Abstract
Identity management is a wide area that deals with identifying individuals or entities in a system (such as a nation, community, network, or organization) and controlling access to resources or use and flow of transactions (e.g., financial) within systems by associating user rights and restrictions with the established identity (identifiers). A qualitative interpretive methodology was adopted with industry and government organizational experts interviewed. In addition, secondary data were collected and analyzed. We used a lifecycle frame to interpret themes and issues from interview transcripts and other collated secondary data. The paper's contribution is to make sense of ‘identity’ in offline and/or online channels and to extend a 3- stage identity management lifecycle framework (IDSP, 2008) to four which includes: initial ‘enrolment’, ‘transacting’ ‘database’, and ‘purging’.
Recommended Citation
Jamieson, Rodger; Land, Lesley Pek Wee; Smith, Stephen; Stephens, Greg; and Winchester, Donald, "Information Security in an Identity Management Lifecycle: Mitigating Identity Crimes" (2009). AMCIS 2009 Proceedings. 686.
https://aisel.aisnet.org/amcis2009/686