13 results on '"EiD"'
Search Results
2. Challenges of introducing a professional eID card within health care
- Author
-
Hedström, Karin, Karlsson, Fredrik, and Söderström, Fredrik
- Published
- 2016
- Full Text
- View/download PDF
3. Electronic identity (eID) and electronic signature (eSig) for eGovernment services – a comparative legal study
- Author
-
Lentner, Gabriel M. and Parycek, Peter
- Published
- 2016
- Full Text
- View/download PDF
4. The Influence of Social Context and Targeted Communication on e-Government Service Adoption
- Author
-
Räckers, Michael, Hofmann, Sara, Becker, Jörg, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Wimmer, Maria A., editor, Janssen, Marijn, editor, and Scholl, Hans J., editor
- Published
- 2013
- Full Text
- View/download PDF
5. Constructing identities – professional use of eID in public organisations.
- Author
-
Hedström, Karin, Wihlborg, Elin, Gustafsson, Mariana S., and Söderström, Fredrik
- Abstract
Purpose – The purpose of the paper is to reveal how identities are constructed when electronic identification (eIDs) cards are introduced through information systems in public organisations. Design/methodology/approach – Through two case studies, the authors generate rich data on the construction of identities through use of eID within public organisations. The author’s analysis, based on actor network theory, focusses on the translation of eIDs in these two settings. Findings – ID can be viewed as an artefact where the public and private spheres meet. The authors found at least three mixed roles in employees’ use of eID: as a purely private person; as a private person in the work place; and as a professional in the work place. Research limitations/implications – There is a need for further research on how eID is translated into organisational contexts and how institutional settings define the openings for local translation processes. However, the results are based on two small cases, meaning that broad generalisations are difficult to make. Practical implications – EID is so much more than technology. The technical framing of the identification system appears to be subordinated to organisational arrangements and cultures, making it important to apply a socio-technical perspective when working with eID. Originality/value – The empirical cases have offered a unique chance to study implementation and use of eID in two very different public service organisations. The findings illustrate how eID translated into organisational contexts, and how identity management within an organisational setting is linked to the employees’ private and professional roles. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
6. EL DNI ELECTRÓNICO: ECOSISTEMA Y USO EN LA E-ADMINISTRACIÓN LOCAL.
- Author
-
Prieto, Pablo R.
- Subjects
- *
INTERNET in public administration , *IDENTIFICATION cards , *LOCAL government , *CITY councils , *COUNTY councils , *DIGITAL certificates , *DIGITAL signatures , *WEBSITES - Abstract
For local e-government to become a reality, all the elements of the ecosystem must be in place. We search for the elements which constitute the ecosystem, both from the citizen and from the city council point of view, with the electronic identity card (eID) as the core. In order to find out the main deficiencies in the system and to propose solutions, we need to quantify the present situation of each element: from city and county councils websites where eID is needed to use the services offered to the number of eID and compatible readers owned by citizens. According to the latest data, only 2% of the population owns an eID reader: this is the weakest element of our ecosystem. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
7. The Danish eID case: twenty years of delay.
- Author
-
Hoff, Jens and Hoff, Frederik
- Abstract
The focus of this article is to explain why there is still no qualified digital signature in Denmark as defined by the EU eSignatures Directive nor any other nationwide eID even though Denmark had an early start in eGovernment, and a high level of “e-readiness” compared to other nations. Laying out the technological, organizational and legal dimensions of eID in Denmark, and comparing these with a number of other European countries made it possible to explain this paradox. Thus, the three main reasons for the special route development has taken in Denmark seems to be concerns over privacy, lack of intergovernmental coordination and lack of cooperation between public and private sector. However, with the recent tender on digital signatures won by the PBS and the roll-out of the NemID it seems that Denmark will finally—after twenty years of delay—have an eID which can be widely used in the public as well as the private sector. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
