CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS

Cilt: 2 Sayı: 2 1 Aralık 2010
  • Tuncay Ercan
  • Murat Komeslı
  • İbrahim Zıncır
PDF İndir
EN

CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS

Abstract

Mobile Information Systems (ISs) have an important effect in organizations. They are not limited to the office, people can use mobile devices that they carry with them and access the network resources. They do not replace traditional information systems, but they are planned and designed with the unique features of wireless communication. With the increasing level of different information technologies, corporate level systems have the potential to change how business people efficiently work together. The need for a mobile user to have uninterrupted and secure access to information on the network should be considered and the necessary policies should be established for regular information flow in the organization. Our paper reviews the overall benefits of the mobile systems in the business since it has a critical value for the diversity of ISs. It also explains how mobility works and how organizations can extract maximum value from the mobile services in a secure way.

Keywords

Kaynakça

  1. Apostolos, K., George, P., & Theodore, A. (2007), Mobile financial services: A scenario-driven requirements analysis.
  2. Barnes, S. J., Scornavacca, E., & Innes, D. (2006). “Understanding wireless field force automation in trade services”, Industrial Management & Data Systems, 106(1-2), pp.172-181.
  3. Bernardos, A. M., Marcos, D., & Casar, J. R. (2008). An analysis of context-awareness in commercial mobile services.
  4. Bonnefoi, P. F., Poulingeas, P., & Sauveron, D. (2005). MADNESS: A framework proposal for securing work in ad hoe networks.
  5. Borselius, N., Hur, N., Kaprynski, M., Mitchell, C. J., & IEEE. (2002). “A security architecture for agent-based mobile systems”, Third International Conference on 3G Mobile Communication Technologies, pp. 312-318.
  6. Bulander, R. (2008). A research model of Customer Relationship Management systems for mobile devices - Description of a research model about Customer Relationship Management projects.
  7. Du, H. S., Hao, J. X., Kwok, R. C. W., Wagner, C., & Pacis. (2006). Can Lean Media Enhance
  8. Large Group Learning? An Empirical Investigation of Mobile Information and Communication Technology. Fang, X. W., Chan, S., Brzezinski, J., & Xu, S. (2005). Moderating effects of task type on wireless technology acceptance. Journal of Management Information Systems, 22(3), 123-157.

Ayrıntılar

Birincil Dil

İngilizce

Konular

-

Bölüm

-

Yazarlar

Tuncay Ercan Bu kişi benim

Murat Komeslı Bu kişi benim

İbrahim Zıncır Bu kişi benim

Yayımlanma Tarihi

1 Aralık 2010

Gönderilme Tarihi

1 Aralık 2010

Kabul Tarihi

-

Yayımlandığı Sayı

Yıl 2010 Cilt: 2 Sayı: 2

Kaynak Göster

APA
Ercan, T., Komeslı, M., & Zıncır, İ. (2010). CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS. International Journal of Business and Management Studies, 2(2), 81-88. https://izlik.org/JA69DF97MU
AMA
1.Ercan T, Komeslı M, Zıncır İ. CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS. IJBMS. 2010;2(2):81-88. https://izlik.org/JA69DF97MU
Chicago
Ercan, Tuncay, Murat Komeslı, ve İbrahim Zıncır. 2010. “CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS”. International Journal of Business and Management Studies 2 (2): 81-88. https://izlik.org/JA69DF97MU.
EndNote
Ercan T, Komeslı M, Zıncır İ (01 Aralık 2010) CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS. International Journal of Business and Management Studies 2 2 81–88.
IEEE
[1]T. Ercan, M. Komeslı, ve İ. Zıncır, “CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS”, IJBMS, c. 2, sy 2, ss. 81–88, Ara. 2010, [çevrimiçi]. Erişim adresi: https://izlik.org/JA69DF97MU
ISNAD
Ercan, Tuncay - Komeslı, Murat - Zıncır, İbrahim. “CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS”. International Journal of Business and Management Studies 2/2 (01 Aralık 2010): 81-88. https://izlik.org/JA69DF97MU.
JAMA
1.Ercan T, Komeslı M, Zıncır İ. CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS. IJBMS. 2010;2:81–88.
MLA
Ercan, Tuncay, vd. “CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS”. International Journal of Business and Management Studies, c. 2, sy 2, Aralık 2010, ss. 81-88, https://izlik.org/JA69DF97MU.
Vancouver
1.Tuncay Ercan, Murat Komeslı, İbrahim Zıncır. CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS. IJBMS [Internet]. 01 Aralık 2010;2(2):81-8. Erişim adresi: https://izlik.org/JA69DF97MU