Results from FreePint Research into Authentication, Part 2 - Approaches and Priorities
Jinfo Article
24th August 2015
Abstract
Information managers in many industries are grappling with less-than-perfect authentication methods, with some industries placing greater importance than others on drivers such as a single view of usage or access to resources for partners and affiliates. Read the analysis of findings from FreePint's research into approaches, priorities and plans in the second installment of our feedback on this exciting fresh research.
Content Access
Does your organisation have a Jinfo Subscription?
Access to Jinfo Content and Community is available through a Jinfo Subscription.
"Yes"
Please sign in to MyJinfo here so that we can check your access to this item:
Or sign in via email:
Enter your email and we'll send you a magic link to sign you in automatically.
"Not yet"
Access to this article is available through a Jinfo Subscription, which will help your organisation:
- Save time and money
- Re-invent information services
- Define, measure and communicate information value.
"Don't know"
Contact us to find out if your organisation already has a Jinfo Subscription.
Or use the 'Text Chat' button at the bottom-right of this page for immediate assistance.
- Article title: Results from FreePint Research into Authentication, Part 2 - Approaches and Priorities
- Link to this page
- View printable version
- Results from FreePint Research into Authentication, Part 3 - What's Needed
Tuesday, 25th August 2015 - Setting Strategy with FreePint Research - Looking at the Big Picture
Friday, 21st August 2015 - Results from FreePint Research into Authentication, Part 1 - Background and Methodology
Thursday, 20th August 2015 - RightFind XML for Mining - a Q&A with Copyright Clearance Center (CCC)
Thursday, 13th August 2015
- Managing Use of Web Content
Monday, 10th August 2015
- Research into Authentication 2015
Thursday, 27th August 2015