Abstract

In the ICT era and take into account the trend toward NPM, Governance has been urging the e-government to provide “active” and “tailored” services. More importantly, in the aged society resulting from the aging baby boomers, the services of a democratic government need to be more satisfactory and timely when a large part of the citizens in any society become old. A system or database containing personal data by which to identify individuals is indispensable when the e-government wants to deliver services. According to Tsai (2005a: 7)’s research: a method of personal identification is used to distinguish the data specific to personal characteristics such as ID cards, credit cards, GCA, signatures, fingerprint, iris scans, blood vessels, etc. The first part assigns data on personal characteristics on the “carrier,” and the second part makes us of a “live” body. Because the “carrier” may be lost and copied, the second method is less risky from the current perspectives of “duplication” technology. Although a “live” body is better than a “carrier,” considering the method of personal identification, there is another issue that must be considered when the e-government wants to collect personal data that relates to the issue of “privacy,” not to mention the development of a means by which to integrate different kinds of personal “live” data into a database. Therefore, in this research, a literature analysis and the political economy approach are used to explore this issue based on demand and supply, problems of privacy, risks, and management mechanisms because determining a method by which to ensure that personal identification data is not leaked and misused is a very serious issue. This also involves the concept of “risk,” as Beck, Giddens, Lash & Urry (1994) mentioned in their discussion of “Risk Society” in the “Second Modernity.” As a result, risk management is vital, especially the recognition of how risk diverges among people. This essay therefore focuses on the following: how to choose a proper personal identification tool, the establishment of a personal identification database and the creation of a set of safe enquiry mechanisms, which includes both inquiry rights and inquiry methods. This inquiry method contains both public usage and personal usage, based on group decisions and self-decisions, respectively. Furthermore there should be laws established to punish offenders. Thus, this paper not only provides a method for using personal identification to benefit people, but also offer cures intended to prevent risk by using a special enquiry mechanism. Consequently, the e-government will be able to actively provide tailored services and provide welfare to the population. More important, this decision making mechanism model could be widely applied to solve similar kind of problems, especially in the diverged era. Besides, this kind of integrative platforms could be applied to different ministries as a basic infrastructure to achieve the aims of openness, transparency, knowledge accumulation, etc. on the part of e-governments.

Highlights

  • The main goal of personal identification is to distinguish between individuals

  • This research makes use of a literature analysis and a political economy approach.[1]. It is aimed at exploring the application of personal identification databases via demand and supply, problems, and risk and its management

  • From a comparison of personal identification tools, we can conclude that a “live” identification is better than that of a “carrier.” when we want to apply it, there are some key points should be considered when an e-government wants to construct a personal identification database

Read more

Summary

Introduction

The main goal of personal identification is to distinguish between individuals. It positively identifies who someone is, and can negatively prevent others from impersonating someone. According to research by Tsai (2005a: 104-111), methods of personal identification can be used to distinguish data related to personal characteristics. Some identification tools, such as ID cards, credit cards, GCA, signature, ATM cards, ID number, etc. This research makes use of a literature analysis and a political economy approach.[1] It is aimed at exploring the application of personal identification databases via demand and supply, problems, and risk and its management

The need for personal identification tools and a database as a platform
The key points of e-government supply
The MIS and Enquiry Mechanism as risk management cures
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call