Enterprise identity management : towards an investment decision support approach /

Saved in:
Bibliographic Details
Author / Creator:Royer, Denis.
Imprint:Berlin ; New York : Springer, c2013.
Description:1 online resource.
Language:English
Series:Progress in IS
Progress in IS.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/9850311
Hidden Bibliographic Details
ISBN:9783642350405 (electronic bk.)
3642350402 (electronic bk.)
9783642350399
Notes:Includes bibliographical references.
Summary:?The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for decision makers it seems difficult to fully understand the impacts and opportunities arising from the introduction of EIdMS. This book explores the relevant aspects for an ex-ante evaluation of EIdMS. Therefore it examines this domain by employing a qualitative expert interview study to better understand the nature of EIdMS, as they are situated between security and productive IT systems. To this regard, the focus is

MARC

LEADER 00000cam a2200000Ka 4500
001 9850311
003 ICU
005 20140128111700.0
006 m o d
007 cr cnu---unuuu
008 130401s2013 gw ob 000 0 eng d
020 |a 9783642350405 (electronic bk.) 
020 |a 3642350402 (electronic bk.) 
020 |z 9783642350399 
035 |a (OCoLC)834089348 
040 |a GW5XE  |c GW5XE  |d YDXCP  |d ZMC  |d COO  |d MHW  |d IDEBK  |d DEBSZ 
049 |a CGUA 
082 0 4 |a 005.8  |2 23 
090 |a QA76.9.A25  |b R69 2013 
100 1 |a Royer, Denis.  |0 http://id.loc.gov/authorities/names/nb2009018022  |1 http://viaf.org/viaf/91098863 
245 1 0 |a Enterprise identity management :  |b towards an investment decision support approach /  |c Denis Royer. 
260 |a Berlin ;  |a New York :  |b Springer,  |c c2013. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a computer  |b c  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/c 
338 |a online resource  |b cr  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/cr 
490 1 |a Progress in IS 
505 0 0 |t Awareness and Suggestion --  |t Introduction --  |t Scientific Positioning and Research Approach --  |t Development of the Artefact --  |t EIdM: Concepts, Technologies, and Application Fields --  |t Evaluation of EIdM Investments --  |t A Decision Support Model for the Introduction of EIdM Systems --  |t Evaluation of the Artefact --  |t Prototype Implementation of an EIdM Decision Support System --  |t Empirical Evaluation of the Theoretical Model --  |t Conclusion --  |t Conclusion and Outlook. 
504 |a Includes bibliographical references. 
520 |a ?The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for decision makers it seems difficult to fully understand the impacts and opportunities arising from the introduction of EIdMS. This book explores the relevant aspects for an ex-ante evaluation of EIdMS. Therefore it examines this domain by employing a qualitative expert interview study to better understand the nature of EIdMS, as they are situated between security and productive IT systems. To this regard, the focus is 
650 0 |a Computer networks  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh94001277 
650 0 |a Computer networks  |x Access control.  |0 http://id.loc.gov/authorities/subjects/sh2007008424 
650 0 |a Information technology  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh2009127217 
650 0 |a Data protection.  |0 http://id.loc.gov/authorities/subjects/sh85035859 
653 4 |a Economics. 
653 4 |a Data protection. 
653 4 |a Information Systems. 
653 4 |a Management information systems. 
653 4 |a Business Information Systems. 
653 4 |a Systems and Data Security. 
653 4 |a Innovation/Technology Management. 
655 4 |a Electronic books. 
655 0 |a Electronic books. 
650 7 |a Computer networks  |x Access control.  |2 fast  |0 http://id.worldcat.org/fast/fst00872298 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 http://id.worldcat.org/fast/fst00872341 
650 7 |a Data protection.  |2 fast  |0 http://id.worldcat.org/fast/fst00887958 
650 7 |a Information technology  |x Security measures.  |2 fast  |0 http://id.worldcat.org/fast/fst00973129 
830 0 |a Progress in IS. 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-35040-5  |y SpringerLink 
903 |a HeVa 
035 |a (ICU)9850311 
929 |a eresource 
999 f f |i cf32f62b-2748-5e41-9caa-f70d53cc3ffe  |s 2437dc69-978f-52e9-918c-79a87ae042ca 
928 |t Library of Congress classification  |a QA76.9.A25 R69 2013  |l Online  |c UC-FullText  |u http://dx.doi.org/10.1007/978-3-642-35040-5  |z SpringerLink  |g ebooks  |i 11492655