Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best...
-
Upload
adb-ict-for-development-team -
Category
Documents
-
view
216 -
download
0
Transcript of Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best...
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
1/52
Asian Development Bank
March 2016
Dr. John UreDirector, TRPC Ltd (Singapore)
Associate Professor and Director of the TRPSocial Science Research Centre
University of Hong Kong
www.trpc.biz
ICT and Social Protection
1
Disclaimer: The views expressed in this paper/presentation are the views of the author and do not necessarily reflectthe views or policies of the Asian Development Bank (ADB), or its Board of Governors, or the governments they
represent. ADB Does not guarantee the accuracy of the data included in the presentation and accepts no responsibilityfor any consequence of their use. Terminology used may not necessarily be consistent with ADB official terms.
http://www.trpc.biz/http://www.trpc.biz/
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
2/52
Agenda
Focus – social insurance, social assurance andlabour markets
ICTs – nature of their adoption/applications andhow to classify them = taxonomy
ICT applications – how are ICTs being adoptedand with what results, databases, costs and
benefits?Role of ID – different approaches
Lessons – who is doing what and why?
2
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
3/52
ICTs and social protection
• A simple key point: national policies,demographics and finances are the keydrivers – ICTs are ways to administer,monitor and evaluate social protectionprojects and programmes
o But… ICTs (online, social media, etc.)empower citizens by opening up
information and social engagement whichcan influence policies and resourcesdevoted to social protection
• Very little systematic internationalresearch: still early days…
• Most ICT adoption up-to-date has a single service focus: butintegration of databases to support them is growing, increasesefficiency, reduces duplications, etc.
3
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
4/52
Terminology and Taxonomy
• Different ways to Identify classes of ICTs, usages andimpacts: typically some combination of…
Technical/incremental: usually refers to ICTs that automate orreplace manual routines/paper work with digital technologies
Sustained: usually refers to the adoption of ICTs that bring aboutlong-term organizational/administrative improvements in efficiency,
accuracy, targeting, etc.
Disruptive : usually refers to a fundamental restructuring in the wayprojects and programmes are organized, a shift of ‘ownership’, etc.
Radical: beyond disruptive? a shift in stakeholder influence?
Transformative: totally
radical? a wholesale change in approach?
1. Technical3. Sustained5. Radical
2. Incremental4. Disruptive6. Transformative
4
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
5/52
Still early days for comprehensive ICT adoption
• ICTs have been around for decades: but universal industrystandards have taken time to evolve and to be adopted, holdingback…
o Full interconnectivity of networks
o Full interoperability over networks of apps
• Backend digital technologies evolving quickly: systemsarchitectures need to evolve incrementally in a modular way toensure…
o Different parts of IT systems from different vendors need tocommunicate with each and share data, programmes and apps
o Upgrading is a relatively easy and less costly process
• Frontend user technologies evolving quickly: smart devices,Internet-of-Things (IoT),etc., are opening up new opportunities forradical technology adoption
• Service-Oriented Architecture (SOA) embraces both ends5
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
6/52
Therefore still early days for research studies
• The BIG picture: social protection as development policy (preventing poverty) vs. social protection asinstrumental for poverty relief (addressing poverty)o ITC4D is about promoting economic growth and social inclusion
= policy driven/vision oriented/goals to be achieved
o ICT4SP is more about efficient streamlining of registrations,assessments and deliverables = needs driven/outputoriented/targets measured
• Most detailed research by international institutions:
World Bank, ADB, European Commission, ISSA, etc. o But many over-lapping agencies concerned with social
protection: eg’s UNDP, OCHA, UNICEF, ESCAP, ILO, WHO…
6
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
7/52
And still very early days for the complete vision
• Fully-integrated back, middle and front-end systems:embracing databases, Big Data analytics, ERM, MIS,CRM, etc. – all systems digital to give holistic overview.
• Cross-cutting departments within an agency
• Cross-cutting government agencies
• Cross-cutting NGO and private sector partners
• Integrating pro-active engagement with beneficiaries
• Integrating self-help by recipients (use of smart devices, etc.)
Note: ICTs free up staff to focus on services
• Cloud services: SaaS, PaaS, IaaS…. XaaS to provideubiquitous access; with different rights of access
• But!... Is sharing of data allowed between agencieswithout permissions? How secure are the systems?
