Identifying and Prioritizing Evaluation Criteria for User-Centric Digital Identity Management Systems

Abstract

Identity Management systems are used for securing digital identity of users in reliable, automated and compatible way. Service providers employ identity management systems which are cost effective and scalable but cause poor usability for users. Identity management systems are user-centric applications which should be designed by considering users’ perspective. User centricity is a remarkable concept in identity management systems as it provides more powerful user control and privacy. This approach has been evolved from amending past paradigms. Thus, evaluation of digital identity management systems based on users’ point of view, is really important. The main objective of this paper is to identify the appropriateness of the criteria used in evaluation of user-centric digital identity management systems. These criteria are gathered from the literature and then categorized into four groups for the first time in this work to examine the importance of each parameter. In this approach, several interviews were performed as a qualitative research method and two questionnaires have been filled out by forty six users who were involved with identity management systems. Since the answers are perception based data the most important criteria in each category are assessed by using fuzzy method. This research found that the most important criteria are related to security category. The results of this research can provide valuable information for managers and decision makers of hosting companies as well as system designers to adapt and develop appropriate user-centric digital identity management systems.

Authors and Affiliations

Sepideh Banihashemi, Elaheh Homayounvala, Alireza Talebpour, Abdolreza Abhari

Keywords

Related Articles

Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)

In this paper secured wireless communication using fuzzy logic based high speed public-key cryptography (FLHSPKC) has been proposed by satisfying the major issues likes computational safety, power management and restrict...

SHPIS: A Database of Medicinal Plants from Saudi Arabia

Many studies in the past have revealed the use of the indigenous medicinal plant for the treatment of various diseases in Saudi Arabia. However, the details of these indigenous essential medicinal herbs and their therape...

Towards an SOA Architectural Model for AAL-Paas Design and Implimentation Challenges

Ambient Assisted Living (AAL) systems main purpose is to improve the quality of life of special groups of people, including the elderly and people with physical disabilities. Driven by the critical ongoing changes in all...

Cluster based Hybrid Approach to Task Scheduling in Cloud Environment

Cloud computing technology enables sharing of computer system resources among users through internet. Many numbers of users may request for sharable resources from a cloud. The sharable resources must be effectively dist...

BITRU: Binary Version of the NTRU Public Key Cryptosystem via Binary Algebra

New terms such as closest vector problem (CVP) and the shortest vector problem (SVP), which have been illustrated as NP-hard problem, emerged, leading to a new hope for designing public key cryptosystem based on certain...

Download PDF file
  • EP ID EP96254
  • DOI 10.14569/IJACSA.2016.070707
  • Views 102
  • Downloads 0

How To Cite

Sepideh Banihashemi, Elaheh Homayounvala, Alireza Talebpour, Abdolreza Abhari (2016). Identifying and Prioritizing Evaluation Criteria for User-Centric Digital Identity Management Systems. International Journal of Advanced Computer Science & Applications, 7(7), 45-54. https://europub.co.uk/articles/-A-96254