NCU-Week 3 - Assignment: Search and Review Literature
related to Mobile Computing-Due February 28th (If you can turn in
earlier please let me know).
Log In Credentials:
with most areas of computing, security in mobile computing is a paramount
concern. This includes securing the user’s information on the mobile device,
encrypting the information during the transmission of the data to the server,
and securely storing this information on the backend server. Security
vulnerabilities in mobile computing may not only affect a user’s perception of
an app, but may also leave an organization open to legal and ethical
manner in which mobile apps provide security and privacy to a user is through
their use of permissions. On both Android and iOS devices, permissions protect
an app from accessing sensitive information or functionality—such as reading
SMS messages, accessing a user’s contacts, or placing phone calls. App
permissions have received a significant level of research in recent years from
a variety of perspectives, including user comprehension of permissions and
using permissions to properly protect against malicious software.
older, but still very popular, work available in the NCU ACM Library is titled
“Android Permissions Demystified.” Please read this work, included in this
week’s Books and Resources, to understand some of the primary challenges
related to mobile permissions and security. Your task for this week is to use
the NCU Library and find a recent (published within the past two years) work
that discusses any area of mobile permissions, including user
perception/compression, malware protection, updated permission models, or best
practices. In your analysis of this work, you should include the following:
What is the significance of the problem this
work is attempting to address?
What is the process this work uses to address
What are some improvements/future work you
What are some challenges to making these
What are some related works to this topic, and
how do they differ from the analyzed work?
5-7 pages not including title page and references
assignment should demonstrate thoughtful consideration of the ideas and
concepts presented in the course and provide new thoughts and insights relating
directly to this topic. Your response should reflect scholarly writing and
current APA standards. Be sure to adhere to Northcentral University's Academic
your document and click the Submit to Dropbox button.
Mobile Computing: Introduction
Reflect in ePortfolioSubmit FeedbackDownload
Mobile computing is a vast topic area, ranging from mobile
application development to the large enterprise systems that support these
applications. Understanding how this complicated mobile ecosystem can be
developed, utilized, and maintained is an important role for many technical
managers. This week, you will research and analyze the motivations for mobile
systems, the important considerations of their development, and their
application to business organizations. The critical review of the literature
provides a foundation of knowledge for you to continue investigating
research-worthy problems both in the course and throughout your program of
Proper design and infrastructure are paramount for any
technology project, but can be especially important when using mobile systems.
There are typically several concerns that must be addressed when integrating
mobile systems into an existing infrastructure. Some of the most paramount
concerns are maintainability, compatibility, and
Be sure to review this week's resources carefully. You are
expected to apply the information from these resources when you prepare your
Books and Resources for this Week
Atkins, A. S., Ali, A., &
Shah, H. (2006). Extending e-business applications using mobile technology.
Proceedings of the 3rd International Conference:
Picco, G. P., Julien, C., Murphy, A. L., Musolesi, M., & Roman, G.-C.
(2014). Software engineering for mobility: Reflecting on the past, peering into
Felt, A. P., Chin, E., Hanna, S., Song, D., & Wagner, D. (2011).
Android permissions demystified. In Proceedings of the 18th ACM Conference on