7,926 research outputs found

    City networks in cyberspace and time : using Google hyperlinks to measure global economic and environmental crises

    Get PDF
    Geographers and social scientists have long been interested in ranking and classifying the cities of the world. The cutting edge of this research is characterized by a recognition of the crucial importance of information and, specifically, ICTs to citiesโ€™ positions in the current Knowledge Economy. This chapter builds on recent โ€œcyberspaceโ€ analyses of the global urban system by arguing for, and demonstrating empirically, the value of Web search engine data as a means of understanding cities as situated within, and constituted by, flows of digital information. To this end, we show how the Google search engine can be used to specify a dynamic, informational classification of North American cities based on both the production and the consumption of Web information about two prominent current issues global in scope: the global financial crisis, and global climate change

    Always in control? Sovereign states in cyberspace

    Get PDF
    For well over twenty years, we have witnessed an intriguing debate about the nature of cyberspace. Used for everything from communication to commerce, it has transformed the way individuals and societies live. But how has it impacted the sovereignty of states? An initial wave of scholars argued that it had dramatically diminished centralised control by states, helped by a tidal wave of globalisation and freedom. These libertarian claims were considerable. More recently, a new wave of writing has argued that states have begun to recover control in cyberspace, focusing on either the police work of authoritarian regimes or the revelations of Edward Snowden. Both claims were wide of the mark. By contrast, this article argues that we have often misunderstood the materiality of cyberspace and its consequences for control. It not only challenges the libertarian narrative of freedom, it suggests that the anarchic imaginary of the Internet as a โ€˜Wild Westโ€™ was deliberately promoted by states in order to distract from the reality. The Internet, like previous forms of electronic connectivity, consists mostly of a physical infrastructure located in specific geographies and jurisdictions. Rather than circumscribing sovereignty, it has offered centralised authority new ways of conducting statecraft. Indeed, the Internet, high-speed computing, and voice recognition were all the result of security research by a single information hegemon and therefore it has always been in control

    Anรกlisis comparativo entre el esquema de identidad digital de Perรบ y Corea del Sur enfocado en la identificaciรณn y autenticaciรณn de personas naturales

    Get PDF
    Digital identity is a collection of attributes that uniquely differentiate a person in their interaction with digital services. Literature and previous research suggest that it is an essential component in Digital Transformation and a vital element to strengthen digital trust. In that sense, governments should become aware of the importance of digital identity management, because it is embedded in almost everything we do outside and inside the digital environment. Consistent with the above, both the Republic of South Korea and the Republic of Peru have developed and implemented different policies, legal instruments, initiatives, digital technologies and data to manage people's digital identity. Although there are similarities between both schemes, there are different results in digital matters. Therefore, this study seeks to identify the components that have allowed South Korea to implement and maintain an inclusive, reliable and secure Digital Identity Scheme for the identification and authentication of people.La identidad digital es una colecciรณn de atributos que diferencian de manera รบnica a una persona en su interacciรณn con los servicios digitales. La literatura y previas investigaciones sugieren que es un componente esencial en la Transformaciรณn Digital y vital elemento para fortalecer la confianza digital. En ese sentido, los gobiernos deberรญan tomar conciencia de la importancia de la gestiรณn de la identidad digital, debido a que esta embebida en casi todo lo que hacemos fuera y dentro del entorno digital. Consistente con lo anterior, tanto la Repรบblica de Corea del Sur y la Republica del Perรบ han desarrollado e implementado diferentes polรญticas, instrumentos legales, iniciativas, tecnologรญas digitales y datos para gestionar la identidad digital de las personas. Aunque existen similitudes entre ambos esquemas, existen diferentes resultados en materia digital. Por lo expresado, este estudio busca identificar los componentes que han permitido a Corea del Sur implementar y mantener un Esquema de Identidad Digital inclusivo, confiable y seguro para la identificaciรณn y autenticaciรณn de personas.Corea del Sur. Korean Government. Capacity Improvement & Advancement for Tomorrow scholarship (CIAT)Tesi

    Digital Identity Scheme

