SlideShare a Scribd company logo
1 of 29
uropean
                       Digital
                       Community




          Thematic aNetwork for European e-ID
             Building Thematic Network for European e-ID


           eID Adoption Survey 2012


           Jiri Bouchal (IS-practice) – jiri-bouchal@is-practice.eu


Slide 1 , 18/04/2013                                                  WWW.EID-SSEDIC.EU
SSEDIC 2012 eID Adoption Survey



  A detailed online survey to
  collect information about:

  • use of electronic identity
    by the internet users

  • opinions on eID
    regulation, eID use, eID
    federation, and privacy
    issues




Slide 2 , 18/04/2013                  WWW.EID-SSEDIC.EU
Survey Conditions

   • Four language versions

   • Survey distribution
      – via different networks in IT, consultancy, public sector, university
        sector etc.
      – via social networks and mailing lists of the SSEDIC partners

   • Sample
      – 1000 respondents

   • Field open October 19 – end of December 2012




Slide 4 , 18/04/2013                                            WWW.EID-SSEDIC.EU
Sample Composition & Internet Use Profile




Slide 6 , 18/04/2013                           WWW.EID-SSEDIC.EU
Sample Composition


   Country of residence                            Language version of the survey

                European Union   Other countries       English   Français   Deutsch    Español



                                                       3%         14%

                         15%                           15%

                                                                                      68%
                                  85%




Slide 7 , 18/04/2013                                                        WWW.EID-SSEDIC.EU
Sample Composition

   Gender                                   Education
                   Male      Female            Primary or secondary education
                                               Higher education
                                                                    10%
                28%

                               72%                     90%




   Age
                                            Y1 Comparison
          less than 34       35-54    55+
                                            - more women
                                            - more respondents with
                       18%   25%
                                              lower education
                   57%



Slide 8 , 18/04/2013                                                   WWW.EID-SSEDIC.EU
Sample Composition


   Field of professional activity (N=713)

              Student                                               0% 2%
                                                                            3% 5%
              Public sector: administration, education etc.
                                                              21%
                                                                                    31%
              IT industry (software, hardware, services…)

              Private sector outside of the IT industry

              Unemployed                                            38%

              Retired

              Other




Slide 9 , 18/04/2013                                                                 WWW.EID-SSEDIC.EU
Internet Use Profile


   Internet access frequency and devices used
               Not once                                                         At least once,but not every month
               At least once a month, but not every week                        At least once a week, but not every day
               Every day or almost every day


                        Desktop, Laptop or Tablet PC at work




                    Desktop, Laptop or Tablet PC at home



    Laptop or Tablet PC “on the road” using Wifi or Mobile
                          connection



        Using Internet applications on your Smartphone:
       mail, webbrowser, Internet Voice communication…


                                                               0%   10%   20%   30%   40%   50%    60%   70%     80%      90%   100%




Slide 10 , 18/04/2013                                                                                          WWW.EID-SSEDIC.EU
Use of electronic Identity




Slide 12 , 18/04/2013           WWW.EID-SSEDIC.EU
Use of Electronic Identity – Y1 Survey Comparison

                              ... on a daily basis    ... at least once a week     ... at least once a month

               Username and password indicating my real identity
                                      YEAR 1 Expert Survey Result


           Username and password connected to a card (e.g. bank…
                                      YEAR 1 Expert Survey Result


     A “Nickname” not indicating my real name and password used…
                                      YEAR 1 Expert Survey Result


        An eID supported by a hardware device: a chip card/reader…
                                      YEAR 1 Expert Survey Result


     An eID supported by a hardware device: a One Time Password…
                                      YEAR 1 Expert Survey Result


        An eID supported by a hardware device: a SIM card/mobile…
                                      YEAR 1 Expert Survey Result

                                                                    0%   10%     20%    30%    40%     50%     60%   70%   80%

Slide 14 , 18/04/2013                                                                                        WWW.EID-SSEDIC.EU
Origin of eID Credentials

                                                                                                  Obtained to create my e-mail
        Username and password covering my real identity                                           account


