269 research outputs found

    Legal Implications of E-Commerce: Basic Issues, Initiatives and Experiences in Asia

    Get PDF
    This paper gives a short overview on the major issues that have to be taken into account when formulating e-commerce-related laws and regulations and introduces two model laws relating to e-commerce and e-signatures which were created by the United Nations Commission of International trade Law. The paper has a closer look at e-commerce developments in Asia and the Pacific and gives an overview of the state of implementation of e-commerce laws. In conclusion, it discusses the e-ASEAN Reference Framework for electronic commerce legal infrastructure as example of a regional initiative to harmonize the legal basis for e-commerce.legal infrastructure, e-commerce laws, Asia, e-signature, e-ASEAN Reference Framework

    Data Ingredients: smart disclosure and open government data as complementary tools to meet policy objectives. The case of energy efficiency.

    Get PDF
    Open government data are considered a key asset for eGovernment. One could argue that governments can influence other types of data disclosure, as potential ingredients of innovative services. To discuss this assumption, we took the example of the U.S. 'Green Button' initiative โ€“ based on the disclosure of energy consumption data to each user โ€“ and analysed 36 energy-oriented digital services reusing these and other data, in order to highlight their set of inputs. We find that apps suggesting to a user a more efficient consumption behaviour also benefit from average retail electricity cost/price information; that energy efficiency 'scoring' apps also need, at least, structured and updated information on buildings performance; and that value-added services that derive insights from consumption data frequently rely on average energy consumption information. More in general, most of the surveyed services combine consumption data, open government data, and corporate data. When setting sector-specific agendas grounded on data disclosure, public agencies should therefore consider (contributing) to make available all three layers of information. No widely acknowledged initiatives of energy consumption data disclosure to users are being implemented in the EU. Moreover, browsing EU data portals and websites of public agencies, we find that other key data ingredients are not supplied (or, at least, not as open data), leaving room for possible improvements in this arena

    Improvement of DHRA-DMDC Physical Access Software DBIDS Using Cloud Computing Technology: a Case Study

    Get PDF
    The U.S government has created and been executing an Identity and Management (IdM) vision to support a global, robust, trusted and interoperable identity management capability that provides the ability to correctly identify individuals and non-person entities in support of DoD mission operations. Many Directives and Instructions have been issued to standardize the process to design, re-designed new and old systems with latest available technologies to meet the visions requirements. In this thesis we introduce a cloud-based architecture for the Defense Biometric Identification System (DBIDS), along with a set of DBIDS Cloud Services that supports the proposed architecture. This cloud-based architecture will move DBIDS in the right direction to meet Dod IdM visions and goals by decoupling current DBIDS functions into DBIDS core services to create interoperability and flexibility to expand future DBIDS with new requirements. The thesis will show its readers how DBIDS Cloud Services will help Defense Manpower Data Center (DMDC) easily expanding DBIDS functionalities such as connecting to other DMDC services or federated services for vetting purposes. This thesis will also serve as a recommendation of a blue-print for DBIDS architecture to support new generation of DBIDS application. This is a step closer in moving DMDC Identity Enterprise Solution toward DoD IdM realizing vision and goals. The thesis also includes a discussion of how to utilize virtualized DBIDS workstations to address software-deployment and maintenance issues to resolve configuration and deployment issues which have been costly problems for DMDC over the years.http://archive.org/details/improvementofdhr109457379Civilian, Department of Defens

    Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies

    Get PDF
    The recent boom in the Internet of Things (IoT) will turn Smart Cities and Smart Homes (SH) from hype to reality. SH is the major building block for Smart Cities and have long been a dream for decades, hobbyists in the late 1970s made Home Automation (HA) possible when personal computers started invading home spaces. While SH can share most of the IoT technologies, there are unique characteristics that make SH special. From the result of a recent research survey on SH and IoT technologies, this paper defines the major requirements for building SH. Seven unique requirement recommendations are defined and classified according to the specific quality of the SH building blocks

    Internet of Things-aided Smart Grid: Technologies, Architectures, Applications, Prototypes, and Future Research Directions

