Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework
Abstract
:1. Introduction
2. Methods
3. Related Work
3.1. Knowledge Security in Organizations
3.2. Overview of the Technical RBAC
3.3. The Socio-Technical Perspectives of RBAC
3.3.1. RBAC as a Socialization Concept
3.3.2. The Status–Role Relationship
3.3.3. Expectations and Negotiations as Elements of RBAC
3.3.4. Dimensions of Roles
4. The Precursors of RBAC
4.1. Role Strain
4.2. Role Ambiguity
4.3. Role Conflict
5. Description of the Proposed Integrative Model
6. An Illustrative Case Study
Results and Discussion
7. Research Implications
- Study related to the nature of knowledge security in organizations
- Study related to the socio-technical perspective of RBAC in KMS environment
- Study related to the precursory RBAC factors
8. Conclusions
Author Contributions
Funding
Conflicts of Interest
Abbreviations
RBAC | Role-Based Access Control |
KMS | Knowledge Management System |
KM | Knowledge Management |
SoD | Separation of Duty |
IS | Information Systems |
IT | Information Technology |
RConf | Role conflict |
RAmbi | Role ambiguity |
SPSS | Package for the Social Sciences |
Appendix A
Role conflict I find conflicting roles of most employees to complicate RBAC design. I find conflicting tasks of most employees to complicate RBAC design. I find competing role demands of most employees to complicate RBAC design. Role ambiguity Incompatible jobs of most employees affect the design of RBAC Ambiguous roles of most employees make it difficult during RBAC design. Unclear role expectations of most employees are a challenge to RBAC design. Lack of adequate information about most employees’ roles affect RBAC design. Role strain Role strain leading to exhaustion, tension, and burden complicate RBAC design process. Most employees abuse access rights out of strain which further complicate RBAC design. Most employees are hard-pressed to meet all their role demands, which complicate RBAC design. RBAC design Role conflict, role ambiguity, and role strain complicate the overall design of RBAC. Conflicting roles, unclear role expectations, and tension to meet all role demands further complicate RBAC design. |
Note: A 5-point Likert type scale was used to measure all items and they were anchored 1 = strongly disagree to 5 = strongly agree. |
References
- Alavi, M.; Leidner, D.E. Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues. MIS Q. 2001, 27, 107–136. [Google Scholar] [CrossRef]
- Zhang, X. Knowledge Management System Use and Job Performance: A Multilevel Contingency Model. MIS Q. 2017, 41, 811–840. [Google Scholar] [CrossRef]
- Memon, N.; Daniels, T. Special issue on secure knowledge management. Inf. Syst. Front. 2007, 9, 449–450. [Google Scholar] [CrossRef]
- Ting, C.; Woon, I.M.Y.; Kankanhalli, A. Impact of Security Measures on the Usefulness of Knowledge Management Systems. In Pacific Asia Conference on Information Systems; NUS Publisher: Bangkok, Thailand, 7–10 July 2005; pp. 529–542. [Google Scholar]
- Safa, N.S.; Von Solms, R. An information security knowledge sharing model in organizations. Comput. Hum. Behav. 2016, 57, 442–451. [Google Scholar] [CrossRef]
- Rajabion, L.; Nazari, N.; Bandarchi, M.; Farashiani, A.; Haddad, S. Knowledge sharing mechanisms in virtual communities: A review of the current literature and recommendations for future research. Hum. Syst. Manag. 2019, 38, 347–355. [Google Scholar] [CrossRef]
