SlideShare a Scribd company logo
1 of 8
Download to read offline
INTERNATIONAL JOURNAL OF SOCIAL SCIENCES VOLUME 1 NUMBER 2 2007 ISSN 1306-973X




                UAE National ID Programme Case Study
                                                               Ali M. Al-Khouri


                                                                                 develop a modern identity management system with two
  Abstract—This article provides some insight into the                           strategic objectives addressing security and economical
implementation of the national ID programme in the United Arab                   requirements (see also Figures 1 and 2). The security
Emirates (UAE). The fundamental aim is to contribute to the                      objective evolves around the necessity of the government to
existing body of knowledge in the field, as it sheds light on some of
                                                                                 have an integrated population register that will become the
the lessons learned from the programme that is believed to widening
the knowledge horizons of those involved in such initiatives.                    central reference point for the whole government for the
                                                                                 purpose of population identification and service delivery. By
  Keywords—national id; identity management.                                     employing the necessary technologies, the project develops a
                                                                                 trusted and robust identity verification infrastructure to
                          I. INTRODUCTION                                        enhance homeland security and help the government in
                                                                                 protecting individuals against the ever increasing crime of
M       ANY countries around the world have either
        implemented, or are in the process of embarking on
national ID projects. The key motives behind such initiatives
                                                                                 identity theft.

is to improve the identification and authentication mechanisms
in order to reduce crime, combat terrorism, eliminate identity
theft, control immigration, stop benefit fraud, and provide
better service to both citizens and legal immigrants (see for
example: [1],[2],[3],[4]. In view of the fact that these projects
are unique undertakings and involve a degree of uncertainty
and risk, national ID programmes are perceived to carry a
high level risk and that more knowledge needs to be acquired
to understand the complexity of these types of endeavors. In                                           Fig. 1 project strategic goals
this regard, this article aims to present a case study of the
implementation of an ID card programme in the UAE, and to                           The second strategic goal of the project evolves around
highlight some of the lessons learned which, if considered, are                  supporting the government’s economy. One of the key
most likely to support the planning and execution of similar                     requirements in this goal is to support the country’s digital
initiatives.                                                                     economy by building a national e-authentication infrastructure
   This article is structured as follows. First, some primary                    which should become the basis and the backbone for e-
information about the programme, its strategic goals and                         government services and e-commerce initiatives.        Besides,
objectives are presented. The technologies employed and the                      having a centralised and integrated population register will
enrolment process are explained next. A short overview of                        assist in planning and utilising resources as it should provide
the enrolment strategy is provided and then the lessons                          timely, accurate, and statistical information for strategic
learned are presented which concludes the paper.                                 decision making and long term planning with respect to
                                                                                 education, healthcare, town planning, transport requirements,
                   II.   UAE ID CARD PROGRAMME
                                                                                 energy, etc. Another side of this objective aims to unify the
   As a result of the rapid growth of the economy as well as                     existing cards in the country such as driving license, labour
the population over the past few years in the United Arab                        card, health card, and other ‘entitlement’1 cards. This will
Emirates (UAE), the government has expressed strong                              also have a profound impact on the economies of scale in the
determination to enhance the performance of public                               management and production costs of such cards.
departments and increase efficiency, in a bid to improve the
co-ordination of and the citizen’s access to public services.
The project which was kicked off in June 2003, aimed to

                                                                                     1
   Manuscript received March 27, 2007..                                                There are two main types of identity documents used in many countries.
   Ali M. Al-Khouri is with Emirates Identity Authorit, Abu Dhabi, United        The first are often referred to as “foundation” documents, and they include
Arab Emirates (phone: +97150-613-7020; fax: +9712-404-6661; e-mail:              birth certificates and immigration records. These primary documents are used
alkhouri@ emiratesid.ae).                                                        to obtain documents of the second type, “entitlement” documents, such as
                                                                                 passports, drivers’ licences and other government issued documents.




       IJSS VOLUME 1 NUMBER 2 2007 ISSN 1306-973X                           62                                                © 2007 WASET.ORG
INTERNATIONAL JOURNAL OF SOCIAL SCIENCES VOLUME 1 NUMBER 2 2007 ISSN 1306-973X




                       enhance homeland security
                                                            central & integrated population                deaths, as well as the updation of variable (constantly
                                                            database
                                                                                                           changing) information such as address, education, employer,
                                                            government trusted identity                    etc. The National ID system also stores images of the official
  Security




                        minimise identity theft
                                                            verification infrastructure

                                                            provide identity verification services
                                                                                                           support documents presented during the application for an ID
                improve access/delivery of public service   to other ministeries, banks, hospitals,        card or on events declaration on the Population Register.
                                                            etc.

                                                            unification of existing cards and reduce
                                                                                                              B. ID Card Production
                            one card multi-uses             management & production cost (e.g., dls’,
                                                            labour, health)                                   The National ID system includes a process for the
  Economical




                                                            timely, accurate statistical info. for         enrolment, processing, production and delivery of ID cards.
                   support strategic decision making        planning e.g., education, healthcare,
                                                            energy, etc. )                                 This process is adapted for the first application for an ID card
                     support e-Gov and e-Commerce           national e-authentication                      including the renewal of an expired ID card or the
                                                            infrastructure
                                                                                                           replacement of a damaged, lost or stolen ID card. The ID card
                                                                                                           produced by the national ID system includes biometric
                         Fig. 2 security and economic objectives
                                                                                                           fingerprint-based authentication capabilities and uses a public
                                                                                                           key infrastructure (PKI) that is adapted for future e-
      III. KEY OPERATIONS OF THE NATIONAL ID SYSTEM
                                                                                                           government and e-commerce usage.
   The national ID system incorporates the latest technological
advances. It is designed based on a 4-tier web-based                                                          C. 3 Biometric Services
architecture and complies with the latest industry standards                                                  The national ID system provides a complete range of
such as ICAO for card design, x.509 for PKI, and ISO 17799                                                 biometric functions using fingerprints and palm prints. The
for IS security policy. The system guarantees secured                                                      system encompasses an Automatic Fingerprint and Palm Print
communication throughout the system’s national network                                                     Identification System that provides person identification,
structure by using Virtual Private Network (VPN) technology                                                authentication, crime solving and crime linking services.
and an associated technical Public Key Infrastructure (PKI).                                               These services are used to guarantee the applicant’s identity
The fingerprint-based biometry provides the means to ensure a                                              using the ID card and to ensure that a person is issued with
single identity for each applicant and to authenticate the                                                 one and only one ID card. The full set of biometric services is
identity of the ID card bearer. In principle, the national ID                                              also used for law enforcement purposes.
system is designed to provide three primary operations as
depicted in Figure 3.                                                                                                              IV. ID CARD
                                                                                                              The ID card is identical for both UAE citizens and residents
                              Population Register & Document Imaging                                       in terms of card design and displayed data. The card validity
                                           Management
                                                                                                           period is set for 5 years for citizens, and is linked to the
                                                                                                           residency permit validity for residents. The ID card includes a
                                                                                                           digital certificate with PKI capabilities.        This feature
                                                                                                           constitutes one of the basis for future online identification,
                                                                                                           authentication and transactions to support e-government and
                                                                                                           e-commerce.


                                                                                                                                                         Overt:
                                                                                                                chip data
                                                                                                                                                         •    Guilloches & Rainbow
                                                                                                                digitally
                                                                                                                signed &                                 •    Ghost image
                ID Card                                                        Biometric                        encrypted                                •    Holographic overlay
               Production                                                      Services                                                                  •    Variable fine lines
                                                                                                                                                         •    Special Raster
                                                                                                                                                         •    UV ink
                                                                                                                                                         •    Rainbow printing

                                                                                                                                                         Covert:

                                                                                                                                                         • Micro text
                                                                                                                                                         • Hidden text
                 Fig. 3 primary operations of the national id system                                                                                     • UV


   A. Population Register and Document Imaging
Management (PRDI)
   The National ID system maintains the Population Register                                                                 Fig. 4 UAE id security features
that records information about every UAE citizen and legal
resident registered on the system and assigns a unique                                                        As depicted in Figure 4, it contains many security features
Identification Number (IDN) to each person. The system is                                                  which will make it very difficult if not impossible to forge the
currently sized to manage five million records. It provides the                                            card and will allow in most cases a trained card acceptor to
means to record events such as births, marriages, divorces and                                             identify a faked ID card even on face value. The digital




               IJSS VOLUME 1 NUMBER 2 2007 ISSN 1306-973X                                             63                                          © 2007 WASET.ORG
INTERNATIONAL JOURNAL OF SOCIAL SCIENCES VOLUME 1 NUMBER 2 2007 ISSN 1306-973X




security on the ID card chip in terms of the used signature and                                                                                                                   VI. ENROLMENT PROCESS
encryption features is accorded to the highest international                                                                                  Taking into consideration the criticality and importance of
security levels. In terms of the IT security in the contact chip,                                                                          the enrolment process as the new national ID card will
the UAE ID card follows the highest electronic standards,                                                                                  become the source document to prove an individual’s identity,
based on the use of asymmetric encryption and digital                                                                                      a robust registration process was put in place to ensure
signature.                                                                                                                                 comprehensive identity verification prior to the issuance of the
                                                                                                                                           ID card (see also Figure 6).
         V. IMPLEMENTATION STAGES AND THE ENROLMENT
                         STRATEGY
                                                                                                                                                                                         • checking government issued credentials
                                                                                                                                                                      VERIFICATION
                                                                                                                                                                                           e.g., passports and visas




