Securing a Mobile World
ثبت نشده
چکیده
Introduction In August of 2011 Hewlett Packard, the world’s largest seller of PCs, confirmed it was looking to sell off its personal computing business—possibly getting out of the hardware game altogether and dropping its tablet and smartphone operations as well. This event along with IBM’s decision in 2004 to sell its PC business line to Lenovo, a China-based firm, is a harbinger that the low-margin PC business may not be worth pursuing. Concurrently the rise of alternatives to traditional PCs, the tablet(s), continues unabated—with forecasts through 2011 at 60 million tablets and in 2012 to be 90 million units [1]. There still will be over 100 million PCs sold worldwide for several years because people need them for certain tasks [2]. Many of the habits we associate with personal computers can be carried out with touchscreen and an Internet connection— done anywhere, and quickly. The iPhone has demonstrated what could be done with a relatively small device that could single task very well. With Android and Apple netbooks being circulated, this idea of a small, relatively inexpensive device connected to back-end services is the leading edge of a paradigm-shifting platform—along with the application layer in the private cloud [3]. According to Brodkin [4], “since the personal computer debuted in 1971, a Darwin-esque evolution process has lifted the PC from modest beginnings to its prevailing role as an indispensable part of life in the 21st century” ... “evolving from clunky commercial flops to slick, high-powered machines that play a vital role in our daily lives, both for work and play.” Personal computers have been the technology engine drivers from Intel to Microsoft to Dell to HP to Google to Facebook. But the rise of mobile computing is upending the technology business and is simultaneously redefining what is a personal computer and how we use it [1, 5]. This paper is a sector case study that seeks to examine the development, evolution, and diaspora of the personal computer. The remainder of this paper proceeds as follows. First, we present an overview of the IDT model and discuss innovation characteristics. Then we categorize the personal computer from multiple perspectives using this as a framework. Finally, we comment on the direction, durability, and mutations (the diaspora) of the personal computer using Ansoff’s model of diversification. Overview of Diffusion of Innovation Diffusion of innovation theory [6] describes the process through which new ideas, practices, or technologies are spread into a social system. According to Murray [7], diffusion of innovation theory holds that innovation diffusion is a general process, not bound by the type of innovation studied, by who the adopters are, or by place or culture, such that the process through which an innovation becomes diffused has universal applications to all fields that develop innovations. Diffusion is defined as the process in which an innovation is communicated through certain channels over time among the members of a social system. Innovation is an idea, practice, or object that is perceived as new by an individual or other unit of adoption. In addition, innovation also does not necessarily mean better or that the new idea is more beneficial to an individual. Whereas innovation can refer to something abstract, like an idea, it can also be concrete, like a new piece of technology. This article focuses specifically on the personal computer as a particular type of innovation of interest. Rogers [6, 8] suggested that there were/are four main elements in the diffusion process: • The innovation • The communication channels through which the innovation is diffused • Time • The social system
منابع مشابه
Securing AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملGroup Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey
Key management is equally important as compared to any other security measure such as encryption and authentication. With the growing usage of mobile devices and the advent of multicast communication, there has been a significant amount of work carried out in developing an optimum group key management protocol for mobile multicast systems. Key management is widely being adopted in securing grou...
متن کاملA Secure Integrated Model For Mobile Agent Migration (SIMMAM)
Migration of an agent involves various security problems especially in heterogeneous environment. Most of the reviewed studies for securing the mobile agent depended on one security technique. The proposed model integrates well known security techniques in four security levels: securing Mobile Agent Using Agent Factory & Blueprint, securing Mobile Agent Blueprint, securing Mobile Agent Migratio...
متن کاملFriendGuard: A Context-Awareness Mobile App Helps Securing College Female Safety
The prevalence of sexual harassment, sexual assaults and rapes has brought social attention across the world. US government, universities, companies and groups all make significant efforts preventing such events [1].To help reduce sexual affends and crimes, and help securing college female safety, we study the problems of existing safety apps, design and implement a new Android app FriendGuard....
متن کاملWhy Protection against Viruses, Bots, and Worms is so hard – Malware seen as Mobile Agents
Viruses, bots, worms, etc. are nothing else but mobile agents. Mobile agents in turn have been the scope of research in computer sciences for quite some years. Recently research on the security side of mobile agents has received increased attention, too. Perfectly securing mobile agents is generally impossible. While this is cumbersome for legitimate scenarios this is good news when trying to p...
متن کاملUsability vs. Security in Mobile Applications
The current state of communications and information technologies allows individuals to create, record and manage a virtual image, which many times is the mirror of a real one. And above this, it can be accessed from the World Wide Web. Despite the advantages, the situation generates security issues regarding social engineering attacks, sensitive and personal data theft because today users doesn...
متن کامل