- Ferraiolo, D.F.; Barkley, J.F.; Kuhn, D.R. A role-based access control model and reference implementation within a corporate intranet. ACM Trans. Inf. Syst. Secur. 1999, 2, 34–64. [Google Scholar] [CrossRef]
- Sandhu, R.S.; Coyne, E.J.; Feinstein, H.L.; Youman, C.E. Computer role-based access control models. Computer 1996, 29, 38–47. [Google Scholar] [CrossRef] [Green Version]
- Jahnke, I.; Ritterskamp, C.; Herrmann, T. Sociotechnical roles for sociotechnical systems—A perspective from social and computer sciences. In AAAI Fall Symposium—Technical Report; AAAI Press: Palo Alto, CA, USA, 2005. [Google Scholar]
- Ferraiolo, D.; Cugini, J.; Kuhn, D.R. Role-based access control (RBAC): Features and motivations. In Proceedings of the 11th Annual Computer Security Applications Conference, New Orleans, LA, USA, 11–15 December 1995. [Google Scholar]
- Abu Bakar, A.; Abdullah, R. A framework of secure KMS with RBAC implementation. ARPN J. Eng. Appl. Sci. 2015, 10, 1051–1059. [Google Scholar]
- Van Sell, M.; Brief, A.P.; Schuler, R.S. Role Conflict and Role Ambiguity: Integration of the Literature and Directions for Future Research. Hum. Relat. 1981, 34, 43–71. [Google Scholar] [CrossRef]
- Kabiri, S.; Hughes, W.; Schweber, L. Role conflict and role ambiguity in construction projects. In Proceedings of the 28th Annual Conference Association of Researchers in Construction Management (ARCOM 2012), Edinburgh, UK, 3–5 September 2012; pp. 727–736. [Google Scholar]
- Cai, W.; Huang, R.; Hou, X.; Wei, G.; Xiao, S.; Chen, Y. Atom-role-based access control model. IEICE Trans. Inf. Syst. 2012, 95, 908–1917. [Google Scholar] [CrossRef] [Green Version]
- Koch, M.; Mancini, L.V.; Parisi-Presicce, F. On the specification and evolution of access control policies. In Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies (SACMAT 2001), Chantilly, VA, USA, 3–4 May 2001; pp. 121–130. [Google Scholar] [CrossRef] [Green Version]
- Nonaka, I.; Toyama, R.; Konno, N. SECI, Ba and Leadership: A Unified Model of Dynamic Knowledge Creation. Long Range Plan. 2000, 33, 342000. [Google Scholar] [CrossRef]
- Morente-Molinera, J.A.; Pérez, I.J.; Ureña, M.R.; Herrera-Viedma, E. Creating knowledge databases for storing and sharing people knowledge automatically using group decision making and fuzzy ontologies. Inf. Sci. 2016, 328, 418–434. [Google Scholar] [CrossRef]
- Halawi, L.A.; Aronson, J.E.; McCarthy, R.V. Resource-Based View of Knowledge Management for Competitive Advantage in an organization. Electron. J. Knowl. Manag. 2005, 3, 75–86. [Google Scholar]
- Wiig, K.M. Knowledge-based systems and issues of integration: A commercial perspective. AI Soc. 1988, 2, 209–233. [Google Scholar] [CrossRef]
- Ferraiolo, D.F.; Sandhu, R.; Gavrila, S.; Kuhn, D.R.; Chandramouli, R. Proposed NIST Standard for Role-Based Access Control. ACM Trans. Inf. Syst. Secur. 2001, 4, 224–274. [Google Scholar] [CrossRef]
- Ogunseye, O.S.; Folorunso, O.; Zhang, J. Preventing Social Engineering and Espionage in Collaborative Knowledge Management Systems (KMSs). Int. J. E Adopt. 2011, 3, 108–116. [Google Scholar] [CrossRef] [Green Version]
- Gupta, A.; Kirkpatrick, M.S.; Bertino, E. A formal proximity model for RBAC systems. Comput. Secur. 2014, 41, 52–67. [Google Scholar] [CrossRef]
- Alavi, M.; Tiwana, A. Knowledge integration in virtual teams: The potential role of KMS. J. Am. Soc. Inf. Sci. Technol. 2002, 53, 1029–1037. [Google Scholar] [CrossRef]
- Nonaka, I.; Takeuchi, H. Knowledge-Creating Company, 1st ed.; Oxford University Press: Oxford, UK; New York, NY, USA, 1995. [Google Scholar]
