joseph k. adjei supervisor: associate prof. henning olesen

Post on 03-Jan-2016

17 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

Overview of My PhD Research A Case for Implementation of Citizen Centric National Identity Management Systems. Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen. Ghana. People & Places. Research Questions. PhD Progress – Time Line. 11 Months Study Plan accepted - PowerPoint PPT Presentation

TRANSCRIPT

Overview of My PhD Research

A Case for Implementation of Citizen Centric National Identity Management Systems

Joseph K. Adjei

Supervisor: Associate Prof. Henning Olesen

Ghana

People & Places

Research Questions

1 - What factors

motivate or inhibit

national IDMS

implementations? 3 – What are the criteria for

evaluating successful implementation of national

IDMS?

2 – In what ways does the factors influence successful

national IDMS implementations?

4 – What steps must be taken to

ensure successful

implementation of

citizen-centric IDMS?

“What factors affect successful

implementation of Citizen-centric National Identity Management

System (NIDMS)?”

PhD Progress – Time Line

• Offered Admission

• Began Study Plan in Denmark

• 2 Months Study Plan

2010

• 11 Months Study Plan accepted• 2 Conference papers co-authored

introduced• 1 publication in a business journal• 1 Journal article co-authored

2011

PhD Progress – Time Line

Jan - April 2012

• Organized a Stakeholder Workshop in Ghana

• Secondary Uses of Personal Information

• Commercialization of Personal Information

• Attend e-ID Conference

• Second Stakeholder Forum

• Focus group discussion

May - July 2012

• Analysis of Findings

• Publish

Findings

Aug - Nov 2012

PhD Progress – Time Line

Dec 2012

• Thesis - First Draft

• Revision of Thesis

Jan - Feb 2012

• Submit Final Thesis

March 2013

Preliminary Findings

Joseph Adjei, Henning Olesencenter for Communication, Media & Information technology (CMI)

Aalborg University Copenhagen

Sydhavnsgade 17, DK-2450 Copenhagen SV

e-mails: adjei@cmi.aau.dk, olesen@cmi.aau.dk

SECONDARY USES OF PERSONAL INFORMATION Technology, Policies & Regulatory Framework

Major National Identity Management Schemes

National Identification

Authority National ID Card

Electoral Commission

Voter ID Card)

National Health Insurance SchemeHealth

Insurance Card

Ghana Immigration

ServiceBiometric Passport

Driver & Vehicle Licensing Authority

(DVLA)Biometric

Drivers License

Registrar General

DepartmentBirth Certificate

Examples of ID Cards in Ghana

Issues and Challenges Real time verification of credentials

No clear rules regarding access to information for secondary uses

Unreliable identity credentials – one person can hold more than one of a particular credential.

Focus is mainly on physical verification by the issuers.

Update of personal information when address or status changes

High level of illiteracy

Why Stakeholder Workshop

Should there be a common national digital identity for Ghana?

Who should act as issuer and as assurance authority?

How can secure and differentiate civil information from commercial services.

Should the government take the lead or should it be commercially driven?

The division between a possible national identity system and credit cards

Who should bear the costs and ? 

How can citizens be convinced to use it?

How can user trust and privacy be assured

What new services or businesses that can be introduced based on a national identity systems

Discussion Questions

14

Dimensions Of Privacy

INFORMATION PRIVACY

Dimensions of Information

Privacy

DIMENSIONS OF PRIVACY

Personal Communication

Privacy Government Regulation

Transaction Activity

Willingness to Give Personal information

Invasion

Data Dissemination

Data Collection

Data Processing

Privacy of a Person

Personal Behaviour

Privacy

Data Privacy

Information Privacy Concerns

Balance: Rs.1,000

Secondary Uses of Personal Information

Biometric POS

Digital ID Businesses

Mobile Data Services

Identity Verification

Insurance, and other services

Health Insurance

e-Government Services

Example of Online ID Verification System

Proposed Online ID Verification System

Preliminary Recommendations

19

Issues Discussed Recommendation

Policy on Secondary Uses Clear guidelines on data access and focus on information security.

Access to Personal InformationDevelop data access and control policies and practices for secondary use of data and not ownership.

Privacy and Security PoliciesPrivacy and Security policies for secondary use of personal data must be implemented enforced. (e.g. OECD Guidelines, PbD, 7 Laws of Identity, Data Protection Laws)

Benefits and challenges associated with secondary use of information

Public education on benefits of secondary use of personal Information. Increased Awareness enhances public trust and confidence.

What are the secondary uses ?A taxonomy secondary uses of personal information, specifying policies, regulatory framework.

Citizens concerns related to secondary use of personal information

Public awareness programs and training, user authentication, cost, sale of data, and oversight.

Focus government attention on secondary use of personal information.

Enforcement of data protection regulations and development of interoperability policies

THANK YOU

• Yin, R. K. (2009). Case Study Research: Design and Methods; (4 ed., Vol. 5). UK: Sage

• Eisenhardt, K. (1989). Building Theories From Case Study Research. The Academy of Management Review , 14 (4), pg. 532.

• Gephart, R. P. 2004. Qualitative research and the Academy of Management Journal. Academy of Management Journal, 47: 454–462.

• K Cameron. (2005) identityblog [Online] http://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf

• Ann Cavoukian, "The case for privacy-embedded laws of identity in the digital age”, 2008.

• Raffaele Zallone, "The Privacy Paradox or How I Learned to Have Rights that Never Quite Seem to Work," in AAAI Spring Symposium Series, Palo Alto, California, 2010.

• Roger C Mayer, James H. Davis, and David F Schoorman, "An Integrative Model of Organizational Trust," The Academy of Management Review, vol. 20, no. 3, pp. 709-734, July 1995.

• France Bélanger and Robert E Crossler, "MIS Quarterly," Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems, vol. 35, no. 4, pp. 1017-1041, December 2011.

• Robin Wilton, “Identity and privacy in the digital age”, Int. J. of Intellectual Property Management, vol. 2, no. 4, pp. 411-428, 2008.

References

top related