Skip to main content

Security-Based Approach for Transformations of Mobile Accesses to ERP Systems

  • Conference paper
  • First Online:
Innovations in Enterprise Information Systems Management and Engineering (ERP Future 2015)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 245))

Included in the following conference series:

Abstract

The characteristics and the levels of mobile accesses to ERP systems are changing differently in companies. Three proposed approaches assist with individual transformation of mobility concepts. A classification concept of basic access variants facilitates to identify the current mobility level and advantageous transformation paths. A process model describes how a two-stage feasibility check can be integrated in security analyses and decision-making for an iterative access transformation. A chart gathers the main criteria of the feasibility check for predefined security controls. They are used to estimate whether the mobility objectives can be reached with acceptable security risks by the transformation step.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Krannich, D.: Mobile System Design. Books on Demand, Norderstedt (2010)

    MATH  Google Scholar 

  2. Christmann, S.: Mobiles Internet im Unternehmenskontext. Dissertation, Universitätsverlag, Göttingen (2012)

    Google Scholar 

  3. Michl, B.: Chancen und risiken von mobile ERP. In: Amberg, M., Lang, M. (eds.) Innovation durch Smartphone & Co., pp. 71–102. Symposion Publishing, Düsseldorf (2011)

    Google Scholar 

  4. Disterer, G., Kleiner, C.: Mobile Endgeräte im Unternehmen. Springer, Heidelberg (2014)

    Book  Google Scholar 

  5. Basole, R.C., Rouse, W.B.: Mobile enterprise readiness and transformation. In: Taniar, D. (ed.) Encyclopedia of Mobile Computing and Commerce, pp. 481–486. Information Science Reference, Hershey (2007)

    Chapter  Google Scholar 

  6. Petrovic, O., Harnisch, M., Puchleitner, T.: Anforderungen an mobile applikationen: akzeptanzbestimmende faktoren. In: Gronau, N., Fohrholz, C. (eds.) Wirtschaftliche Geschäftsprozesse Durch Mobile ERP-Systeme, pp. 51–94. GITO-Verlag, Berlin (2011)

    Google Scholar 

  7. Krybus, I.: Transformationsstrategie für mobile business. In: Amberg, M., Lang, M. (eds.) Innovation durch Smartphone & Co., pp. 329–356. Symposion Publishing, Düsseldorf (2011)

    Google Scholar 

  8. Liebhart, D.: Anspruchsvolle mobile arbeiter fordern interne IT heraus. In: Computerwoche 21/2013, p. 19 (2013)

    Google Scholar 

  9. Homann, M.: Endbenutzer-Entwicklung mobiler ERP-Applikationen durch den Einsatz eines domänenspezifischen Entwicklungswerkzeuges. Dissertation, TU München (2014)

    Google Scholar 

  10. Bliem-Ritz, D.: Wearable Computing: Benutzerschnittstellen zum Anziehen. disserta Verlag, Hamburg (2014)

    Google Scholar 

  11. BITKOM (eds.): Bring Your Own Device. Leitfaden, Berlin (2013). www.bitkom.org/Bitkom/Publikationen/Publikation_3046.html

  12. Australian Government (eds.): Risk Management of Enterprise Mobility including Bring Your Own Device (BYOD) (2013). www.asd.gov.au/publications/protect/enterprise_mobility_bring_your_own_device_byod_paper.htm

  13. Werner, M.: Konzept einer Handlungsbedarfsanalyse zur Vervollkommnung der Informationssicherheitslösung in Unternehmen am Beispiel einer BYOD-Lösung. Unveröffentlichte Bachelorthesis, HS Pforzheim (2015)

    Google Scholar 

  14. Abdavi, A.: Mobiles ERP: apps bringen nicht allen was. In: Computerwelt, vol. 2, p. 29 (2015)

    Google Scholar 

  15. Patel, R.: Enterprise Mobility Strategy & Solutions. Partridge Publishing, Gurgaon (2014)

    Google Scholar 

  16. Magdas, F.: MBI-Lösungen - Vergleich, Auswahl und Umsetzung am Beispiel einer MS-SQL-Server-Anbindung. Unveröffentlichte Bachelorthesis, HS Pforzheim (2013)

