[go: up one dir, main page]

0% found this document useful (0 votes)
15 views4 pages

Sruthi - Practical Connection Assignment

Uploaded by

omairaomuse
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views4 pages

Sruthi - Practical Connection Assignment

Uploaded by

omairaomuse
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1

Info Tech & Mobile Application

Info Tech & Mobile Application

Sruthi Gujjarlapudi

Info Tech & Mobile Application

ITS-537-M53

Professor Imad Al Saeed

University of the Cumberlands

July 19th, 2024


2

Info Tech & Mobile Application

Info Tech & Mobile Application


The concepts learnt from the Info Tech & Mobile Application course have equipped

me with a good background knowledge on the issues and possibilities in mobile application

development bearing in mind that I am still a learner. I have learnt the theoretical concepts

that connect and explain the Mobile application design, Security and user experiences via this

course. For example, principles like secure-code, and, privacy can form the basic guidelines

on how mobile applications should not only be functional but also secure, with respect to the

user’s confidentiality as well as their personal data. Balapour et al. (2020) concluded that the

perceived privacy influences the security perceptions to mobile applications among the users.

As such, the role of incorporating sound security measures in the app development process

cannot be overrated, and the job of securing users’ data and enhancing credibility.

Thus, practically, it could be realized that learning in this course enabled the students

to effectively apply their skills in a number of contexts in a professional environment. For

instance when there is a workout for Internship or as part of a particular project, one may

apply the knowledge of secure coding practices and improve the applications’ security to

resist the identified vulnerabilities. This would entail the use of security measures such as

encryption, secure forms of authentication and durationly security check to ensure that the

flow of unauthorized persons and unauthorized access was avoided. These practices resonate

with Balapour et al. ’s (2020) study on the relationship between perceived privacy and user

trust. Thus, it is possible to say that the outcome of such an approach is the ability to

contribute to the construction of safe and reliable mobile applications for the commercial

sector.

Moreover, practical knowledge obtained within this course is also essential to

comprehend the definition of User Experience (UX) in design of mob apps. Specially, the
3

Info Tech & Mobile Application

course highlights usability and creates main focus on the creation of clear and easily

understandable interfaces to improve the usage of an app. In a practical sense this could entail

activities in relation to user persona creation, usability testing or successive improvements.

Stable UX design enhances the satisfaction level of the user in addition to adding value to the

use of the product, therefore they stick to the product. In Balapour et al. (2020), the authors

stress out that the perceived privacy affects users’ experience concerning the mobile

applications, which supports the importance of addressing both security weaknesses and

usability issues to satisfy users.

Finally, the information introduced to learners in this course may be very useful for

further careers in the sphere of mobile application development. No matter creating new

applications or improving the existing ones, it is crucial to get detailed information

concerning the theoretical and practical aspects of the mobile app technology. For example,

one would be able to implement the principles that have been learnt in creating functional as

well as secure as well as user-oriented applications. As one pays attention to the evolving

mobile technology as well as appreciating the theories and practices attached to it from the

course, one can be of great help in development of solutions in solving real life problems and

ensure they fit the required standard in the industry..


4

Info Tech & Mobile Application

References

Balapour, A., Nikkhah, H. R., & Sabherwal, R. (2020). Mobile application security: Role of

perceived privacy as the predictor of security perceptions. International Journal of

Information Management, 52, 102063.

https://doi.org/10.1016/j.ijinfomgt.2019.102063

You might also like