Kriativ-techVolume 1, Issue 7, April 2018, Pages: xxxReceived: Nov. 28, 2017;Accepted: Dec. 8, 2017;Published: Feb. 24, 2018


Isabel Alvarez,Professora Coordenadora no ISTEC



To cite this article

Isabel Alvarez, Um estudo sobre o sistema operativo iOS da Apple


The emergence of the smartphone as a highly complex technology was accompanied by mobile operating systems (OS), large developer communities, content providers and complex networks, forming together digital infrastructures. These smartphones have become powerful devices being basically miniature versions of personal computers. Multiple factors have had a significant effect on the evolution of these platforms including graphical user interfaces, development platforms, business models and value extraction principles. However, the growing popularity and sophistication of smartphones has also heightened concern about the privacy of users using these devices.


mobile operating systems, smartphones, iOS, mobile applications, data security.


[1] Y. Yoo, "Computing in Everyday Life: A Call for Research on Experiential Computing," MIS Quarterly, vol. 34, pp. 213-231, 2010.[2] D. Tilson, K. Lyytinen, and C. Sørensen, "Digital Infrastructures: The Missing IS Research Agenda," Information Systems Research, vol. 21, pp. 748-759, December 2010.[3] M. Needham and N. Rich, "Psion the Organiser," Accountancy, vol. 100, pp. 137-138, 1987.[4] J. E. Vascellaro and A. Sharma, "Google's Android Has Phone Debut via T-Mobile," Wall Street Journal - Eastern Edition, vol. 252, p. B3, 2008.[5] Gartner, "Gartner Highlights Key Predictions for IT Organizations and Users in 2010 and Beyond," 2010.[6] K. Lyytinen and Y. Yoo, "Research Commentary: The Next Wave of Nomadic Computing," Information Systems Research, vol. 13, pp. 377-388, 2002.[7] D. Tilson, C. Sorensen and K. Lyytinen, “Change and Control Paradoxes in Mobile Infrastructure Innovation – The Android and iOS Mobile Operating Systems Cases”, 45th Hawaii International Conference on System Sciences, 2012[8] O. Hanseth and K. Lyytinen, "Design theory for dynamic complexity in information infrastructures: the case of building internet," Journal of Information Technology vol. 25, pp. 1-19, 2010.[9] Y. Yoo, O. Henfridsson, and K. Lyytinen, "The New Organizing Logic of Digital Innovation: An Agenda for Information Systems Research," Information Systems Research, vol. 21, pp. 724-735, 2010.[10] A. Tiwana, B. Konsynsky, and A. A. Bush, "Platform Evolution: Coevolution of Platform Architecture, Governance, and Environmental Dynamics," Information Systems Research, vol. 21, pp. 675-687, 2010.[11] Manuel Egele, Cristopher Kruegel, EnginKirda and Giovanni Vigna, “PiOS: Detecting Privacy Leaks in iOS Applications”, NDSS Symposium 2011[12] iPhone Developer Program License Agreement. iphone dev agr.pdf.[13] Gartner Newsroom. Competitive Landscape: Mobile Devices, Worldwide, 2Q10. it/page.jsp?id=1421013, 2010.[14] A. Ghazawneh and O. Henfridsson, "Governing ThirdParty Development Through Plaform Boundary Resources," in ICIS, 2010, p. Paper 48.[15] T. P. Hughes, Networks of power: electrification in Western society, 1880-1930. Baltimore, Maryland: John Hopkins University Press, 1983.[16] D. Tilson, "The interrelationships between technical standards and industry structures: Actor-network based case studies of the mobile wireless and television industries in the US and the UK ": Ph.D Thesis, Case Western Reserve University, 2008.[17] P. N. Edwards, S. J. Jackson, G. C. Bowker, and C. P. Knobel, "Understanding Infrastructure: Dynamics, Tensions, and Design," 2007, p. Report of a Workshop on "History & Theory of Infrastructure: Lessons for New Scientific Cyberinfrastructures".[18] Tobias Dehling, Fangjian Gao, Stefan Schneider and Ali Sunayev, “Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android”, JMIR mHealth and uHealth, 2015[19] [Accessed: 13 November 2013][20] Wired. Apple Approves, Pulls Flashlight App with Hidden Tethering Mode. http: // apple-approves-pulls-flashlight% 2dapp-with-hidden-tethering-mode/.[21] [Accessed: 13 November 2013][22] J. Conway and A. Hillegass, iPhone Programming: The Big Nerd Ranch Guide (Big Nerd Ranch Guides), Addison-Wesley, 2010.