Presenting digital identity management framework in cyberspace:Mixed-method approach

Document Type : Original Article

Authors

1 PhD student, Information Technology Management, Islamic Azad University, South Tehran Branch, Tehran, Iran

2 Associate Professor, School of Management, Department of Industrial Management, Islamic Azad University, South Tehran Branch, Tehran, Iran

3 Assistant Professor, School of Management, Department of Administrative and Management Planning, Islamic Azad University, South Tehran Branch, Tehran, Iran

4 Assistant Professor, School of Management, Department of Industrial Management, Islamic Azad University, South Tehran Branch, Tehran, Iran

Abstract

Digital Identity management is considered as an important and crucial infrastructure which reinforce national governance and security in cyberspace. Digital identity management is one of the most strategic discussions of cybersecurity as the foundation of creating trust in cyberspace. The aim of the research is the recognition and prioritization of criteria and indexes of national digital identity management in the integrated framework to manage digital identity. This applied research with a fundamental approach has a descriptive-explanatory method. Data collection is conducted with library and field methods through questionnaires and interviews. By reviewing the theoretical literature of the research, effective factors were identified and screened by the Fuzzy Delphi method. To determine the relations between major and sub-factors and also to weigh and prioritize the FDANP hybrid method was used. The results of the collected data suggested that the factor of “strategic planning” is the most effective in digital identity management. To solve the problem with the FDANP method, “access management” in major factors and “access control of all resources and information only through the digital identity management systems” in sub-factors took the priority.

Keywords


  • الف. منابع فارسی

    • آذر، عادل و فرجی، حجن (1381)، علم مدیریت فازی، مرکز مطالعات و بهره‌وری ایران، انتشارات اجتماع.
    • اصغرپور، محمدجواد (1382)، تصمیم‌گیری و نظریه بازی‌ها با نگرش تحقیق در عملیات، انتشارات دانشگاه تهران، چاپ اول، 140-132.
    • پیغله، فریده (1394)، ارائه یک مدل مدیریت هویت برای کاربردهای تجارت الکترونیکی، پایان­نامه دکترا در دانشگاه گیلان.
    • کاشانی، محمد (1395)، ارﺗﻘﺎء ﺣﺮﯾﻢ ﺧﺼﻮﺻﯽ و اﻣﻨﯿﺖ در ﺳﯿﺴﺘﻢ­ﻫﺎی ﻣﺪﯾﺮﯾﺖ ﻫﻮﯾﺖ، پایان­نامه ارشد دانشگاه شاهد.
    • مدیری، محمود؛ میرزایی خاکی، مریم و کریمی شیرازی، حامد (1393)، تعیین اولویت کاربردهای فناوری نانو در بخش صنایع خودرو با مدل تصمیم­گیری فازی ترکیبی، فصلنامه مدیریت توسعه فناوری، دوره دوم، شماره 1.

     

    ب. منابع انگلیسی

    • Abedi Jafari, H., Taslimi, M., Faghihi, A., & Sheykhzadeh, M. (2011), Theme and theme analysis. “A simple and effective way to explain patterns in qualitative data”, Strategic Management Thought, 151-198, (2) 5. (In Persian)
    • Bernabe, J. B., David, M., Moreno, R. T., Cordero, J. P., Bahloul, S., & Skarmeta, A. (2020). Aries: Evaluation of a reliable and privacy-preserving European identity management framework. Future Generation Computer Systems, 102, 409-425.
    • Cheng, Ching-Hsue & Lin, Yin. (2002) "Evaluating the best mail battle tank using fuzzy decision theory with linguistic criteria evaluation", European Journal of Operational Research, vol.142, p.147
    • DIACC. (2015). Building Canada’s Digital Identity Future. By: Digital Identification and Authentication Council of Canada.
    • Federal Chief Information Officers Council. (2011). Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance. Federal Chief Information Officers Council AND Federal Enterprise Architecture.
    • Hu, S. K., Lu, M. T., & Tzeng, G. H. (2015). Improving mobile commerce adoption using a new hybrid fuzzy MADM model. International Journal of Fuzzy Systems, 17(3), 399-413.
    • Khanboubi, F., Boulmakoul, A., & Tabaa, M. (2019). Impact of digital trends using IoT on banking processes. Procedia Computer Science, 151, 77-84.
    • Miettinen, A. (2017). Centralized Identity Management in a Decentralized Organization. THESIS in Karelia University of Applied Sciences.
    • NIST. (2013). National Institute of Standards and Technology - NIST SP 800-63-2. NIST.
    • Nykvista, S., & Mukherjeea, M. (2016). Who am I? Developing pre-service teacher identity in a digital World. Procedia - Social and Behavioral Sciences, 217, 851 – 857.
    • OLANIYI, E. O. (2017). THE ROLE OF NATIONAL ELECTRONIC IDENTITY CARDS IN ENHANCING PUBLIC SERVICE EFFECTIVENESS THE NIGERIAN CASE.
    • Osmanoglu, E. (2014). Identity and Access Management. Waltham, USA: Elsevier.
    • Petronio, S., & Child, J. T. (2019). Conceptualization and Operationalization: Utility of Communication Privacy Management Theory. Current opinion in psychology.
    • Rasiwasia, A. (2017). A Framework To Implement OpenID Connect Protocol For Federated Identity Management In Enterprises. Master Theses in Luleå University of Technology.
    • Rountree, D. (2013). Federated Identity Primer. Oxford: Elsevier.
    • SeID. (2015). Swiss eID-Ökosystem Modell. By: Berner Fachhochschule & SECO.
    • Valmohammadi, C., & Khaki, M. M. (2019). Determinants for selection of projects for exploitation of mines in Iran. Resources Policy, 63, 101424.
    • Viitanen, S. (2015). Integrating an Open Source Identity Management System into Access Management Software. Bachelor’s Thesis in Hagaa-Helia University of applied science.
    • WA IdAM. (2005). Western Australia Identity & Access Management Framework (WA Id&AM). By: WESTERN AUSTRALIAN GOVERNMENT OFFICE OF e-GOVERNMENT.
    • White House. (2011). National Strategy for Trusted Identities in Cyberspace. White House.
    • Yang, J. L., & Tzeng, G. H. (2011). An integrated MCDM technique combined with DEMATEL for a novel cluster-weighted with ANP method. Expert Systems with Applications, 38(3), 1417-1424.
    • Zhang, C., Zhu, L., Xu, C., Sharif, K., Zhang, C., & Liu, X. (2020). PGAS: Privacy-preserving graph encryption for accurate constrained shortest distance queries. Information Sciences, 506, 325-345.