2017 Information Security for South Africa (ISSA) 2017
DOI: 10.1109/issa.2017.8251778
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating the severity of trust to identity- management-as-a-service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
1

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 16 publications
0
1
1
Order By: Relevance
“…BDIDM Characteristics is the only statistically significant factor in the regression in contrast to Awa et al [43]'s study that found that Organisation Size and Support Environment were statistically significant at p < 0.05, N = 373. The insignificance of Support Environment in the present study may mean that outsourcing BDIDM solutions is perhaps not a sustainable solution for organisations, due to privacy issues and the legal responsibilities involved [16,75]. The results also contrast against the literature's suggestion that SMEs may be less likely to adopt BDIDM than large enterprises [45] due to its relatively high cost of implementation [14].…”
Section: Implications For Practicecontrasting
confidence: 86%
“…BDIDM Characteristics is the only statistically significant factor in the regression in contrast to Awa et al [43]'s study that found that Organisation Size and Support Environment were statistically significant at p < 0.05, N = 373. The insignificance of Support Environment in the present study may mean that outsourcing BDIDM solutions is perhaps not a sustainable solution for organisations, due to privacy issues and the legal responsibilities involved [16,75]. The results also contrast against the literature's suggestion that SMEs may be less likely to adopt BDIDM than large enterprises [45] due to its relatively high cost of implementation [14].…”
Section: Implications For Practicecontrasting
confidence: 86%
“…However, most organisations would prefer to manage identities themselves rather than outsourcing it as a service, mainly due to privacy issues and the legal responsibilities involved, especially in data breaches. ID-as-a-service utilises cloud-based services protocols, usually vendor-based products, such as OKTA or AWS-IAM, providing authentication of both individuals and applications on a dedicated server in the cloud [7,39].…”
Section: Id-as-a-servicementioning
confidence: 99%