Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best...

download Presentations on Use of ICT for Development and Social Protection:  Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

of 52

Transcript of Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best...

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    1/52

     

     Asian Development Bank

    March 2016

    Dr. John UreDirector, TRPC Ltd (Singapore)

     Associate Professor and Director of the TRPSocial Science Research Centre

    University of Hong Kong

    www.trpc.biz 

    ICT and Social Protection 

    1

    Disclaimer: The views expressed in this paper/presentation are the views of the author and do not necessarily reflectthe views or policies of the Asian Development Bank (ADB), or its Board of Governors, or the governments they

    represent. ADB Does not guarantee the accuracy of the data included in the presentation and accepts no responsibilityfor any consequence of their use. Terminology used may not necessarily be consistent with ADB official terms.

    http://www.trpc.biz/http://www.trpc.biz/

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    2/52

    Agenda

    Focus – social insurance, social assurance andlabour markets

    ICTs – nature of their adoption/applications andhow to classify them = taxonomy

    ICT applications – how are ICTs being adoptedand with what results, databases, costs and

    benefits?Role of ID – different approaches

    Lessons – who is doing what and why?

    2

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    3/52

    ICTs and social protection

    • A simple key point: national policies,demographics and finances are the keydrivers – ICTs are ways to administer,monitor and evaluate social protectionprojects and programmes

    o   But… ICTs (online, social media, etc.)empower  citizens by opening up

    information and social engagement whichcan influence policies and resourcesdevoted to social protection

    • Very little systematic internationalresearch: still early days…

    • Most ICT adoption up-to-date has a single service focus: butintegration of databases to support them is growing, increasesefficiency, reduces duplications, etc. 

    3

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    4/52

    Terminology and Taxonomy

    • Different ways to Identify classes of ICTs, usages andimpacts: typically some combination of… 

    Technical/incremental: usually refers to ICTs that automate orreplace manual routines/paper work with digital technologies

    Sustained: usually refers to the adoption of ICTs that bring aboutlong-term organizational/administrative improvements in efficiency,

    accuracy, targeting, etc.

    Disruptive : usually refers to a fundamental restructuring in the wayprojects and programmes are organized, a shift of ‘ownership’, etc.

    Radical: beyond disruptive? a shift in stakeholder influence?

    Transformative: totally  

    radical? a wholesale change in approach?

    1. Technical3. Sustained5. Radical

    2. Incremental4. Disruptive6. Transformative

    4

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    5/52

    Still early days for comprehensive ICT adoption

    • ICTs have been around for decades: but universal industrystandards have taken time to evolve and to be adopted, holdingback… 

    o Full interconnectivity of networks

    o Full interoperability over networks of apps

    • Backend digital technologies evolving quickly: systemsarchitectures need to evolve incrementally in a modular way toensure… 

    o  Different parts of IT systems from different vendors need tocommunicate with each and share data, programmes and apps

    o Upgrading is a relatively easy and less costly process

    • Frontend user technologies evolving quickly: smart devices,Internet-of-Things (IoT),etc., are opening up new opportunities forradical technology adoption

    • Service-Oriented Architecture (SOA) embraces both ends5

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    6/52

    Therefore still early days for research studies

    • The BIG picture: social protection as development policy (preventing poverty) vs. social protection asinstrumental for poverty relief (addressing poverty)o ITC4D is about promoting economic growth and social inclusion

    = policy driven/vision oriented/goals to be achieved

    o ICT4SP is more about efficient streamlining of registrations,assessments and deliverables = needs driven/outputoriented/targets measured

    • Most detailed research by international institutions:

    World Bank, ADB, European Commission, ISSA, etc. o But many  over-lapping agencies concerned with social

    protection: eg’s UNDP, OCHA, UNICEF, ESCAP, ILO, WHO… 

    6

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    7/52

    And still very early days for the complete vision

    • Fully-integrated back, middle and front-end systems:embracing databases, Big Data analytics, ERM, MIS,CRM, etc. – all systems digital to give holistic overview.

