Android for Enterprise Automated Systems

Author(s):  
Fahmi Ncibi ◽  
Habib Hamam ◽  
Ezzedine Ben Braiek

In this chapter, various aspects pertaining to the open operating system Android OS such as its history, architecture, features, and utility for business purposes will be introduced, following which the role of Android in enterprise management will be explained. The chapter will be concluded by a detailed report of the BYOD approach that uses Android for industrial control and automation. Since mobile devices have become progressively more powerful and accessible, mobile computing has greatly changed our daily lives. As one of the most popular mobile operating systems, Android provides the tools and API for Android developers to develop Android applications. Android is an open source operating system for mobile devices. Today its primary use is lodged in the mobile phone industry. During the recent past years, many projects have been created, with the objective to elevate Android to other platforms, such as sub-notebooks or embedded systems.

2018 ◽  
pp. 468-491
Author(s):  
Fahmi Ncibi ◽  
Habib Hamam ◽  
Ezzedine Ben Braiek

In this chapter, various aspects pertaining to the open operating system Android OS such as its history, architecture, features, and utility for business purposes will be introduced, following which the role of Android in enterprise management will be explained. The chapter will be concluded by a detailed report of the BYOD approach that uses Android for industrial control and automation. Since mobile devices have become progressively more powerful and accessible, mobile computing has greatly changed our daily lives. As one of the most popular mobile operating systems, Android provides the tools and API for Android developers to develop Android applications. Android is an open source operating system for mobile devices. Today its primary use is lodged in the mobile phone industry. During the recent past years, many projects have been created, with the objective to elevate Android to other platforms, such as sub-notebooks or embedded systems.


2019 ◽  
Vol 255 ◽  
pp. 05005 ◽  
Author(s):  
Alimardani Hamidreza ◽  
Nazeh Mohammed

As mobile devices grow in popularity, they have become indispensable in people's daily lives, keeping us connected to social networks, breaking news, and the entire Internet. While there are multiple competing platforms, Google's Android is currently the most popular operating system for mobile devices. This popularity has drawn attention of hackers as well. Thus far, research works have analysed Android permissions individually, which makes analysis complex and time consuming. In this work, we propose categorizing Android permissions based on Google's recommendation and perform LSTM analysis on data. The used datasets are Drebin and AndroZoo, which are the most complete and well-respected among research community. The experiment results show that LSTM achieved 91% of true positive rate.


Author(s):  
Anna Kasimati ◽  
Sofia Mysirlaki ◽  
Hara Bouta ◽  
Fotini Paraskeva

The rise of mobile broadband devices and services has significantly changed the role of mobile devices in people's daily lives by enabling the provision of innovative applications and services anywhere, anytime. Despite the fact that new ideas and innovation mainly occur within Higher Education Institutions (HEIs), the adoption of mobile and ubiquitous technologies by HEIs is still in its early stages. This chapter attempts to provide a framework to support Higher Education Institutions towards implementing mobile and ubiquitous, game-based learning activities. Aligned with the objective of this book, this chapter presents some examples and best practices of implementing this framework towards achieving the learning goals of future professionals in the fields of electronic and ubiquitous commerce.


Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


2016 ◽  
Vol 44 (1) ◽  
pp. 48-60 ◽  
Author(s):  
Mary K. Van Ullen ◽  
Jane Kessler

Purpose – The purpose of this paper is to evaluate the accuracy and functionality of a selection of basic Android and iOS apps for mobile devices designed to generate bibliographic citations. Design/methodology/approach – A number of inexpensive or free apps were installed on several different tablets and phones. Book citations in MLA and APA format were generated and evaluated for accuracy. Findings – Results show that the majority of the apps tested produced unacceptably inaccurate citations, and many had limited functionality. The best of the apps tested was EasyBib. Research limitations/implications – There are infinite combinations of operating systems, apps, citation styles, material types and devices. Testing for this study was limited to uncomplicated apps likely to appeal to undergraduate students. It did not include more sophisticated apps for managing reference libraries. The study investigated how well several Android and iOS apps installed on mobile devices functioned to generate MLA and APA citations for print books. Practical/implications – As the role of mobile technology in education continues to grow, librarians need to remain aware of solutions that can help students manage their research. Librarians have an opportunity to provide feedback to developers by reviewing and rating apps. Originality/value – Undergraduate students face challenges in learning to appropriately acknowledge materials they have consulted in their research and writing. Librarians can play an important role in helping students select the most appropriate tools to make citing sources easier and more accurate.


