The entity-relationship model—toward a unified view of data
ACM Transactions on Database Systems (TODS) - Special issue: papers from the international conference on very large data bases: September 22–24, 1975, Framingham, MA
Fundamentals of Data Warehouses
Fundamentals of Data Warehouses
Security Architecture of the Austrian Citizen Card Concept
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Interoperability in E-Government: More than Just Smart Middleware
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS'05) - Track 5 - Volume 05
Managing Multiple and Dependable Identities
IEEE Internet Computing
Current practices of leading e-government countries
Communications of the ACM - The digital society
Privacy and identity management for everyone
Proceedings of the 2005 workshop on Digital identity management
Federated identity management for protecting users from ID theft
Proceedings of the 2005 workshop on Digital identity management
Journal of Management Information Systems - Special section: Strategic and competitive information systems
Understanding Determinants of Online Consumer Satisfaction: A Decision Process Perspective
Journal of Management Information Systems
Information Exploitation and Interorganizational Systems Ownership
Journal of Management Information Systems
Identities Management for E-Commerce and Collaboration Applications
International Journal of Electronic Commerce
Impact of Information Technology Management Practices on Customer Service
Journal of Management Information Systems
International Journal of Business Information Systems
Trust and Electronic Government Success: An Empirical Study
Journal of Management Information Systems
The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services
Journal of Management Information Systems
Journal of Theoretical and Applied Electronic Commerce Research
Interoperability of eGovernment for Building Intergovernmental Integration in the European Union
Social Science Computer Review
The Business Interoperability Quotient Measurement Model
Computers in Industry
Profit-maximizing firm investments in customer information security
Decision Support Systems
Advancing Public Trust Relationships in Electronic Government: The Singapore E-Filing Journey
Information Systems Research
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance
SecureGov: secure data sharing for government services
Proceedings of the 14th Annual International Conference on Digital Government Research
IT consumerization under more difficult conditions: insights from German local governments
Proceedings of the 14th Annual International Conference on Digital Government Research
Examining success factors of open source software repositories: the case of OSOR.eu portal
International Journal of Business Information Systems
G2G information sharing among government agencies
Information and Management
Hi-index | 0.00 |
In business and government organizations, information systems often handle sensitive data about individuals and other organizations, using various kinds of identifiers. The growing cooperation of organizations results in the need to share and exchange such data. This collection and sharing, however, is affected by privacy concerns, and organizational and technical issues have to be solved and taken into account. This paper describes the results of an exploratory study in the government sector, focusing on the way public organizations manage identity-related data and the sharing of such data, either with other public agencies or with private organizations. Despite significant progress in harmonizing the legal and administrative provisions and technical standards in the European Union, there are still considerable cross-country differences regarding this subject. These differences-together with the growing mobility of goods, persons, and related data within the European Union-cause particular challenges for information systems in digital government in this region. After discussing and defining the key notions and methodology of the study, we present the status quo in 18 out of 25 EU member states and compare it to the results of a prior study by the same network done in 2001. Finally, we draw conclusions about identity management in cross-border contexts.