Advertisement

Security-Based Approach for Transformations of Mobile Accesses to ERP Systems

  • Kurt PorkertEmail author
  • Gunther Marquardt
Conference paper
Part of the Lecture Notes in Business Information Processing book series (LNBIP, volume 245)

Abstract

The characteristics and the levels of mobile accesses to ERP systems are changing differently in companies. Three proposed approaches assist with individual transformation of mobility concepts. A classification concept of basic access variants facilitates to identify the current mobility level and advantageous transformation paths. A process model describes how a two-stage feasibility check can be integrated in security analyses and decision-making for an iterative access transformation. A chart gathers the main criteria of the feasibility check for predefined security controls. They are used to estimate whether the mobility objectives can be reached with acceptable security risks by the transformation step.

Keywords

ERP system Mobility Transformation Information security 

References

  1. 1.
    Krannich, D.: Mobile System Design. Books on Demand, Norderstedt (2010)zbMATHGoogle Scholar
  2. 2.
    Christmann, S.: Mobiles Internet im Unternehmenskontext. Dissertation, Universitätsverlag, Göttingen (2012)Google Scholar
  3. 3.
    Michl, B.: Chancen und risiken von mobile ERP. In: Amberg, M., Lang, M. (eds.) Innovation durch Smartphone & Co., pp. 71–102. Symposion Publishing, Düsseldorf (2011)Google Scholar
  4. 4.
    Disterer, G., Kleiner, C.: Mobile Endgeräte im Unternehmen. Springer, Heidelberg (2014)CrossRefGoogle Scholar
  5. 5.
    Basole, R.C., Rouse, W.B.: Mobile enterprise readiness and transformation. In: Taniar, D. (ed.) Encyclopedia of Mobile Computing and Commerce, pp. 481–486. Information Science Reference, Hershey (2007)CrossRefGoogle Scholar
  6. 6.
    Petrovic, O., Harnisch, M., Puchleitner, T.: Anforderungen an mobile applikationen: akzeptanzbestimmende faktoren. In: Gronau, N., Fohrholz, C. (eds.) Wirtschaftliche Geschäftsprozesse Durch Mobile ERP-Systeme, pp. 51–94. GITO-Verlag, Berlin (2011)Google Scholar
  7. 7.
    Krybus, I.: Transformationsstrategie für mobile business. In: Amberg, M., Lang, M. (eds.) Innovation durch Smartphone & Co., pp. 329–356. Symposion Publishing, Düsseldorf (2011)Google Scholar
  8. 8.
    Liebhart, D.: Anspruchsvolle mobile arbeiter fordern interne IT heraus. In: Computerwoche 21/2013, p. 19 (2013)Google Scholar
  9. 9.
    Homann, M.: Endbenutzer-Entwicklung mobiler ERP-Applikationen durch den Einsatz eines domänenspezifischen Entwicklungswerkzeuges. Dissertation, TU München (2014)Google Scholar
  10. 10.
    Bliem-Ritz, D.: Wearable Computing: Benutzerschnittstellen zum Anziehen. disserta Verlag, Hamburg (2014)Google Scholar
  11. 11.
    BITKOM (eds.): Bring Your Own Device. Leitfaden, Berlin (2013). www.bitkom.org/Bitkom/Publikationen/Publikation_3046.html
  12. 12.
    Australian Government (eds.): Risk Management of Enterprise Mobility including Bring Your Own Device (BYOD) (2013). www.asd.gov.au/publications/protect/enterprise_mobility_bring_your_own_device_byod_paper.htm
  13. 13.
    Werner, M.: Konzept einer Handlungsbedarfsanalyse zur Vervollkommnung der Informationssicherheitslösung in Unternehmen am Beispiel einer BYOD-Lösung. Unveröffentlichte Bachelorthesis, HS Pforzheim (2015)Google Scholar