7
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
8/52
An ongoing European Community study is oneof the most comprehensive
• An EC-JRC Technical Report (2015) study(1) = the firststeps towards a comprehensive review across the EU ofICTs in social protection (SP) programmeso ‘the first exercise of its kind ever conducted by the EC directly”
o The paper is the first draft of an ongoing in-depth study(1) http://is.jrc.ec.europa.eu/pages/EAP/documents/20150206_IESI_D121_DRAFT_V20_JRC-IPTS_DEF.pdf
• Methodology: the choose 50 from an inventory of 100integrated approaches to SP project initiatives according
the criteria of:o Policy relevance
o ICT-enabled innovation
o Evidence of outcomes
8
http://is.jrc.ec.europa.eu/pages/EAP/documents/20150206_IESI_D121_DRAFT_V20_JRC-IPTS_DEF.pdfhttp://is.jrc.ec.europa.eu/pages/EAP/documents/20150206_IESI_D121_DRAFT_V20_JRC-IPTS_DEF.pdfhttp://is.jrc.ec.europa.eu/pages/EAP/documents/20150206_IESI_D121_DRAFT_V20_JRC-IPTS_DEF.pdfhttp://is.jrc.ec.europa.eu/pages/EAP/documents/20150206_IESI_D121_DRAFT_V20_JRC-IPTS_DEF.pdf
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
9/52
Summary of findings of the EC study
• Main focus of the initiatives = promoting efficiency and cost savingsvia (i) cross-sector collaboration/integration, (ii) innovation in thedelivery of services to beneficiaries
• Most initiatives “address mainly one policy or problem area of
the target group within an individual social service”
• But many initiatives aim to transform “how individuals interfacewith social service providers” through the design of integratedapproaches… “electronic user records, the use of data analytics
and interoperable technologies that enable the at-riskbeneficiaries and a better understanding of service use.”
• “The one-stop shop model of integrated service delivery isemerging as a trend…”
9
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
10/52
Summary of EU initiatives
Initiatives
72%
46% 34%
Most
51%
43%
Focus and character
Labour markets/helping young peopleintegrate into society
Help individuals throughout their lives Modernising SP systems
Show “an elevated integration of
services”
Organizational/sustained
Disruptive/radical/transformative
10
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
11/52
EU findings: the integration of services improvesoutcomes by…
Operational/Organizational
• Enhances efficiency byreducing costs
• Increases capacity andvalue for money
• Improves strategicplanning and system
integrity• Reduces the demand for
emergency services.
Beneficiaries
• Provides simplifiedaccess
• Provides holistic andcustomised support
• Faster response times
• Improved user
experience
11
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
12/52
Some key benefits of database integration
1. Informed policy-making;generate reports
2. Coherent and consistentpolicy making acrossgovernment
3. Eradicates duplication andreduces fraud
4. Provides each agency with aholistic view of every
recipient/beneficiary5. Speeds up search and
processing, does away withpaper-work = error reduction
6. Enables use of analyticssoftware for estimations,forecasts, calculations, etc.
7. Potential ubiquitous accessthrough secure networks andGovt/ hybrid or encrypted publicclouds
8. Can be made interoperablewith agency mid-stream SWprogrammes
9. Can give partitioned accessto recipients
10. Can promote self-service byrecipients/ beneficiaries
12
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
13/52
Some key costs of database integration
1. Capex set-up costs,maintenance, upgrades andcosts of opex
2. Data collection, cleaning,formatting, especially frompaper-based or legacy ITsystems
3. Cross-government agencyadoption, installation, budgets
4. Staff IT skills, training costs,resource redeployments
5. Legality of data sharing,privacy legislation, etc.
6. Security issues, firewalls,detection systems, etc.
7. Costs of fibre networks
8. Costs of alignment of agency
sub-systems for inter-operability9. Costs of designing anddeveloping new user-friendlyinterfaces for fixed and wirelessdevices
