Managing the development of secure identification - Investigating a national e-ID initiative within a public e-service context (original) (raw)
Related papers
Lecture Notes in Computer Science, 2012
This article addresses the development of electronic identification (eID) for public e-services and reports from an empirical study of young Swedish university students' attitudes towards eID. A public e-service at the Swedish Board for Study Support which demanded secure electronic identification was focused. Our findings from three focus groups show that usability and security are two main themes that the respondents found to be important in order to trust eID and e-services. This example of how citizens' attitudes towards eID can be explored in focus groups is related to an on-going national development process of a new eID solution on a strategic and artifact level. In this process no citizens are participating or involved so far. Potential risks with neglecting citizen attitudes in such processes, in a longer perspective, are decreased usage of public e-services and lack of trust in e-government. This article shows that citizens' attitudes can serve as important additional input to the development of eID solutions that supports successful e-government.
The Belgian e-ID and its complex path to implementation and innovational change
Identity in the Information Society, 2010
Abtract This article provides a critical view on the development and deployment phase of the e-ID in Belgium since 1999. It is based on extensive desk research and fifteen in depth-interviews with experts and stakeholders from government, administration, academia and industry who have been key in the development of the e-ID. The article identifies different elements that influenced, both in a positive and negative way, the societal, technical and political aspects of the Belgian e-ID. It shows that no severe problems occurred during the initial deployment phase, which came to an end in 2009 providing over eight million Belgian citizens with an e-ID. The pre-existence of a National Register and the preliminary experiences with the exchange of digital information between administrative entities in the field of Social Security enabled and facilitated the development and the distribution of the e-ID. However, the research also reveals that usage of the e-ID by citizens and uptake of e-ID based services by administration and business remains limited due to multiple factors. The complex system of state structures in Belgium and as a consequence the dispersion of competences across different governmental entities makes that no unified approach to e-government and e-ID based services has been developed. From the industries' point of view the privacy framework and the strictly regulated use of the National Registration Number provides no clear view on the allowed use of data accessible through the e-ID hampering take up in this area.
National governments across Europe are currently introducing electronic identity management systems for enhancing security and gathering more unified forms of authentication for online public services. A particular challenge of security system design is to cope with the suspense between security and usability. This is strongly reflecting in identity management where this suspense becomes very apparent. Thus, for the success of identity management systems a certain focus on user centricity is demanded. This paper analyzes the system in Austria with respect to important determinants of a citizen-centric identity management approach, deduced from security usability issues, interrelated with factors for user perception as provided by the Technology Acceptance Model. The result reveals a biased picture of user centricity with an essential need for a stronger consideration of user perception and the provision of additional benefits addressing a perceivable user value.
Management and Innovation Models for Digital Identity in Public Sector
2017
This paper is aimed at analysing the international framework, both European and Italian, for the innovative eID operating models, to identify the guidelines to follow for a correct identification of the operational requirements, of the solutions and of the services offered by the model DIMIM-Digital Identity Management and Innovation Model. After the framework' analysis, we will go through the definition of a new set of strategic guidelines customised on to the most interesting and relevant sectors identified by the DIMIM. This step will consist in the highlighting, through to the help of tools such as the SWOT analysis and the priority matrix, of the main constraints and opportunities emerging in the implementation process of the eID operational models. The paper at issue is also aimed at identifying a universal, solid and multichannel authentication system, the "IAM", which will provide each individual with a set of solid and safe digital credentials allowing the access to all the available services, promoting the creation of value-added services.