  A “Nickname” not indicating my real name and password                                           Obtained to purchase goods or
                                                                                                  services for one or more
                                                                                                  eCommerce websites

                                                                                                  Obtained as member of a social
An eID supported by a hardware device: a chip card/reader                                         network
           combination protected by PIN code

                                                                                                  These credentials represent the
                                                                                                  official eID in my country issued
                                                                                                  by the government
     An eID embedded in a public register (PKI) which in
  combination with eSignature allows to electronically sign …                                     Obtained as an eBanking client

An eID supported by a hardware device: a SIM card/mobile
                  device combination
                                                                                                  Obtained in the context of my
      An eID supported by a hardware device: a One Time                                           professional activities and used
                       Password device                                                            for professional and private
                                                                                                  activities
An eID supported by biometric information (fingerprint, iris                                      Obtained in the context of my
                        scan...).
                                                                                                  professional activities and ONLY
                                                                                                  used for professional activities
                                                               0%   10%   20%   30%   40%   50%


Slide 15 , 18/04/2013                                                                                 WWW.EID-SSEDIC.EU
Reasons for Not Using Some eID Types

                                                                                                              ….I’m not aware of the
      Username and password covering my real identity                                                         existence of these tools

         A “Nickname” not indicating my real name and
                                             password                                                         …I don’t believe these
Username and password connected to a card (e.g. bank                                                          tools are technically
  payment card, frequent flyer card or smart card used                                                        secure
      for public transportation), verified by a 3rd party
         An eID supported by a hardware device: a chip                                                        …I don’t need these
        card/reader combination protected by PIN code                                                         tools
User ID and password which are in addition verified by a
    number from a list of randomly generated numbers
                                             (“tokens”).                                                      …these tools are to
      An eID embedded in a public register (PKI) which in                                                     complicated for me
    combination with eSignature allows to electronically
                                        sign documents.
          An eID supported by a hardware device: a SIM
                                                                                                              …I don’t TRUST the
                       card/mobile device combination
                                                                                                              issuers of these tools
    An eID supported by a hardware device: a One Time                                                         when they belong to
                                     Password device                                                          the PUBLIC sector
                                                                                                              …I don’t TRUST the
             An eID supported by biometric information                                                        issuers of these tools
                               (fingerprint, iris scan...).                                                   when they belong to
                                                                                                              the PRIVATE sector
                                                              0%   10% 20% 30% 40% 50% 60% 70% 80% 90% 100%


Slide 16 , 18/04/2013                                                                                         WWW.EID-SSEDIC.EU
Cross-Border Use of eID

   Online cross-border purchasing of goods and services (N=696)
            Yes.
            No, I don’t have a need to order goods or services from another member state.
            No, I do not trust merchants outside my country, because I think my rights as a consumer are not protected then.
            I can’t tell whether an Internet transaction I do is an international, cross-border transaction or not.

                                                  75%                                                        15%            4%        5%




   Online cross-border money transfers (N=696)
                Yes, at least once a week.
                Yes, at least once a month.
                Yes, at least once a year.
                Sometimes, less than once a year.
                No, I never had a need to transfer money to another member state.
                No, I do not trust cross-border online money transfers.
                No, I do not trust online money transfers at all, I prefer to make the transaction in my bank personally.
                No, I am not aware of such online tools.                                                                    1%         2%

   4%             19%                            28%                           18%                        24%                    4%




Slide 17 , 18/04/2013                                                                                           WWW.EID-SSEDIC.EU
E-Signature Use




Slide 18 , 18/04/2013   WWW.EID-SSEDIC.EU
E-Signatures

  Possession of eSignature (N=713)                                      Legal Qualification of eSignature (N=371)
                        Yes   No    Don't know                                  Yes
                              5%                                                No
                                                                                I don’t know whether my eSignature is qualified

                                                                                            12%
                    43%                   52%                                         14%

                                                                                                            74%




  Use of eSignature (N=371)
      Signing a declaration for a public service (e.g. online tax-…
                                       Signing a registered mail
           Confirming an eBanking or eCommerce transaction
      Signing an order, invoice or other procurement message
                                              Signing a contract
                                                           Other

