ArticlePDF Available

Evaluation of Public Acceptance of Digital ID Cards: Legal and Technological Implications in Indonesian Public Administration

Authors:

Abstract

The implementation of a digital identity system in Indonesia, specifically through the introduction of digital ID cards, represents a significant milestone in the country's public administration. This policy aims to streamline administrative processes, enhance service access, and ensure more efficient management of citizen data. However, the shift to digital identities presents challenges related to personal data protection, technological infrastructure, and public acceptance. This study explores the implications of the digital identity policy, focusing on legal frameworks, public reception, and the protection of personal data. Using a qualitative approach, the study analyzes key findings from interviews, document reviews, and observations, highlighting critical issues such as the security of biometric data, the integration of digital identity systems across public services, and the public's understanding of digital rights. The study concludes with policy recommendations aimed at strengthening data protection laws, improving infrastructure in underserved areas, and fostering greater public awareness to ensure a successful transition to a digital identity system in Indonesia.
Available online at https://ejournal.corespub.com/index.php/ijhlp/index
International Journal of Humanities, Law, and
Politics
Vol. 2, No. 4, pp. 114-118, 2024
e-ISSN 3025-0536
Evaluation of Public Acceptance of Digital ID Cards: Legal and
Technological Implications in Indonesian Public Administration
Mugi Lestari1*, M Panji Agung S2
1Communication in Research and Publications, Bandung, Indonesia
2Indonesian Operations Research Association, Bandung, Indonesia
*Corresponding author email: mu2lestari@gmail.com
Abstract
The implementation of a digital identity system in Indonesia, specifically through the introduction of digital ID cards, represents a
significant milestone in the country's public administration. This policy aims to streamline administrative processes, enhance
service access, and ensure more efficient management of citizen data. However, the shift to digital identities presents challenges
related to personal data protection, technological infrastructure, and public acceptance. This study explores the implications of the
digital identity policy, focusing on legal frameworks, public reception, and the protection of personal data. Using a qualitative
approach, the study analyzes key findings from interviews, document reviews, and observations, highlighting critical issues such
as the security of biometric data, the integration of digital identity systems across public services, and the public's understanding
of digital rights. The study concludes with policy recommendations aimed at strengthening data protection laws, improving
infrastructure in underserved areas, and fostering greater public awareness to ensure a successful transition to a digital identity
system in Indonesia.
Keywords: Digital Identity, Personal Data Protection, Public Administration, Data Security, Public Acceptance.
1. Introduction
The development of information technology in Indonesia in recent years has brought significant transformations in
almost all sectors of life, including in public administration. One of the striking innovations is the digital identity
policy that will be implemented in 2024. The Indonesian government has implemented a digital identity system to
replace the use of photocopies of ID cards in the administrative process. This system aims to facilitate public access to
public services, reduce administrative complexity, and speed up the process of processing various state documents
(Bakar et al., 2023).
The success of implementing this digital identity is highly dependent on existing regulations, especially in terms of
protecting personal data and citizen privacy. As is known, the use of personal data in digital systems brings new
challenges related to data management, storage, and processing. With the threat of data leaks and misuse of personal
information, the government must ensure that this digital identity policy is not only efficient and makes things easier
for the public, but also safe and can protect individual privacy rights (Achmad et al., 2021; Firdaus and Wibawani,
2022).
Indonesia, with its very large population and increasing level of technology adoption, has become a country that is
vulnerable to various risks associated with the use of personal data. In this case, the digital identity policy not only
aims to simplify administration, but also to prevent potential misuse of information that can harm its citizens
(Rakhman, 2023). Therefore, the implementation of this policy requires strong regulations and strict supervision, as
well as high awareness from all related parties, including the government, system organizers, and the public. Along
with that, various regulatory changes related to personal data protection have been made by the government, one of
which is through the ratification of Law No. 27 of 2022 concerning Personal Data Protection (Mayasari, 2023). This
law provides a clearer legal basis regarding individual rights over their personal data and establishes obligations for
organizations to maintain data confidentiality and security. This law also introduces the concept of digital identity as
part of an effort to ensure that personal data used in digital systems is properly protected (Zwitter et al., 2020).
