The application of a personal identification database and risk management mechanism

In the ICT era and take into account the trend toward NPM, Governance has been urging the e-government to provide “active” and “tailored” services. More importantly, in the aged society resulting from the aging baby boomers, the services of a democratic government need to be more satisfactory and timely when a large part of the citizens in any society become old. A system or database containing personal data by which to identify individuals is indispensable when the e-government wants to deliver services. According to Tsai (2005a: 7)’s research: a method of personal identification is used to distinguish the data specific to personal characteristics such as ID cards, credit cards, GCA, signatures, fingerprint, iris scans, blood vessels, etc. The first part assigns data on personal characteristics on the “carrier,” and the second part makes us of a “live” body. Because the “carrier” may be lost and copied, the second method is less risky from the current perspectives of “duplication” technology. Although a “live” body is better than a “carrier,” considering the method of personal identification, there is another issue that must be considered when the e-government wants to collect personal data that relates to the issue of “privacy,” not to mention the development of a means by which to integrate different kinds of personal “live” data into a database. Therefore, in this research, a literature analysis and the political economy approach are used to explore this issue based on demand and supply, problems of privacy, risks, and management mechanisms because determining a method by which to ensure that personal identification data is not leaked and misused is a very serious issue. This also involves the concept of “risk,” as Beck, Giddens, Lash & Urry (1994) mentioned in their discussion of “Risk Society” in the “Second Modernity.” As a result, risk management is vital, especially the recognition of how risk diverges among people. This essay therefore focuses on the following: how to choose a proper personal identification tool, the establishment of a personal identification database and the creation of a set of safe enquiry mechanisms, which includes both inquiry rights and inquiry methods. This inquiry method contains both public usage and personal usage, based on group decisions and self-decisions, respectively. Furthermore there should be laws established to punish offenders. Thus, this paper not only provides a method for using personal identification to benefit people, but also offer cures intended to prevent risk by using a special enquiry mechanism. Consequently, the e-government will be able to actively provide tailored services and provide welfare to the population. More important, this decision making mechanism model could be widely applied to solve similar kind of problems, especially in the diverged era. Besides, this kind of integrative platforms could be applied to different ministries as a basic infrastructure to achieve the aims of openness, transparency, knowledge accumulation, etc. on the part of e-governments.

___

  • Beck Ulrich, Giddens Anthony, Lash Scott (1994). Reflexive Modernization: Politics, Tradition, and Aesthetics in the Modern Social Order. Cambridge: Polity Press.
  • Bryson John M., Crosby Barbara C., Bloomberg Laura (2014). Public Value Govern-ance: Moving Beyond Traditional Public Administration and the New Public Management, Public Administration Review, Vol. (74) 4, pp. 445-456. DOI: 10.1111/puar.12238
  • Chou Kuei Tien (2001). Risk of science: risk constructing of multi consensus. in Second Modernity─ What next road of risk society?. Ed. by Ku Chung Hwa. Taipei: Blueocean Press.
  • Dunn William N. (1994). Public Policy Analysis: An Introduction. 2nd edition, NJ: Prentice Hall.
  • Dye Thomas R. (2001). Understanding Public Policy. Tenth edition, NJ: Prentice Hall.
  • Funtowicz, Silivo O. & Ravetz, Jerome R. (1992). “Three Types of Risk Assessment and the Emergence of Post-Normal Science” in Krimsky & Golding (eds.), So-cial Theory of Risk. Praeger Publiseher.
  • Huang, Jeng-Ti (2006). Niklas Luhmann’s Study of Risk-Sociology and Policy-Making, Taiwanese Journal of Political Sciences, Iss.128, pp.123-162.
  • Liou, Tom (2015). Promoting Professional Management to Support Local Government, Forum on Training and Development, Issue 177, pp.36-43.
  • Luhmann, Niklas (1993). Risk: A Sociological Theory. New York: De Gruyter.
  • Enroth, Henrik (2014). Governance: The art of governing after govern mentality, European Journal of Social Theory, Vol. (17)1 60-76. DOI: 10.1177/1368431013491818
  • Şahin, İsmail (2014). Government tools in public administration and emergent trends: Contracting, citizen participation, and networks, International Journal of Human Sciences, Vol. 11(2), pp.1082-1103. Doi:10.14687/ijhs.v11i2.2783
  • Seetharaman K. and Ragupathy R. (2012). Iris recognition for personal identification System, Proceedia Engineering (Elsevier), Volume 38, Number 1, Jun 2012, pp. 1531-1546. 2012. doi.org/10.1016/j.eij.2012.10.001
  • Song Wonseok, Kim Taejeong, Kim Hee Chan, Chio Joon Hwan, Kong Hyoun-Joong, Lee Seung-Rae (2011). A finger-vein verification system using mean curva-ture, Pattern Reconition Letters, 32(2011) pp.1541-1547. Doi: 10.1016/j.patrec.2011.04.021
  • Tsai, Chi Hsien (2002). Thinking about the government’s policy and civic culture which derives from constructing National fingerprint file, Police Torch Monthly, 553 (2002/08), pp.70-71.
  • Tsai, Chi Hsien (2005a). An Alternative Policy Analysis of Personal Identification and Constructing National fingerprint Databank, NanTou County: theses of master, Department of PAPP, NCNU.
  • Tsai, Chi Hsien (2005b). The Analysis of Constructing National Fingerprint File and Risk Management, Which derives from it, The Legislative Yuan Monthly, Vol.(33)6,7 (386;387) pp. 103-112; 88-110.
  • Tsai, Chi Hsien (2006). The Policy Analysis of Personal Identification and Con-structing National Fingerprint Database, Forum on Training and Development No. 62, 29-36.
  • Walker, Richard M. (2015). Public Governance, Management And Performance: Evidence From Public Administration, Forum on Training and Development, 170, pp. 45-64.
  • Wu Jian- Da, Liu Chiung- Tsiung (2011). Finger-vein pattern identification using principal component analysis and the neural network technique, Expert Sys-tems with Applications, 38(2011) pp.5423-5427. Doi:10.1016/j.eswa.2010.10.013
  • Yang Jinfeng, Shi Yihua, Yang Jinli (2011). Personal Identification based on finger-vein features, Computers in Human Behavior, 27, pp. 1565-1570. Doi:10.1016/j.chb.2010.10.029
  • https://www.gov.uk/government/organisations/uk-visa-andimigration, accessed in Nov.12.2015.
  • http://www.immigration.gov.tw/egate/english.html, accessed in Nov. 12. 2015.
  • http://politics.ntu.edu.tw/psr/?post_type=chinese&p=924, accessed in Nov. 12. 2015
  • https://www.whitehouse.gov/omb/e-gov/, accessed in Nov. 9th.2015.
  • http://www.oecd.org/internet/ieconomy/information security, accessed in Nov.9th.2015
  • http://www.un.org/en/development/desa/population/publications/pdf/ageing/WorldPopulationAgeing2013.pdf