The Electronic Journal of e-Government publishes perspectives on topics relevant to the study, implementation and management of e-Government

For general enquiries email administrator@ejeg.com

Click here to see other Scholarly Electronic Journals published by API
For a range of research text books on this and complimentary topics visit the Academic Bookshop

Information about the European Conference on Digital Government is available here

 

Journal Article

Towards an Information Strategy for Combating Identity Fraud in the Public Domain: Cases from Healthcare and Criminal Justice  pp214-222

Marijn Plomp, Jan Grijpink

© Dec 2011 Volume 9 Issue 2, ECEG, Editor: Frank Bannister, pp93 - 222

Look inside Download PDF (free)

Abstract

Two trends are present in both the private and public domain: increasing interorganisational co‑operation and increasing digitisation. More and more processes within and between organisations take place electronically, on local, national and European scal e. The technological and organisational issues related to this prove to be difficult on a local scale and barely manageable on national and European scales. We introduce the theoretical framework of Chain‑computerisation, which explains large‑scale chain co‑operation as an answer to a dominant chain problem. Identity fraud proves to be the dominant chain problem in many chain co‑operation situations. Therefore, our main research question is: how to arrive at a successful information strategy to combat ide ntity fraud in the large‑scale processes that constitute the public domain? We demonstrate the problem of identity fraud on the basis of two Dutch cases, from the criminal justice chain and the healthcare sector. These cases are taken from our chain resea rch programme in which we test empirical findings against the theoretical framework of Chain‑computerisation to derive a successful chain‑specific information strategy. In both cases, the problem of identity fraud presents a threat to the chain co‑operati on. Identity fraud has to be tackled with an approach focused on large‑scale processes and with specific person‑oriented security procedures and instruments preventing identity fraud from happening undetected. This study forms an important contribution to information science and to the security realm that still pivots only on traditional authentication frameworks that cannot cope with wrong person identity fraud. In large‑scale situations, therefore, additional safeguards will be necessary. Taking into account that the problem of identity fraud rises in many other domains and countries as well, we conclude that it is a major threat to the European society. Finally, we argue that chain‑specific information systems with random identity verification enable combating identity fraud.

 

Keywords: chain-computerisation, interorganisational information systems, chain co-operation, information strategies within the public sector, identity management, identity fraud

 

Share |

Journal Article

Design Principles of Identity Management Architecture Development for Cross‑Border eGovernment Services  pp188-201

Kamelia Stefanova, Dorina Kabakchieva, Roumen Nikolov

© Dec 2010 Volume 8 Issue 2, ECEG Conference Issue, Editor: Frank Bannister, pp83 - 235

Look inside Download PDF (free)

Abstract

Identity Management is a very important research challenge within the framework of the EU eGovernment development. This paper presents the main aspects of research, analysis and design of the Open Identity Management Architecture for European eGovernment development (GUIDE), a project financed by the 6FP of the EC. An innovative interdisciplinary approach is used, aimed at covering the whole range of technical, process, policy, legal and social Identity Management issues, and seeking to overcome the existing fragmentation of Identity Management initiatives. The primary purpose of GUIDE is to develop a consistent approach to identity management across the EU that will enable Member States to agree on the identity of an entity (a citizen or a business) in order to enable sectoral applications to conduct cross‑border transactions. The paper provides some important comments concerning the European aspects of Identity Management and presents the adopted Federation Identity Management model. The development of the Open Identity Management Architecture is driven by eight key political and functional axioms, regarding how these federations (Member State governments and commercial organisations) should be inter‑linked and what criteria each constituent federation will need to satisfy in order to join the identity grid. The architecting approach is based on an enterprise model adopted as a framework for the EU eGovernment development since the research revealed that frameworks for eGovernment are in an early state of evolution. The architecture is developed as a Service Oriented Architecture (SOA), implemented through the Web Services model, thus satisfying the requirements for ‘loosely‑coupled’ systems, independence of implementation and location, etc. The conceptual data model describes the key data entities that have to be supported for cross‑border identity services ‑ the citizen and the organisation. The logical service model presents the different types of identity management services that are relevant for the developed Open Identity Management Architecture. The interoperability issues, including the interoperability services and the Identity management interoperability infrastructure, are also considered.

 

Keywords: Identity management, European eGovernment, cross-border services

 

Share |