{"id":66015,"date":"2018-09-18T10:14:08","date_gmt":"2018-09-18T10:14:08","guid":{"rendered":"http:\/\/www.kriativ-tech.com\/?p=66015"},"modified":"2019-01-04T09:42:31","modified_gmt":"2019-01-04T09:42:31","slug":"66015","status":"publish","type":"post","link":"http:\/\/www.kriativ-tech.com\/?p=66015","title":{"rendered":"Um estudo sobre o sistema operativo iOS da Apple"},"content":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; text_font=&#8221;font-213936&#8243;]Kriativ-tech<br \/>\nVolume 1, Issue 7, April 2018, Pages: xxx<br \/>\nReceived: Nov. 28, 2017;<\/p>\n<p>Accepted: Dec. 8, 2017;<\/p>\n<p>Published: Feb. 24, 2018[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Authors[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243;]Isabel Alvarez,Professora Coordenadora no ISTEC[\/vc_custom_heading][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading]Media[\/vc_custom_heading][vc_button button_color=&#8221;accent&#8221; border_animation=&#8221;btn-ripple-out&#8221; border_width=&#8221;0&#8243; link=&#8221;url:http%3A%2F%2Fwww.kriativ-tech.com%2Fwp-content%2Fuploads%2F2018%2F02%2FISABELALVAREZEDICAO7.pdf||target:%20_blank|&#8221;]PDF[\/vc_button][vc_custom_heading heading_semantic=&#8221;h4&#8243; text_size=&#8221;h4&#8243;]To cite this article[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h6&#8243;]<\/p>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Isabel Alvarez,\u00a0Um estudo sobre o sistema operativo iOS da Apple<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>DOI:10.31112\/kriativ-tech-2018-01-20[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;1&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;1&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Abstract[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; text_font=&#8221;font-213936&#8243;]The emergence of the smartphone as a highly complex technology was accompanied by mobile operating systems (OS), large developer communities, content providers and complex networks, forming together digital infrastructures. These smartphones have become powerful devices being basically miniature versions of personal computers. Multiple factors have had a significant effect on the evolution of these platforms including graphical user interfaces, development platforms, business models and value extraction principles. However, the growing popularity and sophistication of smartphones has also heightened concern about the privacy of users using these devices.[\/vc_custom_heading][vc_empty_space empty_h=&#8221;2&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Keywords[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243;]<\/p>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>mobile operating systems, smartphones, iOS, mobile applications, data security.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row][vc_column column_width_percent=&#8221;100&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]References[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; text_font=&#8221;font-213936&#8243;]<\/p>\n<div class=\"page\" title=\"Page 11\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>[1] Y. Yoo, &#8220;Computing in Everyday Life: A Call for Research on Experiential Computing,&#8221; MIS Quarterly, vol. 34, pp. 213-231, 2010.<\/p>\n<p>[2] D. Tilson, K. Lyytinen, and C. S\u00f8rensen, &#8220;Digital Infrastructures: The Missing IS Research Agenda,&#8221; Information Systems Research, vol. 21, pp. 748-759, December 2010.<\/p>\n<p>[3] M. Needham and N. Rich, &#8220;Psion the Organiser,&#8221; Accountancy, vol. 100, pp. 137-138, 1987.<\/p>\n<p>[4] J. E. Vascellaro and A. Sharma, &#8220;Google&#8217;s Android Has Phone Debut via T-Mobile,&#8221; Wall Street Journal &#8211; Eastern Edition, vol. 252, p. B3, 2008.<\/p>\n<p>[5] Gartner, &#8220;Gartner Highlights Key Predictions for IT Organizations and Users in 2010 and Beyond,&#8221; 2010.