Home > Articles

Top 10 Mobile Strategy Myths

Mobile technology offers companies tremendous opportunities to transform their business. However, there are many myths and misconceptions about how to embrace mobile technologies to win in the market. Dirk Nicol, author of Mobile Strategy, walks you through the top 10 mobile myths.
Like this article? We recommend

Mobile devices have become integrated into our daily lives and, as a result, enterprises see the tremendous opportunities for making their employees more productive, reaching new customers, and improving customer satisfaction. This, in turn, leads to improving the bottom line, generating new business models and transforming the way enterprises do business. However, mobile is different in many ways from typical IT efforts. Customers have higher expectations of speed and quality, and technologies are in constant flux. In the end, you need a comprehensive strategy that addresses market challenges and allows you to take advantage of the new opportunities around mobile.  Amidst all the excitement and constant change in the mobile industry, there are a number of commonly held mobile strategy misconceptions.  You can prevent strategic missteps by avoiding the following 10 mobile myths:

Myth: Native or web applications are  the only way to build a mobile app.
Fact: Hybrid apps can deliver the best of both native and web app capabilities.
As businesses approach their mobile app strategy, many times the assumption is that there are only two approaches—either web or native applications.  Mobile web applications have ubiquitous access because they can be rendered via any mobile browser, , yet mobile web apps lack some of the rich features of a native mobile app.  Native applications are built using the mobile device vendor’s SDKs and programming models.  To deliver a native application, the developer must use the unique programming model and language associated with the particular device operating environment.  This means that native applications are inherently non- portable across device platforms and can require unique and scarce skills.  However, with hybrid applications you have the best of both worlds.  Through open technologies, such as Apache Cordova, you can build your core logic in web technologies while leveraging native functionality of the device. Developers can mix re-usable HTML5 with native code in order to optimize for each platform’s best features.  So when you build your mobile strategy, consider the full spectrum of web, hybrid and native applications.

Myth: Quality expectations are the same for mobile and traditional applications.
Fact: Quality expectations are higher for mobile and require a different approach.
Enterprises see the tremendous value and opportunity around mobile.  However, the rapid change in technology and complexity of building mobile applications can make it a challenge for businesses to consistently build high quality mobile applications across multiple platforms. To compare mobile and traditional applications’ quality expectations, consider what happens when one visits a web page that not render properly—the individual simply refreshes the browser and thinks nothing of it.  However, with mobile, there is a very different expectation.  If an app does not perform well, the end user will likely delete the app, never to return again. In fact, a poor performing app can have a detrimental impact on a brand. According to Harris Interactive, 9 in 10 Americans associate negative feelings with regard to a brand that has poorly performing mobile experiences.  With app store reviews available for the entire world to see, it can be very difficult for a brand to recover from a poor quality app.  Companies need to build a mobile strategy that enables you to listen to your users and quickly improve an app based on feedback.   This means development teams need to move faster, be more agile and be able to quickly respond to user feedback.  The only way to accomplish this is to automate, orchestrate and drive all the inefficiency out of the dev and operations process. This is where the concept of DevOps (a methodology that emphasizes communication, collaboration and integration between development and operations teams) comes in. 

Myth: Testing across a handful of devices or emulators is all you need.
Fact: Mobile testing can be much more challenging than with traditional applications.
Testing for mobile devices is significantly more complicated than traditional application testing. It seems that every day a new mobile device is announced or a new version of an existing operating system is released. This apparent endless supply of mobile devices and technology is great for the consumer; however, this creates a challenge for a mobile development team trying to test for all the possible use cases. To maintain appropriate test coverage, as much as 20 percent of your devices may need to be replaced with new models each quarter. One should consider a broad set of techniques to help streamline and lower the cost of mobile testing.  The use of emulators and simulators early in the development process is critical.   Automated testing that works across device types should be used to reduce the cost and complexity of testing.  One may even consider using ‘device clouds’  access to get the widest variety of devices in order to obtain the right test coverage.

Myth: User experience and mobile security are unrelated.
Fact: It is important to understand how a security strategy will impact employee productivity.

Security is one of the top issues that come to mind when business leaders are considering a mobile strategy.  The issue of lost data or compromised network infrastructure can keep even the most experienced CIO up at night.  However, the entire BYOD (Bring Your Own Device, where employees use their own devices instead of corporate issued devices) movement is based on making employees more productive.  Therefore, if security features are too restrictive, it defeats the purpose of a mobile initiative that was designed to help employees get their jobs done more effectively.  When faced with burdensome security restrictions, users will often circumvent security controls, creating increased vulnerability, or abandon a program altogether.

