1 / 21

Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

Overview of My PhD Research A Case for Implementation of Citizen Centric National Identity Management Systems. Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen. Ghana. People & Places. Research Questions. PhD Progress – Time Line. 11 Months Study Plan accepted

Download Presentation

Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Overview of My PhD ResearchA Case for Implementation of Citizen Centric National Identity Management Systems Joseph K. Adjei Supervisor: Associate Prof. Henning Olesen

  2. Ghana

  3. People & Places

  4. Research Questions

  5. PhD Progress – Time Line • 11 Months Study Plan accepted • 2 Conference papers co-authored introduced • 1 publication in a business journal • 1 Journal article co-authored • Offered Admission • Began Study Plan in Denmark • 2 Months Study Plan 2010 2011

  6. PhD Progress – Time Line • Analysis of Findings • Publish Findings • Second Stakeholder Forum • Focus group discussion • Organized a Stakeholder Workshop in Ghana • Secondary Uses of Personal Information • Commercialization of Personal Information • Attend e-ID Conference May - July 2012 Jan - April 2012 Aug - Nov 2012

  7. PhD Progress – Time Line • Submit Final Thesis • Revision of Thesis • Thesis - First Draft Jan - Feb 2012 Dec 2012 March 2013

  8. Preliminary Findings

  9. Joseph Adjei, Henning Olesen center for Communication, Media & Information technology (CMI) Aalborg University Copenhagen Sydhavnsgade 17, DK-2450 Copenhagen SV e-mails: adjei@cmi.aau.dk, olesen@cmi.aau.dk SECONDARY USES OF PERSONAL INFORMATION Technology, Policies & Regulatory Framework

  10. Major National Identity Management Schemes

  11. Examples of ID Cards in Ghana

  12. Issues and Challenges • Real time verification of credentials • No clear rules regarding access to information for secondary uses • Unreliable identity credentials – one person can hold more than one of a particular credential. • Focus is mainly on physical verification by the issuers. • Update of personal information when address or status changes • High level of illiteracy

  13. Why Stakeholder Workshop

  14. Discussion Questions Should there be a common national digital identity for Ghana? Who should act as issuer and as assurance authority? How can secure and differentiate civil information from commercial services. Should the government take the lead or should it be commercially driven? The division between a possible national identity system and credit cards Who should bear the costs and ?  How can citizens be convinced to use it? How can user trust and privacy be assured What new services or businesses that can be introduced based on a national identity systems

  15. Dimensions Of Privacy

  16. Secondary Uses of Personal Information Health Insurance Identity Verification Balance: Rs.1,000 e-Government Services Insurance, and other services

  17. Example of Online ID Verification System

  18. Proposed Online ID Verification System

  19. Preliminary Recommendations

  20. Thank you

  21. References Yin, R. K. (2009). Case Study Research: Design and Methods; (4 ed., Vol. 5). UK: Sage Eisenhardt, K. (1989). Building Theories From Case Study Research. The Academy of Management Review, 14 (4), pg. 532. Gephart, R. P. 2004. Qualitative research and the Academy of Management Journal. Academy of Management Journal, 47: 454–462. K Cameron. (2005) identityblog [Online] http://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf Ann Cavoukian, "The case for privacy-embedded laws of identity in the digital age”, 2008. RaffaeleZallone, "The Privacy Paradox or How I Learned to Have Rights that Never Quite Seem to Work," in AAAI Spring Symposium Series, Palo Alto, California, 2010. Roger C Mayer, James H. Davis, and David F Schoorman, "An Integrative Model of Organizational Trust," The Academy of Management Review, vol. 20, no. 3, pp. 709-734, July 1995. France Bélanger and Robert E Crossler, "MIS Quarterly," Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems, vol. 35, no. 4, pp. 1017-1041, December 2011. Robin Wilton, “Identity and privacy in the digital age”, Int. J. of Intellectual Property Management, vol. 2, no. 4, pp. 411-428, 2008.

More Related