However, even though the law has been implemented, challenges in implementing digital ID cards remain. One of
them is the need for efficient system integration between various government agencies, the private sector, and digital
Lestari et al. / International Journal of Humanities, Law, and Politics, Vol. 2, No. 4, pp. 114-118, 2024 115
service providers. This system must be able to ensure that personal data recorded in digital identities is only used for
legitimate purposes and is not misused by irresponsible parties (Sule et al., 2021).
In addition, technical issues related to cybersecurity are also a major concern in implementing this policy. Given the
potential threats to digital systems, such as hacking and data leaks, it is important for the government to ensure that
digital identity systems are equipped with adequate layers of protection. Data security is a very crucial aspect, given
the sensitivity of the information contained in digital identities, such as biometric data, addresses, and identification
numbers (Sung and Park, 2021).
The role of the community is also very important in the successful implementation of this policy. Digital identity
users must understand their rights and obligations regarding the personal data they provide. Education and outreach to
the community regarding the importance of maintaining data confidentiality and the potential risks that can arise from
misuse of personal data are needed so that this policy can be well received (Srebalová and Peráček, 2022).
Although the implementation of digital ID cards brings many benefits, such as ease of access and time savings in
administrative matters, there are also several challenges that must be faced. One of them is the problem of inequality
in access to technology, especially in remote areas that may not yet be fully covered by adequate digital infrastructure.
This can create inequality in the receipt of public services that depend on digital identity (Sidiq et al., 2024).
In addition to infrastructure-related challenges, concerns about the misuse of personal data are also a major issue
that must be addressed seriously. Cases of data leaks involving both the public and private sectors are evidence that
the existing security system is not yet fully reliable in protecting citizens' personal information (Sahur and Amiruddin,
2023). Therefore, strengthening regulations and law enforcement in terms of personal data protection must be a top
priority in the implementation of digital identity.
In order to achieve the goal of a more efficient and transparent government, Indonesia's digital identity policy must
involve good coordination between various government agencies, technology providers, and the community. Thus, the
implementation of digital ID cards can not only improve administrative efficiency, but also protect the privacy and
rights of citizens, which will ultimately encourage the creation of a more inclusive and competitive society in this
digital era. The success of this digital identity policy will depend greatly on the readiness of the legal and regulatory
systems that support it. Therefore, it is important for stakeholders to work together to create a safe, transparent and
trustworthy digital ecosystem, so that Indonesia can optimize the potential of digital technology for the common good.
2. Research Methods
This study uses a qualitative approach with a descriptive analytical research type to explore and analyze the
implementation of digital identity policies, especially related to digital ID cards in public administration in Indonesia
(Abrianto and Fathurahman, 2024). This approach was chosen because it allows researchers to explore in depth issues
related to government policies, regulations, and their implementation in the field. The following are details of the
methods used in this study:
2.1. Qualitative Approach
This study uses a qualitative approach to explore a deeper understanding of the phenomenon of digital identity
policies in public administration in Indonesia. A qualitative approach allows researchers to investigate issues related to
this policy from various perspectives, including legal, social, and technical aspects. This approach focuses more on
understanding the context and deep meaning behind the implementation of digital identity policies, making it more
suitable for identifying challenges, benefits, and impacts on society and the existing legal system.
2.2. Descriptive Analytical Research Type
This research is descriptive analytical, which aims to describe and analyze the digital identity policies implemented
by the Indonesian government. Researchers will provide a clear picture of the regulations underlying the policy, the
challenges faced during implementation, and an analysis of the legal impacts caused. With this approach, researchers
can provide a comprehensive understanding of how this policy is implemented in the field and the implications that
arise from a legal and technological perspective.
2.3. Document Study
Document study is one of the main methods in this research. Researchers will review various relevant legal
documents, such as Law No. 27 of 2022 concerning Personal Data Protection, as well as regulations relating to
population administration and digitalization of public services. Through document study, researchers can understand
the legal basis governing digital identity policies, as well as identify clarity and deficiencies in existing regulations.
This method is also important to assess whether the policy is in accordance with existing legal principles, especially
those relating to personal data protection.
