Abstract
Enterprises are implementing mobile technologies for various business applications including Enterprise Systems to rise the flexibility and to gain sustainable competitive advantage. At the same time, the end users are exposed to security issues when using the mobile technologies. The Enterprise Systems have seen breaches and malicious intrusions thereby more sophisticated recreational as well as commercial cybercrimes have been witnessed. This paper examines the impacts of users’ attitude towards perceived security of Enterprise systems (ES) mobility. Considering the significance of security in Enterprise Systems mobility, a conceptual model is evolved from the literature and the study proposes to validate the model by empirically collecting data from users of ES mobile systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wong, T.Y.T., Peko, G., Sundaram, D., Piramuthu, S.: Mobile environments and innovation co-creation processes & ecosystems. Inf. Manag. 53, 336–344 (2016)
Turnali, K.: The enterprise mobile business intelligence framework. Bus. Intell. J. 23, 46–58 (2018)
Sahd, L.-M.: Significant risks relating to mobile technology. J. Econ. Financ. Sci. 9, 291–309 (2016)
Opara, E.U., Etnyre, V.: Enterprise systems network: SecurID solutions, the authentication to global security systems. J. Int. Technol. Inf. Manag. 19, 21–35 (2010)
Prislan, K.: Efficiency of corporate security systems in managing information threats: an overview of the current situation. Varstvoslovje 16, 128–136 (2016)
Zhaohao, S., Kenneth, S., Sally, F.: Business analytics-based enterprise information systems. J. Comput. Inf. Syst. 57, 169–178 (2017)
Demirkan, H., Delen, D.: Leveraging the capabilities of service-oriented decision support systems: putting analytics and big data in cloud. Decis. Support Syst. 55, 412–421 (2013)
Zeithaml, V.A.: Consumer perceptions of price, quality and value: a means-end model and synthesis of evidence. J. Mark. 52, 2–22 (1988)
Rau, P.L.P., Gao, F., Zhang, Y.: Perceived mobile information security and adoption of mobile payment services in China. Int. J. Mob. Hum. Comput. Interact. 9, 1179–1198 (2017)
Kim, C., Tao, W., Shin, N., Kim, K.S.: An empirical study of customers’ perceptions of security and trust in e-payment systems. J. Electron. Commer. Res. Appl. 9(1), 84–95 (2010)
Jung, Y., Kim, M., Masoumzadeh, A., Joshi, J.: A survey of security issue in multi-agent systems. Artif. Intell. Rev. 37, 239–260 (2012)
MacKenzie, S.B., Lutz, R.J.: An empirical examination of the structural antecedents of attitude toward the ad in an advertising pretest context. J. Mark. 53, 48–65 (1989)
Amen, U.: Consumer attitude towards mobile advertising. Interdiscip. J. Contemp. Res. Bus. 2, 75–87 (2010)
Hartwick, J., Barki, H.: Measuring user participation, user involvement, and user attitude. MIS Q. 18, 59–82 (1994)
Ladan, M.I.: A review and a classifications of mobile cloud computing security issues. In: International Conference on Cyber Warfare and Security, p. 214 (2016). https://search.proquest.com/docview/1779927645
Kouatli, I.: A comparative study of the evolution of vulnerabilities in IT systems and its relation to the new concept of cloud computing. J. Manag. Hist. 20, 409–433 (2014)
He, W.: A survey of security risks of mobile social media through blog mining and an extensive literature search. Inf. Manag. Comput. Secur. 21, 381–400 (2013)
Chiang, H.S., Tsaur, W.J.: Identifying smartphone malware using data mining technology. In: Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), pp. 1–6 (2011)
Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the Symposium on Usable Privacy and Security (SOUPS) (2012)
Praveena, A., Smys, S.: Efficient cryptographic approach for data security in wireless sensor networks using MES VU. In: 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1–6. IEEE (2016)
Smys, S., Josemin, B.G., Jennifer, S.: Mobility management in wireless networks using power aware routing. In: International Conference on Intelligent and Advanced Systems, pp. 1–5. IEEE (2010)
Leunga, A., Shengb, Y., Cruickshankb, H.: The security challenges for mobile ubiquitous services. Information Security Group, Royal Holloway, University of London, UK (2007)
Dey, S., Sampalli, S., Ye, Q.: MDA: message digest-based authentication for mobile cloud computing. J. Cloud Comput. 5, 1–13 (2016)
Yandong, Z., Yongsheng, Z.: Cloud computing and cloud security challenges. In: International Symposium on Information Technology in Medicine and Education, pp. 1084–1088 (2012)
Harris, M., Patten, K.P.: Mobile device security considerations for small- and medium-sized enterprise business mobility. Inf. Manag. Comput. Secur. 22, 97–114 (2014)
Davenport, T.H., Harris, J.G., Morison, R.: Analytics at Work: Smarter Decisions, Better Results. Harvard Business Press, Boston (2010)
Adeyelure, T., Kalema, B., Bwalya, K.: A framework for deployment of mobile business intelligence within small and medium enterprises in developing countries. Oper. Res. Int. J. 18, 825–839 (2018)
Markelj, B., Bernik, I.: Mobile devices and corporate data security. J. Educ. Inf. Technol. 1, 97–104 (2012)
Martin, N., Rice, J.: Cybercrime: understanding and addressing the concerns of stakeholders. Comput. Secur. 30, 803–814 (2011)
Yiu, S.M., Yiu, S.W., Lee, L.K., Li, E.K., Yip, M.C.: Sharing and access right delegation for confidential documents: a practical solution. Inf. Manag. 43, 607–616 (2006)
Cavusoglu, H., Mishra, B., Raghunathan, S.: The value for intrusion-detection systems in information technology security architecture. Inf. Syst. Res. 16, 28–35 (2005)
Frank, J., Shamir, B., Briggs, W.: Security-related behavior of PC users in organizations. Inf. Manag. 21, 127–135 (1991)
Post, G., Kagan, A.: Management tradeoffs in anti-virus strategies. Inf. Manag. 37, 13–24 (2000)
Payne, C.: On the security of open source software. Inf. Syst. J. 12, 61–78 (2002)
Gal-Or, E., Ghose, A.: The economic incentives for sharing security information. Inf. Syst. Res. 16, 186–192 (2005)
Doherty, N.F., Fulford, H.: Aligning the information security policy with the strategic information systems plan. Comput. Secur. 25, 55–63 (2006)
Acknowledgements
This paper is based on conceptual framework and not an empirical study. The research methodology explained in this paper is a proposed methodology for this ongoing research. So no research data was collected from any participant. In other words, no participant is involved for this study. As a result, the ethics committee approval was not obtained.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Palanisamy, R. (2020). Users’ Attitude on Perceived Security of Enterprise Systems Mobility: A Conceptual Model. In: Pandian, A., Palanisamy, R., Ntalianis, K. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). ICCBI 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 49. Springer, Cham. https://doi.org/10.1007/978-3-030-43192-1_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-43192-1_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43191-4
Online ISBN: 978-3-030-43192-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)