  14. 14.
    Abdavi, A.: Mobiles ERP: apps bringen nicht allen was. In: Computerwelt, vol. 2, p. 29 (2015)Google Scholar
  15. 15.
    Patel, R.: Enterprise Mobility Strategy & Solutions. Partridge Publishing, Gurgaon (2014)Google Scholar
  16. 16.
    Magdas, F.: MBI-Lösungen - Vergleich, Auswahl und Umsetzung am Beispiel einer MS-SQL-Server-Anbindung. Unveröffentlichte Bachelorthesis, HS Pforzheim (2013)Google Scholar
  17. 17.
    Maurer, J.: Mobile ERP: Das bieten die Hersteller. In: Computerwoche, 05 August 2015. www.computerwoche.de/a/mobile-erp-das-bieten-die-hersteller,3213240
  18. 18.
    Auer, D., Draheim, D., Geist, V., Kopetzky, T., Küng, J., Natschläger, C.: Towards a framework and platform for mobile distributed workflow enactment services on a possible future of ERP infrastructure. In: Piazolo, F., Felderer, M. (eds.) Innovation and Future of Enterprise Information Systems. LNISO, vol. 4, pp. 201–215. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  19. 19.
    Van Leeuwen, D.: Bring your own software. Netw. Secur. 2014(3), 12–13 (2014)CrossRefGoogle Scholar
  20. 20.
    Lee, J., Lee, Y., Kim, S.-C.: A white-list based security architecture (WLSA) for the safe mobile office in the BYOD era. In: Park, J.J., Arabnia, H.R., Kim, C., Shi, W., Gil, J.-M. (eds.) Grid and Pervasive Computing. LNCS, vol. 7861, pp. 860–865. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  21. 21.
    Teuteberg, F., Hilker, J., Kurbel, K.: Anwendungsschwerpunkte im Mobile Enterprise Resource Planning. In: Pousttchi, K., Turowski, K. (eds.) Mobile Commerce - Anwendungen und Perspektiven. LNI, vol. P-25, pp. 12–26. Köllen, Bonn (2003)Google Scholar
  22. 22.
    Buchner, M.: ERP-Tools aus dem App Store. In: Computerwoche, 25 November 2013. www.computerwoche.de/a/erp-tools-aus-dem-app-store,2537780
  23. 23.
    Gelogo, Y.E., Haeng-Kon, K.: Mobile integrated enterprise resource planning system architecture. IJCA 7(3), 379–388 (2014)CrossRefGoogle Scholar
  24. 24.
    Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating Security and Systems Engineering. Wiley, Chichester (2006)Google Scholar
  25. 25.
    Yoshioka, N., Washizaki, H., Maruyama, K.: A survey on security patterns. Prog. Inf. 5, 35–47 (2008)CrossRefGoogle Scholar
  26. 26.
    BSI (eds.): Übersicht BSI-Themen. www.bsi.bund.de/DE/Themen/themen_node.html
  27. 27.
    Brand, J., Kruger-Van Renen, W., Rudman, R.: Proposed practices to mitigate significant mobility security risks. IBER 14(1), 199–219 (2015)CrossRefGoogle Scholar
  28. 28.
    Kohne, A., Ringleb, S., Yücel, C.: Bring your own Device. Springer, Wiesbaden (2015)CrossRefGoogle Scholar
  29. 29.
    Raggad, B.: Information Security Management. CRC Press, Boca Raton (2010)zbMATHGoogle Scholar
  30. 30.
    NIST (eds.): Managing Information Security Risk. NIST Special Publication 800–39 (2011)Google Scholar
  31. 31.
    Campbell, G.: Measuring and Communicating Security’s Value: A Compendium of Metrics for Enterprise Protection. Elsevier, Amsterdam (2015)Google Scholar
  32. 32.
    Dospinescu, O., Fotache, D., Munteanu, B.A., Hurbean, L.: Mobile enterprise resource planning: new technology horizons. CIBIMA 1(11), 91–97 (2008)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Fakultät Wirtschaft und RechtHochschule PforzheimPforzheimGermany

Personalised recommendations