SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. IV(Jan – Feb. 2016), PP 01-07
www.iosrjournals.org
DOI: 10.9790/0661-18140107 www.iosrjournals.org 1 | Page
Context-Centred Mobile Applications Development For Effective
Adoption Of Mobile Technology
Vincent O. Omwenga
Abstract: Recent approaches in mobile computing consider context to be central to the design and
implementation of mobile applications. Context considerations enables the mobile application to respond to the
needs and purpose it is intended for. Qualitative and quantitative research techniques have been applied to
investigate and come up with components that are critical in the development of context-centred mobile
applications.It is however critical to understand how toseparatecore application logic from adaptive
functionality in order toachieve a context-centred mobile applications.
Thispaperpresents the factors and technologies to consider in the developmentof the context-centredmobile
applications. Further, a framework that emphases on the separation of core application logic and adaptive
functionalityfor building a context-centred mobile application is presented.
Keywords:Context, Context-centred, Mobile Applications, Core Application Logic, Adaptive Functionality.
I. Introduction
Mobile technologies and applications have become ubiquitous in many aspects of our personal and
professional lives. For instance, a number of mobile applications have been developed for business enterprises
and individual users. Most enterprises have realized the need to use mobile applications to gain competitive
advantages amongst their peers through improved productivity as a consequence of enhanced efficiency and
responsiveness to the needs of the ever changing clientneeds (Unhelkar&Murugesan, 2010).Other application
areas where mobile technology has greatly manifested itself and affected personal and professional lives of
individuals include mobile commerce (m-commerce), Mobile Health (m-health), Mobile Agriculture (m-
Agriculture), Mobile Insurance (m-Insurance), e-governance among others.
Whereas the development of the mobile applications tend to follow a number of strategies and
approaches, recent developments in mobile applications have considered context to be key. The missing link is
the relationship between the core application logic and adaptive functionality from the context perspective.
Benou&Bitos(2008) indicates that the separation of these two application variables is important in
understanding the effects of context in mobile application development and will enhance the ability of the
application to perform transactions easily, timely and ubiquitously (Hu, Yang, Yeh& Hu 2008) .
Underlying the debate on the role of context in mobile application development is the need to have
applications that are independent of location and are easily adoptable by the user. The key in achieving this is
the development of context-centredmobile application.
II. Context-Centred Applications
Mobile applications are intended to operate in a dynamic environment of everyday life. For instance,
users keep changing their location and roles over time and hence the context of application should reflect these
changes-adaptability of the application. Additionally the computing environment varies and users need the
ability to choose the settings in their mobile devices. All this information surrounding the human-computer
interaction, which can be exploited by applications, constitutes the context (Benou&Bitos, 2008). Critical in this
is understanding the human behaviour and disposition. The human needs, characteristics, desires and even
decisions are constantly variant and they thus define the human context or environment. Therefore, successful
development of mobile applications must take into consideration the context since there is a strong coupling
between its exact specification and efficient exploitation of the environment. This study demonstrates how
context can be exploited in mobile application development by separating and analysingcore application logic
and adaptive functionality.
The area of use (i.e. environment) of the mobile application is also critical in determining the right
context of the application. To put this into perspective, consider the classification of the application based on the
application type. Different applications are modelled to perform a specific type of function. For instance,
applications in the health sector are modelled to focus on the issues around the health sector and therefore the
developed of such application will be done while focusing on the specific issues around the health sector. The
classification of these applications would thus make it easy to understand the application and will lead to the
development of a highlyfocused applications for a specific application type (Unhelkar&Murugesan 2010).
Context-Centred Mobile Applications Development For Effective Adoption Of Mobile Technology
DOI: 10.9790/0661-18140107 www.iosrjournals.org 2 | Page
Unhelkar&Murugesan (2010) classify the mobile applications into five categories: m-transaction, m-
operation, m-collaboration, m-information and m-broadcast. From their categorization, emphasis is on the
underlying functions the application is expected to accomplish. For example, applications under the category of
Mobile Broadcast largely broadcast a diverse set of information content to many mobile users. Mobile
Information applications present user’s requested information in a one way (unidirectional manner), that is, from
the application to the user. Mobile Transaction applications broadcast and provide information in addition to
facilitating and executing transactions. Applications under Mobile Operation category support the operational
activities of an enterprise that donot encompassdirect contact with clients. Finally, Mobile Collaboration
category contains applications that promote organization-wide teamwork, that is, interaction of various
organizational functional units.
Clearly, each of the mobile application categories by (Unhelkar&Murugesan 2010) has unique
requirements and challenges. For example, Mobile Information applications require fairly less strict security
requirements which results into concerns around privacy and usability. Mobile transaction applications require
better security, quick feedback, highly developed and reliable transactions, high level of productivity and more
trusted services. Mobile Operation transactions pose a challenge on the delivery of immediate information,
inventory management challenges, adoptableplanning of work, changing organizational structures and the
integration of diverse backend systems and databases. Lastly the mobile collaboration applications present
coding and data management challenges.
Varshney& Vetter (2001) identifies a number of categories of commercial applications of mobile
technology. Among them include:Financial applications, Product location and shopping, and Mobile
entertainment services among others. These classification is however limited to mobile commerce which is not
exhaustive of all mobile applications.
Oinas-Kukkonen&Kurkela (2003) classifies mobile applications broadly into two groups; goal-driven
and entertainment-focused. The goal-driven applicationsare modelled to offer fast feedback to requests. The
entertainment-focused applications offers recreational opportunities to users. They then propose approaches
which can be used for the development of highly goal-driven mobile applications which focuses on: relevance,
usefulness, ease of use, mobility, effortlessness of navigation, user-centred, andcustomization.The classification
however is quite broad to limit focus on developmental issues specific to the two categories.
Some other aspect of environment that will also affect the mobile application development and
deployment are the computing and communications paradigms. Some applications need to establish the user’s
location before they can offer some services and the continuously monitor the location to adapt services and
information accordingly. This presents challenges of security, reliability and quality of service.
Missing in all these categorization is problem based approach (problem system development paradigm)
to mobile technology development and deployment. The understanding here is that problem is context specific
and the conceptualization of the solution based on the dynamics around the problem will be central in achieving
a context-centredmobile application.
A lot of research has been done in mobile application development with a number of modelsand
frameworks proposed by various researchers. Most of these models and frameworks mainly focus on
categorization and providing a layered approach in mobile applications development. Researchers acknowledge
the need to consider context in mobile application development and the need to develop context-centredmobile
applications but they don’t specify explicitly specific development guidelines in relation to core application
logic and adaptive functionality, more-so in a highly dynamic environment. Buthpitiya, et. al (2011) also agree
that many models and toolkits for developingcontext-centredmobile applications have been adopted for
relatively fixed environments and they don’t respond to the unique concerns, prospects and limitations presented
by a dynamic mobile environment and the changing context.
2.1 Factors Influencing Mobile Application Development considering context
Unhelkar&Murugesan (2010) and Dehlinger& Dixon (2011) have identified these factors to be:
a) Computing platforms and devices:As indicated in section 2.0, mobile applications operate on different
frameworks and hence different platforms with different hardware have different computing capabilities.
These different features are manifested on the existence of different mobile devices with different
configurationally and adaptable features. It is thus critical to pay attention to these facts during mobile
application design and development stage.
b) User Context: This can be considered to be the user physical attributes such as user location and usage. It is
therefore critical to provide a fairly well customizable application to allow for personalization since user
context is variant. Moreover, the mobile devices themselves should track constantly the environment
thereby making mobile applications intrinsically context-centred.
c) Security: Security threats are dynamically changing with every new emerging technology. It is therefore
important to consider the threats, vulnerabilities and potential risks surrounding the emerging technologies.
Context-Centred Mobile Applications Development For Effective Adoption Of Mobile Technology
DOI: 10.9790/0661-18140107 www.iosrjournals.org 3 | Page
The security mitigation strategies implementable on the mobile application should be informed by the
critical reviews of the existing security issues for a particular environment.
d) The constantly changing computing requirements: The agility of the mobile application will be critical in an
ever changing environment. The developers should focus on a highly tolerant mobile applications to
accommodate any new requirements.
e) Dynamism of supporting communication infrastructure: The support infrastructure are sometimes unstable
due to inherent potential interruptions. Developers should focus on development of application which have
some degree of fault tolerance.
2.2 Mobile Technologies supporting Mobile Application Development
Mobile technologies used in mobile application development can be broadly classified as
communication, development platforms, middleware, presentation and security technologies.
Communication technologies like WIFI and Bluetooth which have enabled communication through a
wireless network have significantly led to the growth of mobile computing and are an important consideration in
mobile applications development. It will be critical for the mobile developer to be aware of the available
communication technology in the particular environment where the application shall be used.
Some of the commonly used mobile application platforms include android, iOS, Adobe Flash lite, Java
ME, and .NET CF. Gavalas&Economou(2011) conducted an assessments on four of the platforms and presented
the appropriateness of each platform with respect to four critical application development requirements which
are portability, functionality, development speed and performance. Their findings were that they operate
differently under different context and operating systems. Their findings therefore underscores the need to have
context in mind when selecting type of platform to be used. Furthermore, operating systems like Android,
Windows CE, Palm OS, EPOC, Linux and proprietary systems as well, such as RTOS and GEOS, enable the
various mobile devices to operate in different platforms. For example, J2ME, which is a light version of Java
meets limitations and peculiarities of mobile devices (Benou&Bitos, 2008).
Mobile middleware managesdifferent services in a mobile environment and also provides the
connectivitymeans fordifferent devices. WAP (Wireless application protocol)and iMode are examplesof mobile
middleware protocols. WAP is a secure specification that allows users to receive information instantly through
their handheld devices and is supported by all mobile operating systems (Hu et al, 2008).I-mode uses packet
transmissions to offer continuous access and uses a segment of HTML to make the creation of content faster and
easy.
A multitude of diverse mobile devices available include both cellular phones, smartphones, PDAs
and hybrid handheld devices that combine voice, data processing and communication capabilities. Standards
like XML, WML and various kinds of HTML are used for content delivery. Voice XML technologies offer
convenient user interfaces (Hansmann et al, 2003).The change in mobile environment calls for application
designers to become more innovative and exploit the distinct benefits from the newer techn ologies
(Benou&Bitos, 2008).
The position of a portable object is beneficial in context-centredmobile applications. This is classified
as spatio-temporal context by Schilt, Adams, & Want (1994). The various positioning techniques include;
satellite based, cellular network based, WLAN based and RFID-based systems. In Wireless local area networks
the position determined from the access point and inRadio Frequency Identification thelocation of an object or
user carrying an RFID card is determined from the location of the stationary reader that captures the signals
emitted from the RFID card.
2.3 Context and Context Centeredness in Mobile Application Development
Pascoe (1998) defines context as the subset of physical and conceptual state of interest to a particular
entity. Brown, Bovey&Chen (1997) consider context as location, identities of the people around the user, the
time of day, season, temperature, and so forth. Schilit&Theimer (1994) refer to context as location, identities of
nearby people and objects, and changes to those objects while Schmidt &Laerhoven (2001) identify context as
the knowledge about the user’s and the device’s state, including surroundings, situation and location.
Dey&Abowd (1999) states that context is any information that can be used to characterize the situation of an
entity. In this paper, Dey&Abowd (1999) definition is adopted.
Borrowing from Dey&Abowd (1999) definition of context, the contextual information which is
descriptive of what the entity is, focuses on which entity it concerns(Schilit, Adams, & Want, 1994). According
to Schilit, Adams, & Want (1994) the classification includesUser context (e.g. user identity, collection of nearby
people, user’s profile, and so forth);Computing context(e.g.hardware characteristics, software characteristics,
network connectivity, communication bandwidth, nearby resources such as printers and displays); Physical
Context (e.g. lighting, noise level, temperature and humidity); Spatio-temporal context(e.g. location, place,
Context-Centred Mobile Applications Development For Effective Adoption Of Mobile Technology
DOI: 10.9790/0661-18140107 www.iosrjournals.org 4 | Page
time of the day, week, month, season of year and time zone); Task context (e.g. goals, tasks and actions of
the user).
It is argued that for a system to be context-centred it must use context to offer relevant information and