10. Costs of outreach facilitiessuch as e-Kiosks, mobilenetworks, WiFi hotspots, tele-centres, etc.
13
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
14/52
Database Info
• Databases and their integration lie at theheart of ICT4SP
For transactions
For operational analytics
To link with frontend systems
As the central item of cost
14
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
15/52
15
Sequence of data ingest to data warehouse
Data Ingest
Extract, Transform,Load
Data ResourceManagement System
Multiple Servers(local or online)
Enterprise DataWarehouse
• Data input manually or electronically from other device
• ETL for Standardization – standard formatting, spelling, numbering,sequencing of data record, etc., prior to loading it into a database
• DRMS allocates the data to storage according to pre-set algorithms,periodically defragmenting the storage to maximize the spaceavailable for new data ingests
• Local database storage of data in data marts which may be in manydifferent geographical locations spread across the country
• EWD Matching – software spots different entries that appear rathersimilar, such as 100% the same, 75%, 60%, etc., for furtherinspection
Stage 2
Stage 3
• EWD Relational – persons A and B may have commoncharacteristics, e.g. live same house, are married to each other, oneis the child of the other, etc
• Transactional checks – ‘Big Data’ stored over 10 or 15 years or morecan be checked for trends, multiple UIDs, systematic financialleakages, etc
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
16/52
16
Database Basics
For non-specialists involved in the budgeting and policy decisions
• Structured/Unstructured Data : Structured - For operational-analytical purposes, either
relational databases or programmes that can manage toestablish relationships across unstructured data.
Unstructured - For transactional purposes
• Structured Query Language : SQL originated with IBM which later became part of Oracle
products. Anopen-source standard programming language for
relational databases.
• Hypertext Preprocessor - PHP : widely used programming language for websites, free to
download and works with most operating systems
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
17/52
17
Database Basics
• Family of SQL Databases
SQL• designed for
largerelationaloperationalanalytics
MySQL• designed
for use inweb-basedapplications
NoSQL• does not use
SQL, used fornon-relationaldatabases thatis not organizedin a tabularstructure
NewSQL
• SQL-basedrelationaldatabases butable to handledata from non-relationaldatabases such
as NoSQL
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
18/52
18
• Open Source software:
Costs reduction for open source software and off-the-shelf(‘commodity’) hardware. Additional customisation of software
is usually required for enterprise and government purposes.
Database Basics
• Proprietary software:more expensive, but often come with many services. Care
needs to be taken that the programmes and applications areinter-operable and compatible with other parts of the ICTsystem from different vendors
• Single/distributed: data can be housed within a single database or distributed
across many in different locations. A secure high-speed(broadband) network is required to link them, and a distributedprocessing framework is required to use them
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
19/52
19
• Scale/scope:
the scale of the data to be handled by social protectionprogrammes will depend upon population size and the scopeof the programmes involved.
a) medium or large in quantityb) relational by design
c) distributed across different databases A central master database is desirable against which localdatabases can be updated and cross-checked for the validityof their entries
Database Basics
• Cleansed/standardized: data needs to be a cleansed and standardized before it canbe centralized.
Problems arise during ingest process, consolidating all thedata into one central national reference database
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
20/52
20
Database Basics
Hadoop:
An open sourcesoftwaredeveloped by the
Apache SoftwareFoundation using
the HadoopDistributed FileSystem (HDFS) which enables theresourcemanagement of
data in manydifferent formatsand from manydifferent sources
Hadoop 2: uses a resource management
operating platform called YARN (Yet Another Resource Negotiator) thatallows a multitude of programmes torun on top of Hadoop, including SQL(SQL-on-Hadoop).