- Khalifa, M.; Yu, A.Y.; Shen, K.N. Knowledge management systems success: A contingency perspective. J. Knowl. Manag. 2013, 12, 119–132. [Google Scholar] [CrossRef]
- Sandhu, R.S. Role-based Access Control. Adv. Comput. 1998, 46, 237–286. [Google Scholar] [CrossRef]
- Ferraiolo, D.F.; Kuhn, D.R. Role-Base Access Controls. In Proceedings of the 15th National Computer Security Conference, Baltimore, MD, USA, 13–16 October 1992. [Google Scholar]
- Xia, L.; Jing, J. Administrative model for role-based access control using hierarchical namespace. J. Comput. Res. Dev. 2007, 44, 181–188. [Google Scholar] [CrossRef] [Green Version]
- Li, Q.; Xu, M.; Zhang, X. Towards a group-based RBAC model and decentralized user-role administration. In Proceedings of the International Conference on Distributed Computing Systems, Beijing, China, 17–20 June 2008; pp. 441–446. [Google Scholar]
- Li, D.; Liu, C.; Liu, B. H-RBAC: A Hierarchical Access Control Model for SaaS Systems. Int. J. Mod. Educ. Comput. Sci. 2011, 3, 47–53. [Google Scholar] [CrossRef] [Green Version]
- Moffett, J.D.; Sloman, M.S. The representation of policies as system objects. ACM SIGOIS Bull. 1991, 12, 171–184. [Google Scholar] [CrossRef] [Green Version]
- McIntyre, L.J. The Practical Skeptic: Core Concepts in Sociology, 5th ed.; Psychological Science; McGraw-Hill Companies: Columbus, OH, USA, 2014. [Google Scholar]
- Fang, R.; Duffy, M.K.; Shaw, J.D. The organizational socialization process: Review and development of a social capital model. J. Manag. 2011, 37, 127–152. [Google Scholar] [CrossRef]
- Sallee, M.W. The Ideal Worker or the Ideal Father: Organizational Structures and Culture in the Gendered University. Res. High. Educ. 2012, 53, 782–802. [Google Scholar] [CrossRef]
- Flockhart, T. Complex socialization: A framework for the study of state socialization. Eur. J. Int. Relat. 2006, 12, 89–118. [Google Scholar] [CrossRef]
- Abel, T.; Mead, G.H.; Morris, C.W. Mind, Self, and Society. Am. J. Psychol. 1936, 48, 541. [Google Scholar] [CrossRef]
- Rizzo, J.R.; House, R.J.; Lirtzman, S.I. Role Conflict and Ambiguity in Complex Organizations. Adm. Sci. Q. 1970, 15, 150–163. [Google Scholar] [CrossRef]
- Marsden, P.V.; Kalleberg, A.L.; Cook, C.R. Gender Differences in Organizational Commitment: Influences of Work Positions and Family Roles. Work Occup. 1993, 20, 368–390. [Google Scholar] [CrossRef]
- Rogers, D.L.; Molnar, J. Organizational Antecedents of Role Conflict and Ambiguity in Top-Level Administrators. Adm. Sci. Q. 1976, 21, 598–610. [Google Scholar] [CrossRef]
- Parsons, T. The Kinship System of the Contemporary United States. Am. Anthropol. 1943, 45, 22–38. [Google Scholar] [CrossRef] [Green Version]
- Akram, M.U.; Chauhan, C.; Ghosh, K.; Singh, A. Knowledge management, sustainable business performance and empowering leadership: A firm-level approach. Int. J. Knowl. Manag. 2019, 15, 20–35. [Google Scholar] [CrossRef]
- Merton, R.K. The Role-Set: Problems in Sociological Theory. Br. J. Sociol. 1957, 8, 106–120. [Google Scholar] [CrossRef]
- Sharabi, M. The meaning of work dimensions according to organizational status: Does gender matter? Empl. Relat. 2017, 39, 643–659. [Google Scholar] [CrossRef]
- Scott, J. Status and Role: Structural Aspects. In International Encyclopedia of the Social & Behavioral Sciences, 2nd ed.; Elsevier: New York, NY, USA, 2015; pp. 435–439. [Google Scholar]