services to the users Dey&Abowd (1999). Context-centredmobile applications therefore uses information
relating to a context to give feedback and respond to a highly dynamic computing environment. A context-
centredmobile application is therefore one that is able to use contextual entities of the mobile environment and
to adjust its behaviourto present appropriate content and services to the user. According to Schilit, Adams, &
Want (1994) the net effect of the context-centredapplication should include:
a) Proximate selection: This is a technique that emphasizes on the user interface. The rationale behind the
technique is that objects or entities that are located closely to each other should be made in a manner that
allows for easy selection.
b) Automatic contextual reconfiguration: It is a process that focuses on the changing, adding or removing of
new entities or components based on the changing context.
c) Contextual information and command: Context should be able to parameterize “Contextual commands” so
that queries on contextual information are able to respond based on the context.
d) Context-triggered actions: The emphasis is on the decision rule that specify a specific reaction based on the
context. It is based largely on the “if-then” rules.
It is thus imperative to have a framework mobile application development that largely addresses the
context from the four net effect as identified by Schilit, Adams, & Want (1994).
2.4 Core Application Logic and Adaptive Functionality in Relation to Context
Various components in a mobile application work together to complete a transaction in a mobile
application Hu et al (2008). Understanding how the interaction among these component is vital in achieving the
desired transactional level. There is therefore need to understandthe application logic which is the mode of
reasoning when developing a mobile application. The components in the mobile application transactions include
the mobile application interface at the client side and server side, the mobile handheld device, mobile
middleware, wireless and mobile networks and the host computers.
A mobile application implemented by the content provider must have the following programs;
programs on the client side and programs on the server side.It is then expected that a handheld mobile device
will offer the user with an interacting interface to the mobile applications through these set of programs. By
using the middleware, the internet contents are mapped to mobile points which are supported by the various
operating systems, micro-browsers and protocols. To ensure security and integrity of the content, the
middleware provides a mechanism to encrypt communications. The transactions/requests from the users
involving various entities of a mobile device are expected to be transferred to the nearest base station using the
wireless and mobile networks.
Each of the entities in a mobile application transaction processing constitutes some formof context. For
instance, the mobile application interface on the client side constitutes user context, physical context, spatio-
temporal context and task context. A context-centredmobile application should therefore be able to change with
context through aspects like interface reconfiguration. The developers should provide the means for adapting the
mobile application to the context through configurable features. The mobile devices on the other hand should
provide a computing context since the mobile devices differ in terms of processing power, storage capacity,
interface features and so forth. The mobile middleware also provides a middleware context depending on the
capability and technologies used at the middleware level. The mobile networks constitute a computing context
in terms of network connectivity, communication bandwidth and content delivery. Finally the host computers
host the application, the databases and the web servers and should be aware of the computing context andjob
context of mobile applications. In mobile application core logic, a mobile developer must take into consideration
the participating entities’reasoning and thought process as far as the anticipated response on the usage of the
mobile application is concerned.
The mobile application should also have elements of adaptive functionality. This describes how the
mobile application is adapted by users and includes the client devices and the client programs. For example, the
mobile device should be able to manage the clientside needs of a mobile application and the server side
programming should endeavour to provide the development of software running on the mobile devices. This can
be achieved by applying web interface construction with the use of popular languages like CSS, DOM, HTML,
JavaScript, WML, XML and so forth. The adaptive functionality should thus considers mobile application
properties like content and service delivery, device performance, information dissemination, consistent
functionality across different mobile devices and platforms, a dynamic mobile environment and security
considerations in mobile application use.
Context-Centred Mobile Applications Development For Effective Adoption Of Mobile Technology
DOI: 10.9790/0661-18140107 www.iosrjournals.org 5 | Page
III. Proposed Context-centredMobile Application Development Framework
The proposed context-centredmobile application development frameworkwill have the following
components and features:
3.1.1 Mobile device characteristics
The following characteristics were imperative in developing this framework: Screen size, processing
power, operating platform and mobile device type or make are some of the features that must critically be
considered in mobile application development.Benou&Bitos (2008) established that in general the mobile
devices have small screens, limited interaction, low processing power and limited memory. They also pointed
out that during the mobile application development phase aspects around design and performance of the
computing devices be considered. As discussed in section 2.0, the mobile device characteristics are inherently
dependent on the context. This means that the characteristics should be interpreted by the developer based on
the context of the mobile application.
3.1.2 Mobile application development platforms and operating platform
Mobile application development platform is a critical factor in successful development of a mobile
application. The mobile device development platform include:android, iOS, Adobe Flash Lite and Java ME
among others. Different development platforms affect portability, functionality, development speed and
performance in different ways (Gavalas&Economou, 2011). In section 2.2, we provided the basic understanding
on the effect of development platforms on the mobile application.
Unhelkar&Murugesan (2010) and Dehlinger& Dixon (2011) indicates that mobile device operating
platforms do also affects mobile application development. This studyreaffirms that mobile device operating
platform is a core application logic component in mobile application development. Consideration of these
factors will influence the outcome of the application.
3.1.3 Nature of content and service delivery
Content and service delivery is an adaptive functionality component that encompasses aspects usability
and user experience like font size, aesthetic values, formatting of data, the mobile application graphical user
interface and identifying with core user stories or feedback (Hu et al, 2008).These features influence the
acceptability and adoptability of the mobile application in terms of usage from the user perspective. It is
however critical to note that formatting of data or content and the user interface are the most critical features of
service delivery in mobile applications development.
3.1.4 Changes in the mobile environment
In section 2.2, we have highlighted on how user locale can influence the context and hence affect
mobile application development. Thecontent and content requirements by the user vary from time to time and
nature of content and service delivery are rated as the most significant mobile environmental features. The
framework therefore should include changes to the mobile computing environment as a significant core
application logic and adaptive functionality component in mobile application development.
3.1.5 Cellular network capabilities
A cellular network capability is both an adaptive functionality factor and a core application logic factor
in mobile application development.Benou&Bitos (2008) have identified that cellular networks have some
abilities like broadcasting abilities. Cellular network broadcasting abilities or host application broadcasting
abilities determine the method of mass information dissemination while the performance of the cellular network
affects also the mobile application performance.
3.1.6 Mobile Security considerations
Mobile application development guidelines by Benou&Bitos (2008) don’t address mobile security but
instead recommend further research since they believe security is critical. Unhelkar&Murugesan (2010)
emphasize that mobile application developers need to consider the threats, vulnerabilities and risks arising from
the use of current technologies and use secure tools to implement security and privacy in mobile applications.
Security has also to be applied at the various stages of mobile application use and this include; at the user level,
over the cellular communication network and at the host computers that run mobile applications. Authentication,
cryptography, secure communication, and secure mobile payment methods can be used to provide the much
needed security in mobile applications. The significant core application logic and adaptive functionality features
of mobile application security considerations include; current host and end-user mobile security threats and
vulnerabilities, development platform threats and vulnerabilities, data transmission threats and vulnerabilities
and authentication, confidentiality, integrity and availability.
Context-Centred Mobile Applications Development For Effective Adoption Of Mobile Technology
DOI: 10.9790/0661-18140107 www.iosrjournals.org 6 | Page
3.1.7 Human and mobile device interaction
Human aspects like preference, knowledge, and attitude among other are determinant factors of the
user expectations on the kind of mobile application to adopt. The human and mobile device interaction is
derived from the adaptive functionality feature that takes into consideration the aspects that affect usability of
the application thus influencing the user experience.
3.1.8 Mobile application performance
Performance of mobile devices, the dynamic communication and networks affect the mobile
application performance. Speed of the cellular network and the computational power of the host computers also
affect the mobile application performance significantly.
3.1.9 Application consistency across mobile devices and operating platforms
Benou&Bitos (2008) indicate that the same mobile application should operate on different devices and
should offer some consistency in usage in terms of meeting the functional needs and interfaces on different
devices in which they run. Mobile applications should therefore provide consistent functionality across different
mobile operating platforms and mobile devices and this is affected by the mobile application development
platformand the mobile device development technologies.
3.2 The framework
The figure 1 presents theframework which highlightson how the interaction of the various components
and features discussed in section 3.1can be achieved so as to develop a context-centredmobile application.
Figure1: Mobile applications development framework using context centeredness analogy
Context-Centred Mobile Applications Development For Effective Adoption Of Mobile Technology
DOI: 10.9790/0661-18140107 www.iosrjournals.org 7 | Page
This framework is divided into two sections; core application logic and the adaptive functionality. Core
application logic has six components that contain critical features a developer should consider and adaptive
functionality comprisesof five components.The framework is then encapsulated by the mobile application
security considerations. Mobile application security affects many of the components in the framework and
therefore must be considered at the component level.
The framework focuses principally on mobile application development where there is a separate host
supporting the mobile application. Each individual or mobile application development company has its different
approach in application development.Mobile application developer needs to have a clear understanding of the
requirements, the rationale of development and the end product in order to gainfully use this framework. Mobile
application developers are free to categorize and emphasize on particular aspects of mobile application
development that will be more useful for each development.
IV. Conclusion
The studyidentified, analysed and separated mobile application development factors and components
into core application logic features and adaptive functionality features.A frameworkthat highlights components
and critical features to be considered in the mobile application is presented. The exploitation of context both on
the core application logic and adaptive functionality will lead to development of acontext-centredmobile
applications. In developing a mobile application, the core application logic and adaptive functionality features
should be considered separately as depicted in the proposed framework. An extension of this study could
consider contextual information and its classifications, that is, user context, computing context, physical context,
spatial-temporal context and task context. Moreover, manner of context acquisition, that is, sensed context,
derived context or where context is explicitly provided could also be considered.
Acknowledgement
I wish to express my gratitude to Strathmore University, Faculty of Information Technology for the Research
funding.
References
[1]. Benou,P., &Bitos, V. (2008), Developing Mobile Commerce Applications. Journal of Electronic commerce in Organizations,
Volume 6, Issue 1.
[2]. Brown, J., Bovey, D., & Chen, X. (1997). Context-Centeredapplications: From the laboratory to the marketplace. IEEE Personal
Communications, 4(5), 58-64.
[3]. Buthpitiya, S., Cheng,H., T., Sun,F., T., Griss,M. &Dey,A.,K.(2011). Hermes: a Context-Centeredapplication development
framework for the Mobile Environment. Carnegie Mellon University.
[4]. Dehlinger, J., &Dixon,J. (2011). Mobile Application Software Engineering: Challenges and Research Directions. Department of
Computer and Information Sciences -Towson University
[5]. Dey, A., &Abowd, G. (1999). Towards a better understanding of context and context-awareness. Technical Report 99-22. Georgia
Institute ofTechnology.
[6]. Gavalas, D., &Economou, D. (2011), Development platforms for Mobile Applications: Status andTrends. IEEE Software.
[7]. Hansmann, U., Merk, L., Nicklous, M., &Stober T. (2003).Pervasive computing. Berlin, Heidelberg, New York: Springer-Verlag.
[8]. Hu,W., C., Yang, C., H.T., Yeh, J., H., & Hu, W. (2008) . Mobile and Electronic Commerce Systems andTechnologies. Journal of
Electronic Commerce in Organizations, Volume 6, Issue 3.
[9]. Oinas-Kukkonen, H., &Kurkela, V. (2003). Developing Successful Mobile Applications. Proceedings of the International
Conference on Computer Science and Technology, (pp. 50-54). Cancun, Mexico.
[10]. Pascoe, J. (1998). Adding generic contextual capabilities to wearable computers. In Proceedings of the 2ndInternational Symposium
onWearable Computers (pp. 92-99).
[11]. Schilit, B., Adams, N., & Want, R. (1994). Context-Centeredcomputing applications. In Proceedings of the 1st
International
Workshop on Mobile Computing Systems and Applications (pp. 85-90).
[12]. Schmidt, A., &Laerhoven, K. (2001). Howto build smart appliances. IEEE Personal Communications, 8(4), 66-71.
[13]. Schilit, B., &Theimer, M. (1994). Disseminating activemap informationto mobile hosts. IEEE Network, 8(5), 22-32.
[14]. Unhelkar, B., &Murugesan, S. (2010). The Enterprise Mobile Applications Development Framework. IT Professional, 12 (3), 33-
39.
[15]. Varshney, U., & Vetter, R. (2001). A Framework for the Emerging Mobile Commerce Applications. Proceedings of the 34th
Annual Hawaii International Conference in System Sciences, 9, pp. 9014-9023.

