Introduction:-MobileTechnology is a growing field converging mobile computing with telecommunications in a wireless environment that has become more robust in its own right. This convergence of mobile communications enables an organization and its individual workforce to become more flexible in communication as well as work structure. Mobiletechnology is enabling an organization to work together or separately on a global basis while maintaining its collaborative information sharing capabilities. This allows for a near-seamless work environment to maintain its operational tempo as a work force is dispersed temporarily or on a permanent basis globally. With the evolution of faster, more robust mobile technologies, organizations and the workforce are breaking out of the traditional work environment and moving into the global community allowing them to be continually tied into the virtual office. This thesis is intended to show how mobiletechnology has reshaped the strategic vision of an organization and has affected society on a global scale.
2 development of mobiletechnology; however over the last eight years there has been a mounting corpus of research focusing on the social and technical aspects and the business benefit of mobiletechnology. One of the major streams of research has focused on the perception, acceptance and adoption of mobiletechnology. A particular theme relates to the dual function of mobiletechnology as both serving organisation-sanctioned and personal motives (Wiredu, 2007), with each context leading to different perceptions of user satisfaction (Scheepers et al., 2006). There is also better understanding of how users perceive their mobile devices and the utilitarian and social values patterning the decision to adopt amongst individual users (Kim & Han, 2009). It was noted that the perception of the smartphone changed noticeably over time from a coveted device, to simply a tool of habitual use (Bødker et al., 2014). Similarly, research has shown the value and user-empowerment of mobile devices going beyond the traditional deterministic paradigm (Jung, 2013). For adoption of specific activities such as banking, the perceptions of users vary with risk, opportunism, reputation and assurance being important roles (Srivastava, 2010); while for mobile commerce activities, culture in the form of trust, navigational structure and visual appeal are important influences (Vance et al., 2008). This suggests that it is important to disaggregate activities (banking, commerce, social networking etc.) and contexts (work, personal) as the issues and affordances of mobiletechnology are varied and each requires a specific line of inquiry. The academic research has also addressed this as an important theme in the context of work-life balance (Duxbury & Smart, 2011), where mobiletechnology has been shown to allow flexibility, whilst leaving employees feeling bound to work (Middleton & Cukier, 2006).
Corporate governance consists of the policies and procedures according to which the board directs and controls an enterprise in order to meet its strategic objectives. An effective structure of governance incorporates responsibility, accountability, fairness and transparency into these policies and procedures (IODSA, 2009). Corporate governance systems need to keep evolving according to changes in business environments. The King Code for Governance in South Africa (King III) recognises IT developments as initiating fundamental business transformations and it has gained prominence in a South African context. Due to the pervasive nature of IT, good governance cannot be achieved without appropriately governing IT. The objectives of IT governance is alignment between IT and business strategies, value delivery, risk management, resource optimisation, assignment of accountability and responsibility as well as performance monitoring (SAICA, 2010; Webb, Pollard & Ridley, 2006; ITGI, 2003). Enterprises deploying mobile solutions need to consider the effect that mobiletechnology will have on the achievement of their IT governance objectives. A specifically challenging area in the governance of mobiletechnology is IT risk management as the technology is pervasive and introduces new risks in all business processes.
Android MobileTechnology refers to the third generation of mobiletechnology and it enables increased data handling rates and high speed bandwidth. Also global roaming is seamless in a 3G network. Due to this technology Android Mobile phones offer new features such as video conference calling, Video streaming, video walls and enhanced web browsing capabilities. Older technology designed to carry voice but not data. So this feature of providing converged voice and data services makes Android Mobile Networks unique. The main characteristics of Android Mobile are: Multi-media services with streaming audio and video, E-mail with full fledged attachments such as PowerPoint files, Instant messaging with video/audio clips, Fast downloads of large files such as faxes and PowerPoint files.
Mobiletechnology is being used everywhere and by large numbers of people in everyday communication. Many individuals with disabilities are also using these mainstream devices in place of dedicated “high tech” AAC devices. This includes individuals with autism spectrum disorder (ASD), intellectual and developmental disabilities (IDD), brain injury, cerebral palsy, and by older adults, etc.
Abstract: The ubiquity of mobiletechnology offers the potential for instantaneous and two-way transfer of information, as well as the potential for improving medical care delivery and extend- ing it to those in countries and regions with a less developed medical infrastructure. This review considers the role of mobile health (mHealth) technology in managing hemophilia. This is a disease area in which good record-keeping is an essential component of home-based hemophilia care. Health care professionals contribute patients’ data to national registries and databases and frequently interrogate those data for commercial and academic purposes. Only rarely are the data used to directly improve the care of the individual patient. Patient-focused apps designed to respond to an individual’s personal data may offer the potential to empower patients to live healthier lifestyles, reinforcing the care provided by health care professionals and offering a mechanism for peer-support and promoting adherence to an individualized management plan. Keywords: mHealth, hemophilia, peer-support, adherence
Abstract— Wireless mobiletechnology has revolutionized the way people communicate with each other the hindrance that was caused to the communicating parties due to distance has become obsolete a mobile phone has become an integral part of our day to day work the present day mobile phones that we use have come a long way since the inception of mobile telephone service introduced in USA in 1940s the evolutionary process of wireless mobiletechnology is broadly classified into generations (0G, 2G, 3G, 4G) where G stands for generation with 0G being the initial phase and 4G which is in use currently 0G refers to pre cell phone telephone technology the concept of “cell” was introduced in 1G present day mobile phones are capable of text, voice and video data transfer work is underway on development of 5G mobiletechnology it will have features of World Wide Wireless Web(WWWW), Dynamic Adhoc wireless network(DAWN) it will have much higher speed, better connectivity, high capacity and high error tolerance right now the term 5G is not officially used.
In the case of SOCO, where the usage of data is high and thus the de-contextualization modality is high, there is a need for added intermediaries that will solve contextual problems that cannot be handled by the system. For instance, the short term improvement of SOCO work, as de- manded by SOCO themselves, would be to em- ploy an expert administrator that could assist in doing the administrative work of documenting the findings in the system and also help coor- dinate jobs between individual SOCOs. In the long term, there is a need for the introduction of mobiletechnology that will minimize the repli- cation of information and that, at the same time, does not get in the context of interaction. As an example, Tablet PCs were mentioned as a means for supporting the recording of informa- tion, with the additional requirement of a rug- gerised version since fingerprints primarily are lifted using aluminum powder, which is highly destructive to computer technology. Further- more, CSO demanded a good filtering of in- formation, in that they have very little time to react to it when engaged with an incident. If mobile devices are used for a support function
Abstract — As mobiletechnology is rapidly expanding in many areas, there is a high demand from industry for graduates with mobile development skills. Graduates, who are entering the mobile development world, need to understand how the characteristics of mobile devices and applications affect decisions about software design and be able to select and use appropriate standards, APIs and toolkits to build mobile applications. In view of that, an electronic decision matrix based on Pugh method to be used as one of the learning tool in mobile development course is introduced. The electronic matrix is designed and developed to assist mobile application developers especially the novice, to choose the methodology that suits the requirements of their mobile development projects. Detail descriptions of how the electronic matrix can be used in facilitating the learning process of mobile development are described in this paper.
Heinrich (2012) also points out the importance of the tools or apps that a device uses that support learning – as Mehuish and Falloon (2010) suggest, it is important to consider the design of these apps and whether the interactions they promote are grounded in learning theory rather than “focusing solely on content, engagement or “edutainment”.” It may also be that two different teachers choose to use the same app in a completely different way in order to support learning. Considering a range of different devices as part of this study means that different schools, or even pupils within a school, may not have common experiences, hence the study will aim to consider generic mobiletechnology pedagogies rather than app-specific pedagogies.
high-bandwidth using their phones. 5G pushed over a VOIP- enabled device, people experience a level of call volume and data transmission that they never experienced before. 5G technology offer services in product engineering, documentation, supporting electronic transactions (e- payments, e-transactions), etc. Today people have mobile phone with more advanced features and the mobiletechnology become more aware for customers, and the customers look for the advanced options. The paper develops around 5G (Fifth Generation), a mobile network concept which is viewed as user centric concept rather than operator-centric as in 3G or service-centric concept as observed for 4G. Now-a-days the mobile user is on the top of all. The 5G terminals have Software characterized radios and modulation scheme and also error-control schemes can be downloaded from the Internet on the run. The 5G mobile development is seen on the user terminals as a focus of the mobile networks.
smartphone replaced the basic handset we had been using whilst roving, and we expected that, it in addition to keeping Advisors in touch with other staff, it would also allow us to search the internet and access the OPAC etc. so enabling us to deal with additional complex enquiries into the bargain. After obtaining the handset, setting up the trial plans and a short period of staff familliarisation with the device we boldly stepped out onto the floors of the library on March 1st 2010, ready to rove with our new mobiletechnology in hand.
Abstract: 5G Technology stands for fifth Generation Mobiletechnology. From generation 1G to 2.5G and from 3G to 5G this world of telecommunication has seen a number of improvements along with improved performance with every passing day. This fast revolution in mobile computing changes our day to day life that is way we work, interact, learn etc. This paper also focuses on all preceding generations of mobile communication along with fifth generation technology. Fifth generation network provide affordable broadband wireless connectivity (very high speed). The paper throws light on network architecture of fifth generation technology. Currently 5G term is not officially used. In fifth generation researches are being made on development of World Wide Wireless Web (WWWW), Dynamic Adhoc Wireless Networks (DAWN) and Real Wireless World. Fifth generation focus on (Voice Over IP) VOIP-enabled devices that user will experience a high level of call volume and data transmission. Fifth generation technology will fulfill all the requirements of customers who always want advanced features in cellular phones. The main features in 5G mobile network is that user can simultaneously connect to the multiple wireless technologies and can switch between them. This forthcoming mobiletechnology will support IPv6 and flat IP. Fifth generation technology will offer the services like Documentation, supporting electronic transactions (e-Payments, e-transactions) etc.
Abstract- Mobile devices have penetrated most aspects of our daily life activities ranging from the hedonic to utilitarian use. Businesses have invested in benefiting from the opportunities offered by the pervasive nature of mobile technologies to enhance their products and services and therefore improve their customers’ satisfaction. The banking sector, in common with other industries, has invested in such mobile solutions to facilitate banking transactions for both themselves and their customers. The growth of mobile banking provides significant benefits in terms of delivery speed and quality of services to customers. However, like other technologies mobile banking faces several challenges, in particular security. This paper addresses the main factors that affect the usage of mobile banking transactions and the related security issues, with a particular emphasis on the case of the Iranian banking system. After a thematic analysis of qualitative data we were able to identify the main factors that affect both mobile banking security and usage, namely: security level, security threats, security policy and standards, transactional risks and awareness. As a result, this study proposes a framework that explains the relations among these factors with a view to enhance the understanding of the current status of such technology.
Unemployment remains a major challenge in Kenya. World Bank data 1 shows that Kenya’s unemployment rate has increased from 10.2% in 1991 to 11.5% in 2015 com- pared to the global unemployment rate which has fallen from 5.6% in 1991 to 5.4% in 2015. This shows that the trend in unemployment in Kenya is at variance with the glo- bal trend. In addition, there are demographic and geographical disparities; the inci- dence of unemployment is higher among women, the youth, and in urban areas (Vuluku, Wambugu, & Moyi, 2013). High levels of unemployment have been associ- ated with the increasing size of the informal sector, which accounts for two thirds of total employment (KNBS, 2018). Recent strategies of understanding how to address unemployment include examining how mobile technologies can be harnessed to pro- mote self-employment 2 in developing countries (Aker & Mbiti, 2010). This is because mobile technologies provide opportunities that enable the user to either start a busi- ness or run one (Bhavnani, Won-Wai, Janakiram, & Silarszky, 2008).
Amid the last few years, there is a progressive improvement in the field of Mobile Computing and Mobile Cloud Computing has been acquainted with be a potential innovation for Mobile Services. Also, the cell phones and their applications have high system in the service ever had, and created quickly. Once more, Mobile Cloud Computing is relied upon to produce fundamentally more creative with multi applications. Additionally, Mobile processing includes mobile hardware, mobile communication and cell programming, and right now there are numerous portable cloud applications, for example, Gmail for iPhone, Cisco’s web EX on the iPad , video playback , image editing , email access and so on. These applications are utilizing the product as an service model. Then again, this paper has clarified the Mobile Cloud Computing by a chose MCC construction modeling. Furthermore demonstrates the answer for a percentage of the issues like Process Power or Data Storage Capacity, Reliability and Battery Life. Besides, this article additionally gives the bearing for the further research.
Abstract: 5G wireless network technologies is one of the most important leading technologies in mobile telecommunications standards beyond the 4G/IMT- Advanced standards. The generations From 1G to 5G the world has seen a lot of technology developments including improved performance and constant growth with day to day. This paper is about preceding generation technology. 5g technology services like Documentation, supporting electronic transactions and etc. In 5G researches are being made on the improvement of World Wide Wireless Web (WWWW).5g technology offers a many features, which are beneficial for all groups of people. It has some disadvantages like a radio signal problems.
Beside mobile payment another large segment capable for NFC applications is mobile ticketing. In certain cases, both mobile ticketing and payment could even be combined into powerful and innovative appliances with great usability. Mostly in the field of public transport, extensive RFID infrastructure for ticketing and access control is already in use. The advantage of such systems essentially is to get rid of buying paper-based tickets at retail shops or ticket vendor machines. Instead, a RFID compatible smartcard is used to check the ticket validity and to debit the appropriate ticket price for each journey.
Mobile provides employees with the opportunity to connect from any location. However, this doesn’t happen without dedicating IT budget resources. Selecting the appropriate processes and applications to mobile-enable is a critical element of any enterprise mobility strategy, but it is not the only element. A business must understand how processes should be changed to enable remote work. IT needs a comprehensive infrastructure and management plan that supports cellular and WLAN data networks. An IT strategy should also include several other key areas such as a corporate data security plan, a device and application management strategy, and a plan for mobile-enabling applications. Mobile-enabling applications should be also based on what workflows can benefit from the mobile access.