Initial post 1:
With digital marketing strategies in place, social media in many organizations play a significant
role in determining whether customers are interested in the product or are interested in reviewing
any product or similar products from any retail stores. The suggestions pop up on social media
according to the customer's interest. This not only boosts the product's interest in the customer but
also suggests similar products. Digital marketing users always ensure that email is up and running
all the time. Most of the time, customers think of email as innocuous, riskless, and non-spam.
Thus, the offers that they receive are made sure valid and indeed being targeted to the right
audience (Carlin, 2018).
Critical social media concerns in business:
There are several critical issues with social media in business: confidentiality, data
integrity, deception, and security. There is much personal information on a social media platform,
which constitutes these issues. The information is not intentionally shared by customers for which
they are not aware of the aftereffects. It is essential to train their employees on whether to share
the confidential information, what can be treated safely, and what must not be shared should be
trained to the key employees. It is essential to not infringing on customer's privacy. Especially in
the medical field, the personal information is very private and must not be shared with any
individual without a declaration (Stoychev, 2020). Recognizing potential legal risks in the business
is critical to be successful. Since not all social media platforms are the same, every platform as its
language and terms and conditions. When the personal information is taken away by the wrong
individual, it becomes riskier and concerning to the individual.
To efficiently handle these concerns in the most effective way, there must be some policies
and best practices put into place. When a customer agrees to terms and conditions, one must pay
full attention to what they are signing on (Stoychev, 2020). To achieve success in these businesses,
the loopholes in social media, i.e., privacy policies, need to be revised and understood by every
customer that signs up to the social media platform.
Typically, these concerns arise from the ubiquitous presence of social media in people's
lives. Every customer leaves data trial behind on social media such as name, birth date, geographic
location, and personal interests. Also, companies collect data on user behaviors: when, where, and
how users interact with their platform. All this data is stored and leveraged by companies to target
advertising to their users better. Sometimes, companies share users' data with third-party entities,
often without users' knowledge or consent (Opresnik, 2018).
Initial post 2:
Social media risks need to be accurately identified across categories such as reputation, intellectual
property, fraud prevention, and business disruption. Risk identification builds upon the guidance
set forth. To identify risks correctly requires knowing what the company's risk tolerance levels are
for different activities. It means being familiar with policies to understand broadly what the
company's attitudes are. Moreover, it means understanding roles and accountabilities to bring the
right people together to define risks accurately.
Part of risk identification is identifying business opportunities. For example, given your
institution's known social media risk strengths and weaknesses, what could be done in the way of
new products, services, product development partnerships, and so forth. What are the opportunities
to cut costs or reach customers in new ways? After all, risk management is not about suppressing
profit-generating activities but rather about appropriately directing those activities.
Since an ever-increasing part of the population uses social media in their day-to-day lives,
social media data is being analyzed in many different disciplines. The social media analytics
process involves four distinct steps, data discovery, collection, preparation, and analysis. While
there is a great deal of literature on the challenges and difficulties involving specific data analysis
methods, there is hardly research on the stages of data discovery, collection, and preparation. To
address this gap, we conducted an extended and structured literature analysis through which we
identified challenges addressed and solutions proposed. The literature search revealed that the
volume of data was most often cited as a challenge by researchers.
The growth of social media usage opens up new opportunities for analyzing several aspects
of, and patterns in communication. For example, social media data can be analyzed to gain insights
into issues, trends, influential actors, and other information. Golder and Macy (2011) analyzed
Twitter data to study how people's mood changes with day, weekday, and season. In the field of
Information Systems (I.S.), social media data is used to study questions such as the influence of
network position on information diffusion.
Initial post 3:
Aerospace's name signifies a terrific combination of two of the most attractive terms – Aeronautics
and Spaceflight. The industry mostly deals with commercial and fighter planes. The aerospace
industry consists of the examination, advancement, and production of flight vehicles, including
unpowered, lightweight planes and sailplanes, lighter and more substantial than aircraft, rockets,
space vehicles, and numerous other vehicles.
Technological advance is the reason for intensity and rapid progression in the airplane
business. The business is, subsequently, a world pioneer in propelling science and technological
innovation. Aviation systems have the highest and most sophisticated and advanced products that
require a high level of skillset with detailed flawless analysis. It has become one of the most
prominent status symbols for any country to venture into the Aerospace industry.
Business Problem of Boeing:
When it comes to the Aerospace industry, the Boeing name will inevitably pop up in the
discussion, or else it will be an incomplete one. Such is the brand reputation of Boeing. It is
consistently one of the top 50 companies in the Fortune 500 list, and revenue generation is close
to a staggering $100 billion.
Boeing continually monitors the data of flights' components and rigorously maintains a
detailed log, which is popularly known as Aircraft Readiness Log (ARL) at the time of
conveyance, as a detailed document. A flying machine to be operative for a long span of thirty
years, strict setup administration of components is essential, but as it was more of a labor-intensive
job which previously done by manual intervention, it consumed a lot of time and resources, which
became a cost burden for the organization.
Communication may be regulated with the aid of mistreatment a moment digital messaging
system. Via doing so, assaults are prevented through man or woman. The hijacking of knowledge
is prevented, and the outpouring of understanding will be reduced. Access gaining by using the
high hackers to the vital records is completed through the high-level job officers' place. This needs
to be stopped with the aid of introducing unified communication. Document switch ought to be
regulated via the immediately electronic messaging system. Specifications of any sensitive
installations ought to now not be transferred at the same time as no longer entirely securing the
safety environment (Anthony, 2017).
Content filtering strategies ought to be the network that is scanned for the presence of any
spyware. The presence of encoding and cryptography methods throughout a couple of tiers and
sign analysis should be in a role to contour the media. The standards of encryption ought to be
high, therefore, as to deter any strengthened tax of hacking. VIP systems are prone to stealing of
Firewall safety. Sniffers have to be avoided by shaping the packets of the data in such a few ways,
consequently assuring their detection. The efficient machine ought to be in a function to increase
the nonmetallic layer within the unified communique. Sports of suspicious nature should be
created entire priority for network protocol security (Ralf, 2010).
The assets of Boeing had been substantially increasing across us. This may be worn-out
such in some way that the strategic power of the employer depends on; however, the
communication networks square measure evolved, relying upon compliance to the regulative
organizations. The chief generation officer needs to be commercial enterprise literate therefore as
to provide intensive competencies to the I.T. infrastructure and at an identical time ensuring that
there is much less kind of security vulnerabilities. The course of communications belongings are
used should be consummated in such a few ways that the combination of VoIP occurs without
delay. This will cut returned the monetary fee of maintaining enormous infrastructure (Karnati,
2012).
Initial post 4:
Social media has become colossally over the previous decade. The development of stages like
Instagram, Twitter, Facebook, and LinkedIn has seen support from the individuals. Organizations
have needed to learn better approaches for utilizing online life to fill their need. In advertising and
client support, web-based social networking has been a helpful instrument for practically all
organizations. In any case, organizations have addressed the cost at whatever point they
misconstrued Social media and abused it. This paper shows the worries raised when an
organization utilizes Social media and how these worries can be amended.
Issues and Resolution
Amazon is an organization that utilizes broad Social media applications for a significant portion
of its administrations. This incorporates client assistance on its Instagram and twitter handle.
Amazon administrations incorporate web-based shopping and other retail benefits (Luo et al.,
2013). Primary worries for amazon would be the uncover of classified data using online life.
Customers endow associations like Amazon with carefully private data (Aral, Dellarocas and
Godea, 2013; Luo, Zhang and Duan, 2013; Rishika et al., 2013). The organization will
undoubtedly guarantee that this data is a mystery.
Primary online networking worries in business:
There are a few fundamental issues with online networking in business: classification
information, respectability, misdirection, and security. There is so much close to home data via the
web-based networking media stage, which comprises these issues. The data is not purposefully
shared by clients for which they do not know about the delayed consequences. It is fundamental
to prepare their workers to share the classified data, what can be dealt with safely, and what must
not be shared ought to be prepared to the principal representatives. It is imperative to not
encroaching on the client's protection. Particularly in the clinical field, the individual data is private
and must not be shared with any person without an affirmation (Stoychev, 2020). Perceiving
legitimate likely dangers in the business is necessary to be fruitful. Since not every single social
medium stage are the equivalent, each stage as its language and terms and conditions. At the point
when an inappropriate individual removes the individual data, it turns out to be increasingly more
hazardous and worried about the person.
To deal with these worries productively in the best way, there must be a few strategies and
best practices set up. When a client is consenting to terms and conditions, one must consider what
they are marking on (Stoychev, 2020). To make progress in these organizations, the escape clauses
in Social media, i.e., protection strategies, should be amended and comprehended by each client
that signs up to the online life stage.
Initial post 5:
Unstructured data is, at times, often overlooked by sources of insights that can help different kinds
of organizations to make better decisions. This said, the technology is currently emerging and can
help one make sense of all the unstructured data around us. This can be mostly on social sites
concerning our weekly discussion. Examples may include Face book, Instagram posts, call logs,
and interview transcripts. It is, however, essential to understanding what unstructured data is
related to social sites (Castellanos, Arturo & Castillo, Alfred & Lukyanenko, Roman & Tremblay,
Monica, 2017).
By definition, unstructured data can be described as a type of data that is not so easily
searched i.e., compared to structured data. However, this means that more processing is required
as it is not organized or set out in neat fields. There exist different examples of unstructured data.
Example of sources that can give you unstructured data includes;
•
Social Media posts.
•
Photographs.
•
Call logs from customer service conversations.
•
Open-ended questionnaires.
•
Audio recordings.
•
Unstructured data risks for Nectar Inc. Company
Nectar Inc. The company is based in the United States of America in New York City. The
company deals with selling of Electronic products in all states of U.S. Nectar Inc. The company
has almost dominated the market share due to its excellent products. Having seen the company's
well-being, I thought to research the company to understand what the company is doing differently
to achieve all this market share. Having engaged the Company I.T. department, I came to learn
that Nectar Inc. The company is significantly using Facebook to help it in marketing its products.
Therefore, I found the company appropriate to help me discuss the risks Companies are facing
over unstructured data—some of the concerns that I found included.
•
Using unstructured data, it is hard to analyze due to specialist software. At times it even
requires training for different data types.
•
It is, at times, difficult to entirely rely on unstructured data since it never gives the whole
picture.
•
Unstructured data is very cumbersome and often more significant. This makes it not to
apply to everyone, as not everyone will grasp using it efficiently.
•
How to address the above risk concerns
With the rapid growth in technology, social media usage becomes of concern as everyone
uses it daily. This has been through conducting businesses such as marketing products, selling
products, and even interacting with one another. However, there are risks concerns associated with
the use of unstructured data on social sites. Moreover, researchers have tried to come up with ways
to provide solutions to these concerns. These solutions include (Powell 2017).
•
It was deciding clearly on the data sources for one's business enterprise. This will help
collect relevant information regarding one's business.
•
Managing your unstructured data search in a well and organized manner.
•
We are eliminating all the useless data.
•
Make the right decision concerning technology for data stack and storage.
Initial post 6:
Some several issues and concerns arise because of the use of unstructured data. The use of social
media in organizations involves the collection of different types of data. There are three types of
data collected (Arnaboldi et al. 2017). The first is structural data, which is made up of clearly
defined data, and that contains an easily searchable pattern. The second is unstructured data
composed of formats such as videos, audios, and text documents from social media. There are
several concerns associated with using unstructured data in scenarios when there is the use of
social media.
The first concern arises because of the increase in the cost of storing the unstructured data.
Organizations require numerous resources to ensure that the information is stored efficiently. The
other concern arises when there are a decrease and lack of practical insight into the unstructured
data. The lack of insight leads to a reduction of the information that the organization obtains from
the data (Wang et al. 2018). It, therefore, decreases the success of the organization. The lack of
insight into the dark information predisposes the organization to face different types of liabilities.
The first liability likely faced is the legal liability because of the lawsuits they may get
subjected to. The second type of liability is a financial liability. The organization needs significant
finances to subject the data to analysis effectively. The following are some of the ways by which
the concerns get handled. First, the establishment and development of sophisticated technologies
capable of efficiently handling the information are critical. The infrastructure helps to convert the
unstructured data to structured data helping increase its analysis.
Initial post 7:
Companies can share information through social media, and they have to share with researchers
or customers as long as the information is shared in the context of the underlying activity, and with
the corresponding consent. Social media companies should also address cyberbullying from other
companies, regulators, and experts to avoid any pitfalls in responsible disclosure (Sivarajah, Irani,
Gupta, &Mahroof, 2020). Data from social media platforms like Twitter, Facebook, Google, and
Pinterest. Are not hosted by the government (Sivarajah et al., 2020).
Social Media usage: People need their daily dose of entertainment about movies, news, and
smartphones can provide access to streaming videos, music, and create their videos. It caters to
people's productivity as well as leisure needs. The utility and convenience of smartphones and
tablets are why their demand has grown daily (Elswah & Howard, 2020).
Social media sites such as Facebook, Instagram, Twitter, and messengers like WhatsApp
and Skype have been the constant reason children and teenagers stick to their mobiles. Their lives
outside these devices miss a lot of their social life by spending most of their time in digital devices.
As mentioned above, the positive impacts provide communication in times of crisis, providing
various services, monitoring health, saving lives, dietary suggestions, emergency calls, providing
latest updates on world events, and improving knowledge. With these increasing mobile devices,
there is much information generated, and this should be monitored and protected (Sivarajah et al.,
2020).
Demographics: The millennials were born with technology. They are more tech-savvy than
the previous generation and spend more time using technology and the internet. The millennials,
including teenagers, use more technological devices, and the internet is an essential part of their
lives. They were born in the era of email and constituted the largest population on social media.
Facebook, Twitter, and YouTube are their favorite social media stops, and they cannot do without
spending some time on each of them daily (Elswah & Howard, 2020).
Initial post 8:
The telecommunications industry deals with large sets of data daily, both structured and
unstructured. Although the threats and risks that data faces remain equally distributed, companies
in the telecommunications industry are at a higher risk, especially when they share, use ad store
unstructured data. Unstructured data includes text messages, word processing documents, emails,
spreadsheets, and PDFs (Tamane, Solanki, & Dey, 2017). The data formats used in unstructured
data make it easy to quickly communicate the contents of files to intruders and unauthorized
persons. It is the ease with which intruders and unauthorized individuals can access unstructured
data files that make it a high-risk factor in the telecommunications industry. Unlike encrypted data,
word documents, text messages, and emails are written in plain text, allowing any individual to
bypass the security protocols and gain unauthorized access.
It is also important to note that most companies, in the telecommunications industry or
otherwise, use unstructured data for most of their official communication. The unstructured data
predisposes the companies to hackling and other forms of cyber-crimes that maximize human error
and ease of security protocols. The best and most effective way to prevent the security issues
brought about by unstructured data is cryptography. Instead of storing ad sharing data in plain text,
cryptography uses different encryption methodologies to scramble and conceal the meaning of
messages, making it difficult for unauthorized individuals to decide the files, even when
unauthorized access is gained (Tamane, Solanki & Dey, 2017). Additionally, the use of a multiplefactor authentication system provides a multi-layered approach to access controls, making it
difficult for unauthorized individuals to access organizational data files. The use of secure firewalls
and intrusion detection systems also works well to reduce unauthorized access.
Instructions:
•
Need a minimum of 200 words for each response (Total 8 Responses)
•
Need a minimum of 2 APA References
•
In response, we need to follow:
o Ask a captivating, thoughtful question about the topic.
o Provide extensive additional information on the topic
o Explain, define, or analyze the topic in detail
o Share a relevant personal experience.
o Make an argument concerning the topic.
Initial Post 1:
The use of mobile devices is ubiquitous today. According to CTIA, over 326 million mobile units
were in use within the United States in December 2012. This is an extra than one hundred percent
penetration rate, in view that many customers have greater than one cell device, and utilization
continues to grow. Citizens of China, India, and the European Union (EU) have even higher
cellular cell phone utilization than these in the United States (Collins, 2015).
Developing Mobile Device Policies
Where do we start? Developing a comprehensive cellular method is vital before we craft
our cellular machine policies. We will want input from a range of stakeholders, and we will need
to recognize where mobile devices in our general science infrastructure and strategy. Here are
some excellent practices for developing our mobile system policies. (Ren, 2020)
Form a cross-functional mobility approach team: We will need the input of most important
stakeholder groups, such as IT, field commercial enterprise units, and human resources. Our
method development manner also faucet into the information of our threat management,
compliance, records management, and criminal departments. The purpose will be to balance risks
and advantages to enhance employee productivity and defend towards hazards while focusing on
the organization's goals and business goals.
Clarify dreams for our cellular strategy: Draw a direct line from our cellular commercial
enterprise wishes to our planned cellular guide strategy and infrastructure. Keep our enterprise
goals in thought and link them to the discussion.