More Related Content

What's hot

Adopting enterprise mobility using Smartphones
Adopting enterprise mobility using SmartphonesAdopting enterprise mobility using Smartphones
Adopting enterprise mobility using Smartphones
Lalatendu Das
 
ADVANCEMENT IN THE MOBILE APP REVIEW SYSTEM TO ENHANCE QUALITY OF MOBILE APPL...
ADVANCEMENT IN THE MOBILE APP REVIEW SYSTEM TO ENHANCE QUALITY OF MOBILE APPL...ADVANCEMENT IN THE MOBILE APP REVIEW SYSTEM TO ENHANCE QUALITY OF MOBILE APPL...
ADVANCEMENT IN THE MOBILE APP REVIEW SYSTEM TO ENHANCE QUALITY OF MOBILE APPL...
csandit
 
A Theoretical Framework of the Influence of Mobility in Continued Usage Inten...
A Theoretical Framework of the Influence of Mobility in Continued Usage Inten...A Theoretical Framework of the Influence of Mobility in Continued Usage Inten...
A Theoretical Framework of the Influence of Mobility in Continued Usage Inten...
csandit
 
An effective approach to develop location-based augmented reality information...
An effective approach to develop location-based augmented reality information...An effective approach to develop location-based augmented reality information...
An effective approach to develop location-based augmented reality information...
IJECEIAES
 
Van Heeringen and van Gorp - Measure the functional size of a mobile app usi...
Van Heeringen and van Gorp  - Measure the functional size of a mobile app usi...Van Heeringen and van Gorp  - Measure the functional size of a mobile app usi...
Van Heeringen and van Gorp - Measure the functional size of a mobile app usi...
Harold van Heeringen
 
Evaluationof Smartphone Accessibility Interface Practices for Older Adults
Evaluationof Smartphone Accessibility Interface Practices for Older AdultsEvaluationof Smartphone Accessibility Interface Practices for Older Adults
Evaluationof Smartphone Accessibility Interface Practices for Older Adults
inventionjournals
 
iVoice
iVoiceiVoice
iVoice
hanrahna
 
State Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile ReadinessState Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile Readiness
KloudData Inc
 
A framework for software usability and ux measurement in mobile indystry
A framework for software usability and ux measurement in mobile indystryA framework for software usability and ux measurement in mobile indystry
A framework for software usability and ux measurement in mobile indystry
smk bam
 
IRJET - Detecting the Advertisement Behavior in Android Applications
IRJET - Detecting the Advertisement Behavior in Android ApplicationsIRJET - Detecting the Advertisement Behavior in Android Applications
IRJET - Detecting the Advertisement Behavior in Android Applications
IRJET Journal
 
iMALERT – an Emergency Response Mobile ApplicationUsing Geo-Location for Pala...
iMALERT – an Emergency Response Mobile ApplicationUsing Geo-Location for Pala...iMALERT – an Emergency Response Mobile ApplicationUsing Geo-Location for Pala...
iMALERT – an Emergency Response Mobile ApplicationUsing Geo-Location for Pala...
IJAEMSJORNAL
 
Thesis
ThesisThesis
Thesis
codebangla
 
Need of information technology in this modern world
Need of information technology in this modern worldNeed of information technology in this modern world
Need of information technology in this modern world
InstantAssignmentHelpAustralia
 
The Impact of Information Technology on Business Transformation in the Operat...
The Impact of Information Technology on Business Transformation in the Operat...The Impact of Information Technology on Business Transformation in the Operat...
The Impact of Information Technology on Business Transformation in the Operat...
IJMIT JOURNAL
 
Information Technologies and its Impact on the Organisational Structure
Information Technologies and its Impact on the Organisational StructureInformation Technologies and its Impact on the Organisational Structure
Information Technologies and its Impact on the Organisational Structure
Association of Scientists, Developers and Faculties
 
IN140703 service support technologies 8.9.2016
IN140703 service support technologies 8.9.2016IN140703 service support technologies 8.9.2016
IN140703 service support technologies 8.9.2016
Pirita Ihamäki
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time Enterprise
AnyPresence
 
M Model Fluency Flex Available as iTunes App | MD Buyline
M Model Fluency Flex Available as iTunes App | MD BuylineM Model Fluency Flex Available as iTunes App | MD Buyline
M Model Fluency Flex Available as iTunes App | MD Buyline
MD Buyline
 

What's hot (20)

Adopting enterprise mobility using Smartphones
Adopting enterprise mobility using SmartphonesAdopting enterprise mobility using Smartphones
Adopting enterprise mobility using Smartphones
 
ADVANCEMENT IN THE MOBILE APP REVIEW SYSTEM TO ENHANCE QUALITY OF MOBILE APPL...
ADVANCEMENT IN THE MOBILE APP REVIEW SYSTEM TO ENHANCE QUALITY OF MOBILE APPL...ADVANCEMENT IN THE MOBILE APP REVIEW SYSTEM TO ENHANCE QUALITY OF MOBILE APPL...
ADVANCEMENT IN THE MOBILE APP REVIEW SYSTEM TO ENHANCE QUALITY OF MOBILE APPL...
 
