
Managing Identity in Customer Service Operations
Author(s) -
Arynn Crow,
John Paul Rowan
Publication year - 2021
Language(s) - English
DOI - 10.55621/idpro.65
Subject(s) - font , computer science , artificial intelligence
@font-face{font-family:"Cambria Math";panose-1:2 4 5 3 5 4 6 3 2 4;mso-font-charset:0;mso-generic-font-family:roman;mso-font-pitch:variable;mso-font-signature:-536870145 1107305727 0 0 415 0;}@font-face{font-family:Calibri;panose-1:2 15 5 2 2 2 4 3 2 4;mso-font-charset:0;mso-generic-font-family:swiss;mso-font-pitch:variable;mso-font-signature:-536858881 -1073732485 9 0 511 0;}@font-face{font-family:"Yu Mincho";panose-1:2 2 4 0 0 0 0 0 0 0;mso-font-alt:游明朝;mso-font-charset:128;mso-generic-font-family:roman;mso-font-pitch:variable;mso-font-signature:-2147482905 717749503 18 0 131231 0;}@font-face{font-family:"\@Yu Mincho";mso-font-charset:128;mso-generic-font-family:roman;mso-font-pitch:variable;mso-font-signature:-2147482905 717749503 18 0 131231 0;}p.MsoNormal, li.MsoNormal, div.MsoNormal{mso-style-unhide:no;mso-style-qformat:yes;mso-style-parent:"";margin:0in;mso-pagination:widow-orphan;font-size:12.0pt;font-family:"Calibri",sans-serif;mso-ascii-font-family:Calibri;mso-ascii-theme-font:minor-latin;mso-fareast-font-family:"Yu Mincho";mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:"Times New Roman";mso-bidi-theme-font:minor-bidi;}.MsoChpDefault{mso-style-type:export-only;mso-default-props:yes;font-family:"Calibri",sans-serif;mso-ascii-font-family:Calibri;mso-ascii-theme-font:minor-latin;mso-fareast-font-family:"Yu Mincho";mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:"Times New Roman";mso-bidi-theme-font:minor-bidi;}div.WordSection1{page:WordSection1;}This article will establish recommendations for best practices when managing the identities of your end-users in a customer service environment, considering the risks of both external and malicious insider threats. The following recommendations are built from the authors’ experiences and observations, and the recommendations included should be considered a starting point to inspire discussion. More rigorous study is necessary to further refine guidelines for this subject.