Methodology for Hybrid Role Development

Methodology for Hybrid Role Development
Author :
Publisher : BoD – Books on Demand
Total Pages : 274
Release :
ISBN-10 : 9783899369786
ISBN-13 : 3899369785
Rating : 4/5 (86 Downloads)

Book Synopsis Methodology for Hybrid Role Development by : Ludwig Fuchs

Download or read book Methodology for Hybrid Role Development written by Ludwig Fuchs and published by BoD – Books on Demand. This book was released on 2010 with total page 274 pages. Available in PDF, EPUB and Kindle. Book excerpt: "Cybercrime costs firms USD 1 trillion globally" - Headlines like this released by Reuters news agency on 29th January 2009 tend to regularly dominate international press lately. Surveys indicate that insiders like employees are one of the biggest threats to data security within organisations. As a result of improper account management users accumulate a number of excessive rights over time, resulting in the so called identity chaos. In the course of constantly growing IT infrastructures on the one hand, as well as the legislative regulations and law on the other hand, role-based Identity Management in particular has become a means of solving the identity chaos and meeting data security requirements. However, the central challenge organisations face in this context is how to construct a role catalogue for their Identity Management infrastructure. Some companies deal with this issue by applying predominantly manual procedures based on organisational and operational structures. These approaches are known as Role Engineering methodologies. Throughout the last few years, so-called Role Mining methodologies which use Data Mining techniques that cluster existing access rights of employees have evolved as alternative approaches. Recent findings show that a combination of Role Engineering and Role Mining is necessary to define a good collection of roles. This book gives insight into a hybrid tool-supported methodology for cleansing identity and account data and developing business roles for employees using Role Engineering and Role Mining techniques. Its main goals are to increase the overall user management data quality and support companies throughout a semi-automated process of defining roles. The methodology considers existing employee information and access privileges without neglecting organisational structures and business experts' knowledge about the organisation.


Methodology for Hybrid Role Development Related Books

Methodology for Hybrid Role Development
Language: en
Pages: 274
Authors: Ludwig Fuchs
Categories: Business & Economics
Type: BOOK - Published: 2010 - Publisher: BoD – Books on Demand

DOWNLOAD EBOOK

"Cybercrime costs firms USD 1 trillion globally" - Headlines like this released by Reuters news agency on 29th January 2009 tend to regularly dominate internati
Employee Experience
Language: en
Pages: 209
Authors: Ben Whitter
Categories: Business & Economics
Type: BOOK - Published: 2019-08-03 - Publisher: Kogan Page Publishers

DOWNLOAD EBOOK

For organizations to maintain their competitive advantage, their people need to be performing to the best of their abilities. But in a world of increasing stres
Optimizing Current Strategies and Applications in Industrial Engineering
Language: en
Pages: 400
Authors: Sahoo, Prasanta
Categories: Technology & Engineering
Type: BOOK - Published: 2019-01-25 - Publisher: IGI Global

DOWNLOAD EBOOK

The field of industrial engineering continues to advance at a rapid rate due to innovative technologies such as robotics and automation that improve performance
Key Factors and Use Cases of Servant Leadership Driving Organizational Performance
Language: en
Pages: 368
Authors: Pressentin, Maria
Categories: Business & Economics
Type: BOOK - Published: 2021-12-03 - Publisher: IGI Global

DOWNLOAD EBOOK

Effective leadership is a major influence in the value creation for the success and sustainability required for organizations to thrive. Servant leader, or serv
Information Systems Security
Language: en
Pages: 317
Authors: R. Sekar
Categories: Business & Economics
Type: BOOK - Published: 2008-11-24 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India, in Dec