Sunday, December 8, 2019
Opportunities of Mobile Computing-Free-Samples-Myassignmenthelp
Question: Discuss about the Opportunities Making Business with Mobile Computing it is based on first assignment. you need to write Business Proposal. Answer: Introduction In the modern era, the enterprises, in most cases, are demanded to send their workers out of the offices to push the sales and increase brand awareness, at the same time communicate anywhere, anytime. This has significantly increased the need for the use of mobile devices or simply mobile computing. (ValleyExpetec, n.d.) Stipulates that it is imperative to improve productivity in and out of the offices, running the company efficiently and increasing the competitive advantage. Thus, connectivity of the workers with the organization through communication is essential. However, businessmen are faced with different decisions to make; some are complex whereas others are simple. For instance, leading team may have a role in simply deciding whether to embrace mobile computing, and sometimes it gets tricky on deciding which mobile platform to adopt. However, it remains vital adopting the mobile computing with an aim of elevating the efficiency of information transfer, and overcoming mobile s torage space (Shon, et al., 2014). That is, mobile computing has adopted cloud storage that can keep large amounts of data. Therefore, mobile cloud computing (MCC) has helped businesses to overcome the barrier of storage capacity. However, almost all MCC architectures has security risk. This means retrieving the data calls for strict measures (Shon, et al., 2014). Due to the ever-increasing amount of data and the need to reach the consumers at their places, the business person needs to move from place to place. According to (ValleyExpetec, n.d.) employees of any institution should be given a chance to maximize their productivity. Cloud computing is the essential key, that gives the employees and consumers an opportunity to access vital information, anytime anywhere. Therefore, it is imperative to understand mobile computing, challenges of mobile cloud computing, their impact, and more importantly its benefits. Project Objective The research will evaluate the opportunities of mobile computing in the modern era, and some of the emerging issues in mobile computing. By doing so, the research will give the trend of mobile computing; the opportunities offered and how it can boost the revenues of an organization. Project Scope To achieve the research objectives, the study will carry out a strategic analysis of the mobile computing in an organization. In agreement with (PR Newswire, 2013) the strength, weakness, opportunities, and threats (SWOT) analysis will be carried out. Thus, security trends for cloud computing, network connectivity, and elasticity, Authentication and authorization among others, will be the basis of the research. The research will evaluate how different institutions on have adopted the use of mobile computing, which strategies have been used to make the use of mobile computing successful and at the same time cheap. Thus, the researcher will use qualitative research design to determine the most common mobile computing opportunities in the market. By the end of the research, there will be a clear pathway, on how the mobile computing has improved the productivity, connectivity, communication and collaboration, and creating a paperless environment. The researcher will evaluate the hypothesis and help in answering the research question. Research question will act as a backbone to all the analysis. Literature Review (ValleyExpetec, n.d.) Defines the mobile computing in businesses as the ability to access office and data remotely and carrying out business activities anywhere anytime. Therefore, using this technology, the employees are able to remotely access the mails and data from their comfort, either at home or anywhere outside the organization premises. On the same note, cloud computing is regarded as the internet technology that gives a virtualized IT resources (Shon, et al., 2014). Recently, there has been a lot of advancement in virtualization software which is available for the mobile computing. This means that most of the companies have adopted mobile computing. In a matter of fact, (Shon, et al., 2014) stated that for any company to enter or achieve full-fledge growth and development, it must adopt the technology. (e Guard Technology Services, 2017) Gives seven simple tips that can help small businesses incorporate mobile computing in their daily activities. First, the organization can use Bring-Your-Own-Device (BYOD) strategy to cut down the cost of purchasing the new hardware. Second, the company needs to adopt a platform that works on both mobile and apple smartphones. This app should also be easy to upgrade. Third, one can integrate apps instead of using different platforms that are related, or need a transfer of information from one to another. Fourth, the company should tailor platforms or apps to suit the companys needs and not necessarily adopt an application because it suited other businesses. Also, the company should strategically choose the data storage. For instance, if the cloud computing is used, any device that can access the cloud can be used to change, retrieve, and save the information. Lastly but not least the application should adopt mobile computing that is adaptable to ne w evolution or changes in technology (e Guard Technology Services, 2017). (ValleyExpetec, n.d.) Stipulates that there are a number of things that an institution that adopts cloud can reap. Among them, include, maximizing overall productivity, customer satisfaction improvement, increased communication and collaboration, adopting flexible working environment, and creating a paperless working environment. It is important to note that these benefits either increases margin revenue, sales or reduces the cost of production. This is as suggested by (Shon, et al., 2014). However, the security of mobile computing in organization remains a problem regardless of the cloud computing architecture used (Shon, et al., 2014).