used to change, retrieve, and save the
information. Lastly but not least the application should adopt mobile computing that is
adaptable to new evolution or changes in technology (e Guard Technology Services, 2017).
(ValleyExpetec, n.d.) Stipulates that there are a number of things that an institution
that adopts cloud can reap. Among them, include, maximizing overall productivity, customer
satisfaction improvement, increased communication and collaboration, adopting flexible
working environment, and creating a paperless working environment. It is important to note
that these benefits either increases margin revenue, sales or reduces the cost of production.
This is as suggested by (Shon, et al., 2014).
However, the security of mobile computing in organization remains a problem
regardless of the cloud computing architecture used (Shon, et al., 2014). (Kalyvas, et al.,
2013) Discusses in details security risks that face mobile computing. First, the trending issue
of security is the concern about access control and identity management. This means that
there is a need to establish a federated approach to control and manage identities across the
cloud and other clouds. Second, is the smartphone data slinging, which main issue is
surrounding the retrieval of data ensuring high cases of confidentiality. To overcome this
problem, (Shon, et al., 2014) recommends the use of lightweight and energy efficient security
protocols.
There are three foundational services in cloud computing, platform-as-a-service
(PaaS), Software-as-a-service (SaaS), and Infrastructure-as-a-service (IaaS). However, SaaS
is sometimes considered as a cloud computing delivery model (Kalyvas, et al., 2013). Also,

MOBILE COMPUTING 6
(Brill, 2013) considered these platforms as game changers for businesses, since they increase
reliability.
Research Questions/Hypothesis
Primary Question: The research will aim at assessing the following primary research
question: what are the emerging issues related to mobile computing in the modern business?
Secondary Questions: To get further insight about the objective of the research, the
research will answer the following secondary research questions;
i. What are emerging issues in the mobile computing?
ii. Which of the three mobile computing services are widely used by businesses
(SaaS, PaaS, or IaaS)?
iii. Which are the most profound merits of adopting business computing in the
organizations?
Although some of the benefits, and services used were highlighted in the literature
review. There is still a gap left as most of the questions highlighted have received little
attention in the previous studies.
Research Design and Methodology
Selecting the right research design is important since it ensures that right conclusion is
attained. In this case, qualitative research design will be used. (Golafshani, 2003) Urges that
qualitative paradigm is important when the researcher wants to understand a phenomenon in
a context-specific setting. This means that the researcher does not alter the occurrence of
events. The main aim of use design is to illuminate, understand and extrapolate the findings
to similar situations. Also, quantitative paradigm will be used to test for validity and
(Brill, 2013) considered these platforms as game changers for businesses, since they increase
reliability.
Research Questions/Hypothesis
Primary Question: The research will aim at assessing the following primary research
question: what are the emerging issues related to mobile computing in the modern business?
Secondary Questions: To get further insight about the objective of the research, the
research will answer the following secondary research questions;
i. What are emerging issues in the mobile computing?
ii. Which of the three mobile computing services are widely used by businesses
(SaaS, PaaS, or IaaS)?
iii. Which are the most profound merits of adopting business computing in the
organizations?
Although some of the benefits, and services used were highlighted in the literature
review. There is still a gap left as most of the questions highlighted have received little
attention in the previous studies.
Research Design and Methodology
Selecting the right research design is important since it ensures that right conclusion is
attained. In this case, qualitative research design will be used. (Golafshani, 2003) Urges that
qualitative paradigm is important when the researcher wants to understand a phenomenon in
a context-specific setting. This means that the researcher does not alter the occurrence of
events. The main aim of use design is to illuminate, understand and extrapolate the findings
to similar situations. Also, quantitative paradigm will be used to test for validity and
You're viewing a preview
Unlock full access by subscribing today!

MOBILE COMPUTING 7
reliability of the data collected. That is, the triangulation technique is used in evaluating,
controlling bias and establishing valid proposition about the data obtained. This is mainly
because, it can combine both qualitative and quantitative methodologies (Golafshani, 2003).
A sample of 30 institutions in Australia will be randomly selected. This sample will
be sufficient to paint the actual picture of the opportunities, and trend of the mobile
computing. The sample will focus on all the companies that have adopted the mobile
computing in their operation. Based on the research objective and research question, the main
variables to be assessed include; emerging issues, which will include issues that the
businesses perceive as emerging on the mobile computing, challenges of cloud computing,
and merits reaped by companies after adopting mobile computing. The data will be collected
through email, interviews, and questionnaires. Combining these three techniques will help in
determining whether there are anomalies in the data when different data collection methods
are used.
Research Limitations
The research will focus on companies located in Australia and have adopted mobile
computing. This will act as the inclusion and exclusion criteria. Both qualitative and
quantitative research will be used to successfully achieve the research aims. However, the
research will focus on determining which of the problems are more common among the
selected companies. Also, the core interest will be on which merits have been reaped as a
result of adopting mobile computing.
Time Schedule (Research plan)
The research will take approximately one and a half month. One month will be used
in data collection, compilation, and data cleaning. The next ten days will be analysing the
collected data. Then the next four days will be editing and proofreading the final research.
reliability of the data collected. That is, the triangulation technique is used in evaluating,
controlling bias and establishing valid proposition about the data obtained. This is mainly
because, it can combine both qualitative and quantitative methodologies (Golafshani, 2003).
A sample of 30 institutions in Australia will be randomly selected. This sample will
be sufficient to paint the actual picture of the opportunities, and trend of the mobile
computing. The sample will focus on all the companies that have adopted the mobile
computing in their operation. Based on the research objective and research question, the main
variables to be assessed include; emerging issues, which will include issues that the
businesses perceive as emerging on the mobile computing, challenges of cloud computing,
and merits reaped by companies after adopting mobile computing. The data will be collected
through email, interviews, and questionnaires. Combining these three techniques will help in
determining whether there are anomalies in the data when different data collection methods
are used.
Research Limitations
The research will focus on companies located in Australia and have adopted mobile
computing. This will act as the inclusion and exclusion criteria. Both qualitative and
quantitative research will be used to successfully achieve the research aims. However, the
research will focus on determining which of the problems are more common among the
selected companies. Also, the core interest will be on which merits have been reaped as a
result of adopting mobile computing.
Time Schedule (Research plan)
The research will take approximately one and a half month. One month will be used
in data collection, compilation, and data cleaning. The next ten days will be analysing the
collected data. Then the next four days will be editing and proofreading the final research.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

