Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

21
Overview of My PhD Research A Case for Implementation of Citizen Centric National Identity Management Systems Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

description

Overview of My PhD Research A Case for Implementation of Citizen Centric National Identity Management Systems. Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen. Ghana. People & Places. Research Questions. PhD Progress – Time Line. 11 Months Study Plan accepted - PowerPoint PPT Presentation

Transcript of Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

Page 1: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

Overview of My PhD Research

A Case for Implementation of Citizen Centric National Identity Management Systems

Joseph K. Adjei

Supervisor: Associate Prof. Henning Olesen

Page 2: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

Ghana

Page 3: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

People & Places

Page 4: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

Research Questions

1 - What factors

motivate or inhibit

national IDMS

implementations? 3 – What are the criteria for

evaluating successful implementation of national

IDMS?

2 – In what ways does the factors influence successful

national IDMS implementations?

4 – What steps must be taken to

ensure successful

implementation of

citizen-centric IDMS?

“What factors affect successful

implementation of Citizen-centric National Identity Management

System (NIDMS)?”

Page 5: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

PhD Progress – Time Line

• Offered Admission

• Began Study Plan in Denmark

• 2 Months Study Plan

2010

• 11 Months Study Plan accepted• 2 Conference papers co-authored

introduced• 1 publication in a business journal• 1 Journal article co-authored

2011

Page 6: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

PhD Progress – Time Line

Jan - April 2012

• Organized a Stakeholder Workshop in Ghana

• Secondary Uses of Personal Information

• Commercialization of Personal Information

• Attend e-ID Conference

• Second Stakeholder Forum

• Focus group discussion

May - July 2012

• Analysis of Findings

• Publish

Findings

Aug - Nov 2012

Page 7: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

PhD Progress – Time Line

Dec 2012

• Thesis - First Draft

• Revision of Thesis

Jan - Feb 2012

• Submit Final Thesis

March 2013

Page 8: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

Preliminary Findings

Page 9: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

Joseph Adjei, Henning Olesencenter for Communication, Media & Information technology (CMI)

Aalborg University Copenhagen

Sydhavnsgade 17, DK-2450 Copenhagen SV

e-mails: [email protected], [email protected]

SECONDARY USES OF PERSONAL INFORMATION Technology, Policies & Regulatory Framework

Page 10: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

Major National Identity Management Schemes

National Identification

Authority National ID Card

Electoral Commission

Voter ID Card)

National Health Insurance SchemeHealth

Insurance Card

Ghana Immigration

ServiceBiometric Passport

Driver & Vehicle Licensing Authority

(DVLA)Biometric

Drivers License

Registrar General

DepartmentBirth Certificate

Page 11: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

Examples of ID Cards in Ghana

Page 12: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

Issues and Challenges Real time verification of credentials

No clear rules regarding access to information for secondary uses

Unreliable identity credentials – one person can hold more than one of a particular credential.

Focus is mainly on physical verification by the issuers.

Update of personal information when address or status changes

High level of illiteracy

Page 13: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

Why Stakeholder Workshop

Page 14: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

Should there be a common national digital identity for Ghana?

Who should act as issuer and as assurance authority?

How can secure and differentiate civil information from commercial services.

Should the government take the lead or should it be commercially driven?

The division between a possible national identity system and credit cards

Who should bear the costs and ? 

How can citizens be convinced to use it?

How can user trust and privacy be assured

What new services or businesses that can be introduced based on a national identity systems

Discussion Questions

14

Page 15: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

Dimensions Of Privacy

INFORMATION PRIVACY

Dimensions of Information

Privacy

DIMENSIONS OF PRIVACY

Personal Communication

Privacy Government Regulation

Transaction Activity

Willingness to Give Personal information

Invasion

Data Dissemination

Data Collection

Data Processing

Privacy of a Person

Personal Behaviour

Privacy

Data Privacy

Information Privacy Concerns

Page 16: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

Balance: Rs.1,000

Secondary Uses of Personal Information

Biometric POS

Digital ID Businesses

Mobile Data Services

Identity Verification

Insurance, and other services

Health Insurance

e-Government Services

Page 17: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

Example of Online ID Verification System

Page 18: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

Proposed Online ID Verification System

Page 19: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

Preliminary Recommendations

19

Issues Discussed Recommendation

Policy on Secondary Uses Clear guidelines on data access and focus on information security.

Access to Personal InformationDevelop data access and control policies and practices for secondary use of data and not ownership.

Privacy and Security PoliciesPrivacy and Security policies for secondary use of personal data must be implemented enforced. (e.g. OECD Guidelines, PbD, 7 Laws of Identity, Data Protection Laws)

Benefits and challenges associated with secondary use of information

Public education on benefits of secondary use of personal Information. Increased Awareness enhances public trust and confidence.

What are the secondary uses ?A taxonomy secondary uses of personal information, specifying policies, regulatory framework.

Citizens concerns related to secondary use of personal information

Public awareness programs and training, user authentication, cost, sale of data, and oversight.

Focus government attention on secondary use of personal information.

Enforcement of data protection regulations and development of interoperability policies

Page 20: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

THANK YOU

Page 21: Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

• Yin, R. K. (2009). Case Study Research: Design and Methods; (4 ed., Vol. 5). UK: Sage

• Eisenhardt, K. (1989). Building Theories From Case Study Research. The Academy of Management Review , 14 (4), pg. 532.

• Gephart, R. P. 2004. Qualitative research and the Academy of Management Journal. Academy of Management Journal, 47: 454–462.

• K Cameron. (2005) identityblog [Online] http://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf

• Ann Cavoukian, "The case for privacy-embedded laws of identity in the digital age”, 2008.

• Raffaele Zallone, "The Privacy Paradox or How I Learned to Have Rights that Never Quite Seem to Work," in AAAI Spring Symposium Series, Palo Alto, California, 2010.

• Roger C Mayer, James H. Davis, and David F Schoorman, "An Integrative Model of Organizational Trust," The Academy of Management Review, vol. 20, no. 3, pp. 709-734, July 1995.

• France Bélanger and Robert E Crossler, "MIS Quarterly," Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems, vol. 35, no. 4, pp. 1017-1041, December 2011.

• Robin Wilton, “Identity and privacy in the digital age”, Int. J. of Intellectual Property Management, vol. 2, no. 4, pp. 411-428, 2008.

References