Authentication, privacy, and the federal E-Government

被引:11
作者
Holden, SH
Millett, LI
机构
[1] UMBC, Dept Informat Syst, Baltimore, MD 21250 USA
[2] Natl Acad, Comp Sci & Telecommun Board, Washington, DC USA
关键词
authentication; e-government; federal law; privacy;
D O I
10.1080/01972240500253582
中图分类号
G2 [信息与知识传播];
学科分类号
05 ; 0503 ;
摘要
As federal agencies move toward more sophisticated e-government offerings, they must consider both policy and operational requirements for electronic authentication (e-authentication). One important consideration in designing and deploying e-authentication solutions is the balance between access, security, authentication, and privacy. Public law and government-wide policy encourage e-government and e-authentication simultaneously with privacy protection, creating policy and operational tensions for e-government efforts. A review of the relevant laws and policies and analyses of the privacy implications of authentication technologies indicates that federal agencies have at least two analytic frameworks for balancing privacy concerns with e-authentication. A framework offered in the 2003 National Research Council report Who Goes There? and the privacy impact analysis requirements of the E-Government Act of 2002 provide e-government projects with the tools for navigating the path between privacy and openness, required by both e-government law and policy.
引用
收藏
页码:367 / 377
页数:11
相关论文
共 32 条
[11]  
FLAHERTY DH, 2000, PRIVACY IMPACT ASSES
[12]  
Fletcher P.D., 2002, INT J PUBLIC ADMIN, V25, P723
[13]  
FTC, 2000, PRIV ONL FAIR INF PR
[14]  
*GEN SERV ADM, 2001, US
[15]  
*INT REV SERV, 2000, INT REV SERV MOD INF
[16]  
Karol Thomas J., 2001, GUIDE CROSS BORDER P
[17]   Developing fully functional E-government: A four stage model [J].
Layne, K ;
Lee, JW .
GOVERNMENT INFORMATION QUARTERLY, 2001, 18 (02) :122-136
[18]  
MILLBERG SJ, 1995, COMMUN ACM, V38, P65
[19]  
MILLETT LI, 2003, IEEE INTERNET CO NOV, P2
[20]  
*NAT RES COUNC, 2003, WHO GOES THER AUTH L