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ํ–‰์ •๋Œ€ํ•™์› ๊ธ€๋กœ๋ฒŒํ–‰์ •์ „๊ณต, 2023. 2. Junki Kim.๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ๋Š” ๋””์ง€ํ„ธ ์„œ๋น„์Šค์™€์˜ ์ƒํ˜ธ์ž‘์šฉ์—์„œ ๊ฐœ์ธ์„ ๊ณ ์œ ํ•˜๊ฒŒ ์ฐจ๋ณ„ํ™”ํ•˜๋Š” ์†์„ฑ์„ ์˜๋ฏธํ•œ๋‹ค. ๋”ฐ๋ผ์„œ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ „๋žต์€ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ๋ผ์ดํ”„์‚ฌ์ดํด์„ ๊ด€๋ฆฌํ•˜๋Š” ์ •์ฑ…, ๊ธฐ์ˆ , ์กฐ์ง ๋ฐ ํ”„๋กœ์„ธ์Šค์˜ ์ž˜ ์„ค๊ณ„๋œ ์ง‘ํ•ฉ์ฒด์ด๋‹ค. ์ด๋Š” ๋””์ง€ํ„ธ ๋ณ€ํ™˜์˜ ํ•„์ˆ˜ ์š”์†Œ์ด๋ฉฐ ๋””์ง€ํ„ธ ์‹ ๋ขฐ๋ฅผ ๊ฐ•ํ™”ํ•˜๊ธฐ ์œ„ํ•œ ํ•ต์‹ฌ ์š”์†Œ์ด๋‹ค. ๊ทธ๋Ÿฐ ๋งฅ๋ฝ์—์„œ, ์ด ๋…ผ๋ฌธ์€ ๊ตญ๊ฐ€ ์ฐจ์›์—์„œ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ฒด๊ณ„๋ฅผ ๊ด€๋ฆฌํ•˜๋Š” ๋ฐ ์žˆ์–ด ์–ด๋ ค์›€์„ ์ดํ•ดํ•˜๋Š” ๊ฒƒ์„ ๋ชฉํ‘œ๋กœ ํ•œ๋‹ค. ์ •ํ™•์„ฑ, ํฌ๊ด„์„ฑ, ์•ˆ์ „์„ฑ, ์‚ฌ์šฉ ๊ฐ€๋Šฅํ•œ ๋””์ง€ํ„ธ ID์˜ ์ด์ ์€ ๊ณต๊ณต ๋ฐ ๋ฏผ๊ฐ„ ๋ถ€๋ฌธ, ์•„์นด๋ฐ๋ฏธ ๋ฐ ๊ตญ์ œ ์กฐ์ง์— ์˜ํ•ด ๋„๋ฆฌ ์ธ์‹๋˜๊ณ  ์žˆ๋‹ค. ์ด์™€ ๋”๋ถˆ์–ด COVID-19์˜ ์„ธ๊ณ„์ ์ธ ํ™•์‚ฐ์œผ๋กœ ์ธํ•ด ์‚ฌํšŒ์  ๊ฑฐ๋ฆฌ๋‘๊ธฐ ์กฐ์น˜์™€ ๋น„๋Œ€๋ฉด ๊ฑฐ๋ž˜๊ฐ€ ์ฆ๊ฐ€ํ•˜๋ฉด์„œ, ์šฐ๋ฆฌ๋Š” ์ •๋ถ€์™€ ๊ธฐ์—…์— ์˜ํ•ด ๊ฐœ๋ฐœ๋˜๋Š” ๋””์ง€ํ„ธ ์ธ์ฆ ํ”Œ๋žซํผ์ด ๋ฐœ์ „ํ•˜๋Š” ๊ฒƒ์„ ๋ณผ ์ˆ˜ ์žˆ๋‹ค. ๊ทธ ๊ฒฐ๊ณผ, ๋Œ€ํ•œ๋ฏผ๊ตญ(์ดํ•˜ ํ•œ๊ตญ)๊ณผ ํŽ˜๋ฃจ์™€ ๊ฐ™์€ ๋‚˜๋ผ๋“ค์€ ํ•ธ๋“œํฐ, ์ธ๊ณต์ง€๋Šฅ, ๋น…๋ฐ์ดํ„ฐ, ์ƒํ˜ธ์šด์šฉ์„ฑ, ๋ฐ์ดํ„ฐ์„ผํ„ฐ์™€ ๊ฐ™์€ ๋ถ€์ƒํ•œ ๊ธฐ์ˆ ์„ ํ™œ์šฉํ•˜์—ฌ ์‹๋ณ„ ๋ฐ ์ธ์ฆ ํ”„๋กœ์„ธ์Šค์˜ ํšจ์œจ์„ฑ์„ ๋†’์ด๊ธฐ ์œ„ํ•ด ์„œ๋กœ ๋‹ค๋ฅธ ์ข…๋ฅ˜์˜ ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ์™€ ํ”Œ๋žซํผ์„ ๊ฐœ๋ฐœ, ์‹œํ–‰ํ•˜๊ณ  ์žˆ๋‹ค. ์ด์— ๋”ฐ๋ผ ํ˜„์žฌ๊นŒ์ง€ ์ •๋ถ€24๋ฅผ ์ „์ž์ •๋ถ€ ๊ณต์‹ํฌํ„ธ๋กœ, ๋””์ง€ํ„ธ์›ํŒจ์Šค(Digital ONEPASS)๋ฅผ ๋””์ง€ํ„ธ์ธ์ฆํ”Œ๋žซํผ์œผ๋กœ ๊ตฌํ˜„ํ•ด ์‹œ๋ฏผ ๋น„๋Œ€๋ฉด ์ธ์ฆ์ด ๊ฐ€๋Šฅํ•˜๋„๋ก ํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ฃผ๋ฏผ๋“ฑ๋ก์ œ๋„(RRS)๋„ ํ•œ๊ตญ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ œ๋„์˜ ํ•ต์‹ฌ์š”์†Œ๋กœ ์ž๋ฆฌ๋งค๊น€ํ•˜๊ณ  ์žˆ๋‹ค. ์ด์™€ ๋น„์Šทํ•˜๊ฒŒ ํŽ˜๋ฃจ์˜ ๊ฒฝ์šฐ ๊ธฐ์กด์˜ ์ „์ž์ •๋ถ€ ์ ‘๊ทผ ๋ฐฉ์‹์ด ๋””์ง€ํ„ธ ์ •๋ถ€๋ผ๋Š” ์ƒˆ๋กœ์šด ํŒจ๋Ÿฌ๋‹ค์ž„์œผ๋กœ ๋ณ€๋ชจํ•˜์˜€๋‹ค๋Š” ๊ฒƒ๊ณผ, ๋””์ง€ํ„ธ ๊ธฐ์ˆ ์€ ๋” ์ด์ƒ ๊ธฐ์ˆ ์  ๋ฌธ์ œ๊ฐ€ ์•„๋‹ˆ๋ผ ์ •์น˜, ๋ฒ•๋ฅ , ํ˜‘๋ ฅ์  ๋ฌธ์ œ๋ผ๋Š” ์ดํ•ด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ 2018๋…„ ๋””์ง€ํ„ธ ์ •๋ถ€๊ฐ€ ์ œ์ •๋˜์—ˆ๋‹ค. ๋””์ง€ํ„ธ ์ •์ฒด์„ฑ์„ ๊ฐ•ํ™”ํ•˜๊ธฐ ์œ„ํ•ด ๋‘ ๊ฐœ์˜ ๋””์ง€ํ„ธ ํ”Œ๋žซํผ์ด ์‹œํ–‰๋˜๊ณ  ์žˆ๋Š”๋ฐ, ํ•˜๋‚˜๋Š” ์‹œ๋ฏผ ์ง€ํ–ฅ์˜ ๋‹จ์ผ ๋””์ง€ํ„ธ ํ”Œ๋žซํผ(GOB.PE)์ด๋ฉฐ, ๋‹ค๋ฅธ ํ•˜๋‚˜๋Š” ๋””์ง€ํ„ธ ์‹ ์› ํ™•์ธ ๋ฐ ์ธ์ฆ์„ ์œ„ํ•œ ๊ตญ๊ฐ€ ํ”Œ๋žซํผ(ID)์ด๋‹ค. ๋‘ ํ”Œ๋žซํผ์€ ์ •๋ถ€์— ์˜ํ•ด ์œ ์ง€๋˜๊ณ  ๊ฐœ๋ฐœ๋œ๋‹ค. ์ด์ฒ˜๋Ÿผ ํ•œ๊ตญ๊ณผ ํŽ˜๋ฃจ์˜ ์ •์ฑ… ์‚ฌ์ด์— ์œ ์‚ฌ์ ์ด ์žˆ์ง€๋งŒ ๊ฒฐ๊ณผ๋Š” ๋‹ค๋ฅด๋‹ค. ์ „์ž์ •๋ถ€๊ฐœ๋ฐœ์ง€์ˆ˜(EDGI)์—์„œ ํ•œ๊ตญ์€ ์„ธ๊ณ„ 2์œ„, ํŽ˜๋ฃจ๋Š” 