- Robertson, R.; Biddle, B.J.; Thomas, E.J. Role Theory, Concepts and Research. Br. J. Sociol. 1966, 17, 442–443. [Google Scholar] [CrossRef]
- Rigopoulou, I.; Theodosiou, M.; Katsikea, E.; Perdikis, N. Information control, role perceptions, and work outcomes of boundary-spanning frontline managers. J. Bus. Res. 2012, 65, 626–633. [Google Scholar] [CrossRef]
- Chen, H.C. A negotiation-based cooperative RBAC scheme. Int. J. Web Grid Serv. 2017, 13, 94–111. [Google Scholar] [CrossRef]
- Michel, J.S.; Mitchelson, J.K.; Pichler, S.; Cullen, K.L. Clarifying relationships among work and family social support, stressors, and work-family conflict. J. Vocat. Behav. 2010, 76, 91–104. [Google Scholar] [CrossRef]
- Bloombaum, M.; Goffman, E. Encounters: Two Studies in the Sociology of Interaction. Am. J. Psychol. 1964, 77, 347. [Google Scholar] [CrossRef] [Green Version]
- St. Rose, V. An Empirical Study of the Characteristics of the Role Based Access Control (RBAC) Model in Securing Knowledge Management (KM) and Knowledge Management Systems (KMS). Ph.D. Thesis, Colorado Technical University, Colorado Springs, CO, USA, 2015. [Google Scholar]
- Muniraman, C.; Damodaran, M.; Ryan, A. Security and Privacy Issues in a Knowledge Management System. In Proceedings of the 6th Annual Security Conference, Las Vegas, NV, USA, 11–12 April 2007. [Google Scholar]
- Jennex, M.E.; Zyngier, S. Security as a contributor to knowledge management success. Inf. Syst. Front. 2007, 9, 493–504. [Google Scholar] [CrossRef]
- Li, Z.; Liu, X.; Wang, W.M.; Vatankhah Barenji, A.; Huang, G.Q. CKshare: Secured cloud-based knowledge-sharing blockchain for injection mold redesign. Enterp. Inf. Syst. 2019, 13, 1–33. [Google Scholar] [CrossRef]
- Lee, J.; Upadhyaya, S.J.; Rao, H.R.; Sharman, R. Secure knowledge management and the semantic web. Commun. ACM 2006, 48, 48–54. [Google Scholar] [CrossRef]
- Cruz, J.P.; Kaji, Y.; Yanai, N. RBAC-SC: Role-based access control using smart contract. IEEE Access 2018, 6, 12240–12251. [Google Scholar] [CrossRef]
- Nyame, G.; Qin, Z.; Agyekum, K.O.O.; Sifah, E.B. An ECDSA Approach to Access Control in Knowledge Management Systems Using Blockchain. Information 2020, 11, 111–126. [Google Scholar] [CrossRef] [Green Version]
- Linton, R. The Study of Man: An introduction, 1st ed.; The Century Social Science Series; D. Appleton and Co.: New York, NY, USA, 1936. [Google Scholar]
- Schrag, C.; Parsons, T.; Shils, E.A.; Tolman, E.C.; Allport, G.W.; Kluckhohn, C.; Murray, H.A.; Sears, R.R.; Sheldon, R.C.; Stouff, S.A. Toward a General Theory of Action. Am. Sociol. Rev. 1952, 49, 636–642. [Google Scholar] [CrossRef]
- Turner, R.H.; Biddle, B.J. Role Theory: Expectations, Identities, and Behaviors. Contemp. Sociol. 1981, 60, 1224–1226. [Google Scholar] [CrossRef]
- Leifer, E.M.; Burt, R.S. Toward a Structural Theory of Action: Network Models of Social Structure, Perception, and Action. Soc. Forces 1985, 63, 858–860. [Google Scholar] [CrossRef]
- Turner, R.H.; Bates, F.L.; Harvey, C.C. The Structure of Social Systems. Soc. Forces 1976, 55, 531–532. [Google Scholar] [CrossRef]
- Stryker, S.; Statham, A. Symbolic Interaction and Role Theory. In Symbolic Interactionism; Springer: Boston, MA, USA, 1977. [Google Scholar]
- Hilbert, R.A.; Zurcher, L.A. Social Roles: Conformity, Conflict, and Creativity. Contemp. Sociol. 1984, 13, 522–534. [Google Scholar] [CrossRef]
- Winship, C.; Mandel, M. Roles and Positions: A Critique and Extension of the Blockmodeling Approach. Sociol. Methodol. 1983, 14, 314–344. [Google Scholar] [CrossRef]
