2016
DOI: 10.1504/ijeg.2016.082679
|View full text |Cite
|
Sign up to set email alerts
|

Identification in e-participation: a multi-dimensional model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…The listed principles relate to an important fact—participation of individuals in the e‐governance processes by using ICT creates possibility for violation of some human rights connected whit protection of his or her private life. The problem of the identification in e‐participation is discussed in Schossböck, Rinnerbauer, Sachs, Wenda, and Parycek () determining the selection of electronic identification methods as “a crucial question in the conceptual design of e‐participation processes.” The main problems are directed to the “technical security of a system and low participation threshold.” It is known that the anonymous participation in the e‐process is a good method, but in some cases, the strong identification, authentication, and authorization are required. In this reason, the article presents an expert‐based model for identification methods based on the important aspects as transparency and privacy.…”
Section: E‐governance and Ict‐related Workmentioning
confidence: 99%
“…The listed principles relate to an important fact—participation of individuals in the e‐governance processes by using ICT creates possibility for violation of some human rights connected whit protection of his or her private life. The problem of the identification in e‐participation is discussed in Schossböck, Rinnerbauer, Sachs, Wenda, and Parycek () determining the selection of electronic identification methods as “a crucial question in the conceptual design of e‐participation processes.” The main problems are directed to the “technical security of a system and low participation threshold.” It is known that the anonymous participation in the e‐process is a good method, but in some cases, the strong identification, authentication, and authorization are required. In this reason, the article presents an expert‐based model for identification methods based on the important aspects as transparency and privacy.…”
Section: E‐governance and Ict‐related Workmentioning
confidence: 99%
“…[4] Concepts of e-participation, reflecting either the way of participation (top-down or bottom-up), the legal foundation (formal or informal), the goals of a measure or the intensity of e-participation in tiers. [5,6] In this paper, we draw on structured concepts of citizen involvement and decision-making, where each level of participation increases citizen power or the intensity of participation. In line with the idea of the meta-analytical study of Al-Dalou' & Abu-Shanab [7] that the most comprehensive model is a five levels schema, a 5-level concept of e-participation levels was chosen in the context of this paper: (1) Information, (2) consultation, (3) cooperation, (4) co-decision, and (5) decision.…”
Section: Introductionmentioning
confidence: 99%
“…In line with the idea of the meta-analytical study of Al-Dalou' & Abu-Shanab [7] that the most comprehensive model is a five levels schema, a 5-level concept of e-participation levels was chosen in the context of this paper: (1) Information, (2) consultation, (3) cooperation, (4) co-decision, and (5) decision. [5] Previous research of the authors study group has utilized this classification for a model of tool assessment, specifically for investigating which e-ID is appropriate on which particular level of e-participation, with special regard to voting and rating mechanisms, participation threshold and security. [5,8] This paper focuses on the acceptance of users and potential stakeholders when it comes to choosing appropriate means of identification (e-IDs) for authentication in different e-participation levels.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…There exists a vast body of related literature on privacy and security issues related to digital engagement (Afzalan and Muller, 2018;Falco and Kleinhans, 2018a;Hall et al, 2021;Hafferty et al, forthcoming); e-participation and e-governance (Le Blanc, 2020;Schossboeck et al, 2016); structural privacy and democracy (Bartlett, 2018;Bernholz, et al, 2021); digital and data ethics (Helbing et al, 2021;Wachter, 2018); the ethics of algorithms and algorithmic decision-making Tsamados et al, 2021;Wachter et al, 2017); geoprivacy (Ethical Geo, 2021;Kwan et al, 2004;Richardson et al, 2015) and related areas of ethics in online qualitative research (Boland et al, 2021;Gray et al, 2020;Salmons, 2016). Awareness of privacy and security issues have increased in recent years, partly driven by instances of privacy breaches (e.g., on social media, private databases, and during webinars), surveillance and tracking, and concerns over the safe storage and responsible use of data (Le Blanc, 2020).…”
Section: (Vi) Privacy and Securitymentioning
confidence: 99%