Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3551349.3561144acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaseConference Proceedingsconference-collections
research-article

Towards Improving the Adoption and Usage of National Digital Identity Systems

Published: 05 January 2023 Publication History

Abstract

User perceptions of national digital identity systems (NDIDs) significantly impact their use and acceptance.  Previous study on the use of NDIDs has provided limited frameworks for future research, with a strong emphasis on government services as well as how the system may be improved. This study evaluates how human-centric cybersecurity factors influence the use of NDIDs and acceptance among users. For instance, MyHealth record, which is used in Australia to record medical services provided to users, was overwhelmingly rejected by users due to concerns about digital identification information being used without authorisation and other privacy concerns. We hypothesise that human-centric cybersecurity factors influence the use of NDID and acceptance among users. The study also has a practical implication since it provides a framework to determine human-centric cybersecurity factors that influence adoption and improve NDIDs usage.

References

[1]
Mburu, Z.G., L. Nderu, and M. Tobias, Review of digital identity management system models. International Journal of Technology and Systems, 2019. 4(1): p. 21-33.
[2]
Velásquez, I., A. Caro, and A. Rodríguez, Authentication schemes and methods: A systematic literature review. Information and Software Technology, 2018. 94: p. 30-37.
[3]
Kumari, S., Design of a user anonymous password authentication scheme without smart card. International Journal of Communication Systems, 2016. 29(3): p. 441-458.
[4]
Mondego, D.Y. and E. Gide, Exploring the Factors that Have Impact On Consumers’ Trust in Mobile Payment Systems in Australia. Journal of Information Systems and Technology Management, 2020.
[5]
McCauley, D. My Health Record opt-out doubles to 2.5 million people. 2019 [cited 2022 February 18].
[6]
Danila, R. and A. Abdullah, User's Satisfaction on E-government Services: An Integrated Model. Procedia - Social and Behavioral Sciences, 2014. 164: p. 575-582.
[7]
Dubey, A., Z. Saquib, and S. Dwivedi. Electronic authentication for e-Government services - a survey. 2015. Institution of Engineering and Technology.
[8]
Marta, I., Digital identity as a key enabler for e-government services. 2016, GSMA.
[9]
Klopper, R. and S. Lubbe, The Matrix Method of Literature Review. Alternation, 2007. 14.
[10]
Webster, J. and R. Watson, Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly, 2002. 26.
[11]
Liaropoulos, A., A Human-Centric Approach to Cybersecurity: Securing the Human in the Era of Cyberphobia. Journal of Information Warfare, 2015. 14(4): p. 15-24.
[12]
Rahul, B. and K. Sanjay, E- authentication framework for e-governanceservices. open access, 2015.
[13]
Banihashemi, S., Identifying and Prioritizing Evaluation Criteria for User-Centric Digital Identity Management Systems. International Journal of Advanced Computer Science and Applications, 2016. 7(7).
[14]
Alt, R., S. Human, and G. Neumann. End-user empowerment in the digital age. in Proceedings of the 53rd Hawaii International Conference on System Sciences. 2020.
[15]
Altinkemer, K. and T. Wang, Cost and benefit analysis of authentication systems. Decision Support Systems, 2011. 51(3): p. 394-404.
[16]
Acharya, B., Impacts of the digital divide on the e-government portals of Nepal, in Digital Inequalities in the Global South 2020: Palgrave Macmillan. p. 33-57.
[17]
Anand, D. and V. Khemchandani, Unified and integrated authentication and key agreement scheme for e-governance system without verification table. Sādhanā, 2019. 44(9).
[18]
Chowdhury, N.H., M.T.P. Adam, and G. Skinner, The impact of time pressure on cybersecurity behaviour: a systematic literature review. Behaviour & Information Technology, 2019. 38(12): p. 1290-1308.
[19]
Forget, A., S. Chiasson, and R. Biddle, User-centred authentication feature framework. Information and Computer Security, 2015. 23(5): p. 497-515.
[20]
Chong, K.W., Y.S. Kim, and J. Choi, A Study of Factors Affecting Intention to Adopt a Cloud-Based Digital Signature Service. Information, 2021. 12(2): p. 60.
[21]
Velásquez, I., A. Caro, and A. Rodríguez, Multifactor Authentication Methods: A Framework for Their Comparison and Selection. 2020, IntechOpen.
[22]
Bruun, A., K. Jensen, and D. Kristensen, Usability of Single- and Multi-factor Authentication Methods on Tabletops: A Comparative Study. 2014, Springer Berlin Heidelberg. p. 299-306.
[23]
Carretero, J., Federated Identity Architecture of the European eID System. IEEE Access, 2018. 6: p. 75302-75326.
[24]
Laux, D., Adoption of Biometric Authentication Systems: Implications for Research and Practice in the Deployment of End-User Security Systems. Journal of Organizational Computing and Electronic Commerce, 2011. 21(3): p. 221-245.
[25]
Carter, L. and F. Belanger. Citizen adoption of electronic government initiatives. 2004. IEEE.
[26]
Carter, L. and F. BÈlanger, The utilization of e government services: citizen trust, innovation and acceptance factors Information Systems Journal, 2005. 15: p. 5-25.
[27]
Vossaert, J., User-Centric Identity Management Using Trusted Modules. 2011, Springer Berlin Heidelberg. p. 155-170.
[28]
Eliasson, C., M. Fiedler, and I. Jorstad. A Criteria-Based Evaluation Framework for Authentication Schemes in IMS. in International Conference on Availability, Reliability and Security. 2009. IEEE.
[29]
Huang, D.-L., P.-L.P. Rau, and G. Salvendy, Perception of information security. Behaviour & Information Technology, 2010. 29(3): p. 221-232.
[30]
Rajapakse, J., e-Government Adoptions in Developing Countries. International Journal of Electronic Government Research, 2013. 9(4): p. 38-55.
[31]
National Institute of Standards and Technology, Digital Identity Guidelines. 2017.
[32]
Australian Government Information Management Office, ‘National e-Authentication framework’, D.o.F.a. Deregulation, Editor. 2009. p. 1-49.
[33]
ISO, ‘ISO/IEC 29115:2013 Information technology — Security techniques — Entity authentication assurance framework’. 2013: Switzerland. p. 1-35.
[34]
Organisation for Economic Co-operation and Development, ‘Digital identity management’, in Enabling Innovation and Trust in the Internet Economy. 2011.
[35]
Government of Qatar. National Authentication System (Tawtheeq). 2021 [cited 2021 November].
[36]
Government of India, e-Pramaan: Framework for e-Authentication. 2014.
[37]
Government of Canada. Standard on Identity and Credential Assurance. 2013 [cited 2020 05 December]; Available from: https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=26776.
[38]
Australian/New Zealand Standard, ‘Corporate governance of information technology’. 2010, SAI Global.
[39]
The Guardian. My Health Record. 2019 [cited 2021 16th May]; Available from: https://www.theguardian.com/australia-news/2019/feb/20/more-than-25-million-people-have-opted-out-of-my-health-record.
[40]
Parliament of Australia. Identity cards and the Access Card. 2010 [cited 2021 16th May]; Available from: https://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/Publications_Archive/archive/identitycards.
[41]
Digital Transformation Agency, Trusted Digital Identity Framework. 2018. 1.2.
[42]
White, P. Identity management architecture in the Australian public sector. in 5th International Conference on Information Technology and Applications ICITA. 2008.
[43]
The New York Times. Cambridge Analytica and Facebook: The Scandal and the Fallout So Far. 2018 [cited 2022 04 February]; Available from: https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html.
[44]
Beduschi, A., Rethinking digital identity for post-COVID-19 societies: Data privacy and human rights considerations. Data & Policy, 2021. 3.
[45]
Ali, A., Factors affecting user adoption of identity management systems: an empirical study, in School of Information Systems, Technology and Management. 2013, The University of New South Wale: New South wales. p. 373.
[46]
Alnuaimi, M., Barriers to electronic government citizens' adoption: a case of municipal sector in the Emirate of Abu Dhabi. 2011. IEEE.
[47]
Guel, M.D., A Framework for Choosing Your Next Generation Authentication/Authorization System. Information Security Technical Report, 2002. 7(1): p. 63-78.
[48]
Jang-Jaccard, J. and S. Nepal, A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 2014. 80(5): p. 973-993.
[49]
Heartfield, R. and G. Loukas, Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security, 2018. 76: p. 101-127.

Index Terms

  1. Towards Improving the Adoption and Usage of National Digital Identity Systems
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ASE '22: Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering
        October 2022
        2006 pages
        ISBN:9781450394758
        DOI:10.1145/3551349
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 05 January 2023

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. National digital identity system
        2. authentication
        3. human-centric cybersecurity

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Funding Sources

        • CSCRC Cyber Security Cooperative Research Centre

        Conference

        ASE '22

        Acceptance Rates

        Overall Acceptance Rate 82 of 337 submissions, 24%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 137
          Total Downloads
        • Downloads (Last 12 months)50
        • Downloads (Last 6 weeks)2
        Reflects downloads up to 09 Nov 2024

        Other Metrics

        Citations

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media