Presentation is loading. Please wait.

Presentation is loading. Please wait.

E-GOVERNMENT : AUTHENTICATION OF IDENTITY By Hon Trevor Mallard Minister of State Services, State Services Commission, NZ Government, 16 April 2002. Available:

Similar presentations


Presentation on theme: "E-GOVERNMENT : AUTHENTICATION OF IDENTITY By Hon Trevor Mallard Minister of State Services, State Services Commission, NZ Government, 16 April 2002. Available:"— Presentation transcript:

1 E-GOVERNMENT : AUTHENTICATION OF IDENTITY By Hon Trevor Mallard Minister of State Services, State Services Commission, NZ Government, 16 April 2002. Available: http://www.e-government.govt.nz/authentication/cabinet-paper-2002-04- 22.pdf, March 2003 http://www.e-government.govt.nz/authentication/cabinet-paper-2002-04- 22.pdf Presented by : Gopi Dinakaran

2 S U M M A R Y This paper presents the Policy Framework by considering several issues and risks for the implementation of secure Electronic Authentication for the E-Government services.

3 A P P R E C I A T I O N (1) Meticulously planned principles. Considered various issues such as Risks,feasibility,Cost,Public opinion, etc.

4 A P P R E C I A T I O N (2) Mentioning “Avoidance of VENDOR CAPTURE” in the Technology Neutrality which is one of the Implementations principles. What is VENDOR CAPTURE ? The process of forcing all the users to depend on any particular vendor’s products is called VENDOR CAPTURE.

5 How does “VENDOR CAPTURE” affect? For Example: Assume: The Government gives the contract of implementing the Electronic Authentication for all of its services to Microsoft, Microsoft develops authentication softwares which can work only on Microsoft OS. This leads to “VENDOR CAPTURE” and all of the users, agencies and the Government are forced to use Microsoft OS.

6 C R I T I C I S M (1) Author did not consider Cost Effectiveness on the user side for the implementation of the Electronic Authentication both in the Policy principles as well as Implementation Principles.

7 C R I T I C I S M (2) Acceptability Though the Author mentioned about the “Acceptability of the of the Authentication approach by the users”, the specific technique which would be used for any particular E-Government service might not be accepted by all the users.

8 P O L I C Y F R A M E W O R K Author’s view:  Acceptability -> users accept the approach.  Protection of Privacy -> protects privacy.  Fit for purpose -> satisfy the purpose.  Flexibility -> able to upgrade in future.

9 ? Q U E S T I O N ? Assume: Fingerprinting is used as the authentication technique to get the access for IRD Services. Does this technique satisfy all the listed Policy framework principles?

10 THANK YOU !


Download ppt "E-GOVERNMENT : AUTHENTICATION OF IDENTITY By Hon Trevor Mallard Minister of State Services, State Services Commission, NZ Government, 16 April 2002. Available:"

Similar presentations


Ads by Google