{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T20:55:42Z","timestamp":1697489742674},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,11,24]],"date-time":"2010-11-24T00:00:00Z","timestamp":1290556800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst E-Bus Manage"],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1007\/s10257-010-0157-x","type":"journal-article","created":{"date-parts":[[2010,11,23]],"date-time":"2010-11-23T01:52:14Z","timestamp":1290477134000},"page":"117-133","source":"Crossref","is-referenced-by-count":2,"title":["Secure mobile sales force automation: the case of independent sales agencies"],"prefix":"10.1007","volume":"10","author":[{"given":"Jochen","family":"Kokem\u00fcller","sequence":"first","affiliation":[]},{"given":"Heiko","family":"Ro\u00dfnagel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,11,24]]},"reference":[{"key":"157_CR1","doi-asserted-by":"crossref","unstructured":"Adams A, Sasse MA, Lunt P (1997) Making Passwords Secure and usable. In: proceedings of HCI on people and computers XII, August, Bristol, Springer, pp 1\u201319","DOI":"10.1007\/978-1-4471-3601-9_1"},{"key":"157_CR2","unstructured":"Anderson R (2001) Why information security is hard: an economic perspective. In: Applied computer security applications conference (ACSAC 01), Dezember, Las Vegas, Nevada"},{"key":"157_CR3","volume-title":"Marktstudie mobile CRM-Systeme","author":"A Benz","year":"2003","unstructured":"Benz A, Ritz T, Stender M (2003) Marktstudie mobile CRM-Systeme. Fraunhofer IRB Verlag, Stuttgart"},{"key":"157_CR4","volume-title":"Computer password choice and personality traits among college students","author":"BJ Brown","year":"2004","unstructured":"Brown BJ, Callis K (2004) Computer password choice and personality traits among college students. Southeast Missouri State University, Cape Girardeau"},{"key":"157_CR5","volume-title":"The Canadian trusted computer product evaluation criteria: version 3.0e","author":"Canadian System Security Centre","year":"1993","unstructured":"Canadian System Security Centre (1993) The Canadian trusted computer product evaluation criteria: version 3.0e. Communication Security Establishment, Government of Canada, Canada"},{"issue":"2","key":"157_CR6","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.cose.2006.08.008","volume":"26","author":"NL Clarke","year":"2007","unstructured":"Clarke NL, Furnell SM (2007) Advanced user authentication for mobile devices. Comput Secur 26(2):109\u2013119","journal-title":"Comput Secur"},{"key":"157_CR7","unstructured":"Dolmetsch R (2000) eProcurement, Addison Wesley, Boston"},{"key":"157_CR8","unstructured":"Dumortier J, Kelm S, Nilsson H, Skouma G, Van Eecke P (2003) The legal and market aspects of electronic signatures: legal and market aspects of the application of directive 1999\/93\/EC and practical applications of electronic signatures in the Member States, the EEA, the Candidate and the Accession countries, Interdisciplinary centre for law and information technology, Katholieke University Leuven, http:\/\/europa.eu.int\/information_society\/eeurope-\/2005\/all_about\/security\/electronic_sig_report.pdf , Oktober"},{"issue":"1","key":"157_CR9","doi-asserted-by":"crossref","first-page":"123","DOI":"10.2307\/2555402","volume":"19","author":"J Farrell","year":"1988","unstructured":"Farrell J, Shapiro C (1988) Dynamic competition with switching costs. RAND J Econ 19(1):123\u2013137","journal-title":"RAND J Econ"},{"issue":"2","key":"157_CR10","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/359205.359227","volume":"44","author":"AK Ghosh","year":"2001","unstructured":"Ghosh AK, Swaminatha TM (2001) Software security and privacy risks in mobile e-commerce: examining the risks in wireless computing that will likely influence the emerging m-commerce market. Commun ACM 44(2):51\u201357","journal-title":"Commun ACM"},{"key":"157_CR11","unstructured":"Haller J, Robinson P, Walter T, Kilian-Kehr R (2002) Framework and architecture for secure mobile business applications. In: Gritzalis D, De Capitani di Vimercati S, Samarati P, Katsikas SK (ed). Security and privacy in the age of uncertainty, Proceedings of the IFIP TC11 international conference on information security (SEC2003), May 26\u201328, Athens, Greece, Kluwer, pp 413\u2013416"},{"issue":"1","key":"157_CR12","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"AR Hevner","year":"2004","unstructured":"Hevner AR, March ST, Park J, Ram S (2004) Design science in information systems research. MIS Q 28(1):75\u2013105","journal-title":"MIS Q"},{"issue":"4","key":"157_CR13","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/975817.975820","volume":"47","author":"B Ives","year":"2004","unstructured":"Ives B, Walsh KR, Schneider H (2004) The domino effect of password reuse. Commun ACM 47(4):75\u201378","journal-title":"Commun ACM"},{"issue":"2","key":"157_CR14","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1145\/762476.762479","volume":"6","author":"G Karjoth","year":"2003","unstructured":"Karjoth G (2003) Access control with IBM Tivoli access manager. ACM Trans Inf Syst Secur 6(2):232\u2013257","journal-title":"ACM Trans Inf Syst Secur"},{"issue":"7","key":"157_CR15","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1145\/1272516.1272521","volume":"50","author":"S Kesh","year":"2007","unstructured":"Kesh S, Ratnasingam P (2007) A knowledge architecture for IT security. Commun ACM 50(7):103\u2013108","journal-title":"Commun ACM"},{"key":"157_CR16","unstructured":"Kett H, H\u00f6\u00df O and Kokem\u00fcller J (2008a) Mobile Multilieferanten-Vertriebsinformationssysteme f\u00fcr Handelsvertretungen und -vermittlungen, Fraunhofer IRB, Stuttgart"},{"key":"157_CR17","unstructured":"Kett H, Kokem\u00fcller J, H\u00f6\u00df O, Engelbach W, Weisbecker A (2008b) A mobile multi-supplier sales information system for micro-sized commercial agencies. In: proceedings of the eChallenges conference 2008, Stockholm"},{"key":"157_CR18","unstructured":"Kokem\u00fcller J, Kett H, H\u00f6\u00df O, Weisbecker A (2008) A mobile support system for collaborative multi-vendor sales processes. In: proceedings of the 14th Americas conference on information systems (AMCIS), 14\u201317 August, Toronto"},{"issue":"2","key":"157_CR19","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/S0019-8501(02)00226-2","volume":"32","author":"S Leek","year":"2003","unstructured":"Leek S, Turnbull PW, Naude P (2003) How is information technology affecting business relationships? results from a UK survey. Ind Mark Manage 32(2):119\u2013126","journal-title":"Ind Mark Manage"},{"key":"157_CR20","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1016\/j.cose.2005.03.002","volume":"24","author":"KMK Mayes","year":"2005","unstructured":"Mayes KMK, Piper F (2005) Smart card based authentication: any future? Comput Secur 24:188\u2013191","journal-title":"Comput Secur"},{"issue":"1","key":"157_CR21","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/S0019-8501(99)00087-5","volume":"30","author":"NJ Merritt","year":"2001","unstructured":"Merritt NJ, Newell SJ (2001) The extent and formality of sales agency evaluations of principals. Ind Mark Manage 30(1):37\u201349","journal-title":"Ind Mark Manage"},{"issue":"3","key":"157_CR22","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1080\/07421222.1990.11517898","volume":"7","author":"FJ Nunamaker","year":"1991","unstructured":"Nunamaker FJ, Chen M, Purdin TDM (1991) Systems development in information systems research. J Manage Info Sys 7(3):89\u2013106","journal-title":"J Manage Info Sys"},{"key":"157_CR23","unstructured":"Project Wireless Trust for Mobile Business (2002) Deliverable D4: SIM application hosting: detailed description of the concept, Munich, Germany"},{"issue":"2","key":"157_CR24","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public key cryptosystems. Commun ACM 21(2):120\u2013126","journal-title":"Commun ACM"},{"key":"157_CR25","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1007\/978-3-540-25980-0_22","volume-title":"Public key infrastructures","author":"H Ro\u00dfnagel","year":"2004","unstructured":"Ro\u00dfnagel H (2004) Mobile signatures and certification on demand. In: Katsikas SK, Gritzalis S, Lopez J (eds) Public key infrastructures. Springer, Berlin, pp 274\u2013286"},{"key":"157_CR26","doi-asserted-by":"crossref","unstructured":"Ro\u00dfnagel H (2009) Mobile Qualifizierte Elektronische Signaturen: Analyse der Hemmnisfaktoren und Gestaltungsvorschl\u00e4ge zur Einf\u00fchrung, Gabler, Wiesbaden","DOI":"10.1007\/978-3-8349-8182-0"},{"key":"157_CR27","first-page":"1345","volume-title":"Profitability of mobile qualified electronic signatures. In: proceedings of the 9th pacific Asia conference on information systems (PACIS 05)","author":"H Ro\u00dfnagel","year":"2005","unstructured":"Ro\u00dfnagel H, Royer D (2005) Profitability of mobile qualified electronic signatures. In: proceedings of the 9th pacific Asia conference on information systems (PACIS 05). Juli, Bangkok, pp 1345\u20131355"},{"issue":"4","key":"157_CR28","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/j.indmarman.2004.09.013","volume":"34","author":"N Schillewaert","year":"2005","unstructured":"Schillewaert N, Ahearne MJ, Frambach RT, Moenaert RK (2005) The adoption of information technology in the sales force. Ind Mark Manage 34(4):323\u2013336","journal-title":"Ind Mark Manage"},{"issue":"3","key":"157_CR29","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/j.cose.2007.04.002","volume":"26","author":"E Schulz","year":"2007","unstructured":"Schulz E (2007) Mobile computing: The next Pandora\u2019s Box. Comput Secur 26(3):187","journal-title":"Comput Secur"},{"key":"157_CR30","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-26","volume-title":"Security self assessment guide for information technology systems: special publication 800\u201326, National Institute for Standards and Technology","author":"M Swanson","year":"2001","unstructured":"Swanson M (2001) Security self assessment guide for information technology systems: special publication 800\u201326, National Institute for Standards and Technology. US Government Printing Office, Washington"},{"issue":"4","key":"157_CR31","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1504\/IJMC.2005.007025","volume":"3","author":"B Walker","year":"2005","unstructured":"Walker B, Barnes SJ (2005) Wireless sales force automation: concept and cases. Int J Mob Commun 3(4):411\u2013427","journal-title":"Int J Mob Commun"},{"issue":"5","key":"157_CR32","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"J Yan","year":"2004","unstructured":"Yan J, Blackwell A, Anderson R, Grant A (2004) Password memorability and security: empirical results. IEEE Secur Priv 2(5):25\u201331","journal-title":"IEEE Secur Priv"}],"container-title":["Information Systems and e-Business Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-010-0157-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10257-010-0157-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-010-0157-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T09:21:58Z","timestamp":1559812918000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10257-010-0157-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,24]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["157"],"URL":"https:\/\/doi.org\/10.1007\/s10257-010-0157-x","relation":{},"ISSN":["1617-9846","1617-9854"],"issn-type":[{"value":"1617-9846","type":"print"},{"value":"1617-9854","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,11,24]]}}}