71์œ„, ํ•œ๊ตญ์€ ๋””์ง€ํ„ธ ์ธ์ฆ ํ”Œ๋žซํผ์ด ๊ตฌํ˜„๋˜์–ด ์žˆ๊ณ , ์ •๋ถ€24๋Š” ๋‹ค์–‘ํ•œ ์ธ์ฆ์„ ์‚ฌ์šฉํ•˜๊ณ  ์žˆ๋‹ค. ONE PASS, KAKAO, ์‚ผ์„ฑ PASS ๋“ฑ ์‹œ๋ฏผ์„ ์œ„ํ•œ ๊ฐ„ํŽธํ•˜๊ณ  ํŽธ๋ฆฌํ•œ ์ธ์ฆ ๋ฐฉ๋ฒ•์ด ์‚ฌ์šฉ๋œ๋‹ค. ๋˜ํ•œ 2021๋…„๊นŒ์ง€ ์ •๋ถ€24๋ฅผ ํ†ตํ•ด ์˜จ๋ผ์ธ์œผ๋กœ ์ ‘์ˆ˜๋œ ์ฒญ์›์€ 13202๋งŒ 5035๊ฑด์— ๋‹ฌํ•˜๋ฉฐ, ์ฆ๋ช…์„œ์™€ ๋ฌธ์„œ๋Š” ์‹œ๋ฏผ์ด ์ง์ ‘ ํ”„๋ฆฐํ„ฐ๋ฅผ ํ†ตํ•ด ์ถœ๋ ฅํ–ˆ๋‹ค. ํŽ˜๋ฃจ์˜ ๊ฒฝ์šฐ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ „๋žต์€ ๋””์ง€ํ„ธ ์ •๋ถ€๋ฒ•์ด ๊ทœ์ œํ•˜๋Š” ๊ณต๊ณต๋ถ€๋ฌธ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ํ”„๋ ˆ์ž„์›Œํฌ๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ์ •๋ถ€๊ฐ€ ๊ธฐ๋ณธ์ ์œผ๋กœ ์ฃผ๋„ํ•˜๋Š” ์ง„ํ–‰ํ˜• ํ”„๋กœ์„ธ์Šค๋‹ค. ๋”ฐ๋ผ์„œ, ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ํ•œ๊ตญ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ „๋žต์ด ๊ฐœ์ธ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ์˜ ์ •ํ™•์„ฑ, ํฌ๊ด„์„ฑ, ๋ณด์•ˆ์„ฑ ๋ฐ ์‚ฌ์šฉ์„ฑ์„ ๊ฐ•ํ™”ํ•˜๊ธฐ ์œ„ํ•ด ์–ด๋–ค ์„ฑ๊ณผ๋ฅผ ๋‚ด๊ณ  ์žˆ๋Š”์ง€ ์ค‘์ ์ ์œผ๋กœ ์‚ดํŽด๋ณด๋ ค๊ณ  ํ•œ๋‹ค. ์šฐ๋ฆฌ๋Š” ์œ ์—”๊ณผ ๊ฒฝ์ œํ˜‘๋ ฅ๊ฐœ๋ฐœ๊ธฐ๊ตฌ(OECD)๊ฐ€ ์‚ฌ์šฉํ•˜๋Š” ํ”„๋ ˆ์ž„์›Œํฌ๋ฅผ ์ ์šฉํ•œ ๋น„๊ต ํ”„๋ ˆ์ž„์›Œํฌ๋ฅผ ํ™œ์šฉํ•ด ์œ ์‚ฌ์ ๊ณผ ์ฐจ์ด์ ์„ ๊ทœ๋ช…ํ•  ์˜ˆ์ •์ด๋‹ค. ํ•œ๊ตญ๊ณผ ํŽ˜๋ฃจ์˜ ๋น„๊ต ์—ฐ๊ตฌ๋ฅผ ์ˆ˜ํ–‰ํ•˜๋Š” ์‹œ์˜์ ์ ˆํ•˜๋‹ค. ์™œ๋ƒํ•˜๋ฉด ํŽ˜๋ฃจ๋Š” ํ•œ๊ตญ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ œ๋„์˜ ๋ชจ๋ฒ” ์‚ฌ๋ก€์™€ ์ข‹์€ ๊ตํ›ˆ์„ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๊ณ  ๋” ๋‚˜์€ ์ •์ฑ…๊ณผ ๊ฒฐ์ •์„ ์„ค๊ณ„ํ•  ์ˆ˜ ์žˆ๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ํ•œ๊ตญ๊ณผ ํŽ˜๋ฃจ์˜ ICT ์ „๋ฌธ๊ฐ€์™€ ์˜จ๋ผ์ธ ์ธํ„ฐ๋ทฐ๋ฅผ ํ†ตํ•ด ์–‘๊ตญ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ฒด๊ณ„์— ๋Œ€ํ•œ ์‹ฌ์ธต์ ์ธ ์ดํ•ด๋ฅผ ์ฐฝ์ถœํ•˜๋Š” ์ •์„ฑ์  ์—ฐ๊ตฌ ๋ฐฉ๋ฒ•์„ ํ™œ์šฉํ•˜์˜€๋‹ค. ์ด 10๋ช…์˜ ์ „๋ฌธ๊ฐ€๋ฅผ ์ธํ„ฐ๋ทฐํ–ˆ๋Š”๋ฐ, ์ „๋ฌธ๊ฐ€์™€์˜ ์ธํ„ฐ๋ทฐ๋Š” ํ•œ๊ตญ๊ณผ ํŽ˜๋ฃจ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ง„ํ™”์— ๋Œ€ํ•œ ๊ฐœ์š”๋ฅผ ์ œ๊ณตํ•˜๊ณ  ํŽ˜๋ฃจ์˜ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ œ๋„ ๊ตฌํ˜„ ๊ณผ์ •์—์„œ ๋ฐœ์ƒํ•˜๋Š” ๊ณผ์ œ๋ฅผ ์‹๋ณ„ํ•  ์ˆ˜ ์žˆ๋‹ค. ๋””์ง€ํ„ธ ๊ณต๊ณต ์„œ๋น„์Šค์˜ ๊ฐœ๋ฐœ ๋ฐ ์ œ๊ณต์„ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•œ ๊ฐ•๋ ฅํ•˜๊ณ  ์ง€์†์ ์ธ ๋””์ง€ํ„ธ ๋ฆฌ๋”์‹ญ, ์‹œ์˜์ ์ ˆํ•œ ๋ฒ•์  ํ”„๋ ˆ์ž„์›Œํฌ, ํ˜„๋Œ€ ICT ๊ธฐ์ˆ ์ด๋ผ๋Š” ์„ธ ๊ฐ€์ง€ ์š”์†Œ์—์„œ ํฐ ์ฐจ์ด๊ฐ€ ๋‚˜ํƒ€๋‚ฌ์Œ์„ ์•Œ ์ˆ˜ ์žˆ์—ˆ๋‹ค. ํ•˜์ง€๋งŒ ์ด ์—ฐ๊ตฌ๊ฒฐ๊ณผ๋Š” ๋˜ํ•œ ํŽ˜๋ฃจ์—์„œ ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ƒํƒœ๊ณ„๋ฅผ ์กฐ์„ฑํ•˜๊ธฐ ์œ„ํ•œ ๋ชฉ์ ์œผ๋กœ ์ œ๋„์  ์ •๋น„๋ฅผ ํ•˜๊ณ , ๊ทœ์ œ๋ฅผ ๊ฐœ์„ ํ•˜๋ฉฐ, ์˜ˆ์‚ฐ์„ ์ตœ์ ํ™”ํ•œ๋‹ค๋ฉด ํฐ ์„ฑ๊ณผ๋ฅผ ์–ป์„ ์ˆ˜ ์žˆ์Œ์„ ์‹œ์‚ฌํ•œ๋‹ค. ์ฃผ์š” ํ‚ค์›Œ๋“œ: ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ, ๋””์ง€ํ„ธ ์ •๋ถ€, ๋””์ง€ํ„ธ ๋ณ€ํ™˜, ๋””์ง€ํ„ธ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ „๋žตDigital identity is the collection of attributes that uniquely differentiates a person in his interaction with digital services. The literature and previous research suggest that it is an essential component to the digital transformation and a vital element for strengthening the digital trust. Currently, due to worldwide spread of COVID-19, which has accelerated the digital transition in the public and private sector, the non-face-to-face transactions have been increased, coupled with cybercrimes such as identity theft, private data leakage, fraud, among other cybercrimes. In this sense, governments should become aware of the importance of digital identity management, because it is increasingly embedded in everything we do in our digital and offline life (WEF, Identity in the Digital World a new chapter in the social contract, 2018, p. 9). To deal with those issues and leverage all the potential of digital identity at national level, many countries implement a Digital Identity Scheme, which is a well-designed and articulated collection of policies, business rules, technologies, organizations, and processes in charge of governing the digital identity lifecycle to promote a digital society. Hence, countries such as The Republic of Korea (hereinafter, Korea) and The Republic of Peru (hereinafter, Peru) have been developed and implemented different kind of policies, legal instruments, initiatives, and digital technologies to enhance accessibility, efficiency and security of the identification and authentication process, for instance, Korea has issued the Electronic Government Law and implemented cross-platforms such as Government24 (์ •๋ถ€24) as official electronic government portal, Digital ONEPASS (๋””์ง€ํ„ธ์›ํŒจ์Šค) as a digital authentication platform to enable a convenient no-face-to-face authentication of the citizens, Resident Registration System (RRS), as a fundamental national information system which manages and stores relevant personal information of Koreans, and Sharing Information System (ํ–‰์ •์ •๋ณด๊ณต๋™์ด์šฉ์‹œ์Šคํ…œ), as a interoperability platform to exchange information with governmental agencies. Moreover, Korea has a PKI Scheme which is divided into a National Public Key Infrastructure (NPKI), and a Government Public Key Infrastructure (GPKI). All these regulations, technologies and platforms are vital elements of the Korean Digital Identity Scheme. In the case of Peru, based on Law Nยฐ 26497 enacted in 1995, the government has been managing and maintaining the National Identification Registry of Peruvian. Moreover, since issuance of Digital Government Law in 2018, Peru has been implemented different kind of cross-platforms such as the Single Digital Platform for Citizen Orientation (GOB.PE), to offer one point of contact between government and citizens, National Interoperability Platform, to promote information exchange among public entities, the National Digital Government Platform, to provide cloud services to the public entities, and National Platform for Identification and Authentication of Digital Identity (ID.GOB.PE), to verify a persons identity. Although there are similarities, the outcomes are different, in the Electronic Government Development Index 2022, Korea is ranked 3rd in the world, while Peru is ranked 59th, from another side, in terms of digital identity, Korea has a digital identity ecosystem operating, for instance Government24 accepts several authentication methods which are easily and conveniently for the citizens such as ONEPASS, KAKAO, Samsung PASS, among others (MOIS, Status of Government 24, 2022). To 2021, almost 132,025,035 petitions were filed online through Government24 (MOIS, Status of Government 24, 2022). In the case of Peru, the digital identity scheme is an ongoing project, which is leading basically by the government, based on the Digital Government Law and its enforcement decree. In that vein, this research aims at understanding the components for governing and managing a Digital Identity Scheme in Korea and Peru and identifying the gap between them. Therefore, in this study we are going to focus on how the Digital Identity Scheme of Korea is performing to strengthen accuracy, inclusiveness, security, and usability of digital identity of persons. We are going to establish the similarities and differences by using a comparison framework which is an adaptation of the frameworks used by the United Nations (UN), International Telecommunication Union (UIT) and Organization for Economic Cooperation and Development (OECD). Additionally, in this moment, undertaking a comparison study between Korea and Peru is a relevant work, because Peru is implementing transversal digital government platforms based on the Digital Government Law, and based on that we are dealing with cybercrimes and digital threats, that is why we can learn of the best practices and good lessons of the Digital Identity Scheme in Korea and design better policies