A Theoretical Framework of the Influence of Mobility in Continued Usage Inten...
A Theoretical Framework of the Influence of Mobility in Continued Usage Inten...A Theoretical Framework of the Influence of Mobility in Continued Usage Inten...
A Theoretical Framework of the Influence of Mobility in Continued Usage Inten...
 
An effective approach to develop location-based augmented reality information...
An effective approach to develop location-based augmented reality information...An effective approach to develop location-based augmented reality information...
An effective approach to develop location-based augmented reality information...
 
Van Heeringen and van Gorp - Measure the functional size of a mobile app usi...
Van Heeringen and van Gorp  - Measure the functional size of a mobile app usi...Van Heeringen and van Gorp  - Measure the functional size of a mobile app usi...
Van Heeringen and van Gorp - Measure the functional size of a mobile app usi...
 
Evaluationof Smartphone Accessibility Interface Practices for Older Adults
Evaluationof Smartphone Accessibility Interface Practices for Older AdultsEvaluationof Smartphone Accessibility Interface Practices for Older Adults
Evaluationof Smartphone Accessibility Interface Practices for Older Adults
 
20120140503012
2012014050301220120140503012
20120140503012
 
iVoice
iVoiceiVoice
iVoice
 
State Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile ReadinessState Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile Readiness
 
A framework for software usability and ux measurement in mobile indystry
A framework for software usability and ux measurement in mobile indystryA framework for software usability and ux measurement in mobile indystry
A framework for software usability and ux measurement in mobile indystry
 
IRJET - Detecting the Advertisement Behavior in Android Applications
IRJET - Detecting the Advertisement Behavior in Android ApplicationsIRJET - Detecting the Advertisement Behavior in Android Applications
IRJET - Detecting the Advertisement Behavior in Android Applications
 
iMALERT – an Emergency Response Mobile ApplicationUsing Geo-Location for Pala...
iMALERT – an Emergency Response Mobile ApplicationUsing Geo-Location for Pala...iMALERT – an Emergency Response Mobile ApplicationUsing Geo-Location for Pala...
iMALERT – an Emergency Response Mobile ApplicationUsing Geo-Location for Pala...
 
Thesis
ThesisThesis
Thesis
 
Need of information technology in this modern world
Need of information technology in this modern worldNeed of information technology in this modern world
Need of information technology in this modern world
 
The Impact of Information Technology on Business Transformation in the Operat...
The Impact of Information Technology on Business Transformation in the Operat...The Impact of Information Technology on Business Transformation in the Operat...
The Impact of Information Technology on Business Transformation in the Operat...
 
Samsung_FCW GameChanger
Samsung_FCW GameChangerSamsung_FCW GameChanger
Samsung_FCW GameChanger
 
Information Technologies and its Impact on the Organisational Structure
Information Technologies and its Impact on the Organisational StructureInformation Technologies and its Impact on the Organisational Structure
Information Technologies and its Impact on the Organisational Structure
 
IN140703 service support technologies 8.9.2016
IN140703 service support technologies 8.9.2016IN140703 service support technologies 8.9.2016
IN140703 service support technologies 8.9.2016
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time Enterprise
 
M Model Fluency Flex Available as iTunes App | MD Buyline
M Model Fluency Flex Available as iTunes App | MD BuylineM Model Fluency Flex Available as iTunes App | MD Buyline
M Model Fluency Flex Available as iTunes App | MD Buyline
 

Viewers also liked

Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A Survey
IOSR Journals
 
K010218188
K010218188K010218188
K010218188
IOSR Journals
 
J017648994
J017648994J017648994
J017648994
IOSR Journals
 
J017555559
J017555559J017555559
J017555559
IOSR Journals
 
I1803026164
I1803026164I1803026164
I1803026164
IOSR Journals
 
A012310103
A012310103A012310103
A012310103
IOSR Journals
 
Q01813104114
Q01813104114Q01813104114
Q01813104114
IOSR Journals
 
Influence of Cr Doping On Structural, Morphological and Optical Properties of...
Influence of Cr Doping On Structural, Morphological and Optical Properties of...Influence of Cr Doping On Structural, Morphological and Optical Properties of...
Influence of Cr Doping On Structural, Morphological and Optical Properties of...
IOSR Journals
 
Face Image Restoration based on sample patterns using MLP Neural Network
Face Image Restoration based on sample patterns using MLP Neural NetworkFace Image Restoration based on sample patterns using MLP Neural Network
Face Image Restoration based on sample patterns using MLP Neural Network
IOSR Journals
 
F0333040
F0333040F0333040
F0333040
IOSR Journals
 
New Approach for Determination of Propagation Model Adapted To an Environment...
New Approach for Determination of Propagation Model Adapted To an Environment...New Approach for Determination of Propagation Model Adapted To an Environment...
New Approach for Determination of Propagation Model Adapted To an Environment...
IOSR Journals
 
Dielectric Relaxation And Molecular Interaction Studies Of PEG With Non-Polar...
Dielectric Relaxation And Molecular Interaction Studies Of PEG With Non-Polar...Dielectric Relaxation And Molecular Interaction Studies Of PEG With Non-Polar...
Dielectric Relaxation And Molecular Interaction Studies Of PEG With Non-Polar...
IOSR Journals
 
Research on Clustering Method of Related Cases Based On Chinese Text
Research on Clustering Method of Related Cases Based On Chinese TextResearch on Clustering Method of Related Cases Based On Chinese Text
Research on Clustering Method of Related Cases Based On Chinese Text
IOSR Journals
 
F017213747
F017213747F017213747
F017213747
IOSR Journals
 
Synthesis Characterization And Antimicrobial Activity Of 6- Oxido-1- ((5 -5- ...
Synthesis Characterization And Antimicrobial Activity Of 6- Oxido-1- ((5 -5- ...Synthesis Characterization And Antimicrobial Activity Of 6- Oxido-1- ((5 -5- ...
Synthesis Characterization And Antimicrobial Activity Of 6- Oxido-1- ((5 -5- ...
IOSR Journals
 
Experimental Investigation of Twin Cylinder Diesel Engine Using Jatropha and ...
Experimental Investigation of Twin Cylinder Diesel Engine Using Jatropha and ...Experimental Investigation of Twin Cylinder Diesel Engine Using Jatropha and ...
Experimental Investigation of Twin Cylinder Diesel Engine Using Jatropha and ...
IOSR Journals
 
The Role of Accounting in the Golden Age of Ayudhya Kingdom
The Role of Accounting in the Golden Age of Ayudhya KingdomThe Role of Accounting in the Golden Age of Ayudhya Kingdom
The Role of Accounting in the Golden Age of Ayudhya Kingdom
IOSR Journals
 
H017155360
H017155360H017155360
H017155360
IOSR Journals
 
A Power Flow Analysis of the Nigerian 330 KV Electric Power System
A Power Flow Analysis of the Nigerian 330 KV Electric Power SystemA Power Flow Analysis of the Nigerian 330 KV Electric Power System
A Power Flow Analysis of the Nigerian 330 KV Electric Power System
IOSR Journals
 
Evaluating the Synchronization of a Chaotic Encryption Scheme Using Different...
Evaluating the Synchronization of a Chaotic Encryption Scheme Using Different...Evaluating the Synchronization of a Chaotic Encryption Scheme Using Different...
Evaluating the Synchronization of a Chaotic Encryption Scheme Using Different...
IOSR Journals
 

Viewers also liked (20)

Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A Survey
 
K010218188
K010218188K010218188
K010218188
 
J017648994
J017648994J017648994
J017648994
 
J017555559
J017555559J017555559
J017555559
 
I1803026164
I1803026164I1803026164
I1803026164
 
A012310103
A012310103A012310103
A012310103
 
Q01813104114
Q01813104114Q01813104114
Q01813104114
 
Influence of Cr Doping On Structural, Morphological and Optical Properties of...
Influence of Cr Doping On Structural, Morphological and Optical Properties of...Influence of Cr Doping On Structural, Morphological and Optical Properties of...
Influence of Cr Doping On Structural, Morphological and Optical Properties of...
 
