• Title/Summary/Keyword: Mobile Applications

Search Result 2,573, Processing Time 0.036 seconds

Exploring the Personal Innovativeness Construct: The Roles of Ease of Use, Satisfaction and Attitudes

  • Amoroso, Donald L.;Lim, Ricardo A.
    • Asia pacific journal of information systems
    • /
    • v.25 no.4
    • /
    • pp.662-685
    • /
    • 2015
  • The use of global mobile technology has increased exponentially. In particular, a survey of consumers in the Philippines showed that 83% "could not live" without their mobile phones. We investigated factors, such as ease of use and personal innovativeness, to elucidate the consumer adoption of mobile technologies in the Philippines, to integrate existing adoption theories for academics and provide recommendations to practitioners based on our findings. Our research questions are as follows: (1) What key factors drive adoption of mobile technologies by Filipino consumers?; (2) Are Filipino consumers innovative in their use of mobile technologies?; And (3) How can telecom companies retain their customers? A structural equation model, which was built from a survey of 528 mobile Filipino consumers, showed support for repurchase intention to use mobile technologies. The hypotheses were generally supported by variables related to mobile phone usage with the Philippine consumer sample. Results support all of the hypothesized relationships for consumers using mobile technologies. Personal innovativeness did load on both attitude and repurchase intention for mobile applications as originally hypothesized but was strongly loaded for attitude toward using. This research is a first step in understanding the adoption of mobile applications by Filipino consumers. We initially hypothesized that consumer behavior toward mobile applications would involve constructs of innovativeness, ease of use, and satisfaction; however, we found that ease of use was less significant in understanding repurchase intention to use mobile technologies. Personal innovativeness was more important in explaining satisfaction with mobile application attitudes and repurchase intention. The Filipino context of this study also provides other interesting implications. As the Philippines transitions into a more international market, western products start to guide market behavior, particularly consumer adoption.

Energy-aware Dalvik Bytecode List Scheduling Technique for Mobile Applications (모바일 어플리케이션을 위한 에너지-인식 달빅 바이트코드 리스트 스케줄링 기술)

  • Ko, Kwang Man
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.5
    • /
    • pp.151-154
    • /
    • 2014
  • An energy of applications had consumed through the complexed inter-action with operating systems, run-time environments, compiler, and applications on various mobile devices. In these days, challenged researches are studying to reduce of energy consumptions that uses energy-oriented high-level and low-level compiler techniques on mobile devices. In this paper, we intented to reduce an energy consumption of Java mobile applications that applied a list instruction scheduling for energy dissipation from dalvik bytecode which extracted Android dex files. Through this works, we can construct the optimized power and energy environment on mobile devices with the limited power supply.

A Proposed Framework for the Automated Authorization Testing of Mobile Applications

  • Alghamdi, Ahmed Mohammed;Almarhabi, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.217-221
    • /
    • 2021
  • Recent studies have indicated that mobile markets harbor applications (apps) that are either malicious or vulnerable, compromising millions of devices. Some studies indicate that 96% of companies' employees have used at least one malicious app. Some app stores do not employ security quality attributes regarding authorization, which is the function of specifying access rights to access control resources. However, well-defined access control policies can prevent mobile apps from being malicious. The problem is that those who oversee app market sites lack the mechanisms necessary to assess mobile app security. Because thousands of apps are constantly being added to or updated on mobile app market sites, these security testing mechanisms must be automated. This paper, therefore, introduces a new mechanism for testing mobile app security, using white-box testing in a way that is compatible with Bring Your Own Device (BYOD) working environments. This framework will benefit end-users, organizations that oversee app markets, and employers who implement the BYOD trend.

Balanced MVC Architecture for High Efficiency Mobile Applications

  • La, Hyun-Jung;Kim, Soo-Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1421-1444
    • /
    • 2012
  • Mobile devices such as Android devices are emerging as a convenient client computing device with mobility and context-sensing capability. However, the computing power and hardware resource of the devices are limited due to their small form-factor. Consequently, large-scaled applications could not be deployed on these devices. Nonetheless, if the large-scaled applications are deployed and executed on the devices, high performance of the applications cannot be guaranteed. To remedy the limitation in terms of performance, it is inevitable to let some heavy-weight functionality executed on the server side and let a client application invoke the functionality in the server. To realize this kind of mobile applications, we adopt well-defined architecture design principles; being thin-client, being layered with Model-View-Controller (MVC), and being balanced between client side and server side. By adopting the principles, we propose a unique, ideal and practical architecture for mobile applications, called balanced MVC architecture. By considering the principles, key design considerations of realizing balanced MVC architecture lie in functionality partitioning. Hence, we define key criteria of determining the degree of performance. And, we define a method to design a balanced MVC architecture which embodies functionality partitioning for high performance, and a simulation-based evaluation method of balanced MVC architectures.

Evaluating Usability of Mobile Applications for Smart Logistics (스마트 물류를 위한 모바일 애플리케이션의 사용성 평가)

  • Byun, Dae-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.3
    • /
    • pp.10-21
    • /
    • 2019
  • With the 4th industrial revolution, the traditional logistics is shifting to the smart logistics, and it has led to rapid growth of logistics startup companies to support smart logistics. They build their mobile applications and customize their services in the areas of freight transport, parcel delivery services, freight tracking, on-demand logistics, transport intermediary platforms, online-to-offline business, and last mile delivery. In order for logistics startup to be successful, it should lead to sales and profit through customer satisfaction and continuous use by developing highly usable mobile applications. The evaluation of usability of mobile application should use different evaluation criteria from Web based applications because of the inherent characteristics of mobile phone. The purpose of this study is to evaluate the usability of the mobile application provided by the logistics startup and to draw out implications and improvement plans. Through the literature review, we will review the concept of smart logistics. Thus we derive the usability criteria suitable for mobile applications and perform usability testing.

A Study on Technological Level and Cases of Testing Automation for Mobile Applications (모바일 어플리케이션의 테스팅 자동화 기술 수준 및 사례 연구)

  • Han, Young-Geun;Lee, Hyun-Noh;Park, Chang-Hwan
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.1
    • /
    • pp.289-300
    • /
    • 2015
  • According to the generalization of mobile device use in our life, the complexity and diversity of mobile applications are increased, and thus the importance of application test to find faults and errors quickly and easily before release grows. This paper reviews the current automatic testing methodologies for mobile device applications and their element technologies. Also, well-known commercial tools for automatic testing are surveyed and case studies of their recent industry applications in domestic and foreign countries are performed.

A Design and Implementation of Mobile Variability based on Android (안드로이드 기반 모바일 가변성 설계 및 구현)

  • Kim, Chul-Jin;Cho, Eun-Sook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.5
    • /
    • pp.2338-2346
    • /
    • 2012
  • According to the size of mobile applications has been expanded, the coupling of among mobile applications or servers also will be growing. The growth of mobile application's size means that predicting design for variability should be involved. If mobile application's change is occurred, application should be reinstalled totally. However this reinstallation can raise side-effects in case of high-coupling applications. Therefore, this paper proposes a technique of designing variability for mobile applications in android platform. Proposed technique is separated into selection technique and plug-in technique.

A Process to Design and Implement Service-based Android Applications (서비스 기반 안드로이드 어플리케이션의 설계 및 구현 프로세스)

  • Lee, Ho-Joong;La, Hyun-Jung;Keum, Chang-Sup;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.18D no.4
    • /
    • pp.245-260
    • /
    • 2011
  • Mobile Devices, which are developed with the fast growing of the Internet, have flexible internet accessibility and can access the network anywere so that they can execute software applications. However, it is very challenging to deploy highly complex applications on mobile devices since they have limited resources. To overcome the limitation, researches on applying a concept of services to mobile applications have been proposed. Android is one of the popular mobile platforms and is designed to effectively execute mobile applications on the mobile devices having limited resources. Since service-based Android applications, which adopt a concept of services and Android platform, invoke remote services and are built with Android-specific components, they are much different from traditional software applications. Consequently, it is not straightforward to apply object-oriented (OO) analysis and design methods to developing service-based Android applications, although they have been frequently applied to developing traditional applications. In this paper, we present a process to develop service-based Android mobile applications, which extends a traditional OO development process. First, we raise design issues to be considered in developing service-based Android applications. Then, to solve the issues, we present detailed guidelines for essential phases of OO-based development process that are customized to service-based Android applications. Finally, to show applicability of the process, we perform a case study. The proposed design process is effectively utilized as a set of guidelines to develop service-based Android applications more systematically and effectively.

Design and Development of Electronic Attendance-absence Recording System Using Binary XML (Binary XML을 이용한 전자출결시스템 설계 및 개발)

  • Lee, Jaekun;Yeom, Saehun;Bang, Hyeja
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.11-19
    • /
    • 2015
  • Due to recent development in mobile devices, the mobile device utilization and many related applications have been increasing. Most of initial applications on mobile devices just showed simple information, but now they processes huge data. However, smart devices have certain limitations in processing massive data. Especially, if the size of data increases, the speed of data processing adversely decreases, so the performance of programs also decreases. If hardware specification of the mobile devices is not enough to handle it, response time will be drastically delayed. To overcome these drawbacks, most of application running on mobile devices communicate with their servers to manage data. XML is a proper language for data communication to send and receive data between servers and mobile devices, because it defines rules of document's format and it is a textual data format and small-sized language. However, mobile devices have limitation such as memory, CPU and wireless network to process huge data and XML also takes a lot of time to communicate with servers and devices and handle data, so it could be overhead in service time. Binary XML is an alternative of performance improvement in data processing, which has XML's benefits and minimizes the XML size by binary coding. However, most of binaryXML which are used on applications don't fit on mobile applications. In this paper, we surveyed many kinds of binaryXML, compared merits and demerits to find a binaryXML for mobile applications. We propose how to use binary XML and implemented an electronic attendance system using binary XML to overcome the limitation of XML and to reduce the load of data communications between servers and devices.

A Secure Network for Mobile Wireless Service

  • Peng, Kun
    • Journal of Information Processing Systems
    • /
    • v.9 no.2
    • /
    • pp.247-258
    • /
    • 2013
  • A new secure network communication technique that has been designed for mobile wireless services, is presented in this paper. Its network services are mobile, distributed, seamless, and secure. We focus on the security of the scheme and achieve anonymity and reliability by using cryptographic techniques like blind signature and the electronic coin. The question we address in this paper is, "What is the best way to protect the privacy and anonymity of users of mobile wireless networks, especially in practical applications like e-commerce?" The new scheme is a flexible solution that answers this question. It efficiently protects user's privacy and anonymity in mobile wireless networks and supports various applications. It is employed to implement a secure e-auction as an example, in order to show its advantages in practical network applications.