    • Cross-cutting departments within an agency

    • Cross-cutting government agencies

    • Cross-cutting NGO and private sector partners

    • Integrating pro-active engagement with beneficiaries

    • Integrating self-help by recipients (use of smart devices, etc.)

    Note: ICTs free up staff to focus on services

    • Cloud services: SaaS, PaaS, IaaS…. XaaS to provideubiquitous access; with different rights of access

    • But!... Is sharing of data allowed between agencieswithout permissions? How secure are the systems? 

    7

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    8/52

    An ongoing European Community study is oneof the most comprehensive

    • An EC-JRC Technical Report (2015) study(1) = the firststeps towards a comprehensive review across the EU ofICTs in social protection (SP) programmeso ‘the first exercise of its kind ever conducted by the EC directly” 

    o The paper is the first draft of an ongoing in-depth study(1) http://is.jrc.ec.europa.eu/pages/EAP/documents/20150206_IESI_D121_DRAFT_V20_JRC-IPTS_DEF.pdf  

    • Methodology: the choose 50 from an inventory of 100integrated approaches to SP project initiatives according

    the criteria of:o Policy relevance

    o ICT-enabled innovation

    o Evidence of outcomes

    8

    http://is.jrc.ec.europa.eu/pages/EAP/documents/20150206_IESI_D121_DRAFT_V20_JRC-IPTS_DEF.pdfhttp://is.jrc.ec.europa.eu/pages/EAP/documents/20150206_IESI_D121_DRAFT_V20_JRC-IPTS_DEF.pdfhttp://is.jrc.ec.europa.eu/pages/EAP/documents/20150206_IESI_D121_DRAFT_V20_JRC-IPTS_DEF.pdfhttp://is.jrc.ec.europa.eu/pages/EAP/documents/20150206_IESI_D121_DRAFT_V20_JRC-IPTS_DEF.pdf

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    9/52

    Summary of findings of the EC study

    • Main focus of the initiatives = promoting efficiency and cost savingsvia (i) cross-sector collaboration/integration, (ii) innovation in thedelivery of services to beneficiaries

    • Most initiatives “address mainly one policy or problem area of

    the target group within an individual social service” 

    • But many initiatives aim to transform “how individuals interfacewith social service providers” through the design of integratedapproaches… “electronic user records, the use of data analytics

    and interoperable technologies that enable the at-riskbeneficiaries and a better understanding of service use.” 

    •  “The one-stop shop model of integrated service delivery isemerging as a trend…” 

    9

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    10/52

    Summary of EU initiatives

    Initiatives

    72%

    46% 34%

    Most

    51%

    43%

    Focus and character

    Labour markets/helping young peopleintegrate into society

    Help individuals throughout their lives Modernising SP systems

    Show “an elevated integration of

    services” 

    Organizational/sustained

    Disruptive/radical/transformative

    10

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    11/52

    EU findings: the integration of services improvesoutcomes by…

    Operational/Organizational

    • Enhances efficiency byreducing costs

    • Increases capacity andvalue for money

    • Improves strategicplanning and system

    integrity• Reduces the demand for

    emergency services.

