Search results

1 – 10 of over 24000
Article
Publication date: 11 June 2018

Kane J. Smith, Gurpreet Dhillon and Karin Hedström

In this paper, using values of individuals in a Swedish health-care organization, electronic identity management objectives related to security are defined.

Abstract

Purpose

In this paper, using values of individuals in a Swedish health-care organization, electronic identity management objectives related to security are defined.

Design/methodology/approach

By using value-focused thinking, eliciting values from interviews of three groups of health-care staff’s objective hierarchies for three stakeholder groups are identified and defined. Objective hierarchies allow comparison across multiple stakeholder groups such that strategic objectives for identity management can be compared and contrasted.

Findings

This qualitative investigation, which used value-focused thinking, revealed 94 subobjectives, grouped into 12 fundamental and 14 means objectives, which are essential for developing measures that address potential value conflicts in a health-care organization around electronic identity management. The objectives developed in this study are grounded socioorganizationally and provide a way forward in developing measures aimed to reducing potential conflicts at a policy level.

Originality/value

In a final synthesis, congruence (or lack thereof) in the electronic identity management approach for a Swedish health organization is suggested. This also creates a foundation to evaluate and weight different objectives for strategic decision management.

Details

Information & Computer Security, vol. 26 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 21 March 2016

Gabriel M. Lentner and Peter Parycek

This paper aims at providing an overview of different approaches toward identity management pertaining to citizen to government (C2G) eGovernment applications.

1240

Abstract

Purpose

This paper aims at providing an overview of different approaches toward identity management pertaining to citizen to government (C2G) eGovernment applications.

Design/methodology/approach

The paper adopts a comparative law methodology. It asks how different legal systems deal with the same problem. The different legal frameworks of Austria, Germany, Liechtenstein and the Swiss Canton of Zug are analyzed and compared pertaining to identification and authentication. The process of comparison involves three phases: the descriptive phase (describing and analyzing the legislation to be compared), the identification phase (identifying the differences and similarities between the systems compared) and the explanatory phase (attempting to explain the resemblances and similarities between the systems).

Findings

Each of the four countries adopted different legal solutions. This is due to the different legal culture and the existing legal framework in which the legislator, in most cases, seeks to fit in the respective eGovernment solution, rather than adopting a completely new solution.

Originality/value

This study reveals different possibilities for legislatures to regulate electronic C2G procedures, ranging from a combination of electronic identity (eID) and electronic signature to pragmatic eID models in combination with further electronic authentication functionalities. The focus of the study is the legal framework and not the technical solution.

Details

Transforming Government: People, Process and Policy, vol. 10 no. 1
Type: Research Article
ISSN: 1750-6166

Keywords

Article
Publication date: 24 April 2007

Paul Beynon‐Davies

The purpose of this paper is to unpack some of the socio‐technical relationships inherent in contemporary notions of personal identity management. For this purpose it considers…

3434

Abstract

Purpose

The purpose of this paper is to unpack some of the socio‐technical relationships inherent in contemporary notions of personal identity management. For this purpose it considers the issue of personal identity management in terms of a framework, which distinguishes between the related processes of authentication, identification and enrolment.

Design/methodology/approach

The conceptual model described in this paper is reflected against an important recent case in which issues of personal identity management are being enacted: the introduction of a UK national identity card. Both this issue and case are particularly examined in the light of the growth of e‐Government in the UK.

Findings

The paper relates issues associated with the technical infrastructure of e‐Government with some of the costs and benefits associated with the social infrastructure of e‐Government. This device offers a useful framing for a whole range of issues surrounding individual‐organisation interaction in the Information Society that rely on elements of personal identity management.

Research limitations/implications

In the paper the issue of personal identity management is under‐represented in the Information Systems and Information Management literature. The conceptual approach adopted in the paper is used to identify areas of further research in terms of issues relevant to the technical infrastructure of e‐Government.

Practical implications

The paper identifies a number of personal identity management issues embedded in the technical infrastructure required for effective e‐Government.

Originality/value

This paper raises the importance of personal identity management to the success of the e‐Government agenda. It also links classic information management issues to the issue of personal identity management and identifies the challenges for e‐Government within this.

Details

Journal of Enterprise Information Management, vol. 20 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 19 June 2009

Mina Deng, Danny De Cock and Bart Preneel

Modern e‐health systems incorporate different healthcare providers in one system and provide an electronic platform to share medical information efficiently. In cross‐context…

1247

Abstract

Purpose

Modern e‐health systems incorporate different healthcare providers in one system and provide an electronic platform to share medical information efficiently. In cross‐context communications between healthcare providers, the same information can be interpreted as different types or values, so that one patient will be issued different identifiers by different healthcare providers. This paper aims to provide a solution to ensure interoperability so that multiple healthcare providers will be able to collaborate in one e‐health system.

