User-centered design of identity and access management systems
IT security management (ITSM) technologies are important components of IT security in organizations. But there has been little research on how ITSM technologies should incorporate human and social issues into their design. Identity and Access Management (IAM) systems, as an important category of ITS...
Main Author: | Jaferian, Pooya |
---|---|
Language: | English |
Published: |
University of British Columbia
2014
|
Online Access: | http://hdl.handle.net/2429/51243 |
Similar Items
-
Accessibility and Activity-Centered Design for ICT Users: ACCESIBILITIC Ontology
by: Brunil Dalila Romero Marino, et al.
Published: (2018-01-01) -
USER BEHAVIOUR TO ACCESS TELEVISION RELATED CONTENT ON SMARTPHONES, TABLETS AND COMPUTERS: AN USER CENTERED DESIGN APPROACH
by: EDUARDO RANGEL BRANDAO
Published: (2015) -
Enhancing Accessibility of Web Based GIS Applications through User Centered Design
by: Babar, Shahzad, et al.
Published: (2010) -
User-Centered Design of Translation Systems
by: Shi, Chunqi
Published: (2014) -
Application of User-Centered Design for a Student Case Management System
by: Kahl, Vincent
Published: (2011)