    Beneficiaries

    • Provides simplifiedaccess

    • Provides holistic andcustomised support

    • Faster response times

    • Improved user

    experience

    11

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    12/52

    Some key benefits of database integration

    1. Informed policy-making;generate reports

    2. Coherent and consistentpolicy making acrossgovernment

    3. Eradicates duplication andreduces fraud

    4. Provides each agency with aholistic view of every

    recipient/beneficiary5. Speeds up search and

    processing, does away withpaper-work = error reduction

    6. Enables use of analyticssoftware for estimations,forecasts, calculations, etc.

    7. Potential ubiquitous accessthrough secure networks andGovt/ hybrid or encrypted publicclouds

    8. Can be made interoperablewith agency mid-stream SWprogrammes

    9. Can give partitioned accessto recipients

    10. Can promote self-service byrecipients/ beneficiaries

    12

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    13/52

    Some key costs of database integration

    1. Capex set-up costs,maintenance, upgrades andcosts of opex

    2. Data collection, cleaning,formatting, especially frompaper-based or legacy ITsystems

    3. Cross-government agencyadoption, installation, budgets

    4. Staff IT skills, training costs,resource redeployments

    5. Legality of data sharing,privacy legislation, etc.

    6. Security issues, firewalls,detection systems, etc.

    7. Costs of fibre networks

    8. Costs of alignment of agency

    sub-systems for inter-operability9. Costs of designing anddeveloping new user-friendlyinterfaces for fixed and wirelessdevices

    10. Costs of outreach facilitiessuch as e-Kiosks, mobilenetworks, WiFi hotspots, tele-centres, etc.

    13

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    14/52

    Database Info

    • Databases and their integration lie at theheart of ICT4SP

     For transactions

     For operational analytics

     To link with frontend systems

     As the central item of cost

    14

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    15/52

    15

    Sequence of data ingest to data warehouse 

    Data Ingest

    Extract, Transform,Load

    Data ResourceManagement System

    Multiple Servers(local or online)

    Enterprise DataWarehouse

    • Data input manually or electronically from other device

    • ETL for Standardization – standard formatting, spelling, numbering,sequencing of data record, etc., prior to loading it into a database

    • DRMS allocates the data to storage according to pre-set algorithms,periodically defragmenting the storage to maximize the spaceavailable for new data ingests

    • Local database storage of data in data marts which may be in manydifferent geographical locations spread across the country

    • EWD Matching – software spots different entries that appear rathersimilar, such as 100% the same, 75%, 60%, etc., for furtherinspection

    Stage 2

    Stage 3

    • EWD Relational – persons A and B may have commoncharacteristics, e.g. live same house, are married to each other, oneis the child of the other, etc

    • Transactional checks – ‘Big Data’ stored over 10 or 15 years or morecan be checked for trends, multiple UIDs, systematic financialleakages, etc

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    16/52

    16

    Database Basics

    For non-specialists involved in the budgeting and policy decisions

    • Structured/Unstructured Data :  Structured - For operational-analytical purposes, either

    relational databases or programmes that can manage toestablish relationships across unstructured data.

    Unstructured - For transactional purposes

    •  Structured Query Language : SQL originated with IBM which later became part of Oracle

    products. Anopen-source standard programming language for

    relational databases.

    •  Hypertext Preprocessor - PHP : widely used programming language for websites, free to

    download and works with most operating systems 

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    17/52

    17

    Database Basics

    • Family of SQL Databases

    SQL• designed for

    largerelationaloperationalanalytics

    MySQL• designed

    for use inweb-basedapplications

    NoSQL• does not use

    SQL, used fornon-relationaldatabases thatis not organizedin a tabularstructure

    NewSQL

    • SQL-basedrelationaldatabases butable to handledata from non-relationaldatabases such

    as NoSQL

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    18/52

    18

    •  Open Source software:

    Costs reduction for open source software and off-the-shelf(‘commodity’) hardware. Additional customisation of software

    is usually required for enterprise and government purposes.

    Database Basics

    •  Proprietary software:more expensive, but often come with many services. Care

    needs to be taken that the programmes and applications areinter-operable and compatible with other parts of the ICTsystem from different vendors 

    •  Single/distributed: data can be housed within a single database or distributed

    across many in different locations. A secure high-speed(broadband) network is required to link them, and a distributedprocessing framework is required to use them 

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    19/52

    19

    • Scale/scope:

    the scale of the data to be handled by social protectionprogrammes will depend upon population size and the scopeof the programmes involved.

    a) medium or large in quantityb) relational by design

    c) distributed across different databases A central master database is desirable against which localdatabases can be updated and cross-checked for the validityof their entries

    Database Basics

    •  Cleansed/standardized: data needs to be a cleansed and standardized before it canbe centralized.

    Problems arise during ingest process, consolidating all thedata into one central national reference database

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    20/52

    20

    Database Basics

    Hadoop:

      An open sourcesoftwaredeveloped by the

     Apache SoftwareFoundation using

    the HadoopDistributed FileSystem (HDFS) which enables theresourcemanagement of

    data in manydifferent formatsand from manydifferent sources

    Hadoop 2: uses a resource management

    operating platform called YARN (Yet Another Resource Negotiator) thatallows a multitude of programmes torun on top of Hadoop, including SQL(SQL-on-Hadoop).

    can aggregate structured/unstructuredand single/distributed data andcleanse/standardize it in the process

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    21/52

    21

    •  Power and resource management:

    Powerful tools that speed the data processing and analytics, suchas Oracle Database and recent iterations of IBM’s DB2 family ofdatabase products which use the BLU (Big data, Lightening fast,Ultra easy) enhancement

    Database Basics

    •  Database in the cloud: a private cloud computing network houses the data warehouse onservers that are accessed over an Intranet

    This might consist of a mix of(i) offline office-based servers(ii) online servers connected terrestrially by optical fibre cables(iii) a data warehouse accessed through a government-owned and

    managed Intranet cloud(iv) part of that data warehouse containing public information

    becoming accessible in the public cloud over the Internet

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    22/52

    Ballpark costs of databases and their environment 

    22

    Typical “environment”  System requirements

    Ballpark costs(after discounts

    on list prices)

    • The production or EDW system Database system using SQL USD400k upwards

    • Redundancy/disaster managementrecovery

    Duplicate of the EDW that must be in asecure and non-contiguous location andwell connected by infrastructure

    USD400k upwards

    • Test system for any newly installed

    hardware or software

     All additional hardware and software needs

    to be fully tested for malware and softwareglitches

    USD100k upwards

    • Development environment tocustomise the hardware andsoftware and applications by asystems integrator  

    Customised hardware and software needsto be designed

    USD100k upwards

    • Systems integrator and servicesprovider to customise the databasesystem 

    Unless systems adaptation can be handledentirely in-house, a specialist vendor isrequired

    USD500k upwards

    • Entire system Needs to be scaled up according to size ofenterprise or organizations 

    USD1.5 millionupwards

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    23/52

    Integrated databases and the budget

    • Very difficult to compare costs across countries

    Source: Oxford Policy Management ‘Key aspects to consider when setting up an integrated systemfor data and information management… and international best practice’ Development Pathways,

    Jakarta Workshop, March 2015

    System components andinfrastructure

    Costs

    Implementation costs US$02 – 9 million annually

    Data collection costs US$4-14 per applicant

    Development and infrastructure costs US$1 – 5 million

    23

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    24/52

    Early examples go way back

    Source: Knut Leipold (World Bank) ‘ICT in Social Protection’, 2001 24

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    25/52

     World Bank summary of costs

    Source: Knut Leipold (World Bank) ‘ICT in Social Protection’, 2001 25

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    26/52

     World Bank summary of benefits

    Source: Knut Leipold (World Bank) ‘ICT in Social Protection’, 2001 26

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    27/52

    Examples from Africa

    • Examples abound of ICTs being used to streamline processes andprovide multi-access channels – but in the case of projects and fieldtrails how to scale them up?

    • ISSA (2015) ‘In Africa, using new technologies to improve the

    delivery for social security’ lists examples from… 

    Examples: (i) electronic filings of employers’ contribution to socialinsurance in Mauritius reduced staff requirements from 35 to 7; (ii)enhanced social security payments system in Côte d’Ivoire cuttransactions costs per insured recipient by 77%; (iii) in Tanzania,electronic systems allow Parastatal Pensioners services access 24x7