- Biddle, B. Recent Developments in Role Theory. Annu. Rev. Sociol. 1986, 12, 67–92. [Google Scholar] [CrossRef]
- Burt, R.S. Positions in networks. Soc. Forces 1976, 55, 93–122. [Google Scholar] [CrossRef]
- Mandel, M. Local roles and social networks. Am. Sociol. Rev. 1983, 48, 376–386. [Google Scholar] [CrossRef]
- Halpin, A.W.; Gross, N.; Mason, W.S.; McEachern, A.W. Explorations in Role Analysis: Studies of the School Superintendency Role. Adm. Sci. Q. 1959, 73, 635–637. [Google Scholar] [CrossRef]
- Levinson, H.; Kahn, R.L.; Wolfe, D.M.; Quinn, R.P.; Snoek, J.D.; Rosenthal, R.A. Organizational Stress: Studies in Role Conflict and Ambiguity. Am. Sociol. Rev. 1965, 30, 620–630. [Google Scholar] [CrossRef]
- Blake, R.R.; Moreno, J.L. Who Shall Survive? Sociometry 1954, 17, 77–91. [Google Scholar] [CrossRef]
- Turner, R.H. Strategy for Developing an Integrated Role Theory. Humboldt J. Soc. Relat. 1979, 7, 123–139. [Google Scholar]
- Nicholson, N.; Allen, V.L.; van de Vliert, E. Role Transitions: Explorations and Explanations. Adm. Sci. Q. 1985, 30, 448–460. [Google Scholar] [CrossRef]
- Eatough, E.M.; Chang, C.H.; Miloslavic, S.A.; Johnson, R.E. Relationships of role stressors with organizational citizenship behavior: A meta-analysis. J. Appl. Psychol. 2011, 96, 619–632. [Google Scholar] [CrossRef]
- Stryker, S.; Macke, A.S. Status Inconsistency and Role Conflict. Annu. Rev. Sociol. 1978, 4, 57–90. [Google Scholar] [CrossRef]
- Goode, W.J. A Theory of Role Strain. Am. Sociol. Rev. 2006, 25, 483–496. [Google Scholar] [CrossRef]
- Akgunduz, Y. The influence of self-esteem and role stress on job performance in hotel businesses. Int. J. Contemp. Hosp. Manag. 2015, 27, 1082–1099. [Google Scholar] [CrossRef]
- Gordon, J.R.; Pruchno, R.A.; Wilson-Genderson, M.; Murphy, W.M.; Rose, M. Balancing Caregiving and Work: Role Conflict and Role Strain Dynamics. J. Fam. Issues 2012, 33, 662–689. [Google Scholar] [CrossRef] [PubMed]
- Aziz, M. Organizational Stress: A Review and Critique of Theory, Research, and Applications. J. Decis. Mak. 2003, 28, 89–103. [Google Scholar]
- Sieber, S.D. Toward a Theory of Role Accumulation. Am. Sociol. Rev. 1974, 39, 567–578. [Google Scholar] [CrossRef]
- Sun, W.; Su, H.; Liu, H. Role-engineering optimization with cardinality constraints and user-oriented mutually exclusive constraints. Information 2019, 10, 342. [Google Scholar] [CrossRef] [Green Version]
- Barton, R.; Corban, A.; Herrli-Warner, L.; McClain, E.; Riehle, D.; Tinner, E. Role strain in occupational therapy fieldwork educators. Work 2013, 44, 317–328. [Google Scholar] [CrossRef]
- Hackman, J.R.; Katz, D.; Kahn, R.L. The Social Psychology of Organizations. Adm. Sci. Q. 1979, 24, 495–500. [Google Scholar] [CrossRef]
- Schuler, R.S.; Aldag, R.J.; Brief, A.P. Role conflict and ambiguity: A scale analysis. Organ. Behav. Hum. Perform. 1977, 20, 111–128. [Google Scholar] [CrossRef]
- Colantonio, A.; Di Pietro, R.; Ocello, A. Role Mining in Business: Taming Role-Based Access Control Administration; World Scientific Publishing Co. Plc. Ltd.: Singapore, 2012. [Google Scholar]
- Kahn, R.L.; Wolfe, D.M.; Quinn, R.P.; Snoek, J.D.; Rosenthal, R.A. Conflict and ambiguity: Studies in organizational roles and individual stress. Int. J. Stress Manag. 1964, 1, 309–322. [Google Scholar]
- Kozák, A.; Krajcsák, Z. Retaining the rookie—Role clarification through mentorship. Hum. Syst. Manag. 2018, 37, 95–103. [Google Scholar] [CrossRef]
