Skip to main content
Erschienen in: Information Systems and e-Business Management 1/2012

01.03.2012 | Original Article

Secure mobile sales force automation: the case of independent sales agencies

verfasst von: Jochen Kokemüller, Heiko Roßnagel

Erschienen in: Information Systems and e-Business Management | Ausgabe 1/2012

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Sales agents depend on mobile support systems for their daily work. Independent sales agencies, however, are not able to facilitate this kind of mobile support on their own due to their small size and lack of the necessary funds. Since their processes correlate with confidential information and include the initiation and alteration of legally binding transactions they have a high need for security. In this contribution we first analyze the target domain using qualitative and quantitative methods and propose an IT-artifact that supports independent sales agencies. It is build as a service platform that supports multi-vendor sales processes. Afterwards, we examine use cases of sales representatives of independent sales agencies using this system and derive their security requirements. Using these, we propose a security extension to the IT-artifact and evaluate this extension by comparing it to existing solutions. Our results show that the proposed artifact extension provides a more convenient and secure solution than already existing approaches.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Subscriber Identity Module.
 
Literatur
Zurück zum Zitat Adams A, Sasse MA, Lunt P (1997) Making Passwords Secure and usable. In: proceedings of HCI on people and computers XII, August, Bristol, Springer, pp 1–19 Adams A, Sasse MA, Lunt P (1997) Making Passwords Secure and usable. In: proceedings of HCI on people and computers XII, August, Bristol, Springer, pp 1–19
Zurück zum Zitat Anderson R (2001) Why information security is hard: an economic perspective. In: Applied computer security applications conference (ACSAC 01), Dezember, Las Vegas, Nevada Anderson R (2001) Why information security is hard: an economic perspective. In: Applied computer security applications conference (ACSAC 01), Dezember, Las Vegas, Nevada
Zurück zum Zitat Benz A, Ritz T, Stender M (2003) Marktstudie mobile CRM-Systeme. Fraunhofer IRB Verlag, Stuttgart Benz A, Ritz T, Stender M (2003) Marktstudie mobile CRM-Systeme. Fraunhofer IRB Verlag, Stuttgart
Zurück zum Zitat Brown BJ, Callis K (2004) Computer password choice and personality traits among college students. Southeast Missouri State University, Cape Girardeau Brown BJ, Callis K (2004) Computer password choice and personality traits among college students. Southeast Missouri State University, Cape Girardeau
Zurück zum Zitat Canadian System Security Centre (1993) The Canadian trusted computer product evaluation criteria: version 3.0e. Communication Security Establishment, Government of Canada, Canada Canadian System Security Centre (1993) The Canadian trusted computer product evaluation criteria: version 3.0e. Communication Security Establishment, Government of Canada, Canada
Zurück zum Zitat Clarke NL, Furnell SM (2007) Advanced user authentication for mobile devices. Comput Secur 26(2):109–119CrossRef Clarke NL, Furnell SM (2007) Advanced user authentication for mobile devices. Comput Secur 26(2):109–119CrossRef
Zurück zum Zitat Dolmetsch R (2000) eProcurement, Addison Wesley, Boston Dolmetsch R (2000) eProcurement, Addison Wesley, Boston
Zurück zum Zitat Farrell J, Shapiro C (1988) Dynamic competition with switching costs. RAND J Econ 19(1):123–137CrossRef Farrell J, Shapiro C (1988) Dynamic competition with switching costs. RAND J Econ 19(1):123–137CrossRef
Zurück zum Zitat Ghosh AK, Swaminatha TM (2001) Software security and privacy risks in mobile e-commerce: examining the risks in wireless computing that will likely influence the emerging m-commerce market. Commun ACM 44(2):51–57CrossRef Ghosh AK, Swaminatha TM (2001) Software security and privacy risks in mobile e-commerce: examining the risks in wireless computing that will likely influence the emerging m-commerce market. Commun ACM 44(2):51–57CrossRef
