4 research outputs found

    Success of Digital Identity Infrastructure: A Grounded Model of eID Evolution Success

    Get PDF
    Digital identities (eID) are one of the crucial building blocks of a digital infrastructure. There are major differences between countries of the European Union when it comes to the success of digital identity infrastructure, yet, we lack insights into the conditions for successful digital identity infrastructure evolution (eID evolution success). Taking the outset in a digital infrastructure perspective, we conducted 18 expert interviews in the context of the European Union with the focal case of the eID infrastructure in Germany. We used the grounded theory method to develop a model of eID evolution success. We discuss how the model can be useful to governments, practitioners and researchers alike

    Strong Electronic Identification: Survey & Scenario Planning

    Get PDF
    The deployment of more high-risk services such as online banking and government services on the Internet has meant that the need and demand for strong electronic identity is bigger today more than ever. Different stakeholders have different reasons for moving their services to the Internet, including cost savings, being closer to the customer or citizen, increasing volume and value of services among others. This means that traditional online identification schemes based on self-asserted identities are no longer sufficient to cope with the required level of assurance demanded by these services. Therefore, strong electronic identification methods that utilize identifiers rooted in real world identities must be provided to be used by customers and citizens alike on the Internet. This thesis focuses on studying state-of-the-art methods for providing reliable and mass market strong electronic identity in the world today. It looks at concrete real-world examples that enable real world identities to be transferred and used in the virtual world of the Internet. The thesis identifies crucial factors that determine what constitutes a strong electronic identity solution and through these factors evaluates and compares the example solutions surveyed in the thesis. As the Internet become more pervasive in our lives; mobile devices are becoming the primary devices for communication and accessing Internet services. This has thus, raised the question of what sort of strong electronic identity solutions could be implemented and how such solutions could adapt to the future. To help to understand the possible alternate futures, a scenario planning and analysis method was used to develop a series of scenarios from underlying key economic, political, technological and social trends and uncertainties. The resulting three future scenarios indicate how the future of strong electronic identity will shape up with the aim of helping stakeholders contemplate the future and develop policies and strategies to better position themselves for the future

    Strong Electronic Identification: Survey & Scenario Planning

    Get PDF
    The deployment of more high-risk services such as online banking and government services on the Internet has meant that the need and demand for strong electronic identity is bigger today more than ever. Different stakeholders have different reasons for moving their services to the Internet, including cost savings, being closer to the customer or citizen, increasing volume and value of services among others. This means that traditional online identification schemes based on self-asserted identities are no longer sufficient to cope with the required level of assurance demanded by these services. Therefore, strong electronic identification methods that utilize identifiers rooted in real world identities must be provided to be used by customers and citizens alike on the Internet. This thesis focuses on studying state-of-the-art methods for providing reliable and mass market strong electronic identity in the world today. It looks at concrete real-world examples that enable real world identities to be transferred and used in the virtual world of the Internet. The thesis identifies crucial factors that determine what constitutes a strong electronic identity solution and through these factors evaluates and compares the example solutions surveyed in the thesis. As the Internet become more pervasive in our lives; mobile devices are becoming the primary devices for communication and accessing Internet services. This has thus, raised the question of what sort of strong electronic identity solutions could be implemented and how such solutions could adapt to the future. To help to understand the possible alternate futures, a scenario planning and analysis method was used to develop a series of scenarios from underlying key economic, political, technological and social trends and uncertainties. The resulting three future scenarios indicate how the future of strong electronic identity will shape up with the aim of helping stakeholders contemplate the future and develop policies and strategies to better position themselves for the future

    Surmounting Boundaries: Closing The Governance Gap Governance Arrangements In Public Sector Ict Shared Services

    Get PDF
    Hundreds of millions of dollars of public money have been spent creating Public Sector ICT Shared Services (PSISS) based on expectations of improved customer service and cost reduction. Unfortunately, the promised benefits have often failed to materialise and governance has been identified as a barrier to PSISS success. The research first locates the concerns that governance, and in particular arrangements for governing PSISS, is contributing to PSISS failure in the academic and practice literatures on PSISS governance. Our current knowledge of PSISS governance is principally informed by literature from three domains: management, public administration and information systems. These domains, to an extent, exist in silos with unique traditions, perspectives and knowledge claims. As a result, how it informs the governance of PSISS could be at best unhelpful and even confusing to practitioners. This state of knowledge is not assisted by “how to govern” guides that obscure their different theoretical origins and do not appear to address the complexity of PSISS governance. Despite this apparent lack of coherent frameworks in the academic and practice literatures, practitioners are expected to use this literature to develop governance arrangements and perform effective PSISS governance. This lack of coherence led me to ask my first research question: How do practitioners perceive PSISS governance in practice? Exploring how PSISS governance occurs in practice through the lived experience of PSISS governance practitioners led me to select grounded theory as an appropriate methodology and research design to examine 20 years of governance practice for an electronic identity (E-ID) PSISS in New Zealand. My grounded theory of practice enabled construction of a public sector governance model to explore vertical and collaborative governance arrangements through three perspectives: system strategy, delivery and assurance. The model has been extended to provide a system-wide public sector governance lens, which was used to reflexively explore current academic literature and seven practitioner informed critical public sector governance issues to answer my refined secondary research question: How have governance arrangements addressed critical issues in public sector governance
    corecore