                                                                                                                                              ID Registration-Cycle
                                                              Mass Enrolment Phase                                                                                                       • online verification of presented documents

 June/2005                  1/1/2006                     June / 2007                                June / 2009
                                                                                                                                                                      ENROLMENT          • capture photo, signature, biometrics,
                                                                                                                                                                                           scan docs.
                                                                        Citizens Enrolment
       Pilot Enrolment              Interim Enrolment
             (System Testing)
                                                                       complete the enrolment of
                                                                  all citizens (1 million) by mid 2009                   Dec / 2010                                                      • background checks, e.g., biometrics,
                                                                                                                                                                        BACKEND
                                                                       Jan / 2008                                                                                        CHECKS            watch lists…
                 Registration            Registration
             limited to Military,      limited to gov.
                                                                                    Residents Enrolment
                Interior, and           organisations
                    Police             staff and their                               complete the enrolment of
                                           families                           all Residents (4 million) by end of 2010
                                                                                                                                                                         CARD
                                                                                                                                                                       ISSUANCE
                                                                                                                                                                                         • production of the national ID card

                                              Fig. 5 enrolment plan

   The system was implemented mainly in three phases (see                                                                                                               Fig. 6 registration and card issuance process
also Figure 5):
                                                                                                                                              Applicants are supposed to come to any of the available
                                                                                                                                           registration centres with the supporting documents
   A. Pilot Enrolment:                                                                                                                     (application form2, passport and family book for citizens).
   The first live enrolment began in June 2005 as a pilot phase                                                                            The applicant goes through a three staged (12 to 17 min)
in an attempt to test the system and its capabilities. This was                                                                            process at those centres. In the first office, the particulars
considered to be a good starting point since many technical                                                                                completed on the application is scanned into the system
and business process related issues were identified that needed                                                                            through the 2D barcode on the form and verified against the
the system to cater for. The enrolment was stopped for more                                                                                immigration system of the Ministry of Interior online. The
than two months to upgrade the software of the overall system                                                                              applicant then moves to another station where his/her photo is
to reflect the new identified requirements.                                                                                                captured, a signature acquired using an electronic pad (which
                                                                                                                                           is then digitised into the system), and some supporting
   B. Interim Enrolment:
                                                                                                                                           documents are scanned in. He then goes through the last
   Although the system was ready for the mass enrolment                                                                                    station where his/her 10-fingerprints are captured (slaps,
phase towards the end of 2005, the enrolment was limited to                                                                                rolled, palm and writers’ palm). The applicant is then given a
the registration of staff of government organisations where                                                                                receipt indicating the date he/she must return to collect his/her
registration centres were available, due to the incompleteness                                                                             card or that it will be sent to him/her through a registered
of the construction projects of the majority of the registration                                                                           courier. The choice of card delivery is left to the applicant.
centres across the country.                                                                                                                Before the card is printed, there are other processes that run at
   C. Mass Enrolment Phase:                                                                                                                the backend for further investigation. A biometric check is
                                                                                                                                           performed against civil and forensic fingerprint databases to
   The registration in this phase was linked to the obtainment
                                                                                                                                           ensure that the person has not been registered in the system
of certain services from the government sector such as the
                                                                                                                                           previously, and is not wanted by the police authorities. In
renewal of vehicles and passports for citizens, and the renewal
                                                                                                                                           normal cases, cards are printed and distributed within 48
and issuance of residency permits for residents. With a 3 year
                                                                                                                                           hours.
enrolment strategy, the project aims to register the whole
population of the country by end 2010. The registration
                                                                                                                                                                                     VII. LESSON LEARNED
process of those new births and new residents is planned to
take place directly through the Ministry of Health and                                                                                       This section provides a review of the current business
Ministry of Interior who will interface with the national ID                                                                               operations in the UAE national ID card programme and
database that will initiate automatic requests such as first ID                                                                            presents some of the identified process improvement areas.
card application, card issuance, ID card renewal and                                                                                       The proposed changes are seen as key factors to increase
replacement, and population register events declarations such                                                                              public acceptance and project success chances.
as marriage, divorce, birth, etc.
                                                                                                                                             2
                                                                                                                                                     The application form is also available for download from the Internet.




               IJSS VOLUME 1 NUMBER 2 2007 ISSN 1306-973X                                                                             64                                                                  © 2007 WASET.ORG
INTERNATIONAL JOURNAL OF SOCIAL SCIENCES VOLUME 1 NUMBER 2 2007 ISSN 1306-973X




  A. Registration Process                                                required was to achieve the objective of producing statistics
                         Business Process                                about the population of the country. The review process
                                                                         indicated that there was a vision mix-up between the two
                                                                         requirements of building a statistical database and the other
                  Current                Target?                         objective of enrolling the whole population of the UAE and
                                         5 minutes
                                                                         producing ID cards for them. This was a clear confusion
                 12-17 minutes
                                                                         among many members and stakeholders of the project to aim
                                                                         to achieve these two objectives at the same time.
  It was a concern from the early days of the project that the
enrolment process involved many activities that required the
project members to radically review and improve. The review
                                                                            The recommendation from the review exercise was that the
exercise revealed that the average enrolment process could be
                                                                         implementation of the project must take place in three stages
completed in less than 5 minutes rather than the current 17
                                                                         as depicted in Figure 7. In the first stage, the project must
minutes without any big impact on the project objectives if
                                                                         attempt to (a) enrol the population for the new ID card with a
only two enrolment activities were re-engineered: (1) the
                                                                         minimal set of data as depicted in Figure 8 below. As only
registration form and (2) the biometrics captured.
                                                                         primary identification data will be required for first time
1) Registration Form                                                     enrolees, the application form was suggested to be eliminated
                                                                         and rather make use of the existing electronic link with the
   The registration form throughout the project life cycle went          Ministry of Interior’s database to obtain and verify data.
through many iterations in an attempt to reduce the amount of
data needed for the enrolment. It started with an 8-page                    Then stage two and three must run in parallel. In stage two,
document, and was reduced to 6, and then to 4 pages. The                 efforts must be directed towards promoting (and enforcing)
form which was a pre-requisite to initiate the registration              the presentation of the new ID card for identity verification
process was viewed as:                                                   and as a pre-requisite to most often visited government
           •    too lengthy                                              services by the population. Those organisations then need to
           •    required considerable time to fill                       maintain the new ID numbers in their databases, which should
           •    some information was not readily available               be used when moving to stage three of the strategy which
           •    was sometimes filled incorrectly                         requires the national ID database to interface and integrate
           •    large number of resident applicants are                  with such databases. Provided the link is in place, a proper
                illiterate                                               data warehouse can be built that is up-to-date and more
                                                                         reliable for generating statistical reporting purposes as it will
           •    considered to be the enrolment’s bottle neck
                                                                         obtain information from primary and trusted sources.
  The reason for its design and the large number of data


                             Stage I                        Stage II                         Stage III
                                                                                              Interface/
                                                           Promote the
                           Short Form/                                                         Integrate
                                                            use of the
                            No Form                                                              with
                                                               Card
                                                                                              organisation


                                                                                        Interfacing and Integration
                      Issue/Produce ID                  Promote (enforce) the           with:
                      cards to citizens and             presentation of ID
                                                                                              • Ministry of Labour (MoL)
                      residents and                     card as a means for
                                                                                              • Ministry of Justice (MoJ)
                      minimise potential                identity verification
                                                                                              • Ministry of Interior (MoI)
                      noise from public.                and pre-requisite to
                                                                                              • Ministry of Education (MoE)
                                                        benefit/access to a                   • Ministry of Higher Ed (MoEd)
                                                        government services.                  • Ministry of Health (MoH)




                                                                             data warehouse


                                                     Fig. 7 project implementation stages




      IJSS VOLUME 1 NUMBER 2 2007 ISSN 1306-973X                    65                                             © 2007 WASET.ORG
INTERNATIONAL JOURNAL OF SOCIAL SCIENCES VOLUME 1 NUMBER 2 2007 ISSN 1306-973X




            Name (Segmented)                     Name                                    identity hits or if the real hit constantly appears very low on
Names       Gender, DoB, Marital St.             Gender, DoB, Martial St.
                                                                                         this long hit list. While it can be argued that the hit list can be
            Nationality                          Nationality                             shortened by tuning the applicable threshold, it will then mean
Passport
            Passport No, Place of issue,         Passport No, Place of issue,            that real hits that appear low on the hit list will not be
            Issue and Expiry dates               Issue and Expiry dates
                                                                                         identified if the systems performance is not improved. There
            Unified No                           Unified No, Sponsor Name
            Family ID, Book No                   Residency File No, Issue and
                                                                                         is obviously a very close relationship between the quality of
                                                 Expiry dates                            fingerprints taken and the performance of the system. It was
Address
                                                                                         however realised that the introduction of a second biometric
            Emirate                              Emirate
            City                                 City
                                                                                         will complement the fingerprint biometric and will basically
            Mobile phone                         Mobile phone                            balance any shortcoming.