    Full text link
    Traditional power grids are being transformed into Smart Grids (SGs) to address the issues in existing power system due to uni-directional information flow, energy wastage, growing energy demand, reliability and security. SGs offer bi-directional energy flow between service providers and consumers, involving power generation, transmission, distribution and utilization systems. SGs employ various devices for the monitoring, analysis and control of the grid, deployed at power plants, distribution centers and in consumers' premises in a very large number. Hence, an SG requires connectivity, automation and the tracking of such devices. This is achieved with the help of Internet of Things (IoT). IoT helps SG systems to support various network functions throughout the generation, transmission, distribution and consumption of energy by incorporating IoT devices (such as sensors, actuators and smart meters), as well as by providing the connectivity, automation and tracking for such devices. In this paper, we provide a comprehensive survey on IoT-aided SG systems, which includes the existing architectures, applications and prototypes of IoT-aided SG systems. This survey also highlights the open issues, challenges and future research directions for IoT-aided SG systems

    Digital Identity Scheme

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ํ–‰์ •๋Œ€ํ•™์› ๊ธ€๋กœ๋ฒŒํ–‰์ •์ „๊ณต, 2023. 2. Junki Kim.๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ๋Š” ๋””์ง€ํ„ธ ์„œ๋น„์Šค์™€์˜ ์ƒํ˜ธ์ž‘์šฉ์—์„œ ๊ฐœ์ธ์„ ๊ณ ์œ ํ•˜๊ฒŒ ์ฐจ๋ณ„ํ™”ํ•˜๋Š” ์†์„ฑ์„ ์˜๋ฏธํ•œ๋‹ค. ๋”ฐ๋ผ์„œ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ „๋žต์€ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ๋ผ์ดํ”„์‚ฌ์ดํด์„ ๊ด€๋ฆฌํ•˜๋Š” ์ •์ฑ…, ๊ธฐ์ˆ , ์กฐ์ง ๋ฐ ํ”„๋กœ์„ธ์Šค์˜ ์ž˜ ์„ค๊ณ„๋œ ์ง‘ํ•ฉ์ฒด์ด๋‹ค. ์ด๋Š” ๋””์ง€ํ„ธ ๋ณ€ํ™˜์˜ ํ•„์ˆ˜ ์š”์†Œ์ด๋ฉฐ ๋””์ง€ํ„ธ ์‹ ๋ขฐ๋ฅผ ๊ฐ•ํ™”ํ•˜๊ธฐ ์œ„ํ•œ ํ•ต์‹ฌ ์š”์†Œ์ด๋‹ค. ๊ทธ๋Ÿฐ ๋งฅ๋ฝ์—์„œ, ์ด ๋…ผ๋ฌธ์€ ๊ตญ๊ฐ€ ์ฐจ์›์—์„œ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ฒด๊ณ„๋ฅผ ๊ด€๋ฆฌํ•˜๋Š” ๋ฐ ์žˆ์–ด ์–ด๋ ค์›€์„ ์ดํ•ดํ•˜๋Š” ๊ฒƒ์„ ๋ชฉํ‘œ๋กœ ํ•œ๋‹ค. ์ •ํ™•์„ฑ, ํฌ๊ด„์„ฑ, ์•ˆ์ „์„ฑ, ์‚ฌ์šฉ ๊ฐ€๋Šฅํ•œ ๋””์ง€ํ„ธ ID์˜ ์ด์ ์€ ๊ณต๊ณต ๋ฐ ๋ฏผ๊ฐ„ ๋ถ€๋ฌธ, ์•„์นด๋ฐ๋ฏธ ๋ฐ ๊ตญ์ œ ์กฐ์ง์— ์˜ํ•ด ๋„๋ฆฌ ์ธ์‹๋˜๊ณ  ์žˆ๋‹ค. ์ด์™€ ๋”๋ถˆ์–ด COVID-19์˜ ์„ธ๊ณ„์ ์ธ ํ™•์‚ฐ์œผ๋กœ ์ธํ•ด ์‚ฌํšŒ์  ๊ฑฐ๋ฆฌ๋‘๊ธฐ ์กฐ์น˜์™€ ๋น„๋Œ€๋ฉด ๊ฑฐ๋ž˜๊ฐ€ ์ฆ๊ฐ€ํ•˜๋ฉด์„œ, ์šฐ๋ฆฌ๋Š” ์ •๋ถ€์™€ ๊ธฐ์—…์— ์˜ํ•ด ๊ฐœ๋ฐœ๋˜๋Š” ๋””์ง€ํ„ธ ์ธ์ฆ ํ”Œ๋žซํผ์ด ๋ฐœ์ „ํ•˜๋Š” ๊ฒƒ์„ ๋ณผ ์ˆ˜ ์žˆ๋‹ค. ๊ทธ ๊ฒฐ๊ณผ, ๋Œ€ํ•œ๋ฏผ๊ตญ(์ดํ•˜ ํ•œ๊ตญ)๊ณผ ํŽ˜๋ฃจ์™€ ๊ฐ™์€ ๋‚˜๋ผ๋“ค์€ ํ•ธ๋“œํฐ, ์ธ๊ณต์ง€๋Šฅ, ๋น…๋ฐ์ดํ„ฐ, ์ƒํ˜ธ์šด์šฉ์„ฑ, ๋ฐ์ดํ„ฐ์„ผํ„ฐ์™€ ๊ฐ™์€ ๋ถ€์ƒํ•œ ๊ธฐ์ˆ ์„ ํ™œ์šฉํ•˜์—ฌ ์‹๋ณ„ ๋ฐ ์ธ์ฆ ํ”„๋กœ์„ธ์Šค์˜ ํšจ์œจ์„ฑ์„ ๋†’์ด๊ธฐ ์œ„ํ•ด ์„œ๋กœ ๋‹ค๋ฅธ ์ข…๋ฅ˜์˜ ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ์™€ ํ”Œ๋žซํผ์„ ๊ฐœ๋ฐœ, ์‹œํ–‰ํ•˜๊ณ  ์žˆ๋‹ค. ์ด์— ๋”ฐ๋ผ ํ˜„์žฌ๊นŒ์ง€ ์ •๋ถ€24๋ฅผ ์ „์ž์ •๋ถ€ ๊ณต์‹ํฌํ„ธ๋กœ, ๋””์ง€ํ„ธ์›ํŒจ์Šค(Digital ONEPASS)๋ฅผ ๋””์ง€ํ„ธ์ธ์ฆํ”Œ๋žซํผ์œผ๋กœ ๊ตฌํ˜„ํ•ด ์‹œ๋ฏผ ๋น„๋Œ€๋ฉด ์ธ์ฆ์ด ๊ฐ€๋Šฅํ•˜๋„๋ก ํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ฃผ๋ฏผ๋“ฑ๋ก์ œ๋„(RRS)๋„ ํ•œ๊ตญ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ œ๋„์˜ ํ•ต์‹ฌ์š”์†Œ๋กœ ์ž๋ฆฌ๋งค๊น€ํ•˜๊ณ  ์žˆ๋‹ค. ์ด์™€ ๋น„์Šทํ•˜๊ฒŒ ํŽ˜๋ฃจ์˜ ๊ฒฝ์šฐ ๊ธฐ์กด์˜ ์ „์ž์ •๋ถ€ ์ ‘๊ทผ ๋ฐฉ์‹์ด ๋””์ง€ํ„ธ ์ •๋ถ€๋ผ๋Š” ์ƒˆ๋กœ์šด ํŒจ๋Ÿฌ๋‹ค์ž„์œผ๋กœ ๋ณ€๋ชจํ•˜์˜€๋‹ค๋Š” ๊ฒƒ๊ณผ, ๋””์ง€ํ„ธ ๊ธฐ์ˆ ์€ ๋” ์ด์ƒ ๊ธฐ์ˆ ์  ๋ฌธ์ œ๊ฐ€ ์•„๋‹ˆ๋ผ ์ •์น˜, ๋ฒ•๋ฅ , ํ˜‘๋ ฅ์  ๋ฌธ์ œ๋ผ๋Š” ์ดํ•ด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ 2018๋…„ ๋””์ง€ํ„ธ ์ •๋ถ€๊ฐ€ ์ œ์ •๋˜์—ˆ๋‹ค. ๋””์ง€ํ„ธ ์ •์ฒด์„ฑ์„ ๊ฐ•ํ™”ํ•˜๊ธฐ ์œ„ํ•ด ๋‘ ๊ฐœ์˜ ๋””์ง€ํ„ธ ํ”Œ๋žซํผ์ด ์‹œํ–‰๋˜๊ณ  ์žˆ๋Š”๋ฐ, ํ•˜๋‚˜๋Š” ์‹œ๋ฏผ ์ง€ํ–ฅ์˜ ๋‹จ์ผ ๋””์ง€ํ„ธ ํ”Œ๋žซํผ(GOB.PE)์ด๋ฉฐ, ๋‹ค๋ฅธ ํ•˜๋‚˜๋Š” ๋””์ง€ํ„ธ ์‹ ์› ํ™•์ธ ๋ฐ ์ธ์ฆ์„ ์œ„ํ•œ ๊ตญ๊ฐ€ ํ”Œ๋žซํผ(ID)์ด๋‹ค. ๋‘ ํ”Œ๋žซํผ์€ ์ •๋ถ€์— ์˜ํ•ด ์œ ์ง€๋˜๊ณ  ๊ฐœ๋ฐœ๋œ๋‹ค. ์ด์ฒ˜๋Ÿผ ํ•œ๊ตญ๊ณผ ํŽ˜๋ฃจ์˜ ์ •์ฑ… ์‚ฌ์ด์— ์œ ์‚ฌ์ ์ด ์žˆ์ง€๋งŒ ๊ฒฐ๊ณผ๋Š” ๋‹ค๋ฅด๋‹ค. ์ „์ž์ •๋ถ€๊ฐœ๋ฐœ์ง€์ˆ˜(EDGI)์—์„œ ํ•œ๊ตญ์€ ์„ธ๊ณ„ 2์œ„, ํŽ˜๋ฃจ๋Š” 71์œ„, ํ•œ๊ตญ์€ ๋””์ง€ํ„ธ ์ธ์ฆ ํ”Œ๋žซํผ์ด ๊ตฌํ˜„๋˜์–ด ์žˆ๊ณ , ์ •๋ถ€24๋Š” ๋‹ค์–‘ํ•œ ์ธ์ฆ์„ ์‚ฌ์šฉํ•˜๊ณ  ์žˆ๋‹ค. ONE PASS, KAKAO, ์‚ผ์„ฑ PASS ๋“ฑ ์‹œ๋ฏผ์„ ์œ„ํ•œ ๊ฐ„ํŽธํ•˜๊ณ  ํŽธ๋ฆฌํ•œ ์ธ์ฆ ๋ฐฉ๋ฒ•์ด ์‚ฌ์šฉ๋œ๋‹ค. ๋˜ํ•œ 2021๋…„๊นŒ์ง€ ์ •๋ถ€24๋ฅผ ํ†ตํ•ด ์˜จ๋ผ์ธ์œผ๋กœ ์ ‘์ˆ˜๋œ ์ฒญ์›์€ 13202๋งŒ 5035๊ฑด์— ๋‹ฌํ•˜๋ฉฐ, ์ฆ๋ช…์„œ์™€ ๋ฌธ์„œ๋Š” ์‹œ๋ฏผ์ด ์ง์ ‘ ํ”„๋ฆฐํ„ฐ๋ฅผ ํ†ตํ•ด ์ถœ๋ ฅํ–ˆ๋‹ค. ํŽ˜๋ฃจ์˜ ๊ฒฝ์šฐ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ „๋žต์€ ๋””์ง€ํ„ธ ์ •๋ถ€๋ฒ•์ด ๊ทœ์ œํ•˜๋Š” ๊ณต๊ณต๋ถ€๋ฌธ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ํ”„๋ ˆ์ž„์›Œํฌ๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ์ •๋ถ€๊ฐ€ ๊ธฐ๋ณธ์ ์œผ๋กœ ์ฃผ๋„ํ•˜๋Š” ์ง„ํ–‰ํ˜• ํ”„๋กœ์„ธ์Šค๋‹ค. ๋”ฐ๋ผ์„œ, ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ํ•œ๊ตญ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ „๋žต์ด ๊ฐœ์ธ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ์˜ ์ •ํ™•์„ฑ, ํฌ๊ด„์„ฑ, ๋ณด์•ˆ์„ฑ ๋ฐ ์‚ฌ์šฉ์„ฑ์„ ๊ฐ•ํ™”ํ•˜๊ธฐ ์œ„ํ•ด ์–ด๋–ค ์„ฑ๊ณผ๋ฅผ ๋‚ด๊ณ  ์žˆ๋Š”์ง€ ์ค‘์ ์ ์œผ๋กœ ์‚ดํŽด๋ณด๋ ค๊ณ  ํ•œ๋‹ค. ์šฐ๋ฆฌ๋Š” ์œ ์—”๊ณผ ๊ฒฝ์ œํ˜‘๋ ฅ๊ฐœ๋ฐœ๊ธฐ๊ตฌ(OECD)๊ฐ€ ์‚ฌ์šฉํ•˜๋Š” ํ”„๋ ˆ์ž„์›Œํฌ๋ฅผ ์ ์šฉํ•œ ๋น„๊ต ํ”„๋ ˆ์ž„์›Œํฌ๋ฅผ ํ™œ์šฉํ•ด ์œ ์‚ฌ์ ๊ณผ ์ฐจ์ด์ ์„ ๊ทœ๋ช…ํ•  ์˜ˆ์ •์ด๋‹ค. ํ•œ๊ตญ๊ณผ ํŽ˜๋ฃจ์˜ ๋น„๊ต ์—ฐ๊ตฌ๋ฅผ ์ˆ˜ํ–‰ํ•˜๋Š” ์‹œ์˜์ ์ ˆํ•˜๋‹ค. ์™œ๋ƒํ•˜๋ฉด ํŽ˜๋ฃจ๋Š” ํ•œ๊ตญ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ œ๋„์˜ ๋ชจ๋ฒ” ์‚ฌ๋ก€์™€ ์ข‹์€ ๊ตํ›ˆ์„ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๊ณ  ๋” ๋‚˜์€ ์ •์ฑ…๊ณผ ๊ฒฐ์ •์„ ์„ค๊ณ„ํ•  ์ˆ˜ ์žˆ๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ํ•œ๊ตญ๊ณผ ํŽ˜๋ฃจ์˜ ICT ์ „๋ฌธ๊ฐ€์™€ ์˜จ๋ผ์ธ ์ธํ„ฐ๋ทฐ๋ฅผ ํ†ตํ•ด ์–‘๊ตญ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ฒด๊ณ„์— ๋Œ€ํ•œ ์‹ฌ์ธต์ ์ธ ์ดํ•ด๋ฅผ ์ฐฝ์ถœํ•˜๋Š” ์ •์„ฑ์  ์—ฐ๊ตฌ ๋ฐฉ๋ฒ•์„ ํ™œ์šฉํ•˜์˜€๋‹ค. ์ด 10๋ช…์˜ ์ „๋ฌธ๊ฐ€๋ฅผ ์ธํ„ฐ๋ทฐํ–ˆ๋Š”๋ฐ, ์ „๋ฌธ๊ฐ€์™€์˜ ์ธํ„ฐ๋ทฐ๋Š” ํ•œ๊ตญ๊ณผ ํŽ˜๋ฃจ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ง„ํ™”์— ๋Œ€ํ•œ ๊ฐœ์š”๋ฅผ ์ œ๊ณตํ•˜๊ณ  ํŽ˜๋ฃจ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ œ๋„ ๊ตฌํ˜„ ๊ณผ์ •์—์„œ ๋ฐœ์ƒํ•˜๋Š” ๊ณผ์ œ๋ฅผ ์‹๋ณ„ํ•  ์ˆ˜ ์žˆ๋‹ค. ๋””์ง€ํ„ธ ๊ณต๊ณต ์„œ๋น„์Šค์˜ ๊ฐœ๋ฐœ ๋ฐ ์ œ๊ณต์„ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•œ ๊ฐ•๋ ฅํ•˜๊ณ  ์ง€์†์ ์ธ ๋””์ง€ํ„ธ ๋ฆฌ๋”์‹ญ, ์‹œ์˜์ ์ ˆํ•œ ๋ฒ•์  ํ”„๋ ˆ์ž„์›Œํฌ, ํ˜„๋Œ€ ICT ๊ธฐ์ˆ ์ด๋ผ๋Š” ์„ธ ๊ฐ€์ง€ ์š”์†Œ์—์„œ ํฐ ์ฐจ์ด๊ฐ€ ๋‚˜ํƒ€๋‚ฌ์Œ์„ ์•Œ ์ˆ˜ ์žˆ์—ˆ๋‹ค. ํ•˜์ง€๋งŒ ์ด ์—ฐ๊ตฌ๊ฒฐ๊ณผ๋Š” ๋˜ํ•œ ํŽ˜๋ฃจ์—์„œ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ƒํƒœ๊ณ„๋ฅผ ์กฐ์„ฑํ•˜๊ธฐ ์œ„ํ•œ ๋ชฉ์ ์œผ๋กœ ์ œ๋„์  ์ •๋น„๋ฅผ ํ•˜๊ณ , ๊ทœ์ œ๋ฅผ ๊ฐœ์„ ํ•˜๋ฉฐ, ์˜ˆ์‚ฐ์„ ์ตœ์ ํ™”ํ•œ๋‹ค๋ฉด ํฐ ์„ฑ๊ณผ๋ฅผ ์–ป์„ ์ˆ˜ ์žˆ์Œ์„ ์‹œ์‚ฌํ•œ๋‹ค. ์ฃผ์š” ํ‚ค์›Œ๋“œ: ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ, ๋””์ง€ํ„ธ ์ •๋ถ€, ๋””์ง€ํ„ธ ๋ณ€ํ™˜, ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ „๋žตDigital identity is the collection of attributes that uniquely differentiates a person in his interaction with digital services. The literature and previous research suggest that it is an essential component to the digital transformation and a vital element for strengthening the digital trust. Currently, due to worldwide spread of COVID-19, which has accelerated the digital transition in the public and private sector, the non-face-to-face transactions have been increased, coupled with cybercrimes such as identity theft, private data leakage, fraud, among other cybercrimes. In this sense, governments should become aware of the importance of digital identity management, because it is increasingly embedded in everything we do in our digital and offline life (WEF, Identity in the Digital