Identity management (IdM) comprises the processes and infrastructure for the creation, maintenance, and use of digital identities. This includes designating who has access to resources, who grants that access, and how accountability and compliance is maintained. IdM has become an important aspect of IT security infrastructure in organizations, and some consider it to be the most important solution for enabling compliance. To facilitate identity management, usable technological solutions are important. In this ongoing research, we plan to study the practice of identity management from a socio-technical point of view, and study how technology can improve IdM. Our final goal is to develop recommendations for user-centered design of IdM systems...
IT security management (ITSM) technologies are important components of IT security in orga-nizations...
IT security management (ITSM) technologies are important components of IT security in organizations....
IT security management (ITSM) technologies are important components of IT security in organizations....
Abstract. This paper summarizes the motivation for deploying identity management technologies and th...
Large companies are daily faced with new challenges in all areas. Many challenges come from informat...
Large companies are daily faced with new challenges in all areas. Many challenges come from informat...
Every person has his/her own identity. It’s important to manage a digital identity in a computer net...
Every person has his/her own identity. It’s important to manage a digital identity in a computer net...
The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies t...
The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies t...
The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies t...
The article argues for a shift of perspective in identity management (IDM) research and development....
The article argues for a shift of perspective in identity management (IDM) research and development....
The article argues for a shift of perspective in identity management (IDM) research and development....
This case study describes the adoption of an enterprise identity management(IdM) system in an insura...
IT security management (ITSM) technologies are important components of IT security in orga-nizations...
IT security management (ITSM) technologies are important components of IT security in organizations....
IT security management (ITSM) technologies are important components of IT security in organizations....
Abstract. This paper summarizes the motivation for deploying identity management technologies and th...
Large companies are daily faced with new challenges in all areas. Many challenges come from informat...
Large companies are daily faced with new challenges in all areas. Many challenges come from informat...
Every person has his/her own identity. It’s important to manage a digital identity in a computer net...
Every person has his/her own identity. It’s important to manage a digital identity in a computer net...
The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies t...
The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies t...
The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies t...
The article argues for a shift of perspective in identity management (IDM) research and development....
The article argues for a shift of perspective in identity management (IDM) research and development....
The article argues for a shift of perspective in identity management (IDM) research and development....
This case study describes the adoption of an enterprise identity management(IdM) system in an insura...
IT security management (ITSM) technologies are important components of IT security in orga-nizations...
IT security management (ITSM) technologies are important components of IT security in organizations....
IT security management (ITSM) technologies are important components of IT security in organizations....