     Fig. 8 primary identification data captured for first enrolment                        The re-engineering of the above two enrolment processes
                                                                                         provided a saving in the office space, equipment and staff
2) Biometrics captured                                                                   required for enrolment as the original enrolment process was
   The enrolment process required the capturing of all                                   divided into three stages as depicted in Figure 9. The reason
fingerprints (i.e., slaps, rolled prints, palm, writer’s palms) a                        for the three office design was mainly to segregate duties, and
process taking around 6 to 10 minutes to complete. On the                                manage the daily in-flow of applicants and shorten the waiting
system level, only rolled fingerprints were used for                                     time.
identification, where slaps and palms were stored for criminal
search by the Ministry of Interior.                 The review
recommendation suggested to only capture the flat prints and
use smaller acquisition devices (just the slaps and the two
thumbs), and to capture other fingerprints at a later stage only
if needed. It was recommended that a second biometric must
be introduced to complement the fingerprint biometric and
enhance the FTE3, FAR4, FRR5 rates. The second biometric                                     Civil File                  Civil                       Civil
was recommended to be more of a real time application that                                   Verification                Registration                Booking

could be used in mass population areas such as airports. Both                                • read form                • scan doc’s                 • fingerprints
                                                                                             • verify against           • photo
biometrics were seen as easy to operate and will cut                                           immigration DB           • signature
processing time to less than 2 minutes.
                                                                                                                 Fig. 9 registration procedures
    3) Biometrics quality
   Shortly after the introduction of the pilot phase of the
                                                                                           It was therefore recommended to enhance the system to
programme it became abundantly clear that the quality of
                                                                                         perform the enrolment process through a single workstation.
fingerprints taken by operators will have a determining effect
                                                                                         This was viewed to radically support the enrolment strategy,
on the classification, identification, and authentication of
                                                                                         in which smaller devices can be used to carry out the
applicants. Apart from possible shortcoming in the operating
                                                                                         registration, and enhance the portability of the system for
system itself the percentages of failure to enroll (FTE), false
                                                                                         wider deployment in areas such as setting up permanent and
rejection rate (FRR), and false acceptance rate (FAR) may
                                                                                         temporary registration offices in traffic departments,
increase dramatically if operators are not properly trained in
                                                                                         immigration, municipalities, schools, companies with a large
the art of taking fingerprints. Failure to enroll due to operator
                                                                                         number of staff members, etc.
failure may for example result in false demographic
information. The lesson learnt therefore was that a very high
premise should be placed on a comprehensive operator                                       B. Scope Creep
training programme. It was also realised that results of                                   Scope creep is a term used to describe the process by which
biometric hits should be closely monitored to determine the                              users discover and introduce new requirements that are not
performance of the system in terms of the quality of these                               part of the initial planning and scope of the project. As widely
results.     A clear indication of unacceptable system                                   quoted in the literature, many doubt a limited and specified
performance would be if a too long hit list is required to                               scope for national ID programmes, as the nature and high cost
                                                                                         of such projects are likely to yield and encourage the
3
    Failure to Enroll: when the system fails to enroll an applicant largely due          expansion of its functions [5],[6],[7],[8].         The project
    the poor quality of the biometrics being captured.
4                                                                                        management literature also indicates that coping with changes
    False Acceptance Rate(also referred to as False Match Rate): is an incorrect
    identification or failure to reject an imposter (Imposter: is a person trying        and changing priorities are the most important single problem
    to submit a biometric in either an intentional or inadvertent attempt to pass
    him/herself off as another person who is an enrollee).
                                                                                         5
                                                                                              False Reject Rate (also referred to as False Non-Match Rate): is the failure
                                                                                              to identify or verify a person.




           IJSS VOLUME 1 NUMBER 2 2007 ISSN 1306-973X                               66                                                    © 2007 WASET.ORG
INTERNATIONAL JOURNAL OF SOCIAL SCIENCES VOLUME 1 NUMBER 2 2007 ISSN 1306-973X




facing the project management function [9],[10],[11]. Indeed,                                            Indeed, a multi-purpose card was one of the objectives of
changing targets all the time, would obviously take any                                               the project, but not in the way it was comprehended. The
project nowhere.                                                                                      Multi-purpose term stated in the objectives was used to
                                                                                                      explain that the card can replace other identity documents
                                          Time                                                        when it comes to the verification of identities. Since the card
                                                                                                      was obligatory to the total population of the UAE, the
                                                                                                      provision was that the new ID card can replace such cards if
                                                                                                      the other entities use the new ID number in their databases as
                                                                                                      a primary number to retrieve individual records.

                                                                                                         The management of scope in the UAE ID card was clearly
               Budget                                                Scope
                                                                                                      one of the biggest challenges that required the project core
                                                                                                      team to spend a lot of time and effort to clarify the feasibility
                                                                                                      of such actions to the upper management. Finding the right
   In the UAE ID programme, project performance was                                                   communication approach was key to managing scope creep.
monitored and measured regularly to identify variances from
the project plan. It was supported with a formal and well-                                               C. Too Much Security
defined process to control and manage the changes being                                                  It was during this evaluation phase of the project (discussed
requested to the project scope and objectives during the                                              next) as well as the experience gained after the introduction of
project lifecycle. See for example Figure 10 that depicts an                                          the pilot phase that it was realised that far too much emphasis
example of one of the change control policies.                                                        were placed on security issues which rendered the operating
                                                                                                      system a closed system which required costly and extreme
                                                Type of Change                                        efforts to affect even simple changes. Needless to say that
                   Technical nature   Technical nature    Contract Scope     Contract scope
                                                                                                      required changes to the system became a very cumbersome
                     (No financial     (With financial     (No financial       (Financial
                       impact)            impact)            impact)            Impact)               task with unacceptable cost and time frames associated with
    Steering                            Analyse and                            Analyse and
                                                                                                      each change. This resulted in a strained relationship with the
                   Accept or Reject                       Accept or Reject
   Committee                            Recommend                              Recommend
                                                                                                      vendor as these delays were perceived by the client as to
                                          Reject or                             Reject or
 Change Control
                                       Recommend to                          Recommend to             reflecting on a possible inability or lack of co-operation from
     Board
                                       Project Sponsor                       Project Sponsor
                                                                                                      the vendor. It was later on realised that the system security,
 Project Sponsor                      Approve or Reject                      Approve or Reject        security during the enrolment process and security around
                                                                                                      information included in the card itself should not be of such
                       Fig. 10 change control authorities                                             extent that it places a stranglehold on the flexibility to change
                                                                                                      and the user friendliness of the system. While security
   Despite all the efforts put into managing and controlling                                          features built into the card body could be as inclusive as is
change, the changes introduced and processed dragged the                                              required, the personal information of the applicant stored in
project schedule far away from the original target date. It was                                       the security portion of the card should be protected but should
common during the different implementation stages of the                                              be freely available to authorised users.
programme to change the scope to either add new or change
agreed functions, which obviously had severe impact on the                                               D. Evaluation Framework
implementation project plan and budget. Examples of such                                                 Since the UAE national ID system was provisioned to
changes included the shifting from centralised card printing to                                       become the most critical system in the country as the main
decentralised, upgrading the card technology, changing card                                           central hub for population identity cross checking and service
design and displayed data, upgrading database technology,                                             eligibility (i.e., online with 24/7 availability requirement), it
etc.                                                                                                  was important that the overall system goes under a thorough
                                                                                                      quality evaluation. As widely quoted in literature that one of
   Another example of such changes to project scope was                                               the principle causes of information system failure is when the
related to the perception of the multi-purpose functionality.                                         designed system fails to capture the business requirements or
Several attempts were made from certain key stakeholders of                                           improve the organisational performance (see for example:
the project to expand the card applications during the                                                [12],[13],[14],[15],[16]. Figure 11 shows an example of how a
execution phase that had severe impact on the project                                                 user's requirements might be interpreted during the lifecycle
progress. It took some time for them to realise the importance                                        of a project which is not really far from being true in many of
of limiting the purpose of the card as an identity document in                                        the IS projects implemented around the world.
the first phase of the project and that efforts must rather be
concentrated on the enrolment of the population and the                                                  During the UAE progamme implementation there was no
issuance of the new ID card.                                                                          clear communication of the development standard followed by
                                                                                                      the vendor, which created confusion among the project team




         IJSS VOLUME 1 NUMBER 2 2007 ISSN 1306-973X                                              67                                         © 2007 WASET.ORG
INTERNATIONAL JOURNAL OF SOCIAL SCIENCES VOLUME 1 NUMBER 2 2007 ISSN 1306-973X




members when it came to individual deliverable acceptance,                          vendor to address prior to the final acceptance and handover
as well as the final acceptance of the system. In general, the                      of the system. Besides, the use of quality framework provided
project team, with the workload and responsibilities put on                         a very useful and supportive methodological approach for
them, seemed to be overloaded and to have scattered visions                         going about software quality assessment. It acted as a
of how things should be done and achieved. Everybody                                comprehensive analytical tool and provided a more thorough
wanted the project to be concluded as quickly as possible and                       view of the system’s strengths and weaknesses. It addressed a
was seemingly very impressed with the work produced by the                          wide range of quality characteristics of the software products
vendor.                                                                             and processes enabling better description of software quality
                                                                                    aspects and its importance. Arguably, if used as a guide in an
                                                                                    early stage of the project it could have provided a sound basis
                                                                                    for informed and rational decision making which could have
                                                                                    contributed significantly to the delivery of a system which is
                                                                                    properly addressing user requirements.

