Search results

1 – 10 of over 1000
Article
Publication date: 7 June 2013

Kuo‐Lun Hsiao

The research goal of this study is to explore the factors influencing the adoption of Android smartphones and the intention to pay for mobile internet services.

6604

Abstract

Purpose

The research goal of this study is to explore the factors influencing the adoption of Android smartphones and the intention to pay for mobile internet services.

Design/methodology/approach

The present study proposes a framework based on theory of reasoned action (TRA) from the perspectives of software (interface convenience and perceived content), hardware (perceived infrastructure), design (design aesthetics) and perceived value (emotional value, price/value for money, performance/quality value, and social value). A web survey was conducted, and data were collected from a total of 881 users of Android smartphones in Taiwan. The casual model was validated using partial least squares (PLS) techniques.

Findings

The results indicated that the influence of the factors on the intention of the mobile internet users and non‐users were different. Surprisingly, the effect of design aesthetics was not significant in all of the groups. Male users were found to be more likely to read e‐books on their smartphones, as are people with higher personal incomes.

Practical implications

This study contributes to a theoretical understanding of the factors that promote mobile internet users' and non‐users' intention to adopt Android smartphones and pay for mobile internet services. The proposed framework can be used by mobile internet service providers and smartphone manufacturers to design the products and marketing strategies.

Originality/value

The primary value of this paper lies in providing a better understanding of users' and non‐users' concerns about Android smartphone adoption and subscription of mobile internet services.

Article
Publication date: 9 November 2015

Himanshu Srivastava and Shashikala Tapaswi

The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device…

1458

Abstract

Purpose

The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device considering that the data on the device are not much altered during the extraction process. Also, the emphasis is laid on testing the validity of existing forensic tools against the data obtained manually and by using this approach. Smartphones have spurred the mobile computing technology, and Android is widely used as an Operating System in these devices. These days, users store most of their personal information like emails, images, contacts etc., on Phones/Tablets as their data would be readily accessible and thus convenient for them.

Design/methodology/approach

Android Operating System is built on the Linux Kernel and scripts to extract data from Android Mobile Device with the use of Android Debugging Bridge have been written. The approach is more focused on the logical acquisition of data from devices rather than acquisition using physical methods.

Findings

Live data of the Facebook application running on the device can be extracted. Also, the password of the LuksManager application (used to create an encrypted volume on the device), which is stored in the internal memory, is also extracted and identified.

Research limitations/implications

The study has been conducted in an academic environment, thereby limiting external validity. Another limitation is the limited edition of some of the software forensics tools that are used. The full access to these software tools are restricted by Law enforcement and Investigation policies. The research provides a different approach which could aid in criminal investigation activities on mobile devices.

Practical implications

The devices which have the latest versions of Android not only store messages and mails, but a lot of information about GPS, as well as information about popular applications like Facebook, WhatsApp, etc. This could practically help a lot in criminal investigation.

Originality/value

This study is important because very few works have been done on recent versions (Jellybean and Kitkat) of Android. The proposed approach could extract large amounts of information as compared to earlier approaches with the newer versions of Android having larger memory and new features.

Details

Information & Computer Security, vol. 23 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 13 November 2009

Endre Grøtnes

The purpose of the paper is to introduce standardization as a neutral arena for open innovation. The aim is to show that different policies towards open membership in…

5562

Abstract

Purpose

The purpose of the paper is to introduce standardization as a neutral arena for open innovation. The aim is to show that different policies towards open membership in standardization initiatives lead to different open innovation processes.

Design/methodology/approach

Two cases are used to illustrate the differences in open innovation processes. The cases are the Android mobile operating system and the service platform developed by the Open Mobile Alliance. The core process types introduced by Gassmann and Enkel are used to show the different open innovation approaches.

Findings

Both cases use open innovation to create standards. Open membership leads to a coupled process, while a more restricted membership gives separate inside‐out and outside‐in processes. The case lead by established firms in the industry has a process where radical innovations are introduced early in the process, while the case lead by newcomers has a process where radical innovations are introduced late in the process. The two cases have different approaches towards commercialization of the products. Android relies on third‐party developers, while the Open Mobile Alliance relies on their own members.

