BibTex RIS Kaynak Göster

CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS

Yıl 2010, Cilt: 2 Sayı: 2, 81 - 88, 01.12.2010

Öz

Mobile Information Systems (ISs) have an important effect in organizations. They are not limited
to the office, people can use mobile devices that they carry with them and access the network
resources. They do not replace traditional information systems, but they are planned and designed
with the unique features of wireless communication. With the increasing level of different
information technologies, corporate level systems have the potential to change how business
people efficiently work together. The need for a mobile user to have uninterrupted and secure
access to information on the network should be considered and the necessary policies should be
established for regular information flow in the organization. Our paper reviews the overall
benefits of the mobile systems in the business since it has a critical value for the diversity of ISs. It
also explains how mobility works and how organizations can extract maximum value from the
mobile services in a secure way.

Kaynakça

  • Apostolos, K., George, P., & Theodore, A. (2007), Mobile financial services: A scenario-driven requirements analysis.
  • Barnes, S. J., Scornavacca, E., & Innes, D. (2006). “Understanding wireless field force automation in trade services”, Industrial Management & Data Systems, 106(1-2), pp.172-181.
  • Bernardos, A. M., Marcos, D., & Casar, J. R. (2008). An analysis of context-awareness in commercial mobile services.
  • Bonnefoi, P. F., Poulingeas, P., & Sauveron, D. (2005). MADNESS: A framework proposal for securing work in ad hoe networks.
  • Borselius, N., Hur, N., Kaprynski, M., Mitchell, C. J., & IEEE. (2002). “A security architecture for agent-based mobile systems”, Third International Conference on 3G Mobile Communication Technologies, pp. 312-318.
  • Bulander, R. (2008). A research model of Customer Relationship Management systems for mobile devices - Description of a research model about Customer Relationship Management projects.
  • Du, H. S., Hao, J. X., Kwok, R. C. W., Wagner, C., & Pacis. (2006). Can Lean Media Enhance
  • Large Group Learning? An Empirical Investigation of Mobile Information and Communication Technology. Fang, X. W., Chan, S., Brzezinski, J., & Xu, S. (2005). Moderating effects of task type on wireless technology acceptance. Journal of Management Information Systems, 22(3), 123-157.
  • Gallery, E., Tomlinson, A., & IEEE Comp, S. O. C. (2004). Conditional access in mobile systems:
  • Securing the application. Gebauer, J., & Shaw, M. J. (2004). “Success factors and impacts of mobile business applications:
  • Results from a mobile e-procurement study”, International Journal of Electronic Commerce, 8(3), 41. Holzinger, A., Holler, M., Bloice, M., & Urlesberger, B. (2008). Typical problems with developing mobile applications for health care - Some lessons learned from developing user- centered mobile applications in a hospital environment.
  • Hu, J. L., Wang, J. Z., Liu, A. Z., & Peng, D. Y. (2005). Solution for securing data integrity in the mobile agent system.
  • Ivancic, W. D., Shell, D., & IEEE, I. (2003). Securing mobile networks in an operational setting.
  • Kappes, M., Krishnan, P., & IEEE. (2004), “Content authentication in enterprises for mobile devices”, 2004 IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communication, pp. 129.
  • Kohler, A., & Gruhn, V. (2004), “Analysis of mobile business processes for the design of mobile information systems”, In K. Bauknecht, M. Bichler & B. Proll (Eds.), E-Commerce and Web Technologies, Vol. 3182, pp. 238-247.
  • March, S., Hevner, A., & Ram, S. (2000), “Research commentary: An agenda for information technology research in heterogeneous and distributed environments”, Information Systems Research, 11(4), 327-341.
  • Raghunathan, A., Ravi, S., Hattangady, S., Quisquater, J. J., & IEEE Computer Society, I. C. S. I. C. S. (2003), “Securing mobile appliances: New challenges for the system designer”
  • Schierholz, R., Glissmann, S., Kolbe, L. M., Brenner, W., & Pacis. (2006), Mobile Systems for
  • Customer Service Differentiation the Case of Lufthansa. Schwiderski-Grosche, S., Tomlinson, A., Goo, S. K., Irvine, J. M., & IEEE. (2004), Security challenges in the personal distributed environment.
  • Thurnher, B. (2007). The impact of mobile technology on business processes - Results from 5 case studies.
Yıl 2010, Cilt: 2 Sayı: 2, 81 - 88, 01.12.2010

