my paper and offered detailed valuable comments
and advices on the topics addressed. Second, I
would like to thank Gunther Schäfer – without his
support and patience this work would not have been
possible.
REFERENCES
Ashurst, C. A.; Doherty, N. F.; Peppard, J. P. (2008):
Improving the Impact of IT Development Projects:
The Benefits Realization Capability Model. In:
European Journal of Information Systems 17 (2008) 4,
p. 352-370.
Bertalanffy, L. v. (1976): General System Theory. George
Braziller Inc., New York.
Boulding, K. (1956): General Systems Theory – The Ske-
leton of Science. In: Management Science 2: 197-208.
Brynjolfsson, E.; Hitt, L.; and S. Yang (2002): Intangible
Assets: How the Interaction of Computers and
Organizational Structure affects Stock Market
Valuations. In: Brookings Papers on Economic
Activity: Macroeconomics (1), p. 137-199.
Corsten, H. (2000): Lexikon der Betriebswirtschaftslehre.
4th Edition. Oldenbourg. Munich.
Day, R., Daly, J., Sheedy, T. and Christiansen, C. (2000):
Widening Your Secure eBusiness to Wireless.
Framingham: IDC. http://www.bandwidthco.com
/whitepapers/wirelessforensics/security/Widening%20
Your%20Secure%20ebusiness%20to%20Wireless.pdf
DIN 1995: OENORM DIN 19226-1:1995-07-01:
Leittechnik – Regelungstechnik und
Steuerungstechnik – Allgemeine Grundbegriffe.
Beuth, Berlin.
Frolick, M. N. and Chen, L.-D. (2004): Assessing m-
Commerce Opportunities. Information Systems
Management, 21 (2), 53-61.
Gerpott, T.J. and Kornmeier, K. (2004): Electronic
Security (E-Security). In: Sjurts, I. (Ed.): Gabler
Lexikon Medienwirtschaft. Gabler. Wiesbaden.
Goos, G. and Zimmermann, W. (2005): Vorlesungen über
Informatik, Band 1: Grundlagen und funktionales
Programmieren. 4th Edition, Springer, Berlin.
Gluschke, G. (2001): Sicherheit in mobilen Systemen. In:
Rossbach, G. (Ed.).: Mobile Internet. dpunkt.
Heidelberg.
Gross, T., Gulliksen, J., Kotzé, P., Oestreicher, L.,
Palanque, P., Prates, R.O., Winckler, M. (Eds.) (2009):
Human-Computer Interaction - INTERACT 2009.
Proceedings of the 12
th
IFIP TC 13 International
Conference, Uppsala, Sweden.
Högler, T. (2012): Framework for a Holistic Evaluation of
ICT. In: Proceedings of the 25th Bled eConference
Graduate Student Consortium. http://bledconference
.org/public/conferences/1/Bled2012GSC-Proceedings.pdf
Högler, T. (2014): Success Factors and the Holistic
Approach for Profitability Analysis of Mobile
Systems. Submitted for conference publication at the
Twenty Second European Conference on Information
Systems, Tel Aviv.
Köhler, A. and Gruhn, V. (2004): Mobile Process
Landscaping am Beispiel von Vertriebsprozessen in
der Assekuranz. In: Pousttchi, K.; Turowski, K. (ed.):
Mobile Economy: Transaktionen, Prozesse,
Anwendungen und Dienste. Proceedings of the 4.
Workshop Mobile Commerce. Köllen, Bonn.
Kornmeier, K. (2009): Determinanten der
Endkundenakzeptanz mobilkommunikationsbasierter
Zahlungssysteme: Eine theoretische und empirische
Analyse. PhD thesis, published at: http://
duepublico.uni-duisburg-essen.de/servlets/Derivate
Servlet/Derivate-21559/Dissertation_Kornmeier.pdf.
Lonthoff, J. and Ortner, E. (2007): Klassifikations- und
Lösungsansätze für Web Services im mobilen Umfeld.
In: König-Ries, B., Lehner, F., Malaka, R. and Türker,
C. (Ed.): Proceedings of the MMS 2007 – Mobilität
und Mobile Informationssysteme, p 73-84. Lecture
Notes in Informatics. Aachen.
Loveman, G. (1994): An Assessment of Productivity
Impact of Information Technologies. In: Allen, T. and
M. Scott Morton: Information Technology and the
Corporation of the1990‘s. Oxford. New York.
Pietsch, T. (1999): Bewertung von Informations- und
Kommunikationssystemen – Ein Vergleich
betriebswirtschaftlicher Verfahren. Erich Schmidt,
Berlin.
Price, S.; Jewitt, C.; Brown, B. (2013): Digital Technology
Research. London. Sage Publications.
Princen, T.; Schreurs, J. (2010): Secured Blackberry Used
in E-Learning. In: Auer, M.; Schreurs, J. (Ed.)
Academic and corporate e-learning in a global context.
International Association of Online Engineering.
Hasselt.
Rockart, J.F. (1979): Chief Executives Define Their Own
Data Needs. In: Harvard Business Review 57 (1979)
2, p. 81-93.
Solow, R. (1987): We‘d Better Watch Out. In: New York
Times Book Review, July 12.
Schach, R., Scherer, R., Menzel, K. et al. (2007): Mobile
Computing im Bauwesen: Konzepte, Anwendungen,
Potenziale. Expert Verlag. Renningen.
Schiller, J. (2000): Mobilkommunikation. Techniken für
das allgegenwärtige Internet. Addison-Wesley, Munic.
AResearchAgendaforMobileSystemsEvaluation
459