can aggregate structured/unstructuredand single/distributed data andcleanse/standardize it in the process
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
21/52
21
• Power and resource management:
Powerful tools that speed the data processing and analytics, suchas Oracle Database and recent iterations of IBM’s DB2 family ofdatabase products which use the BLU (Big data, Lightening fast,Ultra easy) enhancement
Database Basics
• Database in the cloud: a private cloud computing network houses the data warehouse onservers that are accessed over an Intranet
This might consist of a mix of(i) offline office-based servers(ii) online servers connected terrestrially by optical fibre cables(iii) a data warehouse accessed through a government-owned and
managed Intranet cloud(iv) part of that data warehouse containing public information
becoming accessible in the public cloud over the Internet
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
22/52
Ballpark costs of databases and their environment
22
Typical “environment” System requirements
Ballpark costs(after discounts
on list prices)
• The production or EDW system Database system using SQL USD400k upwards
• Redundancy/disaster managementrecovery
Duplicate of the EDW that must be in asecure and non-contiguous location andwell connected by infrastructure
USD400k upwards
• Test system for any newly installed
hardware or software
All additional hardware and software needs
to be fully tested for malware and softwareglitches
USD100k upwards
• Development environment tocustomise the hardware andsoftware and applications by asystems integrator
Customised hardware and software needsto be designed
USD100k upwards
• Systems integrator and servicesprovider to customise the databasesystem
Unless systems adaptation can be handledentirely in-house, a specialist vendor isrequired
USD500k upwards
• Entire system Needs to be scaled up according to size ofenterprise or organizations
USD1.5 millionupwards
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
23/52
Integrated databases and the budget
• Very difficult to compare costs across countries
Source: Oxford Policy Management ‘Key aspects to consider when setting up an integrated systemfor data and information management… and international best practice’ Development Pathways,
Jakarta Workshop, March 2015
System components andinfrastructure
Costs
Implementation costs US$02 – 9 million annually
Data collection costs US$4-14 per applicant
Development and infrastructure costs US$1 – 5 million
23
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
24/52
Early examples go way back
Source: Knut Leipold (World Bank) ‘ICT in Social Protection’, 2001 24
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
25/52
World Bank summary of costs
Source: Knut Leipold (World Bank) ‘ICT in Social Protection’, 2001 25
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
26/52
World Bank summary of benefits
Source: Knut Leipold (World Bank) ‘ICT in Social Protection’, 2001 26
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
27/52
Examples from Africa
• Examples abound of ICTs being used to streamline processes andprovide multi-access channels – but in the case of projects and fieldtrails how to scale them up?
• ISSA (2015) ‘In Africa, using new technologies to improve the
delivery for social security’ lists examples from…
Examples: (i) electronic filings of employers’ contribution to socialinsurance in Mauritius reduced staff requirements from 35 to 7; (ii)enhanced social security payments system in Côte d’Ivoire cuttransactions costs per insured recipient by 77%; (iii) in Tanzania,electronic systems allow Parastatal Pensioners services access 24x7
•
AlgeriaCameroonCôte d’Ivoire
EgyptGhanaMauritania
MauritiusMoroccoSwaziland
TanzaniaTunisiaUganda
27
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
28/52
Examples from Asia and Pacific
• ISSA (2012) ‘ Asia and the Pacific : Addressing complex needsthrough innovative and proactive social security’ lists examples from…
• Some examples:
Collect insurance contributions electronically (Malaysia, Philippines,
Sri Lanka, Thailand) Hotlines, one-stop shops, help-desks and 24/7 online service availability
(Bhutan, Kuwait, Nepal, Saudi Arabia)
Improve outreach, delivery of services with online/SMS and home visits(Jordon, Kiribati, New Zealand)
BhutanFijiIndia
Jordon
KiribatiKuwaitMalaysia
Nepal
New ZealandPhilippinesSaudi Arabia
SingaporeSri LankaThailand
28
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
29/52
Example from Brazil
• Brazil: the Directorate of the National Social Security (DIRAT/INSS)has introduced a planning process to mainstream the streamlining ofSP. This includes…
INSS introduced a Service by Appointment Program using toll-freenumbers to a national call centre, which includes enquires advice =
reduce physical queuing Electronic records replaced paper allowing front-end staff to check
payments due to beneficiaries = “the benefits granting process can be
carried out in 30 minutes – in contrast to weeks or months requiredin the recent past” (EJISDC 2011, ‘ICT-driven public servicetransformation of social security systems …’)