Research limitations/implications

The cases are from the telecommunication sector and based on standardization of large technical platforms. The findings might not be the same for other sectors.

Originality/value

The paper establishes open innovation as a neutral arena for open innovation outside the domain of any single firm. It shows how the openness towards membership influences the choice of open innovation processes.

Details

Information Technology & People, vol. 22 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 February 2018

Adele Parmentola, Michele Simoni and Ilaria Tutore

The purpose of this paper is to propose a comprehensive theoretical framework to explain the different diffusion dynamics of a technology realized under an open source (OS) regime…

Abstract

Purpose

The purpose of this paper is to propose a comprehensive theoretical framework to explain the different diffusion dynamics of a technology realized under an open source (OS) regime vs a technology realized under a closed-proprietary (CP) regime.

Design/methodology/approach

Following a systematic combining approach, theoretical predictions derived from literature on diffusion of innovation and on open innovation were matched with empirical observations derived from a case study of two mobile operation systems, which were released under different technological regimes.

Findings

This paper proposes a theoretical framework and a set of original theoretical propositions that can help to explain the differences in the diffusion dynamics of technologies that are released under different regimes (i.e. CP vs OS).

Research limitations/implications

This paper provides managers a better understanding of the diffusion dynamics of technologies released according to an open innovation strategy. In addition, the empirical case study improves the understanding of an important industry (the MOS industry) that has not been fully investigated from the innovation diffusion perspective. Nevertheless, the efficacy and generalizability of the theoretical framework proposed in this paper require future empirical tests.

Originality/value

This paper makes an original contribution to the open innovation and innovation diffusion literature by linking, in a conceptual model, three antecedents of the diffusion of a new technology that previous literature has considered only separately: the regime under which the technology is released (OS vs CP), the contingencies related to the characteristics of the technology and to the network of its adopters, and the resulting barriers to adoption.

Details

Management Decision, vol. 56 no. 4
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 7 November 2016

Aswin Wibisurya, San Karya and Eileen Heriyanni

The purpose of this paper is to develop and evaluate a mobile application to facilitate stocktaking in libraries implementing radio frequency identification. The case of Bina…

Abstract

Purpose

The purpose of this paper is to develop and evaluate a mobile application to facilitate stocktaking in libraries implementing radio frequency identification. The case of Bina Nusantara University’s library is used in this study. In this kind of library, near field communication (NFC) tags are placed in the book for getting book information, borrowing or returning and theft prevention, so the application. Stocktaking is an important process to be performed periodically to monitor and maintain the quality of collections and to make these collections easily accessible for library users. However, stocktaking in libraries takes too much effort and needs to be more efficient.

Design/methodology/approach

The design of the mobile application using entity relationship diagram (ERD) includes a diagram and flowchart. An evaluation is done by comparing the stocktaking effort of the latest semester and the previous semester. In the latest semester, the stocktaking is done by a hybrid of the proposed mobile application and a legacy desktop application, whereas the stocktaking of the previous semester is done only using the legacy desktop application.

Findings

Evaluation of the usage of this mobile stocktaking application is 43 per cent more efficient compared to an older desktop application.

Originality/value

The authors report the development of Android-based mobile stocktaking application by using Android’s NFC feature and evaluate it in a real environment.

Details

Library Hi Tech News, vol. 33 no. 10
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 23 November 2012

Huber Flores, Satish Narayana Srirama and Carlos Paniagua

Cloud computing becomes mobile when a mobile device tries to access the shared pool of computing resources provided by the cloud, on demand. Mobile applications may enrich their…

2180

Abstract

Purpose

Cloud computing becomes mobile when a mobile device tries to access the shared pool of computing resources provided by the cloud, on demand. Mobile applications may enrich their functionality by delegating heavy tasks to the clouds as the remote processing and storage have become possible by adding asynchronous behavior in the communication. However, developing mobile cloud applications involves working with services and APIs from different cloud vendors, which mostly are not interoperable across clouds. Moreover, by adding asynchronicity, mobile applications must rely on push mechanisms which are considered to be moderately reliable, and thus not recommended in scenarios that require high scalability and quality of service (QoS). To counter these problems, and the purpose of this paper, is to design a middleware framework, Mobile Cloud Middleware (MCM), which handles the interoperability issues and eases the use of process‐intensive services from smartphones by extending the concept of mobile host.

Design/methodology/approach

MCM is developed as an intermediary between the mobile and the cloud, which hides the complexity of dealing with multiple cloud services from mobiles. Several applications are presented to show the benefits of mobiles going cloud‐aware. Moreover, to verify the scalability of MCM, load tests are performed on the hybrid cloud resources using well known load balancing mechanisms like HAProxy and Tsung.

Findings

From the study it was found that it is possible to handle hybrid cloud services from mobiles by using MCM. The analysis demonstrated that the MCM shows reasonable performance levels of interaction with the user, thus validating the proof of concept. Moreover, MCM decreases the effort in developing mobile cloud applications and helps in keeping soft‐real time responses by using its asynchronous approach.

Originality/value

MCM fosters the utilization of different types of cloud services rather than the traditional mobile cloud services based on data synchronization. By offloading heavy tasks to the clouds, the framework extends the processing power and storage space capabilities of the constrained smart phones. The applications mentioned in the paper bring an added value by being success stories for mobile cloud computing domain in general.

Details

International Journal of Pervasive Computing and Communications, vol. 8 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 7 April 2015

Wolfgang Narzt

This paper aims to develop generic strategies for improving energy consumption for location sensing on smartphones and compares the results of iOS and Android implementations…

Abstract

Purpose

This paper aims to develop generic strategies for improving energy consumption for location sensing on smartphones and compares the results of iOS and Android implementations. Mobile smartphone applications utilizing localization sensors (e.g. Global Positioning System) collectively face the problem of battery draining. Energy consumption is at a peak when applications permanently and stolidly use those sensors, even if their excessive exploitation is avoidable (e.g. when the user carrying the device is not moving).

Design/methodology/approach

Considering contextual parameters affecting localization of mobile devices (i.e. incorporating movement probability, speed, etc.) is the basic idea for developing a strategy capable of reducing energy consumption for location determination on mobile devices. This paper explains the paradigm and draws the architecture for a generic context-based energy saving strategy for mobile location-based services.

Findings

The paper reveals the positive implications in terms of energy consumption measured in the course of exhaustive tests for iOS and Android devices and discusses accuracy issues and potential workarounds, especially focusing on Apple’s M7 motion co-processor for consuming accelerometer data on a low energy level.

Originality/value

The paper identifies and measures energy issues for location determination on smartphones and presents a generic and heuristic concept for saving energy.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 12 February 2021

Pooja Sarin, Arpan Kumar Kar and Vigneswara P. Ilavarasan

The Web 3.0 has been hugely enabled by smartphones and new generation mobile applications. With the growing adoption of smartphones, the use of mobile applications has grown…

Abstract

Purpose

The Web 3.0 has been hugely enabled by smartphones and new generation mobile applications. With the growing adoption of smartphones, the use of mobile applications has grown exponentially and so has the development of mobile applications. This study is an attempt to understand the issues and challenges faced in the mobile applications domain using discussions made on Twitter based on mining of user generated content.

Design/methodology/approach

The study uses 89,908 unique tweets to understand the nature of the discussions. These tweets are analyzed using descriptive, content and network analysis. Further using transaction cost economics, the findings are reviewed to develop practice insights about the ecosystem.

Findings

Findings indicate that the discussions are mostly skewed toward a positive polarity and positive user experiences. The tweeters are predominantly application developers who are interacting more with marketers and less with individual users.

Research limitations/implications

Most of these applications are for individual use (B2C) and not for enterprise usage. There are very few individual users who contribute to these discussions. The predominant users are application reviewers or bloggers of review websites who use the recently developed applications and discuss their thoughts on the same.

Practical implications

The results may be useful in varied domains which are planning to expand their reach to a larger audience using mobile applications and for marketers who primarily focus on promotional content.

Social implications

The domain of mobile applications on social media is still restricted to promotions and digital marketing and may solely be used for the purpose of link building by application developers. As such, the discussions could provide inputs towards mobile phone manufacturers and ecosystem providers on what are the real issues these communities are facing while developing these applications.

Originality/value

The study uses mixed research methodology for mining experiences in the domain of mobile application developers using social media analytics and transaction cost economics. The discussion on the findings provides inputs for policy-making and possible intervention areas.

Details

Journal of Advances in Management Research, vol. 18 no. 4
Type: Research Article
ISSN: 0972-7981

Keywords

Article
Publication date: 15 January 2019

Spyros E. Polykalas and George N. Prezerakos

Mobile devices (smartphones, tables etc.) have become the de facto means of accessing the internet. While traditional Web browsing is still quite popular, significant interaction…

2838

Abstract

Purpose

Mobile devices (smartphones, tables etc.) have become the de facto means of accessing the internet. While traditional Web browsing is still quite popular, significant interaction takes place via native mobile apps that can be downloaded either freely or at a cost. This has opened the door to a number of issues related to privacy protection since the smartphone stores and processes personal data. The purpose of this paper is to examine the extent of access to personal data, required by the most popular mobile apps available in Google Play store. In addition, it is examined whether the relevant procedure is in accordance with the provisions of the new EU Regulation.

Design/methodology/approach

The paper examines more than a thousand mobile apps, available from the Google Play store, with respect to the extent of the requests for access to personal data. In particular, for each available category in Google Play store, the most popular mobile apps have been examined both for free and paid apps. In addition, the permissions required by free and paid mobile apps are compared. Furthermore, a correlation analysis is carried out aiming to reveal any correlation between the extent of required access to personal data and the popularity and the rating of each mobile app.

Findings

The findings of this paper suggest that the majority of examined mobile apps require access to personal data to a high extent. In addition, it is found that free mobile apps request access to personal data in a higher extent compared to the relevant requests by paid apps, which indicates strongly that the business model of free mobile apps is based on personal data exploitation. The most popular types of access permissions are revealed for both free and paid apps. In addition, important questions are raised in relation to user awareness and behavior, data minimization and purpose limitation for free and paid mobile apps.

Originality/value

In this study, the process and the extent of access to personal data through mobile apps are analyzed. Although several studies analyzed relevant issues in the past, the originality of this research is mainly based on the following facts: first, this work took into account the recent Regulation of the EU in relation to personal data (GDPR); second, the authors analyzed a high number of the most popular mobile apps (more than a thousand); and third, the authors compare and analyze the different approaches followed between free and paid mobile apps.

Details

Digital Policy, Regulation and Governance, vol. 21 no. 2
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 1 January 2016

Danijela Boberic Krsticev, Danijela Tešendic and Binay Kumar Verma

This paper aims to discuss the possibilities of using a mobile application in the process of conducting an inventory of library collection and present an application for the same…

1032

Abstract

Purpose

This paper aims to discuss the possibilities of using a mobile application in the process of conducting an inventory of library collection and present an application for the same. The application scans barcode labels on books and retrieves data about those books. Data regarding the status and call number of each book can be changed using this application.

Design/methodology/approach

This paper is based on a case study of developing an application for the Android platform, and this application is part of the BISIS library management system.

Findings

By analysing the procedure of conducting an inventory in the library of the Faculty of Science, University of Novi Sad, it is concluded that this procedure is tedious and can be simplified. To make this procedure more efficient, a mobile application enabling search and update of bibliographic records has been developed. That application communicates with the BISIS library management system using a specially designed service.

Practical implications

By introducing this application at the libraries, the process of inventory of a library collection can be simplified, the time needed for the inventory will be shorter and the inventory will require less physical effort.

Originality/value

The application is designed to help librarians during the process of inventory of library collections. During this process, librarians have to check status of every item on the shelves and to update catalogue with new information. This application enables mobility of librarians and updates information about items during checking the shelves.

Details

The Electronic Library, vol. 34 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

1 – 10 of over 1000