Öz

Kaynakça

  • Apostolos, K., George, P., & Theodore, A. (2007), Mobile financial services: A scenario-driven requirements analysis.
  • Barnes, S. J., Scornavacca, E., & Innes, D. (2006). “Understanding wireless field force automation in trade services”, Industrial Management & Data Systems, 106(1-2), pp.172-181.
  • Bernardos, A. M., Marcos, D., & Casar, J. R. (2008). An analysis of context-awareness in commercial mobile services.
  • Bonnefoi, P. F., Poulingeas, P., & Sauveron, D. (2005). MADNESS: A framework proposal for securing work in ad hoe networks.
  • Borselius, N., Hur, N., Kaprynski, M., Mitchell, C. J., & IEEE. (2002). “A security architecture for agent-based mobile systems”, Third International Conference on 3G Mobile Communication Technologies, pp. 312-318.
  • Bulander, R. (2008). A research model of Customer Relationship Management systems for mobile devices - Description of a research model about Customer Relationship Management projects.
  • Du, H. S., Hao, J. X., Kwok, R. C. W., Wagner, C., & Pacis. (2006). Can Lean Media Enhance
  • Large Group Learning? An Empirical Investigation of Mobile Information and Communication Technology. Fang, X. W., Chan, S., Brzezinski, J., & Xu, S. (2005). Moderating effects of task type on wireless technology acceptance. Journal of Management Information Systems, 22(3), 123-157.
  • Gallery, E., Tomlinson, A., & IEEE Comp, S. O. C. (2004). Conditional access in mobile systems:
  • Securing the application. Gebauer, J., & Shaw, M. J. (2004). “Success factors and impacts of mobile business applications:
  • Results from a mobile e-procurement study”, International Journal of Electronic Commerce, 8(3), 41. Holzinger, A., Holler, M., Bloice, M., & Urlesberger, B. (2008). Typical problems with developing mobile applications for health care - Some lessons learned from developing user- centered mobile applications in a hospital environment.
  • Hu, J. L., Wang, J. Z., Liu, A. Z., & Peng, D. Y. (2005). Solution for securing data integrity in the mobile agent system.
  • Ivancic, W. D., Shell, D., & IEEE, I. (2003). Securing mobile networks in an operational setting.
  • Kappes, M., Krishnan, P., & IEEE. (2004), “Content authentication in enterprises for mobile devices”, 2004 IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communication, pp. 129.
  • Kohler, A., & Gruhn, V. (2004), “Analysis of mobile business processes for the design of mobile information systems”, In K. Bauknecht, M. Bichler & B. Proll (Eds.), E-Commerce and Web Technologies, Vol. 3182, pp. 238-247.
  • March, S., Hevner, A., & Ram, S. (2000), “Research commentary: An agenda for information technology research in heterogeneous and distributed environments”, Information Systems Research, 11(4), 327-341.
  • Raghunathan, A., Ravi, S., Hattangady, S., Quisquater, J. J., & IEEE Computer Society, I. C. S. I. C. S. (2003), “Securing mobile appliances: New challenges for the system designer”
  • Schierholz, R., Glissmann, S., Kolbe, L. M., Brenner, W., & Pacis. (2006), Mobile Systems for
  • Customer Service Differentiation the Case of Lufthansa. Schwiderski-Grosche, S., Tomlinson, A., Goo, S. K., Irvine, J. M., & IEEE. (2004), Security challenges in the personal distributed environment.
  • Thurnher, B. (2007). The impact of mobile technology on business processes - Results from 5 case studies.
Toplam 20 adet kaynakça vardır.

Ayrıntılar

Diğer ID JA65AM46TR
Bölüm Makaleler
Yazarlar

Tuncay Ercan Bu kişi benim

Murat Komeslı Bu kişi benim

İbrahim Zıncır Bu kişi benim

Yayımlanma Tarihi 1 Aralık 2010
Yayımlandığı Sayı Yıl 2010 Cilt: 2 Sayı: 2

Kaynak Göster

APA Ercan, T., Komeslı, M., & Zıncır, İ. (2010). CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS. International Journal of Business and Management Studies, 2(2), 81-88.
AMA Ercan T, Komeslı M, Zıncır İ. CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS. IJBMS. Aralık 2010;2(2):81-88.
Chicago Ercan, Tuncay, Murat Komeslı, ve İbrahim Zıncır. “CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS”. International Journal of Business and Management Studies 2, sy. 2 (Aralık 2010): 81-88.
EndNote Ercan T, Komeslı M, Zıncır İ (01 Aralık 2010) CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS. International Journal of Business and Management Studies 2 2 81–88.
IEEE T. Ercan, M. Komeslı, ve İ. Zıncır, “CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS”, IJBMS, c. 2, sy. 2, ss. 81–88, 2010.
ISNAD Ercan, Tuncay vd. “CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS”. International Journal of Business and Management Studies 2/2 (Aralık 2010), 81-88.
JAMA Ercan T, Komeslı M, Zıncır İ. CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS. IJBMS. 2010;2:81–88.
MLA Ercan, Tuncay vd. “CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS”. International Journal of Business and Management Studies, c. 2, sy. 2, 2010, ss. 81-88.
Vancouver Ercan T, Komeslı M, Zıncır İ. CORPORATE SECURITY IMPLEMENTATION FOR MOBILE INFORMATION SYSTEMS. IJBMS. 2010;2(2):81-8.