Information security-enabled business process architecture for mobile CRM: the role of technology, planning, training and process
Jayanthi Ranjan and
Vishal Bhatnagar
International Journal of Networking and Virtual Organisations, 2010, vol. 7, issue 5, 452-464
Abstract:
This paper presents mobile Customer Relationship Management (mCRM) business architecture considering information security measures. The paper presents the importance of technology, process, planning and training as key factors for the proper implementation of mCRM in the organisation. All of us are aware that the information transferred through the mobile medium will likely be threatened by unauthorised users. The customer data reveal hidden and personal information. Private information demands the use of Information Security (IS) measures to enable the secure transmission of customer information. The architecture considers IS of primary concern while implementing mCRM in organisations. The paper also justifies the extensive use of technology innovation for the proper implementation of mCRM.
Keywords: mobile CRM; mCRM implementation; data mining; customer relationship management; information security; technology innovation; training; planning. (search for similar items in EconPapers)
Date: 2010
References: Add references at CitEc
Citations:
Downloads: (external link)
http://www.inderscience.com/link.php?id=34924 (text/html)
Access to full text is restricted to subscribers.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:ids:ijnvor:v:7:y:2010:i:5:p:452-464
Access Statistics for this article
More articles in International Journal of Networking and Virtual Organisations from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().