15 research outputs found

    Security, user experience, acceptability attributes for the integration of physical and virtual identity access management systems

    No full text
    A number of systems have been developed in the recent history to provide physical and virtual identity management systems; however, most have not been very successful. Furthermore, alongside increasing the level of awareness for the need to deploy interoperable physical and virtual identity management systems, there exists an immediate need for the establishment of clear standards and guidelines for the successful integration of the two mediums. The importance and motivation for the integration of the two mediums is discussed in this paper with respect to three perspectives: Security, which includes identity; User Experience, comprising Usability; and Acceptability, containing Accessibility. Not many systems abide by such guidelines for all of these perspectives; thus, our proposed system (UbIAMS) aims to change this and provide its users with access to their services from any identity access management system rather than merely providing access to a specific set of system

    IAMS framework: a new framework for acceptable user experiences for integrating physical and virtual identity access management systems

    No full text
    The modern world is populated with so many virtual and physical Identity Access Management Systems (IAMSs) that individuals are required to maintain numerous passwords and login credentials. The tedious task of remembering multiple login credentials can be minimised through the utilisation of an innovative approach of single sign-in mechanisms. During recent times, several systems have been developed to provide physical and virtual identity management systems; however, most have not been very successful. Many of the available systems do not provide the feature of virtual access on mobile devices via the internet; this proves to be a limiting factor in the usage of the systems. Physical spaces, such as offices and government entities, are also favourable places for the deployment of interoperable physical and virtual identity management systems, although this area has only been explored to a minimal level. Alongside increasing the level of awareness for the need to deploy interoperable physical and virtual identity management systems, this paper addresses the immediate need to establish clear standards and guidelines for successful integration of the two medium

    Validating the IAMS Framework

    No full text
    The wide spread of services on the internet has aggravated the issue of maintaining multiple identities such as the virtual identities that are based on specific login credentials like username, passwords and PINs. On the other hand, multiple physical identities also prove to be difficult to maintain since different sources require the presence of different smart cards, mobile devices or other proofs of identities. This paper addresses the problem of how to design an optimum user experience for Integrating Physical and Virtual Identity Access Management System (IAMS) by combining theories in three research perspectives: Security, which includes identity; User Experience, comprising Usability; and Acceptability, containing Accessibility. Existing research in this area tend to focus on one of these research perspectives. However, there is little evidence that researchers have approached the issue of an overlap and conflict between these three research perspectives with the intent of building a cohesive understanding of Integrating Physical and Virtual IAMSs in e-government domain and the relationships that exist between the different dimensions and components. Consequently, this research has developed a conceptual IAMS Framework for Integrating Physical and Virtual IAMS, and used expert evaluations for validating the components of the framework

    Evaluation of the UTAUT model for acceptable user experiences in e-Government physical and virtual identity access management systems

    No full text
    The modern world is populated with a great many physical and virtual IAMS (Identity Access Management Systems), where people need to maintain various login credentials. There is a key issue associated with this approach, which is the ability to remember this information; however, this can be circumvented to some degree through utilising an innovative approach of a single sign-in mechanism. Throughout the course of recent times, a number of different systems have been developed in order to deliver both virtual and physical IAMS. Moreover, in addition to a greater level of awareness to ensure interoperable virtual and physical IAMS are implemented, there is a pressing urgency for clear guidelines to be devised relating to the integration of: security, comprising identity; user experience, involving usability; and acceptability, encompassing accessibility. Very few models adhere to such guidelines; therefore, this paper seeks to deal with the pressing need to devise, implement and evaluate a model for acceptable user experience, enabling the successful integration of physical and virtual public services in an e-government context. In regard to the users’ assessment, which tests the suggested Unified Theory of Acceptance and Use of Technology (UTAUT), it was observed that there is an indirect impact on behavioural intention to utilise a new prototype system (Ubiquitous Identity Access Management System ”UbIAMS” ) through various factors, namely effort expectancy, performance expectancy and social influence, as well as through items relating to acceptability and user experienc

    Discussion and evaluation of the updated UTAUT Model in IAMSs

    No full text
    The modern world is populated with a great many physical and virtual IAMS (Identity Access Management Systems), where people need to maintain various login credentials. There is a key issue associated with this approach, which is the ability to remember this information; however, this can be circumvented to some degree through utilising an innovative approach of a single sign-in mechanism. Throughout the course of recent times, a number of different systems have been developed in order to deliver both virtual and physical IAMS. Moreover, in addition to a greater level of awareness to ensure interoperable virtual and physical IAMS are implemented, there is a pressing urgency for clear guidelines to be devised relating to the integration of: security, comprising identity; user experience, involving usability; and acceptability, encompassing accessibility. Very few models adhere to such guidelines; therefore, this paper seeks to deal with the pressing need to devise, implement and evaluate a model for acceptable user experience, enabling the successful integration of physical and virtual public services in an e-government context. In regard to the users’ assessment, which tests the suggested Unified Theory of Acceptance and Use of Technology (UTAUT), it was observed that there is an indirect impact on behavioural intention to utilise a new prototype system (Ubiquitous Identity Access Management System ”UbIAMS” ) through various factors, namely effort expectancy, performance expectancy and social influence, as well as through items relating to acceptability and user experience