World a new chapter in the social contract, 2018, p. 9). To deal with those issues and leverage all the potential of digital identity at national level, many countries implement a Digital Identity Scheme, which is a well-designed and articulated collection of policies, business rules, technologies, organizations, and processes in charge of governing the digital identity lifecycle to promote a digital society. Hence, countries such as The Republic of Korea (hereinafter, Korea) and The Republic of Peru (hereinafter, Peru) have been developed and implemented different kind of policies, legal instruments, initiatives, and digital technologies to enhance accessibility, efficiency and security of the identification and authentication process, for instance, Korea has issued the Electronic Government Law and implemented cross-platforms such as Government24 (์ •๋ถ€24) as official electronic government portal, Digital ONEPASS (๋””์ง€ํ„ธ์›ํŒจ์Šค) as a digital authentication platform to enable a convenient no-face-to-face authentication of the citizens, Resident Registration System (RRS), as a fundamental national information system which manages and stores relevant personal information of Koreans, and Sharing Information System (ํ–‰์ •์ •๋ณด๊ณต๋™์ด์šฉ์‹œ์Šคํ…œ), as a interoperability platform to exchange information with governmental agencies. Moreover, Korea has a PKI Scheme which is divided into a National Public Key Infrastructure (NPKI), and a Government Public Key Infrastructure (GPKI). All these regulations, technologies and platforms are vital elements of the Korean Digital Identity Scheme. In the case of Peru, based on Law Nยฐ 26497 enacted in 1995, the government has been managing and maintaining the National Identification Registry of Peruvian. Moreover, since issuance of Digital Government Law in 2018, Peru has been implemented different kind of cross-platforms such as the Single Digital Platform for Citizen Orientation (GOB.PE), to offer one point of contact between government and citizens, National Interoperability Platform, to promote information exchange among public entities, the National Digital Government Platform, to provide cloud services to the public entities, and National Platform for Identification and Authentication of Digital Identity (ID.GOB.PE), to verify a persons identity. Although there are similarities, the outcomes are different, in the Electronic Government Development Index 2022, Korea is ranked 3rd in the world, while Peru is ranked 59th, from