Face Image Restoration based on sample patterns using MLP Neural Network
Face Image Restoration based on sample patterns using MLP Neural NetworkFace Image Restoration based on sample patterns using MLP Neural Network
Face Image Restoration based on sample patterns using MLP Neural Network
 
F0333040
F0333040F0333040
F0333040
 
New Approach for Determination of Propagation Model Adapted To an Environment...
New Approach for Determination of Propagation Model Adapted To an Environment...New Approach for Determination of Propagation Model Adapted To an Environment...
New Approach for Determination of Propagation Model Adapted To an Environment...
 
Dielectric Relaxation And Molecular Interaction Studies Of PEG With Non-Polar...
Dielectric Relaxation And Molecular Interaction Studies Of PEG With Non-Polar...Dielectric Relaxation And Molecular Interaction Studies Of PEG With Non-Polar...
Dielectric Relaxation And Molecular Interaction Studies Of PEG With Non-Polar...
 
Research on Clustering Method of Related Cases Based On Chinese Text
Research on Clustering Method of Related Cases Based On Chinese TextResearch on Clustering Method of Related Cases Based On Chinese Text
Research on Clustering Method of Related Cases Based On Chinese Text
 
F017213747
F017213747F017213747
F017213747
 
Synthesis Characterization And Antimicrobial Activity Of 6- Oxido-1- ((5 -5- ...
Synthesis Characterization And Antimicrobial Activity Of 6- Oxido-1- ((5 -5- ...Synthesis Characterization And Antimicrobial Activity Of 6- Oxido-1- ((5 -5- ...
Synthesis Characterization And Antimicrobial Activity Of 6- Oxido-1- ((5 -5- ...
 
Experimental Investigation of Twin Cylinder Diesel Engine Using Jatropha and ...
Experimental Investigation of Twin Cylinder Diesel Engine Using Jatropha and ...Experimental Investigation of Twin Cylinder Diesel Engine Using Jatropha and ...
Experimental Investigation of Twin Cylinder Diesel Engine Using Jatropha and ...
 
The Role of Accounting in the Golden Age of Ayudhya Kingdom
The Role of Accounting in the Golden Age of Ayudhya KingdomThe Role of Accounting in the Golden Age of Ayudhya Kingdom
The Role of Accounting in the Golden Age of Ayudhya Kingdom
 
H017155360
H017155360H017155360
H017155360
 
A Power Flow Analysis of the Nigerian 330 KV Electric Power System
A Power Flow Analysis of the Nigerian 330 KV Electric Power SystemA Power Flow Analysis of the Nigerian 330 KV Electric Power System
A Power Flow Analysis of the Nigerian 330 KV Electric Power System
 
Evaluating the Synchronization of a Chaotic Encryption Scheme Using Different...
Evaluating the Synchronization of a Chaotic Encryption Scheme Using Different...Evaluating the Synchronization of a Chaotic Encryption Scheme Using Different...
Evaluating the Synchronization of a Chaotic Encryption Scheme Using Different...
 

Similar to A018140107

An Investigation On The Characteristics Of Mobile Applications A Survey Study
An Investigation On The Characteristics Of Mobile Applications  A Survey StudyAn Investigation On The Characteristics Of Mobile Applications  A Survey Study
An Investigation On The Characteristics Of Mobile Applications A Survey Study
Sara Perez
 
USE OF MOBILE APPLICATIONS FOR THE CONSTRUCTION INDUSTRY
USE OF MOBILE APPLICATIONS FOR THE CONSTRUCTION INDUSTRYUSE OF MOBILE APPLICATIONS FOR THE CONSTRUCTION INDUSTRY
USE OF MOBILE APPLICATIONS FOR THE CONSTRUCTION INDUSTRY
IRJET Journal
 
Research Paper OutlineI. INTRODUCTIONa. Exploring mobile app.docx
Research Paper OutlineI. INTRODUCTIONa. Exploring mobile app.docxResearch Paper OutlineI. INTRODUCTIONa. Exploring mobile app.docx
Research Paper OutlineI. INTRODUCTIONa. Exploring mobile app.docx
ronak56
 
MOBILE APPLICATION DEVELOPMENT METHODOLOGIES ADOPTED IN OMANI MARKET: A COMPA...
MOBILE APPLICATION DEVELOPMENT METHODOLOGIES ADOPTED IN OMANI MARKET: A COMPA...MOBILE APPLICATION DEVELOPMENT METHODOLOGIES ADOPTED IN OMANI MARKET: A COMPA...
MOBILE APPLICATION DEVELOPMENT METHODOLOGIES ADOPTED IN OMANI MARKET: A COMPA...
mathsjournal
 
Mobile Application Development Methodologies Adopted in Omani Market: A Compa...
Mobile Application Development Methodologies Adopted in Omani Market: A Compa...Mobile Application Development Methodologies Adopted in Omani Market: A Compa...
Mobile Application Development Methodologies Adopted in Omani Market: A Compa...
ijseajournal
 
RESEARCH ARTICLEUSER SERVICE INNOVATION ON MOBILE PHONEP.docx
RESEARCH ARTICLEUSER SERVICE INNOVATION ON MOBILE PHONEP.docxRESEARCH ARTICLEUSER SERVICE INNOVATION ON MOBILE PHONEP.docx
RESEARCH ARTICLEUSER SERVICE INNOVATION ON MOBILE PHONEP.docx
audeleypearl
 
IRJET- Approaching Highlights and Security issues in Software Engineering...
IRJET-  	  Approaching Highlights and Security issues in Software Engineering...IRJET-  	  Approaching Highlights and Security issues in Software Engineering...
IRJET- Approaching Highlights and Security issues in Software Engineering...
IRJET Journal
 
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of Pakistan
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of PakistanConsumer Intention to Adopt Smartphone Apps: An Empirical Study of Pakistan
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of Pakistan
IOSRJBM
 
Data Warehouse Model For Mobile-Based Applications
Data Warehouse Model For Mobile-Based ApplicationsData Warehouse Model For Mobile-Based Applications
Data Warehouse Model For Mobile-Based Applications
IJERA Editor
 
A Taxonomy Of Mobile Applications In Tourism
A Taxonomy Of Mobile Applications In TourismA Taxonomy Of Mobile Applications In Tourism
A Taxonomy Of Mobile Applications In Tourism
Sheila Sinclair
 
Adoption Of Mobile Technology In Business A Fit-Viability Model
Adoption Of Mobile Technology In Business  A Fit-Viability ModelAdoption Of Mobile Technology In Business  A Fit-Viability Model
Adoption Of Mobile Technology In Business A Fit-Viability Model
Steven Wallach
 
demystifying_the_architectures_of_a_mobile_app_development.pptx
demystifying_the_architectures_of_a_mobile_app_development.pptxdemystifying_the_architectures_of_a_mobile_app_development.pptx
demystifying_the_architectures_of_a_mobile_app_development.pptx
sarah david
 
demystifying_the_architectures_of_a_mobile_app_development.pdf
demystifying_the_architectures_of_a_mobile_app_development.pdfdemystifying_the_architectures_of_a_mobile_app_development.pdf
demystifying_the_architectures_of_a_mobile_app_development.pdf
sarah david
 
M1803028995
M1803028995M1803028995
M1803028995
IOSR Journals
 
Test Cases and Testing Strategies for Mobile Apps –A Survey
Test Cases and Testing Strategies for  Mobile Apps  –A SurveyTest Cases and Testing Strategies for  Mobile Apps  –A Survey
Test Cases and Testing Strategies for Mobile Apps –A Survey
IRJET Journal
 
(Crestani et al., 2004) The proliferation of mobile devices and th
(Crestani et al., 2004) The proliferation of mobile devices and th(Crestani et al., 2004) The proliferation of mobile devices and th
(Crestani et al., 2004) The proliferation of mobile devices and th
MargaritoWhitt221
 
Intention to adopt mobile application services: a study among pakistani acadm...
Intention to adopt mobile application services: a study among pakistani acadm...Intention to adopt mobile application services: a study among pakistani acadm...
Intention to adopt mobile application services: a study among pakistani acadm...
Institute of Strategic Studies Islamabad (ISSI)
 
Using machine learning to improve a telco self-service mobile application in ...
Using machine learning to improve a telco self-service mobile application in ...Using machine learning to improve a telco self-service mobile application in ...
Using machine learning to improve a telco self-service mobile application in ...
IAESIJAI
 
Customers perception of m banking adoption in of bahrain an empirical assess...
Customers perception of m banking adoption in of bahrain  an empirical assess...Customers perception of m banking adoption in of bahrain  an empirical assess...
Customers perception of m banking adoption in of bahrain an empirical assess...
IJMIT JOURNAL
 

Similar to A018140107 (20)

An Investigation On The Characteristics Of Mobile Applications A Survey Study
An Investigation On The Characteristics Of Mobile Applications  A Survey StudyAn Investigation On The Characteristics Of Mobile Applications  A Survey Study
An Investigation On The Characteristics Of Mobile Applications A Survey Study
 
USE OF MOBILE APPLICATIONS FOR THE CONSTRUCTION INDUSTRY
USE OF MOBILE APPLICATIONS FOR THE CONSTRUCTION INDUSTRYUSE OF MOBILE APPLICATIONS FOR THE CONSTRUCTION INDUSTRY
USE OF MOBILE APPLICATIONS FOR THE CONSTRUCTION INDUSTRY
 
Research Paper OutlineI. INTRODUCTIONa. Exploring mobile app.docx
Research Paper OutlineI. INTRODUCTIONa. Exploring mobile app.docxResearch Paper OutlineI. INTRODUCTIONa. Exploring mobile app.docx
Research Paper OutlineI. INTRODUCTIONa. Exploring mobile app.docx
 
MOBILE APPLICATION DEVELOPMENT METHODOLOGIES ADOPTED IN OMANI MARKET: A COMPA...
MOBILE APPLICATION DEVELOPMENT METHODOLOGIES ADOPTED IN OMANI MARKET: A COMPA...MOBILE APPLICATION DEVELOPMENT METHODOLOGIES ADOPTED IN OMANI MARKET: A COMPA...
MOBILE APPLICATION DEVELOPMENT METHODOLOGIES ADOPTED IN OMANI MARKET: A COMPA...
 
