Abstract
Smartphones offer a great opportunity to improve governmental procedures and services in terms of efficiency and user acceptance. Unfortunately, the heterogeneity of current smartphone platforms such as Apple iOS, Google Android, or Microsoft Windows Phone 8 renders the integration of smartphones into such governmental procedures and services difficult. The choice of the most appropriate smartphone platform is crucial for the security and success of smartphone based procedures and services. Making the correct choice is a difficult task as smartphone platforms are continuously evolving. Furthermore, requirements that need to be fulfilled by the chosen platform heavily depend on the particular use case.
To overcome this problem, this paper identifies use cases, in which smartphones can be used to improve governmental procedures and services. From these use cases, relevant platform properties are derived. These properties are then analyzed on current versions of the three smartphone platforms Android, iOS, and Windows Phone 8. Based on the results of this analysis, the platforms’ suitability for the identified use cases is assessed. This way, the paper provides responsible decision makers from governments and public administrations with a profound basis for choosing the correct smartphone platform for a given use case.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Zefferer, T., Teufl, P.: Opportunities and Forthcoming Challenges of Smartphone-based m-Government Services. Megatrends in eGovernment - European Journal of ePractice (2011)
Schwartz, M.: Zeus Botnet Eurograbber Steals $47 Million. InformationWeekSecurity (2012), http://www.informationweek.com/security/attacks/zeus-botnet-eurograbber-steals-47-millio/240143837
Yanqing, G.: E-Government: Definition, Goals, Benefits and Risks. In: Management and Service Science MASS 2010 International Conference, pp. 9–12 (2010)
Enck, W., Ongtang, M., McDaniel, P.: Understanding Android Security. IEEE Security Privacy Magazine 7, 50–57 (2009)
Woods, S.: Bring Your Own Device (BYOD) Increasingly Important to Small Business Budgets. Technorati (2013), http://technorati.com/business/small-business/article/bring-your-own-device-byod-increasingly
Enck, W., Octeau, D., Mcdaniel, P., Chaudhuri, S.: A Study of Android Application Security. USENIX Security, 935–936 (August 2011)
Lookout Mobile Security: 2011 Mobile Threat Report (2011), https://www.lookout.com/resources/reports/mobile-threat-report
Microsoft: Windows Phone 8 security and encryption (2013), http://www.windowsphone.com/en-US/business/security
Barrera, D., Kayacik, H., Mcdaniel, P., van Oorschot, P., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to android. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 73–84 (2010)
Felt, A.: Android Permissions: User Attention, Comprehension, and Behavior. Science and Technology, 1–16 (2012)
Rogers, M., Goadrich, M.: A hands-on comparison of iOS vs. android. In: Proceedings of the 43rd ACM Technical Symposium on Computer Science Education, SIGCSE 2012, pp. 663–663. ACM, New York (2012)
Renner, R., Moran, M., Hemani, Z., Thomas, E., Pio, H.S., Vargas, A.: A comparison of mobile GIS development options on smart phone platforms. In: Proceedings of the 2nd International Conference on Computing for Geospatial Research & Applications, COM.Geo 2011. ACM, New York (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zefferer, T., Kreuzhuber, S., Teufl, P. (2013). Assessing the Suitability of Current Smartphone Platforms for Mobile Government. In: Kő, A., Leitner, C., Leitold, H., Prosser, A. (eds) Technology-Enabled Innovation for Democracy, Government and Governance. EGOVIS/EDEM 2013. Lecture Notes in Computer Science, vol 8061. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40160-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-40160-2_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40159-6
Online ISBN: 978-3-642-40160-2
eBook Packages: Computer ScienceComputer Science (R0)