another side, in terms of digital identity, Korea has a digital identity ecosystem operating, for instance Government24 accepts several authentication methods which are easily and conveniently for the citizens such as ONEPASS, KAKAO, Samsung PASS, among others (MOIS, Status of Government 24, 2022). To 2021, almost 132,025,035 petitions were filed online through Government24 (MOIS, Status of Government 24, 2022). In the case of Peru, the digital identity scheme is an ongoing project, which is leading basically by the government, based on the Digital Government Law and its enforcement decree. In that vein, this research aims at understanding the components for governing and managing a Digital Identity Scheme in Korea and Peru and identifying the gap between them. Therefore, in this study we are going to focus on how the Digital Identity Scheme of Korea is performing to strengthen accuracy, inclusiveness, security, and usability of digital identity of persons. We are going to establish the similarities and differences by using a comparison framework which is an adaptation of the frameworks used by the United Nations (UN), International Telecommunication Union (UIT) and Organization for Economic Cooperation and Development (OECD). Additionally, in this moment, undertaking a comparison study between Korea and Peru is a relevant work, because Peru is implementing transversal digital government platforms based on the Digital Government Law, and based on that we are dealing with cybercrimes and digital threats, that is why we can learn of the best practices and good lessons of the Digital Identity Scheme in Korea and design better policies and decisions for Peruvian implementation. This research was carried out by using a qualitative research method which involved online interviews with ICT specialists from Korea and Peru to generate an in-depth understanding of the digital identity scheme of both countries. A total of ten specialists were interviewed. Interviews provide an overview of the digital identity evolution in Korea and allow me to identify challenges and policy recommendations in the implementation process of Digital Identity Scheme in Peru. Based on the results the big differences are integrated in three factors: strong and continuous digital leadership, timely legal framework, and modern ICT technology to support development and public services rendering. However, the results also suggest that it is possible to get big achievements on the Digital Identity Scheme