Advertisement

Assessing the Suitability of Current Smartphone Platforms for Mobile Government

  • Thomas Zefferer
  • Sandra Kreuzhuber
  • Peter Teufl
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8061)

Abstract

Smartphones offer a great opportunity to improve governmental procedures and services in terms of efficiency and user acceptance. Unfortunately, the heterogeneity of current smartphone platforms such as Apple iOS, Google Android, or Microsoft Windows Phone 8 renders the integration of smartphones into such governmental procedures and services difficult. The choice of the most appropriate smartphone platform is crucial for the security and success of smartphone based procedures and services. Making the correct choice is a difficult task as smartphone platforms are continuously evolving. Furthermore, requirements that need to be fulfilled by the chosen platform heavily depend on the particular use case.

To overcome this problem, this paper identifies use cases, in which smartphones can be used to improve governmental procedures and services. From these use cases, relevant platform properties are derived. These properties are then analyzed on current versions of the three smartphone platforms Android, iOS, and Windows Phone 8. Based on the results of this analysis, the platforms’ suitability for the identified use cases is assessed. This way, the paper provides responsible decision makers from governments and public administrations with a profound basis for choosing the correct smartphone platform for a given use case.

Keywords

Mobile government Smartphones Security Android iOS Windows Phone 8 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Zefferer, T., Teufl, P.: Opportunities and Forthcoming Challenges of Smartphone-based m-Government Services. Megatrends in eGovernment - European Journal of ePractice (2011)Google Scholar
  2. 2.
    Schwartz, M.: Zeus Botnet Eurograbber Steals $47 Million. InformationWeekSecurity (2012), http://www.informationweek.com/security/attacks/zeus-botnet-eurograbber-steals-47-millio/240143837
  3. 3.
    Yanqing, G.: E-Government: Definition, Goals, Benefits and Risks. In: Management and Service Science MASS 2010 International Conference, pp. 9–12 (2010)Google Scholar
  4. 4.
    Enck, W., Ongtang, M., McDaniel, P.: Understanding Android Security. IEEE Security Privacy Magazine 7, 50–57 (2009)CrossRefGoogle Scholar
  5. 5.
    Woods, S.: Bring Your Own Device (BYOD) Increasingly Important to Small Business Budgets. Technorati (2013), http://technorati.com/business/small-business/article/bring-your-own-device-byod-increasingly
  6. 6.
    Enck, W., Octeau, D., Mcdaniel, P., Chaudhuri, S.: A Study of Android Application Security. USENIX Security, 935–936 (August 2011)Google Scholar
  7. 7.
    Lookout Mobile Security: 2011 Mobile Threat Report (2011), https://www.lookout.com/resources/reports/mobile-threat-report
  8. 8.
    Microsoft: Windows Phone 8 security and encryption (2013), http://www.windowsphone.com/en-US/business/security
  9. 9.
    Barrera, D., Kayacik, H., Mcdaniel, P., van Oorschot, P., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to android. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 73–84 (2010)Google Scholar
  10. 10.
    Felt, A.: Android Permissions: User Attention, Comprehension, and Behavior. Science and Technology, 1–16 (2012)Google Scholar
  11. 11.
    Rogers, M., Goadrich, M.: A hands-on comparison of iOS vs. android. In: Proceedings of the 43rd ACM Technical Symposium on Computer Science Education, SIGCSE 2012, pp. 663–663. ACM, New York (2012)Google Scholar
  12. 12.
    Renner, R., Moran, M., Hemani, Z., Thomas, E., Pio, H.S., Vargas, A.: A comparison of mobile GIS development options on smart phone platforms. In: Proceedings of the 2nd International Conference on Computing for Geospatial Research & Applications, COM.Geo 2011. ACM, New York (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Thomas Zefferer
    • 1
  • Sandra Kreuzhuber
    • 1
  • Peter Teufl
    • 1
  1. 1.Secure Information Technology Center - AustriaGrazAustria

Personalised recommendations