290,430 research outputs found

    Intersectionality and identity: shared tenets and future research agendas for gender and identity studies

    Get PDF
    Purpose – The purpose of this paper is to introduce the Special Issue developed from a joint research seminar of the Gender in Management and Identity Special Interest Groups of the British Academy of Management, entitled “Exploring the Intersectionality of Gender and Identity”. It also presents an introductory literature review of intersectionality for gender in management and identity/identity work researchers. The authors highlight the similarities and differences of intersectionality and identity approaches and introduce critiques of intersectional research. They then introduce the three papers in this Special Issue. Design/methodology/approach – The authors review the intersectionality literature within and outside management and organisation studies and focus their attention on three intersectionality Special Issues (Sex Roles, 2008, 2013 and the European Journal of Women’s Studies, 2006). Findings – The authors outline the ongoing debates relating to intersectionality research, including a framework and/or theory for identity/identity work, and explore the shared tenets of theories of intersectionality and identity. They highlight critiques of intersectionality research in practice and consider areas for future research for gender in management and identity researchers. Research limitations/implications – The authors provide an architecture for researchers to explore intersectionality and to consider issues before embarking on intersectional research. They also highlight areas for future research, including social-identities of disability, class and religion. Originality/value – Gender in Management: An International Journal invited this Special Issue to make a significant contribution to an under-researched area by reviewing the shared and different languages and importantly the shared key tenets, of intersectionality, gender, identity and identity work from a multidisciplinary perspective

    Using Adaptive Enterprise Architecture Framework for Defining the Adaptable Identity Ecosystem Architecture

    Get PDF
    Digital identity management is often used to handle fraud detection and hence reduce identity thefts. However, using digital identity management presents additional challenges in terms of privacy of the identity owner meanwhile managing the security of the verification. In this paper, drawing on adaptive enterprise architecture (EA) with an ecosystem approach to digital identity, we describe an identity ecosystem (IdE) architecture to handle identity management (IdM) while safeguarding security and privacy. This study is a part of the larger action design research project with our industry partner DZ. We have used adaptive EA as a theoretical lens to define a privacy aware adaptive IdM with a view to improve the Id operations and delivery of services in the public and private sector. The value of the anticipated architecture is in its generic yet comprehensive structure, component orientation and layered approach which aim to enable the contemporary IdM

    An architecture for identity management

    Get PDF
    Personalization of on-line content by on-line businesses can improve a user’s experience and increase a business’s chance of making a sale, but with stricter privacy legislation and Internet users’ increasing concerns about privacy, businesses need to ensure they do not violate laws or frighten away potential customers. This thesis describes the design of the proposed Identity Management Architecture (IMA). The IMA system allows users to decide on a per business basis what personal information is provided, gives users greater access to their personal information held by on-line businesses, and does not rely on a trusted third-party for management of personal information. In order to demonstrate the design and functionality of the IMA system a prototype implementation has been built. This implementation consists of the IMA client application and an example participating business to demonstrate the features of the IMA client. To evaluate the design of the IMA system it was compared to three high profile identity management systems: Microsoft .NET Passport, Liberty Alliance Project, and Microsoft Infocards. Through this evaluation each tool was compared based on the access to personal information provided to users and on what areas of privacy legislation compliance are improved for a business that participates

    Relationship between corporate identity, place architecture, and identification: an exploratory case study

    Get PDF
    Purpose – How organizations view, value, and manage their place architecture in relation to identification and corporate identity has received little research attention. The main goal of this paper is to provide an integrative understanding of the relationships between corporate identity, place architecture, and identification from a multi-disciplinary approach. It is assumed that characteristics of the organization and of the way a corporate identity and place architecture are managed will affect employees’ and consumers’ identification. Design/methodology/approach – The paper uses a theory-building case study within the phenomenological/qualitative research tradition. The data were gathered through 15 in-depth interviews with top management who were working at a London-Based Business School. In addition, six focus groups were conducted with a total of 36 academics, and new empirical insights are offered. NVivo software was used to gain insight into the various influences and relationships. Findings – Drawing on one case study, our findings confirm that firms are utilizing the conceptualizations of corporate identity and place architecture, including the leveraging of tangible and intangible forms of consumers’/employees’ identification, towards a university business school. Originality/value – The relationships between corporate identity, place architecture, and identification have received little research attention and have hardly been studied at all from the perspective of this paper. This paper has value to researchers in the fields of marketing, corporate identity, place architecture, design, as well as professionals involved in managing a company’s architecture. Drawing on the marketing/management theory of identity and architecture alignment, managers and policy advisors should devote attention to each element of the corporate identity and place architecture and ensure that they are in meaningful as well as in dynamic alignment

    Anonymous network access using the digital marketplace

    Get PDF
    With increasing usage of mobile telephony, and the trend towards additional mobile Internet usage, privacy and anonymity become more and more important. Previously-published anonymous communication schemes aim to obscure their users' network addresses, because real-world identity can be easily be derived from this information. We propose modifications to a novel call-management architecture, the digital marketplace, which will break this link, therefore enabling truly anonymous network access

    A 3GPP open-ID framework

    Get PDF
    Currently Mobile Network Operators (MNO) rely on an authentication, authorization and profile management architecture which has proved, by its generalized use and acceptance, as being appropriate. The use of a secure component, the SIM-Card, provides a set of capabilities not seen in other access architectures and an advantage for MNOs. Nevertheless upcoming requirements in terms of open interfaces, new services and customer demands are questioning the actual architecture. This paper presents a novel approach to authentication and profile management that can be reused by both MNOs and 3rd party providers to answer the upcoming requirements. Here, a user is able to store his own identity information in different places, while taking advantage of the strong authentication mechanisms provided by the MNO. Furthermore, by integrating MNOs' generic authentication architecture with user-centric identity management, we are creating a generic way for service providers to reuse this authentication infrastructure, providing both single sign-on and strong authentication. Copyright © 2010 The authors

    Formulating Methodology to Build a Trust Framework for Cloud Identity Management

    Get PDF
    The vital element in outsourcing data to the cloud is trust and trustworthiness that information is protected, unaltered and available on demand. To facilitate service expectations efficient and effective infra-structures are required to host the functional processes. A security process is identity management that provides authorization for access rights based on verification checks. In this paper cloud security architecture is reviewed by focusing on the issue of trust and the role of identity management design. Methodology is built to produce cloud artefacts and then it is theoretically applied to produce an innovative solution to assess cloud identity providers (CIdP). A design solution lays out an information security architecture that enhances utility for CIdPs and gives better options for users to make trust decisions in the cloud. The contribution of the research is to provide a generic methodology that may be applied to evaluate other security artefacts for the cloud environment
    corecore