210 likes | 324 Views
Overview of My PhD Research A Case for Implementation of Citizen Centric National Identity Management Systems. Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen. Ghana. People & Places. Research Questions. PhD Progress – Time Line. 11 Months Study Plan accepted
E N D
Overview of My PhD ResearchA Case for Implementation of Citizen Centric National Identity Management Systems Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen
PhD Progress – Time Line • 11 Months Study Plan accepted • 2 Conference papers co-authored introduced • 1 publication in a business journal • 1 Journal article co-authored • Offered Admission • Began Study Plan in Denmark • 2 Months Study Plan 2010 2011
PhD Progress – Time Line • Analysis of Findings • Publish Findings • Second Stakeholder Forum • Focus group discussion • Organized a Stakeholder Workshop in Ghana • Secondary Uses of Personal Information • Commercialization of Personal Information • Attend e-ID Conference May - July 2012 Jan - April 2012 Aug - Nov 2012
PhD Progress – Time Line • Submit Final Thesis • Revision of Thesis • Thesis - First Draft Jan - Feb 2012 Dec 2012 March 2013
Joseph Adjei, Henning Olesen center for Communication, Media & Information technology (CMI) Aalborg University Copenhagen Sydhavnsgade 17, DK-2450 Copenhagen SV e-mails: adjei@cmi.aau.dk, olesen@cmi.aau.dk SECONDARY USES OF PERSONAL INFORMATION Technology, Policies & Regulatory Framework
Issues and Challenges • Real time verification of credentials • No clear rules regarding access to information for secondary uses • Unreliable identity credentials – one person can hold more than one of a particular credential. • Focus is mainly on physical verification by the issuers. • Update of personal information when address or status changes • High level of illiteracy
Discussion Questions Should there be a common national digital identity for Ghana? Who should act as issuer and as assurance authority? How can secure and differentiate civil information from commercial services. Should the government take the lead or should it be commercially driven? The division between a possible national identity system and credit cards Who should bear the costs and ? How can citizens be convinced to use it? How can user trust and privacy be assured What new services or businesses that can be introduced based on a national identity systems
Secondary Uses of Personal Information Health Insurance Identity Verification Balance: Rs.1,000 e-Government Services Insurance, and other services
References Yin, R. K. (2009). Case Study Research: Design and Methods; (4 ed., Vol. 5). UK: Sage Eisenhardt, K. (1989). Building Theories From Case Study Research. The Academy of Management Review, 14 (4), pg. 532. Gephart, R. P. 2004. Qualitative research and the Academy of Management Journal. Academy of Management Journal, 47: 454–462. K Cameron. (2005) identityblog [Online] http://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf Ann Cavoukian, "The case for privacy-embedded laws of identity in the digital age”, 2008. RaffaeleZallone, "The Privacy Paradox or How I Learned to Have Rights that Never Quite Seem to Work," in AAAI Spring Symposium Series, Palo Alto, California, 2010. Roger C Mayer, James H. Davis, and David F Schoorman, "An Integrative Model of Organizational Trust," The Academy of Management Review, vol. 20, no. 3, pp. 709-734, July 1995. France Bélanger and Robert E Crossler, "MIS Quarterly," Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems, vol. 35, no. 4, pp. 1017-1041, December 2011. Robin Wilton, “Identity and privacy in the digital age”, Int. J. of Intellectual Property Management, vol. 2, no. 4, pp. 411-428, 2008.