SlideShare ist ein Scribd-Unternehmen logo
1 von 34
JISC Conference 2008: Enabling Innovation 15 April 2008, ICC Birmingham Joint Information Systems Committee Supporting education and research
JISC Conference 2008 Identity Matters 11.15 – 12.15 Hall 11b 02/06/09   |  Supporting education and research  |  Slide
JISC Conference 2008 PLEASE SWITCH YOUR MOBILE PHONE TO SILENT Conference tag:  jiscconference08 02/06/09   |  Supporting education and research  |  Slide
Identity Matters Session Chair James Farnhill Programme Manager (e-Research), JISC 02/06/09   |  Supporting education and research  |  Slide
[object Object],[object Object],[object Object],[object Object],[object Object]
People ,[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object]
Identity Matters Rhys Smith Engineering Consultant: Identity & Access Management, Cardiff University 02/06/09   |  Supporting education and research  |  Slide
Survey ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dealing with Identity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IDM systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implementing IDM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implementing IDM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implementing IDM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity Matters John Paschoud Projects Manager, LSE Library 02/06/09   |  Supporting education and research  |  Slide
The Identity Project Audits ,[object Object],[object Object],[object Object],[object Object],[object Object]
Why do an Institutional IdM Audit? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Important Pre-requisites ,[object Object],[object Object],[object Object],[object Object]
Steps ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Preparation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IdM Discovery ,[object Object],[object Object],[object Object],[object Object],[object Object]
IdM Process Investigations ,[object Object],[object Object],[object Object],[object Object],[object Object]
IdM Analysis (a suggested structure) #1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IdM Analysis (a suggested structure) #2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Where do I find the Identity Project Audit Guide? ,[object Object],[object Object]
Identity Matters James Farnhill Programme Manager (e-Research), JISC 02/06/09   |  Supporting education and research  |  Slide
Futures Overview Raise Awareness Build  Capacity Provide  Resources Future Identity Work
Raising Awareness ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Building Capacity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Building Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions? ,[object Object]
Identity Resources ,[object Object],[object Object],[object Object]
Identity Matters ,[object Object],[object Object],[object Object],[object Object]
JISC Conference 2008: Enabling Innovation 15 April 2008, ICC Birmingham Joint Information Systems Committee Supporting education and research

Weitere ähnliche Inhalte

Was ist angesagt?

The Unique Challenges Facing the IT Professional in K12 Education
The Unique Challenges Facing the IT Professional in K12 EducationThe Unique Challenges Facing the IT Professional in K12 Education
The Unique Challenges Facing the IT Professional in K12 EducationNicholas Mirisis
 
Potential Issues within BCE
Potential Issues within BCEPotential Issues within BCE
Potential Issues within BCEJISC BCE
 
Higher Education Portal Assessment White Paper
Higher Education Portal Assessment White PaperHigher Education Portal Assessment White Paper
Higher Education Portal Assessment White PaperKathleen Long
 
The role of social technologies in marketing practice and in education
The role of social technologies in marketing practice and in education The role of social technologies in marketing practice and in education
The role of social technologies in marketing practice and in education Lisa Harris
 
Who Owns Faculty Data?: Fairness and transparency in UCLA's new academic HR s...
Who Owns Faculty Data?: Fairness and transparency in UCLA's new academic HR s...Who Owns Faculty Data?: Fairness and transparency in UCLA's new academic HR s...
Who Owns Faculty Data?: Fairness and transparency in UCLA's new academic HR s...chloejreynolds
 
The infotention network story 03132012
The infotention network story 03132012The infotention network story 03132012
The infotention network story 03132012Douglas Breitbart
 
Universities and social networking: making sense out of nonsense
Universities and social networking: making sense out of nonsenseUniversities and social networking: making sense out of nonsense
Universities and social networking: making sense out of nonsenseEduserv Foundation
 
Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Nick Davis
 
Working with Private sector 04 07 Final
Working with Private sector 04 07 FinalWorking with Private sector 04 07 Final
Working with Private sector 04 07 FinalKurt Moore
 
