The Project File Details
This study is on digital identity solution for good governance. The total population for the study is 200 staff of selected government parastatal. The researcher used questionnaires as the instrument for the data collection. Descriptive Survey research design was adopted for this study. A total of 133 respondents made directors, administrative staff, senior staff and junior staff were used for the study. The data collected were presented in tables and analyzed using simple percentages and frequencies
Identity is now routinely being used for commercial and legal transactions. Traditional identity documents used in face-to-face environments do not meet the needs of today’s societies, which have been transformed from analog to digital. We live in an age where company track our digital identities (full name, date of birth, gender, online behaviors, etc.) and sell the information to another companies as a form of intellectual property. As individuals, governments, and businesses increasingly transact online, the need to establish digital identity has increased. A digital identity (DID) or electronic identity (e-ID) is the digital representation of the information on a person, organization or object. It is the computer network equivalent to the real identity of a person or entity. It is information about a person, organization, or device used by computer networks to represent us. This information can be used for many purposes such as proving one’s identity.
Identity is a crucial element for each individual and identifies the main traits of each and every person. Obviously enough digital identity is equally important. It retains the intrinsic characteristics that make identity such a defining factor and, at the same time, can be seen as a tool that States and Governments can leverage on to meet the demands of their citizens, or to improve their overall efficiency. Given the primary importance that digital identity might have in a national context, national leaders and policy makers should consider implementing a specific framework, namely a National Digital Identity Framework, which comprises all the elements necessary to operate a Digital Identity System and deliver its service to the population. (www.itu.int).
The use cases to which digital identity is being applied by governments fall into broad categories, of trust and verification of records, and improving transparency, with efficiency improvements as a motivation throughout. Of course, these categories are not independent, and often both goals apply to the same use case. Trust and verification divides further into securing assets and certification of contents. One of the most important benefits that can derive from a National Digital Identity Framework is the improvement of the condition of the society at large and citizens. A fully functioning system of digital identity means that States will be able to more efficiently deliver their services to the citizenship. In particular, it will help institutions to target the population with welfare and social programs. The system will effectively empower Governments with the necessary tools to timely and efficiently intervene in the least accessible and most remote area, ensuring that the entire community benefits and grows together. Moreover, Governments and the public administration will see a reduction in leakages due to duplicates and ghosts in beneficiary databases of various social assistance programs, further increasing their effectiveness and efficiency. Digital identity can also increase the level of security of the State. Indeed, this can be a power tool for policing and crime prosecution, and can greatly increase the effectiveness of combating certain specific crimes (such as identity frauds, tax frauds, etc.).
Digital identity is the solution for good governance, increase the level of security of the State. Indeed, this can be a power tool for policing and crime prosecution, and can greatly increase the effectiveness of combating certain specific crimes (such as identity frauds, tax frauds, etc.). Yet there are challenges they encounter. Some of the challenges faced by digital identity
include privacy, security, identity theft, and interoperability
The objectives of the study are;
For the successful completion of the study, the following research hypotheses were formulated by the researcher;
H0: there is no relationship between digital identity and good governance
H1: there is relationship between digital identity and good governance
H02: there are no challenges of digital identity.
H2: there are challenges of digital identity
1.5 SIGNIFICANCE OF THE STUDY
The study will be very significant to students, government and general public. The study will give a clear insight on the digital identity solution for good governance. The study will also serve as a reference to other researcher that will embark on this topic
The scope of the study covers digital identity solution for good governance. The researcher encounters some constrain which limited the scope of the study;
1.7 DEFINITION OF TERMS
DIGITAL IDENTITY: Digital identity is an emerging legal concept as a result of government services and businesses going online. It is responsible for the way government is providing essential information and services and interacting with its citizen
SOLUTION: a means of solving a problem or dealing with a difficult situation.
GOOD GOVERNANCE: In international development, good governance is a subjective term that describes how public institutions conduct public affairs and manage public resources in the preferred way. Governance is “the process of decision-making and the process by which decisions are implemented
1.8 ORGANIZATION OF THE STUDY
This research work is organized in five chapters, for easy understanding, as follows
Chapter one is concern with the introduction, which consist of the (overview, of the study), historical background, statement of problem, objectives of the study, research hypotheses, significance of the study, scope and limitation of the study, definition of terms and historical background of the study. Chapter two highlights the theoretical framework on which the study is based, thus the review of related literature. Chapter three deals on the research design and methodology adopted in the study. Chapter four concentrate on the data collection and analysis and presentation of finding. Chapter five gives summary, conclusion, and recommendations made of the study
All project works, files and documents posted on this website, projects.ng are the property/copyright of their respective owners. They are for research reference/guidance purposes only and the works are crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a guidance purpose only and not copy the work word for word (verbatim). Projects.ng is a repository of research works just like academia.edu, researchgate.net, scribd.com, docsity.com, coursehero and many other platforms where users upload works. The paid subscription on projects.ng is a means by which the website is maintained to support Open Education. If you see your work posted here, and you want it to be removed/credited, please call us on +2348159154070 or send us a mail together with the web address link to the work, to [email protected] We will reply to and honor every request. Please notice it may take up to 24 – 48 hours to process your request.