Abstract
When introducing enterprise identity management systems (EIMS), organisations have to face various costs for the planning, the implementation, and the operation of such systems. Besides the technological issues, it is important that organisational aspects are incorporated into the development of an enterprise identity management (EIdM) solution as well. Indeed, without a proper assessment of the costs and the organisational settings (e.g. stakeholders, processes), companies will not see the benefit for introducing EIdM into their IT infrastructure and their business processes. This paper proposes initial ideas for a generic approach for assessing the value of investing in the introduction of EIMS (Type 1 IMS), which can be used for decision support purposes and the planning phase. Furthermore, the organisational aspects are discussed and possible solutions for integrating all relevant parties into the planning process are presented.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bauer, M., Meints, M. and Hansen, M., Deliverable D3.1: Structured Overview on Prototypes and Concepts of Identity Management Systems (FIDIS, 2005).
Berghel, H., The Two Sides of ROI: Return on Investment vs. Risk of Incarceration, Communications of the ACM, 48(4), pp. 15–20 (2005).
Blohm, H. and Lüder, K., Investition, Schwachstellenanalyse des Investitionsbereichs und Investitionsrechnung (Vahlen, Munich, 1995).
Brynjolfsson, E., The Productivity Paradox of Information Technology, Communications of the ACM, 36(12), pp. 67–77 (1993).
Cavusoglu, H., Mishra, B. and Raghunathan, S., A Model for Evaluating IT Security Investments, Communications of the ACM 47(7), pp. 87–92 (2004).
Deron GmbH, Identity Management Studie 2006/2007 (Deron, Stuttgart, 2007).
Dewey, B. I. and DeBlois, P. B., Current Issues Survey Report 2007, EDUCAUSE Quarterly, 30(2), pp. 12–31 (2007).
Dos Santos, B. L. and Sussman, L., Improving the return on IT investment: the productivity paradox, International Journal of Information Management, 20(6), pp. 429–440 (2000).
Flynn, M. J. (2007); http://360tek.blogspot.com/2006/07/enterprise-identity-services.html, accessed 27th of September 2007.
Franklin, C. J., The ABCs of ROI, Network Computing, 27th of April, pp. 93-95 (2002).
Geschka, H. and Hammer, R., Die Szenario Technik in der strategischen Unternehmensplanung, in: Strategische Unternehmensplanung — strategische Unternehmensfuhrung, edited by Hahn, D. and Taylor, B. (Physica, Heidelberg, 1997), pp. 464–489.
Hansen, M. and Meints, M., Digitale Identitäten — Überblick und aktuelle Trends, Datenschutz und Datensicherheit (DuD), 30(9), pp. 571–575 (2006).
Hevner, A. R., March, S. T. and Park, J., Design Science in Information Systems Research, MIS Quarterly, 28(1), pp. 75–105 (2004).
Jonen, A. et al., Balanced IT-Decision-Card, Ein Instrument für das Investitionscontrolling von IT-Projekten, Wirtschaftsinformatik, 46(3), pp. 196–203 (2004).
Kaplan, R. S. and Norton, D. P., The Balanced Scorecard. Translating Strategy into Action (Random House, Boston, 1996).
Lee, A. S., Integrating Positivist and Interpretive Approaches to Organizational Research, Organisational Science, 4(2), pp. 342–365 (1991).
Magnusson, C., Molvidsson, J. and Zetterqvist, S., Value Creation and Return On Security Investmensts (ROSI), in: IFIP SEC 2007: New Approaches for Security, Privacy and Trust in Complex Environments, edited by Venter, H. et al. (Springer, Boston, 2007), pp. 25–35.
May, T. A., The death of ROI: re-thinking IT value measurement, Information Management & Computer Security, 5(3), pp. 90–92 (1997).
Pisello, T., Return on Investment for Information Technology Providers (Information Economics Press, New Canaan, 2001).
Potthof, I., Kosten und Nutzen der Informationsverarbeitung: Analyse und Beurteilung von Investitionsentscheidungen (DUV/Gabler, Wiesbaden, 1998).
Purser, S. A., Improving the ROI of the security management process, 23(6), pp. 542–546 (2004).
Rossnagel, H. and Royer, D., Investing in Security Solutions — Can Qualified Electronic Signatures be Profitable for Mobile Operators, Proceedings of the 11th Americas Conference on Information Systems (AMCIS), Omaha, Nebraska (2005).
Schmeh, K. and Uebelacker, H. (2006); http://www.heise.de/tp/r4/artikel/18/18954/1.html accessed 22.10.2007.
Solingen, R. v., Measuring the ROI of Software Process Improvement, IEEE Software, 21(3), pp. 32–38 (2004).
Sonnenreich, W., Albanese, J. and Stout, B., Return On Security Investment (ROSI) — A Practical Quantitative Model, Journal of Research and Practice in Information Technology, 38(1), pp. 45–56 (2006).
Wan, Z., Fang, Y. and Wade, M., A Ten-Year Odyssey of the “IS Productivity Paradox” — A Citation Analysis (1996–2006), Proceedings of the 13th Americas Conference on Information Systems (AMCIS), Keystone, Colorado (2007).
Windley, P. J., Digital Identity (O’Reilly, Sebastopol et al., 2005).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Royer, D. (2008). Enterprise Identity Management. In: Fischer-Hübner, S., Duquenoy, P., Zuccato, A., Martucci, L. (eds) The Future of Identity in the Information Society. Privacy and Identity 2007. IFIP — The International Federation for Information Processing, vol 262. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-79026-8_30
Download citation
DOI: https://doi.org/10.1007/978-0-387-79026-8_30
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-4629-4
Online ISBN: 978-0-387-79026-8
eBook Packages: Computer ScienceComputer Science (R0)