Drill down into coverage requirement details: We may also want to survey other current mobile
gadget policies to inform our mobility method team. Those from peer businesses and rivals will
be most relevant. Then begin with the basics: which sorts of units and OS make sense for our
agency to support, what adjustments and trends are happening in the technological know-how
market-place, which touchy e-documents and statistics we caught to shield on cellular devices, and
what handy safety applied sciences we would possibly deploy. (John, 2019)
Budgeting and expense control: Is the business enterprise going to buy gadgets and pay all
mobile expenses via direct billing each month? What cost controls want to be in place. Or will cell
gadget use expenses be reimbursed by using a flat charge or via processing rate reports? What
about BYOD. Roaming cost limits. Decisions on the financial and fee manipulate components of
cell computing use should be made via our mobility coverage team, below the practice of a
government sponsor (Rawlins, 2015).
Initial Post 2:
Mobile Computing has several factors to increase its productivity, among which below are a few
essential reasons and factors that are increasing it. Mobile usage has increased drastically in recent
years. Mobile phones provide extensive customer experience allowing users to access feature-rich
applications on the go; cloud provides a robust, scalable, and reliable platform to host the data and
applications. Cloud, with its highly scalable and economic model, forms a useful backend for
mobile devices and apps for their anytime, anywhere access (Almaiah & Al-Khasawneh, 2020).
Powerful Devices and Network: The current generation of smartphones are equipped with dualcore processors, fast memory and storage, and surprisingly sharp displays. Another difference is
bandwidth. The mobile phones puttered along at 14.4 kilobits per second. Now, the Wi-Fi hotspots
abound, while fast 3G and even faster 4G enables mobile users to download lots of data and
graphics at breakneck speeds. They have come to value instant access to information for personal
use and expect the same for their work environment (Almaiah & Al-Khasawneh, 2020).
Availability of Pre-integrated Apps: Apps have played a significant role in the exponential
adoption of mobile in the consumer space. We have apps for everything from searching for nearby
restaurants to checking out the latest baseball scores and playing games. Apps are expected to play
a similar role in accelerating the use of mobile for the work environment. Many vendors of
enterprise systems are already pre-packaging mobile apps, downloadable from iTunes and other
market places, to enable their customer& mobile workforce to make decisions quickly (Vinh et al.,
2020).
Shift to Cloud Computing: Organizations are accessing business applications and business
intelligence software using SaaS (Software as a Service) model. Besides, more and more company
data are increasingly residing on a cloud. Most of these SaaS applications have web services APIs,
and most of the data on the cloud is consumed using web services. Unlike traditional systems,
SaaS applications and cloud-based data can be easily accessed using web services by mobile
platforms (Vinh, Cagnon, Bouzefrane, & Banerjee, 2020).
Initial Post 3:
Unstructured data within businesses is used to uncover new patterns, insights, relationship trends.
However, harboring this unstructured data holds much risk for the company that stores this data.
About 80 percent of the electronic information in the world exists as unstructured such as
photographs, videos, documents, emails. (Inmon, Linstedt, & Levins, 2019). All of this data is
'untidy' and high compliance risk for companies. Due to the increase in the number of intrusions,
companies are required by the authorities to make sure that their data complies with the set
standards and regulations. However, within all of this noise created by unstructured data, it would
be hard (Inmon, Linstedt, & Levins, 2019). Further, the vast nature of this business means that the
company storing it cannot guarantee the security of all the unstructured data; some will fall in the
hands of cybercriminals.
When a company fails to comply with the set regulations and standards about the
unstructured data it has stored about its clients and customers, it opens new grounds for penalties
and fines. These fines also result in hefty and lengthy litigation processes, leading to a damaged
company reputation, which is often hard to recover from. In the unstructured data, as mining
occurs, risk also grows (Inmon, Linstedt, & Levins, 2019). The reason is that with all this data, its
categorization could turn out to be expensive and time-consuming, and there is not a guarantee
that the resulting data will be meaningful. Further, some data may also end up being lost during
mining, missing the real value of the data in the first place. Therefore, even though the unstructured
data will have to be converted to the structured format for it to be useful in decision-making, it has
to be given much care, just like the structured data without which it will expose the company to
more risk.
Initial Post 4:
Mobile computing has vastly accelerated in popularity over the final decade. Several elements
have contributed to this: Improved community coverage, bodily smaller devices, expanded
processing power, better rate points, and go-to next-generation working structures (OSs) such as
Google's Android and Apple's iOS a more cell workforce have fueled the proliferation of cellular
devices.