Zurück zum Zitat Haller J, Robinson P, Walter T, Kilian-Kehr R (2002) Framework and architecture for secure mobile business applications. In: Gritzalis D, De Capitani di Vimercati S, Samarati P, Katsikas SK (ed). Security and privacy in the age of uncertainty, Proceedings of the IFIP TC11 international conference on information security (SEC2003), May 26–28, Athens, Greece, Kluwer, pp 413–416 Haller J, Robinson P, Walter T, Kilian-Kehr R (2002) Framework and architecture for secure mobile business applications. In: Gritzalis D, De Capitani di Vimercati S, Samarati P, Katsikas SK (ed). Security and privacy in the age of uncertainty, Proceedings of the IFIP TC11 international conference on information security (SEC2003), May 26–28, Athens, Greece, Kluwer, pp 413–416
Zurück zum Zitat Hevner AR, March ST, Park J, Ram S (2004) Design science in information systems research. MIS Q 28(1):75–105 Hevner AR, March ST, Park J, Ram S (2004) Design science in information systems research. MIS Q 28(1):75–105
Zurück zum Zitat Ives B, Walsh KR, Schneider H (2004) The domino effect of password reuse. Commun ACM 47(4):75–78CrossRef Ives B, Walsh KR, Schneider H (2004) The domino effect of password reuse. Commun ACM 47(4):75–78CrossRef
Zurück zum Zitat Karjoth G (2003) Access control with IBM Tivoli access manager. ACM Trans Inf Syst Secur 6(2):232–257CrossRef Karjoth G (2003) Access control with IBM Tivoli access manager. ACM Trans Inf Syst Secur 6(2):232–257CrossRef
Zurück zum Zitat Kesh S, Ratnasingam P (2007) A knowledge architecture for IT security. Commun ACM 50(7):103–108CrossRef Kesh S, Ratnasingam P (2007) A knowledge architecture for IT security. Commun ACM 50(7):103–108CrossRef
Zurück zum Zitat Kett H, Höß O and Kokemüller J (2008a) Mobile Multilieferanten-Vertriebsinformationssysteme für Handelsvertretungen und -vermittlungen, Fraunhofer IRB, Stuttgart Kett H, Höß O and Kokemüller J (2008a) Mobile Multilieferanten-Vertriebsinformationssysteme für Handelsvertretungen und -vermittlungen, Fraunhofer IRB, Stuttgart
Zurück zum Zitat Kett H, Kokemüller J, Höß O, Engelbach W, Weisbecker A (2008b) A mobile multi-supplier sales information system for micro-sized commercial agencies. In: proceedings of the eChallenges conference 2008, Stockholm Kett H, Kokemüller J, Höß O, Engelbach W, Weisbecker A (2008b) A mobile multi-supplier sales information system for micro-sized commercial agencies. In: proceedings of the eChallenges conference 2008, Stockholm
Zurück zum Zitat Kokemüller J, Kett H, Höß O, Weisbecker A (2008) A mobile support system for collaborative multi-vendor sales processes. In: proceedings of the 14th Americas conference on information systems (AMCIS), 14–17 August, Toronto Kokemüller J, Kett H, Höß O, Weisbecker A (2008) A mobile support system for collaborative multi-vendor sales processes. In: proceedings of the 14th Americas conference on information systems (AMCIS), 14–17 August, Toronto
Zurück zum Zitat Leek S, Turnbull PW, Naude P (2003) How is information technology affecting business relationships? results from a UK survey. Ind Mark Manage 32(2):119–126CrossRef Leek S, Turnbull PW, Naude P (2003) How is information technology affecting business relationships? results from a UK survey. Ind Mark Manage 32(2):119–126CrossRef
Zurück zum Zitat Mayes KMK, Piper F (2005) Smart card based authentication: any future? Comput Secur 24:188–191CrossRef Mayes KMK, Piper F (2005) Smart card based authentication: any future? Comput Secur 24:188–191CrossRef
Zurück zum Zitat Merritt NJ, Newell SJ (2001) The extent and formality of sales agency evaluations of principals. Ind Mark Manage 30(1):37–49CrossRef Merritt NJ, Newell SJ (2001) The extent and formality of sales agency evaluations of principals. Ind Mark Manage 30(1):37–49CrossRef
Zurück zum Zitat Nunamaker FJ, Chen M, Purdin TDM (1991) Systems development in information systems research. J Manage Info Sys 7(3):89–106 Nunamaker FJ, Chen M, Purdin TDM (1991) Systems development in information systems research. J Manage Info Sys 7(3):89–106
Zurück zum Zitat Project Wireless Trust for Mobile Business (2002) Deliverable D4: SIM application hosting: detailed description of the concept, Munich, Germany Project Wireless Trust for Mobile Business (2002) Deliverable D4: SIM application hosting: detailed description of the concept, Munich, Germany
Zurück zum Zitat Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public key cryptosystems. Commun ACM 21(2):120–126CrossRef Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public key cryptosystems. Commun ACM 21(2):120–126CrossRef
Zurück zum Zitat Roßnagel H (2004) Mobile signatures and certification on demand. In: Katsikas SK, Gritzalis S, Lopez J (eds) Public key infrastructures. Springer, Berlin, pp 274–286CrossRef Roßnagel H (2004) Mobile signatures and certification on demand. In: Katsikas SK, Gritzalis S, Lopez J (eds) Public key infrastructures. Springer, Berlin, pp 274–286CrossRef
Zurück zum Zitat Roßnagel H (2009) Mobile Qualifizierte Elektronische Signaturen: Analyse der Hemmnisfaktoren und Gestaltungsvorschläge zur Einführung, Gabler, Wiesbaden Roßnagel H (2009) Mobile Qualifizierte Elektronische Signaturen: Analyse der Hemmnisfaktoren und Gestaltungsvorschläge zur Einführung, Gabler, Wiesbaden
Zurück zum Zitat Roßnagel H, Royer D (2005) Profitability of mobile qualified electronic signatures. In: proceedings of the 9th pacific Asia conference on information systems (PACIS 05). Juli, Bangkok, pp 1345–1355 Roßnagel H, Royer D (2005) Profitability of mobile qualified electronic signatures. In: proceedings of the 9th pacific Asia conference on information systems (PACIS 05). Juli, Bangkok, pp 1345–1355
Zurück zum Zitat Schillewaert N, Ahearne MJ, Frambach RT, Moenaert RK (2005) The adoption of information technology in the sales force. Ind Mark Manage 34(4):323–336CrossRef Schillewaert N, Ahearne MJ, Frambach RT, Moenaert RK (2005) The adoption of information technology in the sales force. Ind Mark Manage 34(4):323–336CrossRef
Zurück zum Zitat Schulz E (2007) Mobile computing: The next Pandora’s Box. Comput Secur 26(3):187CrossRef Schulz E (2007) Mobile computing: The next Pandora’s Box. Comput Secur 26(3):187CrossRef
Zurück zum Zitat Swanson M (2001) Security self assessment guide for information technology systems: special publication 800–26, National Institute for Standards and Technology. US Government Printing Office, Washington Swanson M (2001) Security self assessment guide for information technology systems: special publication 800–26, National Institute for Standards and Technology. US Government Printing Office, Washington
Zurück zum Zitat Walker B, Barnes SJ (2005) Wireless sales force automation: concept and cases. Int J Mob Commun 3(4):411–427CrossRef Walker B, Barnes SJ (2005) Wireless sales force automation: concept and cases. Int J Mob Commun 3(4):411–427CrossRef
Zurück zum Zitat Yan J, Blackwell A, Anderson R, Grant A (2004) Password memorability and security: empirical results. IEEE Secur Priv 2(5):25–31CrossRef Yan J, Blackwell A, Anderson R, Grant A (2004) Password memorability and security: empirical results. IEEE Secur Priv 2(5):25–31CrossRef
Metadaten
Titel
Secure mobile sales force automation: the case of independent sales agencies
verfasst von
Jochen Kokemüller
Heiko Roßnagel
Publikationsdatum
01.03.2012
Verlag
Springer-Verlag
Erschienen in
Information Systems and e-Business Management / Ausgabe 1/2012
Print ISSN: 1617-9846
Elektronische ISSN: 1617-9854
DOI
https://doi.org/10.1007/s10257-010-0157-x

Weitere Artikel der Ausgabe 1/2012

Information Systems and e-Business Management 1/2012 Zur Ausgabe

Premium Partner