                                                                                                          VIII. CONCLUSION
                                                                                       Not much has been written about National ID systems
                                                                                    implementation from a practitioners’ point of view. The
                                                                                    literature was found to be full of articles from the private
                                                                                    industry discussing advanced technologies and what can be
                                                                                    achieved through them. This article adds to the current body
                                                                                    of knowledge in the field, and is believed to assist in widening
                                                                                    the thinking circle of those who are wearing similar hats. As
                                                                                    indicated in this paper, much could indeed be achieved
                                                            Source: [13]            through national ID programmes. However, agreed vision
 Fig. 11 An example of varying interpretations of user requirements                 and thereafter proper planning is essential to succeed with




                                                                  ISO/IEC 9126



                Functionality          Reliability             Usability                 Efficiency       Maintainability       Portability




                 Suitability           Maturity               Understand               Time behaviour      Analysability       Adaptability
                 Accuracy           Fault tolerance              ability                                   Changeability       Installability
              Interoperability      Recoverability            Learnability               Resource            Stability        Co-existence
                  Security                                    Operability                utilisation        Testability       Replaceability
                                                             Attractiveness

                Functionality          Reliability             Usability                 Efficiency       Maintainability       Portability
                 compliance           Compliance              Compliance                Compliance         Compliance          Compliance



               Are the required     How reliable is the      Is the software           How efficient is    How easy is to      How easy is to
              functions available      software?              easy to use?              the software?       modify the          transfer the
               in the software?                                                                              software?          software to
                                                                                                                                  another
                                                                                                                               environment?



                                                          Fig. 12 ISO-IEC 9126 quality model


                                                                                    such projects. It took quite some time before the team started
   At the very late stages of the project, the core project team                    to agree on the fact that the first phase of the project should
employed ISO 9126 standard for the purposes of software                             focus on the enrolment of the whole population and the
quality and the overall system architecture evaluation (see also                    issuance of the new ID card.
Figure 12). The evaluation study contributed significantly in                          National ID programmes and because of their nature, are
identifying many of the system deficiencies that required the                       perceived to invest quite significantly in technology upgrade




       IJSS VOLUME 1 NUMBER 2 2007 ISSN 1306-973X                              68                                           © 2007 WASET.ORG
INTERNATIONAL JOURNAL OF SOCIAL SCIENCES VOLUME 1 NUMBER 2 2007 ISSN 1306-973X




and R&D departments for future developments in areas                                [11] R.G. Reiss & F.N. Spon, “Project Management Demystified: Tools and
                                                                                         Techniques, ” New York: McGraw Hill, 1995.
related to identity management and to keep up with the ID                           [12] D.E. Avison & A.T. Wood-Harper, “MultiView - an exploration in
industry developments and standards. It was learned that new                             information systems development. ” USA: McGraw Hill, 1990.
functionalities and upgrades must be thoroughly studied and                         [13] P. Bocij, D. Chaffey, A. Greasley, & S. Hickie, “Business Information
                                                                                         Systems: Technology, Development and Management for the e-
researched to eliminate unnecessary changes during the
                                                                                         business,” 2nd ed. New York: Prentice Hall, 2003.
execution phase.                                                                    [14] W. Crain, “Theories of Development: Concepts and applications,” 3rd
                                                                                         ed. New Jersey: Prentice Hall International, 1992.
   As it is becoming the trend, such programmes need to put                         [15] G. Curtis, “Business Information Systems: Analysis, Design, and
                                                                                         Practice,” 3rd edition, USA: Addison-Wesley, 1998.
much effort in promoting e-identity and e-verification services                     [16] M. Harry, “Information Systems in Business,” 2nd ed. Great Britain:
using the new ID card. It would be interesting to measure the                            British Library Cataloguing in Publication Data, 1997.
impact of national ID programmes on the overall government
economy, as it would obviously promote electronic                                      About the Author
transactions and would also encourage government
organisations to streamline their operations and make use of                                                             Al-Khouri is currently holding the
                                                                                                                         position of the Assistant Director-
the secure (e)verification infrastructure that it will provide.                                                          General for Central Operations; a sector
   A. Further Research                                                                                                   that consists of IT department, card
                                                                                                                         production, research and development,
   Further research and practical work in this field may further                                                         and many other operational units. He
contribute to the body of knowledge. Areas in which further                                                              also chairs the technical committee
research may yield valuable insights and better understanding                                                            overseeing the national ID card
                                                                                                                         programme in the UAE. He received
are:                                                                                                                     his Bachelor’s and Master’s degrees in
    1) similar studies of national ID implementations that                                                               Business IT Management with honours
    could show the appropriateness of the items presented in                                                             and distinction from Manchester and
    the lessons learned, and the degree to which it can support                                                          Lancaster Universities in the UK, and
    similar initiatives,                                                                                                 currently doing his doctorate degree in
                                                                                                                         the field of engineering management
    2) an investigation of the suitability of quality models in                                                          and advanced technologies.
    national ID programmes and projects of such nature and its
    impact on the project success rate.                                                He has been involved in the UAE national ID card project since early 2003
                                                                                    as a member of the technical executive steering committee, and was later
                         ACKNOWLEDGEMENT                                            appointed as the Director for the department of Information Technology and
                                                                                    Systems when Emirates ID was established. He started his career as an IT
   The author would like to thank Mr. Gawie von Wielligh for                        project manager and then the head of the development division in the Ministry
his review feedback that improved the overall structure and                         of Interior during which he managed several important IT projects and was
quality of this paper.                                                              involved in many strategic government development projects. His research
                                                                                    interests include management of large scale projects, and the applications of
                                                                                    advanced technologies in large contexts. e-mail: alkhouri@emiratesid.ae

                              REFERENCES
[1]  L. Goldman, “Chips with everything,” Occupational Health, vol.56, no.
     4, pp.12-3, April 2004.
[2] H. Knight, “Anti-Fraud: The road to a national ID card is paved with
     pitfalls,” The Engineer, London, p. 25, December 2003.
[3] W. Matthews, “ID card plan assailed,” Federal Computer Week, vol. 16,
     no. 4, p.16, February 2002.
[4] H. Michael, “Identity cards: Why bother,” The Economist, London, vol.
     335, no. 7916, p. 50, May 1995.
[5] R.A. Clarke, “The Resistible Rise of the National Personal Data
     System,” Software Low Journal, vol. 5, no.1, pp.33-36, 1992.
[6] R.A. Clarke, “Human Identification in Information Systems:
     Management Challenges and Public Policy Issues” [Online]. Australia,
     The      Australian    National    University,   1994        Available:
     http://www.anu.edu.au/people/Roger.Clarke/DV/HumanID.html#PPI
     [Accessed 15 09 2006].
[7] J. Fontana, “A national Identity Card for Canada” [Online]. Canada,
     House of Commons, 2003. Available from: http://www.parl.gc.ca
     [Accessed 02 08 2006].
[8] A.M. Froomkin, “The Uneasy Case for National ID Cards as a Means to
     Enhance Privacy” [Online]. USA, University of Miami School of Law,
     2002. Available: http://www.la-w.tm [Accessed 02 10 2006].
[9] G.R. Heerkens, “Project management: 24 lessons to help you master any
     project”. New York: McGraw-Hill, 2005.
[10] J.R. Meredith, & S.J. Mantel, “Project management: a managerial
     approach,” 2nd ed. New York, NY: John Wiley & Sons, Inc, 2003.




        IJSS VOLUME 1 NUMBER 2 2007 ISSN 1306-973X                             69                                                © 2007 WASET.ORG

More Related Content

Viewers also liked

Electronic Payments: Building the Case for a National Initiative (54)
Electronic Payments: Building the Case for a National Initiative (54)Electronic Payments: Building the Case for a National Initiative (54)
Electronic Payments: Building the Case for a National Initiative (54)Arab Federation for Digital Economy
 
Global e-Government: What needs to be Learned? A Reflection on UN e-Governmen...
Global e-Government: What needs to be Learned? A Reflection on UN e-Governmen...Global e-Government: What needs to be Learned? A Reflection on UN e-Governmen...
Global e-Government: What needs to be Learned? A Reflection on UN e-Governmen...Arab Federation for Digital Economy
 
الخدمة الوطنية والاحتياطية بين الرؤية الاستراتيجية والتطبيق
الخدمة الوطنية والاحتياطية بين الرؤية الاستراتيجية والتطبيقالخدمة الوطنية والاحتياطية بين الرؤية الاستراتيجية والتطبيق
الخدمة الوطنية والاحتياطية بين الرؤية الاستراتيجية والتطبيقArab Federation for Digital Economy
 

Viewers also liked (7)

The Role of Information and Communication Technologies (57)
The Role of Information and Communication Technologies (57)The Role of Information and Communication Technologies (57)
The Role of Information and Communication Technologies (57)
 
Cards and payments keynote
Cards and payments keynoteCards and payments keynote
Cards and payments keynote
 
Electronic Payments: Building the Case for a National Initiative (54)
Electronic Payments: Building the Case for a National Initiative (54)Electronic Payments: Building the Case for a National Initiative (54)
Electronic Payments: Building the Case for a National Initiative (54)
 
Global e-Government: What needs to be Learned? A Reflection on UN e-Governmen...
Global e-Government: What needs to be Learned? A Reflection on UN e-Governmen...Global e-Government: What needs to be Learned? A Reflection on UN e-Governmen...
Global e-Government: What needs to be Learned? A Reflection on UN e-Governmen...
 
