Citizens’ Information Privacy Protection Model in e-Government for Developing Countries

Document Type : Research Paper

Authors

Abstract

The most important aim of this study is to propose a model for protecting citizens’ information privacy in e-Government for developing countries. This study develops theoretical foundations and models of e-Government in  judicial-legal dimension. The methodology of this study is qualitative including documentary study, content analysis and comparative study. Statistical population of this study includes 58 countries with information privacy act which 11 countries were selected by judgment sampling for documentary study. These countries include:, England, Canada, France, Germany, Spain, Italy, Norway, Sweden, Ireland, Belgium and Republic of Korea. Proposed model of this study includes seven dimensions: (1) data collection obligations, (2) data use obligations, (3) data retention obligations, (4) data disclosure obligations, (5) data subject rights, (6) controller responsibilities and (7) obligations of accessing to data by citizen. Of 124 identified obligations for protecting citizens’ information privacy in e-Government as indexes of these dimensions, 105 obligations have a weight over 0.5 and can be a pattern for developing countries in order to regulate the e-Government development in the in the field of citizens’ information privacy protection as standard principles. It is hoped that the proposed model of this study would help developing countries in order to protect citizens’ information privacy in e-Government.

Keywords


1-اصلانی، حمیدرضا، (1389)، حقوق فناوری اطلاعات (چاپ دوم)، تهران، میزان.
2-تقی پور، عبدا...، (1390)، دولت الکترونیکی (چاپ اول)، تهران، مبنای خرد.
3-روسو، ژان ژاک، (1366)، قرارداد اجتماعی یا اصول حقوقسیاسی(چاپ اول)،(منوچهرکیا)، تهران، گنجینه.
4-عالم، عبدالرحمن، (1380)، بنیادهای علم سیاست(چاپ اول)، تهران، نشر نی.
5-کاتوزیان، ناصر، (1366)، فلسفه حقوق، جلد اول(چاپ اول)، تهران، انتشارات بهنشر.
6-یعقوبی، نورمحمد، (1392)، دولت الکترونیک: رویکرد مدیریتی(چاپ سوم)، تهران، افکار.
7-Abu-Shanab, E., (2014), Antecedents of trust in e-government services: an empirical test in Jordan. Transforming Government: People, Process and Policy, 8(4), 480-499.
8-Anthony, D., Stablein, T., & Carian, E. K., (2015), Big Brother in the information age: Concerns about government information gathering over time, IEEE Security & Privacy, (4), 12-19.
9-Belanger, F., & Hiller, J. S., (2006), A framework for e-government: privacy implications, Business Process Management Journal , 12(1), 48-60.
10-BeVier, L. R., (1995), Information about individuals in the hands of government: some reflections on mechanisms for privacy protection, William and Mary Bill of Rights Journal, 4(2), 455-506.
11-Canadian Personal Information Protection Act, [2015], [online], Personal Information Protection & Electronic Documents Act of 2015(PIPEDA), <https://www.priv.gc.ca>[17/08/2015].
12-Cullen, R., (2009), THEME ARTICLE Culture, identity and information privacy in the age of digital government, Online Information Review, 33(3), 405-421.
13-Cullen, R., & Reilly, P., (2007), Information privacy and trust in government: a citizen-basedperspective from New Zealand, Journal of Information Technology and Politics, 4(3), 61-80.
14-DLA, [2016], [online], Piper's Data Protection. Privacy and Security group, <http://www.dlapiperdataprotection.com>[02/01/2016].
15-Douglas, R, [2016], [online], Identity Theft Victim Statistics, <www.identitytheft.info/about.aspx>[13/01/2016].
16-England Data Protection Act, [1998], [online], Data Protection Act of 1998(DPA), <https://ico.org.uk>[17/08/2015].
17-French Data Protection Act, [1978], [online], Data Protection Act. <http://www.legifrance.gouv.fr/Traductions/en-English> [17/08/2015].
18-Ireland Data Protection Act, [2003], [online], Data Protection Act of 2003(DPA), <https://www.dataprotection.ie> [17/08/2015].
19-Gayton, C. M., (2006), Beyond terrorism: data collection and responsibility for privacy, The journal of information and knowledge management systems, 36(4), 377-394.
20-Germany Federal Data Protection Act, [2014], [online], Federal Data Protection Act of 2014(FDPA), <www.bfdi.bund.de> [17/08/2015].
21-Italian Personal Data Protection Code, [2003], [online],  Personal Data Protection Code, <www.privacy.it/privacycode-en.htm>[17/08/2015].
22-James, G., (2000), Empowering bureaucrats, MC Technology Marketing Intelligence , 20(12), 62-68.
23-Korean Personal Information Protection Act, [2011], [online],  Personal Information Protection Act of 2011(PIPA),<www.law.go.kr>[17/08/2015].
24-Landau, S., (2014), Making Sense of Snowden Part II: What’s Significant in the NSA Surveillance Revelations. IEEE Security and Privacy, 12(1), 62-64.
25-Norway Personal Data Act, [2000], [online], Personal Data Act(PDA), <https://www.datatilsynet.no/English>[17/08/2015].
26-Spanish Data Protection Act, [2008], [online], Data Protection Act, <www.agpd.es>[17/08/2015].
27-Swedish Personal Data Act, [2006], [online], The Personal Data Act, <www.datainspektionen.se>[17/08/2015].
28-Stanford Encyclopedia of Philosophy, [2016], [online], Information Privay Definition, <http://plato.stanford.edu >[12/01/2016].
29-Stark, L., (2016), The emotional context of information privacy, The Information Society, 32(1), 14-27.
30-Thibodeau, P., (2000), E-government spending to soar through. Computerworld , 34 (17), 12-13.
31-Westin, A., (1967), Privacy and Freedom, New York, Atheneum.