Citizens’ Attitudes towards Electronic Identification in a Public E-Service Context – An Essential Perspective in the eID Development Process (original) (raw)
Related papers
This paper investigates the management of developing electronic identification (e-ID) within a public e-service context. e-ID is an important key enabler for secure identification, authentication and digital signing via the Internet and a part of e-service design. As users, and citizens, we become reliant on electronic solutions that give us a certain level of utility and trust, and use e-ID solutions to interact with local and central government in an e-service context. The management of e-ID development in a national context is the case in focus for investigation. Such development initiatives, and especially inter-organizational projects, face a number of challenges. Therefore it is a need for a more thorough understanding of e-ID development within a public e-service context. The purpose is to analyse the contemporary management of e-ID development in Sweden from: a) an e-government systems development life-cycle perspective and b) a project challenge and critical success factor ...
National governments across Europe are currently introducing electronic identity management systems for enhancing security and gathering more unified forms of authentication for online public services. A particular challenge of security system design is to cope with the suspense between security and usability. This is strongly reflecting in identity management where this suspense becomes very apparent. Thus, for the success of identity management systems a certain focus on user centricity is demanded. This paper analyzes the system in Austria with respect to important determinants of a citizen-centric identity management approach, deduced from security usability issues, interrelated with factors for user perception as provided by the Technology Acceptance Model. The result reveals a biased picture of user centricity with an essential need for a stronger consideration of user perception and the provision of additional benefits addressing a perceivable user value.
Security and Privacy Perceptions of E-ID: A Grounded Research
2008
This paper reports on research in progress that explores the perceptions of security and privacy of UK citizens regarding electronic identity cards. In the wake of the UK National Identity Scheme proposals and with the introduction of electronic identity cards in the coming years, it is important to understand the perspectives of UK citizens. The Scheme sparked furious public debate, but as yet public opinion on the issues has not been researched systematically. Following grounded theory methods of open-coding content analysis, the findings present an empirically-grounded framework depicting the prevailing perceptions held by UK citizens. Four high-level constructs and a set of sub-categories constitute the framework that emerged: Public authorities (Competence and Integrity), Personal privacy principles (Risk/Benefit Balance, Citizen Control and A priori Anti-ID card), Legal and regulatory, and, Systems and technology. Rather than simply indicating whether citizens were 'for' or 'against' eID, the findings from the analysis uncover the reasons behind citizens' attitudes, whether positive, ambivalent or negative, and testify to the diversity of issues and concerns preoccupying them. Preliminary implications are drawn from the findings, specifically as regards the management of information and identity risk to UK citizens brought about by new identity management systems. Further directions for development of this research in progress are signposted.
There is an increased use of public e-services integrating citizens into public administration through electronic interfaces. The relation among parents and public schools is a daily and important relation that has to be trustworthy. On-line interaction among public organizations and citizens can be seen as e-government, indeed embedded into daily practices. A safe entry into such systems is essential for security and trust in the e-governmental systems and schools as well as public services in general. This paper addresses how electronic identification has been used for access to public e-services in schools in a Swedish municipality. The aim of the paper is to present a case study on how electronic identification is used and implemented in ICT platforms in schools. The analysis focuses on information security, organization and potential development of the platforms. The main finding in the case study is that there was an unorganized presentation of information in the system; both general and personal information had to be accessed with the same level of security (identification systems). The organization of identification and access to public e-services seemed highly dependent of the organizational structure of the public schools. The more general implication is that safe and well organized identification systems that are considered as trustworthy and useful among citizens are essential for increased use of the services and legitimate public e-services in general.
The Belgian e-ID and its complex path to implementation and innovational change
Identity in the Information Society, 2010
Abtract This article provides a critical view on the development and deployment phase of the e-ID in Belgium since 1999. It is based on extensive desk research and fifteen in depth-interviews with experts and stakeholders from government, administration, academia and industry who have been key in the development of the e-ID. The article identifies different elements that influenced, both in a positive and negative way, the societal, technical and political aspects of the Belgian e-ID. It shows that no severe problems occurred during the initial deployment phase, which came to an end in 2009 providing over eight million Belgian citizens with an e-ID. The pre-existence of a National Register and the preliminary experiences with the exchange of digital information between administrative entities in the field of Social Security enabled and facilitated the development and the distribution of the e-ID. However, the research also reveals that usage of the e-ID by citizens and uptake of e-ID based services by administration and business remains limited due to multiple factors. The complex system of state structures in Belgium and as a consequence the dispersion of competences across different governmental entities makes that no unified approach to e-government and e-ID based services has been developed. From the industries' point of view the privacy framework and the strictly regulated use of the National Registration Number provides no clear view on the allowed use of data accessible through the e-ID hampering take up in this area.