8. Smart Nepal: Was können Big Data, Blockchain & Co. für Nepals öffentlichen Sektor bedeuten?
- Author
-
Thapa, Basanta
- Subjects
Digitalisierung ,public sector ,öffentlicher Sektor ,E-Government ,Big Data ,Blockchain ,eID ,technische Entwicklung ,öffentliche Verwaltung ,public administration ,digitalization ,Sociology & anthropology ,technical development ,Nepal ,neue Technologie ,Soziologie, Anthropologie ,new technology ,ddc:301 ,Sociology of Science, Sociology of Technology, Research on Science and Technology ,Wissenschaftssoziologie, Wissenschaftsforschung, Technikforschung, Techniksoziologie - Published
- 2018
9. Challenges of introducing a professional eID card within health care
- Author
-
Karin Hedström, Fredrik Karlsson, and Fredrik Söderström
- Subjects
Electronic identification ,Systemvetenskap, informationssystem och informatik med samhällsvetenskaplig inriktning ,Boundary object ,Information Systems and Management ,Public Administration ,Computer science ,Information Systems, Social aspects ,02 engineering and technology ,Identity management ,020204 information systems ,0502 economics and business ,Health care ,0202 electrical engineering, electronic engineering, information engineering ,E-Government ,business.industry ,05 social sciences ,Healthcare ,Public relations ,Computer Science Applications ,eID ,Informatics ,business ,050203 business & management - Abstract
Purpose The purpose of this paper is to examine the challenges that arise when introducing an electronic identification (eID) card for professional use in a health-care setting. Design/methodology/approach This is a case study of an eID implementation project in healthcare. Data were collected through interviews with key actors in a project team and with eID end users. The authors viewed the eID card as a boundary object intersecting social worlds. For this analysis, the authors combined this with an electronic government initiative challenge framework. Findings The findings of this paper illustrate the interpretative flexibility of eID cards and how eID cards as boundary objects intersect social worlds. The main challenges of implementing and using eID cards in healthcare are usability, user behaviour and privacy. However, the way in which these challenges are interpreted varies between different social worlds. Practical implications One of the implications for future practice is to increase our understanding of the eID card as a socio-technical artefact, where the social and technical is intertwined, at the same time as the eID card affects the social as well as the technical. By using a socio-technical perspective, it is possible to minimise the potential problems related to the implementation and use of eID. Originality/value Previous research has highlighted the need for more empirical research on identity management. The authors contextualise and analyse the implementation and use of eID cards within healthcare. By viewing the eID card as a boundary object, the authors have unveiled its interpretative flexibility and how it is translated across different social worlds.
- Published
- 2016
10. Privacy in digital identity systems: models, assessment and user adoption
- Author
-
Maryline Laurent, Claire Levallois-Barth, Armen Khatchatourov, Département Langues et Sciences Humaines (LSH), Télécom Ecole de Management (TEM)-Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom Business School (IMT-BS), Institut Mines-Télécom [Paris] (IMT), Laboratoire Sens et Compréhension du Monde Contemporain (LASCO), Télécom Ecole de Management (TEM)-Université Paris Descartes - Paris 5 (UPD5)-Institut Mines-Télécom [Paris] (IMT), Réseaux, Systèmes, Services, Sécurité (R3S-SAMOVAR), Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (SAMOVAR), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP)-Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), Département Réseaux et Services de Télécommunications (RST), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), Centre National de la Recherche Scientifique (CNRS), Laboratoire Traitement et Communication de l'Information (LTCI), Télécom ParisTech-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS), Efthimios Tambouris, Marijn Janssen, Hans Jochen Scholl, Maria A. Wimmer, Konstantinos Tarabanis, Mila Gascó, Bram Klievink, Ida Lindgren, Peter Parycek, TC 8, and WG 8.5
- Subjects
Information privacy ,Personal data ,Privacy by Design ,Privacy impact as-sessment ,Computer science ,Privacy policy ,Internet privacy ,Multiple / partial identities ,Context (language use) ,Digital identity ,02 engineering and technology ,Computer security ,computer.software_genre ,Selective disclosure ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Privacy adoption paradox ,EID ,Argument ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,EID deployer ,Pseudonymous authentication ,[SHS.SOCIO]Humanities and Social Sciences/Sociology ,Privacy software ,business.industry ,Privacy by design ,Grid ,Privacy ,EIDAS ,020201 artificial intelligence & image processing ,E-Government ,business ,computer ,Technology adoption - Abstract
Part 4: Application Areas and Evaluation; International audience; The use of privacy protection measures is of particular importance for existing and upcoming users' digital identities. Thus, the recently adopted EU Regulation on Electronic identification and trust services (eIDAS) explicitly allows the use of pseudonyms in the context of eID systems, without specifying the way they should be implemented. The paper contributes to the discussion on pseudonyms and multiple identities, by (1) providing an original analysis grid that can be applied for privacy evaluation in any eID architecture, and (2) intro-ducing the concept of eID deployer allowing to model virtually any case of the relation between the user, the eID implementation and user's digital identities. Based on these inputs, a comparative analysis of four exemplary eID architec-tures deployed in European countries is conducted. The paper also discusses how sensitive citizens of these countries are to the privacy argument while adopting these systems, and presents the "privacy adoption paradox".