Two biggest banks linked to the social insurance electronic database toenable ATM-SP withdrawals
29
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
30/52
Example from Brazil
• Brazil: mainstreaming began 2006 …. average time in grantingbenefits (Baroni and Montagner, 2009)
• Cross-border data transfers: another important feature is integration withthe social security systems of neighbouring MERCORSUR countries underthe International Agreement System in Social Security (SIACI) since2008 to replace paper information exchange = system of digitalcertificates to ensure security and confidentiality
Benefits 2007 2009
Retirement 69 days 17 days
Widows 21 days 12 days
Maternity leave 41 days 29 days
30
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
31/52
Example from Belgium
• Crossroads Bank for Social Security - coordinates servicefinances for e-Govt across Belgium’s social sector
(https://www.ksz-bcss.fgov.be/binaries/documentation/en/cbss_2014_def_web.pdf )
• Examples of savings
Combines electronic data collection, contributions and paymentsfrom public and private sectors
Rationalization of the information exchange process betweenemployers and the social sector implies annual admin annual
savings of around €1.7 billion (about US$1.9 billion) foremployers
Mandatory declarations by foreign employees and self-employed(500,000 annually) via integrated electronic deliver service =process time down from 7 days to 5 minutes
31
https://www.ksz-bcss.fgov.be/binaries/documentation/en/cbss_2014_def_web.pdfhttps://www.ksz-bcss.fgov.be/binaries/documentation/en/cbss_2014_def_web.pdfhttps://www.ksz-bcss.fgov.be/binaries/documentation/en/cbss_2014_def_web.pdfhttps://www.ksz-bcss.fgov.be/binaries/documentation/en/cbss_2014_def_web.pdfhttps://www.ksz-bcss.fgov.be/binaries/documentation/en/cbss_2014_def_web.pdf
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
32/52
ADB ICT-related projectsSocial protection comes within Public Sector Management (18%)
Source: http://www.adb.org/sectors/ict/main
32
http://www.adb.org/sectors/ict/mainhttp://www.adb.org/sectors/ict/main
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
33/52
ADB Monitoring and Evaluation ADB (2013) An Evaluation of the Electronic Pension Payment System in Tajikistan
• In 2012 an electronics pensions payments system in 15 of 68districts introduced using plastic cards issued by the Amonatbankfor use at POS/ATM terminals
• Typical M&E problem = lack of hard data on costs and benefits “In the absence of quantitative information and reports on changes in
costs, these interviews were essential for evaluating the qualitativeimpacts that the system had on the various parties.”
Sample group: 65% used Amonatbank ATMs; 24% still used cashiers;15% used POS;
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
34/52
ADB Monitoring and Evaluation ADB (2013) An Evaluation of the Electronic Pension Payment System in Tajikistan
ADB assessment:
Amonatbank’s operating costs reduced by eliminating manualverification, processing and reconciliation of pension paymentdocuments for 1/3rd of all pensioners
Amonatbank’s investments in ATMs and POS can bring inadditional revenues from the bank’s over 400,000 card holders
The electronic pension payment system has positive effects for
pensioners in terms of convenience and wait times.
Not all pensioners benefitted, especially for some in ruralareas who experienced increased wait and travel times.
34
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
35/52
Some obvious constraints in the use of ICTs
Service administration
Poor telecoms/Internetnetworks – public or Govt.(unified communications)
broadband networks required Tamper-proof systems –
fraud by ID theft, hacking,duplication, etc.
Reliable national ID system –
biometrics preferred forverification purposes;acceptable alternativedocumentation to be defined
Service delivery
Poor telecoms /Internetnetworks – mobile networkseasier and cheaper to build
and to use; other technologiessuch as TVWS, WiFi, etc.
Illiteracy among recipients – mobile and web apps that usesymbols can help
Delivery points – a localsystem of banks, ATMs, POs,bank agents, NGOs, etc., forcash and credit transfers
35
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
36/52
Asian Development Bank
October 2015
Dr. John UreDirector, TRPC Ltd (Singapore)
Associate Professor and Director of the TRP
Social Science Research Centre
University of Hong Kong
www.trpc.biz
ICTs and National ID
36
http://www.trpc.biz/http://www.trpc.biz/
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
37/52
ID Overview
• National ID systems and how to build and manage them
• ID types and technologies
• Examples from Pakistan, Columbia, India and Peru
37
ID classification by ethnicity, caste, religion, etc., can andhas been used for discrimination and “cleansing”
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
38/52
Identify: Legal, Registered and NationalCivil Registration and Vital Statistics Agenda (CRVS) http://www.globalsummitoncrvs.org/
• The critical issue = Legal identity Without it no contractual arrangements such as property rights,
bank loans and mortgages, etc.
How to assign rights of access to SP programmes without it?