                                                                   0%     10%         20%         30%        40%        50%       60%


Slide 19 , 18/04/2013                                                                                                 WWW.EID-SSEDIC.EU
E-Signature Technology


    A signature key stored on a smartcard with signing software
    to sign standard office documents (e.g. pdf, MS office, Open
                          Office, e-mails…)

    A signature key stored on the desktop with signing software
    to sign standard office documents (e.g. pdf, MS office, Open
                          Office, e-mails…)

   A signature key stored on a local server with signing software
   to sign standard office documents (e.g. pdf, MS office, Open
                         Office, e-mails…)

    A signature key stored on a remote server or supported by a
   remote server which is used through a mobile device (such as
                    a mobile phone or tablet pc)

         A signature key stored on a remote server with signing
          software to sign most of the standard office kind of
           documents (pdf, MS office, Open Office, e-mails…)

         Signing in connection with legacy applications such as
        accounting, ERP or procurement systems with signing of
     structured information such as XML or EDIFACT documents…

                                                                    0%   10%   20%   30%     40%     50%


Slide 20 , 18/04/2013                                                                      WWW.EID-SSEDIC.EU
Respondents Opinions

  1) EU and National Regulation of eID
  2) eID Federation and Cross-Sector Use
  3) Privacy Issues




Slide 21 , 18/04/2013                      WWW.EID-SSEDIC.EU
Opinions on eID Regulation

  Need for EU regulation of eID (N=694)

                        Yes, this is typically a task of European regulation.
                        No, this needs to be addressed by each member state separately.
                        No, leave this to the private sector.
                        No opinion on this issue.

                                       78%                                                7%      6%    9%




  Usefulness of EU proposals on eID and digital signature (N=692)
                               Yes, they will really help.
                               They may marginally help.
                               No, I do not expect they will help.
                               No opinion on this issue.


                        51%                                            27%                 9%          12%




Slide 22 , 18/04/2013                                                                          WWW.EID-SSEDIC.EU
Opinions on eID Regulation

  Need for eGovernment eID which can be used cross-border (N=686)
                        Yes, this is absolutely necessary.
                        Not necessarily, this is no core task of the government.
                        Not at all, I prefer to maintain separate electronic identities for each Member State.
                        Not at all, this is a task for the private sector.
                        No opinion on this issue.

                                          67%                                                   16%              7%    2%   8%




  Need for cross-border eID to access private services (N=684)

                        Yes, this is absolutely necessary.
                        Not necessarily, this is no core task of the government.
                        Not at all, this is a task for the private sector.
                        No opinion on this issue.


                                  55%                                                  26%                       10%        9%




Slide 23 , 18/04/2013                                                                                       WWW.EID-SSEDIC.EU
Federation and Cross-Sector Use of eID

  eID federation use (N=700)
                        Yes, I use it always because it makes the log-in easier.
                        Yes, but I use it only when I see possible benefit of sharing eIDs between both services.
                        Yes, but I use it rarely.
                        Never, I do not want to provide information about what service I use to another company.
                        Never, I have never heard of it.
                        No opinion on this issue.
        10%              17%                  18%                                     45%                             6%        5%




  Opinion on future cross-sector use of eID (N=700)

          The only way forward.        Can have some positive effects.        Not a good idea.        No opinion on this issue.



               23%                                        44%                                       25%                    9%




Slide 24 , 18/04/2013                                                                                      WWW.EID-SSEDIC.EU
Privacy Issues

   Need for specific privacy rules for companies holding significant identity
     information (N=696)
                    Yes, specific regulation and control is necessary.
                    No, specific rules are not required, other than already existing general privacy protection rules.
                    Not at all, this is a normal evolution, every one gives this information on a voluntarily basis.
                    No opinion on this issue.

                                                      82%                                                           11%       3% 4%




   Right to online anonymity (N=696)
           Yes, in fact, anonymous access must be the rule; only in exceptional cases “strong identification” can be requested
           Yes, in certain circumstances anonymity is preferable
           Yes, but anonymity must be “conditional”, can be lifted by court order for example (when criminal acts are involved)
           No, anonymity must be the exception
           No, all online actions must be traceable and identifiable so that people can be held responsible
           No opinion on this issue.

                        34%                                    27%                                28%                    4%   4%   4%



Slide 25 , 18/04/2013                                                                                         WWW.EID-SSEDIC.EU
Secure Electronic Document Exchange




Slide 26 , 18/04/2013                    WWW.EID-SSEDIC.EU
Secure Electronic Document Exchange

                        Internet exchange of sensitive documents (N=133)
                                                                          12%
                                Yes, I exchange sensitive documents
                                via Iternet
                                No, I do not                                    88%




   Types of sensitive documents exchanged                                 Technical solutions used (N=116)

            Invoices                                                        Regular email


           Contracts
                                                                      Internet web portals

    Purchase Orders

         Business to                                                         Secure email
         business…
           Other                                                          Other solutions
         documents

                        0% 10% 20% 30% 40% 50% 60% 70% 80% 90%                               0% 10% 20% 30% 40% 50% 60% 70% 80% 90%


Slide 27 , 18/04/2013                                                                                       WWW.EID-SSEDIC.EU
Secure Electronic Document Exchange

      Problems encountered (N=116)                                     Would you increase electronic
                                                                      documents exchange if you had
     I have never encountered any problem     Problems encountered
                                                                           a secure electronic
                  51%                               49%
                                                                            address?(N=116)

                           Problems encountered
                                                                            Yes

       Problems related to spam and                                         No
              spam filtering
      Poor traceability/unclear status                                      I already have a secure electronic
               of transaction                                               address linked to my company eID

         Problems identifying the                                                   15%
      sender of a document received

       Denial of delivery by recipient                                                                     53%
                                                                          32%

          Delivery to wrong recipient

                        Other problems

                                         0%   10%         20%   30%


Slide 28 , 18/04/2013                                                                          WWW.EID-SSEDIC.EU
CONCLUSIONS




Slide 33 , 18/04/2013                 WWW.EID-SSEDIC.EU
CONCLUSIONS: Use of eID

   •    Most frequent – user ID/password credential mostly obtained to
                 • create an email account
                 • become a member of a social network
                 • to purchase goods or services online


   •    Username/password credential connected to a card (e.g. bank payment card
        or smart card used for public transportation) used by 76%

   •    Progress of SIM card/Mobile related eID
          – 3 times more use of these credentials on daily basis then registered one year ago
            for the expert panel


   •    Hardware devices (including code-generating tokens, SIM card mobile
        devices, and card readers with PIN verification) usually obtained for eBanking

   •    Low use of more sophisticated identification methods based on
        PKI, hardware devices, and biometrics
Slide 34 , 18/04/2013                                                        WWW.EID-SSEDIC.EU
CONCLUSIONS: Opinions on eID Regulation


   • Importance of public sector involvement
          – EU regulation needed
          – Governments should ensure the acceptance of eID
                 • in other member states
                 • both for public and private services




Slide 36 , 18/04/2013                                         WWW.EID-SSEDIC.EU
CONCLUSIONS: eID Federation and Privacy

   • privacy concerns of users
          – Need for specific privacy protection rules in the future


   • Respondents not willing to use the eID federation
          – Reason: reluctant to provide information about the service used to
            3rd party
          X
          – majority would support eID federation in case they can foresee
            positive effects


   •    right to online anonymity is preferred



Slide 38 , 18/04/2013                                              WWW.EID-SSEDIC.EU
SSEDIC 2012 eID Survey




         Thank you for your attention.




                              Jiri Bouchal (IS-practice)
                              jiri-bouchal@is-practice.eu


Slide 40 , 18/04/2013                              WWW.EID-SSEDIC.EU

More Related Content

Similar to SSEDIC 2012 eID adoption survey - TDL conference Brussels 18.04.13

Biometric Based Human Recognition Systems for Institutions using Exeat Monito...
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...Biometric Based Human Recognition Systems for Institutions using Exeat Monito...
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...ijtsrd
 
IRJET- Student Teacher Integrated Network Ground – “S.T.I.N.G”
IRJET- Student Teacher Integrated Network Ground – “S.T.I.N.G”IRJET- Student Teacher Integrated Network Ground – “S.T.I.N.G”
IRJET- Student Teacher Integrated Network Ground – “S.T.I.N.G”IRJET Journal
 
IRJET- IoT Enabled Children Safety System
IRJET- IoT Enabled Children Safety SystemIRJET- IoT Enabled Children Safety System
IRJET- IoT Enabled Children Safety SystemIRJET Journal
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door SystemIRJET Journal
 
EDPC Ministerial-Digitalisation.pptx
EDPC Ministerial-Digitalisation.pptxEDPC Ministerial-Digitalisation.pptx
EDPC Ministerial-Digitalisation.pptxEduSkills OECD
 
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...IRJET Journal
 
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...IRJET Journal
 
Authentication means in electronic environments
Authentication means in electronic environmentsAuthentication means in electronic environments
Authentication means in electronic environmentsStevenSegaert
 
Digital fun fair brochure
Digital fun fair brochureDigital fun fair brochure
Digital fun fair brochureDigital Hub
 
Internet Fundraising (International FR Festival, Prague)
Internet Fundraising (International FR Festival, Prague)Internet Fundraising (International FR Festival, Prague)
Internet Fundraising (International FR Festival, Prague)Igor Polakovic
 
IDGate: One Solution for All EKYC Needs
 IDGate: One Solution for All EKYC Needs  IDGate: One Solution for All EKYC Needs
IDGate: One Solution for All EKYC Needs Nadine A. Jaafar
 
Smatcard documentation
Smatcard documentationSmatcard documentation
Smatcard documentationBhadra Gowdra
 
Mobile learning presentation for the 4t Virtual Conference 2012
Mobile learning presentation for the 4t Virtual Conference 2012Mobile learning presentation for the 4t Virtual Conference 2012
Mobile learning presentation for the 4t Virtual Conference 2012Jackie Gerstein, Ed.D
 
SurveySwipe Webinar - Jan 11
SurveySwipe Webinar - Jan 11SurveySwipe Webinar - Jan 11
SurveySwipe Webinar - Jan 11Vivek Bhaskaran
 

Similar to SSEDIC 2012 eID adoption survey - TDL conference Brussels 18.04.13 (20)

ICT and Citizenship
ICT and CitizenshipICT and Citizenship
ICT and Citizenship
 
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...Biometric Based Human Recognition Systems for Institutions using Exeat Monito...
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...
 
IRJET- Student Teacher Integrated Network Ground – “S.T.I.N.G”
IRJET- Student Teacher Integrated Network Ground – “S.T.I.N.G”IRJET- Student Teacher Integrated Network Ground – “S.T.I.N.G”
IRJET- Student Teacher Integrated Network Ground – “S.T.I.N.G”
 
Acl esafety awareness
Acl esafety awarenessAcl esafety awareness
Acl esafety awareness
 
IRJET- IoT Enabled Children Safety System
IRJET- IoT Enabled Children Safety SystemIRJET- IoT Enabled Children Safety System
IRJET- IoT Enabled Children Safety System
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door System
 
5 nov gsma_eema
5 nov gsma_eema5 nov gsma_eema
5 nov gsma_eema
 
EDPC Ministerial-Digitalisation.pptx
EDPC Ministerial-Digitalisation.pptxEDPC Ministerial-Digitalisation.pptx
EDPC Ministerial-Digitalisation.pptx
 
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
 
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
 
E-Safety
E-SafetyE-Safety
E-Safety
 
Authentication means in electronic environments
Authentication means in electronic environmentsAuthentication means in electronic environments
Authentication means in electronic environments
 
Digital fun fair brochure
Digital fun fair brochureDigital fun fair brochure
Digital fun fair brochure
 