WeSpline invdeck_oct2018
WeSpline invdeck_oct2018WeSpline invdeck_oct2018
WeSpline invdeck_oct2018Fernanda Torós
 
Change process project
Change process projectChange process project
Change process projectKaren Pilarski
 
How banks reinvent themselves through enterprise systems
How banks reinvent themselves through enterprise systemsHow banks reinvent themselves through enterprise systems
How banks reinvent themselves through enterprise systemsProf. Dr. Alexander Maedche
 
Martin Dudziak SME DD BDA Resume June2012
Martin Dudziak SME  DD BDA Resume June2012Martin Dudziak SME  DD BDA Resume June2012
Martin Dudziak SME DD BDA Resume June2012martindudziak
 
WeSpline Investment Deck
WeSpline Investment DeckWeSpline Investment Deck
WeSpline Investment DeckFernanda Torós
 
Integrated technology-vision-planning
Integrated technology-vision-planningIntegrated technology-vision-planning
Integrated technology-vision-planningVanderbilt University
 
II-SDV 2012 Patent Prior-Art Searching with Latent Semantic Analysis
II-SDV 2012 Patent Prior-Art Searching with Latent Semantic AnalysisII-SDV 2012 Patent Prior-Art Searching with Latent Semantic Analysis
II-SDV 2012 Patent Prior-Art Searching with Latent Semantic AnalysisDr. Haxel Consult
 

Was ist angesagt? (19)

The Unique Challenges Facing the IT Professional in K12 Education
The Unique Challenges Facing the IT Professional in K12 EducationThe Unique Challenges Facing the IT Professional in K12 Education
The Unique Challenges Facing the IT Professional in K12 Education
 
Potential Issues within BCE
Potential Issues within BCEPotential Issues within BCE
Potential Issues within BCE
 
Higher Education Portal Assessment White Paper
Higher Education Portal Assessment White PaperHigher Education Portal Assessment White Paper
Higher Education Portal Assessment White Paper
 
The role of social technologies in marketing practice and in education
The role of social technologies in marketing practice and in education The role of social technologies in marketing practice and in education
The role of social technologies in marketing practice and in education
 
Who Owns Faculty Data?: Fairness and transparency in UCLA's new academic HR s...
Who Owns Faculty Data?: Fairness and transparency in UCLA's new academic HR s...Who Owns Faculty Data?: Fairness and transparency in UCLA's new academic HR s...
Who Owns Faculty Data?: Fairness and transparency in UCLA's new academic HR s...
 
The infotention network story 03132012
The infotention network story 03132012The infotention network story 03132012
The infotention network story 03132012
 
Universities and social networking: making sense out of nonsense
Universities and social networking: making sense out of nonsenseUniversities and social networking: making sense out of nonsense
Universities and social networking: making sense out of nonsense
 
Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5
 
Working with Private sector 04 07 Final
Working with Private sector 04 07 FinalWorking with Private sector 04 07 Final
Working with Private sector 04 07 Final
 
WeSpline invdeck_oct2018
WeSpline invdeck_oct2018WeSpline invdeck_oct2018
WeSpline invdeck_oct2018
 
Change process project
Change process projectChange process project
Change process project
 
How banks reinvent themselves through enterprise systems
How banks reinvent themselves through enterprise systemsHow banks reinvent themselves through enterprise systems
How banks reinvent themselves through enterprise systems
 
Digital Proctor Whitepaper #1
Digital Proctor Whitepaper #1Digital Proctor Whitepaper #1
Digital Proctor Whitepaper #1
 
Martin Dudziak SME DD BDA Resume June2012
Martin Dudziak SME  DD BDA Resume June2012Martin Dudziak SME  DD BDA Resume June2012
Martin Dudziak SME DD BDA Resume June2012
 
WeSpline Investment Deck
WeSpline Investment DeckWeSpline Investment Deck
WeSpline Investment Deck
 
Integrated technology-vision-planning
Integrated technology-vision-planningIntegrated technology-vision-planning
Integrated technology-vision-planning
 