Lestari et al. / International Journal of Humanities, Law, and Politics, Vol. 2, No. 4, pp. 114-118, 2024 116
2.4. In-depth Interviews
In-depth interviews will be conducted with various stakeholders involved in the implementation of the digital
identity policy. These interviews will involve government officials, public administration system managers, legal
practitioners, and the public who use digital identity services. The purpose of these interviews is to explore their
views, perceptions, and experiences regarding digital identity policies, both in terms of advantages, disadvantages, and
challenges faced during the implementation of the policy. Data obtained from in-depth interviews will provide a
richer, direct perspective on the implementation of the policy.
2.5. Participatory Observation
The researcher will conduct participatory observation to directly observe the implementation of digital identity
policies in public administration. In this observation, the researcher will be involved in several administrative
activities that implement digital identity, both in government institutions and other sectors connected to the public
administration system. Through this observation, the researcher can evaluate how this policy is implemented in the
field, as well as identify obstacles or constraints that may arise in the implementation process.
2.6. Qualitative Data Analysis
Data obtained from interviews, observations, and document studies will be analyzed using thematic analysis
techniques. This method allows researchers to identify patterns that emerge in the data and categorize findings that are
relevant to the research objectives. Thematic analysis will help researchers organize data systematically, group
information based on key topics, and draw conclusions about the legal challenges and technical aspects of digital
identity policies in Indonesia. Through this analysis, researchers can formulate more appropriate policy
recommendations to improve the implementation of digital identity policies in the future.
3. Result and Discussion
Based on the analysis conducted on digital identity policies in Indonesia, especially related to the implementation of
digital ID cards, a number of key findings were found that describe the status and development of this policy,
including the following:
3.1. Implementation of Digital Identity Policy in Indonesia
The digital identity policy in Indonesia has been implemented with the aim of replacing physical ID cards in public
administration. The results of the study show that this policy makes it easier for the public to access public services
more quickly and efficiently. The majority of respondents living in urban areas said that they felt helped by the
existence of digital ID cards because they could reduce bureaucracy and the use of physical documents. However,
there are significant challenges in terms of infrastructure, especially in remote areas that still have difficulty accessing
adequate internet networks and technology. This creates inequality in the acceptance and benefits of digital identity
policies in various regions of Indonesia.
3.2. Challenges of Personal Data Protection
In the implementation of digital identity, one of the main issues is the protection of personal data. Although
Indonesia already has regulations related to personal data protection, such as Law No. 27 of 2022, there are still a
number of challenges that need to be overcome. Personal data connected to digital identity, especially biometric data
such as fingerprints and facial scans, raises concerns about the potential for misuse if not managed properly. This
study identified key challenges related to personal data security, including suboptimal oversight of data access and use
by authorities and third parties. In addition, there is still confusion among the public regarding their privacy rights,
which increases the potential for data leakage.
Table 1: Key Challenges in Personal Data Protection Related to The Implementation of Digital ID Cards
Challenges
Description
Potential Impacts
Biometric Data
Security
The use of biometric data such as fingerprints
and facial scans for digital identity increases
the risk of data misuse.
Greater potential for identity theft or
misuse of personal data if data is
leaked.
Lack of Oversight
and Control
The personal data protection system is not
fully equipped with strict supervision of data
access.
Data theft or misuse by unauthorized
parties may occur, undermining public
trust.
Lestari et al. / International Journal of Humanities, Law, and Politics, Vol. 2, No. 4, pp. 114-118, 2024 117
Data Protection in
Infrastructure
Infrastructure that is not fully secure,
especially in less developed areas.
Personal data leaks or misuse by
unauthorized parties may occur due to
insecure systems.
Ambiguous Data
Usage Policies
Lack of clarity in policies regarding how
personal data will be used and shared by the
government.
Misuse or distribution of personal data
that is inconsistent with an individual’s
right to privacy.
Public Awareness
of Privacy
Low public understanding of the importance
of protecting their privacy and personal data
when using digital ID cards.
Potential for unintentional leaks or use
of personal data by users due to
ignorance.
