Project Objective
The advancements in the field of technology have increased the opportunities for the organizations to compete more successfully in the market. The organizations are regularly shifting towards the enhancements of their technological resources for improving the performance. In order to shift towards these advancements, the organizations also have to face a number of challenges. Earlier, the organizations used to perform the business operations with the help of web-based applications.
But, in the present scenario, increasing use of smart phone has introduced the use of mobile technology into the business operations and processes (Rahimi et al, 2014). The aim of the paper is to propose a research work and the measures that will be adopted to complete it. The summary of the literature review has been offered from which the gaps and opportunities have been identified to propose the research question. Following that the methodology for the research work has been discussed along with a time schedule which is succeeded by the research limitation and summary of the paper to conclude the paper.
Project Objective
The objective of the discussed project is to gain an insight into the mobile computing with respect to the business world. It is aimed at identification of the enablers and constraints of the mobile computing adoption along with the measures that will offer the subject prominence over its traditional counterparts. The following points are the project objectives:
- To understand the concept of mobile computing
- To find out the challenges faced by the organizations at the time of adopting or after adopting mobile computing practices in the business operations.
- To access the opportunities of using mobile computing for the different type of businesses.
- To access the characteristics of mobile computing and the suitability of such characteristics as per the requirement of different businesses (Xue et al, 2016).
- To identify the challenges regarding the mobile computing for the different business firms
- To provide certain and appropriate solutions regarding the existing challenges that can help the organizations form any type of harm or misuse of data.
- To develop the total understanding of the latest mobile computing technology this is being used by different sector organizations successfully.
- To identify the technologies that can support the mobile computing in offering its full capability as a service to business organisation.
- To provide an appropriate base for the future research about the extended use of mobile computing and other technologies in the business (Vittapu et al, 2015).
Project Scope
The introduction of mobile computing has become essential for the business organizations due to the upgraded of technology day by day. The organizations are required to implement this particular technology in order to enhance the productivity of the employees and well as the capacity of the business operations. But, before implementing this technology, the management of an organization needs to access all the challenges and limitation to use mobile computing in the business along with its benefit over its competitors (Qi and Gani, 2012). Hence, the project will assist the corporate executive in understanding the benefits of adopting mobile computing while mitigating its constraints to leverage the technology.
Literature Review
The literature review that has been done earlier by the author revealed certain facts about the mobile computing and their operationalisation along with their role in the business enterprises. Based on the findings from reviewing the scholarly article by Pejovic and Musolesi (2015), it was identified that smartphones do not define the mobile computing rather falls under the umbrella of mobile computing. The discussed identification can be emphasised to state that mobile computing is vast technological advancement that needs to be assessed so that it can overcome the perception of the people (especially business enterprise) which limits the mobile computing to smartphone.
However, certain organisations are equipping the subject to enhance their business functionality such as the online food delivery organizations, cab booking sides, banking sector to provide banking services in an easy manner, multinational companies to mark the attendance of the employees and health controlling devices in form of watches and others (Mitra et al. 2015). However, it is still lacking the core functionality that non-portable computing services offer. Furthermore, a research by Adobe one of the software giants in a recent survey have summarised that 67% of the users prefer a mobile application over the traditional websites (Adobe.com 2018).
Project Scope
The claims made above have also been supported by Gikas and Grant (2013) who states that it will enable the business save organisational resources such as financial and others by reducing cost on hardware, software, maintenance along with similar other factors that are involved with traditional computing. Hence, it can be stated that a comparative analysis of the subject with its traditional counterpart is deem to understand the role that both of the computing genres can offer to its users. Additionally, whether or not the mobile computing can oversee the dominance of other forms of computing is also a fact that needs to be assessed.
Furthermore, the findings from reviewing the literary work has also revealed that there are certain crucial factors and principles that define the mobile computing (Shiraz et al 2014). Some of the most crucial of them are the mobility, interactivity, connectivity and individuality (Kim et al. 2013). Along with the above mentioned factors there are certain other challenges that are restricting the dominance of mobile computing and some of identified factors are the data protection, Cloud Service Model and architecture issues, communication channel issues, Mobile Computing Infrastructure Issues and others.
So, it would be justified to state that the discussed challenges are restricting the mass adoption of the mobile computing. Certain potential solutions were also identified that are capable of mitigating the constraints that are restricting the mass adoption of the mobile computing in the business environment. However, as stated by Eshet and Bouwman (2015), the threats are prominent because the malefactors are evolving themselves with the new security measures. So, to mitigate the constraints of mobile computing, it is of core importance that the certain security measures should be adopted that will evolve with time (Kumari 2014).
