Information security in an identity management lifecycle

mitigating identity crimes

Rodger Jamieson, Lesley Land, Stephen Smith, Greg Stephens, Donald Winchester

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Abstract

Identity management is a wide area that deals with identifying individuals or entities in a system (such as a nation, community, network, or organization) and controlling access to resources or use and flow of transactions (e.g., financial) within systems by associating user rights and restrictions with the established identity (identifiers). A qualitative interpretive methodology was adopted with industry and government organizational experts interviewed. In addition, secondary data were collected and analyzed. We used a lifecycle frame to interpret themes and issues from interview transcripts and other collated secondary data. The paper's contribution is to make sense of 'identity' in offline and/or online channels and to extend a 3- stage identity management lifecycle framework (IDSP, 2008) to four which includes: initial 'enrolment', 'transacting' 'database', and 'purging'.
Original languageEnglish
Title of host publication15th Americas Conference on Information Systems 2009 (AMCIS 2009)
Subtitle of host publicationProceedings of a Meeting held 6-9 August 2009, San Francisco, California
Place of PublicationSan Francisco
PublisherAssociation for Information Systems
Pages1-10
Number of pages10
Volume9
ISBN (Print)9781615675814
Publication statusPublished - 2009
Externally publishedYes
EventAmericas Conference on Information Systems (15th : 2009) - San Francisco, CA
Duration: 6 Aug 20099 Aug 2009

Conference

ConferenceAmericas Conference on Information Systems (15th : 2009)
CitySan Francisco, CA
Period6/08/099/08/09

Keywords

  • Identity attributes lifecycle
  • Identity crimes (fraud/theft/deception)
  • Identity management
  • Information systems (IS)

Fingerprint Dive into the research topics of 'Information security in an identity management lifecycle: mitigating identity crimes'. Together they form a unique fingerprint.

Cite this