Security and native components in a hybrid application

Authors

DOI:

https://doi.org/10.35290/rcui.v10n1.2023.748

Keywords:

IT and development, mobile communication, internet, data protection, authentication

Abstract

The use of smart devices is increasing every day, and the development of mobile applications is increasingly in demand. Companies aware of this reality adapted their digital applications to incorporate these technologies. This work presents a hybrid application that integrates the mobile application to a set of functionalities of a previously built CRM module. The mobile application also contains a two-factor security component, which combines biometric authentication and knowledge authentication. In addition, the mobile application includes messaging and communication features with users, making use of the smartphone ecosystem. For project management, was used an agile method. A mobile application obtained in the operation phase is already in the Google Play Store. To validate the usability of the system a user survey was carried out. 71% consider the mobile application easy to use, and 78% use this to communicate with their clients.

Downloads

Download data is not yet available.

References

Acevedo, L., Chávarro, N., y Ramírez, J. (2019). Smartphones en el desempeño de los empleados de la gerencia de transmisión y distribución de EPM Empresas Públicas de Medellín [Tesis de Especialización, Corporación Universitaria Minuto de Dios Repositorio]. https://hdl.handle.net/10656/11480

Alanda, A., Satria, D., Mooduto, H., & Kurniawan, B. (2020). Mobile application security penetration testing based on OWASP. In IOP Conference Series: Materials Science and Engineering, 846(1). https://doi.org/10.1088/1757-899X/846/1/012036 DOI: https://doi.org/10.1088/1757-899X/846/1/012036

Ambler, S. (2018). AM throughout the XP lifecyle. Ambysoft Inc. http://www.agilemodeling.com/essays/agileModelingXPLifecycle.htm

Andriani, R., Wijayanti, S., & Wahyu, F. (2018). Comparison of AES 128, 192 And 256 Bit Algorithm for Encryption and Description File. En 2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE), (pp. 120-124). IEEE. https://doi.org/10.1109/ICITISEE.2018.8720983 DOI: https://doi.org/10.1109/ICITISEE.2018.8720983

Chen, Y., Wang, Q., Chen, H., Song, X., Tang, H., & Tian, M. (2019). An overview of augmented reality technology. Journal of Physics: Conference Series. 1237(2). https://doi.org/10.1088/1742-6596/1237/2/022082 DOI: https://doi.org/10.1088/1742-6596/1237/2/022082

Contreras, J., Peña, O., y Santillan, G. (2019). Aplicaciones híbridas para dispositivos móviles como herramienta en el sector empresarial. Revista Ciencia Administrativa, 5, 146 - 152.

Guo, Y., Yin, C., Li, M., Ren, X., & Liu, P. (2018). Mobile e-commerce recommendation system based on multi-source information fusion for sustainable e-business. Sustainability, 10(1), 147. https://doi.org/10.3390/su10010147 DOI: https://doi.org/10.3390/su10010147

Hidayat, R. (2014). Goods Expedition Information System Using ECRM Method to Improve Customer Service. Global Sisfotek Journal, 4(2), 41-45.

Ibáñez, A., Montesinos, M. C., Morales, C., y Pacheco, E. (2022). Uso de Dispositivos Electrónicos en las Actividades Laborales durante la Pandemia COVID-19. En Congreso Internacional de Investigación Academia Journals, (pp. 220-225). Academia Journals.

ISOTools Excellence. (s.f.). La norma ISO 9001 2015 ¿En que se basa el ciclo PHVA? https://www.isotools.com.co/la-norma-iso-9001-2015-se-basa-ciclo-phva/

Javaid, M., & Haleem, A. (2020). Virtual reality applications toward medical field. Clinical Epidemiology and Global Health, 8(2), 600-605. https://doi.org/10.1016/j.cegh.2019.12.010 DOI: https://doi.org/10.1016/j.cegh.2019.12.010

Karakaya, N., Alptekin, G. I., & İncel, Ö. (2019). Using behavioral biometric sensors of mobile phones for user authentication. Procedia Computer Science, 159, 475-484. https://doi.org/10.1016/j.procs.2019.09.202 DOI: https://doi.org/10.1016/j.procs.2019.09.202

Kulkarni, P. V., Rai, S., & Kale, R. (2020). Recommender system in elearning: a survey. In Springer (Ed.) Proceeding of International Conference on Computational Science and Applications, (pp. 119-126). https://doi.org/10.1007/978-981-15-0790-8_13 DOI: https://doi.org/10.1007/978-981-15-0790-8_13

Morales, A., y Aguado, C. (2022). Transformación digital en las empresas: Un enfoque desde la administración de la teoría a la práctica. Ecoe Ediciones.

