Table 1 - uploaded by Harleen Flora
Content may be subject to copyright.
Mobile Application Types 

Mobile Application Types 

Source publication
Article
Full-text available
Swift advances in mobile communication technology have spawned almost unlimited new mobile applications. Mobile application development is an extremely well growing industry across the globe that created new opportunities of modern businesses and pioneered new technologies in the area. In order to build high quality mobile applications, it is imper...

Context in source publication

Context 1
... Application Types" are generally confused with "Mobile Application Categories". Table 1 and Table 2 below describe various "types" and "categories" implicated in the development of mobile apps [1]. The two tables are explained using suitable examples so as to clearly differentiate between types and categories. ...

Citations

... Empirical research was carried out by Moumane et al. [27] using a set of measures to assess the usability of mobile applications that are run on various mobile operating systems. Formerly, Flora et al. [28] investigated the most important characteristics that define mobile applications to facilitate the delivery of valuable user-friendly mobile apps to meet users' requirements. Méndez Porras et al. [29] performed a systematic literature review to identify and collect required evidence regarding automated testing of mobile applications. ...
Article
Full-text available
In the last decade, technical advancements and faster Internet speeds have also led to an increasing number of mobile devices and users. Thus, all contributors to society, whether young or old members, can use these mobile apps. The use of these apps eases our daily lives, and all customers who need any type of service can access it easily, comfortably, and efficiently through mobile apps. Particularly, Saudi Arabia greatly depends on digital services to assist people and visitors. Such mobile devices are used in organizing daily work schedules and services, particularly during two large occasions, Umrah and Hajj. However, pilgrims encounter mobile app issues such as slowness, conflict, unreliability, or user-unfriendliness. Pilgrims comment on these issues on mobile app platforms through reviews of their experiences with these digital services. Scholars have made several attempts to solve such mobile issues by reporting bugs or non-functional requirements by utilizing user comments. However, solving such issues is a great challenge, and the issues still exist. Therefore, this study aims to propose a hybrid deep learning model to classify and predict mobile app software issues encountered by millions of pilgrims during the Hajj and Umrah periods from the user perspective. Firstly, a dataset was constructed using user-generated comments from relevant mobile apps using natural language processing methods, including information extraction, the annotation process, and pre-processing steps, considering a multi-class classification problem. Then, several experiments were conducted using common machine learning classifiers, Artificial Neural Networks (ANN), Long Short-Term Memory (LSTM), and Convolutional Neural Network Long Short-Term Memory (CNN-LSTM) architectures, to examine the performance of the proposed model. Results show 96% in F1-score and accuracy, and the proposed model outperformed the mentioned models.
... Statistics confirm the rise in app usage noting that in 2016, 140.7 billion apps were downloaded, whereas in 2021, 230 billion apps were downloaded, marking a 63% increase [1]. The usage of mobile apps has unleashed new possibilities to users, who have at their disposal a variety of apps to choose from, such as health apps [2], communication apps, gamification apps or educational apps [3]. Despite the fact that specific functionalities of mobile apps, such as location-based and personalized services are useful, literature highlights important issues that have arisen regarding information privacy [4]. ...
Chapter
In a world where the industry of mobile applications (apps) is continuously expanding, the need for reinforcing users’ protection of information privacy is urgent. Focusing on this emerging need, this study aims at highlighting the main competencies that a user of mobile apps should hold in order to protect their information privacy. The contribution of the paper is threefold; First, it proposes a framework which describes the actions that users of mobile applications make before and after the installation of the application. Second, based on conceptual analysis, this study introduces a framework for the synthesis of the Information Privacy Competency Model for Users of Mobile Apps incorporating widely known personality theories namely Protection Motivation Theory and Big Personality Theory. Finally, synthesizes the results into indicative competencies that users of mobile apps should hold so as to be competent to protect their information privacy. This study offers important implications regarding privacy protection in mobile apps not only for users, but also for privacy researchers, online service providers and educators.
... Mobile Apps: Mobile applications are specialized software designed for mobile devices [19] . Educational apps can cover a wide range of subjects and learning styles, from language learning apps to interactive math games [20] . ...
Article
Full-text available