II-SDV 2012 Patent Prior-Art Searching with Latent Semantic Analysis
II-SDV 2012 Patent Prior-Art Searching with Latent Semantic AnalysisII-SDV 2012 Patent Prior-Art Searching with Latent Semantic Analysis
II-SDV 2012 Patent Prior-Art Searching with Latent Semantic Analysis
 
Exploring Enterprise Mobility
Exploring Enterprise MobilityExploring Enterprise Mobility
Exploring Enterprise Mobility
 
OILS 513, Module 05: Knowledge Management
OILS 513, Module 05: Knowledge ManagementOILS 513, Module 05: Knowledge Management
OILS 513, Module 05: Knowledge Management
 

Ähnlich wie JISC Conference 2008 Identity Session

Federated Access Management: the Business Case
Federated Access Management: the Business CaseFederated Access Management: the Business Case
Federated Access Management: the Business CaseJISC.AM
 
vanZylKrsek2007-02-23-1
vanZylKrsek2007-02-23-1vanZylKrsek2007-02-23-1
vanZylKrsek2007-02-23-1Jay van Zyl
 
Identifying the Identity Managers
Identifying the Identity ManagersIdentifying the Identity Managers
Identifying the Identity ManagersJISC Netskills
 
[MU630] 004. Business Intelligence & Decision Support
[MU630] 004. Business Intelligence & Decision Support[MU630] 004. Business Intelligence & Decision Support
[MU630] 004. Business Intelligence & Decision SupportAriantoMuditomo
 
Chris Vanderweylan
Chris VanderweylanChris Vanderweylan
Chris Vanderweylanozewai
 
A Path Model Why-What-How-When To Implement An IC Reporting
A Path Model  Why-What-How-When  To Implement An IC ReportingA Path Model  Why-What-How-When  To Implement An IC Reporting
A Path Model Why-What-How-When To Implement An IC ReportingEmma Burke
 
Full Paper: Analytics: Key to go from generating big data to deriving busines...
Full Paper: Analytics: Key to go from generating big data to deriving busines...Full Paper: Analytics: Key to go from generating big data to deriving busines...
Full Paper: Analytics: Key to go from generating big data to deriving busines...Piyush Malik
 
Extending Access Management into BCE - Scoping Study
Extending Access Management into BCE - Scoping StudyExtending Access Management into BCE - Scoping Study
Extending Access Management into BCE - Scoping StudyJISC BCE
 
Poster ECIS 2016
Poster ECIS 2016Poster ECIS 2016
Poster ECIS 2016Rui Silva
 
Project Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docxProject Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docxstilliegeorgiana
 
Competitive Intelligence
Competitive IntelligenceCompetitive Intelligence
Competitive IntelligenceElijah Ezendu
 
Innovative Technologies And Software For Higher Education...
Innovative Technologies And Software For Higher Education...Innovative Technologies And Software For Higher Education...
Innovative Technologies And Software For Higher Education...Robin Anderson
 
Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020Joanne Luciano
 
Symposium 2010 Gnaedinger Managing (And Leveraging) Information) (3)
Symposium 2010    Gnaedinger Managing (And Leveraging) Information) (3)Symposium 2010    Gnaedinger Managing (And Leveraging) Information) (3)
Symposium 2010 Gnaedinger Managing (And Leveraging) Information) (3)robgnaedinger
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docxrtodd599
 
We spline invdeck_may2018
We spline invdeck_may2018We spline invdeck_may2018
We spline invdeck_may2018Fernanda Torós
 
HEI risks & challenges.pdf
HEI risks & challenges.pdfHEI risks & challenges.pdf
HEI risks & challenges.pdfmirmouzamali1
 

Ähnlich wie JISC Conference 2008 Identity Session (20)

Federated Access Management: the Business Case
Federated Access Management: the Business CaseFederated Access Management: the Business Case
Federated Access Management: the Business Case
 
vanZylKrsek2007-02-23-1
vanZylKrsek2007-02-23-1vanZylKrsek2007-02-23-1
vanZylKrsek2007-02-23-1
 