Forest resourse
Forest resourseForest resourse
Forest resourse
 
الخدمة الوطنية والاحتياطية بين الرؤية الاستراتيجية والتطبيق
الخدمة الوطنية والاحتياطية بين الرؤية الاستراتيجية والتطبيقالخدمة الوطنية والاحتياطية بين الرؤية الاستراتيجية والتطبيق
الخدمة الوطنية والاحتياطية بين الرؤية الاستراتيجية والتطبيق
 
Fusing Knowledge Management into Public Sector (Book Format)
Fusing Knowledge Management into Public Sector (Book Format)Fusing Knowledge Management into Public Sector (Book Format)
Fusing Knowledge Management into Public Sector (Book Format)
 

Similar to UAE National ID Case Study

Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Dr Lendy Spires
 
AWS Institute | Digital Identity: The Opportunity for Government
AWS Institute | Digital Identity: The Opportunity for GovernmentAWS Institute | Digital Identity: The Opportunity for Government
AWS Institute | Digital Identity: The Opportunity for GovernmentFairTechInstitute
 
How to Implement Computerized id cards in Afghanistan?
How to Implement Computerized id cards in Afghanistan?How to Implement Computerized id cards in Afghanistan?
How to Implement Computerized id cards in Afghanistan?Roohul Amin
 
Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, ...
Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, ...Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, ...
Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, ...Arab Federation for Digital Economy
 
Wef big databigimpact_briefing_2012
Wef big databigimpact_briefing_2012Wef big databigimpact_briefing_2012
Wef big databigimpact_briefing_2012Shyam Sarkar
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Ravinder (Ravi) Singh
 
141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublishedAlain Ducass
 
Cyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging TrendsCyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging Trendsijtsrd
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaLizbethQuinonez813
 
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in NigeriaCyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeriaijtsrd
 
Biometric Security Poses Huge Privacy Risks in Kenya
Biometric Security Poses Huge Privacy Risks in KenyaBiometric Security Poses Huge Privacy Risks in Kenya
Biometric Security Poses Huge Privacy Risks in KenyaPauline Wamere
 
e-Government: Thoughts on Leveraging Technology for Organisational Excellence...
e-Government: Thoughts on Leveraging Technology for Organisational Excellence...e-Government: Thoughts on Leveraging Technology for Organisational Excellence...
e-Government: Thoughts on Leveraging Technology for Organisational Excellence...Chinenye Mba-Uzoukwu
 
E Bryan - An Analysis Of Content And Information Management As Drivers For E...
E  Bryan - An Analysis Of Content And Information Management As Drivers For E...E  Bryan - An Analysis Of Content And Information Management As Drivers For E...
E Bryan - An Analysis Of Content And Information Management As Drivers For E...Emerson Bryan
 
Internet of Everything: A $4.6 Trillion Public-Sector Opportunity
Internet of Everything: A $4.6 Trillion Public-Sector OpportunityInternet of Everything: A $4.6 Trillion Public-Sector Opportunity
Internet of Everything: A $4.6 Trillion Public-Sector OpportunityJoseph M Bradley
 

Similar to UAE National ID Case Study (20)

Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014
 
Triggering the Smart Card Readers Supply Chain
Triggering the Smart Card Readers Supply ChainTriggering the Smart Card Readers Supply Chain
Triggering the Smart Card Readers Supply Chain
 
PKI IN Government Identity Management Systems
PKI IN Government Identity Management SystemsPKI IN Government Identity Management Systems
PKI IN Government Identity Management Systems
 
PKI in Government Digital Identity Management Systems
PKI in Government Digital Identity Management SystemsPKI in Government Digital Identity Management Systems
PKI in Government Digital Identity Management Systems
 
AWS Institute | Digital Identity: The Opportunity for Government
AWS Institute | Digital Identity: The Opportunity for GovernmentAWS Institute | Digital Identity: The Opportunity for Government
AWS Institute | Digital Identity: The Opportunity for Government
 
How to Implement Computerized id cards in Afghanistan?
How to Implement Computerized id cards in Afghanistan?How to Implement Computerized id cards in Afghanistan?
How to Implement Computerized id cards in Afghanistan?
 
Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, ...
Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, ...Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, ...
Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, ...
 
Wef big databigimpact_briefing_2012
Wef big databigimpact_briefing_2012Wef big databigimpact_briefing_2012
Wef big databigimpact_briefing_2012
 
Digital india
Digital india Digital india
Digital india
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...
 
141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished
 
Identity and Mobility in a Digital World
Identity and Mobility in a Digital WorldIdentity and Mobility in a Digital World
Identity and Mobility in a Digital World
 
Cyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging TrendsCyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging Trends
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expa
 
Supporting e-Government Progress in the United Arab Emirates
Supporting e-Government Progress in the United Arab EmiratesSupporting e-Government Progress in the United Arab Emirates
Supporting e-Government Progress in the United Arab Emirates
 
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in NigeriaCyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
 
Biometric Security Poses Huge Privacy Risks in Kenya
Biometric Security Poses Huge Privacy Risks in KenyaBiometric Security Poses Huge Privacy Risks in Kenya
Biometric Security Poses Huge Privacy Risks in Kenya
 
e-Government: Thoughts on Leveraging Technology for Organisational Excellence...
e-Government: Thoughts on Leveraging Technology for Organisational Excellence...e-Government: Thoughts on Leveraging Technology for Organisational Excellence...
e-Government: Thoughts on Leveraging Technology for Organisational Excellence...
 
E Bryan - An Analysis Of Content And Information Management As Drivers For E...
E  Bryan - An Analysis Of Content And Information Management As Drivers For E...E  Bryan - An Analysis Of Content And Information Management As Drivers For E...
E Bryan - An Analysis Of Content And Information Management As Drivers For E...
 
Internet of Everything: A $4.6 Trillion Public-Sector Opportunity
Internet of Everything: A $4.6 Trillion Public-Sector OpportunityInternet of Everything: A $4.6 Trillion Public-Sector Opportunity
Internet of Everything: A $4.6 Trillion Public-Sector Opportunity
 

More from Arab Federation for Digital Economy

اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربيةاقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربيةArab Federation for Digital Economy
 
المدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةالمدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةArab Federation for Digital Economy
 
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...Arab Federation for Digital Economy
 
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزماتالاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزماتArab Federation for Digital Economy
 
كوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئةكوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئةArab Federation for Digital Economy
 
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجيكيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجيArab Federation for Digital Economy
 
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint ActionReconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint ActionArab Federation for Digital Economy
 
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبةمستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبةArab Federation for Digital Economy
 
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟Arab Federation for Digital Economy
 
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...Arab Federation for Digital Economy
 

More from Arab Federation for Digital Economy (20)

اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربيةاقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
 
Foundations of the UAE and GCC Economies with Covid-19
Foundations of the UAE and GCC Economies with Covid-19Foundations of the UAE and GCC Economies with Covid-19
Foundations of the UAE and GCC Economies with Covid-19
 
سلطة العقل
سلطة العقلسلطة العقل
سلطة العقل
 
الحكومة الرقمية: مفاهيم وممارسات
الحكومة الرقمية: مفاهيم وممارساتالحكومة الرقمية: مفاهيم وممارسات
الحكومة الرقمية: مفاهيم وممارسات
 
المدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةالمدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقمية
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
 
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
 
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزماتالاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
 
Digital economy and national security
Digital economy and national securityDigital economy and national security
Digital economy and national security
 
New World Economy
New World EconomyNew World Economy
New World Economy
 
كوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئةكوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئة
 
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجيكيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
 
Digital Economy and Policy Needs for Digital Transformation
Digital Economy and Policy Needs for Digital TransformationDigital Economy and Policy Needs for Digital Transformation
Digital Economy and Policy Needs for Digital Transformation
 
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint ActionReconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
 
Conflicts in Organisations
Conflicts in OrganisationsConflicts in Organisations
Conflicts in Organisations
 
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبةمستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
 
Policy Needs for Digital Economy
Policy Needs for Digital EconomyPolicy Needs for Digital Economy
Policy Needs for Digital Economy
 