    •  

     AlgeriaCameroonCôte d’Ivoire 

    EgyptGhanaMauritania

    MauritiusMoroccoSwaziland

    TanzaniaTunisiaUganda

    27

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    28/52

    Examples from Asia and Pacific

    • ISSA (2012) ‘ Asia and the Pacific : Addressing complex needsthrough innovative and proactive social security’ lists examples from… 

    • Some examples:

    Collect insurance contributions electronically (Malaysia, Philippines,

    Sri Lanka, Thailand) Hotlines, one-stop shops, help-desks and 24/7 online service availability

    (Bhutan, Kuwait, Nepal, Saudi Arabia)

    Improve outreach, delivery of services with online/SMS and home visits(Jordon, Kiribati, New Zealand)

    BhutanFijiIndia

    Jordon

    KiribatiKuwaitMalaysia

    Nepal

    New ZealandPhilippinesSaudi Arabia

    SingaporeSri LankaThailand

    28

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    29/52

    Example from Brazil

    • Brazil: the Directorate of the National Social Security (DIRAT/INSS)has introduced a planning process to mainstream the streamlining ofSP. This includes… 

    INSS introduced a Service by Appointment Program using toll-freenumbers to a national call centre, which includes enquires advice =

    reduce physical queuing Electronic records replaced paper allowing front-end staff to check

    payments due to beneficiaries = “the benefits granting process can be

    carried out in 30 minutes – in contrast to weeks or months requiredin the recent past” (EJISDC 2011, ‘ICT-driven public servicetransformation of social security systems …’) 

    Two biggest banks linked to the social insurance electronic database toenable ATM-SP withdrawals

    29

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    30/52

    Example from Brazil

    • Brazil: mainstreaming began 2006 …. average time in grantingbenefits (Baroni and Montagner, 2009)

    • Cross-border data transfers: another important feature is integration withthe social security systems of neighbouring MERCORSUR countries underthe International Agreement System in Social Security (SIACI) since2008 to replace paper information exchange = system of digitalcertificates to ensure security and confidentiality

    Benefits 2007 2009

    Retirement 69 days 17 days

    Widows 21 days 12 days

    Maternity leave 41 days 29 days

    30

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    31/52

    Example from Belgium

    • Crossroads Bank for Social Security - coordinates servicefinances for e-Govt across Belgium’s social sector  

    (https://www.ksz-bcss.fgov.be/binaries/documentation/en/cbss_2014_def_web.pdf )

    • Examples of savings

    Combines electronic data collection, contributions and paymentsfrom public and private sectors

    Rationalization of the information exchange process betweenemployers and the social sector implies annual admin annual

    savings of around €1.7 billion (about US$1.9 billion) foremployers

    Mandatory declarations by foreign employees and self-employed(500,000 annually) via integrated electronic deliver service =process time down from 7 days to 5 minutes

    31

    https://www.ksz-bcss.fgov.be/binaries/documentation/en/cbss_2014_def_web.pdfhttps://www.ksz-bcss.fgov.be/binaries/documentation/en/cbss_2014_def_web.pdfhttps://www.ksz-bcss.fgov.be/binaries/documentation/en/cbss_2014_def_web.pdfhttps://www.ksz-bcss.fgov.be/binaries/documentation/en/cbss_2014_def_web.pdfhttps://www.ksz-bcss.fgov.be/binaries/documentation/en/cbss_2014_def_web.pdf

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    32/52

     ADB ICT-related projectsSocial protection comes within Public Sector Management (18%)

    Source: http://www.adb.org/sectors/ict/main 

    32

     

    http://www.adb.org/sectors/ict/mainhttp://www.adb.org/sectors/ict/main

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    33/52

     ADB Monitoring and Evaluation ADB (2013) An Evaluation of the Electronic Pension Payment System in Tajikistan 

    • In 2012 an electronics pensions payments system in 15 of 68districts introduced using plastic cards issued by the Amonatbankfor use at POS/ATM terminals

    • Typical M&E problem = lack of hard data on costs and benefits “In the absence of quantitative information and reports on changes in

    costs, these interviews were essential for evaluating the qualitativeimpacts that the system had on the various parties.” 