In recent years, due to the explosion of COVID-19, people's expectation for accessing personalized learning resources anytime and anywhere has become stronger. The features of m-learning such as accessibility and personalization greatly satisfy people's needs and are therefore widely used. In this paper, a study was conducted to investigate and analyze how m-learning can help prevent COVID-19. The study shows that m-learning can help disseminate outbreak-related messages and provide people with personalized knowledge, so that it can enhance public health and community safety. While there are still many challenges, m-learning remains a valuable tool for preventing and mitigating the spread of COVID-19 globally, and provides a solid reference for deepening m-learning development in the future.
... Mobile applications can also provide context-aware responses based on the user's location, time of use, or other factors. [1][2][3][4][5][6][7][8]. A mobile application is a software application designed specifically for use on small and wireless computing devices [9]. ...
Article
Full-text available
This paper develops a secure model for mobile government (M-G) applications using effective privacy methods and validates the model through semi-structured interviews with eight Jordanian e-government experts. The experts emphasized the importance of M-G applications in enhancing services such as bill payments, civil services, civil defense, and police services. To improve privacy, the experts suggested methods such as strong textual passwords, data encryption, login tracking, SMS login confirmation, and signup confirmation. Based on these suggestions, a prototype with suggested privacy features was developed using Android programming, and a questionnaire was administered to 150 Jordanian citizens who confirmed the ease of use and usefulness of the proposed privacy model. This paper expands the acceptance of M-G applications and recommends privacy methods to improve their security. The study highlights the importance of security and privacy as acceptance factors for M-G applications in developing countries and suggests that further studies can investigate advanced privacy and suitable security methods for M-G applications in other developing countries.
... Particularly, when new business models are explored in a highly competitive environment, development speed is more important than quality, which can lower the attractiveness of products [1]. At the same time, additional quality requirements arise through the trend of mobile application development [2,3]. It is now well documented that the task of testing software, for example, is perceived as uninteresting and rather boring, leading to poor software M. Eggert ( ) · P. M. Zähl · M. R. Wolf · M. Haase ...
Chapter
Software development projects often fail because of insufficient code quality. It is now well documented that the task of testing software, for example, is perceived as uninteresting and rather boring, leading to poor software quality and major challenges to software development companies. One promising approach to increase the motivation for considering software quality is the use of gamification. Initial research works already investigated the effects of gamification on software developers and come to promising. Nevertheless, a lack of results from field experiments exists, which motivates the chapter at hand. By conducting a gamification experiment with five student software projects and by interviewing the project members, the chapter provides insights into the changing programming behavior of information systems students when confronted with a leaderboard. The results reveal a motivational effect as well as a reduction of code smells.
... Unlike traditional (i.e., non-mobile) systems, mobile apps are highly user-centric and should support various portable devices. Additionally, they are more constrained in size, functionality, security, and resource/energy consumption [22]. For example, in Listing 1, the developer has to include additional code as a workaround to turn off the camera flash for different mobile devices (i.e., Samsung Galaxy and Samsung Behold II). ...
Preprint
Full-text available
Technical debt describes situations where developers write less-than-optimal code to meet project milestones. However, this debt accumulation often results in future developer effort to live with or fix these quality issues. To better manage this debt, developers may document their sub-optimal code as comments in the code (i.e., self-admitted technical debt or SATD). While prior research has investigated the occurrence and characteristics of SATD, this research has primarily focused on non-mobile systems. With millions of mobile applications (apps) in multiple genres available for end-users, there is a lack of research on sub-optimal code developers intentionally implement in mobile apps. In this study, we examine the occurrence and characteristics of SATD in 15,614 open-source Android apps. Our findings show that even though such apps contain occurrences of SATD, the volume per app (a median of 4) is lower than in non-mobile systems, with most debt categorized as Code Debt. Additionally, we identify typical elements in an app that are prone to intentional sub-optimal implementations. We envision our findings supporting researchers and tool vendors with building tools and techniques to support app developers with app maintenance.