Design/methodology/approach

This paper primarily focuses on how different healthcare providers, instead of the patients, are able to interact and share information on a common e‐health platform.

Findings

In the course of the work, it was found that previous e‐health solutions mainly have a limited view of patient information, where a user‐centric approach for identity management is usually restricted to a single healthcare provider. Interoperability in an e‐health system becomes more problematic when more actors collaborate, and hence linkability from one context to another should not be straightforward. However, some form of linkability, such as the possibility to follow up a patient's medical treatment, is desirable in the e‐health sector, even when it needs to cross different contexts. Therefore, the authors have designed an identity management mechanism to ensure semantic interoperability when data is exchanged among different authorized healthcare providers.

Research limitations/implications

The paper points out that the next generation of e‐health will move towards federated e‐health and will require user‐centricity and transparency properties so that patients are able to specify and verify the disclosure of their medical information.

Originality/value

This paper proposes a new service for cross‐context identity management in e‐health systems, improving interoperability between agencies when context‐specific information is transferred from one healthcare provider to another. How the proposed cross‐context identity management service can be integrated in an e‐health system is explained with a use case scenario.

Details

Online Information Review, vol. 33 no. 3
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 25 August 2021

Umar Mir, Arpan Kumar Kar and Manmohan Prasad Gupta

This conceptual article’s primary aim is to identify the significant stakeholders of the digital identity system (DIS) and then highlight the impact of artificial intelligence…

Abstract

Purpose

This conceptual article’s primary aim is to identify the significant stakeholders of the digital identity system (DIS) and then highlight the impact of artificial intelligence (AI) on each of the identified stakeholders. It also recommends vital points that could be considered by policymakers while developing technology-related policies for effective DIS.

Design/methodology/approach

This article uses stakeholder methodology and design theory (DT) as a primary theoretical lens along with the innovation diffusion theory (IDT) as a sub-theory. This article is based on the analysis of existing literature that mainly comprises academic literature, official reports, white papers and publicly available domain experts’ interviews.

Findings

The study identified six significant stakeholders, i.e. government, citizens, infrastructure providers, identity providers (IdP), judiciary and relying parties (RPs) of the DIS from the secondary data. Also, the role of IdP becomes insignificant in the context of AI-enabled digital identity systems (AIeDIS). The findings depict that AIeDIS can positively impact the DIS stakeholders by solving a range of problems such as identity theft, unauthorised access and credential misuse, and will also open a possibility of new ways to empower all the stakeholders.

Research limitations/implications

The study is based on secondary data and has considered DIS stakeholders from a generic perspective. Incorporating expert opinion and empirical validation of the hypothesis could derive more specific and context-aware insights.

Practical implications

The study could facilitate stakeholders to enrich further their understanding and significance of developing sustainable and future-ready DIS by highlighting the impact of AI on the digital identity ecosystem.

Originality/value

To the best of the authors’ knowledge, this article is the first of its kind that has used stakeholder theory, DT and IDT to explain the design and developmental phenomenon of AIeDIS. A list of six significant stakeholders of DIS, i.e. government, citizens, infrastructure providers, IdP, judiciary and RP, is identified through comprehensive literature analysis.

Details

Journal of Science and Technology Policy Management, vol. 13 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 1 March 2001

Russell G. Smith and Peter N. Grabosky

Finance is the lifeblood of an economy. Businesses require capital in order to start up, and usually require additional resources to maintain or expand their activities. In some…

Abstract

Finance is the lifeblood of an economy. Businesses require capital in order to start up, and usually require additional resources to maintain or expand their activities. In some cases, they may simply reinvest their profits. But expansion on a significant scale may require more than this. Thus, businesses may also seek to borrow funds or to solicit investments in return for the investor's share of future profit. One of the basic means by which this latter strategy is pursued in industrial societies is for businesses to solicit investments from the public through the initial public offering of shares, and for subsequent buying and selling of shares by investors who expect the value of the shares in question to rise or fall. Securities markets are thus integral to a nation's economic system.