    Sample group: 65% used Amonatbank ATMs; 24% still used cashiers;15% used POS;

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    34/52

     ADB Monitoring and Evaluation ADB (2013) An Evaluation of the Electronic Pension Payment System in Tajikistan 

    ADB assessment:

     Amonatbank’s operating costs reduced by eliminating manualverification, processing and reconciliation of pension paymentdocuments for 1/3rd of all pensioners

     Amonatbank’s investments in ATMs and POS can bring inadditional revenues from the bank’s over 400,000 card holders 

    The electronic pension payment system has positive effects for

    pensioners in terms of convenience and wait times.

    Not all pensioners benefitted, especially for some in ruralareas who experienced increased wait and travel times.

    34

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    35/52

    Some obvious constraints in the use of ICTs

    Service administration

    Poor telecoms/Internetnetworks – public or Govt.(unified communications)

    broadband networks required Tamper-proof systems – 

    fraud by ID theft, hacking,duplication, etc.

    Reliable national ID system – 

    biometrics preferred forverification purposes;acceptable alternativedocumentation to be defined

    Service delivery

    Poor telecoms /Internetnetworks – mobile networkseasier and cheaper to build

    and to use; other technologiessuch as TVWS, WiFi, etc.

    Illiteracy among recipients – mobile and web apps that usesymbols can help

    Delivery points – a localsystem of banks, ATMs, POs,bank agents, NGOs, etc., forcash and credit transfers

    35

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    36/52

     

     Asian Development Bank

    October 2015

    Dr. John UreDirector, TRPC Ltd (Singapore)

     Associate Professor and Director of the TRP

    Social Science Research Centre

    University of Hong Kong

    www.trpc.biz 

    ICTs and National ID 

    36

    http://www.trpc.biz/http://www.trpc.biz/

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    37/52

    ID Overview

    • National ID systems and how to build and manage them

    • ID types and technologies

    • Examples from Pakistan, Columbia, India and Peru

    37

    ID classification by ethnicity, caste, religion, etc., can andhas been used for discrimination and “cleansing” 

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    38/52

    Identify: Legal, Registered and NationalCivil Registration and Vital Statistics Agenda (CRVS) http://www.globalsummitoncrvs.org/

    • The critical issue = Legal identity Without it no contractual arrangements such as property rights,

    bank loans and mortgages, etc.

    How to assign rights of access to SP programmes without it?

    Dependent upon charities and NGOs without it• Registration is essential for legal identify

    WB estimates 1.8 billion people unregistered (>1/3 children)

    • Registration necessary but not sufficient for National ID

     Functional ID vs. Foundational ID• National ID is sufficient but not necessary for legal

    identity  Example, UK has no National ID but close to 100% legal identity

    38

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    39/52

    National ID

    See also Robert Palacios, ‘Social protection delivery systems with a focus in identification’ World

    Bank, 2014

    39

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    40/52

    National Identify SystemsTarget #16.9 of the UN’s Sustainable Development Goals

    “Provide legal identity to all, including birth registration, by 2030” 

    • #16.9: A legal identity confers human rights, and the achievement of atleast 10 SD goals… :

      Social protection, including for the most vulnerable;

      Assistance in dealing with shocks and disasters;

      Equal rights to economic resources, including property and finance;

      Empowerment of women;   Improvements in maternal and child health;

      Coverage by vaccines and similar treatments;

      Improving energy efficiency and eliminating harmful energy subsidies;

      Child protection, including the ending of harmful child labour;

      Reducing remittance costs; and

      Reducing corruption, fighting crime and terrorism and strengthening and improvingthe equity of fiscal policy

    • World Banks’ ID4D Working Group established 2014 

    See http://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goals 

     A rather mixed bag, but some outcomes lead to others

    40

    http://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goalshttp://blogs.worldbank.org/ic4d/sdg-target-focusing-identification-critical-supporting-achievement-post-2015-development-goals

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    41/52

    How to… 

    How to obtain a Unique

    National Identifier

    1. Registrations necessary but not sufficient, needs

    something unique to that person2. A unique common identifier is the only way to

    enable cross-checking of databases

    How to achieve

    universal coverage

    1. National campaigns, local authorities, NGOs and

    donors, etc.2. Unregistered maybe because Overlooked, lack of capacity, end of the

    queue, hidden from view, inaccessiblelocations, resistance, etc.

