4489850 - Identity Management PUBLISHED BY THE IEEE...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Identity Management PUBLISHED BY THE IEEE COMPUTER SOCIETY ■ 1540-7993/08/$25.00 © 2008 IEEE ■ IEEE SECURITY & PRIVACY 51 Use Cases for Identity Management in E-Government E-government identity management systems aren’t usually straightforward to implement. Culture and history strongly affect what might be acceptable to citizens in particular circumstances, with levels of trust being a key factor. The authors discuss these issues and present a use case from New Zealand. A cross the globe, governments are strength- ening their identity management strategies. One reason is a growing interest in using the online environment to deliver and improve services, and another is the increasing sophistication of criminal elements in forging and stealing identities. Governments are also concerned about terrorism, in- cluding the use of money laundering to finance it. This article focuses on the specific issues that arise when governments turn to e-government and use identity management to provide online services. Governments approach identity management in con- siderably different ways, so it’s useful to assess these dif- ferences against historical and cultural backgrounds. Social policy can be as important as technology in de- termining an approach to identity management. Ultimately, we’re practitioners, not researchers, so this article isn’t a systematic cross-governmental study. Rather, it draws on our in-the-field experienc- es from advising on and implementing e-government identity management systems in Australia and New Zealand. When we speak of identity management here, we use the definition adopted by the Austra- lian government: “the policies, rules, processes and systems involved in ensuring that only known, au- thorised identities gain access to networks and systems and the information contained therein” (www.agimo. gov.au/infrastructure/authentication/agaf/glossary/ i#identitymanagement). Is government different? Those who develop use cases for identity manage- ment might assume that there isn’t much difference between the issues to take into ac- count when building government versus private-sector use cases. This assumption has some validity, especially because of the increased part- nerships and cooperation between governments and the private sector for service delivery. However, some key distinctions have an impact on the approach taken to develop a new identity management system. The first is that government must look into much broader issues, including social inclusion, consistency, and interoperability. A private enterprise might target a particular demographic, but government programs must serve an entire population that spans an enor- mous range in terms of age, technical competence, language, and physical and mental abilities....
View Full Document

This note was uploaded on 06/19/2011 for the course IT 2258 taught by Professor Aymenali during the Summer '11 term at Abu Dhabi University.

Page1 / 7

4489850 - Identity Management PUBLISHED BY THE IEEE...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online