Monday, February 10, 2020
Extend order about ((Identifying and Evaluating a Model for Thesis
Extend order about ((Identifying and Evaluating a Model for Integrating Physical and Virtual Identity Access Management Systems) ) - Thesis Example Steinfield explained an advantage of the integration of physical with virtual services and stated that it causes the ââ¬Å"death of distanceâ⬠[53]. This analogy implies that distance is irrelevant for the modern man since organizations do not need to establish a physical establishment to provide services, rather it can be done on a remote basis with the aid of internet technology. Steinfield further explained the ââ¬Ëdeath of distanceââ¬â¢ with the economic perspective; virtual services tend to incur lesser expenses for the organization as compared to the physical ones since there are lesser operational and management costs [53]. Steinfield also stated that the level of trust tends to increase if the virtual services are accompanied with physical ones too, therefore, it can be stated that there regulates a lesser degree of trust around the virtual services as compared to the physical ones [53]. Woodworth defined physical identity as the physical characteristics or the external attributes that are possessed by the individual [84]. Oracle included a discussion regarding an access management system in one of their white papers and stated that it was based on the authentication and verification of physical identities; the examples of physical identities that are implemented in this system are biometrics, RFID, smart cards [85]. Woodworth discussed virtual identities and stated that ââ¬Å"virtual spaces and the tools withinâ⬠that are used for ââ¬Å"identity construction and the self-presentationâ⬠of the individual [84]. With respect to the definition by Woodworth [84], it can be stated that if the tools within the virtual spaces are used to authenticate the users on the basis of any proof of identity then it can be termed as a virtual identity. For example, a smart card is a physical identity, however if this identity is read in an online environment with the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.