Mobile Application Development Methodologies Adopted in Omani Market: A Compa...
Mobile Application Development Methodologies Adopted in Omani Market: A Compa...Mobile Application Development Methodologies Adopted in Omani Market: A Compa...
Mobile Application Development Methodologies Adopted in Omani Market: A Compa...
 
RESEARCH ARTICLEUSER SERVICE INNOVATION ON MOBILE PHONEP.docx
RESEARCH ARTICLEUSER SERVICE INNOVATION ON MOBILE PHONEP.docxRESEARCH ARTICLEUSER SERVICE INNOVATION ON MOBILE PHONEP.docx
RESEARCH ARTICLEUSER SERVICE INNOVATION ON MOBILE PHONEP.docx
 
IRJET- Approaching Highlights and Security issues in Software Engineering...
IRJET-  	  Approaching Highlights and Security issues in Software Engineering...IRJET-  	  Approaching Highlights and Security issues in Software Engineering...
IRJET- Approaching Highlights and Security issues in Software Engineering...
 
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of Pakistan
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of PakistanConsumer Intention to Adopt Smartphone Apps: An Empirical Study of Pakistan
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of Pakistan
 
Data Warehouse Model For Mobile-Based Applications
Data Warehouse Model For Mobile-Based ApplicationsData Warehouse Model For Mobile-Based Applications
Data Warehouse Model For Mobile-Based Applications
 
A Taxonomy Of Mobile Applications In Tourism
A Taxonomy Of Mobile Applications In TourismA Taxonomy Of Mobile Applications In Tourism
A Taxonomy Of Mobile Applications In Tourism
 
Adoption Of Mobile Technology In Business A Fit-Viability Model
Adoption Of Mobile Technology In Business  A Fit-Viability ModelAdoption Of Mobile Technology In Business  A Fit-Viability Model
Adoption Of Mobile Technology In Business A Fit-Viability Model
 
demystifying_the_architectures_of_a_mobile_app_development.pptx
demystifying_the_architectures_of_a_mobile_app_development.pptxdemystifying_the_architectures_of_a_mobile_app_development.pptx
demystifying_the_architectures_of_a_mobile_app_development.pptx
 
demystifying_the_architectures_of_a_mobile_app_development.pdf
demystifying_the_architectures_of_a_mobile_app_development.pdfdemystifying_the_architectures_of_a_mobile_app_development.pdf
demystifying_the_architectures_of_a_mobile_app_development.pdf
 
M1803028995
M1803028995M1803028995
M1803028995
 
LUNCHLIST
LUNCHLISTLUNCHLIST
LUNCHLIST
 
Test Cases and Testing Strategies for Mobile Apps –A Survey
Test Cases and Testing Strategies for  Mobile Apps  –A SurveyTest Cases and Testing Strategies for  Mobile Apps  –A Survey
Test Cases and Testing Strategies for Mobile Apps –A Survey
 
(Crestani et al., 2004) The proliferation of mobile devices and th
(Crestani et al., 2004) The proliferation of mobile devices and th(Crestani et al., 2004) The proliferation of mobile devices and th
(Crestani et al., 2004) The proliferation of mobile devices and th
 
Intention to adopt mobile application services: a study among pakistani acadm...
Intention to adopt mobile application services: a study among pakistani acadm...Intention to adopt mobile application services: a study among pakistani acadm...
Intention to adopt mobile application services: a study among pakistani acadm...
 
Using machine learning to improve a telco self-service mobile application in ...
Using machine learning to improve a telco self-service mobile application in ...Using machine learning to improve a telco self-service mobile application in ...
Using machine learning to improve a telco self-service mobile application in ...
 
Customers perception of m banking adoption in of bahrain an empirical assess...
Customers perception of m banking adoption in of bahrain  an empirical assess...Customers perception of m banking adoption in of bahrain  an empirical assess...
Customers perception of m banking adoption in of bahrain an empirical assess...
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

