Contemporary Issues in Handheld Computing Research

Author(s):  
Wen-Chen Hu ◽  
Yanjun Zuo ◽  
Lei Chen ◽  
Hung-Jen Yang

Mobile phones have become ubiquitous in today’s society. However, mobile users are no longer satisfied with simple phones but instead expect ever more powerful functions to be available from their mobile devices. Advanced phones known as smartphones allow mobile users to perform a wide variety of advanced handheld functions such as browsing the mobile Internet or finding a nearby theater showing a specific movie. The design and development of these new, improved handheld functions require the help of handheld computing research. This article introduces handheld computing research using three themes: (i) mobile handheld devices, (ii) mobile computing, and (iii) current issues in handheld computing research. Information about other handheld topics of interest to researchers is given in the last section.

2010 ◽  
Vol 1 (1) ◽  
pp. 1-23 ◽  
Author(s):  
Wen-Chen Hu ◽  
Yanjun Zuo ◽  
Lei Chen ◽  
Hung-Jen Yang

Mobile phones have become ubiquitous in today’s society. However, mobile users are no longer satisfied with simple phones but instead expect ever more powerful functions to be available from their mobile devices. Advanced phones known as smartphones allow mobile users to perform a wide variety of advanced handheld functions such as browsing the mobile Internet or finding a nearby theater showing a specific movie. The design and development of these new, improved handheld functions require the help of handheld computing research. This article introduces handheld computing research using three themes: (i) mobile handheld devices, (ii) mobile computing, and (iii) current issues in handheld computing research. Information about other handheld topics of interest to researchers is given in the last section.


Author(s):  
Narayana Moorthi M. ◽  
Manjula R.

Mobile devices are continuously improving, adding integrated sensors, which are of value to the healthcare industry. Sensor-enabled mobile phones collect data from patients, which is useful for doctors in providing immediate care and treatment. As smartphones become ubiquitous, their use as health monitors should become commonplace. This chapter surveys mobile computing devices and sensors in healthcare applications.


Author(s):  
Jocelyn Wishart

Early research on personal digital assistants (PDAs), forerunners of today's Smartphones, shows they have the potential to support pre-service teachers' learning and teaching on placement in schools. This article reports results from three such projects conducted with small groups of graduate student teachers in the UK which indicate that handheld devices are particularly supportive of management of learning and teaching and of building knowledge across contexts. However, mobile phones are viewed in schools as disruptive devices and it became apparent that social pressures on trainees using devices that are, in most schools, banned to pupils were impacting negatively on their use of the technology to support their learning. It is therefore argued that, whilst schools are mostly viewed as learning organisations that support staff professional development, in the case of emerging technologies, this isn't always the case and we need to do more to enable the realisation of these benefits of using mobile devices to support initial teacher education.


2018 ◽  
Vol 2 (2) ◽  
pp. 37-45 ◽  
Author(s):  
Maaruf Ali ◽  
Shayma K. Miraz

This research article presents a brief survey of language learning applications implemented on mobile computing devices, such as cellular mobile phones. The corpus of the literature show the efficacy and effectiveness of using mobile devices to disseminate, train, retain and improve the linguistic ability of non-native speakers.


Author(s):  
Shaveta Bhatia

The progressive rise of mobile computing devices and wireless networks have created a lot of interest in location-based systems and services. The involvement of internet applications in almost every field has changed our lives. Location-based services are the services provided to mobile users according to their geographic locations. Each user wants to get the service according to his/her own interest. The general user's actions in location-based services are locating, searching, navigating, identification, and checking. The location identification has now become a critical attribute. Today, internet of things in the field of location-based services (LBS) provide services to the mobile users by explore the location depending on the geographical coordinates for their valuable needs. Mobile phones that are equipped with new technologies and supported by the presence and development of broadband mobile data networks have created new opportunities for the processing of location-based applications.


Author(s):  
Abdullah Wahbeh

Advances in technology have accelerated self-care activities, making them more practical and possible than before using these technologies. The utilization of new Health Information Technologies (HIT) is becoming more and more apparent in self-care. Many patients incorporate the use of PDAs in diabetes self-care (Forjuoh, et al., 2007; Jones & Curry, 2006). Mobile phones are used in diabetes self-management by diabetes patients (Carroll, DiMeglio, Stein, & Marrero, 2011; Faridi, et al., 2008; Mulvaney, et al., 2012). Also, reminders based on SMS cell phone text messaging are used to support diabetes management (Hanauer, Wentzell, Laffel, & Laffel, 2009). Given the current advances in the field of health care, health care technologies, and handheld computing, this case explores the possible primary usages of mobile phones, PDAs, and handheld devices in self-care management. More specifically, the case illustrates how such technologies can be used in diabetes management by patients and health care providers.