... Mobile applications have not been examined sufficiently yet, even though they might offer significant advantages compared to existing urban platforms, e.g., geolocation and push messages. Mobile applications are classified by Flora (Flora et al. 2014) into four types of applications. ...
... Data might be uploaded later and downloaded if connected, to update e.g. news and discussions (Flora et al. 2014;Francese et al. 2017). ...
Conference Paper
Full-text available
As a result of the increasing requirements for urban planning, a paradigm shift towards citizen participation has evolved to collaboratively address enhancing urban challenges and social conflicts. Past projects have examined urban citizen participation processes and methods to support citizen participation. However, the challenges in the domain of informing, encouraging, and enabling participation at any time are not sufficiently examined and less attention was devoted to urban participation through mobile applications, even if required devices are widely used and can enable permanent communication channels between citizens and planning authorities. Therefore, a design science research project was initiated to examine how to design mobile applications to support citizen participation in urban planning projects. In this paper, the findings of the first cycle are presented including issues, meta-requirements, design principles, the development of a mock-up, and its evaluation to provide insight into the design of mobile applications for citizen participation.
... The first challenge fronted by developers in developing cloud-based mobile applications is to select a suitable cloud service provider. According to [45], approximate 96% of technology managers in the year 2018 opt to develop and deploy their applications using cloud solutions. In the cloud space, there are several cloud service providers, but most of them pale in comparison in terms of market share when compared to the big 3 -Google, Microsoft, and Amazon. ...
... As mentioned in [45], some location-dependent applications, such as food delivery applications or e-hailing applications, require frequent updates on users' geolocation. This concept brings about privacy concerns as most applications store these sensitive data in remote locations, which raises issues with regard to data security, data ownership and privacy matters. ...
Conference Paper
Full-text available
Nowadays, cloud technology is at the forefront of digital transformation as most companies are shifting their mobile applications to the cloud. Cloud Service Providers (CSP) facilitate this journey with a range of services that enables corporations to realize IT savings whilst improving productivity, product availability and agility. As the mobile era has channelled higher Internet consumption, many companies focus on developing applications to engage with consumers as well as for business use. Using cloud technology, developers are able to rapidly build and deploy scalable mobile applications capable of serving the needs of modern-age consumers. This research reviews the use of cloud computing in mobile application development and explores how it has acted as an enabler in the advancement of the mobile application domain.
... A good software should be able to make the user get easy in operating. They do not get confused and feel that this software is valuable for them (Flora et al., 2014). To add, this video maker application is easy to learn. ...
Article
Full-text available
This study aims at finding out the kindergarten teachers’ perspectives after joining digital training of Kinesmaster application to create video of learning. This study focused on the perspectives on the digital training and the application itself. By working on description in explaining the data, this study applied descriptive qualitative design. 20 teachers of kindergarten participated in this study by selecting them randomly. To gain the data, open-ended questionnaire was given to the participants and semi-structured interview was conducted to gain deeper data. The data were analyzed by sorting the responses of each questions and then confirmed to the transcribed interview data. Based on the analysis result, it was revealed that digital training was responded positively. Most of the teachers felt good during the training. This training was also assumed to be able to improve their teaching performance and creativity. The use of Kinemaster application in the training also got good feedback. It is considered as a good, complete, and easy to use. Therefore, this training is expected to be able to make teachers meet their teaching goals.
... More than 6 billion people in the world use mobile phones, making it the most common and rapidly adopted communication in history. This development has impacted internet usage Flora et al. (2014). Farman (2015), in his study, projected that within the next decade, more people worldwide would access broadband internet through mobile devices than they do via desktop and laptop. ...
... Approximately 10 million telephones were available in the entire world in 1910, and the U.S. accounted for about 70% of the telephones (Ling & Donner, 2018). According to Flora (2014), a handheld radio telephone service was envisioned in the early stages of radio engineering. ...
... Additionally, mobile devices have changed everyday life. In this context, mobile devices are not only used for fast interaction, but they are also used for shopping (Flora et al., 2014). Due to the advancement of technology and the emergence of the internet, online businesses have emerged. ...