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
 
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
 

Recently uploaded

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

UAE National ID Case Study

  • 1. INTERNATIONAL JOURNAL OF SOCIAL SCIENCES VOLUME 1 NUMBER 2 2007 ISSN 1306-973X UAE National ID Programme Case Study Ali M. Al-Khouri develop a modern identity management system with two Abstract—This article provides some insight into the strategic objectives addressing security and economical implementation of the national ID programme in the United Arab requirements (see also Figures 1 and 2). The security Emirates (UAE). The fundamental aim is to contribute to the objective evolves around the necessity of the government to existing body of knowledge in the field, as it sheds light on some of have an integrated population register that will become the the lessons learned from the programme that is believed to widening the knowledge horizons of those involved in such initiatives. central reference point for the whole government for the purpose of population identification and service delivery. By Keywords—national id; identity management. employing the necessary technologies, the project develops a trusted and robust identity verification infrastructure to I. INTRODUCTION enhance homeland security and help the government in protecting individuals against the ever increasing crime of M ANY countries around the world have either implemented, or are in the process of embarking on national ID projects. The key motives behind such initiatives identity theft. is to improve the identification and authentication mechanisms in order to reduce crime, combat terrorism, eliminate identity theft, control immigration, stop benefit fraud, and provide better service to both citizens and legal immigrants (see for example: [1],[2],[3],[4]. In view of the fact that these projects are unique undertakings and involve a degree of uncertainty and risk, national ID programmes are perceived to carry a high level risk and that more knowledge needs to be acquired to understand the complexity of these types of endeavors. In Fig. 1 project strategic goals this regard, this article aims to present a case study of the implementation of an ID card programme in the UAE, and to The second strategic goal of the project evolves around highlight some of the lessons learned which, if considered, are supporting the government’s economy. One of the key most likely to support the planning and execution of similar requirements in this goal is to support the country’s digital initiatives. economy by building a national e-authentication infrastructure This article is structured as follows. First, some primary which should become the basis and the backbone for e- information about the programme, its strategic goals and government services and e-commerce initiatives. Besides, objectives are presented. The technologies employed and the having a centralised and integrated population register will enrolment process are explained next. A short overview of assist in planning and utilising resources as it should provide the enrolment strategy is provided and then the lessons timely, accurate, and statistical information for strategic learned are presented which concludes the paper. decision making and long term planning with respect to education, healthcare, town planning, transport requirements, II. UAE ID CARD PROGRAMME energy, etc. Another side of this objective aims to unify the As a result of the rapid growth of the economy as well as existing cards in the country such as driving license, labour the population over the past few years in the United Arab card, health card, and other ‘entitlement’1 cards. This will Emirates (UAE), the government has expressed strong also have a profound impact on the economies of scale in the determination to enhance the performance of public management and production costs of such cards. departments and increase efficiency, in a bid to improve the co-ordination of and the citizen’s access to public services. The project which was kicked off in June 2003, aimed to 1 Manuscript received March 27, 2007.. There are two main types of identity documents used in many countries. Ali M. Al-Khouri is with Emirates Identity Authorit, Abu Dhabi, United The first are often referred to as “foundation” documents, and they include Arab Emirates (phone: +97150-613-7020; fax: +9712-404-6661; e-mail: birth certificates and immigration records. These primary documents are used alkhouri@ emiratesid.ae). to obtain documents of the second type, “entitlement” documents, such as passports, drivers’ licences and other government issued documents. IJSS VOLUME 1 NUMBER 2 2007 ISSN 1306-973X 62 © 2007 WASET.ORG
  • 2. INTERNATIONAL JOURNAL OF SOCIAL SCIENCES VOLUME 1 NUMBER 2 2007 ISSN 1306-973X enhance homeland security central & integrated population deaths, as well as the updation of variable (constantly database changing) information such as address, education, employer, government trusted identity etc. The National ID system also stores images of the official Security minimise identity theft verification infrastructure provide identity verification services support documents presented during the application for an ID improve access/delivery of public service to other ministeries, banks, hospitals, card or on events declaration on the Population Register. etc. unification of existing cards and reduce B. ID Card Production one card multi-uses management & production cost (e.g., dls’, labour, health) The National ID system includes a process for the Economical timely, accurate statistical info. for enrolment, processing, production and delivery of ID cards. support strategic decision making planning e.g., education, healthcare, energy, etc. ) This process is adapted for the first application for an ID card support e-Gov and e-Commerce national e-authentication including the renewal of an expired ID card or the infrastructure replacement of a damaged, lost or stolen ID card. The ID card produced by the national ID system includes biometric Fig. 2 security and economic objectives fingerprint-based authentication capabilities and uses a public key infrastructure (PKI) that is adapted for future e- III. KEY OPERATIONS OF THE NATIONAL ID SYSTEM government and e-commerce usage. The national ID system incorporates the latest technological advances. It is designed based on a 4-tier web-based C. 3 Biometric Services architecture and complies with the latest industry standards The national ID system provides a complete range of such as ICAO for card design, x.509 for PKI, and ISO 17799 biometric functions using fingerprints and palm prints. The for IS security policy. The system guarantees secured system encompasses an Automatic Fingerprint and Palm Print communication throughout the system’s national network Identification System that provides person identification, structure by using Virtual Private Network (VPN) technology authentication, crime solving and crime linking services. and an associated technical Public Key Infrastructure (PKI). These services are used to guarantee the applicant’s identity The fingerprint-based biometry provides the means to ensure a using the ID card and to ensure that a person is issued with single identity for each applicant and to authenticate the one and only one ID card. The full set of biometric services is identity of the ID card bearer. In principle, the national ID also used for law enforcement purposes. system is designed to provide three primary operations as depicted in Figure 3. IV. ID CARD The ID card is identical for both UAE citizens and residents Population Register & Document Imaging in terms of card design and displayed data. The card validity Management period is set for 5 years for citizens, and is linked to the residency permit validity for residents. The ID card includes a digital certificate with PKI capabilities. This feature constitutes one of the basis for future online identification, authentication and transactions to support e-government and e-commerce. Overt: chip data • Guilloches & Rainbow digitally signed & • Ghost image ID Card Biometric encrypted • Holographic overlay Production Services • Variable fine lines • Special Raster • UV ink • Rainbow printing Covert: • Micro text • Hidden text Fig. 3 primary operations of the national id system • UV A. Population Register and Document Imaging Management (PRDI) The National ID system maintains the Population Register Fig. 4 UAE id security features that records information about every UAE citizen and legal resident registered on the system and assigns a unique As depicted in Figure 4, it contains many security features Identification Number (IDN) to each person. The system is which will make it very difficult if not impossible to forge the currently sized to manage five million records. It provides the card and will allow in most cases a trained card acceptor to means to record events such as births, marriages, divorces and identify a faked ID card even on face value. The digital IJSS VOLUME 1 NUMBER 2 2007 ISSN 1306-973X 63 © 2007 WASET.ORG
  • 3. INTERNATIONAL JOURNAL OF SOCIAL SCIENCES VOLUME 1 NUMBER 2 2007 ISSN 1306-973X security on the ID card chip in terms of the used signature and VI. ENROLMENT PROCESS encryption features is accorded to the highest international Taking into consideration the criticality and importance of security levels. In terms of the IT security in the contact chip, the enrolment process as the new national ID card will the UAE ID card follows the highest electronic standards, become the source document to prove an individual’s identity, based on the use of asymmetric encryption and digital a robust registration process was put in place to ensure signature. comprehensive identity verification prior to the issuance of the ID card (see also Figure 6). V. IMPLEMENTATION STAGES AND THE ENROLMENT STRATEGY • checking government issued credentials VERIFICATION e.g., passports and visas ID Registration-Cycle Mass Enrolment Phase • online verification of presented documents June/2005 1/1/2006 June / 2007 June / 2009 ENROLMENT • capture photo, signature, biometrics, scan docs. Citizens Enrolment Pilot Enrolment Interim Enrolment (System Testing) complete the enrolment of all citizens (1 million) by mid 2009 Dec / 2010 • background checks, e.g., biometrics, BACKEND Jan / 2008 CHECKS watch lists… Registration Registration limited to Military, limited to gov. Residents Enrolment Interior, and organisations Police staff and their complete the enrolment of families all Residents (4 million) by end of 2010 CARD ISSUANCE • production of the national ID card Fig. 5 enrolment plan The system was implemented mainly in three phases (see Fig. 6 registration and card issuance process also Figure 5): Applicants are supposed to come to any of the available registration centres with the supporting documents A. Pilot Enrolment: (application form2, passport and family book for citizens). The first live enrolment began in June 2005 as a pilot phase The applicant goes through a three staged (12 to 17 min) in an attempt to test the system and its capabilities. This was process at those centres. In the first office, the particulars considered to be a good starting point since many technical completed on the application is scanned into the system and business process related issues were identified that needed through the 2D barcode on the form and verified against the the system to cater for. The enrolment was stopped for more immigration system of the Ministry of Interior online. The than two months to upgrade the software of the overall system applicant then moves to another station where his/her photo is to reflect the new identified requirements. captured, a signature acquired using an electronic pad (which is then digitised into the system), and some supporting B. Interim Enrolment: documents are scanned in. He then goes through the last Although the system was ready for the mass enrolment station where his/her 10-fingerprints are captured (slaps, phase towards the end of 2005, the enrolment was limited to rolled, palm and writers’ palm). The applicant is then given a the registration of staff of government organisations where receipt indicating