    Google Scholar 

  17. Maurer, J.: Mobile ERP: Das bieten die Hersteller. In: Computerwoche, 05 August 2015. www.computerwoche.de/a/mobile-erp-das-bieten-die-hersteller,3213240

  18. Auer, D., Draheim, D., Geist, V., Kopetzky, T., Küng, J., Natschläger, C.: Towards a framework and platform for mobile distributed workflow enactment services on a possible future of ERP infrastructure. In: Piazolo, F., Felderer, M. (eds.) Innovation and Future of Enterprise Information Systems. LNISO, vol. 4, pp. 201–215. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  19. Van Leeuwen, D.: Bring your own software. Netw. Secur. 2014(3), 12–13 (2014)

    Article  Google Scholar 

  20. Lee, J., Lee, Y., Kim, S.-C.: A white-list based security architecture (WLSA) for the safe mobile office in the BYOD era. In: Park, J.J., Arabnia, H.R., Kim, C., Shi, W., Gil, J.-M. (eds.) Grid and Pervasive Computing. LNCS, vol. 7861, pp. 860–865. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  21. Teuteberg, F., Hilker, J., Kurbel, K.: Anwendungsschwerpunkte im Mobile Enterprise Resource Planning. In: Pousttchi, K., Turowski, K. (eds.) Mobile Commerce - Anwendungen und Perspektiven. LNI, vol. P-25, pp. 12–26. Köllen, Bonn (2003)

    Google Scholar 

  22. Buchner, M.: ERP-Tools aus dem App Store. In: Computerwoche, 25 November 2013. www.computerwoche.de/a/erp-tools-aus-dem-app-store,2537780

  23. Gelogo, Y.E., Haeng-Kon, K.: Mobile integrated enterprise resource planning system architecture. IJCA 7(3), 379–388 (2014)

    Article  Google Scholar 

  24. Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating Security and Systems Engineering. Wiley, Chichester (2006)

    Google Scholar 

  25. Yoshioka, N., Washizaki, H., Maruyama, K.: A survey on security patterns. Prog. Inf. 5, 35–47 (2008)

    Article  Google Scholar 

  26. BSI (eds.): Übersicht BSI-Themen. www.bsi.bund.de/DE/Themen/themen_node.html

  27. Brand, J., Kruger-Van Renen, W., Rudman, R.: Proposed practices to mitigate significant mobility security risks. IBER 14(1), 199–219 (2015)

    Article  Google Scholar 

  28. Kohne, A., Ringleb, S., Yücel, C.: Bring your own Device. Springer, Wiesbaden (2015)

    Book  Google Scholar 

  29. Raggad, B.: Information Security Management. CRC Press, Boca Raton (2010)

    MATH  Google Scholar 

  30. NIST (eds.): Managing Information Security Risk. NIST Special Publication 800–39 (2011)

    Google Scholar 

  31. Campbell, G.: Measuring and Communicating Security’s Value: A Compendium of Metrics for Enterprise Protection. Elsevier, Amsterdam (2015)

    Google Scholar 

  32. Dospinescu, O., Fotache, D., Munteanu, B.A., Hurbean, L.: Mobile enterprise resource planning: new technology horizons. CIBIMA 1(11), 91–97 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kurt Porkert .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Porkert, K., Marquardt, G. (2016). Security-Based Approach for Transformations of Mobile Accesses to ERP Systems. In: Felderer, M., Piazolo, F., Ortner, W., Brehm, L., Hof, HJ. (eds) Innovations in Enterprise Information Systems Management and Engineering. ERP Future 2015. Lecture Notes in Business Information Processing, vol 245. Springer, Cham. https://doi.org/10.1007/978-3-319-32799-0_11

Download citation

Publish with us

Policies and ethics