PKI in Government Digital Identity Management Systems (029)
2012
Despite significant investments in eGovernment, reported experiences show limited and struggling success cases. In the last 15 years, Governments’ efforts have been scattered, as agencies were mainly concerned with the development of informational portals and some basic online services resulting from the automation of a few traditional transactions. In fact, Governments have been cautious in terms of their preferred eGovernment approaches and strategies. A large number of Governments’ services are still provided over the counter and requires the physical presence of citizens. This is in principle due to the fact that existing eGovernment environments lack effective methods through which they can establish trust and avail services over digital networks. This article discusses the need for trust establishment to advance eGovernment in light of the existing and emerging realities. It looks at the evolving forms of identities, namely digital identities and the role of PKI technology in enabling such requirements. The key contribution of this article is that it provides an overview of a large scale national PKI program which was deployed as part of a government identity management infrastructure development scheme in the United Arab Emirates. It provides an insight into the architecture and features of the PKI deployment. It presents how the UAE government planned and set up a national identity validation gateway to support both online and traditional transactions. It also includes some reflections on key management considerations and attempts to make reference to some European initiatives to highlight similarities and differences with the UAE and GCC projects.
E-identification technologies for e-government interoperability in the EU
International Journal of Electronic Security and Digital Forensics, 2007
The EU commission has set the Pan-European Interoperability of secure authentication and authorisation systems for access to e-government services as a priority target for 2010. To this effect a large number of EU member states have implemented e-identification schemes. These are at varying stages of completion and use a range of technologies. All of them though aim at meeting the above target for interoperability while at the same time securing their home e-government services thus making them more attractive to their citizens. The number of states reviewed here and the state of the technologies used is not exhaustive but provides a good representation across the EU. This work is ongoing as are the initiatives and pilot schemes studied here.
2007
This paper reports on the research experience gained by carrying out an evaluation for a cross-border identity management system to support e-procurement. This evaluation, which took place in the context of an international research project in the European Union, brought together multiple players. The nature and diversity of the stakeholder involved, and the complexity of the systems under evaluation (in particular their social rather than technical complexity) called for a qualitative evaluation approach. Our investigation provided some interesting insights. On the one hand, these concern the challenges of working in an international project team in the context of a research project. The scope of the project, which essentially aimed at supporting public administrations in diverse national contexts in Europe, adds to complexity as the involvement of public bodies in the trials brings to the fore the political agendas of different parties and member states. On the other hand, equally interesting are the opportunities, the benefits and impediments for cross-border digital identity management across European countries as perceived by the stakeholders involved. These findings have, of course, practical implications for the success of the implementation of e-government systems but also implications for the research agenda in e-government.
PKI in Government Identity Management Systems (020)
2011
The purpose of this article is to provide an overview of the PKI project initiated part of the UAE national ID card program. It primarily shows the operational model of the PKI implementation that is indented to integrate the federal government identity management infrastructure with e-government initiatives owners in the country. It also explicates the agreed structure of the major components in relation to key stakeholders; represented by federal and local e-government authorities, financial institutions, and other organizations in both public and private sectors. The content of this article is believed to clarify some of the misconceptions about PKI implementation in national ID schemes, and explain how the project is envisaged to encourage the diffusion of e-government services in the United Arab Emirates. The study concludes that governments in the Middle East region have the trust in PKI technology to support their e-government services and expanding outreach and population trust, if of course accompanied by comprehensive digital laws and policies.
International Journal of Information Technology and Applied Sciences (IJITAS)
Electronic Identity Management has become a key ingredient for electronic governance. Countries around the world are using state-of-the-art technologies to digitize their citizen service delivery process. Uniquely identifying citizens and electronically managing their authentication information is a must for trust and fairness. However, at the implementation level, various modes of electronic identity management are currently in practice, primarily: centralized, user-centric, and federated models. This paper presents an overall summary of the level and type of identity management strategies adopted by different governments. We believe, this information will be valuable to the policymakers and development strategies to plan, design, implement and update the current state of the art.
A case study of participatory design in e-government systems: e-services and e-id
The introduction of e-Government services and applications leads to significant changes in the structure and organization of Public Administrations. In this paper we investigate the basic services needed by Regione Marche to offer accesses to available e-Services. In this setting, of course, the "Digital Identity" plays an important role. We present a general framework for shared and standardized services that supports specific mechanisms of authentication. The Regione Marche provides an interesting benchmark in Participatory Design e-Government. We explain the use of the presented framework together with smart cards technologies for the Digital Identity.