Misuse by Third
Parties
The possibility of data misuse by third parties
who access personal data, such as technology
vendors or other institutions.
Greater potential for data leaks if third
parties do not comply with personal
data protection standards.
3.3. Public Acceptance of Digital ID Cards
This study also found that public acceptance of digital ID cards varies greatly depending on location factors and
technological understanding. In urban areas, the majority of people feel that digital ID cards make it easier to access
public services, provide more convenience, and reduce bureaucracy. Conversely, in rural areas and areas with limited
infrastructure, acceptance of digital identity is still low. Many of them do not fully understand the benefits and how to
use digital ID cards, which contributes to the level of disapproval or anxiety regarding data privacy and security.
Table 2: Public acceptance of digital ID cards based on various influencing factors
Aspects
Acceptance Rate
Ease of Access to
Services
High (85%)
Infrastructure
Limitations
Low in remote areas (40%)
Personal Data
Security
Middle (55%)
Technology
Understanding
Middle (60%)
Ease of Use
High (80%)
Socialization and
Education
Low in rural areas (45%)
Access to
Technology
High in urban areas, low in
rural areas (75% vs 40%)
3.4. Integration of Administrative Systems
This study also found that the integration of digital ID cards with other public administration systems, such as
banking, health services, and education, still faces many technical obstacles. Several government agencies that have
implemented digital ID cards have experienced difficulties in integrating digital identity systems with other services.
Therefore, it is important for the government to continue to develop a more connected and compatible digital
infrastructure between various institutions so that the use of digital ID cards can be optimized across the public sector.
3.5. Policy Recommendations
Based on the existing findings, several policy recommendations that can be implemented are as follows: first,
strengthening personal data protection regulations with stricter supervision of the use of sensitive data; second,
accelerating the development of digital infrastructure in remote areas to ensure equal access; third, increasing
socialization and education to the public about the benefits and use of digital ID cards. With these steps, it is hoped
that the implementation of digital identity policies in Indonesia can run more effectively and safely, and increase
public trust in the existing digital system.
4. Conclusion
The implementation of digital ID cards in Indonesia presents both significant opportunities and considerable
challenges. On one hand, digital identities are poised to streamline public administration, enhance service delivery,
and reduce bureaucratic inefficiencies. However, concerns regarding the security of personal data, especially sensitive
biometric information, remain a critical issue. The current regulatory framework, including Law No. 27 of 2022 on
Personal Data Protection, offers some protection, but gaps in oversight and enforcement remain. Public acceptance is
Lestari et al. / International Journal of Humanities, Law, and Politics, Vol. 2, No. 4, pp. 114-118, 2024 118
another hurdle, with urban areas generally more receptive to digital IDs, while rural regions face challenges due to
inadequate infrastructure and lack of awareness.
Moreover, integration between different public services and the digital ID system is still in its early stages and
requires further development. To address these challenges, the Indonesian government should focus on strengthening
data protection measures, improving digital infrastructure in underserved areas, and conducting more extensive public
education on the benefits and risks associated with digital identities.
For the policy to be truly successful, it is crucial to not only address technical and infrastructure challenges but also
ensure that citizens' rights to privacy and data security are safeguarded. By enhancing public trust through education,
improved security measures, and greater accessibility, Indonesia can fully harness the potential of digital identities to
transform its public services and foster a more inclusive society in the digital age.
References
Abrianto, D. D., & Fathurahman, H. (2024). Analysis of the Policy on Implementing Digital Population Identity in the
Compulsory E-KTP Community in Surakarta City. Jurnal Public Policy, 10(1), 51-59.
Achmad, M., Patu, M., & Ashariana, A. (2021). The effect of e-government implementation on the quality of electronic identity
card public service in Indonesia. Hrvatska i komparativna javna uprava: časopis za teoriju i praksu javne uprave, 21(2),
259-281.
Bakar, A., Permana, I., & Siswoyo, M. (2023). Analysis and Study of the Use of Digital National Identity Card Services in
Generation Z. Open Access Indonesia Journal of Social Sciences, 6(5), 1061-1068.