the date he/she must return to collect his/her registration centres were available, due to the incompleteness card or that it will be sent to him/her through a registered of the construction projects of the majority of the registration courier. The choice of card delivery is left to the applicant. centres across the country. Before the card is printed, there are other processes that run at C. Mass Enrolment Phase: the backend for further investigation. A biometric check is performed against civil and forensic fingerprint databases to The registration in this phase was linked to the obtainment ensure that the person has not been registered in the system of certain services from the government sector such as the previously, and is not wanted by the police authorities. In renewal of vehicles and passports for citizens, and the renewal normal cases, cards are printed and distributed within 48 and issuance of residency permits for residents. With a 3 year hours. enrolment strategy, the project aims to register the whole population of the country by end 2010. The registration VII. LESSON LEARNED process of those new births and new residents is planned to take place directly through the Ministry of Health and This section provides a review of the current business Ministry of Interior who will interface with the national ID operations in the UAE national ID card programme and database that will initiate automatic requests such as first ID presents some of the identified process improvement areas. card application, card issuance, ID card renewal and The proposed changes are seen as key factors to increase replacement, and population register events declarations such public acceptance and project success chances. as marriage, divorce, birth, etc. 2 The application form is also available for download from the Internet. IJSS VOLUME 1 NUMBER 2 2007 ISSN 1306-973X 64 © 2007 WASET.ORG
  • 4. INTERNATIONAL JOURNAL OF SOCIAL SCIENCES VOLUME 1 NUMBER 2 2007 ISSN 1306-973X A. Registration Process required was to achieve the objective of producing statistics Business Process about the population of the country. The review process indicated that there was a vision mix-up between the two requirements of building a statistical database and the other Current Target? objective of enrolling the whole population of the UAE and 5 minutes producing ID cards for them. This was a clear confusion 12-17 minutes among many members and stakeholders of the project to aim to achieve these two objectives at the same time. It was a concern from the early days of the project that the enrolment process involved many activities that required the project members to radically review and improve. The review The recommendation from the review exercise was that the exercise revealed that the average enrolment process could be implementation of the project must take place in three stages completed in less than 5 minutes rather than the current 17 as depicted in Figure 7. In the first stage, the project must minutes without any big impact on the project objectives if attempt to (a) enrol the population for the new ID card with a only two enrolment activities were re-engineered: (1) the minimal set of data as depicted in Figure 8 below. As only registration form and (2) the biometrics captured. primary identification data will be required for first time 1) Registration Form enrolees, the application form was suggested to be eliminated and rather make use of the existing electronic link with the The registration form throughout the project life cycle went Ministry of Interior’s database to obtain and verify data. through many iterations in an attempt to reduce the amount of data needed for the enrolment. It started with an 8-page Then stage two and three must run in parallel. In stage two, document, and was reduced to 6, and then to 4 pages. The efforts must be directed towards promoting (and enforcing) form which was a pre-requisite to initiate the registration the presentation of the new ID card for identity verification process was viewed as: and as a pre-requisite to most often visited government • too lengthy services by the population. Those organisations then need to • required considerable time to fill maintain the new ID numbers in their databases, which should • some information was not readily available be used when moving to stage three of the strategy which • was sometimes filled incorrectly requires the national ID database to interface and integrate • large number of resident applicants are with such databases. Provided the link is in place, a proper illiterate data warehouse can be built that is up-to-date and more reliable for generating statistical reporting purposes as it will • considered to be the enrolment’s bottle neck obtain information from primary and trusted sources. The reason for its design and the large number of data Stage I Stage II Stage III Interface/ Promote the Short Form/ Integrate use of the No Form with Card organisation Interfacing and Integration Issue/Produce ID Promote (enforce) the with: cards to citizens and presentation of ID • Ministry of Labour (MoL) residents and card as a means for • Ministry of Justice (MoJ) minimise potential identity verification • Ministry of Interior (MoI) noise from public. and pre-requisite to • Ministry of Education (MoE) benefit/access to a • Ministry of Higher Ed (MoEd) government services. • Ministry of Health (MoH) data warehouse Fig. 7 project implementation stages IJSS VOLUME 1 NUMBER 2 2007 ISSN 1306-973X 65 © 2007 WASET.ORG
  • 5. INTERNATIONAL JOURNAL OF SOCIAL SCIENCES VOLUME 1 NUMBER 2 2007 ISSN 1306-973X Name (Segmented) Name identity hits or if the real hit constantly appears very low on Names Gender, DoB, Marital St. Gender, DoB, Martial St. this long hit list. While it can be argued that the hit list can be Nationality Nationality shortened by tuning the applicable threshold, it will then mean Passport Passport No, Place of issue, Passport No, Place of issue, that real hits that appear low on the hit list will not be Issue and Expiry dates Issue and Expiry dates identified if the systems performance is not improved. There Unified No Unified No, Sponsor Name Family ID, Book No Residency File No, Issue and is obviously a very close relationship between the quality of Expiry dates fingerprints taken and the performance of the system. It was Address however realised that the introduction of a second biometric Emirate Emirate City City will complement the fingerprint biometric and will basically Mobile phone Mobile phone balance any shortcoming. Fig. 8 primary identification data captured for first enrolment The re-engineering of the above two enrolment processes provided a saving in the office space, equipment and staff 2) Biometrics captured required for enrolment as the original enrolment process was The enrolment process required the capturing of all divided into three stages as depicted in Figure 9. The reason fingerprints (i.e., slaps, rolled prints, palm, writer’s palms) a for the three office design was mainly to segregate duties, and process taking around 6 to 10 minutes to complete. On the manage the daily in-flow of applicants and shorten the waiting system level, only rolled fingerprints were used for time. identification, where slaps and palms were stored for criminal search by the Ministry of Interior. The review recommendation suggested to only capture the flat prints and use smaller acquisition devices (just the slaps and the two thumbs), and to capture other fingerprints at a later stage only if needed. It was recommended that a second biometric must be introduced to complement the fingerprint biometric and enhance the FTE3, FAR4, FRR5 rates. The second biometric Civil File Civil Civil was recommended to be more of a real time application that Verification Registration Booking could be used in mass population areas such as airports. Both • read form • scan doc’s • fingerprints • verify against • photo biometrics were seen as easy to operate and will cut immigration DB • signature processing time to less than 2 minutes. Fig. 9 registration procedures 3) Biometrics quality Shortly after the introduction of the pilot phase of the It was therefore recommended to enhance the system to programme it became abundantly clear that the quality of perform the enrolment process through a single workstation. fingerprints taken by operators will have a determining effect This was viewed to radically support the enrolment strategy, on the classification, identification, and authentication of in which smaller devices can be used to carry out the applicants. Apart from possible shortcoming in the operating registration, and enhance the portability of the system for system itself the percentages of failure to enroll (FTE), false wider deployment in areas such as setting up permanent and rejection rate (FRR), and false acceptance rate (FAR) may temporary registration offices in traffic departments, increase dramatically if operators are not properly trained in immigration, municipalities, schools, companies with a large the art of taking fingerprints. Failure to enroll due to operator number of staff members, etc. failure may for example result in false demographic information. The lesson learnt therefore was that a very high premise should be placed on a comprehensive operator B. Scope Creep training programme. It was also realised that results of Scope creep is a term used to describe the process by which biometric hits should be closely monitored to determine the users discover and introduce new requirements that are not performance of the system in terms of the quality of these part of the initial planning and scope of the project. As widely results. A clear indication of unacceptable system quoted in the literature, many doubt a limited and specified performance would be if a too long hit list is required to scope for national ID programmes, as the nature and high cost of such projects are likely to yield and encourage the 3 Failure to Enroll: when the system fails to enroll an applicant largely due expansion of its functions [5],[6],[7],[8]. The project the poor quality of the biometrics being captured. 4 management literature also indicates that coping with changes False Acceptance Rate(also referred to as False Match Rate): is an incorrect identification or failure to reject an imposter (Imposter: is a person trying and changing priorities are the most important single problem to submit a biometric in either an intentional or inadvertent attempt to pass him/herself off as another person who is an enrollee). 5 False Reject Rate (also referred to as False Non-Match Rate): is the failure to identify or verify a person. IJSS VOLUME 1 NUMBER 2 2007 ISSN 1306-973X 66 © 2007 WASET.ORG
  • 6. INTERNATIONAL JOURNAL OF SOCIAL SCIENCES VOLUME 1 NUMBER 2 2007 ISSN 1306-973X facing the project management function [9],[10],[11]. Indeed, Indeed, a multi-purpose card was one of the objectives of changing targets all the time, would obviously take any the project, but not in the way it was comprehended. The project nowhere. Multi-purpose term stated in the objectives was used to explain that the card can replace other identity documents Time when it comes to the verification of identities. Since the card was obligatory to the total population of the UAE, the provision was that the new ID card can replace such cards if the other entities use the new ID number in their databases as a primary number to retrieve individual records. The management of scope in the UAE ID card was clearly Budget Scope one of the biggest challenges that required the project core team to spend a lot of time and effort to clarify the feasibility of such actions to the upper management. Finding the right In the UAE ID programme, project performance was communication approach was key to managing scope creep. monitored and measured regularly to identify variances from the project plan. It was supported with a formal and well- C. Too Much Security defined process to control and manage the changes being It was during this evaluation phase of the project (discussed requested to the project scope and objectives during the next) as well as the experience gained after the introduction of project lifecycle. See for example Figure 10 that depicts an the pilot phase that it was realised that far too much emphasis example of one of the change control policies. were placed on security issues which rendered the operating system a closed system which required costly and extreme Type of Change efforts to affect even simple changes. Needless to say that Technical nature Technical nature Contract Scope Contract scope required changes to the system became a very cumbersome (No financial (With financial (No financial (Financial impact) impact) impact) Impact) task with unacceptable cost and time frames associated with Steering Analyse and Analyse and each change. This resulted in a strained relationship with the Accept or Reject Accept or Reject Committee Recommend Recommend vendor as these delays were perceived by the client as to Reject or Reject or Change Control Recommend to Recommend to reflecting on a possible inability or lack of co-operation from Board Project Sponsor Project Sponsor the vendor. It was later on realised that the system security, Project Sponsor Approve or Reject Approve or Reject security during the enrolment process and security around information included in the card itself should not be of such Fig. 10 change control authorities extent that it places a stranglehold on the flexibility to change and the user friendliness of the system. While security Despite all the efforts put into managing and controlling features built into the card body could be as inclusive as is change, the changes introduced and processed dragged the required, the personal information of the applicant stored in project schedule far away from the original target date. It was the security portion of the card should be protected but should common during the different implementation stages of the be freely available to authorised users. programme to change the scope to either add new or change agreed functions, which obviously had severe impact on the D. Evaluation Framework implementation project plan and budget. Examples of such Since the UAE national ID system was provisioned to changes included the shifting from centralised card printing to become the most critical system in the country as the main decentralised, upgrading the card technology, changing card central hub for population identity cross checking and service design and displayed data, upgrading database technology, eligibility (i.e., online with 24/7 availability requirement), it etc. was important that the overall system goes under a thorough quality evaluation. As widely quoted in literature that one of Another example of such changes to project scope was the principle causes of information system failure is when the related to the perception of the multi-purpose functionality. designed system fails to capture the business requirements or Several attempts were made from certain key stakeholders of improve the organisational performance (see for example: the project to expand the card applications during the [12],[13],[14],[15],[16]. Figure 11 shows an example of how a execution phase that had severe impact on the project user's requirements might be interpreted during the lifecycle progress. It took some time for them to realise the importance of a project which is not really far from being true in many of of limiting the purpose of the card as an identity document in the IS projects implemented around the world. the first phase of the project and that efforts must rather be concentrated on the enrolment of the population and the During the UAE progamme implementation there was no issuance of the new ID card. clear communication of the development standard followed by the vendor, which created confusion among the project team IJSS VOLUME 1 NUMBER 2 2007 ISSN 1306-973X 67 © 2007 WASET.ORG
  • 7. INTERNATIONAL JOURNAL OF SOCIAL SCIENCES VOLUME 1 NUMBER 2 2007 ISSN 1306-973X members when it came to individual deliverable acceptance, vendor to address prior to the final acceptance and handover as well as the final acceptance of the system. In general, the of the system. Besides, the use of quality framework provided project team, with the workload and responsibilities put on a very useful and supportive methodological approach for them, seemed to be overloaded and to have scattered visions going about software quality assessment. It acted as a of how things should be done and achieved. Everybody comprehensive analytical tool and provided a more thorough wanted the project to be concluded as quickly as possible and view of the system’s strengths and weaknesses. It addressed a was seemingly very impressed with the work produced by the wide range of quality characteristics of the software products vendor. and processes enabling better description of software quality aspects and its importance. Arguably, if used as a guide in an early stage of the project it could have provided a sound basis for informed and rational decision making which could have contributed significantly to the delivery of a system which is properly addressing user requirements. VIII. CONCLUSION Not much has been written about National ID systems implementation from a practitioners’ point of view. The literature was found to be full of articles from the private industry discussing advanced technologies and what can be achieved through them. This article adds to the current body of knowledge in the field, and is believed to assist in widening the thinking circle of those who are wearing similar hats. As indicated in this paper, much could indeed be achieved Source: [13] through national ID programmes. However, agreed vision Fig. 11 An example of varying interpretations of user requirements and thereafter proper planning is essential to succeed with ISO/IEC 9126 Functionality Reliability Usability Efficiency Maintainability Portability Suitability Maturity Understand Time behaviour Analysability Adaptability Accuracy Fault tolerance ability Changeability Installability Interoperability Recoverability Learnability Resource Stability Co-existence Security Operability utilisation Testability Replaceability Attractiveness Functionality Reliability Usability Efficiency Maintainability Portability compliance Compliance Compliance Compliance Compliance Compliance Are the required How reliable is the Is the software How efficient is How easy is to How easy is to functions available software? easy to use? the software? modify the transfer the in the software? software? software to another environment? Fig. 12 ISO-IEC 9126 quality model such projects. It took quite some time before the team started At the very late stages of the project, the core project team to agree on the fact that the first phase of the project should employed ISO 9126 standard for the purposes of software focus on the enrolment of the whole population and the quality and the overall system architecture evaluation (see also issuance of the new ID card. Figure 12). The evaluation study contributed significantly in National ID programmes and because of their nature, are identifying many of the system deficiencies that required the perceived to invest quite significantly in technology upgrade IJSS VOLUME 1 NUMBER 2 2007 ISSN 1306-973X 68 © 2007 WASET.ORG
  • 8. INTERNATIONAL JOURNAL OF SOCIAL SCIENCES VOLUME 1 NUMBER 2 2007 ISSN 1306-973X and R&D departments for future developments in areas [11] R.G. Reiss & F.N. Spon, “Project Management Demystified: Tools and Techniques, ” New York: McGraw Hill, 1995. related to identity management and to keep up with the ID [12] D.E. Avison & A.T. Wood-Harper, “MultiView - an exploration in industry developments and standards. It was learned that new information systems development. ” USA: McGraw Hill, 1990. functionalities and upgrades must be thoroughly studied and [13] P. Bocij, D. Chaffey, A. Greasley, & S. Hickie, “Business Information Systems: Technology, Development and Management for the e- researched to eliminate unnecessary changes during the business,” 2nd ed. New York: Prentice Hall, 2003. execution phase. [14] W. Crain, “Theories of Development: Concepts and applications,” 3rd ed. New Jersey: Prentice Hall International, 1992. As it is becoming the trend, such programmes need to put [15] G. Curtis, “Business Information Systems: Analysis, Design, and Practice,” 3rd edition, USA: Addison-Wesley, 1998. much effort in promoting e-identity and e-verification services [16] M. Harry, “Information Systems in Business,” 2nd ed. Great Britain: using the new ID card. It would be interesting to measure the British Library Cataloguing in Publication Data, 1997. impact of national ID programmes on the overall government economy, as it would obviously promote electronic About the Author transactions and would also encourage government organisations to streamline their operations and make use of Al-Khouri is currently holding the position of the Assistant Director- the secure (e)verification infrastructure that it will provide. General for Central Operations; a sector A. Further Research that consists of IT department, card production, research and development, Further research and practical work in this field may further and many other operational units. He contribute to the body of knowledge. Areas in which further also chairs the technical committee research may yield valuable insights and better understanding overseeing the national ID card programme in the UAE. He received are: his Bachelor’s and Master’s degrees in 1) similar studies of national ID implementations that Business IT Management with honours could show the appropriateness of the items presented in and distinction from Manchester and the lessons learned, and the degree to which it can support Lancaster Universities in the UK, and similar initiatives, currently doing his doctorate degree in the field of engineering management 2) an investigation of the suitability of quality models in and advanced technologies. national ID programmes and projects of such nature and its impact on the project success rate. He has been involved in the UAE national ID card project since early 2003 as a member of the technical executive steering committee, and was later ACKNOWLEDGEMENT appointed as the Director for the department of Information Technology and Systems when Emirates ID was established. He started his career as an IT The author would like to thank Mr. Gawie von Wielligh for project manager and then the head of the development division in the Ministry his review feedback that improved the overall structure and of Interior during which he managed several important IT projects and was quality of this paper. involved in many strategic government development projects. His research interests include management of large scale projects, and the applications of advanced technologies in large contexts. e-mail: alkhouri@emiratesid.ae REFERENCES [1] L. Goldman, “Chips with everything,” Occupational Health, vol.56, no. 4, pp.12-3, April 2004. [2] H. Knight, “Anti-Fraud: The road to a national ID card is paved with pitfalls,” The Engineer, London, p. 25, December 2003. [3] W. Matthews, “ID card plan assailed,” Federal Computer Week, vol. 16, no. 4, p.16, February 2002. [4] H. Michael, “Identity cards: Why bother,” The Economist, London, vol. 335, no. 7916, p. 50, May 1995. [5] R.A. Clarke, “The Resistible Rise of the National Personal Data System,” Software Low Journal, vol. 5, no.1, pp.33-36, 1992. [6] R.A. Clarke, “Human Identification in Information Systems: Management Challenges and Public Policy Issues” [Online]. Australia, The Australian National University, 1994 Available: http://www.anu.edu.au/people/Roger.Clarke/DV/HumanID.html#PPI [Accessed 15 09 2006]. [7] J. Fontana, “A national Identity Card for Canada” [Online]. Canada, House of Commons, 2003. Available from: http://www.parl.gc.ca [Accessed 02 08 2006]. [8] A.M. Froomkin, “The Uneasy Case for National ID Cards as a Means to Enhance Privacy” [Online]. USA, University of Miami School of Law, 2002. Available: http://www.la-w.tm [Accessed 02 10 2006]. [9] G.R. Heerkens, “Project management: 24 lessons to help you master any project”. New York: McGraw-Hill, 2005. [10] J.R. Meredith, & S.J. Mantel, “Project management: a managerial approach,” 2nd ed. New York, NY: John Wiley & Sons, Inc, 2003. IJSS VOLUME 1 NUMBER 2 2007 ISSN 1306-973X 69 © 2007 WASET.ORG