2009 ◽  
pp. 144-151
Author(s):  
Mark van ‘t Hooft ◽  
Graham Brown-Martin ◽  
Karen Swan

In a world that is increasingly mobile and connected, the nature of information resources is changing. The new information is networked, unlimited, fluid, multimodal, and overwhelming in quantity. Digital technologies, such as mobile phones, wireless handheld devices, and the Internet, provide access to a wide range of resources and tools, anywhere and anytime. This type of access and connectivity has also had an impact on how we collaborate on projects and share media and therefore, greatly increases opportunities to learn inside and outside institutionalized school systems. Learners now have the tools to take learning beyond classrooms and the school day. The development of handheld devices can be traced back to Alan Kay’s vision of the Dynabook. As early as the 1970s, Kay envisioned a mobile, kid-friendly, notebook-sized computer with arti- ficial-intelligence capabilities that would support children’s learning inside and outside of school. Similar ideas soon followed in the form of devices such as the Psion I (1984), the GRiDPaD (1988), Amstrad’s PenPad, and Tandy’s Zoomer (1993), the Apple Newton (1993-1995), and the eMate (1997-1998). During the 1990s and early 2000s, Palm developed a series of handheld devices that defined the handheld market in North America, while Microsoft developed several versions of its Windows Mobile software that could be found on mobile devices made by such companies as HP, Dell, and more recently, Fujitsu Siemens (Bayus, Jain, & Rao, 1997; HPC Factor, 2004; Williams, 2004). There are also many devices whose primary function is entertainment or communication, including media players such as Apple iPods, portable gaming devices like the Sony PSP and the Nintendo DS, and, of course, mobile phones. These types of devices are becoming increasingly popular and multifunctional, with iPods being able to store and play music, pictures, and video; portable gaming devices sporting wireless capabilities for interaction between devices (and in the case of the PSP, Internet access); and mobile phones being used to shoot pictures and video, upload content to the Web or e-mail it elsewhere, do text messaging, and make phone calls. Whatever the device, convergence seems to be increasingly important, and growing numbers of young people are using these mobile, digital, and connected tools daily, whenever and wherever they need them, and this includes schools.


2009 ◽  
pp. 3588-3598 ◽  
Author(s):  
Thomas M. Chen ◽  
Cyrus Peikari

This chapter examines the scope of malicious software (malware) threats to mobile devices. The stakes for the wireless industry are high. While malware is rampant among 1 billion PCs; approximately twice as many mobile users currently enjoy a malware-free experience. However; since the appearance of the Cabir worm in 2004; malware for mobile devices has evolved relatively quickly; targeted mostly at the popular Symbian smartphone platform. Significant highlights in malware evolution are pointed out that suggest that mobile devices are attracting more sophisticated malware attacks. Fortunately; a range of host-based and network-based defenses have been developed from decades of experience with PC malware. Activities are underway to improve protection of mobile devices before the malware problem becomes catastrophic; but developers are limited by the capabilities of handheld devices.


2009 ◽  
pp. 451-458
Author(s):  
Zakaria Maamar ◽  
Qusay H. Mahmoud

Mobile information systems (MISs) are having a major impact on businesses and individuals. No longer confined to the office or home, people can use devices that they carry with them, along with wireless communication networks, to access the systems and data that they need. In many cases MISs do not just replace traditional wired information systems or even provide similar functionality. Instead, they are planned, designed, and implemented with the unique characteristics of wireless communication and mobile client use in mind. These unique characteristics feature the need for specific design and development methodologies for MISs. Design methods allow considering systems independently of the existing information technologies, and thus enable the development of lasting solutions. Among the characteristics that a MIS design method needs to consider, we cite: unrestricted mobility of persons, scarcity of mobile devices’ power-source, and frequent disconnections of these devices. The field of MISs is the result of the convergence of high-speed wireless networks and personal mobile devices. The aim of MISs is to provide the ability to compute, communicate, and collaborate anywhere, anytime. Wireless technologies for communication are the link between mobile clients and other system components. Mobile client devices include various types, for example, mobile phones, personal digital assistants, and laptops. Samples of MIS applications are mobile commerce (Andreou et al., 2002), inventory systems in which stock clerks use special-purpose mobile devices to check inventory, police systems that allow officers to access criminal databases from laptops in their patrol cars, and tracking information systems with which truck drivers can check information on their loads, destinations, and revenues using mobile phones. MISs can be used in different domains and target different categories of people. In this article, we report on the rationale of having a method for designing and developing mobile information systems. This method includes a conceptual model, a set of requirements, and different steps for developing the system. The development of a method for MISs is an appropriate response to the need of professionals in the field of MISs. Indeed, this need is motivated by the increased demand that is emerging from multiple bodies: wireless service providers, wireless equipment manufacturers, companies developing applications over wireless systems, and businesses for which MISs are offered. Besides all these bodies, high-speed wireless data services are emerging (e.g., GPRS, UMTS), requiring some sort of new expertise. A design and development method for MISs should support professionals in their work.


Author(s):  
Thomas M. Chen ◽  
Cyrus Peikari

This chapter examines the scope of malicious software (malware) threats to mobile devices. The stakes for the wireless industry are high. While malware is rampant among 1 billion PCs, approximately twice as many mobile users currently enjoy a malware-free experience. However, since the appearance of the Cabir worm in 2004, malware for mobile devices has evolved relatively quickly, targeted mostly at the popular Symbian smartphone platform. Significant highlights in malware evolution are pointed out that suggest that mobile devices are attracting more sophisticated malware attacks. Fortunately, a range of host-based and network-based defenses have been developed from decades of experience with PC malware. Activities are underway to improve protection of mobile devices before the malware problem becomes catastrophic, but developers are limited by the capabilities of handheld devices.


Sign in / Sign up

Export Citation Format

Share Document