To read this content please select one of the options below:

Reconciling value-based objectives for security and identity management

Kane J. Smith (Virginia Commonwealth University, Richmond, Virginia, USA)
Gurpreet Dhillon (University of North Carolina at Greensboro, Greensboro, North Carolina, USA)
Karin Hedström (School of Business, Örebro University, Orebro, Sweden)

Information and Computer Security

ISSN: 2056-4961

Article publication date: 11 June 2018

301

Abstract

Purpose

In this paper, using values of individuals in a Swedish health-care organization, electronic identity management objectives related to security are defined.

Design/methodology/approach

By using value-focused thinking, eliciting values from interviews of three groups of health-care staff’s objective hierarchies for three stakeholder groups are identified and defined. Objective hierarchies allow comparison across multiple stakeholder groups such that strategic objectives for identity management can be compared and contrasted.

Findings

This qualitative investigation, which used value-focused thinking, revealed 94 subobjectives, grouped into 12 fundamental and 14 means objectives, which are essential for developing measures that address potential value conflicts in a health-care organization around electronic identity management. The objectives developed in this study are grounded socioorganizationally and provide a way forward in developing measures aimed to reducing potential conflicts at a policy level.

Originality/value

In a final synthesis, congruence (or lack thereof) in the electronic identity management approach for a Swedish health organization is suggested. This also creates a foundation to evaluate and weight different objectives for strategic decision management.

Keywords

Acknowledgements

The research for this paper was financially supported by Swedish Knowledge Foundation and Swedish Civil Contingencies Agencies, who made this research possible. The authors also thank Fredrik Söderström, Linköping University, Sweden, who graciously shared his data with them. Without his support, this paper would not have been written.

Citation

Smith, K.J., Dhillon, G. and Hedström, K. (2018), "Reconciling value-based objectives for security and identity management", Information and Computer Security, Vol. 26 No. 2, pp. 194-212. https://doi.org/10.1108/ICS-08-2017-0059

Publisher

:

Emerald Publishing Limited

Copyright © 2018, Emerald Publishing Limited

Related articles