{"title":"协作环境中的个人身份验证:来自单点登录实现的经验教训","authors":"Rosa R. Heckle","doi":"10.1145/1329112.1329115","DOIUrl":null,"url":null,"abstract":"Organizations, addressing the call for individual accountability and best practices in data security, are considering the use of a single sign-on (SSO) approach for authentication and password management. However, complexities are introduced when the technology is placed in context, particularly within a healthcare environment. The difficulty emerges in trying to fit authentication that is individually oriented into an environment that is collaborative in nature. As such, there are a multitude of forces exerting tensions on the design decisions and ultimately the adoption of the authentication mechanism. These decisions must address the innate conflict between the top-down organizational policy perspective and the workflow realities. It is the focus of this field study to identify and document these tradeoffs, the decisions made, their implications to the work environment, and ultimately the technology adoption.","PeriodicalId":403907,"journal":{"name":"Doctoral Consortium Papers of the 2007 ACM International Conference on Supporting Group Work","volume":"245 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Individual authentication in a collaborative environment: lessons from a single sign-on implementation\",\"authors\":\"Rosa R. Heckle\",\"doi\":\"10.1145/1329112.1329115\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Organizations, addressing the call for individual accountability and best practices in data security, are considering the use of a single sign-on (SSO) approach for authentication and password management. However, complexities are introduced when the technology is placed in context, particularly within a healthcare environment. The difficulty emerges in trying to fit authentication that is individually oriented into an environment that is collaborative in nature. As such, there are a multitude of forces exerting tensions on the design decisions and ultimately the adoption of the authentication mechanism. These decisions must address the innate conflict between the top-down organizational policy perspective and the workflow realities. It is the focus of this field study to identify and document these tradeoffs, the decisions made, their implications to the work environment, and ultimately the technology adoption.\",\"PeriodicalId\":403907,\"journal\":{\"name\":\"Doctoral Consortium Papers of the 2007 ACM International Conference on Supporting Group Work\",\"volume\":\"245 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-11-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Doctoral Consortium Papers of the 2007 ACM International Conference on Supporting Group Work\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1329112.1329115\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Doctoral Consortium Papers of the 2007 ACM International Conference on Supporting Group Work","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1329112.1329115","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Individual authentication in a collaborative environment: lessons from a single sign-on implementation
Organizations, addressing the call for individual accountability and best practices in data security, are considering the use of a single sign-on (SSO) approach for authentication and password management. However, complexities are introduced when the technology is placed in context, particularly within a healthcare environment. The difficulty emerges in trying to fit authentication that is individually oriented into an environment that is collaborative in nature. As such, there are a multitude of forces exerting tensions on the design decisions and ultimately the adoption of the authentication mechanism. These decisions must address the innate conflict between the top-down organizational policy perspective and the workflow realities. It is the focus of this field study to identify and document these tradeoffs, the decisions made, their implications to the work environment, and ultimately the technology adoption.