Privacy enhancing national identification card system

Eric Kuada, Isaac Wiafe, Daniel Addo, Emmanuel Djaba

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

This paper argues that the privacy concerns that are associated with national identification systems is because of the failure of various countries to implement national identification systems with a strong privacy theory backing the implementation. This work is therefore aimed at addressing the privacy concerns of those countries debating national identification system adoption. Furthermore, the project sought to design and develop a privacy enhancing national identification system that is suitable for implementation at minimal cost per capita to any country. Our proposed privacy enhancing national identification card system was designed and developed based on the control and limitation theory of privacy to achieve the objectives of restricting unauthorized access to information on the identification card, and giving the cardholder control over who has access to information on the identification card.

Original languageEnglish
Title of host publication2017 IEEE AFRICON
Subtitle of host publicationScience, Technology and Innovation for Africa, AFRICON 2017
EditorsDarryn R. Cornish
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages867-872
Number of pages6
ISBN (Electronic)9781538627754
DOIs
Publication statusPublished - 3 Nov 2017
Externally publishedYes
EventIEEE AFRICON 2017 - Cape Town
Duration: 18 Sep 201720 Sep 2017

Publication series

Name2017 IEEE AFRICON: Science, Technology and Innovation for Africa, AFRICON 2017

Conference

ConferenceIEEE AFRICON 2017
Country/TerritorySouth Africa
CityCape Town
Period18/09/1720/09/17

Keywords

  • Access revocation
  • Card verification
  • Identification card
  • National ID card systems
  • Privacy
  • Privacy theories

Fingerprint

Dive into the research topics of 'Privacy enhancing national identification card system'. Together they form a unique fingerprint.

Cite this