The rise of integrated information systems is transforming modern organizations to an extent not envisioned just a few years ago. The dependence of major organizations on these computer supersystems makes it imperative that management provide adequate controls. Many attempts to improve system security are not only inadequate but ill conceived. Our ability to create exceeds our ability to control, and the results can be disastrous. This article discusses the critical role of ID verification in integrated system environments. The inadequacies of memorized passwords as the means of ID verification are discussed, sophisticated ID technologies are described, and the benefits of an integrated approach are enumerated.
展开▼