Search results

1 – 10 of over 1000
Article
Publication date: 24 April 2007

Paul Beynon‐Davies

The purpose of this paper is to unpack some of the socio‐technical relationships inherent in contemporary notions of personal identity management. For this purpose it considers…

3434

Abstract

Purpose

The purpose of this paper is to unpack some of the socio‐technical relationships inherent in contemporary notions of personal identity management. For this purpose it considers the issue of personal identity management in terms of a framework, which distinguishes between the related processes of authentication, identification and enrolment.

Design/methodology/approach

The conceptual model described in this paper is reflected against an important recent case in which issues of personal identity management are being enacted: the introduction of a UK national identity card. Both this issue and case are particularly examined in the light of the growth of e‐Government in the UK.

Findings

The paper relates issues associated with the technical infrastructure of e‐Government with some of the costs and benefits associated with the social infrastructure of e‐Government. This device offers a useful framing for a whole range of issues surrounding individual‐organisation interaction in the Information Society that rely on elements of personal identity management.

Research limitations/implications

In the paper the issue of personal identity management is under‐represented in the Information Systems and Information Management literature. The conceptual approach adopted in the paper is used to identify areas of further research in terms of issues relevant to the technical infrastructure of e‐Government.

Practical implications

The paper identifies a number of personal identity management issues embedded in the technical infrastructure required for effective e‐Government.

Originality/value

This paper raises the importance of personal identity management to the success of the e‐Government agenda. It also links classic information management issues to the issue of personal identity management and identifies the challenges for e‐Government within this.

Details

Journal of Enterprise Information Management, vol. 20 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 4 November 2014

Brent J. Lyons, Jennifer L. Wessel, Yi Chiew Tai and Ann Marie Ryan

Given the increasing diversity in the age of job seekers worldwide and evidence of perceptions of discrimination and stereotypes of job seekers at both ends of the age continuum…

1756

Abstract

Purpose

Given the increasing diversity in the age of job seekers worldwide and evidence of perceptions of discrimination and stereotypes of job seekers at both ends of the age continuum, the purpose of this paper is to identify how perceptions of age-related bias are connected to age-related identity management strategies of unemployed job seekers.

Design/methodology/approach

Data were collected from 129 unemployed job-seeking adults who were participants in a career placement service. Participants completed paper-and-pencil surveys about their experiences of age-related bias and engagement in age-related identity management strategies during their job searches.

Findings

Older job seekers reported greater perceptions of age-related bias in employment settings, and perceptions of bias related to engaging in attempts to counteract stereotypes, mislead or miscue about one's age, and avoid age-related discussions in job searching. Individuals who were less anxious about their job search were less likely to mislead about age or avoid the topic of age, whereas individuals with higher job-search self-efficacy were more likely to acknowledge their age during their job search. Older job seekers higher in emotion control were more likely to acknowledge their age.

Originality/value

Little is known about how job seekers attempt to compensate for or avoid age-related bias. The study provides evidence that younger and older job seekers engage in age-related identity management and that job search competencies relate to engagement in particular strategies.

Details

Journal of Managerial Psychology, vol. 29 no. 8
Type: Research Article
ISSN: 0268-3946

Keywords

Article
Publication date: 16 November 2015

Annemiek van Os, Dick de Gilder, Cathy van Dyck and Peter Groenewegen

The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents…

1833

Abstract

Purpose

The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents. Using insights from social identity theory, the authors argue that incidents may create a threat of professional identity, and that professionals make use of identity management strategies in response to this identity threat.

Design/methodology/approach

The paper draws on a qualitative analysis of incident narratives in 14 semi-structured interviews with physicians, nurses, and residents at a Dutch specialist hospital. The authors used an existing framework of identity management strategies to categorize the narratives.

Findings

The analysis yielded two main results. First, nurses and residents employed multiple types of identity management strategies simultaneously, which points to the possible benefit of combining different strategies. Second, physicians used the strategy of patronization of other professional groups, a specific form of downward comparison.

Research limitations/implications

The authors discuss the implications of the findings in terms of the impact of identity management strategies on the perpetuation of hierarchical differences in health care.

Practical implications

The authors argue that efforts to manage incident handling may profit from considering social identity processes in sensemaking of incidents.

Originality/value

This is the first study that systematically explores how health care professionals use identity management strategies to maintain a positive professional identity in the face of incidents. This study contributes to research on interdisciplinary cooperation in health care.

Details

Journal of Health Organization and Management, vol. 29 no. 7
Type: Research Article
ISSN: 1477-7266

Keywords

Article
Publication date: 6 February 2017

Rafael Bravo, Isabel Buil, Leslie de Chernatony and Eva Martínez

The purpose of this paper is to better understand the brand identity management process from the employees’ perspective. Specifically, it explores how the different dimensions of…

4816

Abstract

Purpose

The purpose of this paper is to better understand the brand identity management process from the employees’ perspective. Specifically, it explores how the different dimensions of brand identity management influence employees’ attitudinal and behavioural responses.

Design/methodology/approach

An empirical study was carried out to test the proposed model. The sample consisted of 297 employees in the UK financial services sector. Hypothesis testing was conducted using partial least square regression.

