Information security in an identity management lifecycle: mitigating identity crimes

Rodger Jamieson, Lesley Land, Stephen Smith, Greg Stephens, Donald Winchester

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Abstract

Identity management is a wide area that deals with identifying individuals or entities in a system (such as a nation, community, network, or organization) and controlling access to resources or use and flow of transactions (e.g., financial) within systems by associating user rights and restrictions with the established identity (identifiers). A qualitative interpretive methodology was adopted with industry and government organizational experts interviewed. In addition, secondary data were collected and analyzed. We used a lifecycle frame to interpret themes and issues from interview transcripts and other collated secondary data. The paper's contribution is to make sense of 'identity' in offline and/or online channels and to extend a 3- stage identity management lifecycle framework (IDSP, 2008) to four which includes: initial 'enrolment', 'transacting' 'database', and 'purging'.
LanguageEnglish
Title of host publication15th Americas Conference on Information Systems 2009 (AMCIS 2009)
Subtitle of host publicationProceedings of a Meeting held 6-9 August 2009, San Francisco, California
Place of PublicationSan Francisco
PublisherAssociation for Information Systems
Pages1-10
Number of pages10
Volume9
ISBN (Print)9781615675814
Publication statusPublished - 2009
Externally publishedYes
EventAmericas Conference on Information Systems (15th : 2009) - San Francisco, CA
Duration: 6 Aug 20099 Aug 2009

Conference

ConferenceAmericas Conference on Information Systems (15th : 2009)
CitySan Francisco, CA
Period6/08/099/08/09

Fingerprint

offense
management
transaction
expert
organization
industry
methodology
interview
resources
community

Keywords

  • Identity attributes lifecycle
  • Identity crimes (fraud/theft/deception)
  • Identity management
  • Information systems (IS)

Cite this

Jamieson, R., Land, L., Smith, S., Stephens, G., & Winchester, D. (2009). Information security in an identity management lifecycle: mitigating identity crimes. In 15th Americas Conference on Information Systems 2009 (AMCIS 2009): Proceedings of a Meeting held 6-9 August 2009, San Francisco, California (Vol. 9, pp. 1-10). San Francisco: Association for Information Systems.
Jamieson, Rodger ; Land, Lesley ; Smith, Stephen ; Stephens, Greg ; Winchester, Donald. / Information security in an identity management lifecycle : mitigating identity crimes. 15th Americas Conference on Information Systems 2009 (AMCIS 2009): Proceedings of a Meeting held 6-9 August 2009, San Francisco, California. Vol. 9 San Francisco : Association for Information Systems, 2009. pp. 1-10
@inproceedings{1003cd288b1c46ee84f529b785d54517,
title = "Information security in an identity management lifecycle: mitigating identity crimes",
abstract = "Identity management is a wide area that deals with identifying individuals or entities in a system (such as a nation, community, network, or organization) and controlling access to resources or use and flow of transactions (e.g., financial) within systems by associating user rights and restrictions with the established identity (identifiers). A qualitative interpretive methodology was adopted with industry and government organizational experts interviewed. In addition, secondary data were collected and analyzed. We used a lifecycle frame to interpret themes and issues from interview transcripts and other collated secondary data. The paper's contribution is to make sense of 'identity' in offline and/or online channels and to extend a 3- stage identity management lifecycle framework (IDSP, 2008) to four which includes: initial 'enrolment', 'transacting' 'database', and 'purging'.",
keywords = "Identity attributes lifecycle, Identity crimes (fraud/theft/deception), Identity management, Information systems (IS)",
author = "Rodger Jamieson and Lesley Land and Stephen Smith and Greg Stephens and Donald Winchester",
year = "2009",
language = "English",
isbn = "9781615675814",
volume = "9",
pages = "1--10",
booktitle = "15th Americas Conference on Information Systems 2009 (AMCIS 2009)",
publisher = "Association for Information Systems",
address = "United States",

}

Jamieson, R, Land, L, Smith, S, Stephens, G & Winchester, D 2009, Information security in an identity management lifecycle: mitigating identity crimes. in 15th Americas Conference on Information Systems 2009 (AMCIS 2009): Proceedings of a Meeting held 6-9 August 2009, San Francisco, California. vol. 9, Association for Information Systems, San Francisco, pp. 1-10, Americas Conference on Information Systems (15th : 2009), San Francisco, CA, 6/08/09.

Information security in an identity management lifecycle : mitigating identity crimes. / Jamieson, Rodger; Land, Lesley; Smith, Stephen; Stephens, Greg; Winchester, Donald.

15th Americas Conference on Information Systems 2009 (AMCIS 2009): Proceedings of a Meeting held 6-9 August 2009, San Francisco, California. Vol. 9 San Francisco : Association for Information Systems, 2009. p. 1-10.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

TY - GEN

T1 - Information security in an identity management lifecycle

T2 - mitigating identity crimes

AU - Jamieson, Rodger

AU - Land, Lesley

AU - Smith, Stephen

AU - Stephens, Greg

AU - Winchester, Donald

PY - 2009

Y1 - 2009

N2 - Identity management is a wide area that deals with identifying individuals or entities in a system (such as a nation, community, network, or organization) and controlling access to resources or use and flow of transactions (e.g., financial) within systems by associating user rights and restrictions with the established identity (identifiers). A qualitative interpretive methodology was adopted with industry and government organizational experts interviewed. In addition, secondary data were collected and analyzed. We used a lifecycle frame to interpret themes and issues from interview transcripts and other collated secondary data. The paper's contribution is to make sense of 'identity' in offline and/or online channels and to extend a 3- stage identity management lifecycle framework (IDSP, 2008) to four which includes: initial 'enrolment', 'transacting' 'database', and 'purging'.

AB - Identity management is a wide area that deals with identifying individuals or entities in a system (such as a nation, community, network, or organization) and controlling access to resources or use and flow of transactions (e.g., financial) within systems by associating user rights and restrictions with the established identity (identifiers). A qualitative interpretive methodology was adopted with industry and government organizational experts interviewed. In addition, secondary data were collected and analyzed. We used a lifecycle frame to interpret themes and issues from interview transcripts and other collated secondary data. The paper's contribution is to make sense of 'identity' in offline and/or online channels and to extend a 3- stage identity management lifecycle framework (IDSP, 2008) to four which includes: initial 'enrolment', 'transacting' 'database', and 'purging'.

KW - Identity attributes lifecycle

KW - Identity crimes (fraud/theft/deception)

KW - Identity management

KW - Information systems (IS)

M3 - Conference proceeding contribution

SN - 9781615675814

VL - 9

SP - 1

EP - 10

BT - 15th Americas Conference on Information Systems 2009 (AMCIS 2009)

PB - Association for Information Systems

CY - San Francisco

ER -

Jamieson R, Land L, Smith S, Stephens G, Winchester D. Information security in an identity management lifecycle: mitigating identity crimes. In 15th Americas Conference on Information Systems 2009 (AMCIS 2009): Proceedings of a Meeting held 6-9 August 2009, San Francisco, California. Vol. 9. San Francisco: Association for Information Systems. 2009. p. 1-10