A Privacy-by-Design Implementation Methodology for E-Government

A Privacy-by-Design Implementation Methodology for E-Government

Anton A. Gerunov
Copyright: © 2022 |Pages: 20
DOI: 10.4018/IJEGR.288067
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The issues of privacy and data protection are gaining in prominence, especially against the backdrop of changing citizen preferences and the enforcement of strict legislations such as the EU’s General Data Protection Regulation. Pursuant both article 25 of the Regulation and following good practice, public sector institutions need to apply the principle of Privacy by Design (PbD) to their Information Systems. However, there is limited consensus on how this application is to be carried out. This article aims to fill this gap by constructing an implementation methodology with a particular focus on the e-government domain. This is done by using a design science approach leveraging practical experience and extant literature to design the methodology in accordance to user needs, existing legal requirements, and best practices. The proposed new methodology is applied to a real-life project from Bulgaria’s e-government road-map and evaluated by project stakeholders and experts.
Article Preview
Top

Background

Provide broad definitions and discussions of the topic and incorporate views of others (literature review) into the discussion to support, refute, or demonstrate your position on the topic.1 The need for rigorous information security and privacy functionalities in the e-government domain is hardly a new development (Ebrahim & Irani, 2005). However, the increasing scope and complexity of government functions, together with rising public concern and more aggressive regulations such as the European Union’s GDPR, have increased the salience and the need for ever better privacy measures. While it is widely agreed that implementing security and privacy controls at the design stage of a given information system significantly minimizes work, increases security, and decreases costs (Williams, 2009; Schaar, 2010, Hustinx, 2010), it remains unclear exactly how to do so in a realistic setting (Kroener & Wright, 2014, Jacobs & Popma, 2019, Bednar et al., 2019). Cavoukian (2012а) has proposed a number of principles that Hoepman (2014) operationalizes in a number of privacy-preserving strategies and tactics. Some authors use those to propose a PbD methodology (e.g. Dennedy et al, 2014; Cronk, 2018) but those efforts are largely focused on the private sector.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024)
Volume 19: 1 Issue (2023)
Volume 18: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing