Skip to main content

Enterprise Identity Management

Towards an Investment Decision Support Approach

  • Book
  • © 2013

Overview

Part of the book series: Progress in IS (PROIS)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (8 chapters)

  1. Awareness and Suggestion

  2. Development of the Artefact

  3. Evaluation of the Artefact

  4. Conclusion

Keywords

About this book

​The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for decision makers it seems difficult to fully understand the impacts and opportunities arising from the introduction of EIdMS. This book explores the relevant aspects for an ex-ante evaluation of EIdMS. Therefore it examines this domain by employing a qualitative expert interview study to better understand the nature of EIdMS, as they are situated between security and productive IT systems. To this regard, the focus is put on the general nature of EIdMS projects and the constructs being relevant for analyzing such projects in the decision support phase. Based on the derived constructs and thematic topics from the interviews, an explanatory model for EIdMS introductions is derived and iteratively improved and evaluated. Finally, a possible application use-case for the creation of adequate decision support tools is presented.

Reviews

From the reviews:

“Describes the principles of authentication, authorization, and privilege management on computer systems, and EIdM systems (EIdMS) provide the technical solutions for administering these privileges. … provides the foundation needed to support decision-making processes that can successfully justify an EIdMS implementation. … will be a valuable aid to professionals working in this area.” (David B. Henderson, Computing Reviews, January, 2014)

Authors and Affiliations

  • Faculty of Economics and Business Admini, Chair for Mobile Business & Multilateral, Goethe University Frankfurt am Main, Frankfurt, Germany

    Denis Royer

Bibliographic Information

Publish with us