Machine learning and similar other developments may be a potential solution for the discussed threat (Wang et al. 2015). So, it can be emphasised to state the role of other technological developments that can increase the adoption of mobile computing for business purposes by mitigating the security and other threats is a matter of discussion that needs assessment.
Research Questions
Based on the summary of the literature review certain gaps have been identified and based on the gaps the research question for the proposed research work have been listed as below. The primary objective of the research work is identification of the characteristics that offer it dominance over its traditional counterpart and which businesses will it suit the most.
- Which characteristics can offer mobile computing dominance over its traditional counterpart and which businesses will it suit the most?
- What are the factors (both enabler and constraints) that influence the perception of the business owners towards adoption of mobile computing?
- What are the technological advancements that can support the mobile computing and make it more suitable for the business adoption?
- Research Design and Methodology
The research work in discussion will adopt both the qualitative and quantitative data for data collection. The quantitative data will be collected by sending a research questionnaire to different organisations (both who the users and non-users of mobile computing) and mobile computing professionals. The selected population will offer accuracy and reliability of the collected data because of their experience with and knowledge about the subject (Lee et al. 2014). Furthermore, as the questionnaire will contain closed-ended questions, it will ensure that the collected data are relevant.
The questionnaire will be developed using google forms and it will be distributed electronically. The sample size is aimed to stay in between 50 to 200. Likelihood sampling method will be adopted for sampling of data and will equip IBM SPSS and MS Excel to store and analyse the collected data. The frequency tables and crosstabs will be used to summarise on the findings.
Literature Review
The findings from the quantitative data will be summarised to develop questions for the qualitative data collection. The questions will be open ended and hence might cite some new lights to the topic of discussion. Post development of the questions appointments with certain mobile computing professionals and business owners will be scheduled. The meeting may be face to face or may happen through VoIP (Voice over IP) such as telephone, email, video call or other similar means (Lewis 2015). The sample size for the collected data is aimed to range between 5 to 20. The collected data will then be analysed using thematic analysis by identifying the patterns & variables. Finally, critical thinking will be adopted to summarise findings from both the collected data to conclude on the paper.
Research Limitations
The research will be limited to the region of research because the data for the proposed work will be collected from the businesses and professionals of the region and cannot be considered for a global region. The limited budget and approach are the reason for limiting the research work to the region of research. Furthermore, the primary aim of the paper is to identify to gain an insight into the mobile computing and its characteristics along with the enablers and constraints that decides the adoption of the subject. It will leave a gap for the mitigation tools and techniques that will neutralise the constraints of the subject’s adoption in businesses.
Time Schedule
Task Name |
Duration |
Start |
Finish |
Predecessors |
Phase 1: Initialisation |
15 days |
Thu 23-08-18 |
Wed 12-09-18 |
|
Topic selection |
2 days |
Thu 23-08-18 |
Fri 24-08-18 |
|
Background establishment |
5 days |
Mon 27-08-18 |
Fri 31-08-18 |
2 |
Brainstorming |
2 days |
Mon 03-09-18 |
Tue 04-09-18 |
3 |
Preliminary review |
4 days |
Wed 05-09-18 |
Mon 10-09-18 |
4 |
Research objectives and questions |
2 days |
Tue 11-09-18 |
Wed 12-09-18 |
5 |
Phase 2: Planning |
11 days |
Thu 13-09-18 |
Thu 27-09-18 |
|
Timeline |
5 days |
Thu 13-09-18 |
Wed 19-09-18 |
6 |
Budget |
3 days |
Thu 20-09-18 |
Mon 24-09-18 |
8 |
Drafting Research Paper |
2 days |
