Abstract
The characteristics and the levels of mobile accesses to ERP systems are changing differently in companies. Three proposed approaches assist with individual transformation of mobility concepts. A classification concept of basic access variants facilitates to identify the current mobility level and advantageous transformation paths. A process model describes how a two-stage feasibility check can be integrated in security analyses and decision-making for an iterative access transformation. A chart gathers the main criteria of the feasibility check for predefined security controls. They are used to estimate whether the mobility objectives can be reached with acceptable security risks by the transformation step.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Krannich, D.: Mobile System Design. Books on Demand, Norderstedt (2010)
Christmann, S.: Mobiles Internet im Unternehmenskontext. Dissertation, Universitätsverlag, Göttingen (2012)
Michl, B.: Chancen und risiken von mobile ERP. In: Amberg, M., Lang, M. (eds.) Innovation durch Smartphone & Co., pp. 71–102. Symposion Publishing, Düsseldorf (2011)
Disterer, G., Kleiner, C.: Mobile Endgeräte im Unternehmen. Springer, Heidelberg (2014)
Basole, R.C., Rouse, W.B.: Mobile enterprise readiness and transformation. In: Taniar, D. (ed.) Encyclopedia of Mobile Computing and Commerce, pp. 481–486. Information Science Reference, Hershey (2007)
Petrovic, O., Harnisch, M., Puchleitner, T.: Anforderungen an mobile applikationen: akzeptanzbestimmende faktoren. In: Gronau, N., Fohrholz, C. (eds.) Wirtschaftliche Geschäftsprozesse Durch Mobile ERP-Systeme, pp. 51–94. GITO-Verlag, Berlin (2011)
Krybus, I.: Transformationsstrategie für mobile business. In: Amberg, M., Lang, M. (eds.) Innovation durch Smartphone & Co., pp. 329–356. Symposion Publishing, Düsseldorf (2011)
Liebhart, D.: Anspruchsvolle mobile arbeiter fordern interne IT heraus. In: Computerwoche 21/2013, p. 19 (2013)
Homann, M.: Endbenutzer-Entwicklung mobiler ERP-Applikationen durch den Einsatz eines domänenspezifischen Entwicklungswerkzeuges. Dissertation, TU München (2014)
Bliem-Ritz, D.: Wearable Computing: Benutzerschnittstellen zum Anziehen. disserta Verlag, Hamburg (2014)
BITKOM (eds.): Bring Your Own Device. Leitfaden, Berlin (2013). www.bitkom.org/Bitkom/Publikationen/Publikation_3046.html
Australian Government (eds.): Risk Management of Enterprise Mobility including Bring Your Own Device (BYOD) (2013). www.asd.gov.au/publications/protect/enterprise_mobility_bring_your_own_device_byod_paper.htm
Werner, M.: Konzept einer Handlungsbedarfsanalyse zur Vervollkommnung der Informationssicherheitslösung in Unternehmen am Beispiel einer BYOD-Lösung. Unveröffentlichte Bachelorthesis, HS Pforzheim (2015)
Abdavi, A.: Mobiles ERP: apps bringen nicht allen was. In: Computerwelt, vol. 2, p. 29 (2015)
Patel, R.: Enterprise Mobility Strategy & Solutions. Partridge Publishing, Gurgaon (2014)
Magdas, F.: MBI-Lösungen - Vergleich, Auswahl und Umsetzung am Beispiel einer MS-SQL-Server-Anbindung. Unveröffentlichte Bachelorthesis, HS Pforzheim (2013)
Maurer, J.: Mobile ERP: Das bieten die Hersteller. In: Computerwoche, 05 August 2015. www.computerwoche.de/a/mobile-erp-das-bieten-die-hersteller,3213240
Auer, D., Draheim, D., Geist, V., Kopetzky, T., Küng, J., Natschläger, C.: Towards a framework and platform for mobile distributed workflow enactment services on a possible future of ERP infrastructure. In: Piazolo, F., Felderer, M. (eds.) Innovation and Future of Enterprise Information Systems. LNISO, vol. 4, pp. 201–215. Springer, Heidelberg (2013)
Van Leeuwen, D.: Bring your own software. Netw. Secur. 2014(3), 12–13 (2014)
Lee, J., Lee, Y., Kim, S.-C.: A white-list based security architecture (WLSA) for the safe mobile office in the BYOD era. In: Park, J.J., Arabnia, H.R., Kim, C., Shi, W., Gil, J.-M. (eds.) Grid and Pervasive Computing. LNCS, vol. 7861, pp. 860–865. Springer, Heidelberg (2013)
Teuteberg, F., Hilker, J., Kurbel, K.: Anwendungsschwerpunkte im Mobile Enterprise Resource Planning. In: Pousttchi, K., Turowski, K. (eds.) Mobile Commerce - Anwendungen und Perspektiven. LNI, vol. P-25, pp. 12–26. Köllen, Bonn (2003)
Buchner, M.: ERP-Tools aus dem App Store. In: Computerwoche, 25 November 2013. www.computerwoche.de/a/erp-tools-aus-dem-app-store,2537780
Gelogo, Y.E., Haeng-Kon, K.: Mobile integrated enterprise resource planning system architecture. IJCA 7(3), 379–388 (2014)
Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating Security and Systems Engineering. Wiley, Chichester (2006)
Yoshioka, N., Washizaki, H., Maruyama, K.: A survey on security patterns. Prog. Inf. 5, 35–47 (2008)
BSI (eds.): Übersicht BSI-Themen. www.bsi.bund.de/DE/Themen/themen_node.html
Brand, J., Kruger-Van Renen, W., Rudman, R.: Proposed practices to mitigate significant mobility security risks. IBER 14(1), 199–219 (2015)
Kohne, A., Ringleb, S., Yücel, C.: Bring your own Device. Springer, Wiesbaden (2015)
Raggad, B.: Information Security Management. CRC Press, Boca Raton (2010)
NIST (eds.): Managing Information Security Risk. NIST Special Publication 800–39 (2011)
Campbell, G.: Measuring and Communicating Security’s Value: A Compendium of Metrics for Enterprise Protection. Elsevier, Amsterdam (2015)
Dospinescu, O., Fotache, D., Munteanu, B.A., Hurbean, L.: Mobile enterprise resource planning: new technology horizons. CIBIMA 1(11), 91–97 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Porkert, K., Marquardt, G. (2016). Security-Based Approach for Transformations of Mobile Accesses to ERP Systems. In: Felderer, M., Piazolo, F., Ortner, W., Brehm, L., Hof, HJ. (eds) Innovations in Enterprise Information Systems Management and Engineering. ERP Future 2015. Lecture Notes in Business Information Processing, vol 245. Springer, Cham. https://doi.org/10.1007/978-3-319-32799-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-32799-0_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32798-3
Online ISBN: 978-3-319-32799-0
eBook Packages: Business and ManagementBusiness and Management (R0)