Use Cases for Identity Management in E-Government

E-government identity management systems aren't usually straightforward to implement. Culture and history strongly affect what might be acceptable to citizens in particular circumstances, with levels of trust being a key factor. The authors discuss these issues and present a use case from New Z...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE security & privacy 2008-03, Vol.6 (2), p.51-57
Hauptverfasser: McKenzie, Robin, Crompton, Malcolm, Wallis, Colin
Format: Magazinearticle
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 57
container_issue 2
container_start_page 51
container_title IEEE security & privacy
container_volume 6
creator McKenzie, Robin
Crompton, Malcolm
Wallis, Colin
description E-government identity management systems aren't usually straightforward to implement. Culture and history strongly affect what might be acceptable to citizens in particular circumstances, with levels of trust being a key factor. The authors discuss these issues and present a use case from New Zealand.
doi_str_mv 10.1109/MSP.2008.51
format Magazinearticle
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_912303506</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4489850</ieee_id><sourcerecordid>1671244541</sourcerecordid><originalsourceid>FETCH-LOGICAL-c313t-8830b97345cfc9db0a7edb7b42b1f5448375e6e413498b2911658430ecd6dcb33</originalsourceid><addsrcrecordid>eNpdkMFLwzAUxoMoOKcnj16KJ0E632uSNjnKmHOwoaA7hyR9lY6t1aQT9t_bMvHg6b0Pfnx8_Bi7Rpgggn5Yvb1OMgA1kXjCRiilSgWI_HT4BaSF1vycXcS4AcgQpRoxXEdKpjZSTKo2JIuSmq7uDsnKNvaDdn1K6iaZpfP2m0Iz5Et2VtltpKvfO2brp9n79DldvswX08dl6jnyLlWKg9MFF9JXXpcObEGlK5zIHFZSCMULSTkJ5EIrl2nEXCrBgXyZl95xPmZ3x97P0H7tKXZmV0dP261tqN1Hg3mBmRCybxiz23_opt2Hpl9nNGYcuIS8h-6PkA9tjIEq8xnqnQ0Hg2AGe6a3ZwZ7Rg6VN0e6JqI_sp-tlQT-A1N5Z9U</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype><pqid>912303506</pqid></control><display><type>magazinearticle</type><title>Use Cases for Identity Management in E-Government</title><source>IEEE Electronic Library (IEL)</source><creator>McKenzie, Robin ; Crompton, Malcolm ; Wallis, Colin</creator><creatorcontrib>McKenzie, Robin ; Crompton, Malcolm ; Wallis, Colin</creatorcontrib><description>E-government identity management systems aren't usually straightforward to implement. Culture and history strongly affect what might be acceptable to citizens in particular circumstances, with levels of trust being a key factor. The authors discuss these issues and present a use case from New Zealand.</description><identifier>ISSN: 1540-7993</identifier><identifier>EISSN: 1558-4046</identifier><identifier>DOI: 10.1109/MSP.2008.51</identifier><identifier>CODEN: ISPMCN</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Acceptability ; accountability ; Australia ; authentication ; citizen centric ; citizen control ; Cultural differences ; Culture ; digital identity ; e-government ; Electronic government ; Finance ; History ; Identity management ; identity management system ; Identity management systems ; identity verification ; Information security ; Law enforcement ; Management ; Management systems ; National security ; Privacy ; risk ; SAML ; Security ; single sign on ; Terrorism ; use case ; user centric ; user control</subject><ispartof>IEEE security &amp; privacy, 2008-03, Vol.6 (2), p.51-57</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2008</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c313t-8830b97345cfc9db0a7edb7b42b1f5448375e6e413498b2911658430ecd6dcb33</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4489850$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>780,784,796,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4489850$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>McKenzie, Robin</creatorcontrib><creatorcontrib>Crompton, Malcolm</creatorcontrib><creatorcontrib>Wallis, Colin</creatorcontrib><title>Use Cases for Identity Management in E-Government</title><title>IEEE security &amp; privacy</title><addtitle>SECP-M</addtitle><description>E-government identity management systems aren't usually straightforward to implement. Culture and history strongly affect what might be acceptable to citizens in particular circumstances, with levels of trust being a key factor. The authors discuss these issues and present a use case from New Zealand.</description><subject>Acceptability</subject><subject>accountability</subject><subject>Australia</subject><subject>authentication</subject><subject>citizen centric</subject><subject>citizen control</subject><subject>Cultural differences</subject><subject>Culture</subject><subject>digital identity</subject><subject>e-government</subject><subject>Electronic government</subject><subject>Finance</subject><subject>History</subject><subject>Identity management</subject><subject>identity management system</subject><subject>Identity management systems</subject><subject>identity verification</subject><subject>Information security</subject><subject>Law enforcement</subject><subject>Management</subject><subject>Management systems</subject><subject>National security</subject><subject>Privacy</subject><subject>risk</subject><subject>SAML</subject><subject>Security</subject><subject>single sign on</subject><subject>Terrorism</subject><subject>use case</subject><subject>user centric</subject><subject>user control</subject><issn>1540-7993</issn><issn>1558-4046</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2008</creationdate><recordtype>magazinearticle</recordtype><sourceid>RIE</sourceid><recordid>eNpdkMFLwzAUxoMoOKcnj16KJ0E632uSNjnKmHOwoaA7hyR9lY6t1aQT9t_bMvHg6b0Pfnx8_Bi7Rpgggn5Yvb1OMgA1kXjCRiilSgWI_HT4BaSF1vycXcS4AcgQpRoxXEdKpjZSTKo2JIuSmq7uDsnKNvaDdn1K6iaZpfP2m0Iz5Et2VtltpKvfO2brp9n79DldvswX08dl6jnyLlWKg9MFF9JXXpcObEGlK5zIHFZSCMULSTkJ5EIrl2nEXCrBgXyZl95xPmZ3x97P0H7tKXZmV0dP261tqN1Hg3mBmRCybxiz23_opt2Hpl9nNGYcuIS8h-6PkA9tjIEq8xnqnQ0Hg2AGe6a3ZwZ7Rg6VN0e6JqI_sp-tlQT-A1N5Z9U</recordid><startdate>20080301</startdate><enddate>20080301</enddate><creator>McKenzie, Robin</creator><creator>Crompton, Malcolm</creator><creator>Wallis, Colin</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7SP</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20080301</creationdate><title>Use Cases for Identity Management in E-Government</title><author>McKenzie, Robin ; Crompton, Malcolm ; Wallis, Colin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c313t-8830b97345cfc9db0a7edb7b42b1f5448375e6e413498b2911658430ecd6dcb33</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Acceptability</topic><topic>accountability</topic><topic>Australia</topic><topic>authentication</topic><topic>citizen centric</topic><topic>citizen control</topic><topic>Cultural differences</topic><topic>Culture</topic><topic>digital identity</topic><topic>e-government</topic><topic>Electronic government</topic><topic>Finance</topic><topic>History</topic><topic>Identity management</topic><topic>identity management system</topic><topic>Identity management systems</topic><topic>identity verification</topic><topic>Information security</topic><topic>Law enforcement</topic><topic>Management</topic><topic>Management systems</topic><topic>National security</topic><topic>Privacy</topic><topic>risk</topic><topic>SAML</topic><topic>Security</topic><topic>single sign on</topic><topic>Terrorism</topic><topic>use case</topic><topic>user centric</topic><topic>user control</topic><toplevel>online_resources</toplevel><creatorcontrib>McKenzie, Robin</creatorcontrib><creatorcontrib>Crompton, Malcolm</creatorcontrib><creatorcontrib>Wallis, Colin</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE security &amp; privacy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>McKenzie, Robin</au><au>Crompton, Malcolm</au><au>Wallis, Colin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Use Cases for Identity Management in E-Government</atitle><jtitle>IEEE security &amp; privacy</jtitle><stitle>SECP-M</stitle><date>2008-03-01</date><risdate>2008</risdate><volume>6</volume><issue>2</issue><spage>51</spage><epage>57</epage><pages>51-57</pages><issn>1540-7993</issn><eissn>1558-4046</eissn><coden>ISPMCN</coden><abstract>E-government identity management systems aren't usually straightforward to implement. Culture and history strongly affect what might be acceptable to citizens in particular circumstances, with levels of trust being a key factor. The authors discuss these issues and present a use case from New Zealand.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/MSP.2008.51</doi><tpages>7</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1540-7993
ispartof IEEE security & privacy, 2008-03, Vol.6 (2), p.51-57
issn 1540-7993
1558-4046
language eng
recordid cdi_proquest_journals_912303506
source IEEE Electronic Library (IEL)
subjects Acceptability
accountability
Australia
authentication
citizen centric
citizen control
Cultural differences
Culture
digital identity
e-government
Electronic government
Finance
History
Identity management
identity management system
Identity management systems
identity verification
Information security
Law enforcement
Management
Management systems
National security
Privacy
risk
SAML
Security
single sign on
Terrorism
use case
user centric
user control
title Use Cases for Identity Management in E-Government
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T09%3A19%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Use%20Cases%20for%20Identity%20Management%20in%20E-Government&rft.jtitle=IEEE%20security%20&%20privacy&rft.au=McKenzie,%20Robin&rft.date=2008-03-01&rft.volume=6&rft.issue=2&rft.spage=51&rft.epage=57&rft.pages=51-57&rft.issn=1540-7993&rft.eissn=1558-4046&rft.coden=ISPMCN&rft_id=info:doi/10.1109/MSP.2008.51&rft_dat=%3Cproquest_RIE%3E1671244541%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=912303506&rft_id=info:pmid/&rft_ieee_id=4489850&rfr_iscdi=true