Firdaus, A. D., & Wibawani, S. (2022). INNOVATION OF DIGITAL IDENTITY APPLICATION (IKD) IN IMPROVING
PUBLIC SERVICES IN GUNUNG ANYAR URBAN VILLAGE. JPASDEV: Journal of Public Administration and
Sociology of Development, 4(2), 589-599.
Mayasari, H. (2023). A examination on personal data protection in metaverse technology in Indonesia: a human rights
perspective. Journal of Law, Environmental and Justice, 1(1), 64-85.
Rakhman, S. (2023). The Influence of Population Policy Implementation and Service Quality on Community Satisfaction in
Making Electronic ID Cards at the Badung Civil Registry Office. International Journal of Entrepreneurship and Business
Management, 2(2), 113-123.
Sahur, A., & Amiruddin, A. (2023). Analysis of the Success of Implementing Digital Service Delivery in the Indonesian Public
Sector: A Case Study on the Use of Online Public Service Applications. International Journal Papier Public Review, 4(3),
1-9.
Sidiq, F., Azahra, A. S., & Pirdaus, D. I. (2024). Implications of Changes in the Criminal Procedure Law of the ITE Law on
Individual Rights in the Indonesian Legal System. International Journal of Humanities, Law, and Politics, 2(2), 56-61.
Srebalová, M., & Peráček, T. (2022). Effective public administration as a tool for building smart cities: The experience of the
Slovak Republic. Laws, 11(5), 67.
Sule, M. J., Zennaro, M., & Thomas, G. (2021). Cybersecurity through the lens of digital identity and data protection: issues and
trends. Technology in Society, 67, 101734.
Sung, C. S., & Park, J. Y. (2021). Understanding of blockchain-based identity management system adoption in the public sector.
Journal of Enterprise Information Management, 34(5), 1481-1505.
Zwitter, A. J., Gstrein, O. J., & Yap, E. (2020). Digital identity and the blockchain: universal identity management and the
concept of the “Self-Sovereign” individual. Frontiers in Blockchain, 3, 26.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
The revision of the Electronic Information and Transactions Law (UU ITE) in Indonesia has become a hot topic of debate. Institutions and activists such as the Institute for Criminal Justice Reform (ICJR) and the Press Legal Aid Institute (LBH Pers) have presented various arguments regarding the impact of these changes. This article outlines the five main arguments advanced by the ICJR and LBH Pers. First, there is an objection to Article 27 paragraph (3) which regulates insults and defamation. Second, changes in criminal procedural law raise concerns about the discretionary authority of law enforcement officials without involving the courts. Third, the addition of cyberbullying-related crimes raises concerns about the potential for over-criminalization. Fourth, governments are given additional powers to filter and block content, which can result in potential abuse. Finally, the fifth argument relates to the "right to be forgotten" clause which can be used as a tool of censorship against news publications and journalists about one's past. This article also examines the impact of information technology developments on computer crime and underscores the importance of protecting individual rights and free speech in the digital age.
Article
Full-text available
The objective of this study is to elucidate the challenges presented by technological advancements, namely digital metaverse technology, with regard to safeguarding personal data in Indonesia. This study also investigates these issues via the lens of human rights. The research methodology employed in this study encompasses a mixed approach, combining socio-legal and normative research methods. The research findings indicate that there is a pressing need for the safeguarding of personal data in Indonesia, particularly in light of the escalating number of incidents and the advancement of the information technology sector. The significance of metaverse technology should not be underestimated, thereby necessitating a thorough legislative reform to address the associated difficulties. The enactment of the PDP Law represents the initial measure taken by the government to establish a framework for the administration of personal data protection. The active participation of all stakeholders, particularly those in the digital economy industry, is vital in the formulation and implementation of rules. Additionally, it is crucial to adhere to the principles of Data Protection By Design and By Default. The PDP Law encompasses various significant provisions that can be utilised by the Indonesian government to enforce personal data protection measures and impose penal consequences upon those who breach the regulations stipulated within this legislation. The PDP Law serves as a legal framework that holds applicability not only inside national boundaries but also extends to international jurisdictions, particularly in the context of the contemporary metaverse.
Article
Full-text available
Digital service delivery in the public sector symbolizes a sea change in governance, with governments leveraging digital technology to improve service efficiency, transparency, and citizen involvement. This article looks at the key advantages of digital service delivery, such as increased efficiency, improved access and convenience, cost savings, user-centric services, data-driven decision-making, transparency, enhanced citizen engagement, innovative service delivery, lower environmental impact, and crisis response capabilities. It does, however, highlight some of the problems, such as bridging the digital gap and guaranteeing data security and privacy. As governments throughout the world embrace digital transformation, the necessity to offer services that meet citizens' changing expectations becomes clear. The conclusion emphasizes the importance of digital service delivery in modern governance, providing timely and accountable government services that match the needs of the digital era.
Article
Full-text available
This study focuses on examining the requirements forming the concept of the right to effective administration in relation to the communication of local governments with their residents. We pay attention to the electronization of public administration and the ambition to strengthen it through public participation in decision making concerning important matters of self-government, as the implementation of effective public administration is linked to the right management approach. In the first part of the study, we analyze European jurisprudence and legislation, and we further address the question of how the European concept of local government influences the communication of local authorities with their inhabitants in relation to the realization of the means of direct democracy. We focus our attention on the current state of the electronization of public administration and its development, including cyber security. The main goal of this study is to use critical analysis to assess the legal regulation of the activities of the Slovak public administration. In addition to the main goal, we also have several sub-goals, such as making a comparison of the development of the electronization of public administration in the countries of the former Czechoslovakia. Especially with the use of critical analysis and other scientific methods of investigation, we look for and find answers to selected application problems from practice. We also use scientific and doctrinal interpretation as well as scientific literature and jurisprudence. As a result of our study, recommendations are made to ensure the more efficient functioning of smart cities in the Slovak Republic.
Article
Full-text available
While “classical” human identity has kept philosophers busy since millennia, “Digital Identity” seems primarily machine related. Telephone numbers, E-Mail inboxes, or Internet Protocol (IP)-addresses are irrelevant to define us as human beings at first glance. However, with the omnipresence of digital space the digital aspects of identity gain importance. In this submission, we aim to put recent developments in context and provide a categorization to frame the landscape as developments proceed rapidly. First, we present selected philosophical perspectives on identity. Secondly, we explore how the legal landscape is approaching identity from a traditional dogmatic perspective both in national and international law. After blending the insights from those sections together in a third step, we will go on to describe and discuss current developments that are driven by the emergence of new tools such as “Distributed Ledger Technology” and “Zero Knowledge Proof.” One of our main findings is that the management of digital identity is transforming from a purpose driven necessity toward a self-standing activity that becomes a resource for many digital applications. In other words, whereas traditionally identity is addressed in a predominantly sectoral fashion whenever necessary, new technologies transform digital identity management into a basic infrastructural service, sometimes even a commodity. This coincides with a trend to take the “control” over identity away from governmental institutions and corporate actors to “self-sovereign individuals,” who have now the opportunity to manage their digital self autonomously. To make our conceptual statements more relevant, we present several already existing use cases in the public and private sector. Subsequently, we discuss potential risks that should be mitigated in order to create a desirable relationship between the individual, public institutions, and the private sector in a world where self-sovereign identity management has become the norm. We will illustrate these issues along the discussion around privacy, as well as the development of backup mechanisms for digital identities. Despite the undeniable potential for the management of identity, we suggest that particularly at this point in time there is a clear need to make detailed (non-technological) governance decisions impacting the general design and implementation of self-sovereign identity systems.