    Towards a UTAUT-based model for studying the integrating physical and virtual identity access management systems in e-government domain

    No full text
    The success of any technology is not only dependent on the number of good reviews or great revenues, but also on the factors that can help one comprehend the level of acceptance that can be expected from any technology. This paper discusses the progress of acceptance theories and models, which have led to the development of an effective model that can be used to calculate the level of predicting, explaining, and understanding individuals’ acceptance for a new proposed system, called Ubiquitous Identity Access Management System (UbIAMS), that provides interoperability between the physical and virtual spaces, alongside to three perspectives: Security, which includes identity; User Experience, comprising Usability; and Acceptability, containing Accessibility. Existing research in this area tend to focus on one of these research perspectives. However, there is little evidence that researchers have approached the issue of an overlap and conflict between these three research perspectives with the intent of building a cohesive understanding of integrating physical and virtual Identity Access Management Systems (IAMSs) in e-government domain and the relationships that exist between the different dimensions and components. Consequently, this paper has developed a conceptual Unified Theory of Acceptance and Use of Technology (UTAUT)-based model for integrating physical and virtual IAMSs

    Towards a framework and model for acceptable user experiences in e-government physical and virtual identity access management systems

    No full text
    The wide spread of services on the internet has aggravated the issue of maintaining multiple identities such as the virtual identities that are based on specific login credentials like username, passwords and PINs. On the other hand, multiple physical identities also prove to be difficult to maintain since different sources require the presence of different smart cards, mobile devices or other proofs of identity. Therefore, the modern world is populated with so many virtual and physical Identity Access Management Systems (IAMS) that individuals are required to maintain multiple passwords and login credentials. The tedious task of remembering these can be minimised through the utilisation of an innovative approach of single sign-in mechanisms. During recent times, several systems have been developed to provide physical and virtual IAMS; however, most have not been very successful according to specific criteria. Furthermore, alongside increasing the level of awareness for the need to deploy interoperable physical and virtual IAMS, there exists an immediate need for the establishment of clear guidelines for the successful integration of the two media. The importance of and motivation for the integration of the two media will be discussed in this thesis with respect to three perspectives: security, which includes identity; user experience, comprising usability; and acceptability, containing accessibility. Not many frameworks and models abide by all guidelines for all of these perspectives; thus, the thesis addresses the immediate need to establish a framework and a model for acceptable user experience for successful integration of the two media for public services within the e-government domain. The IAMS framework is based on the attributes from the researched theories of the three perspectives and expert evaluations of the unique nine themes. Regarding the users evaluation to test the proposed Unified Theory of Acceptance and Use of Technology Model(UTAUT), there is an indirect effect on behavioural intentions to use a new prototype system (Ubiquitous Identity Access Management System "UbIAMS") through performance expectancy, effort expectancy, social influence, and through items pertaining to acceptability and user experience

    Towards a UTAUT Model for Acceptance of Massive Open Online Courses (MOOCs)

    Get PDF
    In many training institutions, the major advancement of Information Technology is having a profound impact on the way in which instructors teach and students learn, as well as how the two interact. The training process is continuing with the goal of enhancing the calibre of instruction and engagement. Top colleges and institutions have more recently developed a variety of Massive Open Online Courses (MOOC) systems centred on the development of new educational offering ways. These have not only captured the interest of students and scholars in the field of higher education, but also that of staff members in the private and public sectors. This study uses a Unified Theory of Acceptance and Use of Technology (UTAUT) model to assess the top MOOC providers and pinpoint the key elements influencing learner acceptance of MOOCs in Saudi Arabian training. A total of 382 government trainees in Saudi Arabia participated in an online survey, the results of which underwent analysis using structural equation modelling. This study identifies the key elements influencing Saudi government employee trainees’ intentions to use MOOCs, with the findings indicating that the suggested model can account for 86.2% of user behaviour and 88.5% of user intentions.The institute of public administration, Riyadh, Saudi Arabi

    Abstract Paper: FingerID, A New Security Model Based on Fingerprint Recognition for Personal Learning Environments (PLEs)

    No full text
    The advent of computer technology has changed our lives. The Internet is a world in itself, with 1.8 billion users worldwide and growing [3]. It has provided benefits to the human race, but also created opportunities for malicious activities. Such evil activities include financial fraud, identity theft, account hacking, etc. The widespread authentication mechanism of username and password is out-dated, and does not meet current needs. Intruders and hackers have also learnt, and become more tech savvy. This raises the need to introduce a better and more reliable authentication mechanism which is not dependent on a series of characters, but rather on a technology that is unique and only possessed by the individual. Another problem faced by modern-day Internet users is that they are required to maintain a long list of passwords for their web accounts - maybe 15-20 accounts. In this paper, we propose a one-stop solution to eliminate all these problems; a new security model based on Fingerprint Recognition for Distributed Systems. This solution will make the experience of access to distributed web accounts a more secure, accessible and usable one. The findings of this paper will revolutionise the entire authentication mechanism on the web, and thereby enable the user access to distributed accounts at a single point
    corecore