Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Identity Management

Handbook of Research on E-Government in Emerging Economies: Adoption, E-Participation, and Legal Frameworks
A set of processes, tools, and social contracts surrounding the creation, maintenance, and termination of a digital identity
Published in Chapter:
Trends in Government e-Authentication: Policy and Practice
Mike Just (Glasgow Caledonian University, United Kingdom) and Karen Renaud (University of Glasgow, United Kingdom)
DOI: 10.4018/978-1-4666-0324-0.ch034
Abstract
Government engagement of its citizens through digital channels offers the potential for efficiencies and savings, while at the same time allowing the government to reach out to constituents in novel ways. Yet such endeavours must be undertaken with care, especially with personalised service delivery, which requires effective management of security and privacy. Proper authentication and management of identity are key related factors. In this chapter, the authors examine government use and adoption of e-authentication and identity management technologies in order to securely interact with citizens. They first provide some background in which the state-of-the-art for protecting and managing identities is reviewed in terms of the various methods studied in academia and marketed by industry. The chapter then describes the degree to which these methods have been, and continue to be, used in the e-government initiatives of several developed countries. Finally, the authors consider the lessons learned, and how they might be applied to similar initiatives in developing countries.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Trust in an Enterprise World: A Survey
The mechanisms for identifying individuals in a system and controlling the circulation of established identity profiles in order to deal with access to the resources in that system.
Full Text Chapter Download: US $37.50 Add to Cart
E-Health, Local Governance, and Public-Private Partnering in Ontario
This involves policies and technologies that enable authenticated identities to be verified in order to confirm and enable access or transactions between individuals and organizations.
Full Text Chapter Download: US $37.50 Add to Cart
Quantum Blockchain for Smart Society: Applications, Challenges, and Opportunities
Is the organizational process for ensuring individuals have the appropriate access to technology resources. This includes the identification, authentication and authorization of a person, or persons, to have access to applications, systems, or networks.
Full Text Chapter Download: US $37.50 Add to Cart
Quantum Blockchain: A Systematic Review
Is the organizational process for ensuring individuals have the appropriate access to technology resources. This includes the identification, authentication and authorization of a person, or persons, to have access to applications, systems, or networks.
Full Text Chapter Download: US $37.50 Add to Cart
Taking Trust Management to the Next Level
Identity Management refers to establishing, describing, and eventually destroying identities. In this chapter, the term mainly refers to managing digital identities, whereas it could generally be used in broader senses as, e.g., for national identity management
Full Text Chapter Download: US $37.50 Add to Cart
Data Privacy vs. Data Security
Ways of defining and controlling access rights to data, applications and operating systems. The term is frequently associated with 3 rd party tools and services. Their value is in providing effective and efficient control to solve a fundamental but complex need.
Full Text Chapter Download: US $37.50 Add to Cart
Gauging the Scale of Intertwinement: Juggling Between the Use of Biometric Data and Right to Privacy
It is the process of managing the information submitted by the consumers under the Biometric Data System for keeping it safe under surveillance.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy-Enhancing Technologies
The management and provisioning of information about users across different applications (sometimes users may entertain different identities with partially different characteristics).
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR