The Liberty Alliance project, with its purpose of providing both the users and different organizations the ease of securing identities by going through a single process of authentication, can be cited as another technological development created by humans for the benefit of the greater society. During these present times where people depend on the World Wide Web, Internet, or Intranet, it has become inevitable that people has to register their identities in the different websites. Likewise, the upsurge of online identity thefts may be attributed to the susceptibility of the virtual community made possible by the Internet.

            The availability of such digital identity protection and security system forms a greater assurance for people with regard to online transactions, which happen to be characterized by a high degree of uncertainty because of its virtual nature. However, even with such weighty advantages, there is a different side of the technology brought about by the Liberty Alliance Project that must be seen by key stakeholders. First, it calls for actions from the legislative body with regard to the legal statutes necessary for the legalities and formalization of rules and regulations (Bidgoli, 2006). Since this is a project made by man, there are loopholes that may result to aggravation of certain entities such as the threat to their privacy. Second, businesses and organizations that use the information should secure well enough the personal information of their clients (Bidgoli, 2006). Since the system will form linkages between different organizations, it should be that clients will be properly informed with regard to the uses of the information they place on the websites (Bidgoli, 2006).

There's a specialist from your university waiting to help you with that essay.
Tell us what you need to have done now!


order now

            A closer look at the advantages, as well as the necessary steps that are needed to ensure that people are protected, should be seen by the multi-disciplinarian perspective of the creators.

Reference

Bidgoli, H. (2006). Handbook of information security, (Vol. 2). New York: John Wiley & Sons, Inc.

Leave a Reply

Your email address will not be published. Required fields are marked *