It is best to find the right balance between security and user experience.  One approach is to include employees within a cross-organization taskforce where users are involved with the security policy definition process.  This way, the end user has a better understanding of the reasoning behind mobile security policies while sharing  feedback to help shape the user experience designed by the security team.

Myth: A mobile security strategy is successful if it stands the test of time.
Fact: You actually need an adaptive security strategy that is able to adjust as security threats and technology evolve. 

We are in early days with mobile technologies, and the market is in constant flux.  New devices are coming on the scene all the time with new technologies and platforms.  In addition, security threats are constantly changing.  With mobile tablet shipments predicted to exceed those of portable PCs, hackers are increasing their focus on mobile devices as a way to compromise both corporate and personal data.  In addition, mobile security best practices are relatively new and companies are evolving how to best approach mobile security.  Therefore,  you need to have an adaptive mobile strategy. You need to have the ability to monitor your networks, devices and apps in a way that allows for early detection of new threats, usage patterns and unusual traffic activity.  Incorporating a monitoring, scanning and analytics system that allows for early detection and then informs of how to adjust your security approach becomes important.

Myth: Securing the device is all that is needed in your mobile strategy.
Fact: You need a comprehensive strategy that deals with the device, network, app and how it fits in with your broader security systems.
It is important to have a holistic view of mobile security where one needs to consider more than just the device.  One needs a comprehensive view of the app, device and network.   Management software, such and MDM (Mobile Device Management), goes hand-in-hand with mobile security, ensuring the appropriate device settings are in place to align with security policies.  The device app needs to be managed with remote updates or even disablement of the app to ensure that the latest security features are in place.  You also need to monitor and manage the connection between the app and the enterprise so that one can prevent man-in-the-middle attacks or detect if the app has been tampered with.  This is where a mobile enterprise application platform can help (also known as an MEAP).  You also need to consider how your mobile security implementation fits in with your broader mobile strategy and your existing security infrastructure.   These considerations are all part of a comprehensive strategy.

Myth: Translation gives you a global mobile app strategy.
Fact: It is critical to consider the unique geographic characteristics of your audience.
It is easy to fall into the trap that your customers are only in the same geographic location as you are. You need to think globally and understand how mobility is different for them.  Even within a particular country, the rural and urban centers may have completely different technology requirements. The penetration of smartphones is not completely ubiquitous and, as such, some areas of the world may still be using traditional cell phones.  The way consumers get charged for services can be very different and can have a major impact on the way your customer experiences your app.  Pre-paid phones may be the norm, while in other locations monthly bills are typical.  Networks coverage and availability needs to be considered where it may not be practical to download large amounts of data and, instead, text messaging is more prominent. In the end, you need to have a global perspective and consider your audience and their unique requirements.

Myth: You need a separate strategy for mobile, cloud, social and big data.
Fact: Mobile, cloud, social and big data are reinforcing capabilities that are coming together to deliver new value for customers.
Social, cloud, big data and mobile (or SoCloDaMo pronounced So-Klow-Da-Mo) has begun to converge into a new IT delivery platform. It is driven by consumerization of IT, smaller budgets and an unending supply of connected smart devices. There is a growing interdependence and convergence between social networking behavior and mobile interactions, enabled by “around the clock” availability through cloud and big data. Social, cloud, big data and mobile come together to reinforce each other and when combined deliver greater value.  It enables your end users to interact with your business across multiple communication channels (also known as Omnichannel) whether it is PC, mobile phone, tablet, web site, kiosk, smart TV or any future device.  The reality is that a SoCloDaMo platform is here to stay and how the underlying technologies relate is critical to an overall mobile strategy.

Myth: The primary goal of a mobile strategy is to stay ahead of the competition.
Fact: If done right, a mobile strategy not only helps you stay ahead of the competition but can transform your business.
The mobile app empowers individuals with information in context of their daily tasks. Never before in human history have individuals had access to so much computing power and information at the tips of their fingers. Mobile technology can be used to transform your business by developing a deeper relationship with your customer, growing your brand and delivering better services.  The key to mobile transformation is to focus on bringing together context, intelligence and engagement to help your customers perform their tasks more efficiently and provide them with the next best action. Context allows your customer to interact with other people, the environment and past behavioral data in a particular moment.  Engagement is about delivering an easy and helpful user experience that weaves into your customer’s daily life.  Mobile intelligence is about leveraging the powerful computational resources of the device and the cloud at the moment of need.  This enables the end user to make the best possible choice to help complete their tasks.

As you can see, there are a wide variety of myths in the market place today around building a mobile strategy.  It requires a comprehensive approach that covers building mobile applications, security and mobile management, connecting to existing systems, extending your business and then transforming it.  With the right mobile platform married with the right strategy, you are on the path to transforming your business in an era of mobility.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020