Details

Journal of Financial Crime, vol. 9 no. 1
Type: Research Article
ISSN: 1359-0790

Book part
Publication date: 27 January 2012

Debra Bateman and Julie Willems

A social and cultural expectation that Information Communication Technologies (ICT) should be ubiquitous within peoples' daily lives is apparent. Connecting generational groups…

Abstract

A social and cultural expectation that Information Communication Technologies (ICT) should be ubiquitous within peoples' daily lives is apparent. Connecting generational groups with a specific set of technological attributes also assumes the ways that particular groups of students should be able/do “naturally” use emergent mobile and social technologies. Moreover, the use of social networking technologies is evident in a number of ways within higher education (HE) pedagogies. As part of the suite of possibilities in Web 2.0, Facebook is used in a number of ways to support communications within and between institutions and their students as well as a mechanism for teaching and learning within specific units of study.

The chapter commences with a broad discussion about social sharing software of Web 2.0, specifically Facebook, as a potential teaching and learning tool in HE contexts. We traverse recent exemplars and discourses surrounding the use of social technologies for the purposes of HE. It is clear from the literature that while there is much excitement at the possibilities that such technologies offer, there are increasing anxieties across institutional and individual practitioners, in regard to possible consequences of their use.

Through autoethnographic methodology, this chapter showcases potentials and challenges of Facebook in HE. Through the use of constructed scenarios, the authors describe occurrences that necessitate increasing professional development and vigilance online. Some of the issues highlighted within this chapter include blurring of professional and personal life world boundaries, issues of identity theft and vandalism, cyberstalking and bullying, working in the public domain, and questions of virtual integrity.

Details

Misbehavior Online in Higher Education
Type: Book
ISBN: 978-1-78052-456-6

Article
Publication date: 2 November 2015

Xiaomi An, Wenlin Bai, Hepu Deng, Shuyang Sun, Yu Dong, Wenrui Zhong and Jufang Hu

This paper aims to develop a comprehensive concept map to guide adequate protection and effective management of personal information in the provision of networked services in…

Abstract

Purpose

This paper aims to develop a comprehensive concept map to guide adequate protection and effective management of personal information in the provision of networked services in China through comprehensively considering the multi-disciplinary perspective of personal information protection and management with respect to their multi-dimensional applications, multi-directional controls and multi-contextual analysis in today’s networked environments. There are different perspectives on what personal information protection and management is about, why and how personal information should be protected and managed in the literature. Little, however, is known about the relationships between these multiple perspectives and their implications to personal information protection and management in the real-world practice.

Design/methodology/approach

A multi-methods approach is adopted in the study, including a comprehensive review of the related literature, a content analysis of the relevant laws, polices, standards, a multi-cases study of the relevant network services providers and an online survey of the Chinese citizens who are the end-users of the networked services to adequately achieve the objective of this study. The concept map building technique is used as a tool for conducting the meta-synthesis of the findings from multiple data resources in the development of a comprehensive concept map for personal information protection and management.

Findings

This study rationalizes the importance of the identification of personal information for adequate protection and effective management. It identifies five perspectives on personal information protection and management, namely, law, economics, sociology, information technology and information resources management for their applications at the organizational level. Five types of personal information are identified in the study for protection and management, namely, identifiable personal information, personal identity information, personal moral right information, personal civil right and interest information and personal business and transaction information. An integrated approach consisting of risk control, security control and users control is proposed for personal information protection and management in the provision of networked services in China. The study shows that not enough attention has been paid to the personal information protection and management from multi-disciplinary perspectives with respect to their multi-dimensional applications, multi-directional controls and multi-contextual analysis in the literature. There is a lack of understanding of what, why and how personal information is protected and managed in real-world practices in China.

Practical implications

The investigation of the issues of personal information protection and management with respect to the relevant laws, polices, standards, networked services and organizations can lead to a better understanding of what, why and how personal information is protected and managed in real-world practices in China. The development of a comprehensive concept map for personal information protection and management can be used as an effective guideline for the formulation and implementation of appropriate strategies and policies in individual organizations for providing their stakeholders with quality-networked services in today’s highly connected network environment in China.

Originality/value

The paper is the first step of a comprehensive study on the protection and management of personal information for the provision of networked services in China. It provides a solid foundation for further research with respect to the personal information protection and management. It is the first of this kind of studies to answer the questions of what types of personal information needed to be protected, why and how they should be protected in conformity with laws, regulations, polices, standards and the needs of networked services and business activities of organizations.

Details

The Electronic Library, vol. 33 no. 6
Type: Research Article
ISSN: 0264-0473

Keywords

Content available
Article
Publication date: 21 March 2016

541

Abstract

Details

Transforming Government: People, Process and Policy, vol. 10 no. 1
Type: Research Article
ISSN: 1750-6166

Content available
Book part
Publication date: 15 September 2022

Abstract

Details

The New Digital Era: Digitalisation, Emerging Risks and Opportunities
Type: Book
ISBN: 978-1-80382-980-7

1 – 10 of over 24000