2020
DOI: 10.3390/info11060334
|View full text |Cite
|
Sign up to set email alerts
|

Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework

Abstract: Role-based access control (RBAC) continues to gain popularity in the management of authorization concerning access to knowledge assets in organizations. As a socio-technical concept, the notion of role in RBAC has been overemphasized, while very little attention is given to the precursors: role strain, role ambiguity, and role conflict. These constructs provide more significant insights into RBAC design in Knowledge Management Systems (KMS). KMS is the technology-based knowledge management tool used to acquire… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 82 publications
(96 reference statements)
0
1
0
Order By: Relevance
“…The Structural Equation Modeling (SEM) analysis reveals insightful relationships, notably the significant reduction of insider threats attributed to RBAC effectiveness, supporting hypothesis H1. This finding aligns with the literature emphasizing the strategic importance of access control mechanisms in mitigating such threats [24][28] [58]. The negative impact of implementation challenges on RBAC's effectiveness (H2) underscores the nuanced barriers organizations face, especially the administrative and technical hurdles that can diminish the system's efficacy.…”
Section: Discussionsupporting
confidence: 82%
See 4 more Smart Citations
“…The Structural Equation Modeling (SEM) analysis reveals insightful relationships, notably the significant reduction of insider threats attributed to RBAC effectiveness, supporting hypothesis H1. This finding aligns with the literature emphasizing the strategic importance of access control mechanisms in mitigating such threats [24][28] [58]. The negative impact of implementation challenges on RBAC's effectiveness (H2) underscores the nuanced barriers organizations face, especially the administrative and technical hurdles that can diminish the system's efficacy.…”
Section: Discussionsupporting
confidence: 82%
“…Permissions are access rights or privileges granted to roles, enabling them to perform certain operations. Sessions represent instances of users operating within the system under specific roles, effectively linking users to their roles temporarily [24]. User-role assignments include mappings between users and roles and determining which roles a user can assume in a session.…”
Section: Rbacmentioning
confidence: 99%
See 3 more Smart Citations