|
![]() |
|||
|
||||
OverviewThe introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for decision makers it seems difficult to fully understand the impacts and opportunities arising from the introduction of EIdMS. This book explores the relevant aspects for an ex-ante evaluation of EIdMS. Therefore it examines this domain by employing a qualitative expert interview study to better understand the nature of EIdMS, as they are situated between security and productive IT systems. To this regard, the focus is put on the general nature of EIdMS projects and the constructs being relevant for analyzing such projects in the decision support phase. Based on the derived constructs and thematic topics from the interviews, an explanatory model for EIdMS introductions is derived and iteratively improved and evaluated. Finally, a possible application use-case for the creation of adequate decision support tools is presented. Full Product DetailsAuthor: Denis RoyerPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2013 ed. Dimensions: Width: 15.50cm , Height: 1.40cm , Length: 23.50cm Weight: 4.853kg ISBN: 9783642350399ISBN 10: 3642350399 Pages: 219 Publication Date: 22 March 2013 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsIntroduction.- Scientific Positioning and Research Approach.- EIdM: Concepts, Technologies, and Application Fields.- Evaluation of EIdMS Investments.- A Decision Support Model for the Introduction of EIdMS Systems.- Prototype Implementation of an EIdMS Decision Support System.- Empirical Evaluation of the Theoretical Model.- Conclusion and Outlook.ReviewsFrom the reviews: Describes the principles of authentication, authorization, and privilege management on computer systems, and EIdM systems (EIdMS) provide the technical solutions for administering these privileges. ... provides the foundation needed to support decision-making processes that can successfully justify an EIdMS implementation. ... will be a valuable aid to professionals working in this area. (David B. Henderson, Computing Reviews, January, 2014) From the reviews: Describes the principles of authentication, authorization, and privilege management on computer systems, and EIdM systems (EIdMS) provide the technical solutions for administering these privileges. ... provides the foundation needed to support decision-making processes that can successfully justify an EIdMS implementation. ... will be a valuable aid to professionals working in this area. (David B. Henderson, Computing Reviews, January, 2014) Author InformationTab Content 6Author Website:Countries AvailableAll regions |