Conclusion
Mobile computing wasn’t any part of past, but it will dominate future.
Appendix
Appendix A: Mobile Computing Timeline of Key Events from 1894 through 1983 (Livingston)
Appendix B: Mobile Computing Timeline of Key Events from 2007 through 2010 (Ernst & Young “Mobile”)
Works Cited
Aldhizer, George R., III, and John R. Bowles, Jr. "Mitigating the Growing Threat to Sensitive Data: 21st Century Mobile Devices." The CPA Journal LXXXI.5 (2011): 58-63. Web. 30 Nov. 2014.
Baig, Edward. "Apple Pay: The Promise, Challenges Facing Digital Wallets." Detroit Free Press n.d.: n. pag. Detroit Free Press. 3 Oct. 2014. Web. 30 Nov. 2014
Chapungu, George. "Limitations of Mobile Computing." Web log post.Wells Digest. N.p., 1 Aug. 2013. Web. 30 Nov. 2014.
Chebyshev, Victor, and Roman Unuchek. "Mobile Malware Evolution: 2013." SECURELIST. Kaspersky Lab, 24 Feb. 2013. Web. 30 Nov. 2014.
Constantin, Lucian. "Security Analysis of Mobile Banking Apps Reveals Significant Weaknesses." PCWorld. IDG Consumer & SMB, 9 Jan. 2014. Web. 30 Nov. 2014.
Drew, Jeff. "Technology and CPAs: Visions of the Future." Journal of Accountancy. AICPA, June 2012. Web. 30 Nov. 2014.
Ernst & Young. Bring Your Own Device: Security and Risk Considerations for Your Mobile Device Program. Publication no. AU 1850. N.p.: EYGM, 2012. Print. Insights on Governance, Risk, and Compliance Collection.
Ernst & Young. Mobile Device Security: Understanding Vulnerabilities and Managing Risks. Publication no. AU1070. N.p.: EYGM, 2012. Print. Insights on Governance, Risk, and Compliance Collection.
Harris, William. "How Mobile Banking Works - HowStuffWorks."HowStuffWorks. InfoSpace LLC, n.d. Web. 30 Nov. 2014.
Livingston, David. "Introduction & History of Mobile Computing."Slideshare. Linkedin Corporation, 5 Dec. 2013. Web. 30 Nov. 2014.
Lundeen, Daniel. A Brief Discussion about Security Issues in the SMS World. Rep. N.p., n.d. Web. 30 Nov. 2014.
Martin, James. "Mobile Computing: PDAs vs. Smart Phones." TechHive. N.p., 26 Aug. 2004. Web. 30 Nov. 2014.
"Mobile Banking." Gemalto. N.p., n.d. Web. 30 Nov. 2014. .
Aldhizer, George R., III, and John R. Bowles, Jr. "Mitigating the Growing Threat to Sensitive Data: 21st Century Mobile Devices." The CPA Journal LXXXI.5 (2011): 58-63. Web. 30 Nov. 2014.
Baig, Edward. "Apple Pay: The Promise, Challenges Facing Digital Wallets." Detroit Free Press n.d.: n. pag. Detroit Free Press. 3 Oct. 2014. Web. 30 Nov. 2014
Chapungu, George. "Limitations of Mobile Computing." Web log post.Wells Digest. N.p., 1 Aug. 2013. Web. 30 Nov. 2014.
Chebyshev, Victor, and Roman Unuchek. "Mobile Malware Evolution: 2013." SECURELIST. Kaspersky Lab, 24 Feb. 2013. Web. 30 Nov. 2014.
Constantin, Lucian. "Security Analysis of Mobile Banking Apps Reveals Significant Weaknesses." PCWorld. IDG Consumer & SMB, 9 Jan. 2014. Web. 30 Nov. 2014.
Drew, Jeff. "Technology and CPAs: Visions of the Future." Journal of Accountancy. AICPA, June 2012. Web. 30 Nov. 2014.
Ernst & Young. Bring Your Own Device: Security and Risk Considerations for Your Mobile Device Program. Publication no. AU 1850. N.p.: EYGM, 2012. Print. Insights on Governance, Risk, and Compliance Collection.
Ernst & Young. Mobile Device Security: Understanding Vulnerabilities and Managing Risks. Publication no. AU1070. N.p.: EYGM, 2012. Print. Insights on Governance, Risk, and Compliance Collection.
Harris, William. "How Mobile Banking Works - HowStuffWorks."HowStuffWorks. InfoSpace LLC, n.d. Web. 30 Nov. 2014.
Livingston, David. "Introduction & History of Mobile Computing."Slideshare. Linkedin Corporation, 5 Dec. 2013. Web. 30 Nov. 2014.
Lundeen, Daniel. A Brief Discussion about Security Issues in the SMS World. Rep. N.p., n.d. Web. 30 Nov. 2014.
Martin, James. "Mobile Computing: PDAs vs. Smart Phones." TechHive. N.p., 26 Aug. 2004. Web. 30 Nov. 2014.
"Mobile Banking." Gemalto. N.p., n.d. Web. 30 Nov. 2014. .
Mobile Computing: A Study of Internal Auditors’ Awareness. Rep. Dallas Chapter Institute of Internal Auditors, 2013. Web. 30 Nov. 2014.
"Mobile Cyber-attacks Surge as Hackers Chase Banking Info." RT News. TV-Novosti, 22 Oct. 2014. Web. 30 Nov. 2014.
Newab, Ahmad. Mobile Commerce. Rep. Academia.edu, n.d. Web. 30 Nov. 2014.
Okoye, John. "How Mobile Computing Changed Business Strategy."Techopedia. Janalta Interactive Inc., 19 Sept. 2013. Web. 30 Nov. 2014.
Paro, Dwayne. WIRELESS APPLICATION PROTOCOL. Rep. SANS Institute, n.d. Web. 30 Nov. 2014.
"Phishing." TechTerms. N.p., n.d. Web. 30 Nov. 2014.
Rouse, Margaret. "Nomadic Computing (mobile Computing)." TechTarget. N.p., May 2007. Web. 30 Nov. 2014.
SHORT MESSAGE SERVICE SECURITY. Rep. The Government of the Hong Kong Special Administrative Region, Feb. 2008. Web. 1 Dec. 2014.
Androulidakis. "SMS Security Issues." Mobile Phone Security and Forensics a Practical Approach. New York: Springer, 2012. 65. Print.
Umar A. (P18-20). Mobile Computing and Wireless Communication. NGE Solutions.
2014 Cost of Data Breach Study: United States. Rep. Ponemon Institute, May 2014. Web. 30 Nov.2014.
Do'stlaringiz bilan baham: |