Abstract:Mobile cloud computing (MCC) is a relatively new concept that leverages the combination of cloud technology, mobile computing, and wireless networking to enrich the usability experiences of mobile users. Many field of application such as mobile health, mobile learning, mobile commerce and mobile entertainment are now taking advantage of MCC technologies. Since MCC is new, there is need to advance research in MCC in order to deepen practice. Currently, what exist are mostly descriptive literature reviews in the… Show more
“…Firstly, the security and privacy requirements are one of the most important success factors of the mobile government applications implementation [5,6]. Secondly, it is necessary to apply useful privacy and security methods based on the environment of the mobile government applications [13,15,21]. Thirdly, there are many features such as the transferring capacity, speed and device power that affect the security issues of the mobile government applications [1,24].…”
Section: Discussion Of Related Workmentioning
confidence: 99%
“…It is also due to the lack in the rules and structures of how to develop a secure mobile government applications [4,5]. There are many gaps need to be filled in order to propose Source Aim Scope Findings Strength Weakness Ibukun and Daramola [13] Improve the security of mobile applications.…”
Section: Discussion Of Related Workmentioning
confidence: 99%
“…Thus, the trust level of mobile devices can be identified based on the predefined signatures. Another work concerning mobile applications' security was conducted by Ibukun and Daramola [13], they explained that the antivirus' tools are effective to detect and prevent the illegal transactions or attacking of service and data. However, the specifications of antivirus for mobile network (i.e.…”
Section: Security and Privacy Methods Of Mobile Government Applicationsmentioning
confidence: 99%
“…In this context, the security and privacy of mobile application are still an issue as the wireless connectivity is less secured than the wire connections [9][10][11][12]. The security and privacy of mobile applications are affected by many complex variables such as usefulness of security and privacy methods, processing speed of mobile devices, storage capacity of mobile devices, the sensitivity level of information and services, speed and coverage of data transferring and the volume of transferred data [13][14][15]. Hence, the analysis of security and privacy features of mobile applications should be carefully conducted according to various variables of mobile environment.…”
Mobile applications available in anytime and from anywhere. The utilizing of mobile governmental applications is significant to reduce the efforts and time that are required to accomplish the public services by citizens. The main challenges that face the acceptance and adoption of mobile governmental applications are the privacy and security issues. The users, who do not trust the security of mobile governmental applications, may reject the use of these applications which discourages the government to adopt the mobile services. This study focuses in investigating the security and privacy requirements of mobile government applications. Many related works are reviewed and discussed to understand the important security requirements of mobile government applications. The main results indicate that effective privacy and security of mobile government applications should be assured so as to enhance the level of adopting and using these applications. The security requirements involve many considerations such as the hardware characteristics, software characteristics, and communication characteristics. This article mainly gives better understanding of security requirements of mobile government applications.
“…Firstly, the security and privacy requirements are one of the most important success factors of the mobile government applications implementation [5,6]. Secondly, it is necessary to apply useful privacy and security methods based on the environment of the mobile government applications [13,15,21]. Thirdly, there are many features such as the transferring capacity, speed and device power that affect the security issues of the mobile government applications [1,24].…”
Section: Discussion Of Related Workmentioning
confidence: 99%
“…It is also due to the lack in the rules and structures of how to develop a secure mobile government applications [4,5]. There are many gaps need to be filled in order to propose Source Aim Scope Findings Strength Weakness Ibukun and Daramola [13] Improve the security of mobile applications.…”
Section: Discussion Of Related Workmentioning
confidence: 99%
“…Thus, the trust level of mobile devices can be identified based on the predefined signatures. Another work concerning mobile applications' security was conducted by Ibukun and Daramola [13], they explained that the antivirus' tools are effective to detect and prevent the illegal transactions or attacking of service and data. However, the specifications of antivirus for mobile network (i.e.…”
Section: Security and Privacy Methods Of Mobile Government Applicationsmentioning
confidence: 99%
“…In this context, the security and privacy of mobile application are still an issue as the wireless connectivity is less secured than the wire connections [9][10][11][12]. The security and privacy of mobile applications are affected by many complex variables such as usefulness of security and privacy methods, processing speed of mobile devices, storage capacity of mobile devices, the sensitivity level of information and services, speed and coverage of data transferring and the volume of transferred data [13][14][15]. Hence, the analysis of security and privacy features of mobile applications should be carefully conducted according to various variables of mobile environment.…”
Mobile applications available in anytime and from anywhere. The utilizing of mobile governmental applications is significant to reduce the efforts and time that are required to accomplish the public services by citizens. The main challenges that face the acceptance and adoption of mobile governmental applications are the privacy and security issues. The users, who do not trust the security of mobile governmental applications, may reject the use of these applications which discourages the government to adopt the mobile services. This study focuses in investigating the security and privacy requirements of mobile government applications. Many related works are reviewed and discussed to understand the important security requirements of mobile government applications. The main results indicate that effective privacy and security of mobile government applications should be assured so as to enhance the level of adopting and using these applications. The security requirements involve many considerations such as the hardware characteristics, software characteristics, and communication characteristics. This article mainly gives better understanding of security requirements of mobile government applications.
“…Despite mobile computing offering advantages such as mobility and access to diverse network types, it is however limited due to aspects such as intermittent network disconnection, poor reliability and security. Similarly, Ibukun and Daramola (2015) add that mobile computing is hampered by existent constraints in mobile devices in terms of their hardware, software and connectivity. Subsequently, users undertaking their computing activities in mobile environments encounter challenges such as limited computational power, reduced storage sizes and limited battery life.…”
The proliferation of mobile devices and the increased adoption of the internet across the globe has led to the rise of m-commerce. reports highlight that in spite of the different advancements in the technology, trust in the platform is still a significant hindrance to its adoption. Consequently, the current study seeks to identify privacy and security issues affecting m-commerce users of three shopping sites: Amazon, Alibaba and eBay. The aim here is to develop recommendations that mitigate these challenges. The expected output of the study is an anticipation for insights regarding user perspectives on trust in m-commerce and as a result, contribute to existent knowledge in the area benefitting regulatory bodies and online vendors.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.