and decisions for Peruvian implementation. This research was carried out by using a qualitative research method which involved online interviews with ICT specialists from Korea and Peru to generate an in-depth understanding of the digital identity scheme of both countries. A total of ten specialists were interviewed. Interviews provide an overview of the digital identity evolution in Korea and allow me to identify challenges and policy recommendations in the implementation process of Digital Identity Scheme in Peru. Based on the results the big differences are integrated in three factors: strong and continuous digital leadership, timely legal framework, and modern ICT technology to support development and public services rendering. However, the results also suggest that it is possible to get big achievements on the Digital Identity Scheme in Peru, making institutional arrangements, enhancing digital regulation and optimizing the budget with the purpose to create a sustainable digital identity ecosystem.ABSTRACT 5 LIST OF ABBREVIATIONS 9 LIST OF TABLES 9 CHAPTER 1: INTRODUCTION 12 1.1 STUDY BACKGROUND 12 1.2 BACKGROUND OF THE COUNTRIES 20 1.3 THEORETICAL BACKGROUND 27 1.4 PURPOSE OF THE RESEARCH 39 CHAPTER 2. KEY CONCEPTS AND FRAMEWORK 43 CHAPTER 3: LITERATURE REVIEW 77 CHAPTER 4: DIGITAL IDENTITY IN KOREA AND PERU 86 4.1 LEGAL FRAMEWORK 86 4.2 TECHNOLOGY 100 4.3 GOVERNANCE AND LEADERSHIP 116 4.4 BUDGET 120 4.5 MARKET 122 4.6 FINDINGS 122 CHAPTER 5: CONCLUSIONS 132 5.1 SUMMARY OF THE THESIS 132 5.2 POLICY COMPARISON 143 5.3 POLICY RECOMMENDATIONS 145 5.4 LIMITATIONS OF THE RESEARCH 150 REFERENCES 152 APPENDICES 158 APPENDIX 1. QUESTIONNAIRE 158 APPENDIX 2. MATRIZ OF COMPARISON 167์„

    Online privacy: towards informational self-determination on the internet : report from Dagstuhl Perspectives Workshop 11061

    Get PDF
    The Dagstuhl Perspectives Workshop "Online Privacy: Towards Informational Self-Determination on the Internet" (11061) has been held in February 6-11, 2011 at Schloss Dagstuhl. 30 participants from academia, public sector, and industry have identified the current status-of-the-art of and challenges for online privacy as well as derived recommendations for improving online privacy. Whereas the Dagstuhl Manifesto of this workshop concludes the results of the working groups and panel discussions, this article presents the talks of this workshop by their abstracts

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    Special Session on Industry 4.0

    Get PDF
    No abstract available
    • โ€ฆ
    corecore