Findings

Results indicate that effective brand identity management can increase employees’ identification with their organisations. Specifically, the most influential dimension is the employee-client focus. Results also show that organisational identification is a key variable to explain job satisfaction, word-of-mouth and brand citizenship behaviour.

Research limitations/implications

This study focusses on the UK financial sector. To explore the generalisability of results, replication studies among other sectors and countries would be useful. The cross-sectional nature of the study also limits its causal inference.

Practical implications

This study shows the importance of brand identity management to foster positive employee attitudes and actions that go beyond their job responsibilities. The model developed may help organisations analyse the impact of managerial actions, monitoring the potential effects of changes in brand identity management amongst employees.

Originality/value

Although numerous conceptual frameworks highlight the importance of brand identity management, empirical studies in this area are scarce. The current work extends previous research by empirically analysing the effects of the dimensions of brand identity management from the employees’ perspective.

Details

International Journal of Bank Marketing, vol. 35 no. 1
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 11 June 2018

Kane J. Smith, Gurpreet Dhillon and Karin Hedström

In this paper, using values of individuals in a Swedish health-care organization, electronic identity management objectives related to security are defined.

Abstract

Purpose

In this paper, using values of individuals in a Swedish health-care organization, electronic identity management objectives related to security are defined.

Design/methodology/approach

By using value-focused thinking, eliciting values from interviews of three groups of health-care staff’s objective hierarchies for three stakeholder groups are identified and defined. Objective hierarchies allow comparison across multiple stakeholder groups such that strategic objectives for identity management can be compared and contrasted.

Findings

This qualitative investigation, which used value-focused thinking, revealed 94 subobjectives, grouped into 12 fundamental and 14 means objectives, which are essential for developing measures that address potential value conflicts in a health-care organization around electronic identity management. The objectives developed in this study are grounded socioorganizationally and provide a way forward in developing measures aimed to reducing potential conflicts at a policy level.

Originality/value

In a final synthesis, congruence (or lack thereof) in the electronic identity management approach for a Swedish health organization is suggested. This also creates a foundation to evaluate and weight different objectives for strategic decision management.

Details

Information & Computer Security, vol. 26 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 19 June 2009

Mina Deng, Danny De Cock and Bart Preneel

Modern e‐health systems incorporate different healthcare providers in one system and provide an electronic platform to share medical information efficiently. In cross‐context…

1247

Abstract

Purpose

Modern e‐health systems incorporate different healthcare providers in one system and provide an electronic platform to share medical information efficiently. In cross‐context communications between healthcare providers, the same information can be interpreted as different types or values, so that one patient will be issued different identifiers by different healthcare providers. This paper aims to provide a solution to ensure interoperability so that multiple healthcare providers will be able to collaborate in one e‐health system.

Design/methodology/approach

This paper primarily focuses on how different healthcare providers, instead of the patients, are able to interact and share information on a common e‐health platform.

Findings

In the course of the work, it was found that previous e‐health solutions mainly have a limited view of patient information, where a user‐centric approach for identity management is usually restricted to a single healthcare provider. Interoperability in an e‐health system becomes more problematic when more actors collaborate, and hence linkability from one context to another should not be straightforward. However, some form of linkability, such as the possibility to follow up a patient's medical treatment, is desirable in the e‐health sector, even when it needs to cross different contexts. Therefore, the authors have designed an identity management mechanism to ensure semantic interoperability when data is exchanged among different authorized healthcare providers.

Research limitations/implications

The paper points out that the next generation of e‐health will move towards federated e‐health and will require user‐centricity and transparency properties so that patients are able to specify and verify the disclosure of their medical information.

Originality/value

This paper proposes a new service for cross‐context identity management in e‐health systems, improving interoperability between agencies when context‐specific information is transferred from one healthcare provider to another. How the proposed cross‐context identity management service can be integrated in an e‐health system is explained with a use case scenario.

Details

Online Information Review, vol. 33 no. 3
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 29 March 2011

Roland H. Bartholmé and T.C. Melewar

Despite the significance of sound, hitherto the auditory dimension has been widely ignored with regard to corporate identity management and corporate communication. This paper…

2004

Abstract

Purpose

Despite the significance of sound, hitherto the auditory dimension has been widely ignored with regard to corporate identity management and corporate communication. This paper aims to expand the domains of corporate identity and corporate communication by focusing on the auditory dimension as a component of company‐controlled communication.

Design/methodology/approach

Based on an extensive review of corporate identity and corporate communication literature, a set of hypotheses is proposed that reflect antecedents of corporate auditory identity management.

Findings

The paper not only illustrates the importance of the auditory dimension as part of corporate identity management, it also provides initial suggestions of antecedent factors that are expected to determine the utilisation of sound on a corporate level.

Originality/value

The presented discussion about the role of auditory identity vis‐à‐vis corporate identity management provides initial guidance for managers when considering the auditory dimension as a potential ingredient of their communication tool kit. Moreover, this paper advances existing knowledge by providing initial insight into the relationship between domains such as auditory identity and corporate identity, visual identity and corporate communication.

