Biometric system for protecting information and improving service delivery: The case of a developing country's social security and pension organisation

被引:0
作者
Owusu-Oware, Emmanuel [1 ]
Effah, John [2 ]
机构
[1] Univ Profess Studies, Dept Informat Technol Studies, Legon, Ghana
[2] Univ Ghana, Dept Operat & Management Informat Syst, Legon, Ghana
关键词
biometric; CIA triad; information security; interpretive study; social security and pension; Ghana; IDENTIFICATION; TECHNOLOGY; MANAGEMENT; GOVERNMENT; THREATS;
D O I
10.1177/02666669221085709
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
The conception of biometric systems as a means of securing sensitive information and enhancing service delivery remains under-researched. To address this knowledge gap, we explore the case of a public-sector social security and pension organisation in Ghana using a qualitative interpretative study approach and the information security model of confidentiality-integrity-availability as an analytical lens. The study's findings indicate that integrating and using biometric identification and authentication as part of delivering social security and pension services can protect availability, confidentiality, and integrity of information. The findings further show that the use of a biometric system for social security and pension information security can contribute to reducing service turnaround time and vulnerability to fraudulent manipulation of benefits payments. The study provides implications for research, practice, and policy. For research, the paper opens up biometric systems' study from the perspective of information security and service improvement. For practice and policy, the study demonstrates the importance of aligning biometric systems' deployment and use with domain application requirements.
引用
收藏
页码:61 / 74
页数:14
相关论文
共 58 条
  • [1] Alsmadi I., 2018, Practical Information Security, P1, DOI DOI 10.1109/NCG.2018.8592962
  • [2] [Anonymous], 2014, The InfoSec Handbook
  • [3] Asani EO., 2014, COMPUTING INFORM SYS, V5, P1
  • [4] Personal identity management and electronic government The case of the national identity card in the UK
    Beynon-Davies, Paul
    [J]. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2007, 20 (03) : 244 - +
  • [5] BHAHARIN S, 2019, 2019 6 INT C RES INN, P1
  • [6] Cyber security attacks on robotic platforms
    Bhardwaj A.
    Avasthi V.
    Goundar S.
    [J]. Network Security, 2019, 2019 (10) : 13 - 19
  • [7] An Inclusive, Value Sensitive Design Perspective on Future Identity Technologies
    Briggs, Pam
    Thomas, Lisa
    [J]. ACM TRANSACTIONS ON COMPUTER-HUMAN INTERACTION, 2015, 22 (05)
  • [8] Bryman A., 2016, SOCIAL RES METHODS
  • [9] Caballero A., 2017, Computer and Information Security Handbook, P393, DOI DOI 10.1016/B978-0-12-803843-7.00024-7
  • [10] Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources
    Cavusoglu, Huseyin
    Cavusoglu, Hasan
    Son, Jai-Yeol
    Benbasat, Izak
    [J]. INFORMATION & MANAGEMENT, 2015, 52 (04) : 385 - 400