<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Privacy by Design and Administrative Eciency in E-Governance: a Case Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Benoˆıt Vanderose</string-name>
          <email>benoit.vanderose@unamur.be</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>E´ lise Degrave</string-name>
          <email>elise.degrave@unamur.be</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Naji Habra</string-name>
          <email>naji.habra@unamur.be</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Namur</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>Achieving administrative eciency is one of the objectives pursued by e-governance. Many aspects of government to citizen and government to business exchanges may be streamlined through an adequate use of information and communication technologies (ICT). However, among the various challenges facing e-governance, legal issues regarding data protection and privacy are often perceived as curbing the full potential of ICT regarding eciency. In this paper, we introduce a decentralized information management model used for the development of e-government in Belgium and that illustrates how privacy and eciency dot not have to be opposing forces. We discuss the key aspects of this model and how it complies to the principles of a privacy by design approach. We assess its overall strengths and weaknesses as well as its potential to support further legal requisites such as the right to information and transparency.</p>
      </abstract>
      <kwd-group>
        <kwd>Privacy by design</kwd>
        <kwd>administrative eciency</kwd>
        <kwd>information management model</kwd>
        <kwd>case study</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        Achieving administrative eciency sits among the core principles underlying the
implementation of good governance and e-governement [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        Attempts to provide better tools to support administrative decision-making [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ],
to improve software development processes in public administrations [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] or to
investigate how to increase user satisfaction whilst decreasing administrative
burden [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] contribute to a more ecient organisation of public administrations.
      </p>
      <p>A central aspect of administrative eciency lies in how data pertaining to
citizens are managed, acquired and made available. Choosing a relevant strategy
regarding the management of citizen-related information may o↵er important
improvements in usability and eciency. For instance, the reuse and sharing of
previously acquired data among di↵erent administrations allows a decrease of
administrative burden for this particular citizen (i.e., not to be forced to provide
the same piece of information multiple times since the data is shared and reused).</p>
      <p>
        However, inherent risks of administrative simplification lie in
oversimplification of the design of the envisioned strategy. Typically, a straightforward design
to support sharing and reusing citizen-related information would be to
implement a centralized information management model with a central data source
that would gather every piece of information pertaining to citizens and all
aspects of their citizenship (e.g., vital records, health-related data, etc.). Such a
model has already been proposed in the past. For instance, the Automated
System for Administrative Files and the Repertory of Individuals (SAFARI) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], was
proposed by the French government during the seventies and embodied such a
centralised information model. Of course, this strategy raised a lot of concerns
regarding privacy protection and security that led to the dismissal of the project.
      </p>
      <p>
        This example illustrates how important it is to take the requirements of
privacy protection into account during the early stages of a project (especially
related to e-governance). If possible problems of privacy protection are discovered
during the early stages of a project, they may be analysed and integrated to the
design process in order to avoid future failure. This approach, known as “Privacy
by Design” (PbD) [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], is also a way to avoid the possible conflict between privacy
and eciency since it emphasizes a user-centric approach that naturally impacts
the usability of the designed strategy.
      </p>
      <p>
        In order to contribute to an e↵ort of much needed [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] consolidation in
egovernment, we studied the global strategy and information management model
regarding citizen-related data that is being deployed in Belgium. We looked at
what the key aspects are that guarantee its functionality and how it satisfies most
privacy protection measures while guaranteeing an increased eciency from a
user-centric point of view.
      </p>
      <p>The remainder of this paper is organised as follows. Section 2 discusses
di↵erent strategies regarding the management of citizen-related information. Section 3
describes the Belgian e-governance information management model. Finally,
Section 4 discusses the assessment of this model whilst Section 5 provides some
closing comments.</p>
    </sec>
    <sec id="sec-2">
      <title>2 Managing citizen-related information</title>
      <p>The core of e-governance lies in the management of large amounts of
sensitive citizen-related information. Managing this information constitutes the
backoce of administration. Furthermore, this information is related to many aspects
of the citizen’s life (e.g., identification, health, vehicle registration, etc.) and is
therefore extremely sensitive and critical privacy-wise. Risks associated to the
administration collecting this much data on citizens are multiple. First,
possessing this much information makes it possible for unauthorized public servants to
cross-check private information (e.g., checking the name associated to a plate
number and using this information to track the address of one individual). This
explains why a centralized information management model raises concerns: it
would simply make such an abuse of the data much easier.</p>
      <p>Decentralization o↵ers the possibility to make this cross-checking more
challenging for unauthorized users (provided that some precautions are taken as
explained in Section 3) but raises di↵erent concerns.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], the authors provide a comparison of various European countries
regarding their global e-government implementation strategy and more specifically
in the strategy regarding the back-oce. It shows that mainly two models are
possible: a model relying on the concept of authentic data source (such as the
model described in Section 3) and a model relying on the notion of digital vaults.