in Peru, making institutional arrangements, enhancing digital regulation and optimizing the budget with the purpose to create a sustainable digital identity ecosystem.ABSTRACT 5 LIST OF ABBREVIATIONS 9 LIST OF TABLES 9 CHAPTER 1: INTRODUCTION 12 1.1 STUDY BACKGROUND 12 1.2 BACKGROUND OF THE COUNTRIES 20 1.3 THEORETICAL BACKGROUND 27 1.4 PURPOSE OF THE RESEARCH 39 CHAPTER 2. KEY CONCEPTS AND FRAMEWORK 43 CHAPTER 3: LITERATURE REVIEW 77 CHAPTER 4: DIGITAL IDENTITY IN KOREA AND PERU 86 4.1 LEGAL FRAMEWORK 86 4.2 TECHNOLOGY 100 4.3 GOVERNANCE AND LEADERSHIP 116 4.4 BUDGET 120 4.5 MARKET 122 4.6 FINDINGS 122 CHAPTER 5: CONCLUSIONS 132 5.1 SUMMARY OF THE THESIS 132 5.2 POLICY COMPARISON 143 5.3 POLICY RECOMMENDATIONS 145 5.4 LIMITATIONS OF THE RESEARCH 150 REFERENCES 152 APPENDICES 158 APPENDIX 1. QUESTIONNAIRE 158 APPENDIX 2. MATRIZ OF COMPARISON 167์„

    ILO Convention 185 on seafarers\u27 identity document thirteen years after entering into force: analysing implementation challenges and future outlook

    Get PDF

    Federated identity architecture of the european eID system

    Get PDF
    Federated identity management is a method that facilitates management of identity processes and policies among the collaborating entities without a centralized control. Nowadays, there are many federated identity solutions, however, most of them covers different aspects of the identification problem, solving in some cases specific problems. Thus, none of these initiatives has consolidated as a unique solution and surely it will remain like that in a near future. To assist users choosing a possible solution, we analyze different federated identify approaches, showing main features, and making a comparative study among them. The former problem is even worst when multiple organizations or countries already have legacy eID systems, as it is the case of Europe. In this paper, we also present the European eID solution, a purely federated identity system that aims to serve almost 500 million people and that could be extended in midterm also to eID companies. The system is now being deployed at the EU level and we present the basic architecture and evaluate its performance and scalability, showing that the solution is feasible from the point of view of performance while keeping security constrains in mind. The results show a good performance of the solution in local, organizational, and remote environments

    GridWise Standards Mapping Overview

    Full text link
    • โ€ฆ
    corecore