Securing Mobile Data: The first and most beautiful way to defend exclusive statistics property is
to remove confidential, unnecessary, or unneeded statistics from the cellular device. Confidential
information needs not to be saved on the system unless explicit permission is given through the IT
department, enterprise unit head, or the IG board. This consists of fee lists, strategic plans,
competitive information, photograph pix of corporate constructions or co-workers, and economic
data such as tax identification numbers, enterprise credit card or banking details, and different
personal information. If it is integral for sensitive statistics to be stored on mobile devices, there
are alternatives to reliable the records more tightly, using USB drives, flash drives, and challenging
drives that have integrated digital identity and cryptographic capabilities (Collins, 2015).
Current Trends in Mobile Computing: With the speedy pace of trade in cell computing, it is
fundamental to convey an understanding of trends, to higher understand what trends to assume and
how to sketch for them. When a new mobile system or working gadget is released, the excellent
factor may also be to wait to see what security threats pop up. It is vital to recognize the direction
cell computing usage and deployment are taking to layout and increase IG policies to guard records
assets. From CIOZone.com, here are the top tendencies in cell computing:
Long Term Evolution (LTE): The so-called fourth era of cellular computing (4G) is expected to
be rolled out across North America over the next countless years, making it viable for corporate
customers to run business applications on their devices simultaneously with Voice over IP
capabilities.
3G and 4G interoperability: Sprint has developed a dual-mode card that will enable cell system
users to work on both 3G and 4G networks. Other carriers are predicted to comply with suit.
Smartphone applications: Third-party software companies will increasingly make organization
applications on hand for smartphones, including stock management, electronic clinical records
management, warehousing, distribution, and even architectural and building inspection statistics
for the construction industry.
GPS: Global Positioning Systems will provide an increasing number of being used to discover
quit users by way of their whereabouts and additionally to analyze route optimization for transport
workers and carrier technicians.
Security: As new and distinctive kinds of cell devices are introduced, company IT departments
will discover it increasingly difficult to perceive and authenticate persons cease users. As such,
count on to see an aggregate of improvements in each Virtual Private Network software program
and hardware-based VPNs to assist a couple of system types.
Antivirus: As higher third-party enterprise applications are made on hand on smartphones and
different mobile devices, CIOs will additionally have to be cognizant about the viable for viruses
and worms.
Push-button applications: Let us say a waste disposal truck arrives at an industrial website online
and is unable to empty a Dumpster due to the fact a vehicle is blocking its path. Smartphones will
include an increasing number of having purposes built into them that would make it viable for the
disposal truck driver to photograph the impeding object and route the picture to a dispatcher to file
and timestamp the obstruction.
Supplemental broadband: As carriers put in force LTE and WiMax networks, organizations such
as Sprint and Verizon are searching at probably extending wireless broadband abilities to small
groups that do not have fiber optic or copper connections on the ground. Under this scenario, a
small packaging corporation in New Jersey ought to potentially be capable of getting hold of T-1
level (high-speed) broadband capabilities in regions of the U.S. where it has workplaces but does
not have wireline broadband connections.
Initial Post 5:
Mobile computing has undergone tremendous improvement over the last two decades,
revolutionizing the world in various ways. Computing and telecommunication have gone to a new
level globally, and every industry has been impacted in one way or another. The technology's
characteristic of being easy to use, coupled with its diverse applicability, is one reason for its
increased adoption. The aspect of portability of computer functionalities makes it an ingenious
technology connecting the world in a way that previously could only be imagined (Noor et al.,
2018. Several key factors have influenced the growth and popularity of mobile computing.
There is the economic aspect encompassing diverse sectors in both developing and
developed nations. In developing countries where communications systems were highly
inadequate and unreliable mobile he the technology has brought transformation. Firms and
companies have benefited in a big way with improved efficiency. Executives can manage and
monitor things wherever they are thanks to mobile computing devices. Further, the traditional work
approach where everything had to be done in the office is now a thing of the past (Noor et al.,
2018. With mobile computing, employees are now able to operate in real-time, and in any case,
they do not need to go for daily job sheets as everything is accessible almost wherever they are.
Another aspect is the shift to cloud computing with the software as a service functionality.
