Not just the control side, but especially the risk side of identity
management enters a new stage with — the use of —
electronic media, i.e. digital information and communication
technology.
in:
Semiotics of identity management
Interdependency rules between an object’s security, a
sign’s accuracy (also read: precision or rigor) and an
interpretant’s relevance.
in:
Semiotics of identity management
Developing software that will operate in isolation has fast become
an exception. Increasingly, there is infrastructure for information
management, too. As a consequence, a particular development is mainly
‘about’ applying such infrastructure (which itself is also
developed as a consequence, and so on).
in:
On metapattern and other themes in information management