A018140107

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. IV(Jan – Feb. 2016), PP 01-07 www.iosrjournals.org DOI: 10.9790/0661-18140107 www.iosrjournals.org 1 | Page Context-Centred Mobile Applications Development For Effective Adoption Of Mobile Technology Vincent O. Omwenga Abstract: Recent approaches in mobile computing consider context to be central to the design and implementation of mobile applications. Context considerations enables the mobile application to respond to the needs and purpose it is intended for. Qualitative and quantitative research techniques have been applied to investigate and come up with components that are critical in the development of context-centred mobile applications.It is however critical to understand how toseparatecore application logic from adaptive functionality in order toachieve a context-centred mobile applications. Thispaperpresents the factors and technologies to consider in the developmentof the context-centredmobile applications. Further, a framework that emphases on the separation of core application logic and adaptive functionalityfor building a context-centred mobile application is presented. Keywords:Context, Context-centred, Mobile Applications, Core Application Logic, Adaptive Functionality. I. Introduction Mobile technologies and applications have become ubiquitous in many aspects of our personal and professional lives. For instance, a number of mobile applications have been developed for business enterprises and individual users. Most enterprises have realized the need to use mobile applications to gain competitive advantages amongst their peers through improved productivity as a consequence of enhanced efficiency and responsiveness to the needs of the ever changing clientneeds (Unhelkar&Murugesan, 2010).Other application areas where mobile technology has greatly manifested itself and affected personal and professional lives of individuals include mobile commerce (m-commerce), Mobile Health (m-health), Mobile Agriculture (m- Agriculture), Mobile Insurance (m-Insurance), e-governance among others. Whereas the development of the mobile applications tend to follow a number of strategies and approaches, recent developments in mobile applications have considered context to be key. The missing link is the relationship between the core application logic and adaptive functionality from the context perspective. Benou&Bitos(2008) indicates that the separation of these two application variables is important in understanding the effects of context in mobile application development and will enhance the ability of the application to perform transactions easily, timely and ubiquitously (Hu, Yang, Yeh& Hu 2008) . Underlying the debate on the role of context in mobile application development is the need to have applications that are independent of location and are easily adoptable by the user. The key in achieving this is the development of context-centredmobile application. II. Context-Centred Applications Mobile applications are intended to operate in a dynamic environment of everyday life. For instance, users keep changing their location and roles over time and hence the context of application should reflect these changes-adaptability of the application. Additionally the computing environment varies and users need the ability to choose the settings in their mobile devices. All this information surrounding the human-computer interaction, which can be exploited by applications, constitutes the context (Benou&Bitos, 2008). Critical in this is understanding the human behaviour and disposition. The human needs, characteristics, desires and even decisions are constantly variant and they thus define the human context or environment. Therefore, successful development of mobile applications must take into consideration the context since there is a strong coupling between its exact specification and efficient exploitation of the environment. This study demonstrates how context can be exploited in mobile application development by separating and analysingcore application logic and adaptive functionality. The area of use (i.e. environment) of the mobile application is also critical in determining the right context of the application. To put this into perspective, consider the classification of the application based on the application type. Different applications are modelled to perform a specific type of function. For instance, applications in the health sector are modelled to focus on the issues around the health sector and therefore the developed of such application will be done while focusing on the specific issues around the health sector. The classification of these applications would thus make it easy to understand the application and will lead to the development of a highlyfocused applications for a specific application type (Unhelkar&Murugesan 2010).
  • 2. Context-Centred Mobile Applications Development For Effective Adoption Of Mobile Technology DOI: 10.9790/0661-18140107 www.iosrjournals.org 2 | Page Unhelkar&Murugesan (2010) classify the mobile applications into five categories: m-transaction, m- operation, m-collaboration, m-information and m-broadcast. From their categorization, emphasis is on the underlying functions the application is expected to accomplish. For example, applications under the category of Mobile Broadcast largely broadcast a diverse set of information content to many mobile users. Mobile Information applications present user’s requested information in a one way (unidirectional manner), that is, from the application to the user. Mobile Transaction applications broadcast and provide information in addition to facilitating and executing transactions. Applications under Mobile Operation category support the operational activities of an enterprise that donot encompassdirect contact with clients. Finally, Mobile Collaboration category contains applications that promote organization-wide teamwork, that is, interaction of various organizational functional units. Clearly, each of the mobile application categories by (Unhelkar&Murugesan 2010) has unique requirements and challenges. For example, Mobile Information applications require fairly less strict security requirements which results into concerns around privacy and usability. Mobile transaction applications require better security, quick feedback, highly developed and reliable transactions, high level of productivity and more trusted services. Mobile Operation transactions pose a challenge on the delivery of immediate information, inventory management challenges, adoptableplanning of work, changing organizational structures and the integration of diverse backend systems and databases. Lastly the mobile collaboration applications present coding and data management challenges. Varshney& Vetter (2001) identifies a number of categories of commercial applications of mobile technology. Among them include:Financial applications, Product location and shopping, and Mobile entertainment services among others. These classification is however limited to mobile commerce which is not exhaustive of all mobile applications. Oinas-Kukkonen&Kurkela (2003) classifies mobile applications broadly into two groups; goal-driven and entertainment-focused. The goal-driven applicationsare modelled to offer fast feedback to requests. The entertainment-focused applications offers recreational opportunities to users. They then propose approaches which can be used for the development of highly goal-driven mobile applications which focuses on: relevance, usefulness, ease of use, mobility, effortlessness of navigation, user-centred, andcustomization.The classification however is quite broad to limit focus on developmental issues specific to the two categories. Some other aspect of environment that will also affect the mobile application development and deployment are the computing and communications paradigms. Some applications need to establish the user’s location before they can offer some services and the continuously monitor the location to adapt services and information accordingly. This presents challenges of security, reliability and quality of service. Missing in all these categorization is problem based approach (problem system development paradigm) to mobile technology development and deployment. The understanding here is that problem is context specific and the conceptualization of the solution based on the dynamics around the problem will be central in achieving a context-centredmobile application. A lot of research has been done in mobile application development with a number of modelsand frameworks proposed by various researchers. Most of these models and frameworks mainly focus on categorization and providing a layered approach in mobile applications development. Researchers acknowledge the need to consider context in mobile application development and the need to develop context-centredmobile applications but they don’t specify explicitly specific development guidelines in relation to core application logic and adaptive functionality, more-so in a highly dynamic environment. Buthpitiya, et. al (2011) also agree that many models and toolkits for developingcontext-centredmobile applications have been adopted for relatively fixed environments and they don’t respond to the unique concerns, prospects and limitations presented by a dynamic mobile environment and the changing context. 2.1 Factors Influencing Mobile Application Development considering context Unhelkar&Murugesan (2010) and Dehlinger& Dixon (2011) have identified these factors to be: a) Computing platforms and devices:As indicated in section 2.0, mobile applications operate on different frameworks and hence different platforms with different hardware have different computing capabilities. These different features are manifested on the existence of different mobile devices with different configurationally and adaptable features. It is thus critical to pay attention to these facts during mobile application design and development stage. b) User Context: This can be considered to be the user physical attributes such as user location and usage. It is therefore critical to provide a fairly well customizable application to allow for personalization since user context is variant. Moreover, the mobile devices themselves should track constantly the environment thereby making mobile applications intrinsically context-centred. c) Security: Security threats are dynamically changing with every new emerging technology. It is therefore important to consider the threats, vulnerabilities and potential risks surrounding the emerging technologies.
  • 3. Context-Centred Mobile Applications Development For Effective Adoption Of Mobile Technology DOI: 10.9790/0661-18140107 www.iosrjournals.org 3 | Page The security mitigation strategies implementable on the mobile application should be informed by the critical reviews of the existing security issues for a particular environment. d) The constantly changing computing requirements: The agility of the mobile application will be critical in an ever changing environment. The developers should focus on a highly tolerant mobile applications to accommodate any new requirements. e) Dynamism of supporting communication infrastructure: The support infrastructure are sometimes unstable due to inherent potential interruptions. Developers should focus on development of application which have some degree of fault tolerance. 2.2 Mobile Technologies supporting Mobile Application Development Mobile technologies used in mobile application development can be broadly classified as communication, development platforms, middleware, presentation and security technologies. Communication technologies like WIFI and Bluetooth which have enabled communication through a wireless network have significantly led to the growth of mobile computing and are an important consideration in mobile applications development. It will be critical for the mobile developer to be aware of the available communication technology in the particular environment where the application shall be used. Some of the commonly used mobile application platforms include android, iOS, Adobe Flash lite, Java ME, and .NET CF. Gavalas&Economou(2011) conducted an assessments on four of the platforms and presented the appropriateness of each platform with respect to four critical application development requirements which are portability, functionality, development speed and performance. Their findings were that they operate differently under different context and operating systems. Their findings therefore underscores the need to have context in mind when selecting type of platform to be used. Furthermore, operating systems like Android, Windows CE, Palm OS, EPOC, Linux and proprietary systems as well, such as RTOS and GEOS, enable the various mobile devices to operate in different platforms. For example, J2ME, which is a light version of Java meets limitations and peculiarities of mobile devices (Benou&Bitos, 2008). Mobile middleware managesdifferent services in a mobile environment and also provides the connectivitymeans fordifferent devices. WAP (Wireless application protocol)and iMode are examplesof mobile middleware protocols. WAP is a secure specification that allows users to receive information instantly through their handheld devices and is supported by all mobile operating systems (Hu et al, 2008).I-mode uses packet transmissions to offer continuous access and uses a segment of HTML to make the creation of content faster and easy. A multitude of diverse mobile devices available include both cellular phones, smartphones, PDAs and hybrid handheld devices that combine voice, data processing and communication capabilities. Standards like XML, WML and various kinds of HTML are used for content delivery. Voice XML technologies offer convenient user interfaces (Hansmann et al, 2003).The change in mobile environment calls for application designers to become more innovative and exploit the distinct benefits from the newer techn ologies (Benou&Bitos, 2008). The position of a portable object is beneficial in context-centredmobile applications. This is classified as spatio-temporal context by Schilt, Adams, & Want (1994). The various positioning techniques include; satellite based, cellular network based, WLAN based and RFID-based systems. In Wireless local area networks the position determined from the access point and inRadio Frequency Identification thelocation of an object or user carrying an RFID card is determined from the location of the stationary reader that captures the signals emitted from the RFID card. 2.3 Context and Context Centeredness in Mobile Application Development Pascoe (1998) defines context as the subset of physical and conceptual state of interest to a particular entity. Brown, Bovey&Chen (1997) consider context as location, identities of the people around the user, the time of day, season, temperature, and so forth. Schilit&Theimer (1994) refer to context as location, identities of nearby people and objects, and changes to those objects while Schmidt &Laerhoven (2001) identify context as the knowledge about the user’s and the device’s state, including surroundings, situation and location. Dey&Abowd (1999) states that context is any information that can be used to characterize the situation of an entity. In this paper, Dey&Abowd (1999) definition is adopted. Borrowing from Dey&Abowd (1999) definition of context, the contextual information which is descriptive of what the entity is, focuses on which entity it concerns(Schilit, Adams, & Want, 1994). According to Schilit, Adams, & Want (1994) the classification includesUser context (e.g. user identity, collection of nearby people, user’s profile, and so forth);Computing context(e.g.hardware characteristics, software characteristics, network connectivity, communication bandwidth, nearby resources such as printers and displays); Physical Context (e.g. lighting, noise level, temperature and humidity); Spatio-temporal context(e.g. location, place,
