Richard Henderson
Dr. James Francisco
CIS 500 – Information Systems for Decision Making
9/7/2012
Strayer University
Mobile Computing and Social Networks Mobile computing and social networks are part of the daily lives of millions of Americans. “48% of American adults own a mobile computing device in some form according to the latest Nielsen data.” (Knott, 2012) As far as social networking site usage “over 65% of all internet users in the United States use social networking sites.” (Brenner, 2012) It is obvious that mobile computing and social networking on the web is not a passing fade. There are many uses and applications for mobile computing and social networks. In this paper a few of these aspects will be examined. First an assessment will be made as to the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. Second, an evaluation of the benefits realized by consumers because of the ability to gain access to their own data via mobile applications will be completed. Third, the challenges of developing applications that run on mobile devices because of the small screen size will be examined. Forth, the methods that can be used to decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android will be described. Fifth, due to mobile applications requiring high availability because end users need to have continuous access to IT and IS systems, a discussion of the ways of providing high availability will be undertaken. Finally, because mobile devices are subjected to hacking at a higher rate than non-mobile devices, methods of making mobile devices more secure will be examined. Mobile based applications provide a wealth of information to the end user and businesses alike. Users on the go can download and upload information effortlessly
References: Brenner, J. (2012, May 31). Pew Internet: Social Networking (full detail). Retrieved September 6, 2012, from Pew Internet: http://pewinternet.org/Commentary/2012/March/Pew- Gartner. (2009, November 18). Gartner Identifiies the Top 10 Consumer Mobile Applications for 2012 Retrieved September 6, 2012, from PC World: http://www.pcworld.com/ article/192803/geolocation_101_how_it_works_the_apps_and_your_privacy.html ISACA. (2011). http://www.isaca.org/Groups/Professional-English/wireless/ GroupDocuments/Geolocation_WP.pdf August 15, 2012, from The Next Web: http://thenextweb.com/insider/2012/02/15/what- ios-apps-are-grabbing-your-data-why-they-do-it-and-what-should-be-done/ Phifer, L. (2008, November). Smartphone Security: The growing treate of mobile malware. Retrieved September 7, 2012, from Search Security: http://searchsecurity.techtarget.com /tip/Smartphone-security-The-growing-threat-of-mobile-malware Phifer, L. (2009, March). Three Steps to achieve security for smartphones within a budget. Retrieved August 15, 2012, from Search Midmarket Security: http://searchmidmarket security.techtarget.com/tip/Three-steps-to-achieve-security-for-smartphones-within-a- budget