Tue 25-09-18 |
Wed 26-09-18 |
9 |
Draft Completed |
0 days |
Mon 24-09-18 |
Mon 24-09-18 |
9 |
Proposal Submission |
1 day |
Thu 27-09-18 |
Thu 27-09-18 |
10 |
Phase 3: Execution |
41 days |
Fri 28-09-18 |
Fri 23-11-18 |
|
Literature review |
10 days |
Fri 28-09-18 |
Thu 11-10-18 |
12 |
Summarising Literature finding |
5 days |
Fri 12-10-18 |
Thu 18-10-18 |
14 |
Developing questionnaire |
2 days |
Fri 19-10-18 |
Mon 22-10-18 |
15 |
Collection of quantitative data |
5 days |
Tue 23-10-18 |
Mon 29-10-18 |
16 |
Summarising quantitative data |
6 days |
Tue 30-10-18 |
Tue 06-11-18 |
17 |
Collection of Qualitative data |
8 days |
Wed 07-11-18 |
Fri 16-11-18 |
18 |
Summarising Qualitative Data |
5 days |
Mon 19-11-18 |
Fri 23-11-18 |
19 |
Phase 4: Analysis |
23 days |
Mon 26-11-18 |
Wed 26-12-18 |
|
Summarising all data |
10 days |
Mon 26-11-18 |
Fri 07-12-18 |
15,18,20 |
Concluding |
8 days |
Mon 10-12-18 |
Wed 19-12-18 |
22 |
Report Development |
5 days |
Thu 20-12-18 |
Wed 26-12-18 |
23 |
Report Completed |
0 days |
Wed 26-12-18 |
Wed 26-12-18 |
23,24 |
Phase 5: Closure |
14 days |
Thu 27-12-18 |
Tue 15-01-19 |
|
Submission of Report |
4 days |
Thu 27-12-18 |
Tue 01-01-19 |
24 |
Oral Presentation |
10 days |
Wed 02-01-19 |
Tue 15-01-19 |
27 |
Conclusion
The proposal could be emphasized to state that mobile computing is emerging as a major technology that is offering major benefits. However, the businesses are restricting themselves from adopting the technology for business applications. Hence, the proposed research is aimed at gaining an insight into mobile computing and its characteristics along with identification of enablers and constraints of mobile computing adoption in businesses. To attain the discussed objective both the qualitative and quantitative data will be collected.
The quantitative data will be collected through online questionnaire and qualitative data will be collected through interviews. The sample format of questionnaire has been attached in the appendix section which also provides a Gantt chart to reflect the timeline of the project. Hence, in conclusion it can be stated that mobile computing is an emerging technology but it can be leveraged only after identification of certain aspects and the proposed project is aimed at identifying those aspects.
Reference List
Eshet, E. and Bouwman, H. (2015) Addressing the Context of Use in Mobile Computing: a Survey on the State of the Practice. Interacting with Computers, 27(4), pp.392-412.
Gikas, J. and Grant, M.M. (2013) Mobile computing devices in higher education: Student perspectives on learning with cell phones, smartphones & social media. The Internet and Higher Education, 19(1), pp.18-26.
Kumari, K.B., 2014. Challenging Issues and Limitations of Mobile Computing. Compusoft, 3(2), p.554.
Lee, S., Abecasis, G.R., Boehnke, M. and Lin, X., 2014. Rare-variant association analysis: study designs and statistical tests. The American Journal of Human Genetics, 95(1), pp.5-23.
Lewis, S., 2015. Qualitative inquiry and research design: Choosing among five approaches. Health promotion practice, 16(4), pp.473-475.
Mitra, K., Zaslavsky, A. and Åhlund, C., (2015). Context-aware QoE modeling, measurement, and prediction in mobile computing systems. IEEE Transactions on Mobile Computing, 14(5), pp.920-936.
Pejovic, V. and Musolesi, M. (2015) Anticipatory mobile computing: A survey of the state of the art and research challenges. ACM Computing Surveys (CSUR), 47(3), p.47.
Qi, H. and Gani, A., 2012, May. Research on mobile cloud computing: Review, trend and perspectives. In Digital Information and Communication Technology and it’s Applications (DICTAP), 2012 Second International Conference on (pp. 195-202).
Rahimi, M.R., Ren, J., Liu, C.H., Vasilakos, A.V. and Venkatasubramanian, N. (2014) Mobile cloud computing: A survey, state of art and future directions. Mobile Networks and Applications, 19(2), pp.133-143.
Vittapu, M.S., Sunkari, V., Abate, A.Y. and Sreenivas, N., 2015. A proposed solution to secure MCC uprising issue and challenges in the domain of cyber security. Open Journal of Mobile Computing and Cloud Computing, 2(1), pp.19-33.
Wang, Y., Chen, R. and Wang, D.C. (2015) A survey of mobile cloud computing applications: perspectives and challenges. Wireless Personal Communications, 80(4), pp.1607-1623.