Information Security in an Identity Management Lifecycle: Mitigating Identity Crimes.
Rodger JamiesonLesley Pek Wee LandStephen SmithGregory StephensDonald WinchesterPublished in: AMCIS (2009)
Keyphrases
- identity management
- information security
- risk management
- countermeasures
- access control
- cloud computing
- information systems
- personal information
- security issues
- intrusion detection
- smart card
- user centric
- network security
- e government
- security level
- law enforcement
- information security management
- smart grid
- homeland security
- iso iec
- decision support system
- e learning
- trade off
- information assurance
- case study
- data model
- databases
- security risks