Security for Hybrid Mobile Development: Challenges and Opportunities

Security for Hybrid Mobile Development: Challenges and Opportunities

Copyright: © 2018 |Pages: 43
DOI: 10.4018/978-1-5225-2599-8.ch032
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In recent decades, vendors developed technology infrastructure solutions to integrate with enterprises and consumers' mobile devices. Hybrid development platforms are solution architecture designed to enhance developers' capabilities and provide organizations as well as customers the level of services to support mobile devices capabilities. Hybrid development platform solutions are easy to deploy at various enterprises. These capabilities can be distributed to/or integrated with mobile devices as agile applications and system interfaces. Hybrid mobile devices are designed to further provide users with enhanced technology solutions: cloud computing, big data, the Internet, physical and/or virtual network systems. The development of hybrid mobile platforms provides developers with advanced technology capabilities, necessary for supporting mobile devices once deployed to the marketplace. Technical and security features affecting the development and security of mobile devices are also discussed in this chapter.
Chapter Preview
Top

Introduction

In recent years, vendors and information technology practitioners have researched on security solutions necessary, to prevent data breaches and protect user’s privacy (Chess, & McGraw, 2004). For many years, mobile devices have been supported by a number of security applications. Thus technical constraints have contributed to organizations and consumer’s confidence aimed at protecting user’s privacy. Besides, homogeneity and heterogeneity capabilities for mobile devices are designed to support enterprises and consumer’s requirements (Ubl, 2011; Rajapakse, 2008; Charland & LeRoux, 2011; Adam & Christ, 2011; Christ, 2011). In the modern time, the mobile industry has designed several technology product solutions to attract enterprises and consumers’ business and market attention. Nearly a decade ago, vendors designed commodity hardware and software appliances with embedded capabilities to leverage customer’s specifications (Chess, & McGraw, 2004; Burns, 2009). These characteristics include, but are not limited to customized commodity hardware and software appliance, developed to satisfy the user’s requirements (Ubl, 2011; Gartner, 2012; Mark, 2013). These features include: faster processing, improved memory and enough storage capacity designed to attract enterprises and consumers’ business/market interests. The homogeneity and heterogeneity features mobile devices offer, focused on supporting the enterprises and consumer’s business specifications (Fowler, & C. S., 2012; Burns, 2009; Christ, 2011).

Complete Chapter List

Search this Book:
Reset