A digital vault is a secured data storage that is provided to every citizen to store
every relevant personal data. This model may be viewed as a centralized model
at the citizen level. In fact, it has been much criticized regarding the security
risks and privacy concerns that it raises [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        Finally, one risk that is often understated or disregarded in the field of
governance and public administration is the fact that its inherent complexity may
prevent adequate control and introduce errors. Basically, in a constantly
evolving world, the citizen gradually lose track of what information di↵erent public
services may posses about her or even if this information is correct [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], the
idea of a citizen-centric information portal is described as a solution to provide
“e↵ective, ecient and transparent electronic government services”. However,
such a portal inherits the problems of the back oce and must therefore be
implemented on the basis of a sound strategy and information management model.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3 Belgian e-governance information management model</title>
      <p>The Belgian e-governance strategy regarding information management relies on
a decentralisation across two dimensions. The first dimension relates to the
fragmentation of the back oce into di↵erent sectors of the pubic administration
(e.g., social security status, business information, car registration, etc.). The
back-oce of the Belgian e-government therefore constitutes a series of networks
dedicated to specific aspect of the citizen-related information.</p>
      <p>For each sector-specific network, the model is based on a decentralised
organisation of data consumers (i.e., public administrations) and data providers
(i.e., the so-called authentic data sources) as illustrated in Fig. 1.</p>
      <p>The concept of authentic data source is key to this architecture. An
authentic data source is a database managed by an administration. This
administration is appointed through a legal directive with the responsibility and
ownership of the type of data stored in the database. This administration
therefore manages all aspects (acquisition, storage, update, destruction, security) of
a specific type of information regarding the citizens. The legal prescription on
authentic sources also prevent any other public administration from gathering
this specific type of information.</p>
      <p>If another administration of the same sector-specific network needs access to
this specific type of data, it will do so through a data exchange platform
referred to as ‘crossroad banks’. Despite a misleading name, those crossroad banks
are not databases per se but actual hubs of data that allows the integration of
di↵erent authentic sources. They act as information brokers between consumers
and producers (authentic sources).</p>
      <p>Finally, citizens are associated with identification numbers that are
specific to the sector-specific network. These identification numbers allow the
crossroads banks to redirect the relevant information to the right data consumer.</p>
    </sec>
    <sec id="sec-4">
      <title>4 Assessment of the model</title>
      <p>In order to assess the model presented in Section 3, we compared it to an
approach based on digital vaults and took 2 quality aspects in consideration:
administrative eciency and compliance to privacy principles.</p>
      <p>
        Regarding administrative eciency , two sub-characteristics are to take into
account: the ease of use (citizen point of view) and the decrease of
administrative burden (administration point of view). Both may be considered as
onedimensional quality for which satisfaction and level of fulfilment are
proportional [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. From the citizen point of view, the model fulfils the usability as much
as a vault-centric approach. Indeed, the citizens are not forced to provide the
same information multiple times and their data is verified and reliable across the
sector-specific network. From the administration point of view, both approaches
o↵er a similar level of fulfilment in avoiding the multiplication of conflicting
data sources for a single piece of data. Vault-centric approaches and the
Belgian information model o↵er the same advantages regarding the administrative
eciency.
      </p>
      <p>Regarding compliance to privacy principles, the discussed model provides
clear advantages compared to vault-centric approaches. First, there exists no
central database that may be abused to gather every aspect of a citizen’s life.
Besides, the identification number associated to a citizen is unique to each
sectorspecific network and prevents cross-checking of information.</p>
      <p>Regarding the physical security of sensitive databases, the model relies on
the security of the authentic data sources but, due to the decentralisation, is
only as strong as its weakest link. The quality of the data infrastructure for the
authentic source must therefore be guaranteed.</p>
      <p>
        Mainly, the Belgian model shines in terms of protection from malicious uses
inside the administration itself. Although it does not result from the explicit
application of a ‘privacy by design’ approach, the model complies to similar
principles. The seven foundational principles of Privacy by Design are formulated
as follows [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]:
1. Proactive not Reactive; Preventative not Remedial
2. Privacy as the Default Setting
3. Privacy Embedded into Design
4. Full Functionality Positive-Sum, not Zero-Sum
5. End-to-End Security Lifecycle Protection
6. Visibility and Transparency
7. Respect for User Privacy
      </p>
      <p>The information management model implicitly complies to these principles.
Privacy has been embedded in the basic requirements and influenced the design
of the model, therefore making privacy protection the default setting of the
model (principles 1-3).</p>
      <p>There is no trade-o↵ regarding the usability (principles 4 and 7) and since
authentic data sources are the only one allowed to hold a given piece of
information, control over data lifecycle is guaranteed (principle 5).</p>
      <p>
        However, compared to vault-centric approaches, there is no possibility for the
citizen to view the sum of all information possessed by the public administration
(principle 6). As pointed in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], this is one risk that must be tackled in the future.
However, the decentralised nature of the model makes it extensible and makes it
theoretically possible to implement a citizen-centric portal that would interface
directly with the crossroad banks. Such portal would inherit from the privacy
advantages whilst improving and assuring further legal requisites such as the
right to information and transparency.
      </p>
    </sec>
    <sec id="sec-5">
      <title>5 Conclusion and future work</title>
      <p>We described how a decentralised information management model based on the
concept of authentic data sources is currently being implemented throughout the
Belgian public sector. This model o↵ers a number of advantages regarding the
achievement of an ecient administration and quality of public services similar
to other model relying on digital vaults.</p>
      <p>Additionally, this model provides a prime example of a design that integrates
by nature safety mechanisms regarding privacy-related concerns (i.e., a privacy
by design approach). It avoids centralising all available data about a citizen in
a single data source. The decentralised nature of the strategy o↵ers a significant
level of extensibility which in turn provides a way to implement systems that
take further legal rights into account (such as an audit trail).</p>
      <p>
        However, this model is still not formalised to become a structured and
repeatable methodology. Future e↵orts should focus on documentation and in depth
analysis process. Besides, our study is currently limited to the most hight level
aspects (that is the conceptual and strategic level) and privacy-related aspects
of the information management model. Future work will focus on the specifics
of the data architecture [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] underlying the information model so that actual
blueprints and recommendations may be drawn from this case study (while
investigating how privacy protection mechanisms may be enforced at lower level
of abstraction).
      </p>
      <p>Finally, the most promising opportunity this decentralised model o↵ers
certainly lies in the its potential to develop a citizen-centric information portal that
avoids centralisation. Investigating how individual may become data consumers
within the model is the next step towards a more ecient public
administration. In the future, technical constraints (regarding authentication, security, etc.)
should be analysed and documented while keeping this strong focus on privacy
as a default setting.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Ayed</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vanderose</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Habra</surname>
          </string-name>
          , N.:
          <article-title>Supported approach for agile methods adaptation: An adoption study</article-title>
          .
          <source>In: Proceedings of the 1st International Workshop on Rapid Continuous Software Engineering</source>
          . pp.
          <fpage>36</fpage>
          -
          <lpage>41</lpage>
          . ACM (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Belen</surname>
          </string-name>
          , V.:
          <article-title>Les tentatives de protection des donn´ees personnelles des individus: difficult´es de d´efinition et risques nouveaux</article-title>
          .
          <source>Market Management</source>
          <volume>5</volume>
          (
          <issue>2</issue>
          ),
          <fpage>65</fpage>
          -
          <lpage>80</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Benjamin</surname>
            ,
            <given-names>S.M.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Evaluating</surname>
          </string-name>
          e-rulemaking:
          <article-title>Public participation and political institutions</article-title>
          .
          <source>Duke Law Journal</source>
          pp.
          <fpage>893</fpage>
          -
          <lpage>941</lpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Cavoukian</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , et al.:
          <article-title>Privacy by design: The 7 foundational principles</article-title>
          .
          <source>Information and Privacy Commissioner of Ontario</source>
          , Canada (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Degrave</surname>
          </string-name>
          , E.: L'e
          <article-title>-gouvernement et la protection de la vie priv´ee</article-title>
          . L´egalit´e, transparence et contrˆole,
          <source>collection du CRIDS</source>
          , vol.
          <volume>36</volume>
          .
          <string-name>
            <surname>Larcier</surname>
          </string-name>
          ,
          <string-name>
            <surname>Bruxelles</surname>
          </string-name>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Inmon</surname>
            ,
            <given-names>W.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zachman</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Geiger</surname>
            ,
            <given-names>J.G.</given-names>
          </string-name>
          :
          <article-title>Data Stores, Data Warehousing and the Zachman Framework: Managing Enterprise Knowledge</article-title>
          .
          <string-name>
            <surname>McGraw-Hill</surname>
          </string-name>
          , Inc. (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Janssen</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rotthier</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>How are they doing elsewhere? trends and consolidations in e-government implementation</article-title>
          .
          <source>In: annual EGPA Conference</source>
          , Oeiras. (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Janssen</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zeef</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Vision and valuation of a citizen-centric shared information portal</article-title>
          .
          <source>BLED 2006</source>
          Proceedings p.
          <volume>38</volume>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Sauerwein</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bailom</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matzler</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hinterhuber</surname>
            ,
            <given-names>H.H.</given-names>
          </string-name>
          :
          <article-title>The kano model: How to delight your customers</article-title>
          .
          <source>In: International Working Seminar on Production Economics</source>
          . vol.
          <volume>1</volume>
          , pp.
          <fpage>313</fpage>
          -
          <lpage>327</lpage>
          (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Schaar</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Privacy by design</article-title>
          .
          <source>Identity in the Information Society</source>
          <volume>3</volume>
          (
          <issue>2</issue>
          ),
          <fpage>267</fpage>
          -
          <lpage>274</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Von Haldenwang</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Electronic government (e-government) and development</article-title>
          .
          <source>The European Journal of Development Research</source>
          <volume>16</volume>
          (
          <issue>2</issue>
          ),
          <fpage>417</fpage>
          -
          <lpage>432</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Wauters</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lorincz</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>User satisfaction and administrative simplification within the perspective of egovernment impact: Two faces of the same coin</article-title>
          .
          <source>European Journal of ePractice 4(2)</source>
          ,
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>