Native vs. Hybrid Mobile Applications as Society Enters the Internet of Things

Author(s):  
Irvin Renzell Heard ◽  
Norman R Ardila

For nearly two decades, desktops dominated as the primary means of accessing the internet until 2007, the era of mobile phones with touchscreens capability entered the market by Apple Inc. Currently, the high demand of accessibility and mobility through mobile technology is adding more pressure on application developers leaving them to focus more on “meeting deadlines than application security,” which is a critical component as hybrid applications play a significant role in the advancement of IoT and cross-platform compatibility. New technologies are adopting unresolved security issues from the latter. This article aims to initiate discussions within the development and research community regarding hybrid mobile app security, market, role in IoT, advantages, disadvantages, security challenges and the best practices as society enters into a new paradigm envisioned as a ubiquitous global network.

Author(s):  
Irvin Renzell Heard ◽  
Norman R Ardila

For nearly two decades, desktops dominated as the primary means of accessing the internet until 2007, the era of mobile phones with touchscreens capability entered the market by Apple Inc. Currently, the high demand of accessibility and mobility through mobile technology is adding more pressure on application developers leaving them to focus more on “meeting deadlines than application security,” which is a critical component as hybrid applications play a significant role in the advancement of IoT and cross-platform compatibility. New technologies are adopting unresolved security issues from the latter. This article aims to initiate discussions within the development and research community regarding hybrid mobile app security, market, role in IoT, advantages, disadvantages, security challenges and the best practices as society enters into a new paradigm envisioned as a ubiquitous global network.


Web Services ◽  
2019 ◽  
pp. 351-376
Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing has recently emerged as a new paradigm of computing for hosting and delivering services over the Internet. It replaces computing as a personal commodity by computing as a public utility. It is attractive solution to business owners as it eliminates the requirement for users to plan ahead for provisioning, and allows enterprises to start from the small and increase resources only when there is a rise in service demand. However, despite the significant benefits, these technologies present many challenges including lack of security. The chapter presents an advanced survey focusing on cloud computing concept. It highlights its key concepts and presents a physical architecture of this environment. Finally, the chapter defines virtualization technology as a factor for cloud computing surge and discuses security issues that damage these systems. The aim of this chapter is to provide a better understanding of the design challenges of cloud computing.


Author(s):  
Fausto E. Jacome

Emerging technologies such as machine learning, the cloud, the internet of things (IoT), social web, mobility, robotics, and blockchain, among others, are powering a technological revolution in such a way that are transforming all human activities. These new technologies have generated creative ways of offering goods and services. Today's consumers demand in addition to quality, innovation, a real-time and ubiquitous service. In this context, what is the challenge that academy faces? What is the effect of these new technologies on the universities mission? What are people's expectations about academy in this new era? This chapter tries to get answers to these questions and explain how these emerging technologies are converting universities to lead society transformation to the digital age. Under this new paradigm, there are only two roads: innovate or perish. As might be expected universities are embracing these technologies for innovating themselves.


Author(s):  
Cândida Silva ◽  
Isabel Ramos

The developments of the internet, the proliferation of the use of Web 2.0 tools, and of the technology in general, are leveraging new ways of people to communicate, collaborate, and interact. This new world and new markets, in a daily change, are enabling the emergence of new innovative enterprises and services, taking advantage of the new technologies and of the global network. Cardmobili is a Portuguese start-up company working in the area of mobile services. This company provides a mobile service to manage rewards and membership cards, enabling users to store them in the cloud, while using mobile applications to present them in store, collecting and using the rewards, sharing cards and information with other users and friends in social networks. Cardmobili is linked to merchants’ loyalty management systems, enabling users to access exclusive offers, delivered to their mobile application and web account. The company provides complete services to make any loyalty or membership program mobile: branding, new customer registration, integration of customer account balance, mobile vouchers, coupons and offers, and mobile communication.


Author(s):  
Tim Gerhard ◽  
Dennis Schwerdel ◽  
Paul Müller

AbstractThe Internet is a successful network that connects people all over the world. However, it has some fundamental architectural problems which require application developers and service providers to spend a tremendous effort in combating these. Examples for these efforts are content delivery networks or mobile TCP. Thus, it can be said that the Internet is currently not fulfilling the requirements on the global network anymore. The Internet of the future, or its replacement, must solve these problems.There are multiple clean-slate approaches for information-centric networking. However, they are inherently incompatible to the Internet or applications building on it.This work presents a novel resource transport protocol that is optimized for detection by software-defined networks and may be re-routed to in-network processors. Furthermore, it is shown how this protocol can be used to support concepts of ICN even in today’s Internet. Moreover, the resource format that is used in this work is independent from the underlying network, resulting in possible reuse in other networks as well. Applications and protocols building on this resource format can thus easily be re-used in clean-slate networks like NDN.


2021 ◽  
Vol 18 (2) ◽  
pp. 247-256
Author(s):  
Sanja Klisarić

In a world of increasingly intense cyber content that relies on new technologies, the security of all systems is at risk. This article will present the danger and security options in order to protect not only data but also the entire system connected to the new technologies. Also, the importance of persons dealing with online security issues will be emphasized. The analysis of the content reveals the possibility for prediction that is presented in the paper, and connected with the conclusion that technology will develop more and more, and thus the danger of cyber attacks will be more and more intense. The paper focuses on the essence of the defense against terrorism that is necessary on the Internet. This indicates those defense options that are in line with the roles of those in charge of Internet security as an open field for terrorist cyber attacks.


Author(s):  
Zhilei Qiao ◽  
Julio C. Rivera ◽  
Mi Zhou

The term Internet of Things (IoT) refers to a broad class of devices used by business entities as well as consumers to provide or consume a broad array of services. All these devices share their need to connect to the internet to deliver their native functionality. This connection requirement exposes the devices to the cybersecurity threats found on the internet. Existing literature on IoT cybersecurity solution models has shown that different technologies, such as communication technologies, mobile-app based authorization framework, graph-theoretic approach or blockchain technologies, have been majorly proposed to solve IoT security issues. However, these studies only focus on some specific IoT security issues like data theft or security issues on some specific layer across the whole IoT architecture. Therefore, there is a lack of systematic framework to solve IoT cybersecurity issues. This paper presents a framework for assessing such risks. In the qualitative analysis results, the device threats seem more severe than data confidentiality and privacy issues. This surprising finding highlights the significances of security taxonomy because both issues are based on different technical requirements. Our study has important managerial and practical implications for users, managers, and policymakers.


2016 ◽  
pp. 561-584
Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing has recently emerged as a new paradigm of computing for hosting and delivering services over the Internet. It replaces computing as a personal commodity by computing as a public utility. It is attractive solution to business owners as it eliminates the requirement for users to plan ahead for provisioning, and allows enterprises to start from the small and increase resources only when there is a rise in service demand. However, despite the significant benefits, these technologies present many challenges including lack of security. The chapter presents an advanced survey focusing on cloud computing concept. It highlights its key concepts and presents a physical architecture of this environment. Finally, the chapter defines virtualization technology as a factor for cloud computing surge and discusses security issues that damage these systems. The aim of this chapter is to provide a better understanding of the design challenges of cloud computing.


2013 ◽  
Vol 760-762 ◽  
pp. 1718-1722
Author(s):  
Tao Zhang ◽  
Shou Ming Ma ◽  
Wei Min Lin ◽  
Yuan Yuan Ma

As a new paradigm for hosting and delivering services over the Internet, cloud computing technology especially suitable for dealing with series of problems in strong smart grid. However, despite the fact that cloud computing offers huge opportunities to the strong smart grid, the development of cloud computing technology is currently at its infancy, especially with many security issues to be addressed. In this paper, we present the overall architecture and benefits of cloud computing applications in strong smart grid. After that, we propose a unified security protection system framework of power cloud computing and give some practicable security protection suggestions.


2021 ◽  
Vol 5 (1) ◽  
pp. 15
Author(s):  
Hongtao Ma ◽  
Hongsheng Guo ◽  
Luyao Li

With the increasing development of Internet technology, computer Internet, intelligent terminal, cloud computing and other new technologies continue to emerge. All kinds of app based on mobile intelligent terminal are widely used because of its convenience and intelligence. However, for the safety of the coal industry, how to use these technologies based on mobile intelligent terminal to establish a set of efficient long-term mechanism of safety inspection and risk control is a necessary method to upgrade the safety management mode. Therefore, in order to meet the requirements of hidden danger investigation and management, this paper designs an intelligent hidden danger investigation and management system. Based on Ionic, the system constructs a cross platform mixed mode mobile app development framework. The paper shows that the system can realize the basic hidden danger investigation requirements.


Sign in / Sign up

Export Citation Format

Share Document