E-Identity and Security: Study of the Role of Identity Management in Sustainable Development

Authors

  • Amodu Akeem Department of Politics and International Relations Lead City University, Ibadan
  • Ejiofor Titilope Department of Politics and International Relations Lead City University, Ibadan

DOI:

https://doi.org/10.14738/assrj.97.12494

Keywords:

sustainable development, E-identity, Identity, Security

Abstract

Globally, the ability to prove one’s identity is increasingly recognized as the basis for accessing government goods and services, including security. The level of e-identity infrastructure and security in a given society determines the degree of success or failure of accomplishing the sustainable development goals (SDGs) of the United Nations. United Nations statistics indicate that a billion people in Africa and Asia lack proof of identification. Through conceptual and qualitative analysis of data gathered from both primary and secondary sources, and with particular reference to Nigeria, the paper examined the interplay between E-identity, security and sustainable development. The paper discovered the following as threats to sustainable e-identity management in Nigeria: lack of political will to enforce legislations for e-identity management; poor planning and funding of enrollment programs (which is at the heart of facilitating the UNSDGs); citizens’ complacency to enroll; and, poor enforcement of sanctions on failure to enroll. The paper concludes among others, that effective e-management of identities is a desideratum for security and sustainable development. 

Author Biography

Ejiofor Titilope, Department of Politics and International Relations Lead City University, Ibadan

Research Scholar,

Department of Politics and International Relations

References

Akeem Amodu (2019) Philosophy of Science and Sustainability: A Concise Introduction Ibadan: College Press, Pp 1-5

SDSN. Indicators and a monitoring framework. Launching a data revolution for the sustainable development goals. Retrieved from https://indicators.report/targets/16-9/

World Bank Group (2016). Digital Identity: Towards shared principles for public and private sector cooperation. A Joint World Bank Group – GSMA – Secure Identity Alliance Discussion. Retrieved from https://documents.worldbank.org/curated/en/600821469220400272/pdf/107201-WP-PUBLIC-WB-GSMA-SIADigitalIdentity-WEB.pdf

Daniel Sollberger On identity: from a philosophical point of view Child Adolesc Psychiatry Ment Health v.7; 2013 PMC3751052

Jenkins, Richard 2008. Social Identity. London; New York: Routledge. https://konspektikaust.wordpress.com/2013/01/09/richard-jenkins-social-identity/

James D. Fearon (1999). What is Identity (As we now use the word). Retrieved from https://web.stanford.edu/group/fearon-research/cgi-bin/wordpress/wp-content/uploads/2013/10/What-is-Identity-as-we-now-use-the-word-.pdf

Aron Kozak, What is an eID (electronic identity)? https://www.signicat.com/blog/what-is-an-eid-electronic-identity#:~:text=In%20the%20simplest%20of%20terms,attributes%20relating%20to%20the%20holder. Accessed 29/05/22

Ibid.

Derrick Rountree (2013) Federated Identity Primer Elsevie rhttps://www.sciencedirect.com/sdfe/pdf/download/eid/3-s2.0-B9780124071896000017/first-page-pdf Accessed 29/05/22

Christophe Kiennert, Samia Bouzefrane, Pascal Thoniel (2015) ‘Authentication Systems’ in

Maryline Laurent, Samia Bouzefrane (Eds) Digital Identity Management Elsevier ISBN 9781785480041 https://doi.org/10.1016/B978-1-78548-004-1.50003-1 (https://www.sciencedirect.com/science/article/pii/B9781785480041500031)

Ibid

Thales Group ‘Digital Identity Trends - 5 forces that are shaping 2022’ https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/identity/digital-identity-services/trends#:~:text=Usually%20issued%20or%20regulated%20by,as%20defined%20by%20national%20law.

Brooks, D. J. (2010). What is security: Definition through knowledge categorization. Security Journal, 23(3), 225-239.

Electronic Privacy Information Centre https://archive.epic.org/privacy/id_cards/real_id_act.pdf Acessed 28th May 2022

The Central People’s Government of The People’s Republic of China Resident Identity Card Law of the People's Republic of China http://www.gov.cn/banshi/2005-08/02/content_19457.htm

Accessed 30th May 2022

NIMC. NIMC Act 2007. Retrieved from https://www.nimc.gov.ng/docs/reports/nimc_act.pdf

Criminality or crime in the digital age is perhaps the worst threat ever to national and global security

FBI https://www.fbi.gov/investigate/cyber Accessed 26th May 2022

Ibid.

Akeem Amodu (2020). History and philosophy of sustainable development: Road-Mapping Interdisciplinarity for wellbeing. Journal of Interdisciplinary Sciences. Vol 4. Issue 1;58-65. Retrieved from http://journalofinterdisciplinarysciences.com/wp-content/uploads/2020/04/4-History-and-Philosophy-of-Sustainable-Development-Road-Mapping-Interdisciplinarity-for-Wellbeing.pdf

https://nimc.gov.ng/nin-sim-linkage-fg-commends-compliance-and-directs-telcos-to-bar-outgoing-calls-on-unlinked-lines-from-4th-april-2022/

Akinyetun, Tope. (2021). Poverty, Cybercrime and National Security in Nigeria. Journal of Contemporary Sociological Issues. 1. 1-23. 10.19184/csi.v1i2.24188.

Downloads

Published

2022-07-09

How to Cite

Akeem, A., & Titilope, E. (2022). E-Identity and Security: Study of the Role of Identity Management in Sustainable Development. Advances in Social Sciences Research Journal, 9(7), 45–53. https://doi.org/10.14738/assrj.97.12494