Abstract:Enterprise mobility is emerging as a fast-growing trend worldwide. Numerous risks originate from using mobile devices for business-related tasks and most of these risks pose a significant security threat to organisations information. Information Technology (IT) governance frameworks can provide guidance in managing these risks at a strategic level, but these frameworks do not effectively govern on a technical operational level. Implementation of these frameworks may also be inefficient, as they are generic and… Show more
“…Different enterprise security approach patterns [24][25][26] describe steps of information security analyses. From the pattern of BSI [26] for the creation of a security concept, the authors derive a proposal (Fig.…”
Section: Security Analysis For Mobile Erp Access Transformationsmentioning
confidence: 99%
“…From the pattern of BSI [26] for the creation of a security concept, the authors derive a proposal (Fig. 1) to combine this analysis with a two-stage feasibility check for transformations of the mobile ERP system access.…”
Section: Security Analysis For Mobile Erp Access Transformationsmentioning
confidence: 99%
“…The increased requirements imply additions to the extensive security controls [26], which are already common for infrastructures that include stationary computing devices exclusively. The controls selection is intimately connected with the second stage of the feasibility check.…”
Section: Security Analysis For Mobile Erp Access Transformationsmentioning
confidence: 99%
“…The expected level of security is calculated by a risk assessment [26,30]. For risk acceptance, risk tolerance of the company acts as critical value [30].…”
Section: Feasibility Of a Security Controls Based Mobile Erp Accessmentioning
confidence: 99%
“…It shares the security risk also with the outsourcing provider. However, the partner often finds reasons to deny the compensation of occurring harms [26]. The greatest impulse for enhanced security of the mobile ERP access will be an outcome of the prospective ERP software offerings.…”
Section: Feasibility Of a Security Controls Based Mobile Erp Accessmentioning
Abstract. The characteristics and the levels of mobile accesses to ERP systems are changing differently in companies. Three proposed approaches assist with individual transformation of mobility concepts. A classification concept of basic access variants facilitates to identify the current mobility level and advantageous transformation paths. A process model describes how a two-stage feasibility check can be integrated in security analyses and decision-making for an iterative access transformation. A chart gathers the main criteria of the feasibility check for predefined security controls. They are used to estimate whether the mobility objectives can be reached with acceptable security risks by the transformation step.
“…Different enterprise security approach patterns [24][25][26] describe steps of information security analyses. From the pattern of BSI [26] for the creation of a security concept, the authors derive a proposal (Fig.…”
Section: Security Analysis For Mobile Erp Access Transformationsmentioning
confidence: 99%
“…From the pattern of BSI [26] for the creation of a security concept, the authors derive a proposal (Fig. 1) to combine this analysis with a two-stage feasibility check for transformations of the mobile ERP system access.…”
Section: Security Analysis For Mobile Erp Access Transformationsmentioning
confidence: 99%
“…The increased requirements imply additions to the extensive security controls [26], which are already common for infrastructures that include stationary computing devices exclusively. The controls selection is intimately connected with the second stage of the feasibility check.…”
Section: Security Analysis For Mobile Erp Access Transformationsmentioning
confidence: 99%
“…The expected level of security is calculated by a risk assessment [26,30]. For risk acceptance, risk tolerance of the company acts as critical value [30].…”
Section: Feasibility Of a Security Controls Based Mobile Erp Accessmentioning
confidence: 99%
“…It shares the security risk also with the outsourcing provider. However, the partner often finds reasons to deny the compensation of occurring harms [26]. The greatest impulse for enhanced security of the mobile ERP access will be an outcome of the prospective ERP software offerings.…”
Section: Feasibility Of a Security Controls Based Mobile Erp Accessmentioning
Abstract. The characteristics and the levels of mobile accesses to ERP systems are changing differently in companies. Three proposed approaches assist with individual transformation of mobility concepts. A classification concept of basic access variants facilitates to identify the current mobility level and advantageous transformation paths. A process model describes how a two-stage feasibility check can be integrated in security analyses and decision-making for an iterative access transformation. A chart gathers the main criteria of the feasibility check for predefined security controls. They are used to estimate whether the mobility objectives can be reached with acceptable security risks by the transformation step.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.