IDEAS home Printed from https://ideas.repec.org/a/idt/journl/cs8804.html
   My bibliography  Save this article

Secondary Uses of Personal Identity Information: Policies, Technologies and Regulatory Framework

Author

Listed:
  • Joseph K. ADJEI

    (Center for Communication, Media and Information Technologies (CMI), Aalborg University Copenhagen, Denmark)

  • Henning OLESEN

    (Center for Communication, Media and Information Technologies (CMI), Aalborg University Copenhagen, Denmark)

Abstract

Although personal identity information must primarily be used for protecting and promoting the physical needs of individuals, it has also become central to the business models of the digital age due to its use for other secondary purposes, resulting in various innovative identity management (IdM) solutions in OECD countries. Nonetheless, developing countries have still not been able to address basic identification challenges such as civil registration, real-time credentials verifications, etc. This paper discusses a means of communicating identity-related concepts to policy-makers, technologists, credential issuers and other stakeholders by addressing core issues relating to secondary use of personal information. The results of a stakeholder workshop in Ghana on secondary use of personal information are presented by stating the core issues and recommendations. We propose the adaptation and application of existing IdM research and experiences from OECD countries to deal with issues involved in using personal information for secondary purposes.

Suggested Citation

  • Joseph K. ADJEI & Henning OLESEN, 2012. "Secondary Uses of Personal Identity Information: Policies, Technologies and Regulatory Framework," Communications & Strategies, IDATE, Com&Strat dept., vol. 1(88), pages 79-98, 4th quart.
  • Handle: RePEc:idt:journl:cs8804
    as

    Download full text from publisher

    File URL: http://repec.idate.org/RePEc/idt/journl/CS8804/CS88_ADJEI_OLESEN.pdf
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Oecd, 2011. "Digital Identity Management for Natural Persons: Enabling Innovation and Trust in the Internet Economy - Guidance for Government Policy Makers," OECD Digital Economy Papers 186, OECD Publishing.
    2. Naresh K. Malhotra & Sung S. Kim & James Agarwal, 2004. "Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research, INFORMS, vol. 15(4), pages 336-355, December.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Cheng, Junjun & Chen, Bo & Huang, Zihang, 2023. "Collective-based ad transparency in targeted hotel advertising: Consumers’ regulatory focus underlying the crowd safety effect," Journal of Retailing and Consumer Services, Elsevier, vol. 72(C).
    2. Potoglou, Dimitris & Palacios, Juan & Feijoo, Claudio & Gómez Barroso, Jose-Luis, 2015. "The supply of personal information: A study on the determinants of information provision in e-commerce scenarios," 26th European Regional ITS Conference, Madrid 2015 127174, International Telecommunications Society (ITS).
    3. Morosan, Cristian, 2016. "An empirical examination of U.S. travelers’ intentions to use biometric e-gates in airports," Journal of Air Transport Management, Elsevier, vol. 55(C), pages 120-128.
    4. Corey Angst, 2009. "Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges," Journal of Business Ethics, Springer, vol. 90(2), pages 169-178, November.
    5. Pieper, Nadine & Woisetschläger, David M., 2024. "Customer misbehavior in access-based mobility services: An examination of prevention strategies," Journal of Business Research, Elsevier, vol. 171(C).
    6. Huarng, Kun-Huang & Yu, Tiffany Hui-Kuang & Lee, Cheng fang, 2022. "Adoption model of healthcare wearable devices," Technological Forecasting and Social Change, Elsevier, vol. 174(C).
    7. Mario Silic & Andrea Back, 2016. "The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 15(01), pages 151-185, January.
    8. Angeliki Kitsiou & Charikleia Despotidi & Christos Kalloniatis & Stefanos Gritzalis, 2022. "The Role of Users’ Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study," Future Internet, MDPI, vol. 14(11), pages 1-31, November.
    9. Meents, S. & Verhagen, T. & Vlaar, P.W.L., 2011. "How sellers can stimulate purchasing in electronic marketplaces: Using information as a risk reduction signal," Serie Research Memoranda 0014, VU University Amsterdam, Faculty of Economics, Business Administration and Econometrics.
    10. Zhenhui (Jack) Jiang & Cheng Suang Heng & Ben C. F. Choi, 2013. "Research Note —Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions," Information Systems Research, INFORMS, vol. 24(3), pages 579-595, September.
    11. Erdem Özkan, 2018. "Why Do Consumers Behave Differently in Personal Information Disclosure and Self-Disclosure? The Role of Personality Traits and Privacy Concern," Alphanumeric Journal, Bahadir Fatih Yildirim, vol. 6(2), pages 257-276, December.
    12. David Harborth & Sebastian Pape, 2020. "Empirically Investigating Extraneous Influences on the “APCO” Model—Childhood Brand Nostalgia and the Positivity Bias," Future Internet, MDPI, vol. 12(12), pages 1-16, December.
    13. Yi Sun & Shihui Li & Lingling Yu, 2022. "The dark sides of AI personal assistant: effects of service failure on user continuance intention," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(1), pages 17-39, March.
    14. Chetan A. Jhaveri & Jitendra M. Nenavani, 2020. "Evaluation of eTail Services Quality: AHP Approach," Vision, , vol. 24(3), pages 310-319, September.
    15. Saridakis, George & Benson, Vladlena & Ezingeard, Jean-Noel & Tennakoon, Hemamali, 2016. "Individual information security, user behaviour and cyber victimisation: An empirical study of social networking users," Technological Forecasting and Social Change, Elsevier, vol. 102(C), pages 320-330.
    16. Raouf Jaziri & Mohammad Miralam, 2019. "Modelling the crowdfunding technology adoption among novice entrepreneurs: an extended tam model," Entrepreneurship and Sustainability Issues, VsI Entrepreneurship and Sustainability Center, vol. 6(4), pages 2159-2179, June.
    17. Faqih, Khaled M.S., 2016. "An empirical analysis of factors predicting the behavioral intention to adopt Internet shopping technology among non-shoppers in a developing country context: Does gender matter?," Journal of Retailing and Consumer Services, Elsevier, vol. 30(C), pages 140-164.
    18. Grace Fox & Lisa van der Werff & Pierangelo Rosati & Patricia Takako Endo & Theo Lynn, 2022. "Examining the determinants of acceptance and use of mobile contact tracing applications in Brazil: An extended privacy calculus perspective," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 73(7), pages 944-967, July.
    19. Tajvidi, Mina & Richard, Marie-Odile & Wang, YiChuan & Hajli, Nick, 2020. "Brand co-creation through social commerce information sharing: The role of social media," Journal of Business Research, Elsevier, vol. 121(C), pages 476-486.
    20. Boukis, Achilleas & Christodoulides, George & Semaan, Rania W. & Stathopoulou, Anastasia, 2024. "What drives consumers towards shared luxury services? A comparison of sequential versus simultaneous sharing," Journal of Business Research, Elsevier, vol. 177(C).

    More about this item

    Keywords

    identity; identity management; personal information; secondary use; trust; privacy.;
    All these keywords.

    JEL classification:

    • L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:idt:journl:cs8804. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: BLAVIER Thomas (email available below). General contact details of provider: https://edirc.repec.org/data/idatefr.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.