Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Page Properties

Title

Improve Productivity

Alternative Wordings

  • Business Automation

  • Efficiency Gains

  • Improve Productivity

  • Operational Effectiveness

  • Operational Efficiency

  • Operational Improvements

  • Productivity Benefits

  • Productivity Gains

  • Return on Investment (RoI)

Sources

Quotes

Expand
titleAl-Khouri, 2011, p. 463

Larger networks and interconnected systems in a geographically diverse environments resulted in IAM federated identity access models. This approach enables organizations to optimally pursue business automation goals and higher operational efficiencies and market penetration through aligning together their business models, IT policies, security and privacy goals and requirements. In other words, identity federation is referred to the set of business and technology agreements between multiple organizations to allow users to use the same identification data to access privileged information across many disparate network domains. Obviously, identity federation offers economic savings, security and privacy as well as convenience, to both enterprises and their network users.

(Al-Khouri, 2011, p. 463)

...

Expand
titleRavindran, 2013, p. 2

Data security, regulatory compliance, competitive advantage, productivity benefits and reduced overhead are some of the goals that can be targeted during the road map phase.

(Ravindran, 2013, p. 2)

Expand

3.3.1 Why Do Organisations Introduce EIdM?

EIdM projects are no ends in themselves, as they are introduced to obtain a specific goal. Amongst a variety of driving factors and reasons for introducing EIdM into an organisation,179 the following primary and secondary reasons taken from the interviews seem to be the most prevalent reasons being named by the experts180:

Primary goals:

◦ Compliance goals (constraint for organisations)

◦ Business-related goals (e.g., efficiency, automation of processes, general cost reduction, accounting for IT costs)

  • Secondary goals:

◦ Risk management/IT security goals

◦ Enabler for new business opportunities

The presented primary and secondary goals are not mutually exclusive.181 Overlaps and synergies can for example occur in cases where organisations seek to comply with relevant laws by introducing a EIdMS. In the course of the introduction and the proceeding re-organisation of the organisational IT and related processes, better efficiency can be gained due to clean-ups and streamlining of process once being fragmented. Also other overlaps in goals can be achieved; however, these depend on the individual setting being analysed.

(Royer, 2013, p. 46-47)

Expand