Identity in the Information Society 3 (3):515-538 (2010)
|Abstract||The article argues for a shift of perspective in identity management (IDM) research and development. Accessibility and usability issues affect identity management to such an extent that they demand a reframing and reformulation of basic designs and requirements of modern identity management systems. The rationale for the traditional design of identity management systems and mechanisms has been security concerns as defined in the field of security engineering. By default the highest security level has been recommended and implemented, often without taking end-user needs and accessibility issues into serious consideration. The article provides a conceptual framework for inclusive IDM, a brief overview of the regulatory status of inclusive IDM and a taxonomy of inclusive identity management methods. Several widespread IDM approaches, methods and techniques are analyzed and discussed from the perspective of inclusive design. Several important challenges are identified and some ideas for solutions addressing the challenges are proposed and discussed|
|Keywords||E-Inclusion Identity management Information security Privacy Authentication Exclusion Disabilities Universal design Usability|
|Through your library||Configure|
Similar books and articles
Theodora Varvarigou & Vassiliki Andronikou (2009). Identity Management in GRID Computing and Service Oriented Architectures: Research and Practice. Identity in the Information Society 2 (2):95-98.
Noëmi Manders-Huits (2010). Practical Versus Moral Identities in Identity Management. Ethics and Information Technology 12 (1).
Hidehito Gomi (2010). A Persistent Data Tracking Mechanism for User-Centric Identity Governance. Identity in the Information Society 3 (3):639-656.
Adrian Rahaman & Martina Angela Sasse (2010). A Framework for the Lived Experience of Identity. Identity in the Information Society 3 (3):605-638.
D. Barnard-Wills & D. Ashenden (2010). Public Sector Engagement with Online Identity Management. Identity in the Information Society 3 (3):657-674.
Matteo Gaeta, Juergen Jaehnert, Kleopatra Konstanteli, Sergio Miranda, Pierluigi Ritrovato & Theodora Varvarigou (2009). Federated Identity Management in Mobile Dynamic Virtual Organizations. Identity in the Information Society 2 (2):115-136.
Herbert Kubicek (2010). Introduction: Conceptual Framework and Research Design for a Comparative Analysis of National eID Management Systems in Selected European Countries. Identity in the Information Society 3 (1):5-26.
John M. T. Balmer, Kyoko Fukukawa & Edmund R. Gray (2007). The Nature and Management of Ethical Corporate Identity: A Commentary on Corporate Identity, Corporate Social Responsibility and Ethics. Journal of Business Ethics 76 (1):7 - 15.
Peter Hustinx (2010). Privacy by Design: Delivering the Promises. Identity in the Information Society 3 (2):253-255.
Ann Cavoukian, Scott Taylor & Martin E. Abrams (2010). Privacy by Design: Essential for Organizational Accountability and Strong Business Practices. [REVIEW] Identity in the Information Society 3 (2):405-413.
Robin S. Dillon (2010). Respect for Persons, Identity, and Information Technology. Ethics and Information Technology 12 (1).
Dirk van Rooy & Jacques Bus (2010). Trust and Privacy in the Future Internet—a Research Perspective. Identity in the Information Society 3 (2):397-404.
László Zsolnai (ed.) (2004). Spirituality and Ethics in Management. Kluwer Academic.
Manfred Saynisch (2005). "Beyond Frontiers of Traditional Project Management": The Concept of "Project Management Second Order (PM-2)" as an Approach of Evolutionary Management. World Futures 61 (8):555 – 590.
Herbert Kubicek & Torsten Noack (2010). The Path Dependency of National Electronic Identities. Identity in the Information Society 3 (1):111-153.
Added to index2010-11-18
Total downloads2 ( #232,501 of 549,087 )
Recent downloads (6 months)0
How can I increase my downloads?