- Published
- 2015
- Full Text
- View/download PDF
11. Constructing identities : Professional use of eID in public organisations
- Author
-
Karin Hedström, Fredrik Söderström, Mariana S. Gustafsson, and Elin Wihlborg
- Subjects
Systemvetenskap, informationssystem och informatik med samhällsvetenskaplig inriktning ,Translation ,Information Systems and Management ,Public Administration ,E-Government ,Computer science ,Information Systems, Social aspects ,ANT (actor network theory) ,E-government ,Identity management ,Computer Science Applications ,World Wide Web ,EID ,Informatics ,Information system - Abstract
Purpose – The purpose of the paper is to reveal how identities are constructed when electronic identification (eIDs) cards are introduced through information systems in public organisations. Design/methodology/approach – Through two case studies, the authors generate rich data on the construction of identities through use of eID within public organisations. The author’s analysis, based on actor network theory, focusses on the translation of eIDs in these two settings. Findings – ID can be viewed as an artefact where the public and private spheres meet. The authors found at least three mixed roles in employees’ use of eID: as a purely private person; as a private person in the work place; and as a professional in the work place. Research limitations/implications – There is a need for further research on how eID is translated into organisational contexts and how institutional settings define the openings for local translation processes. However, the results are based on two small cases, meaning that broad generalisations are difficult to make. Practical implications – EID is so much more than technology. The technical framing of the identification system appears to be subordinated to organisational arrangements and cultures, making it important to apply a socio-technical perspective when working with eID. Originality/value – The empirical cases have offered a unique chance to study implementation and use of eID in two very different public service organisations. The findings illustrate how eID translated into organisational contexts, and how identity management within an organisational setting is linked to the employees’ private and professional roles.
- Published
- 2015
12. In the rear-view mirror, in the vehicle and through the windshield : the emergence and current status of the Swedish electronic identification
- Author
-
Söderström, Fredrik
- Subjects
e-legitimation ,eID ,Informationsteknologi ,e-förvaltning ,Information systems ,electronic identification ,Informationssystem ,Information technology ,e-government ,e-leg - Abstract
Detta arbete utgör en sammanhållen bild av den elektroniska legitimationens (e-legitimationens) framväxt i Sverige, vilket är en viktig förutsättning för utvecklingen av säkra offentliga elektroniska tjänster inom den elektroniska förvaltningen. Eftersom statsförvaltningens styrning historiskt uppfattats som relativt otydlig har området med tiden kommit att präglas av olika enskilda aktörers egna insatser, intressen och föreställningar. Studiens bidrag är att beskriva och analysera framväxten av den svenska e-legitimationen med hjälp av de tre analysperspektiven deltagande, föreställningar samt legitimitet. Jag har i studien intresserat mig för vad som skett historiskt och hur detta kan kopplas till det som sker i nutid kring e-legitimationer. Särskild vikt har lagts vid aspekter av icketeknisk natur varvid studien kan ses som en motvikt till den tydligt teknikfokuserade utredning kring den framtida e-legitimationen som genomfördes under hösten 2010. Resultatet av arbetet visar bland annat på att praktisk erfarenhet är en nyckelaspekt för deltagandet och formandet av föreställningar kring e-legitimationen. Statens bristande intresse för området har även tydligt påverkat utrymmet för eget meningsskapande samt e-legitimationens erhållna legitimitet. När staten under 2010/2011 fått ökat intresse för området och identifierat ett tydligt samordningsbehov står det därmed klart att dessa ansatser inte kommer att vara av helt oproblematisk natur.
- Published
- 2011
13. Multigov D3.3 Gebruikersanalyse van nieuwe kanalen in een multikanaalsstrategie voor e-government. iDTV, PC met eID, mobilele telefoon en kiosk
- Author
-
Tomas Staelens, An Jacobs, Leo Van Audenhove, and Communication Sciences
- Subjects
user analysis ,IDTV ,eID ,multichannel ,e-government - Abstract
no abstract available
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.