- Pang, C.; Hansen, D.; Maeder, A. Managing RBAC states with transitive relations. In Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS ’07, Singapore, 20–22 March 2007; pp. 139–148. [Google Scholar] [CrossRef] [Green Version]
- Bowling, N.A.; Khazon, S.; Alarcon, G.M.; Blackmore, C.E.; Bragg, C.B.; Hoepf, M.R.; Barelka, A.; Kennedy, K.; Wang, Q.; Li, H. Building better measures of role ambiguity and role conflict: The validation of new role stressor scales. Work Stress 2017, 31, 1–23. [Google Scholar] [CrossRef]
- Nunnally, J.; Bernstein, I. Psychometric Theory, 3rd ed.; McGraw-Hill: New York, NY, USA, 1994. [Google Scholar]
- Ayyagari, R.; Grover, V.; Purvis, R. Technostress: Technological antecedents and implications. MIS Q. Manag. Inf. Syst. 2011, 35, 831–858. [Google Scholar] [CrossRef] [Green Version]
- Ipe, M. Knowledge Sharing in Organizations: A Conceptual Framework. Hum. Resour. Dev. Rev. 2003, 2, 337–359. [Google Scholar] [CrossRef]
- Venkitachalam, K.; Bosua, R. Roles enabling the mobilization of organizational knowledge. J. Knowl. Manag. 2014, 18, 396–410. [Google Scholar] [CrossRef]
- Yan, D.; Huang, J.; Tian, Y.; Zhao, Y.; Yang, F. Policy conflict detection in composite Web services with RBAC. In Proceedings of the 2014 IEEE International Conference on Web Services (ICWS 2014), Anchorage, AK, USA, 27 June–2 July 2014; pp. 534–541. [Google Scholar]
- Frank, M.; Basin, D.; Buhmann, J.M. A class of probabilistic models for role engineering. In Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 27–31 October 2008; pp. 299–309. [Google Scholar]
Perspective | Subjective Role Context | Social Focus/Definition | Study |
---|---|---|---|
Functionalism | Characteristic behaviors (consensus, conformity, role-taking without sophistication) | “role” | [57,58] |
Normative expectations prescribing and explaining behaviors | |||
Role players as mere participants in a social system | [59,60] | ||
Roles may or may not be associated with functions | [61] | ||
Symbolic interactionism | (conformity, role-taking without sophistication) | Roles evolve through social interaction | [36] |
Relationships among roles or expectations | [62,63] | ||
Structuralism | Parts to play in society (conformity, role conflict, role-taking with sophistication) | “Status” | [64] [65] [60,66]; [67] |
Generators of roles through human actors, and actors’ conformity to norms including others | |||
Structured role relationships and social environment | |||
A collection of social positions, statuses or structures | [61] | ||
Arguments mostly in mathematical symbols | [65] | ||
Organizational | (conformity, role conflict, role-taking with sophistication) | “Hierarchical” | [68,69] |
Task-orientation and predefinition | |||
Role conflict and resolution | |||
Cognitive role theory | Scripts for social conduct (conformity, role conflict, role-taking without sophistication) | “Expectations” (norms, beliefs, attitudes, etc.) | [61,63] |
A set of norms organized about a function—role-playing | [61,70] | ||
A comprehensive pattern for behavior and attitude | [71] | ||
Normative expectations associated with a position | [72] | ||
Social conditions leading to expectations |
Demographic Variable | Frequency | Percent (%) |
---|---|---|
Gender | ||
Male | 11 | 17.46 |
Female | 52 | 82.54 |
Work experience | ||
10 years or more | 0 | 0.00 |
7 to 9 years | 6 | 9.52 |
4 to 6 years | 20 | 31.75 |
1 to 3 years | 28 | 44.44 |
Less than 1 year | 9 | 14.29 |
