Information security in an identity management lifecycle: Mitigating identity crimes

Rodger Jamieson, Lesley Land, Stephen Smith, Greg Stephens, Donald Winchester

Research output: Contribution to conferenceConference paper

1 Citation (Scopus)

Abstract

Identity management is a wide area that deals with identifying individuals or entities in a system (such as a nation, community, network, or organization) and controlling access to resources or use and flow of transactions (e.g., financial) within systems by associating user rights and restrictions with the established identity (identifiers). A qualitative interpretive methodology was adopted with industry and government organizational experts interviewed. In addition, secondary data were collected and analyzed. We used a lifecycle frame to interpret themes and issues from interview transcripts and other collated secondary data. The paper's contribution is to make sense of 'identity' in offline and/or online channels and to extend a 3- stage identity management lifecycle framework (IDSP, 2008) to four which includes: initial 'enrolment', 'transacting' 'database', and 'purging'.
Original languageEnglish
Pages5881-5889
Number of pages9
Publication statusPublished - 1 Jan 2009
Externally publishedYes
Event15th Americas Conference on Information Systems 2009, AMCIS 2009 -
Duration: 1 Jan 2009 → …

Conference

Conference15th Americas Conference on Information Systems 2009, AMCIS 2009
Period1/01/09 → …

Keywords

  • Identity attributes lifecycle
  • Identity crimes (fraud/theft/deception)
  • Identity management
  • Information systems (IS)

Fingerprint

Dive into the research topics of 'Information security in an identity management lifecycle: Mitigating identity crimes'. Together they form a unique fingerprint.

Cite this