There is an increased use of public e-services integrating citizens into public administration through electronic interfaces. On-line interaction among public organizations and citizens is one core relation in e-government that hereby becomes embedded into daily practices. A safe entry into e-governmental systems is essential for security and trust in the e-governmental systems and schools as well as public services in general. This paper addresses how electronic identification has been used for access to public e-services in schools in a Swedish municipality. This paper draws on a case study of use of ICT platforms in education administration in order to study the implementation of secure login process and factors that may have implications upon trust in-and legitimacy of public e-services at local e-government level. Besides describing the implementation process and analyzing security and organizational arrangements connected to the use of the platform, the paper address the argument that secure identification tools are essential for increased use of e-services and lead to greater legitimacy of the public (e)services. The analysis focuses on information security, organization setup and potential development of the platforms, contributing with empirical findings and conceptual applications. A key finding was that the organization of identification and access to public e-services seemed highly dependent of the organizational structure of the public schools. The more general implication of the findings was that safe and well organized identification systems that were considered as trustworthy and useful among citizens were essential for increased use of the services and legitimate public e-services in general.
International Journal of Information Technology and Applied Sciences (IJITAS)
Electronic Identity Management has become a key ingredient for electronic governance. Countries around the world are using state-of-the-art technologies to digitize their citizen service delivery process. Uniquely identifying citizens and electronically managing their authentication information is a must for trust and fairness. However, at the implementation level, various modes of electronic identity management are currently in practice, primarily: centralized, user-centric, and federated models. This paper presents an overall summary of the level and type of identity management strategies adopted by different governments. We believe, this information will be valuable to the policymakers and development strategies to plan, design, implement and update the current state of the art.
Electronic Government Privacy in Digital Identity Systems: Models, Assessment, and User Adoption
The use of privacy protection measures is of particular importance for existing and upcoming users' digital identities. Thus, the recently adopted EU Regulation on Electronic identification and trust services (eIDAS) explicitly allows the use of pseudonyms in the context of eID systems, without specifying how they should be implemented. The paper contributes to the discussion on pseudonyms and multiple identities, by (1) providing an original analysis grid that can be applied for privacy evaluation in any eID architecture, and (2) introducing the concept of eID deployer allowing virtually any case of the relationship between the user, the eID implementation and the user's digital identities to be modelled. Based on these inputs, a comparative analysis of four exemplary eID architectures deployed in European countries is conducted. The paper also discusses how sensitive citizens of these countries are to the privacy argument while adopting these systems, and presents the " privacy adoption paradox " .
Enhanced Functionality Brings New Privacy and Security Issues – an Analysis of eID
Masaryk University Journal of Law and Technology (ISSN: 1802-5943) (eISSN: 1802-5951), 2018
As compared with traditional paper-based versions and the standard username-password login to e-Government services, the new electronic identity and travel documents have made on-site electronic and on-line authentication of citizen more comfortable and secure. The biometric passport was introduced in Hungary in 2006. A decade later the electronic identity card (eID) was implemented. The reason for the improvement of such documents is twofold: enhancing security features and performing new functions. The development is certainly welcome, but it also generates new types of risks, with which governments and citizens must take into account. In this paper, I will first analyze the most widespread technologies of data storage cards from the passive elements to the chipcards, including the biometric passport. The objective is to provide an overview of the technical development as a background to my paper. I will then proceed to an analysis of the relevant EU and national legal background, data elements, data protection and the functions (ePASS, eID, eSIGN) of the new Hungarian and German identity card, as well as the security risks and protection properties of the eID-type documents. The paper concludes with a summary of the lessons learned from and the risks involved in the current solutions in Hungary and Germany.