Nayyar, A., Mahapatra, B., Le, D., & Suseendran, G. (2018). Virtual Reality (VR) & Augmented Reality (AR) technologies for tourism and hospitality industry. International journal of engineering & technology, 7(2), 156-160. DOI: https://doi.org/10.14419/ijet.v7i2.21.11858

O'Dea, S. (2021). Forecast number of mobile users worldwide from 2020 to 2025 (in billions). Statista https://www.statista.com/statistics/218984/number-of-global-mobile-users-since-2010.

Organización de Naciones Unidas para la Alimentación y Agricultura. (2015). Plantilla de buenas prácticas. FAO https://www.fao.org/3/as547s/as547s.pdf

Padeli, P., Mulyati, M., Faisal, M., & Debora, S. (2020). E-CRM Mobile Applications To Improve Customer Loyalty (Case Study: PT Supermal Karawaci). AptisiTransactions on Management (ATM), 4(1), 41-48. https://doi.org/10.33050/atm.v4i1.1083 DOI: https://doi.org/10.33050/atm.v4i1.1083

Ramírez, R. (2019). Métodos para el desarrollo de aplicaciones móviles. Universidad Oberta de Catalunya.

Ranjan, Y., Rashid, Z., Stewart, C., Conde, P., Begale, M., Verbeeck, D., Boettcher, S., Hyve, T., Dobson, R., Folarin, A., & Consortium, R.-C. (2019). RADAR-base: open source mobile health platform for collecting, monitoring, and analyzing data using sensors, wearables, and mobile devices. JMIR mHealth and uHealth, 7(8). https://doi.org/10.2196/11734 DOI: https://doi.org/10.2196/11734

Rodríguez, O., Legón, C., y Socorro, R. (2018). Seguridad y usabilidad de los esquemas y técnicas de autenticación gráfica. Revista Cubana de Ciencias Informáticas, 12, 13-27. http://scielo.sld.cu/scielo.php?pid=S2227-18992018000500002&script=sci_arttext&tlng=pt

Sadaf, S., Singh, V., & Iyappan, I. (2020). Robust biometric authentication system with a secure user template. Image and Vision Computing, 104. https://doi.org/10.1016/j.imavis.2020.104004 DOI: https://doi.org/10.1016/j.imavis.2020.104004

Sala, N. (2021). Virtual Reality, Augmented Reality, and Mixed Reality in Education: A Brief Overview. En Current and Prospective Applications of Virtual Reality in Higher Education, (pp. 48-73). IGI Global. https://doi.org/10.4018/978-1-7998-4960-5.ch003 DOI: https://doi.org/10.4018/978-1-7998-4960-5.ch003

Simram, S. (2020). Rest House Hybrid Mobile Application using Ionic Tool. International Research Journal of Engineering and Technology, 7(4), 45-50.

Tan, T. N., & Lee, H. (2019). High-secure fingerprint authentication system using ring-LWE cryptography. IEEE Access, 7, 23379-23387. https://doi.org/10.1109/ACCESS.2019.2899359 DOI: https://doi.org/10.1109/ACCESS.2019.2899359

Turek, M. (03 de agosto de 2016). Employees Say Smartphones Boost Productivity by 34 Percent: Frost & Sullivan Research. Insights samsung https://insights.samsung.com/2016/08/03/employees-say-smartphones-boost-productivity-by-34-percent-frost-sullivan-research/

Published

2023-01-10

How to Cite

Rivero Albarrán, D., Guerra Torrealba, L. R., & Molina Oñate, L. F. (2023). Security and native components in a hybrid application. UISRAEL SCIENTIFIC JOURNAL, 10(1), 131–150. https://doi.org/10.35290/rcui.v10n1.2023.748

Issue

Section

Articles