Position | ||
Network administrator | 11 | 17.46 |
Principal research assistant | 4 | 6.35 |
Chief knowledge officer | 1 | 1.59 |
Forum specialist | 10 | 15.87 |
IT service assistant | 14 | 22.22 |
Systems administrator | 7 | 11.11 |
User support technician | 6 | 9.52 |
Senior IT service technician | 7 | 11.11 |
Knowledge editor | 2 | 3.18 |
IT service clerk | 1 | 1.59 |
Academic qualification | ||
Doctoral degree | 1 | 1.59 |
Masters degree | 23 | 36.51 |
Undergraduate degree | 35 | 55.56 |
Diploma | 1 | 1.59 |
HND | 3 | 4.75 |
High school | 0 | 0.00 |
Regression Model | Sum of Squares | df | Mean Square | F | Sig. | |
---|---|---|---|---|---|---|
1 | Regression | 27.717 | 3 | 9.239 | 15.929 | 0.000 |
Residual | 34.220 | 59 | 0.580 | |||
Total | 61.937 | 62 |
Variable | N | Mean | Median | Std. Dev. | |
---|---|---|---|---|---|
Role Conflict | I find conflicting roles of most employees to complicate RBAC design. | 63 | 3.89 | 4 | 1.074 |
I find conflicting tasks of most employees to complicate RBAC design. | 63 | 4.09 | 4 | 0.804 | |
I find competing role demands of most employees to complicate RBAC design. | 63 | 3.96 | 4 | 0.895 | |
Role ambiguity | Incompatible jobs of most employees affect the design of RBAC | 63 | 3.95 | 4 | 0.862 |
Ambiguous roles of most employees make it difficult during RBAC design. | 63 | 3.82 | 4 | 0.909 | |
Unclear role expectations of most employees are a challenge to RBAC design. | 63 | 3.91 | 4 | 0.954 | |
Lack of adequate information about most employees’ roles affect RBAC design. | 63 | 3.8 | 4 | 0.971 | |
Role Strain | Role strain leading to exhaustion, tension, and burden complicate RBAC design process. | 63 | 4.28 | 4 | 0.716 |
Most employees abuse access rights out of strain which further complicate RBAC design. | 63 | 3.99 | 4 | 0.935 | |
Most employees are hard-pressed to meet all their role demands, which complicate RBAC design. | 63 | 4.05 | 4 | 0.824 | |
RBAC design | Role conflict, role ambiguity, and role strain complicate the overall design of RBAC. | 63 | 4.12 | 4 | 0.991 |
Conflicting roles, unclear role expectations, and tension to meet all role demands further complicate RBAC design. | 63 | 3.94 | 4 | 1.007 |
Regression Model | R | R Square | Adjusted R Square | Std. Error of the Estimate | R Square | F-value | df1 | df2 | Sig. F |
---|---|---|---|---|---|---|---|---|---|
RBAC design | 0.669 | 0.448 | 0.419 | 0.762 | 0.448 | 15.929 | 3 | 59 | 0.000 |
Variable | Descriptive Mean | Statistics Std. | Correlations (n = 63) RBAC Design | Unstandardized Coefficients B | Standardized Coefficients Beta |
---|---|---|---|---|---|
RBAC design | 4.03 | 0.999 | |||
RConf | 3.98 | 0.924 | 0.542 *** | 0.401 ** | 0.371 |
RAmbi | 3.87 | 0.924 | 0.511 *** | 0.303 * | 0.280 |
RStrn | 4.11 | 0.825 | 0.465 *** | 0.270 * | 0.223 |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Nyame, G.; Qin, Z. Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework. Information 2020, 11, 334. https://doi.org/10.3390/info11060334
Nyame G, Qin Z. Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework. Information. 2020; 11(6):334. https://doi.org/10.3390/info11060334
Chicago/Turabian StyleNyame, Gabriel, and Zhiguang Qin. 2020. "Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework" Information 11, no. 6: 334. https://doi.org/10.3390/info11060334
APA StyleNyame, G., & Qin, Z. (2020). Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework. Information, 11(6), 334. https://doi.org/10.3390/info11060334