(Kalyvas, et al., 2013) Discusses in details security risks that face mobile computing. First, the trending issue of security is the concern about access control and identity management. This means that there is a need to establish a federated approach to control and manage identities across the cloud and other clouds. Second, is the smartphone data slinging, which main issue is surrounding the retrieval of data ensuring high cases of confidentiality. To overcome this problem, (Shon, et al., 2014) recommends the use of lightweight and energy efficient security protocols. There are three foundational services in cloud computing, platform-as-a-service (PaaS), Software-as-a-service (SaaS), and Infrastructure-as-a-service (IaaS). However, SaaS is sometimes considered as a cloud computing delivery model (Kalyvas, et al., 2013). Also, (Brill, 2013) considered these platforms as game changers for businesses, since they increase reliability. Research Questions/Hypothesis Primary Question: The research will aim at assessing the following primary research question: what are the emerging issues related to mobile computing in the modern business? Secondary Questions: To get further insight about the objective of the research, the research will answer the following secondary research questions; What are emerging issues in the mobile computing? Which of the three mobile computing services are widely used by businesses (SaaS, PaaS, or IaaS)? Which are the most profound merits of adopting business computing in the organizations? Although some of the benefits, and services used were highlighted in the literature review. There is still a gap left as most of the questions highlighted have received little attention in the previous studies. Research Design and Methodology Selecting the right research design is important since it ensures that right conclusion is attained. In this case, qualitative research design will be used. (Golafshani, 2003) Urges that qualitative paradigm is important when the researcher wants to understand a phenomenon in a context-specific setting. This means that the researcher does not alter the occurrence of events. The main aim of use design is to illuminate, understand and extrapolate the findings to similar situations. Also, quantitative paradigm will be used to test for validity and reliability of the data collected. That is, the triangulation technique is used in evaluating, controlling bias and establishing valid proposition about the data obtained. This is mainly because, it can combine both qualitative and quantitative methodologies (Golafshani, 2003). A sample of 30 institutions in Australia will be randomly selected. This sample will be sufficient to paint the actual picture of the opportunities, and trend of the mobile computing. The sample will focus on all the companies that have adopted the mobile computing in their operation. Based on the research objective and research question, the main variables to be assessed include; emerging issues, which will include issues that the businesses perceive as emerging on the mobile computing, challenges of cloud computing, and merits reaped by companies after adopting mobile computing. The data will be collected through email, interviews, and questionnaires. Combining these three techniques will help in determining whether there are anomalies in the data when different data collection methods are used. Research Limitations The research will focus on companies located in Australia and have adopted mobile computing. This will act as the inclusion and exclusion criteria. Both qualitative and quantitative research will be used to successfully achieve the research aims. However, the research will focus on determining which of the problems are more common among the selected companies. Also, the core interest will be on which merits have been reaped as a result of adopting mobile computing. Time Schedule (Research plan) The research will take approximately one and a half month. One month will be used in data collection, compilation, and data cleaning. The next ten days will be analysing the collected data. Then the next four days will be editing and proofreading the final research. The traveling cost will be approximately $300 US dollars. This will be major part of the expenditure since I will travel around different companies collecting data. Conclusion As pointed out, this research is designed in establishing the recent trends in mobile computing, challenges, and benefits. Both qualitative and quantitative will be applied so that reliability and credibility of the research results. The validity and reliability of the research will be tested using the triangulation technique. References Brill, E., 2013. Mobile Computing: It's a Game Changer for Companies. [Online] Available at: https://www.theatlantic.com/sponsored/ibm-mobile/mobile-computing-its-game-changer-companies/32/ [Accessed 16 08 2017]. e Guard Technology Services, 2017. 7 Tips For Making Mobile Computing Work For Your Business. [Online] Available at: https://www.eguardtech.com/7-tips-for-making-mobile-computing-work-for-your-business Golafshani, N., 2003. Understanding reliability and validity in qualitative research. The qualitative report, Volume 8(4), pp. 597-606. Kalyvas, J. R., Overly, M. R. Karlyn, M. A., 2013. Cloud Computing: A Practical Framework for Managing Cloud Computing Risk-Part I. Intellectual Property Technology Law Journal;, Volume 25(3), pp. 7-18. PR Newswire, 2013. Wireless/Mobile Devices and Applications: Solutions and Market Opportunities. PR Newswire; New York. Shon, T., Cho, J., Han, K. Choi, H., 2014. Toward Advanced Mobile Cloud Computing for the Internet. Mobile Networks and Applications, pp. 404-413. ValleyExpetec, n.d. ValleyExpetec.org. [Online] Available at: https://www.google.com/url?sa=trct=jq=esrc=ssource=webcd=9ved=0ahUKEwjq_bzvyN3VAhXIMhoKHd4QCrgQFghoMAgurl=http%3A%2F%2Fvalleyexpetec.com%2Fwp-content%2Fuploads%2F2016%2F03%2Fvalleyexpetec_sb_mobility.pdfusg=AFQjCNHczc5E9aaXIg_qJrWPwmITEJ6HLQ
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment