Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Enterprise Identity Data Management (EIDM)To propose a multidimensional decision support framework based on a ERP systems and Balanced

Scorecard to design an artifact for developing a decision support instrument for introducing EIDMS
Enterprise identity data management can be found in variety of organizational processes. ERP is the basis for efficient EIDM and this paper propose the EIDM solution on the basis of critical success factors derived through ERP systems and are critical for implementation of EIDM. Enterprise identity data management system, EIDM, ERP implementation, Siemen and ERP, Balance score card, ERP critical success factors. Short teaser without bullet points [English]

Introduction

[Text] Sir said that we will start our topic with ERP which will be provided by Maryam Noor she will make a matrix which will have CSFs and please tell her to emphasis on CSFs of ERP which relates and give basis for EIDM and then we will link ERP with EIDM and we will talk about EIDMs CSFs and balance score card approach and our conclusion with a visit to Siemens and this Siemens case study will support our arguments. 2 Literature review The introduction of Enterprise Identity Management Systems (EIdMS) in organizations is a costly and challenging endeavor, where organizations have to face various costs for the planning, the implementation, and the operation of such systems. This paper proposed the initial idea of how valuable will be the introduction of EIDM in an organization on the basis of balance score card approach.[1] Research shows that corporate identity strategies are being built around the vision of corporation made by top management. The Acid Test of Corporate Identity Management might avoid some of the pitfalls which they can face when designing corporate identity change strategies.[2] Digital identity provides real world entities the attributes and exchange of data between organizations as data exchange in individual data authorities in a trusted data exchange environment.[3] This paper presents a general model for describing the framework of identity management in cross-border contexts. Methodology used was open ended questionnaire of 17 items. Most of the countries have installed SIM for identification purpose.[4] Single-sign-on systems are popular tools for addressing identity needs: they attempt to unify all accounts and access rights into one system per enterprise against which users can authenticate themselves. User-centric identity management systems lets users choose, for example, what personal data to disclose under various conditions, and which credentials to present in response to authentication or attribute requests.[5]

Existing Literature Title, Author, Year [6] Evaluation approach based on BSC Finance Business process
X

Projects value addition Results Learning & Growth


X

Customer perspective

Relevance & validity to Context (Siemens)

Critique

Convenience, Safety, Practical

Very much convenient to use due to only applet calculator(OTP) Give well defined evaluation frame work and justify hybrid role development This is work in progress and need to be tune by customer trials and should be test in real security projects

[7]

Role Engineering and Role Mining is the most promising way for Creating enterprise-wide roles.

[8]

illustrated how the outcomes of modeling and simulation activities, based on what-if analysis, can explain and predict the impact of specific (policy) choices, from different viewpoints

2.1

Fig. 1 short figure captions (underneath)

Tab. 1 short table headings

Figures may be embedded in the Word document, but must also be included as separate files (unless they were created with the Word-internal graphics functions). 5 Summary and Outlook

References

1.

Royer, D. Assessing the Value of Enterprise Identity Management (EIdM) – Towards a Generic Evaluation Approach. in Availability, Reliability and Security, 2008. ARES 08. Third International Conference on. 2008. Balmer, J.M.T. and G.B. Soenen, The Acid Test of Corporate Identity Management. Journal of Marketing Management, 1999. 15(1-3): p. 69-92. Master, A., Digital Identities Can Tame The Wild, Wild Web. EDPACS, 2005. 32(7): p. 13-23. Otjacques, B., P. Hitzelberger, and F. Feltz. Identity Management and Data Sharing in the European Union. in System Sciences, 2006. HICSS '06. Proceedings of the 39th Annual Hawaii International Conference on. 2006. Bramhall, P., et al., User-Centric Identity Management: New Trends in Standardization and Regulation. Security & Privacy, IEEE, 2007. 5(4): p. 84-87. Yan, L. Research on E-Business Identity Authentication System Based on Improved One-Time Password. in Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on. 2008. Fuchs, L., C. Broser, and G. Pernul. Different Approaches to In-House Identity Management Justification of an Assumption. in Availability, Reliability and Security, 2009. ARES '09. International Conference on. 2009. Baldwin, A., M.C. Mont, and S. Shiu. Using Modelling and Simulation for Policy Decision Support in Identity Management. in Policies for Distributed Systems and Networks, 2009. POLICY 2009. IEEE International Symposium on. 2009.

2. 3. 4.

5. 6.

7.

8.

Appendix

You might also like