Firms are making use of SaaS accessing business operations. These applications are usually webbased, accessible along mobile platforms popularizing the use of mobile computing. E-commerce
and competitive advantage have also facilitated the growth in technology. Both sellers and
customers are benefiting from mobile devices. Firms have been developing applications to run on
mobile computing, where they reach customers quickly. Again they can interact with customers
better, which is a competitive move to cultivate royalty and to serve them better. Individuals on
their part can access different functionalities like buying staff without physically getting to stores.
(Noor et al., 2018) Further, mobile computing devices are currently compelling, with reliable
networks and fast processing capacities. These factors, among others, are behind the significant
growth in mobile computing globally.
Initial Post 6:
With smartphones in our pocket and access to thousands of apps, we have become the mobile
generation -- performing a wide range of information-intensive activities on mobile phones
wherever we are -- from viewing latest baseball scores of our favorite team or conducting banking
transactions to searching for a local restaurant and sending messages to our Facebook friends.
Mobile phones have become such a part of our daily lives that we can expect mobile computing to
seamlessly flow into our business lives and become an integral part of how we will work. We are
not alone in this thinking.
According to a recent global report, Digital Megatrends 2015, by Oxford Economics,
almost 60% of senior corporate executives expect mobile technology to provide the most
significant boost to their businesses over the next five years, versus about 35% for business
intelligence and cloud computing, and about 30% for social media. The percentages add up to
more than 100% because survey respondents were asked to rank among six choices.
Why will mobile computing for business use accelerate? Here are five reasons. Powerful
Devices and Network: A few years ago, mobile phones were bulky and not overpowering, and the
networks were cripplingly slow. The current generation of smartphones is equipped with dual-core
processors, fast memory and storage, and surprisingly sharp displays. Another difference is
bandwidth. In 2001, mobile phones puttered along at 14.4 kilobits per second. Now, the Wi-Fi
hotspots abound, while fast 3G and even faster 4G enables mobile users to download lots of data
and graphics at breakneck speeds. By the end of 2016, Gartner says that 1.2 billion people will
carry these powerful smartphone handsets and tablets, such as Apple's iPad and devices based on
Google's Android mobile operating system. They have come to value instant access to information
for personal use and expect the same for their work environment.
Availability of Pre-integrated Apps: Apps have played a significant role in the exponential
adoption of mobile in the consumer space. We have apps for everything from searching for nearby
restaurants to checking out the latest baseball scores and playing games. Apps are expected to play
a similar role in accelerating the use of mobile for the work environment. Many vendors of
enterprise systems are already pre-packaging mobile apps, downloadable from iTunes and other
market places, to enable their customer's mobile workforce to make decisions no matter where
they are quick. These apps allow them to perform activities such as:
•
View upcoming tasks and scheduled activities, so our employees can always be on top of
their game.
•
Get alerts on specific events such as deviations from approved discounts, prices, credit
limits, or targeted gross profits.
•
View and complete approval requests or ask for additional information or provide
comments to requesters in the approval and rejection process. These include PO requisition
approvals, invoice approvals, discount approvals.
•
Access real-time operational reports from the system to have up to date dashboards and
key performance indicators at their fingertips.
•
Access and manage customer and partner information, including contact details, historical
activities, and past orders.
•
Monitor inventory levels and specific access products, including purchasing and sales
price, available quantity, manufacturer, shipping type, and product specifications.
Basis of Competitive Advantage
Use of mobile technology during customer interactions not only allows organizations to
become more responsive to their customers (a tremendous competitive advantage over other
companies) but more importantly, it enables them to appear more prominent in size and more
abundant in resources than they are (a massive coup in perception management for mid-sized
companies). They can also get access to the latest operational scorecards on their mobile phone to
know where they are (by the minute) meeting their metrics. Since ERP and BI vendors offer prebuilt mobile apps at no additional cost, even small organizations can afford to mobile-enabled their
workforce and increase their business.
Gartner recently stated that "The quality of the experience of applications on these devices,
which can apply location, motion and another context in their behavior, is leading customers to
interact with companies preferentially through mobile devices. This has led to a race to push out
applications as a competitive tool to improve relationships and gain an advantage over competitors
whose interfaces are purely browser-based."
Shift to Cloud Computing
Organizations are accessing business applications and business intelligence software using
SaaS (Software as a Service) model. Also, more and more company data are increasingly residing
on a cloud. Most of these SaaS applications have web services APIs, and most of the data on the
cloud is consumed using web services. Unlike traditional systems, SaaS applications and cloudbased data can be easily accessed using web services by mobile platforms.