Details

Marketing Intelligence & Planning, vol. 29 no. 2
Type: Research Article
ISSN: 0263-4503

Keywords

Article
Publication date: 6 October 2021

Chang Soo Sung and Joo Yeon Park

This study aims to understand the benefits and challenges associated with the adoption of a blockchain-based identity management system in public services by conducting an…

1407

Abstract

Purpose

This study aims to understand the benefits and challenges associated with the adoption of a blockchain-based identity management system in public services by conducting an academic literature review, and to explore the design of such a system that can be applied to the Korean government.

Design/methodology/approach

This study explores the adoption of a blockchain-based identity management system using a literature review and an actual design case intended for use by the government sector.

Findings

Blockchain-based identity management systems can significantly improve transparency, accountability, and reliability in the user control of one's own data while reducing the time and cost needed to deliver public services, as well as increasing administrative efficiency. However, it is not always easy to implement such systems, and introducing new technologies in the government field requires a complicated, time-consuming process. There is currently an appetite for research extending beyond the typical technology-driven approach to elucidate the government adoption of new technologies and explore its implications.

Practical implications

The idea behind this system is that by storing and managing personal information on the blockchain and providing mobile apps to customers, users can log in or retrieve previously authenticated personal information without having to go through an authentication process. Since users do not need to go through the verification process every time, it is expected that they will be able to access only the necessary personal information more quickly and conveniently without having to deal with unnecessary details. In addition, the blockchain-based operation of a public service effectively increases the transparency and reliability of that service and reduces the social costs caused by personal information leakage.

Originality/value

This study introduces the design of a blockchain-based identity management system that can be used in public services, specifically in the Korean government sector for the first time. Along with a literature review, the implications that this study gleans from these real-world use cases can contribute to this field of research.

Details

Journal of Enterprise Information Management, vol. 34 no. 5
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 18 January 2013

Joseph Kwame Adjei

The aim of this paper is to present a qualitative study on implementation of trusted identity management systems. Identity management and assurances in developing countries

1012

Abstract

Purpose

The aim of this paper is to present a qualitative study on implementation of trusted identity management systems. Identity management and assurances in developing countries generates a lot of controversy and challenges for society and this study was set out to design model for trusted identities framework.

Design/methodology/approach

Trusted identities framework from a societal perspective is a multi‐stakeholder issue and hence a qualitative research method was deemed appropriate given that it provides opportunities for engagement of stakeholders from different avenues. The use of a stakeholder forum offered a good opportunity for interested parties to raise their issues and get responses. The interviews were also a means of getting clarifications and also offered those not comfortable in public speaking to make their point.

Findings

The study made the following interesting findings: that trusted identities depend on institutional collaboration, user empowerment, system quality, information quality and service quality. Also the paper found out that when high privacy concern is associated with low levels of trust (distrust) and for that matter, society must strive for trusted identities ecosystems, which is the point where trust and privacy concern are at equilibrium as illustrative with the privacy concern – trust curve (PCTC).

Research limitations/implications

Even though this study makes profound revelations on trusted identities framework, the findings have not been tested empirically to prove the nature of the relationship. It will be interesting to find out whether the relationship between privacy concern and trust is a straight‐line or indeed a curve. Also it will be interesting to find out the extent of causality between institutional cooperation and trust.

Practical implications

The study has both practical and research implications. The findings can influence national policy making with respect to identity management, by focusing more on empowerment and institutional cooperation on interoperable technologies, standards and regulation. It also serves as an addition to the existing research on information systems success.

Originality/value

The PCTC curve is a major addition to literature on trust, privacy and identity management. The study will be of value to identity management researchers and identity management policy makers in developing countries.

Article
Publication date: 30 March 2010

Paulo Alves and James Uhomoibhi

This paper seeks to investigate and report on the status of identity management systems and e‐learning standards across Europe for promoting mobility, collaboration and the…

2013

Abstract

Purpose

This paper seeks to investigate and report on the status of identity management systems and e‐learning standards across Europe for promoting mobility, collaboration and the sharing of contents and services in higher education institutions.

Design/methodology/approach

The present research work examines existing e‐learning standards and the tools and processes applied to managing the identity of learners registered for programmes of study in higher education. The paper draws on recent developments and argues that the creation of identity management federations is mandatory to provide the mobility of users and to permit the exchange of contents and services between institutions.

Findings

It is revealed that it is crucial to create identity management federation to provide for ease of mobility and facilitate collaboration and sharing information amongst staff and students in higher education.

Research limitations/implications

The challenges arising from language, culture and differences in systems for the regions require consideration. Future work intends to incorporate some of these issues, to examine and report on them from the diverse perspectives, taking into account, the impact of globalisation.

Originality/value

This paper presents the main features of e‐learning standards and how they can be used in conjunction with identity management systems to create collaborative learning objects repositories to promote a more effective learning experience and a more competitive European space for higher education, with respect to the requirements of knowledge‐based societies.

Details

Campus-Wide Information Systems, vol. 27 no. 2
Type: Research Article
ISSN: 1065-0741

Keywords

1 – 10 of over 1000