<\/p>\n<p>[6] K. Lyytinen and Y. Yoo, &#8220;Research Commentary: The Next Wave of Nomadic Computing,&#8221; Information Systems Research, vol. 13, pp. 377-388, 2002.<\/p>\n<p>[7] D. Tilson, C. Sorensen and K. Lyytinen, \u201cChange and Control Paradoxes in Mobile Infrastructure Innovation \u2013 The Android and iOS Mobile Operating Systems Cases\u201d, 45th Hawaii International Conference on System Sciences, 2012<\/p>\n<p>[8] O. Hanseth and K. Lyytinen, &#8220;Design theory for dynamic complexity in information infrastructures: the case of building internet,&#8221; Journal of Information Technology vol. 25, pp. 1-19, 2010.<\/p>\n<p>[9] Y. Yoo, O. Henfridsson, and K. Lyytinen, &#8220;The New Organizing Logic of Digital Innovation: An Agenda for Information Systems Research,&#8221; Information Systems Research, vol. 21, pp. 724-735, 2010.<\/p>\n<p>[10] A. Tiwana, B. Konsynsky, and A. A. Bush, &#8220;Platform Evolution: Coevolution of Platform Architecture, Governance, and Environmental Dynamics,&#8221; Information Systems Research, vol. 21, pp. 675-687, 2010.<\/p>\n<p>[11] Manuel Egele, Cristopher Kruegel, EnginKirda and Giovanni Vigna, \u201cPiOS: Detecting Privacy Leaks in iOS Applications\u201d, NDSS Symposium 2011<\/p>\n<p>[12] iPhone Developer Program License Agreement. http:\/\/www.eff.org\/files\/20100302 iphone dev agr.pdf.<\/p>\n<p>[13] Gartner Newsroom. Competitive Landscape: Mobile Devices, Worldwide, 2Q10. http:\/\/www.gartner.com\/ it\/page.jsp?id=1421013, 2010.<\/p>\n<p>[14] A. Ghazawneh and O. Henfridsson, &#8220;Governing ThirdParty Development Through Plaform Boundary Resources,&#8221; in ICIS, 2010, p. Paper 48.<\/p>\n<p>[15] T. P. Hughes, Networks of power: electrification in Western society, 1880-1930. Baltimore, Maryland: John Hopkins University Press, 1983.<\/p>\n<p>[16] D. Tilson, &#8220;The interrelationships between technical standards and industry structures: Actor-network based case studies of the mobile wireless and television industries in the US and the UK &#8220;: Ph.D Thesis, Case Western Reserve University, 2008.<\/p>\n<p>[17] P. N. Edwards, S. J. Jackson, G. C. Bowker, and C. P. Knobel, &#8220;Understanding Infrastructure: Dynamics, Tensions, and Design,&#8221; 2007, p. Report of a Workshop on &#8220;History &amp; Theory of Infrastructure: Lessons for New Scientific Cyberinfrastructures&#8221;.<\/p>\n<p>[18] Tobias Dehling, Fangjian Gao, Stefan Schneider and Ali Sunayev, \u201cExploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android\u201d, JMIR mHealth and uHealth, 2015<\/p>\n<p>[19] http:\/\/www.apple.com\/pr\/library\/2007\/01\/09Apple-Reinvents-thePhone-with-iPhone.html [Accessed: 13 November 2013]<\/p>\n<p>[20] Wired. Apple Approves, Pulls Flashlight App with Hidden Tethering Mode. http: \/\/www.wired.com\/gadgetlab\/2010\/07\/ apple-approves-pulls-flashlight% 2dapp-with-hidden-tethering-mode\/.<\/p>\n<p>[21] https:\/\/developer.apple.com\/ [Accessed: 13 November 2013]<\/p>\n<p>[22] J. Conway and A. Hillegass, iPhone Programming: The Big Nerd Ranch Guide (Big Nerd Ranch Guides), Addison-Wesley, 2010.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_custom_heading][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Author: Isabel Alvarez<br \/>\nDOI: 10.31112\/kriativ-tech-2018-01-20<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[67],"tags":[],"_links":{"self":[{"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66015"}],"collection":[{"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=66015"}],"version-history":[{"count":7,"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66015\/revisions"}],"predecessor-version":[{"id":66057,"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66015\/revisions\/66057"}],"wp:attachment":[{"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=66015"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=66015"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=66015"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}