Abstract
Blockchain-based Distributed Identity Management (BDIDM) can enhance sustainable identification and authentication of users on organisations’ digital systems. But there is not a clear consensus on how organisations perceive the value proposition of such technology, nor what might affect their adoption behaviour toward it. This research explains how technological, organisational and environmental (TOE) factors affect organisations’ adoption behaviour toward BDIDM. This study aims to determine the most critical factors affecting the behaviour while assessing the effectiveness and appropriateness of the model involved, i.e., TOE-BDIDM. Online questionnaires are used to survey 111 information and cybersecurity practitioners within South African organisations. The analysis combines binary logistic regression modelling, Structural Equation Modelling of the measurement model, and chi-squared tests. The results suggest TOE factors positively or negatively affect adoption behaviour. The behaviour is significantly affected by technology characteristics, i.e., BDIDM’s disruptive nature, and is associated with Blockchain type. Indeed, the majority of participants intended to recommend BDIDM to their organisations yet paradoxically preferred private-permissioned blockchain the most, revealing resistance to decentralised and privacy-preserving BDIDM models like Self-Sovereign Identity (SSI). The latter might be utopian or unsustainable for organisations. TOE-BDIDM was found relatively appropriate and effective but arguably ‘incomplete’ for explaining the adoption of disruptive technologies like SSI in organisations. TOE should extend to TOEU by including the User factors.
Subject
Management, Monitoring, Policy and Law,Renewable Energy, Sustainability and the Environment,Geography, Planning and Development,Building and Construction
Reference76 articles.
1. Principles of Information Security;Whitman,2021
2. Information Security Management Principles;Alexander,2020
3. South African National Standard: Information Technology—Security Techniques—Code of Practice for Information Security Controls,2014
4. Essential Enterprise Blockchain Concepts and Applications;Saini,2021
5. Enabling Secure and Privacy Preserving Identity Management via Smart Contract;Liu;Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS),2019
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献