Javascript must be enabled to continue!
Comparative analysis of identity management, access control, and authorization practices in public and private universities
View through CrossRef
Background This research delves into the critical aspects of identity management, access control, and authorization practices within the domains of public and private universities. Identity management involves the meticulous management and control of user identities, encompassing the establishment and maintenance of user profiles, role assignments, and access privileges. Access control is the practice of defining and enforcing policies that govern who can access an IT system or application and which resources they can interact with. Authorization, meanwhile, determines the specific actions and privileges granted to users based on their roles and permissions. Methods To understand the variances in identity management and access control approaches, we conducted a comparative analysis between public and private universities. Our investigation scrutinized the user populations with access to university systems, the enforcement of access limitations, authentication methods, and password policies. Additionally, we examined the nuances of authorization processes, levels of authorization, access approval authorities, user status and role changes, unique user account management, account deletion procedures, user authentication methods, password complexity and expiration policies, password storage methods, and session termination policies. Results This study revealed that both public and private universities prioritize these security measures, with a common categorization of these processes. Nevertheless, there exist disparities, such as the inclusion of contractors and vendors in the user population at private universities, the manual deletion of user accounts in private institutions, and variations in password policies and storage methods. Private universities tend to enforce stricter password policies, employ more secure password storage methods, and implement automatic session termination features. Conclusions This research provides valuable insights into the practices and approaches adopted by public and private universities to safeguard their digital environments. The findings serve as a valuable resource for enhancing identity management, access control, and authorization protocols, enabling institutions to fortify their cybersecurity defenses in an ever-evolving threat landscape.
Title: Comparative analysis of identity management, access control, and authorization practices in public and private universities
Description:
Background This research delves into the critical aspects of identity management, access control, and authorization practices within the domains of public and private universities.
Identity management involves the meticulous management and control of user identities, encompassing the establishment and maintenance of user profiles, role assignments, and access privileges.
Access control is the practice of defining and enforcing policies that govern who can access an IT system or application and which resources they can interact with.
Authorization, meanwhile, determines the specific actions and privileges granted to users based on their roles and permissions.
Methods To understand the variances in identity management and access control approaches, we conducted a comparative analysis between public and private universities.
Our investigation scrutinized the user populations with access to university systems, the enforcement of access limitations, authentication methods, and password policies.
Additionally, we examined the nuances of authorization processes, levels of authorization, access approval authorities, user status and role changes, unique user account management, account deletion procedures, user authentication methods, password complexity and expiration policies, password storage methods, and session termination policies.
Results This study revealed that both public and private universities prioritize these security measures, with a common categorization of these processes.
Nevertheless, there exist disparities, such as the inclusion of contractors and vendors in the user population at private universities, the manual deletion of user accounts in private institutions, and variations in password policies and storage methods.
Private universities tend to enforce stricter password policies, employ more secure password storage methods, and implement automatic session termination features.
Conclusions This research provides valuable insights into the practices and approaches adopted by public and private universities to safeguard their digital environments.
The findings serve as a valuable resource for enhancing identity management, access control, and authorization protocols, enabling institutions to fortify their cybersecurity defenses in an ever-evolving threat landscape.
Related Results
Primerjalna književnost na prelomu tisočletja
Primerjalna književnost na prelomu tisočletja
In a comprehensive and at times critical manner, this volume seeks to shed light on the development of events in Western (i.e., European and North American) comparative literature ...
Assessing university performance and strategic paths in the presence of multiple objectives
Assessing university performance and strategic paths in the presence of multiple objectives
Competitiveness and excellence heavily rely on the capacity of regions to innovate and transfer knowledge from academic institutions to society. In a scenario where these values ac...
Predictors of Talent Retention among Academicians in Private Colleges and Universities in Yunnan Province
Predictors of Talent Retention among Academicians in Private Colleges and Universities in Yunnan Province
In the past few decades, private colleges and universities have made great progress in China and become indispensable to China's higher education system. In recent years, China's p...
HOW EFFICIENT ARE MALAYSIAN PUBLIC UNIVERSITIES? A COMPARATIVE ANALYSIS USING DATA ENVELOPMENT ANALYSIS
HOW EFFICIENT ARE MALAYSIAN PUBLIC UNIVERSITIES? A COMPARATIVE ANALYSIS USING DATA ENVELOPMENT ANALYSIS
This paper aims to examine the efficiency of Malaysian public universities in comparison with the private and foreign universities using Data Envelopment Analysis (DEA). The...
Seditious Spaces
Seditious Spaces
The title ‘Seditious Spaces’ is derived from one aspect of Britain’s colonial legacy in Malaysia (formerly Malaya): the Sedition Act 1948. While colonial rule may seem like it was ...
On the issue of public and private interest in the institute of public private partnership
On the issue of public and private interest in the institute of public private partnership
We consider some issues of correlation between the theory of public law and civil law in the aspect of legal regulation of relations in the sphere of public private partnership. We...
Filth, Incontinence and Border Protection
Filth, Incontinence and Border Protection
This paper investigates linkages between two apparently disparate government initiatives. Together they function symbolically to maintain Australia’s...
New Public Management in the Public Administration System
New Public Management in the Public Administration System
The purpose of the article is to study the concept of new management, clarify
the essence, goals and tasks of new public management as an approach to organizing
the activities of p...