Article
One of the latest innovations that has caught the attention of generation Z is the introduction of the digital identity card. As a substitute for physical ID cards that have been around for a long time, digital ID cards offer various benefits and attractive potential for generation Z. In this approach, a digital ID cards are a digital version of a person's identity that is stored electronically, with personal information such as name, address, and number identity. However, a digital ID card is not just a substitute for a physical ID card but a tool that enables generation Z to make wider use of information technology. This study aimed to explore the use of digital national identity cards in generation Z. This research is qualitative research that explores and describes in detail a situation or phenomenon of the research object being researched by developing concepts and gathering existing facts. Raw data is analyzed and organized by data collection date, data source, data type, data description, and data nature. All data must be read in order to find out what data has been obtained, the source of the data, and its meaning. Overall, generation Z has a positive opinion of digital ID card services. They see it as convenience and convenience to access their identity electronically, avoiding the need to carry physical documents all the time and speeding up administrative processes. Generation Z also appreciates the administrative efficiency offered by digital Identity Card services, enabling them to process ID card extensions or personal data changes more easily and quickly. Apart from that, generation Z also appreciates the integration of digital ID card services with other digital platforms. They can integrate their identity with banking services, e-commerce, or online ordering platforms, enabling them to make transactions easily and quickly. Generation Z is also aware of the positive impact of using digital ID cards on the environment by reducing the use of physical documents and contributing to sustainability.
Article
The use of a secure and robust digital identification system that is capable of protecting privacy is an essential, reliable and user-friendly element for a strong cyber resilience strategy and is a source of new business opportunities and applications for banks, private sector with a return on their investment. The march towards Digital Identity is well underway therefore, focus should be on both adoption and adaption of the new structures and regulations. These are needed to govern the associated services and transactions as well as establishing laws that enforce penalties for violations. There is no doubt then that more and more entities and institutions would move to the cloud. Security challenges affecting the cloud may not be new but the mode of addressing them would be different. The authors develop a Data Colouring technique for securing data processed or stored on both cloud and non-cloud platforms. The technique combines Public Key Infrastructure (PKI), concatenated fingerprints and digital watermarking. Using this technique, data can be secured at creation or during storage and remains secure during processing.
Article
Purpose This study aims to understand the benefits and challenges associated with the adoption of a blockchain-based identity management system in public services by conducting an academic literature review, and to explore the design of such a system that can be applied to the Korean government. Design/methodology/approach This study explores the adoption of a blockchain-based identity management system using a literature review and an actual design case intended for use by the government sector. Findings Blockchain-based identity management systems can significantly improve transparency, accountability, and reliability in the user control of one's own data while reducing the time and cost needed to deliver public services, as well as increasing administrative efficiency. However, it is not always easy to implement such systems, and introducing new technologies in the government field requires a complicated, time-consuming process. There is currently an appetite for research extending beyond the typical technology-driven approach to elucidate the government adoption of new technologies and explore its implications. Practical implications The idea behind this system is that by storing and managing personal information on the blockchain and providing mobile apps to customers, users can log in or retrieve previously authenticated personal information without having to go through an authentication process. Since users do not need to go through the verification process every time, it is expected that they will be able to access only the necessary personal information more quickly and conveniently without having to deal with unnecessary details. In addition, the blockchain-based operation of a public service effectively increases the transparency and reliability of that service and reduces the social costs caused by personal information leakage. Originality/value This study introduces the design of a blockchain-based identity management system that can be used in public services, specifically in the Korean government sector for the first time. Along with a literature review, the implications that this study gleans from these real-world use cases can contribute to this field of research.
Article
This study examines the effect of e-government implementation on the quality of electronic identity card (EIC) public service in Takalar Regency. The research was conducted by using quantitative methods. The sample consisted of 300 employees and stakeholders who were selected by the iteration method. The data was collected via a Likert scale questionnaire and analysed with the path analysis technique. The independent variable was the e-government implementation, which consists of sub-variables: communication (X1), resources (X2), disposition (X3), and bureaucratic structure (X4). The dependent variable was the electronic identity card (EIC) service quality. The research findings indicate that the overall implementation of e-government has a significant effect on the quality of EIC service in Takalar Regency. Furthermore, it has also found a very lengthy bureaucratic structure and complicated communication methods in the EIC service. However, the aspects of resources and disposition have been well implemented.
Analysis of the Policy on Implementing Digital Population Identity in the Compulsory E-KTP Community in Surakarta City
  • D D Abrianto
  • H Fathurahman
Abrianto, D. D., & Fathurahman, H. (2024). Analysis of the Policy on Implementing Digital Population Identity in the Compulsory E-KTP Community in Surakarta City. Jurnal Public Policy, 10(1), 51-59.