Date post: | 03-Jan-2016 |
Category: |
Documents |
Upload: | farsiris-hormuzd |
View: | 15 times |
Download: | 1 times |
Overview of My PhD Research
A Case for Implementation of Citizen Centric National Identity Management Systems
Joseph K. Adjei
Supervisor: Associate Prof. Henning Olesen
Ghana
People & Places
Research Questions
1 - What factors
motivate or inhibit
national IDMS
implementations? 3 – What are the criteria for
evaluating successful implementation of national
IDMS?
2 – In what ways does the factors influence successful
national IDMS implementations?
4 – What steps must be taken to
ensure successful
implementation of
citizen-centric IDMS?
“What factors affect successful
implementation of Citizen-centric National Identity Management
System (NIDMS)?”
PhD Progress – Time Line
• Offered Admission
• Began Study Plan in Denmark
• 2 Months Study Plan
2010
• 11 Months Study Plan accepted• 2 Conference papers co-authored
introduced• 1 publication in a business journal• 1 Journal article co-authored
2011
PhD Progress – Time Line
Jan - April 2012
• Organized a Stakeholder Workshop in Ghana
• Secondary Uses of Personal Information
• Commercialization of Personal Information
• Attend e-ID Conference
• Second Stakeholder Forum
• Focus group discussion
May - July 2012
• Analysis of Findings
• Publish
Findings
Aug - Nov 2012
PhD Progress – Time Line
Dec 2012
• Thesis - First Draft
• Revision of Thesis
Jan - Feb 2012
• Submit Final Thesis
March 2013
Preliminary Findings
Joseph Adjei, Henning Olesencenter for Communication, Media & Information technology (CMI)
Aalborg University Copenhagen
Sydhavnsgade 17, DK-2450 Copenhagen SV
e-mails: [email protected], [email protected]
SECONDARY USES OF PERSONAL INFORMATION Technology, Policies & Regulatory Framework
Major National Identity Management Schemes
National Identification
Authority National ID Card
Electoral Commission
Voter ID Card)
National Health Insurance SchemeHealth
Insurance Card
Ghana Immigration
ServiceBiometric Passport
Driver & Vehicle Licensing Authority
(DVLA)Biometric
Drivers License
Registrar General
DepartmentBirth Certificate
Examples of ID Cards in Ghana
Issues and Challenges Real time verification of credentials
No clear rules regarding access to information for secondary uses
Unreliable identity credentials – one person can hold more than one of a particular credential.
Focus is mainly on physical verification by the issuers.
Update of personal information when address or status changes
High level of illiteracy
Why Stakeholder Workshop
Should there be a common national digital identity for Ghana?
Who should act as issuer and as assurance authority?
How can secure and differentiate civil information from commercial services.
Should the government take the lead or should it be commercially driven?
The division between a possible national identity system and credit cards
Who should bear the costs and ?
How can citizens be convinced to use it?
How can user trust and privacy be assured
What new services or businesses that can be introduced based on a national identity systems
Discussion Questions
14
Dimensions Of Privacy
INFORMATION PRIVACY
Dimensions of Information
Privacy
DIMENSIONS OF PRIVACY
Personal Communication
Privacy Government Regulation
Transaction Activity
Willingness to Give Personal information
Invasion
Data Dissemination
Data Collection
Data Processing
Privacy of a Person
Personal Behaviour
Privacy
Data Privacy
Information Privacy Concerns
Balance: Rs.1,000
Secondary Uses of Personal Information
Biometric POS
Digital ID Businesses
Mobile Data Services
Identity Verification
Insurance, and other services
Health Insurance
e-Government Services
Example of Online ID Verification System
Proposed Online ID Verification System
Preliminary Recommendations
19
Issues Discussed Recommendation
Policy on Secondary Uses Clear guidelines on data access and focus on information security.
Access to Personal InformationDevelop data access and control policies and practices for secondary use of data and not ownership.
Privacy and Security PoliciesPrivacy and Security policies for secondary use of personal data must be implemented enforced. (e.g. OECD Guidelines, PbD, 7 Laws of Identity, Data Protection Laws)
Benefits and challenges associated with secondary use of information
Public education on benefits of secondary use of personal Information. Increased Awareness enhances public trust and confidence.
What are the secondary uses ?A taxonomy secondary uses of personal information, specifying policies, regulatory framework.
Citizens concerns related to secondary use of personal information
Public awareness programs and training, user authentication, cost, sale of data, and oversight.
Focus government attention on secondary use of personal information.
Enforcement of data protection regulations and development of interoperability policies
THANK YOU
• Yin, R. K. (2009). Case Study Research: Design and Methods; (4 ed., Vol. 5). UK: Sage
• Eisenhardt, K. (1989). Building Theories From Case Study Research. The Academy of Management Review , 14 (4), pg. 532.
• Gephart, R. P. 2004. Qualitative research and the Academy of Management Journal. Academy of Management Journal, 47: 454–462.
• K Cameron. (2005) identityblog [Online] http://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf
• Ann Cavoukian, "The case for privacy-embedded laws of identity in the digital age”, 2008.
• Raffaele Zallone, "The Privacy Paradox or How I Learned to Have Rights that Never Quite Seem to Work," in AAAI Spring Symposium Series, Palo Alto, California, 2010.
• Roger C Mayer, James H. Davis, and David F Schoorman, "An Integrative Model of Organizational Trust," The Academy of Management Review, vol. 20, no. 3, pp. 709-734, July 1995.
• France Bélanger and Robert E Crossler, "MIS Quarterly," Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems, vol. 35, no. 4, pp. 1017-1041, December 2011.
• Robin Wilton, “Identity and privacy in the digital age”, Int. J. of Intellectual Property Management, vol. 2, no. 4, pp. 411-428, 2008.
References