REVIEW OF RELATED LITERATURE AND STUDIES
This chapter contains the review of related literature and studies, conceptual model of the study and the operational definition of terms.
Many staff and students rely on mobile computing devices for work and personal uses. Laptop computers, Personal Digital Assistants (PDAs), USB memory (aka thumb drives), smart phones (mobile phones with advanced communication, storage and processing capabilities). They bring a lot of convenience and ease of use. SMS text messaging is the most widely used data application in the world, with 2.4 billion active users, or 74% of all mobile phone subscribers. (Wikipedia)
Android’s 50% market has also been achieved and surpassed in USA, and also globally. One in 2 smart phones being sold today run Android. With about double Apple’s market share, and some would say that will be enough for Android, but I think it will continue to growth up to 70% globally and at least 60%-65% in USA. So Google and Apple together should be able to own about 90%-95% of the market in USA, and similarly on a global scale. The only difference would be that Apple will have only about 20% globally and Android will have about 70% as early as next year. In most markets there are only 2 main leaders that dominate the market, with the rest fighting over scraps. Whether Android will grow even more than that after 2012, it remains to be seen. (http://www.androidauthority.com)
Veit Jahns University of Duisburg-Essen, Germany
The research field of mobile systems in urban systems becomes more complex and more varied. In such a situation, an analyzing look at the research work done so far can provide valuable insights. Hence, in this research a work in progress for a review of literature regarding the design, use and impact of mobile systems in urban systems will be presented. In this review a verbal approach will be used, which will be based on a reference framework. This reference framework will be mainly designed with respect to the research methods and research questions applied respectively discussed in the evaluated literature, so that in the end of the review conclusions regarding future research questions in the field of mobile and urban systems can be drawn. (Cited by: Veit Jahns)
Stanford Mobile Computing Environment
Risks of Mobile Computing
Mobile computing devices have a large amount of storage, are highly portable and are frequently unprotected: They are relatively easy to steal or lose, and unless precautionary measures are taken, an unauthorized person can gain access to all the information stored on them. Even if not stolen or lost, intruders can sometimes gain all the access they need if the device is left alone and unprotected, or if data is "sniffed out of the air" during wireless communications. The result can include: crippled devices, infection with a virus/spyware/malware allowing for surreptitiously capture the owner's keystrokes, and/or a device whose data has been invisibly downloaded by an intruder leading to the loss of personal and other non-public information (e.g., credit card numbers, passwords). Data Security Restrictions
The best way to protect University data is to remove unnecessary data from your computer. Prohibited data should not be stored on your system or device unless you have explicit permission from the Data Governance Board to do so. This includes things like Social Security Numbers, credit card numbers, or checking account numbers. Information about Stanford non-public data and the requirements associated with it can be found here. Mobile Computing Guidelines
The following guidelines are intended to help mobile computing device users protect the data the devices contain. These guidelines are easy to implement and use and can protect your data and Stanford's data in the event that the device becomes compromised, lost or stolen. Mobile...
Please join StudyMode to read the full document