Dependent upon charities and NGOs without it• Registration is essential for legal identify
WB estimates 1.8 billion people unregistered (>1/3 children)
• Registration necessary but not sufficient for National ID
Functional ID vs. Foundational ID• National ID is sufficient but not necessary for legal
identity Example, UK has no National ID but close to 100% legal identity
38
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
39/52
National ID
See also Robert Palacios, ‘Social protection delivery systems with a focus in identification’ World
Bank, 2014
39
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
40/52
National Identify SystemsTarget #16.9 of the UN’s Sustainable Development Goals
“Provide legal identity to all, including birth registration, by 2030”
• #16.9: A legal identity confers human rights, and the achievement of atleast 10 SD goals… :
Social protection, including for the most vulnerable;
Assistance in dealing with shocks and disasters;
Equal rights to economic resources, including property and finance;
Empowerment of women; Improvements in maternal and child health;
Coverage by vaccines and similar treatments;
Improving energy efficiency and eliminating harmful energy subsidies;
Child protection, including the ending of harmful child labour;
Reducing remittance costs; and
Reducing corruption, fighting crime and terrorism and strengthening and improvingthe equity of fiscal policy
• World Banks’ ID4D Working Group established 2014
See http://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goals
A rather mixed bag, but some outcomes lead to others
40
http://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goals
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
41/52
How to…
How to obtain a Unique
National Identifier
1. Registrations necessary but not sufficient, needs
something unique to that person2. A unique common identifier is the only way to
enable cross-checking of databases
How to achieve
universal coverage
1. National campaigns, local authorities, NGOs and
donors, etc.2. Unregistered maybe because Overlooked, lack of capacity, end of the
queue, hidden from view, inaccessiblelocations, resistance, etc.
Excluded by policies or prejudices on grounds
of ethnic and social minorities, gender, sexualorientation, political leanings, etc.
Corruption (e.g., require a bribe) orincompetence
41
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
42/52
How to…
How to authenticate,
de-duplicate, monitorfor updates
1. Inspections and check-ups
2. Cross-reference to other agency databases3. Use of algorithms to identify duplicates and
suspiciously similar registrations or ‘ghost’
registrations4. Identify unclaimed benefits, database records of
the deceased, or those who have migrated,
those who cease to quality, etc.5. Penalties for fraud, misrepresentation and
especially corruption
How to integrate all SPsystem databases
1. Clean-up all data around UNIDs to ensure inter-operability
2. Link databases sequentially, one at a time,testing each time
3. Use systems integrator professionals
42
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
43/52
ID card types and technologies
Types Uses
1. Foundational 1. Typically NID
2. Functional 2. Purpose specific; may be sponsored
3. Offline/online 3. May require additional information, password, etc.
4. Biometric/smartcards make
ID theft moredifficult
4. Is there a better alternative? Technology improves, becomes cheaper and mobile
Uses unique features of individuals Smartcards can be linked to multiple services Easy database systems management Difficult but not impossible to synthetically replicate Raises the costs of data loss through hacking, etc.
5. Standards 1. Only international standard requirement is set by the
International Civil Aviation Authority (ICAO)2. For cross-border services and data exchange, regional if not
global standards are needed3. Use global standards for smartcard/ biometrics = lower cost,
easier to maintain, and easier to update
43
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
44/52
Source: Alan Gelb and Julia Clark Center for Global Development, Bangalore 201244
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
45/52
Pakistan’s National Database and Registration Authority (ICAO HQ, Montreal, Canada, 2012)
Shows development of ID use from identify to access to services
45
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
46/52
Source: Pakistan NDRA 201246
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
47/52
Source: Pakistan NDRA 201247
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
48/52
Source: Pakistan NDRA 201248
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
49/52
Cards and costs: Columbia, Indian and Peru
• Columbia’s SISBEN vulnerability and identification system for socialassistance
Database of > 70% pop = ID data + vulnerability index + software toindex each household in need
Local door-to-door ID survey $4-5 per head
http://www.social-protection.org/gimi/gess/RessourcePDF.action?ressource.ressourceId=51857
49
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
50/52
India’s Aadhaar Card
Functional card
• RSBY card (RashtriyaSwasthya Bima Yojana inHindi means "National Health
Insurance Programme“) Cashless insurance for the poor
$2-3 per head
Foundational card
• Aadhaar card
Linked to new bank accounts forthe poor for direct SP payments
$3-4 per head50
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
51/52
Peru’s RENIEC Children Identification cycle
2013: UN PublicService Award – by2012 around 95% ofPeru’s 10 million
children had an ID
• Carlos Reyna Izaguirre Presentation: ‘National ID Card forPeruvian children: Impact on human rights and development’
• Costs: standard $10.3; coastal $21.8; mountains $42.1;Jungle $79.8 (see Palacios, WB 2014)
51
-
8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection
52/52
52
Thank You