
Our methodology provides a consistent mechanism for defining, designing, configuring, testing, and deploying business processes for risk-based authentication. It promotes a co-development environment for initial deployment and establishes a technology transfer process from the very beginning. Our experience greatly shortens system acceptance time, minimizes organizational upset, and maximizes user acceptance of the solution.