    Excluded by policies or prejudices on grounds

    of ethnic and social minorities, gender, sexualorientation, political leanings, etc.

    Corruption (e.g., require a bribe) orincompetence

    41

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    42/52

    How to… 

    How to authenticate,

    de-duplicate, monitorfor updates

    1. Inspections and check-ups

    2. Cross-reference to other agency databases3. Use of algorithms to identify duplicates and

    suspiciously similar registrations or ‘ghost’

    registrations4. Identify unclaimed benefits, database records of

    the deceased, or those who have migrated,

    those who cease to quality, etc.5. Penalties for fraud, misrepresentation and

    especially corruption

    How to integrate all SPsystem databases

    1. Clean-up all data around UNIDs to ensure inter-operability

    2. Link databases sequentially, one at a time,testing each time

    3. Use systems integrator professionals

    42

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    43/52

    ID card types and technologies

    Types Uses

    1. Foundational 1. Typically NID

    2. Functional 2. Purpose specific; may be sponsored

    3. Offline/online 3. May require additional information, password, etc.

    4. Biometric/smartcards make

    ID theft moredifficult

    4. Is there a better alternative? Technology improves, becomes cheaper and mobile

    Uses unique features of individuals Smartcards can be linked to multiple services Easy database systems management Difficult but not impossible to synthetically replicate Raises the costs of data loss through hacking, etc.

    5. Standards 1. Only international standard requirement is set by the

    International Civil Aviation Authority (ICAO)2. For cross-border services and data exchange, regional if not

    global standards are needed3. Use global standards for smartcard/ biometrics = lower cost,

    easier to maintain, and easier to update

    43

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    44/52

     

    Source: Alan Gelb and Julia Clark Center for Global Development, Bangalore 201244

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    45/52

    Pakistan’s National Database and Registration Authority (ICAO HQ, Montreal, Canada, 2012)

    Shows development of ID use from identify to access to services 

    45

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    46/52

     

    Source: Pakistan NDRA 201246

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    47/52

     

    Source: Pakistan NDRA 201247

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    48/52

     

    Source: Pakistan NDRA 201248

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    49/52

    Cards and costs: Columbia, Indian and Peru

    • Columbia’s SISBEN vulnerability and identification system for socialassistance

      Database of > 70% pop = ID data + vulnerability index + software toindex each household in need

      Local door-to-door  ID survey $4-5 per head

    http://www.social-protection.org/gimi/gess/RessourcePDF.action?ressource.ressourceId=51857

    49

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    50/52

    India’s Aadhaar Card

    Functional card

    • RSBY card (RashtriyaSwasthya Bima Yojana inHindi means "National Health

    Insurance Programme“) Cashless insurance for the poor

    $2-3 per head

    Foundational card

    • Aadhaar card

    Linked to new bank accounts forthe poor for direct SP payments

    $3-4 per head50

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    51/52

    Peru’s RENIEC Children Identification cycle 

    2013: UN PublicService Award – by2012 around 95% ofPeru’s 10 million

    children had an ID

    • Carlos Reyna Izaguirre Presentation: ‘National ID Card forPeruvian children: Impact on human rights and development’

    • Costs: standard $10.3; coastal $21.8; mountains $42.1;Jungle $79.8 (see Palacios, WB 2014) 

    51

  • 8/18/2019 Presentations on Use of ICT for Development and Social Protection: Drivers, Constraints and Best Practice and Identity Management, Cyber Security and Social Protection

    52/52

    52

    Thank You