Executive Interest
iPad was one of the most popular Christmas gifts last year many senior executives of
companies got an iPad for Christmas and asked the IT department to help them access their
corporate systems using their new toy. Whether for reading their email or checking the status of
their customer's order or approving a purchase requisition for their department or reviewing a
product plan. As a result of the success of iPad with executives, interest in mobile computing has
got the attention at the highest levels.
These reasons suggest that mobile computing at a business is not only here to stay, but it
will also become the very fabric of how we will work. Organizations that do not deploy mobile
apps from their enterprise vendors (or build their apps on top of their applications and data) will
become less competitive.
Initial Post 7:
Mobile computing: It is a modern technology that can access or transmit data wirelessly. The
principle of mobile computing is to send and receive data over wireless devices located in different
areas. Smartphones are the best example of this technology, where it can be easily connected to a
wireless network that allows us to connect to the web and download and upload files in a fraction
of seconds. Many organizations have taken advantage of this technology and brought lots of
changes in their businesses. By conducting research, let us discuss a couple of articles on how
businesses had adopted mobile computing technology and what business actions they have
brought.
(Rajendra Prasad, 2016) describes the implementations of cloud computing in various
areas, challenges, benefits of adopting this technology. It also explained that Mobile computing
refers to an environment where data storage and data processing are done on the mobile device.
Mobile devices face many challenges that are concerned with battery life, bandwidth capacities,
and a limited amount of storage. To overcome this issue, Mobile cloud computing offers unlimited
storage with a fantastic user interface and a platform to install various applications for low costs.
These are the advantages that every. Corporate companies are getting more powerful and efficient
by incorporating Mobile Computing in their infrastructure.
(Desai, 2016) explains the importance of mobile computing in daily lifestyle. Mobility has
become a trendy word and rapidly increasing part in today's computing area. Mobile Cloud
Computing builds on the principles of cloud computing, which is to pay for our utilization. Mobile
computing is an extension of cloud computing that brought cloud services into mobile devices.
Mobile cloud computing will provide an excellent environment for all the applications by multiplatform for various devices like android, windows, and iOS. Additionally, service layers are
explained in this article: Saas, PaaS, and IaaS. Various types of Cloud Computing Deployment
Models and challenges were described.
The above two articles are related to each other as they explain the importance of mobile
computing in similar aspects. Both articles have focused mainly on cloud computing business
implications and how organizations have adopted this technology.
Initial Post 8:
Mobile computing has experienced steady growth over the past ten years, with individuals
purchasing and using multiple devices. The consistent acceleration of mobile computing devices'
use is owed to a variety of factors, all of which tie to the technological aspect of enhancing human
life. Technological advancements and innovations remain the main reason for the accelerated use
of mobile computing in the twenty-first century (Lumsden, 2013). About ten years back, mobile
phones were bulky and not powerful enough to support multiple functions. However, constant
research and innovation in the tech world have led to the unveiling of small, light, and easily
portable smartphones that make the user experience much better. Current mobile devices are more
powerful and multifaceted in that they offer users much more than just making and receiving calls
and text messages. An individual owning a Smartphone can conduct business, track their health,
and even go to school on the same device, features that have made it possible for mobile computing
to sell itself in the consumer market. The availability of pre-integrated applications and software
makes mobile computing enjoy the steady growth it does in the global consumer market.
The introduction of cloud computing also boosted the use of mobile computing devices.
Cloud computing offers consumers remote access to their cloud platforms, allowing them to store,
share, and even access their files from remote locations. The remote function provided by cloud
platforms forced many people to invest in mobile computing devices, which provided the hardware
required for users to access their cloud accounts. It is also important to note that there are many
mobile computing devices manufacturers now than was the case ten years ago. Increased
competition has resulted in the reduction of prices, making it more affordable for consumers to
purchase not one but multiple mobile computing devices (Guizani, Chen, & Wang, 2015).
Instructions:
•
Need a minimum of 200 words for each response (Total 8 Responses)
•
Need a minimum of 2 APA References
•
In response, we need to follow:
o Ask a captivating, thoughtful question about the topic.
o Provide extensive additional information on the topic
o Explain, define, or analyze the topic in detail
o Share a relevant personal experience.
o Make an argument concerning the topic.
Purchase answer to see full
attachment