Abstract

AbstractThis research aims to study the most critical elements of digital identity management to recognize the pattern and the requirements of their use and implementation. Further, an attempt is made to identify and prioritize the criteria and their relevant indicators of digital identity management in the form of a comprehensive framework. To this end a fuzzy multicriteria decision‐making approach was utilized. The framework focuses on a comprehensive perspective to consider digital identity and deals with compiling strategies and operational patterns based on the defined priorities. This applied research with a fundamental approach has a descriptive‐explanatory method as well. Through an in depth‐review of the extant literature and designing an instrument as well as semi‐structure interview the necessary data were collected. The research population consists of 10 experts. By reviewing the theoretical literature of the research, effective factors were identified and screened by the Fuzzy Delphi method leading to six main factors and 31 subfactors. Then, the collected data were analyzed through a hybrid technique known as FDANP (Fuzzy DEMATEL‐ANP) to determine the interactions between the factors and the subfactors and to weigh and prioritize them. The obtained results revealed that “strategic planning” is the most influential factor in digital identity management. Also, the subfactors namely “The use of the maturity model of digital identity management,” “commitment to the whole organization,” “integrity of digital identity management system with other systems,” “integrity of digital identity management program,” and “integrity of the two dimensions of identity management and access management” were ranked as the most influential subfactors of “strategic planning,” respectively. “Access management” was the most permeable factor in digital identity management. It means that this factor is the main problem and could be solved with the help of the influential factors. In addition, subfactors: “Access control to all resources only through the digital identity management system,” “Solution for access management of premium accounts,” “Multi‐factor authentication support,” “Access policy to all resources and information,” and “Determination of the manner of the user access to resources outside the organization” were ranked as the most permeable subfactors.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.