Mobile Devices and Mobile Applications: Key Future Trends

Mobile Devices and Mobile Applications: Key Future Trends

Carol Charsky (TWU, School of Management, USA) and Mahesh Raisinghani (TWU, School of Management, USA)
DOI: 10.4018/978-1-60566-156-8.ch019


Mobile devices are comprised of a multitude of various applications and operating systems that have significantly impacted the way people interact with each other as they go about their lives in this growing global economy. Today, businesses and organizations are facing new challenges in defining strategies, visions, and business processes in an effort to support the up and coming mobile market of devices and applications. In addition, companies are confronted with the need to monitor their critical business practices and processes throughout the organization in an effort to keep the competitive advantage in the growing mobile technology market. Since many company funds are limited with their IT budgets, organizations will need to prioritize its goals to determine how deeply committed they are to keep a vision on the future through the mobile market. This chapter will show how mobile devices with all of its various software and hardware devices can move an organization’s strategy into showing how it is important for companies to invest in this growing technology. Some of the more commonly known devices, operating systems, and critical applications will be identified. Finally, a conclusion will be drawn on the future of the mobile technology environment.
Chapter Preview

Impact Of Mobile Devices On People

People have become accustomed to changes in their environment as new generations of technology touch their everyday lives. This shift in technology is causing people to see the world through new views and paradigms (Singh, 2003). We see these paradigm shifts in phases such as when our parents went from listening to radio to watching television. We have seen the shift in the paradigm when our generation went from stand-alone personal computers to retrieving information off the Internet (Singh, 2003). The latest shift in paradigm is the explosive developments of the mobile devices and the applications. These developments are constantly being expanded upon to further the use of mobile devices in everyday personal needs and strategic business processes. People today are reeling from the benefits of mobile devices through increased productivity. The people benefiting the most are the mobile workers, especially the executives, middle management managers and salespeople who are not bound by a desk or specific work locations (Cozza, 2005). Mobile devices are giving added levels of service to people through better customer support and improved customer care that in turn has increased the company return on investment (Cozza, 2005). Employees have access their email, contacts, corporate data and up to date meeting schedules. This invaluable asset information is shaping the corporate employee of today.

The impact of mobile devices has created new experiences for people in a way that stretches beyond the individual. Corporations are feeling the impact of the added availability of mobile devices, as their employees are able to stay abreast of hour-by-hour changes in the company daily business. Corporate IT staffs responsible for supporting mobile devices are impacted by their own set of challenges in their daily work. Many companies have been forced to increase staffing positions specifically to support the mobile infrastructure. Companies are coming to understand that staffing requirements are changing as they look at the total cost of ownership in supplying mobile devices to employees (Cozza, 2005). IT staffing personal affected by deployment of these devices are responsible for maintaining the hardware, licensing agreements and the profiles associated with each device. Mobile devices can even impact people who don’t actually have their own mobile device. Companies must follow a strict security policy in securing the access and use of mobile devices to all employees. Otherwise data can and will be compromised.

Complete Chapter List

Search this Book: