Untitled Document
   
You are from : ( )  
     
Untitled Document
Untitled Document
 

International Journal of Information Technology & Computer Science ( IJITCS )

Abstract :

Identity Management Systems (IdMS) aim to support development, productivity and security while lowering costs related to managing users and their identities, credentials and attributes. Users may desire many of the benefits that well-designed IdMS’ could potentially offer, such as increased privacy and security. However, users have demonstrated that they are unwilling to spend money or time on security enhancements. This provides the opportunity for a set of end-user requirements to be determined for the adoption of IdMS. Security, trust and privacy are major concerns to consumers and obstacle to the adoption of any innovative technology. This study examines user’s intended behavior toward security and trust and how these beliefs could affect their behavioral intention toward using IdMS .The study introduces a security-trust based model for IdMS adoption. This study also suggests positive- mixed methods research to explore and predict a causal model and validate the results. The conclusion of this paper outlines the implications and suggests further directions for future research in this area .

Keywords :

: Identity Management Systems(IdMS), adoption, behavior, trust,security .

References :

 [1] M. McLaughlin, G.Briscoe and P.Malone,(2010,Oct) ,Digital Identity in The Absence of Authorities: A New Socio-Technical Approach[online]. Available: http://arxiv.org/abs/1011.0192 
[2] G. A. Akerolof and R. E. Kranton, "Economics and Identity," The Quarterly Journal of Economics, vol. 115,no.3, 2000, pp. 715-753.
[3] S. C.Lee,”An Introduction to Identity Management,” SANS Institute InfoSec Reading Room, 2003.
[4]  K. M. Finklea, ‘’Identity Theft: Trends and Issues,’’ Congressional Research Service, 2010.
[5] WP3, S.Poetzsch, B.Priem, R.Leenes and  R.Husseiki,” D3.12: Federated Identity Management – what’s in it for the citizen/customer?,” Future of Identity in the Information  Society (FIDIS),2009.
[6] R. Dhamija and L. Dusseault, "The Seven Flaws of Identity Management: Usability and Security Challenges," IEEE Security & Privacy, 2008, pp.24-29.
[7] A.Cser and J. Penn ,” Identity Management Market Forecast: 2007 To 2014 Provisioning Will Extend Its Dominance Of Market Revenues,” Forrester Research ,Feb.2008.
[8]  P.Seltsikas and R.M. O’Keefe, R. M,’’Expectations and outcomes in electronic identity management: the role of trust and public value,’’European Journal of Information Systems, vol. 19, 2010, pp. 93–103.
[9] K.Ivy, S.Conger and  B.J.Landry , “30P. Federated Identity Management: Why is Adoption so Low?,” Proc . Int.Conf.on Information Resources Management, 2010.
[10] K.. Cameron,  R.Posch and  K.Rannenberg, ”Proposal for a Common Identity Framework:A User-Centric Identity Metasystem ,‘’2008.
[11] A.Jøsang,M. AlZomai and  S.Suriadi, “Usability and Privacy in Identity Management Architectures,” Proc . the 5th. Australasian sym. on ACSW frontiers, Ballarat, Australia ,2007,pp. 143 - 152 . 
[12] A. M.Rossudowski, H.S.Venter, J.P.Eloff and  D.G.Kourie,’’A security privacy aware architecture and protocol for a single smart card used for multiple services,’’computers & security,vol. 29,2010,pp. 393 – 409.
[13] C.Satchella,G. Shanksa, S. Howardab and  J.Murphy,’’Identity crisis: user perspectives on multiplicity and control in federated identity management,’’Behavior & Information Technology,vol.30.no.1.2009,pp. 1-12.
[14] D.H.Shin, "The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption," Interacting with Computers, vol. 22, 2010. pp. 428–438.
[15] A.Josang and  S.Pope,’’ User centric identity management,’’ Proc.  AusCERT Conf., Gold Coast, Australia, 2005, pp. 77–89.
[16] G.Roussos, D.Peterson and U.Patel,” Mobile identity management: an enacted view,” International Journal of Electronic Commerce, vol.8, 2003, pp. 81-100.
[17] M.Siegel,Pull: The Power of the Semantic Web to Transform Your Business, Portfolio, 2009.
[18] M. E.Meints, (2009), D3.17: Identity management systems – recent developments, FIDIS, [online] Available:      http://www.fidis.net/fileadmin/fidis/deliverables/new_deliverables3/fidis-wp3 del3.17_Identity_Management_Systems-recent_developments-final.pdf
[19]  R. G. Brody, E. Mulig, and V. Kimball, “Phishing, pharming and identity theft,” Academy of Accounting and Financial Studies Journal, vol.11, no.3, 2007.
[20] Federal Trade Commission (FTC),” Consumer Sentinel Network Data Book for January – December, 2010”, March.2011.
[21] E. Sherman, (2010, July), Apple and Other Tech Firms Must Fix Customer Security Glitches [online].Available: http://www.bnet.com/blog/technology-business/apple-and-other-tech-firms-must-fix-customer-security-glitches/4382
[22] P. Legris,J. Ingham and P. Collerette, "Why do people use information technology? A critical review of the technology acceptance model,’’ Information & Management, vol. 40, no.3,2003, pp. 191-204.
[23] V.Venkatesh, M.G. Morris, G.B.Davis and F.D,”User Acceptance of Information Technology: Toward a Unified View,” MIS Quarterly, vol. 27, no. 3, 2003, pp. 425-478.
[24]  I. Ajzen and M. Fishbein, Understanding Attitudes and Predicting Social Behavior: Prentice-Hall, Englewood Cliffs, NJ, 1980.
[25] K.Linck,  K.Pousttchi and D.G.Wiedemann,” Security issues in mobile payment from the customer viewpoint,” Proc. 14th European Conf. on Information Systems, Gothenburg, Sweden, 2006.
[26]  J. C.Roca, J.Garcia and  L.D.Vega,”The importance of perceived trust, security and privacy in online trading systems,” Information Management and Computer Security, vol.17,no.2,2009.pp. 96–113.
[27] C.Cheung, G.Chan and M.Limayem,” A critical review of online purchase behavior: empirical research,” Journal of E-Commerce in Organizations, vol. 3, no. 4, 2005, pp. 1-19.
[28] K.Pousttchi, “Conditions for acceptance and usage of mobile payment procedures,”   Proc. the Int. Conf. on Mobile Business, Vienna, Austria, 2003, pp. 201–210.
[29] T. C. Cheng, D. Lam and A. Yeung, "Adoption of internet banking: An empirical study in Hong Kong," Decision Support Systems vol. 42, 2006, pp. 1558–1572.
[30] P.Schierz, O.Schilke and  B.Wirtz, “Understanding consumer acceptance of mobile payment services: An empirical analysis,’’ Electronic Commerce Research and Applications, Vol. 9,2010,pp. 209–216.
[31] B.Friedman, P.Kahan and  D.C.Howe,” Trust online,” Communications of the ACM, vol.43,no.12,2000,pp. 34-40.
[32] V.Cho, “A study of the roles of trusts and risks in information-oriented online legal services using an integrated model,” Information &Management, vol. 43, 2006, pp. 502–520.
[33]  M.Hansen, et al.,” Privacy-Enhancing Identity Management,” Information Security Technical Report, vol.9,2004.
[34] S. Ha and L. Stoel, "Consumer e-shopping acceptance: Antecedents in a technology acceptance model," Journal of Business Research, vol. 62, 2009, pp. 565–571.
[35]  X.Luo, H.Li, J. Zhang and J.P.Shim,”Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: An empirical study of mobile banking services,” Decision Support Systems, vol. 48, 2010, pp. 222-234.
[36]  P.Pavlou and D.Gafen,” Building effective online marketplaces with institution-based trust,” Information Systems Research, vol. 15, no. 1, 2004, pp. 37–59.
[37]  J. W. Creswell, Research Design Qualitative, Quantitative and Mixed Methods Approaches, 2nd ed. Chennai, India: Sage Publications, 2003.
[38]  W. W. Chin, J. B. Thatcher, and R. T. Wright, "Assessing Common Method Bias:Problems With The ULMC Technique," MIS Quarterly vol. 36, pp. 1003-1019, 2012.

Untitled Document
     
Untitled Document
   
  Copyright © 2014  IJITCS.  All rights reserved. IISRC® is a registered trademark of IJITCS Properties.