Whose Identity Is It Anyway?
Jinfo Article
14th May 2014
Abstract
Ever-increasing regulatory and compliance requirements mean that the identity and access management (IAM) market continues to grow rapidly. But the millennial generation, used to controlling its own identity across multiple platforms through one social log-in, could be about to break the current top-down approach. Tim Buckley Owen charts the growing phenomenon of Bring Your Own Identity (BYOID), and notes that when employees do eventually take their identity from job to job in the same way as they take their mobile phone now, IT departments risk losing control of IAM and employers could even find themselves having to bid for access to employee identities.
Content Access
Does your organisation have a Jinfo Subscription?
Access to Jinfo Content and Community is available through a Jinfo Subscription.
"Yes"
Please sign in to MyJinfo here so that we can check your access to this item:
Or sign in via email:
Enter your email and we'll send you a magic link to sign you in automatically.
"Not yet"
Access to this article is available through a Jinfo Subscription, which will help your organisation:
- Save time and money
- Re-invent information services
- Define, measure and communicate information value.
"Don't know"
Contact us to find out if your organisation already has a Jinfo Subscription.
Or use the 'Text Chat' button at the bottom-right of this page for immediate assistance.
- Article title: Whose Identity Is It Anyway?
- Link to this page
- View printable version
- Privacy - the Tentacles Stretch Ever Further
Friday, 11th April 2014 - Rethinking Personal Data
Tuesday, 4th February 2014 - Privacy - Comply If You Want to Stay in Business
Monday, 3rd February 2014 - Large Software Vendors Bet on BYOD
Friday, 3rd January 2014 - Privacy in the Cloud - Jobs for the Techies and for Info Pros Too
Wednesday, 10th July 2013 - Good Guy, Bad Guy - Privacy Spells Opportunity
Wednesday, 5th June 2013
- BYOD and the Security Nightmare
Friday, 4th April 2014 - Analytics and privacy - incompatible?
Thursday, 29th March 2012