Download Now Free registration required
This paper extends and complements paper by providing additional details on how modelling and simulation can support the (policy) decision making process, for Identity and Access Management (IAM). Specifically, the process of making IT (security) policy decisions, within organizations, is complex: it involves reaching consensus between a set of stakeholders (key decision makers, e.g. CISOs/CIOs, domain experts, etc.) who might have different views, opinions and biased perceptions of how policies need to be shaped. This involves multiple negotiations and interactions between stakeholders. IAM is a rich area that introduces various dilemmas, e.g. in terms of required IT investments and related policies.
- Format: PDF
- Size: 340.2 KB