2017 ◽  
Vol 5 ◽  
pp. 193-199
Author(s):  
Mateusz Dobrowolski ◽  
Michał Dobrowolski ◽  
Piotr Kopniak

This publication concentrate on the posibility of the use of sensors in mobile devices with modified operating systems. Presented research focuses on Android devices. The gyroscope, the accelerometer, the orientation sensor and the light sensor data was acquired with use of Physics Toolbox Sensor software. The research has been conducted on two mobile devices of Xiaomi under control of six different kinds of operating system. Measured values were compared to values recorded by very accurate, reference sensors


2018 ◽  
Vol 7 (4.15) ◽  
pp. 30
Author(s):  
Sami Azam ◽  
Rajvinder Singh Sumra ◽  
Bharanidharan Shanmugam ◽  
Kheng Cher Yeo ◽  
Mirjam Jonokman ◽  
...  

It is a known fact that Android mobile phones’ security has room for improvement. Many malicious app developers have targeted     android mobile phones, mainly because android as an open operating system provides great flexibility to developers and there are many android phones which do not have the latest security updates. With the update of marshmallow in android, applications request           permission only during runtime, but not all users have this update. This is important because user permission is required to perform    certain actions. The permissions may be irrelevant to the features provided by an application. The purpose of this research is to          investigate the use and security risk of seeming irrelevant permissions in applications available from Google store. Two different        applications which seem to ask irrelevant permissions during installation were selected from Google store. To test these applications, static analysis, dynamic analysis and reverse engineering tools were used. Findings show potentially malicious behavior, demonstrating that downloading apps from Google play store do not guarantee security.  


Author(s):  
Art Taylor

With the rise of the Internet, computer systems appear to be more vulnerable than ever from security attacks. Much attention has been focused on the role of the network in security attacks, but evidence suggests that the computer server and its operating system deserve closer examination since it is ultimately the operating system and its core defense mechanisms of authentication and authorization which are compromised in an attack. This chapter provides an exploratory and evaluative discussion of the authentication and authorization features of two widely used server operating systems: Windows and Linux.


Author(s):  
Julie R. Mariga

This chapter introduces the enormous impact of mobile computing on both companies and individuals. Companies face many issues related to mobile computing. For example: which devices will be supported by the organization? which devices will fulfill the business objectives? which form factor will win? which features and networks will future devices offer? which operating systems will they run? what will all this cost? what are the security issues involved? what are the business drivers? This chapter will discuss the major business drivers in the mobile computing field, and provide an analysis of the top two operating systems that are currently running the majority of mobile devices. These platforms are the 1) Palm operating system (OS), and 2) Microsoft Windows CE operating system. The chapter will analyze the strengths and weaknesses of each operating system and discuss market share and future growth.


CCIT Journal ◽  
2014 ◽  
Vol 7 (3) ◽  
pp. 402-419
Author(s):  
Asep Saefullah ◽  
Diah Ariyani ◽  
Andy Rienauld

An age of fast-paced time is precious, be in a queue sequence is a loss. In addition to timeconsuming, the queue can also restrict other activities to do one. Likewise, when making payments at the checkout counter can be ascertained will be a queue, it needed a solution for IT ( Information Technology ) to overcome losses incurred during the waiting queue. This research is to design and create an application system that can give information about the running queue and facility reservation queue numbers to someone from anywhere via smartphones with the Android operating system. Research using the Android Developer Tools ( ADT ) Bundle suggested by the official Android developer site as a tool to help software developers build, test and debug Android applications. The design of applications using a smartphone galaxy s3 android hardware and language as a programming language as well as software eclipse helper program making. The result is a system application Queue Notifications on smartphones with Android OS, where users can take advantage of the waiting time by not waiting in line at the cash register or point of payment but the queue in the queuing system on a smartphone from anywhere while doing other activities .


Sign in / Sign up

Export Citation Format

Share Document