1 A Survey on EU Citizen’s Trust in ID Systems and Authorities (original) (raw)
Related papers
Identity Management and Data Sharing in the European Union
Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), 2006
Citizens and enterprises in the European Union benefit from a common internal market and other freedoms. The resulting and growing mobility and cross-border collaboration necessity leads to specific challenges for e-Government applications. This article presents the results of a study run by Luxembourg's Presidency of the EU during the first half of 2005. This study investigated one central aspect in this area: How do countries identify their citizens and businesses, and what are their national provisions regarding data protection and privacy that limit and regulate the sharing of such data? In more technical terms: What is the impact of identity management and related privacy issues on the interoperability of e-Government systems? The status quo in 18 member states is illustrated, and compared with the results of a similar study run in 2001. We present a general model for describing the framework of identity management in cross-border contexts.
Lecture Notes in Computer Science, 2012
This article addresses the development of electronic identification (eID) for public e-services and reports from an empirical study of young Swedish university students' attitudes towards eID. A public e-service at the Swedish Board for Study Support which demanded secure electronic identification was focused. Our findings from three focus groups show that usability and security are two main themes that the respondents found to be important in order to trust eID and e-services. This example of how citizens' attitudes towards eID can be explored in focus groups is related to an on-going national development process of a new eID solution on a strategic and artifact level. In this process no citizens are participating or involved so far. Potential risks with neglecting citizen attitudes in such processes, in a longer perspective, are decreased usage of public e-services and lack of trust in e-government. This article shows that citizens' attitudes can serve as important additional input to the development of eID solutions that supports successful e-government.
National governments across Europe are currently introducing electronic identity management systems for enhancing security and gathering more unified forms of authentication for online public services. A particular challenge of security system design is to cope with the suspense between security and usability. This is strongly reflecting in identity management where this suspense becomes very apparent. Thus, for the success of identity management systems a certain focus on user centricity is demanded. This paper analyzes the system in Austria with respect to important determinants of a citizen-centric identity management approach, deduced from security usability issues, interrelated with factors for user perception as provided by the Technology Acceptance Model. The result reveals a biased picture of user centricity with an essential need for a stronger consideration of user perception and the provision of additional benefits addressing a perceivable user value.
This paper investigates the management of developing electronic identification (e-ID) within a public e-service context. e-ID is an important key enabler for secure identification, authentication and digital signing via the Internet and a part of e-service design. As users, and citizens, we become reliant on electronic solutions that give us a certain level of utility and trust, and use e-ID solutions to interact with local and central government in an e-service context. The management of e-ID development in a national context is the case in focus for investigation. Such development initiatives, and especially inter-organizational projects, face a number of challenges. Therefore it is a need for a more thorough understanding of e-ID development within a public e-service context. The purpose is to analyse the contemporary management of e-ID development in Sweden from: a) an e-government systems development life-cycle perspective and b) a project challenge and critical success factor ...
Electronic Government Privacy in Digital Identity Systems: Models, Assessment, and User Adoption
The use of privacy protection measures is of particular importance for existing and upcoming users' digital identities. Thus, the recently adopted EU Regulation on Electronic identification and trust services (eIDAS) explicitly allows the use of pseudonyms in the context of eID systems, without specifying how they should be implemented. The paper contributes to the discussion on pseudonyms and multiple identities, by (1) providing an original analysis grid that can be applied for privacy evaluation in any eID architecture, and (2) introducing the concept of eID deployer allowing virtually any case of the relationship between the user, the eID implementation and the user's digital identities to be modelled. Based on these inputs, a comparative analysis of four exemplary eID architectures deployed in European countries is conducted. The paper also discusses how sensitive citizens of these countries are to the privacy argument while adopting these systems, and presents the " privacy adoption paradox " .
Security and Privacy Perceptions of E-ID: A Grounded Research
2008
This paper reports on research in progress that explores the perceptions of security and privacy of UK citizens regarding electronic identity cards. In the wake of the UK National Identity Scheme proposals and with the introduction of electronic identity cards in the coming years, it is important to understand the perspectives of UK citizens. The Scheme sparked furious public debate, but as yet public opinion on the issues has not been researched systematically. Following grounded theory methods of open-coding content analysis, the findings present an empirically-grounded framework depicting the prevailing perceptions held by UK citizens. Four high-level constructs and a set of sub-categories constitute the framework that emerged: Public authorities (Competence and Integrity), Personal privacy principles (Risk/Benefit Balance, Citizen Control and A priori Anti-ID card), Legal and regulatory, and, Systems and technology. Rather than simply indicating whether citizens were 'for' or 'against' eID, the findings from the analysis uncover the reasons behind citizens' attitudes, whether positive, ambivalent or negative, and testify to the diversity of issues and concerns preoccupying them. Preliminary implications are drawn from the findings, specifically as regards the management of information and identity risk to UK citizens brought about by new identity management systems. Further directions for development of this research in progress are signposted.
2015
Abstract—This paper discusses the effect of trust and informa-tion privacy concerns on citizens ’ attitude towards national identity management systems. We introduce the privacy-concerns-trust model, which shows the role of trust in mediat-ing and moderating citizens ’ attitude towards identity man-agement systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal in-formation privacy concern is low; hence, trust is high, thereby encouraging further institutional collaboration and acceptance of citizens ’ informational self-determination.
European Public Law
This article examines key privacy and data protection concerns raised by the Regulations that establish a framework for interoperability between EU-wide centralized information systems processing personal data of third-country nationals (Schengen Information System II, Visa Information System, Eurodac, Entry/Exit System, European Travel Information and Authorization System, European Criminal Records Information System for third-country nationals). After a concise outline of the complex landscape within which these databases have been set up, emphasis is placed on the novelties and challenges that interoperability brings forward. In that regard, the articles evaluates the setting up of new databases, particularly the Biometric Matching Service and the Common Identity Repository – viewed through the Panopticon lens – the maximization of uses for which personal data may be destined, the revised rules on consultation of databases for law enforcement purposes, the challenge of ensuring d...