Reference Hub2
End User Security Training for Identification and Access Management

End User Security Training for Identification and Access Management

Tonia San Nicolas-Rocca, Lorne Olfman
Copyright: © 2013 |Volume: 25 |Issue: 4 |Pages: 29
ISSN: 1546-2234|EISSN: 1546-5012|EISBN13: 9781466634701|DOI: 10.4018/joeuc.2013100104
Cite Article Cite Article

MLA

San Nicolas-Rocca, Tonia, and Lorne Olfman. "End User Security Training for Identification and Access Management." JOEUC vol.25, no.4 2013: pp.75-103. http://doi.org/10.4018/joeuc.2013100104

APA

San Nicolas-Rocca, T. & Olfman, L. (2013). End User Security Training for Identification and Access Management. Journal of Organizational and End User Computing (JOEUC), 25(4), 75-103. http://doi.org/10.4018/joeuc.2013100104

Chicago

San Nicolas-Rocca, Tonia, and Lorne Olfman. "End User Security Training for Identification and Access Management," Journal of Organizational and End User Computing (JOEUC) 25, no.4: 75-103. http://doi.org/10.4018/joeuc.2013100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Identification and access management (I/AM) is among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized disclosure of PII as, according to recent literature, usernames and passwords alone are insufficient for proper authentication of users into information and information systems. This study examines a critical element in the successful implementation of any information security initiative, end user training. Specifically, this study advances research in the area of end user security training by using canonical action research (CAR) to develop and refine an IT security training framework that can guide institutions of higher education in the implementation of USB security tokens for two-factor authentication using public key infrastructure (PKI).

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.