  • 4. Context-Centred Mobile Applications Development For Effective Adoption Of Mobile Technology DOI: 10.9790/0661-18140107 www.iosrjournals.org 4 | Page time of the day, week, month, season of year and time zone); Task context (e.g. goals, tasks and actions of the user). It is argued that for a system to be context-centred it must use context to offer relevant information and services to the users Dey&Abowd (1999). Context-centredmobile applications therefore uses information relating to a context to give feedback and respond to a highly dynamic computing environment. A context- centredmobile application is therefore one that is able to use contextual entities of the mobile environment and to adjust its behaviourto present appropriate content and services to the user. According to Schilit, Adams, & Want (1994) the net effect of the context-centredapplication should include: a) Proximate selection: This is a technique that emphasizes on the user interface. The rationale behind the technique is that objects or entities that are located closely to each other should be made in a manner that allows for easy selection. b) Automatic contextual reconfiguration: It is a process that focuses on the changing, adding or removing of new entities or components based on the changing context. c) Contextual information and command: Context should be able to parameterize “Contextual commands” so that queries on contextual information are able to respond based on the context. d) Context-triggered actions: The emphasis is on the decision rule that specify a specific reaction based on the context. It is based largely on the “if-then” rules. It is thus imperative to have a framework mobile application development that largely addresses the context from the four net effect as identified by Schilit, Adams, & Want (1994). 2.4 Core Application Logic and Adaptive Functionality in Relation to Context Various components in a mobile application work together to complete a transaction in a mobile application Hu et al (2008). Understanding how the interaction among these component is vital in achieving the desired transactional level. There is therefore need to understandthe application logic which is the mode of reasoning when developing a mobile application. The components in the mobile application transactions include the mobile application interface at the client side and server side, the mobile handheld device, mobile middleware, wireless and mobile networks and the host computers. A mobile application implemented by the content provider must have the following programs; programs on the client side and programs on the server side.It is then expected that a handheld mobile device will offer the user with an interacting interface to the mobile applications through these set of programs. By using the middleware, the internet contents are mapped to mobile points which are supported by the various operating systems, micro-browsers and protocols. To ensure security and integrity of the content, the middleware provides a mechanism to encrypt communications. The transactions/requests from the users involving various entities of a mobile device are expected to be transferred to the nearest base station using the wireless and mobile networks. Each of the entities in a mobile application transaction processing constitutes some formof context. For instance, the mobile application interface on the client side constitutes user context, physical context, spatio- temporal context and task context. A context-centredmobile application should therefore be able to change with context through aspects like interface reconfiguration. The developers should provide the means for adapting the mobile application to the context through configurable features. The mobile devices on the other hand should provide a computing context since the mobile devices differ in terms of processing power, storage capacity, interface features and so forth. The mobile middleware also provides a middleware context depending on the capability and technologies used at the middleware level. The mobile networks constitute a computing context in terms of network connectivity, communication bandwidth and content delivery. Finally the host computers host the application, the databases and the web servers and should be aware of the computing context andjob context of mobile applications. In mobile application core logic, a mobile developer must take into consideration the participating entities’reasoning and thought process as far as the anticipated response on the usage of the mobile application is concerned. The mobile application should also have elements of adaptive functionality. This describes how the mobile application is adapted by users and includes the client devices and the client programs. For example, the mobile device should be able to manage the clientside needs of a mobile application and the server side programming should endeavour to provide the development of software running on the mobile devices. This can be achieved by applying web interface construction with the use of popular languages like CSS, DOM, HTML, JavaScript, WML, XML and so forth. The adaptive functionality should thus considers mobile application properties like content and service delivery, device performance, information dissemination, consistent functionality across different mobile devices and platforms, a dynamic mobile environment and security considerations in mobile application use.
  • 5. Context-Centred Mobile Applications Development For Effective Adoption Of Mobile Technology DOI: 10.9790/0661-18140107 www.iosrjournals.org 5 | Page III. Proposed Context-centredMobile Application Development Framework The proposed context-centredmobile application development frameworkwill have the following components and features: 3.1.1 Mobile device characteristics The following characteristics were imperative in developing this framework: Screen size, processing power, operating platform and mobile device type or make are some of the features that must critically be considered in mobile application development.Benou&Bitos (2008) established that in general the mobile devices have small screens, limited interaction, low processing power and limited memory. They also pointed out that during the mobile application development phase aspects around design and performance of the computing devices be considered. As discussed in section 2.0, the mobile device characteristics are inherently dependent on the context. This means that the characteristics should be interpreted by the developer based on the context of the mobile application. 3.1.2 Mobile application development platforms and operating platform Mobile application development platform is a critical factor in successful development of a mobile application. The mobile device development platform include:android, iOS, Adobe Flash Lite and Java ME among others. Different development platforms affect portability, functionality, development speed and performance in different ways (Gavalas&Economou, 2011). In section 2.2, we provided the basic understanding on the effect of development platforms on the mobile application. Unhelkar&Murugesan (2010) and Dehlinger& Dixon (2011) indicates that mobile device operating platforms do also affects mobile application development. This studyreaffirms that mobile device operating platform is a core application logic component in mobile application development. Consideration of these factors will influence the outcome of the application. 3.1.3 Nature of content and service delivery Content and service delivery is an adaptive functionality component that encompasses aspects usability and user experience like font size, aesthetic values, formatting of data, the mobile application graphical user interface and identifying with core user stories or feedback (Hu et al, 2008).These features influence the acceptability and adoptability of the mobile application in terms of usage from the user perspective. It is however critical to note that formatting of data or content and the user interface are the most critical features of service delivery in mobile applications development. 3.1.4 Changes in the mobile environment In section 2.2, we have highlighted on how user locale can influence the context and hence affect mobile application development. Thecontent and content requirements by the user vary from time to time and nature of content and service delivery are rated as the most significant mobile environmental features. The framework therefore should include changes to the mobile computing environment as a significant core application logic and adaptive functionality component in mobile application development. 3.1.5 Cellular network capabilities A cellular network capability is both an adaptive functionality factor and a core application logic factor in mobile application development.Benou&Bitos (2008) have identified that cellular networks have some abilities like broadcasting abilities. Cellular network broadcasting abilities or host application broadcasting abilities determine the method of mass information dissemination while the performance of the cellular network affects also the mobile application performance. 3.1.6 Mobile Security considerations Mobile application development guidelines by Benou&Bitos (2008) don’t address mobile security but instead recommend further research since they believe security is critical. Unhelkar&Murugesan (2010) emphasize that mobile application developers need to consider the threats, vulnerabilities and risks arising from the use of current technologies and use secure tools to implement security and privacy in mobile applications. Security has also to be applied at the various stages of mobile application use and this include; at the user level, over the cellular communication network and at the host computers that run mobile applications. Authentication, cryptography, secure communication, and secure mobile payment methods can be used to provide the much needed security in mobile applications. The significant core application logic and adaptive functionality features of mobile application security considerations include; current host and end-user mobile security threats and vulnerabilities, development platform threats and vulnerabilities, data transmission threats and vulnerabilities and authentication, confidentiality, integrity and availability.
  • 6. Context-Centred Mobile Applications Development For Effective Adoption Of Mobile Technology DOI: 10.9790/0661-18140107 www.iosrjournals.org 6 | Page 3.1.7 Human and mobile device interaction Human aspects like preference, knowledge, and attitude among other are determinant factors of the user expectations on the kind of mobile application to adopt. The human and mobile device interaction is derived from the adaptive functionality feature that takes into consideration the aspects that affect usability of the application thus influencing the user experience. 3.1.8 Mobile application performance Performance of mobile devices, the dynamic communication and networks affect the mobile application performance. Speed of the cellular network and the computational power of the host computers also affect the mobile application performance significantly. 3.1.9 Application consistency across mobile devices and operating platforms Benou&Bitos (2008) indicate that the same mobile application should operate on different devices and should offer some consistency in usage in terms of meeting the functional needs and interfaces on different devices in which they run. Mobile applications should therefore provide consistent functionality across different mobile operating platforms and mobile devices and this is affected by the mobile application development platformand the mobile device development technologies. 3.2 The framework The figure 1 presents theframework which highlightson how the interaction of the various components and features discussed in section 3.1can be achieved so as to develop a context-centredmobile application. Figure1: Mobile applications development framework using context centeredness analogy
  • 7. Context-Centred Mobile Applications Development For Effective Adoption Of Mobile Technology DOI: 10.9790/0661-18140107 www.iosrjournals.org 7 | Page This framework is divided into two sections; core application logic and the adaptive functionality. Core application logic has six components that contain critical features a developer should consider and adaptive functionality comprisesof five components.The framework is then encapsulated by the mobile application security considerations. Mobile application security affects many of the components in the framework and therefore must be considered at the component level. The framework focuses principally on mobile application development where there is a separate host supporting the mobile application. Each individual or mobile application development company has its different approach in application development.Mobile application developer needs to have a clear understanding of the requirements, the rationale of development and the end product in order to gainfully use this framework. Mobile application developers are free to categorize and emphasize on particular aspects of mobile application development that will be more useful for each development. IV. Conclusion The studyidentified, analysed and separated mobile application development factors and components into core application logic features and adaptive functionality features.A frameworkthat highlights components and critical features to be considered in the mobile application is presented. The exploitation of context both on the core application logic and adaptive functionality will lead to development of acontext-centredmobile applications. In developing a mobile application, the core application logic and adaptive functionality features should be considered separately as depicted in the proposed framework. An extension of this study could consider contextual information and its classifications, that is, user context, computing context, physical context, spatial-temporal context and task context. Moreover, manner of context acquisition, that is, sensed context, derived context or where context is explicitly provided could also be considered. Acknowledgement I wish to express my gratitude to Strathmore University, Faculty of Information Technology for the Research funding. References [1]. Benou,P., &Bitos, V. (2008), Developing Mobile Commerce Applications. Journal of Electronic commerce in Organizations, Volume 6, Issue 1. [2]. Brown, J., Bovey, D., & Chen, X. (1997). Context-Centeredapplications: From the laboratory to the marketplace. IEEE Personal Communications, 4(5), 58-64. [3]. Buthpitiya, S., Cheng,H., T., Sun,F., T., Griss,M. &Dey,A.,K.(2011). Hermes: a Context-Centeredapplication development framework for the Mobile Environment. Carnegie Mellon University. [4]. Dehlinger, J., &Dixon,J. (2011). Mobile Application Software Engineering: Challenges and Research Directions. Department of Computer and Information Sciences -Towson University [5]. Dey, A., &Abowd, G. (1999). Towards a better understanding of context and context-awareness. Technical Report 99-22. Georgia Institute ofTechnology. [6]. Gavalas, D., &Economou, D. (2011), Development platforms for Mobile Applications: Status andTrends. IEEE Software. [7]. Hansmann, U., Merk, L., Nicklous, M., &Stober T. (2003).Pervasive computing. Berlin, Heidelberg, New York: Springer-Verlag. [8]. Hu,W., C., Yang, C., H.T., Yeh, J., H., & Hu, W. (2008) . Mobile and Electronic Commerce Systems andTechnologies. Journal of Electronic Commerce in Organizations, Volume 6, Issue 3. [9]. Oinas-Kukkonen, H., &Kurkela, V. (2003). Developing Successful Mobile Applications. Proceedings of the International Conference on Computer Science and Technology, (pp. 50-54). Cancun, Mexico. [10]. Pascoe, J. (1998). Adding generic contextual capabilities to wearable computers. In Proceedings of the 2ndInternational Symposium onWearable Computers (pp. 92-99). [11]. Schilit, B., Adams, N., & Want, R. (1994). Context-Centeredcomputing applications. In Proceedings of the 1st International Workshop on Mobile Computing Systems and Applications (pp. 85-90). [12]. Schmidt, A., &Laerhoven, K. (2001). Howto build smart appliances. IEEE Personal Communications, 8(4), 66-71. [13]. Schilit, B., &Theimer, M. (1994). Disseminating activemap informationto mobile hosts. IEEE Network, 8(5), 22-32. [14]. Unhelkar, B., &Murugesan, S. (2010). The Enterprise Mobile Applications Development Framework. IT Professional, 12 (3), 33- 39. [15]. Varshney, U., & Vetter, R. (2001). A Framework for the Emerging Mobile Commerce Applications. Proceedings of the 34th Annual Hawaii International Conference in System Sciences, 9, pp. 9014-9023.