Identifying the Identity Managers
Identifying the Identity ManagersIdentifying the Identity Managers
Identifying the Identity Managers
 
ALFRED_MUTANGA_CABIF
ALFRED_MUTANGA_CABIFALFRED_MUTANGA_CABIF
ALFRED_MUTANGA_CABIF
 
[MU630] 004. Business Intelligence & Decision Support
[MU630] 004. Business Intelligence & Decision Support[MU630] 004. Business Intelligence & Decision Support
[MU630] 004. Business Intelligence & Decision Support
 
Chris Vanderweylan
Chris VanderweylanChris Vanderweylan
Chris Vanderweylan
 
A Path Model Why-What-How-When To Implement An IC Reporting
A Path Model  Why-What-How-When  To Implement An IC ReportingA Path Model  Why-What-How-When  To Implement An IC Reporting
A Path Model Why-What-How-When To Implement An IC Reporting
 
Full Paper: Analytics: Key to go from generating big data to deriving busines...
Full Paper: Analytics: Key to go from generating big data to deriving busines...Full Paper: Analytics: Key to go from generating big data to deriving busines...
Full Paper: Analytics: Key to go from generating big data to deriving busines...
 
Extending Access Management into BCE - Scoping Study
Extending Access Management into BCE - Scoping StudyExtending Access Management into BCE - Scoping Study
Extending Access Management into BCE - Scoping Study
 
Poster ECIS 2016
Poster ECIS 2016Poster ECIS 2016
Poster ECIS 2016
 
Project Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docxProject Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docx
 
4boards.ai
4boards.ai 4boards.ai
4boards.ai
 
Competitive Intelligence
Competitive IntelligenceCompetitive Intelligence
Competitive Intelligence
 
Innovative Technologies And Software For Higher Education...
Innovative Technologies And Software For Higher Education...Innovative Technologies And Software For Higher Education...
Innovative Technologies And Software For Higher Education...
 
Paper publication
Paper publicationPaper publication
Paper publication
 
Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020
 
Symposium 2010 Gnaedinger Managing (And Leveraging) Information) (3)
Symposium 2010    Gnaedinger Managing (And Leveraging) Information) (3)Symposium 2010    Gnaedinger Managing (And Leveraging) Information) (3)
Symposium 2010 Gnaedinger Managing (And Leveraging) Information) (3)
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
 
We spline invdeck_may2018
We spline invdeck_may2018We spline invdeck_may2018
We spline invdeck_may2018
 
HEI risks & challenges.pdf
HEI risks & challenges.pdfHEI risks & challenges.pdf
HEI risks & challenges.pdf
 

Kürzlich hochgeladen

8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 

Kürzlich hochgeladen (20)

8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 

JISC Conference 2008 Identity Session

  • 1. JISC Conference 2008: Enabling Innovation 15 April 2008, ICC Birmingham Joint Information Systems Committee Supporting education and research
  • 2. JISC Conference 2008 Identity Matters 11.15 – 12.15 Hall 11b 02/06/09 | Supporting education and research | Slide
  • 3. JISC Conference 2008 PLEASE SWITCH YOUR MOBILE PHONE TO SILENT Conference tag: jiscconference08 02/06/09 | Supporting education and research | Slide
  • 4. Identity Matters Session Chair James Farnhill Programme Manager (e-Research), JISC 02/06/09 | Supporting education and research | Slide
  • 5.
  • 6.
  • 7.
  • 8. Identity Matters Rhys Smith Engineering Consultant: Identity & Access Management, Cardiff University 02/06/09 | Supporting education and research | Slide
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Identity Matters John Paschoud Projects Manager, LSE Library 02/06/09 | Supporting education and research | Slide
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Identity Matters James Farnhill Programme Manager (e-Research), JISC 02/06/09 | Supporting education and research | Slide
  • 27. Futures Overview Raise Awareness Build Capacity Provide Resources Future Identity Work
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. JISC Conference 2008: Enabling Innovation 15 April 2008, ICC Birmingham Joint Information Systems Committee Supporting education and research