MOBILE COMPUTING 8
The traveling cost will be approximately $300 US dollars. This will be major part of the
expenditure since I will travel around different companies collecting data.
Conclusion
As pointed out, this research is designed in establishing the recent trends in mobile
computing, challenges, and benefits. Both qualitative and quantitative will be applied so that
reliability and credibility of the research results. The validity and reliability of the research
will be tested using the triangulation technique.
References
Brill, E., 2013. Mobile Computing: It's a Game Changer for Companies. [Online]
Available at: http://www.theatlantic.com/sponsored/ibm-mobile/mobile-computing-its-game-
changer-companies/32/
[Accessed 16 08 2017].
e Guard Technology Services, 2017. 7 Tips For Making Mobile Computing Work For Your
Business. [Online]
Available at: https://www.eguardtech.com/7-tips-for-making-mobile-computing-work-for-
your-business
Golafshani, N., 2003. Understanding reliability and validity in qualitative research. The qualitative
report, Volume 8(4), pp. 597-606.
The traveling cost will be approximately $300 US dollars. This will be major part of the
expenditure since I will travel around different companies collecting data.
Conclusion
As pointed out, this research is designed in establishing the recent trends in mobile
computing, challenges, and benefits. Both qualitative and quantitative will be applied so that
reliability and credibility of the research results. The validity and reliability of the research
will be tested using the triangulation technique.
References
Brill, E., 2013. Mobile Computing: It's a Game Changer for Companies. [Online]
Available at: http://www.theatlantic.com/sponsored/ibm-mobile/mobile-computing-its-game-
changer-companies/32/
[Accessed 16 08 2017].
e Guard Technology Services, 2017. 7 Tips For Making Mobile Computing Work For Your
Business. [Online]
Available at: https://www.eguardtech.com/7-tips-for-making-mobile-computing-work-for-
your-business
Golafshani, N., 2003. Understanding reliability and validity in qualitative research. The qualitative
report, Volume 8(4), pp. 597-606.

MOBILE COMPUTING 9
Kalyvas, J. R., Overly, M. R. & Karlyn, M. A., 2013. Cloud Computing: A Practical Framework for
Managing Cloud Computing Risk-Part I. Intellectual Property & Technology Law Journal;,
Volume 25(3), pp. 7-18.
PR Newswire, 2013. Wireless/Mobile Devices and Applications: Solutions and Market
Opportunities. PR Newswire; New York.
Shon, T., Cho, J., Han, K. & Choi, H., 2014. Toward Advanced Mobile Cloud Computing for the
Internet. Mobile Networks and Applications, pp. 404-413.
ValleyExpetec, n.d. ValleyExpetec.org. [Online]
Available at: https://www.google.com/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=9&ved=0ahUKEwjq_bzvyN3VAhXIMhoKHd4Q
CrgQFghoMAg&url=http%3A%2F%2Fvalleyexpetec.com%2Fwp-content%2Fuploads
%2F2016%2F03%2Fvalleyexpetec_sb_mobility.pdf&usg=AFQjCNHczc5E9aaXIg_qJrWPw
mITEJ6HLQ
Kalyvas, J. R., Overly, M. R. & Karlyn, M. A., 2013. Cloud Computing: A Practical Framework for
Managing Cloud Computing Risk-Part I. Intellectual Property & Technology Law Journal;,
Volume 25(3), pp. 7-18.
PR Newswire, 2013. Wireless/Mobile Devices and Applications: Solutions and Market
Opportunities. PR Newswire; New York.
Shon, T., Cho, J., Han, K. & Choi, H., 2014. Toward Advanced Mobile Cloud Computing for the
Internet. Mobile Networks and Applications, pp. 404-413.
ValleyExpetec, n.d. ValleyExpetec.org. [Online]
Available at: https://www.google.com/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=9&ved=0ahUKEwjq_bzvyN3VAhXIMhoKHd4Q
CrgQFghoMAg&url=http%3A%2F%2Fvalleyexpetec.com%2Fwp-content%2Fuploads
%2F2016%2F03%2Fvalleyexpetec_sb_mobility.pdf&usg=AFQjCNHczc5E9aaXIg_qJrWPw
mITEJ6HLQ
You're viewing a preview
Unlock full access by subscribing today!
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.