Proposing a digital identity management framework: A mixed-method approach

被引:4
|
作者
Rasouli, Hatef [1 ]
Valmohammadi, Changiz [2 ]
Azad, Naser [3 ]
Abbaspour Esfeden, Ghanbar [2 ]
机构
[1] Islamic Azad Univ, Dept IT Management, South Tehran Branch, Tehran, Iran
[2] Islamic Azad Univ, Dept Ind Management, Fac Management, South Tehran Branch, Tehran, Iran
[3] Islamic Azad Univ, Dept Business Management, Fac Management, South Tehran Branch, Tehran, Iran
来源
关键词
authentication; cyberspace; digital identity; digital identity management; identity management;
D O I
10.1002/cpe.6271
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This research aims to study the most critical elements of digital identity management to recognize the pattern and the requirements of their use and implementation. Further, an attempt is made to identify and prioritize the criteria and their relevant indicators of digital identity management in the form of a comprehensive framework. To this end a fuzzy multicriteria decision-making approach was utilized. The framework focuses on a comprehensive perspective to consider digital identity and deals with compiling strategies and operational patterns based on the defined priorities. This applied research with a fundamental approach has a descriptive-explanatory method as well. Through an in depth-review of the extant literature and designing an instrument as well as semi-structure interview the necessary data were collected. The research population consists of 10 experts. By reviewing the theoretical literature of the research, effective factors were identified and screened by the Fuzzy Delphi method leading to six main factors and 31 subfactors. Then, the collected data were analyzed through a hybrid technique known as FDANP (Fuzzy DEMATEL-ANP) to determine the interactions between the factors and the subfactors and to weigh and prioritize them. The obtained results revealed that "strategic planning" is the most influential factor in digital identity management. Also, the subfactors namely "The use of the maturity model of digital identity management," "commitment to the whole organization," "integrity of digital identity management system with other systems," "integrity of digital identity management program," and "integrity of the two dimensions of identity management and access management" were ranked as the most influential subfactors of "strategic planning," respectively. "Access management" was the most permeable factor in digital identity management. It means that this factor is the main problem and could be solved with the help of the influential factors. In addition, subfactors: "Access control to all resources only through the digital identity management system," "Solution for access management of premium accounts," "Multi-factor authentication support," "Access policy to all resources and information," and "Determination of the manner of the user access to resources outside the organization" were ranked as the most permeable subfactors.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] Proposing and Validating a New Way of Construction Hazard Recognition Training in Academia: Mixed-Method Approach
    Tixier, Antoine J. -P.
    Albert, Alex
    Hallowell, Matthew R.
    [J]. PRACTICE PERIODICAL ON STRUCTURAL DESIGN AND CONSTRUCTION, 2018, 23 (01)
  • [2] Food supply chain resilience through digital transformation: a mixed-method approach
    Tortorella, Guilherme
    Gloet, Marianne
    Samson, Daniel
    Kurnia, Sherah
    Fogliatto, Flavio S.
    Anzanello, Michel J.
    [J]. INTERNATIONAL JOURNAL OF LOGISTICS MANAGEMENT, 2024,
  • [3] A framework for cyber-risk insurance against ransomware: A mixed-method approach
    Mukhopadhyay, Arunabha
    Jain, Swati
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2024, 74
  • [4] A Mixed-Method Approach to Fault Tolerance and Management for Resilient Hierarchical Routing
    Ismail, Ahmed
    Seddik, Karim
    [J]. 2014 6TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2014, : 294 - 301
  • [5] Exploring the critical success factors of information security management: a mixed-method approach
    Chen, Hao
    Hai, Yuge
    [J]. INFORMATION AND COMPUTER SECURITY, 2024,
  • [6] Voice in Words: A Mixed-Method Approach for Decoding Digital Footprints Using Online Reviews
    Rasool, Gowhar
    Pathania, Anjali
    [J]. JOURNAL OF QUALITY ASSURANCE IN HOSPITALITY & TOURISM, 2023, 24 (06) : 1014 - 1045
  • [7] Leadership styles in SMEs: a mixed-method approach
    Franco, Mario
    Matos, Pedro Goncalo
    [J]. INTERNATIONAL ENTREPRENEURSHIP AND MANAGEMENT JOURNAL, 2015, 11 (02) : 425 - 451
  • [8] Understanding "Zoom fatigue": A mixed-method approach
    Shoshan, Hadar Nesher
    Wehrt, Wilken
    [J]. APPLIED PSYCHOLOGY-AN INTERNATIONAL REVIEW-PSYCHOLOGIE APPLIQUEE-REVUE INTERNATIONALE, 2022, 71 (03): : 827 - 852
  • [9] Leadership styles in SMEs: a mixed-method approach
    Mário Franco
    Pedro Gonçalo Matos
    [J]. International Entrepreneurship and Management Journal, 2015, 11 : 425 - 451
  • [10] Linking knowledge management processes to innovation A mixed-method and cross-national approach
    Teixeira, Eduardo Kunzel
    Oliveira, Mirian
    Curado, Carla
    [J]. MANAGEMENT RESEARCH REVIEW, 2019, 43 (03): : 332 - 349