The advancements in the field of technology have increased the opportunities for the organizations to compete more successfully in the market. The organizations are regularly shifting towards the enhancements of their technological resources for improving the performance. In order to shift towards these advancements, the organizations also have to face a number of challenges. Earlier, the organizations used to perform the business operations with the help of web-based applications. But, in the present scenario, increasing use of smartphones has introduced the use of mobile technology into the business operations and processes (Rahimi et al, 2014). This study aims to describe the literature written related to the challenges and opportunities existed in the industry when the processes of an organization are based on the mobile computing and advancements. The study describes a brief explanation of the objective and scope of the entire project and the review of literature which has been provided by the economists after carrying out vast research on the topic. At the end of the report, a conclusion has been drawn to provide an overview to the entire study and to frame the overall concept that can be understood in an easy manner to the user of this paper.
The introduction of mobile computing has become essential for the business organizations due to the upgraded of technology day by day. The organizations are required to implement this particular technology in order to enhance the productivity of the employees and well as the capacity of the business operations. But, before implementing this technology, the management of an organization needs to access all the challenges and limitation to use mobile computing in the business (Qi and Gani, 2012). This project mainly increases the level of understanding and knowledge related to the use of mobile computing devices and the fact the how the devices should be used to deal with the challenges in an effective manner and to take the advantages of opportunities. Along with this, the project always provides the knowledge of a wide range of mobile computing devices that can be used by almost all the organization in a generalized manner to perform the tasks that are almost common to all the businesses. Furthermore, some recommendations have also been provided that can be used by the organization to deal with the challenges while maintaining the profitability and success of the business in the long run.
The term mobile computing technology can be understood as the technology which is specially developed for use smartphones. However, on the basis of findings of Pejovic and Musolesi (2015), it is also said that smartphones work only as a part of mobile computing technology. Mobile computing can be defined as the existence of cloud computing services in the smartphones. This technology is used to transmit the set of data and voice with the help of portable devices and wireless network. Mobile computing was previously used for only the communication purpose. But in the present scenario, it is being used for keeping the official record of the employees and often used to track them in case of the organizations providing work from home.
According to Mitra et al. (2015), this helps the organization to possess a huge amount of ability and mobility to have the computing system at all time. There are different sectors of the industry where this technology can be used like online food delivery organizations, cab booking sides, banking sector to provide banking services in an easy manner, multinational companies to mark the attendance of the employees and health controlling devices in form of watches etc.
As per the opinion of Shiraz et al (2014), mobile computing technology has various principles and portability is the most important principle among them. Mobility signifies that the device connected to the mobile computing system is required to have the feature of mobility. Another fact that comes under the principle of mobile computing is connectivity which states that a mobile computing environment requires to possess the high network connectivity to maintain the smooth flow of the operations and processes. Along with this, the nodes connected to the mobile computing environment are required to have the feature of interactivity. It would enable them to communicate and to maintain a healthy transmission of the sets of data. In the opinion of Kim et al. (2013), the mobile computing environment should also have the feature of individuality so that the system would be able to clutch the technology to fulfill the needs of the individual business.
Business organizations can be more efficient and powerful by introducing mobile computing in their day to day practices. The challenges and challenges of using mobile computing in business can be defined as below:
As per Cui et al. (2013), at the time of working on mobile computing, the users are dependent on the public networks and need to access the VPN. VPN is not capable to protect the data from the attacks of firewalls. Along with this, mobile networks are totally dependent on the battery power at the time of unavailability of the portable generator. In addition to this, keyboard and screen are getting smaller day by day which makes it hard to use the technology in an effective manner. However, there are alternatives available in form of handwriting recognition and speech recognition that can be used to overcome from these challenges.
As per Yang et al. (2014), the issues and Challenges can also be categorized in as below mentioned manner:
Category |
Issues |
Challenges |
Data privacy and security issues |
· Risk of data theft · Privacy of customer’s data · Destruction of privacy rights · Loss of financial records · Handling of decryption and encryption keys · Share and use of data · Lack of standards to secure the data integrity · Incompatibility of services because of the involvement of different vendors. · Generation and Transfer of data · Auditing and Security issues related to virtual security |
· Theft of devise data · Protection of data · Authentication of user · Malware and Virus attacks via wireless devices · Wring use of accessing rights · Storage and System protection |
Cloud Service Model and architecture issues |
· Security for mobile applications, data users · Interoperability and Migration · Cost and price · SLA ( Service Level Agreement) · Increasing rate of accessing the confidential data of the organization (Currie, 2013) |
· Virtual machine and network security · Application interface and programming security · Web application and scanning security |
Communication channel issues |
· Authentication attacks · Accessing attacks · Attacks on data integrity |
· Latency and Low bandwidth problems. · Limited Resources · Availability of required services · Heterogeneity |
Mobile Computing Infrastructure Issues |
· Attacks on Virtual machines · Authentication and Authorization · Managing Hybrid Cloud computing security · Phishing · Weaknesses existed at the platform level · Local user attacks (Bal, 2013) |
The possible solutions that can be applied for the dealing with above can be described as under:
Set the objective and prioritize the risk tolerance
Securing data assets at the workplace is a major challenge for decades. Hard decisions are required to be made at numerous level of protection according to the nature and type of business.
Proactive Security Plan
According to Wang et al (2015), the organizations are required to understand the major threats like social scams, media scams, cybercrime attacks and hacking. On the basis of such understanding, the management should plan policies and procedures in advance to minimize the level of risk and loss.
Plan the response to the unavoidable sophisticated attacks
According to Eshet and Bouwman (2015), hackers aim at finding the weakness due to the evolution of continuous and advanced threats. It is also certain that an organization will have to face the situation of the data breach. The tested and unified response plan should be implemented effectively to deal with the increasing malware attacks.
Promote the security culture
In the opinion of Kumari (2014), it is important to communicate that a single mistake of one employee can lead to the major security problem for the security of an organization. That is why every employee is required to work in the group and do not communicate any security-related information to outsiders.
Conclusion
After summing up the entire information, it can be concluded that the researcher can successfully conduct the study if the appropriate process has been followed. The material contained in this paper provides the proper information about the topic and an aim to start the study along with the scope and objectives related to the topic. The paper also provides the analysis and review of the existing literature related to mobile computing along with the detailed analyses of opportunities, advantages, and challenges that can be faced by an organization using mobile computing in the business. The paper also investigates the concepts of security of Mobile Cloud Computing or MCC, challenging breaching threats and security issues, use of existing and emerging issues and finally the solutions that may help in increasing the security to an organization. The information provided in this paper is based on the general review of all types of organizations and not on the basis of a particular industry or organization. The paper also develops a view that to attain maximum security in the mobile computing environment, an organization needs to access and study the threats and plan the security measures accordingly.
References
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download