--- res: bibo_abstract: - 'Nowadays, providing employees with failure-free access to various systems, applications and services is a crucial factor for organizations? success as disturbances potentially inhibit smooth workflows and thereby harm productivity. However, it is a challenging task to assign access rights to employees? accounts within a satisfying time frame. In addition, the management of multiple accounts and identities can be very onerous and time consuming for the responsible administrator and therefore expensive for the organization. In order to meet these challenges, firms decide to invest in introducing an Identity and Access Management System (IAMS) that supports the organization by using policies to assign permissions to accounts, groups, and roles. In practice, since various versions of IAMSs exist, it is a challenging task to decide upon introduction of an IAMS. The following study proposes a first attempt of a decision support model for practitioners which considers four alternatives: Introduction of an IAMS with Role-based Access Control RBAC) or without and no introduction of IAMS again with or without RBAC. To underpin the practical applicability of the proposed model, we parametrize and operationalize it based on a real world use case using input from an expert interview.@eng' bibo_authorlist: - foaf_Person: foaf_givenName: Eva foaf_name: Weishäupl, Eva foaf_surname: Weishäupl - foaf_Person: foaf_givenName: Michael foaf_name: Kunz, Michael foaf_surname: Kunz - foaf_Person: foaf_givenName: Emrah foaf_name: Yasasin, Emrah foaf_surname: Yasasin - foaf_Person: foaf_givenName: Gerit foaf_name: Wagner, Gerit foaf_surname: Wagner - foaf_Person: foaf_givenName: Julian foaf_name: Prester, Julian foaf_surname: Prester - foaf_Person: foaf_givenName: Guido foaf_name: Schryen, Guido foaf_surname: Schryen foaf_workInfoHomepage: http://www.librecat.org/personId=72850 - foaf_Person: foaf_givenName: Günther foaf_name: Pernul, Günther foaf_surname: Pernul dct_date: 2015^xs_gYear dct_language: eng dct_subject: - Identity and Access Management - Economic Decision Making - Information Systems - Information Security Investment - Decision Theory dct_title: Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory@ ...