Chris elmitt
Chris elmittChris elmitt
Chris elmitt
 
Internet Fundraising (International FR Festival, Prague)
Internet Fundraising (International FR Festival, Prague)Internet Fundraising (International FR Festival, Prague)
Internet Fundraising (International FR Festival, Prague)
 
IDGate: One Solution for All EKYC Needs
 IDGate: One Solution for All EKYC Needs  IDGate: One Solution for All EKYC Needs
IDGate: One Solution for All EKYC Needs
 
Smatcard documentation
Smatcard documentationSmatcard documentation
Smatcard documentation
 
Mobile learning presentation for the 4t Virtual Conference 2012
Mobile learning presentation for the 4t Virtual Conference 2012Mobile learning presentation for the 4t Virtual Conference 2012
Mobile learning presentation for the 4t Virtual Conference 2012
 
Sharing best practices for success
Sharing best practices for successSharing best practices for success
Sharing best practices for success
 
SurveySwipe Webinar - Jan 11
SurveySwipe Webinar - Jan 11SurveySwipe Webinar - Jan 11
SurveySwipe Webinar - Jan 11
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

SSEDIC 2012 eID adoption survey - TDL conference Brussels 18.04.13

  • 1. uropean Digital Community Thematic aNetwork for European e-ID Building Thematic Network for European e-ID eID Adoption Survey 2012 Jiri Bouchal (IS-practice) – jiri-bouchal@is-practice.eu Slide 1 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 2. SSEDIC 2012 eID Adoption Survey A detailed online survey to collect information about: • use of electronic identity by the internet users • opinions on eID regulation, eID use, eID federation, and privacy issues Slide 2 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 3. Survey Conditions • Four language versions • Survey distribution – via different networks in IT, consultancy, public sector, university sector etc. – via social networks and mailing lists of the SSEDIC partners • Sample – 1000 respondents • Field open October 19 – end of December 2012 Slide 4 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 4. Sample Composition & Internet Use Profile Slide 6 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 5. Sample Composition Country of residence Language version of the survey European Union Other countries English Français Deutsch Español 3% 14% 15% 15% 68% 85% Slide 7 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 6. Sample Composition Gender Education Male Female Primary or secondary education Higher education 10% 28% 72% 90% Age Y1 Comparison less than 34 35-54 55+ - more women - more respondents with 18% 25% lower education 57% Slide 8 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 7. Sample Composition Field of professional activity (N=713) Student 0% 2% 3% 5% Public sector: administration, education etc. 21% 31% IT industry (software, hardware, services…) Private sector outside of the IT industry Unemployed 38% Retired Other Slide 9 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 8. Internet Use Profile Internet access frequency and devices used Not once At least once,but not every month At least once a month, but not every week At least once a week, but not every day Every day or almost every day Desktop, Laptop or Tablet PC at work Desktop, Laptop or Tablet PC at home Laptop or Tablet PC “on the road” using Wifi or Mobile connection Using Internet applications on your Smartphone: mail, webbrowser, Internet Voice communication… 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Slide 10 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 9. Use of electronic Identity Slide 12 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 10. Use of Electronic Identity – Y1 Survey Comparison ... on a daily basis ... at least once a week ... at least once a month Username and password indicating my real identity YEAR 1 Expert Survey Result Username and password connected to a card (e.g. bank… YEAR 1 Expert Survey Result A “Nickname” not indicating my real name and password used… YEAR 1 Expert Survey Result An eID supported by a hardware device: a chip card/reader… YEAR 1 Expert Survey Result An eID supported by a hardware device: a One Time Password… YEAR 1 Expert Survey Result An eID supported by a hardware device: a SIM card/mobile… YEAR 1 Expert Survey Result 0% 10% 20% 30% 40% 50% 60% 70% 80% Slide 14 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 11. Origin of eID Credentials Obtained to create my e-mail Username and password covering my real identity account A “Nickname” not indicating my real name and password Obtained to purchase goods or services for one or more eCommerce websites Obtained as member of a social An eID supported by a hardware device: a chip card/reader network combination protected by PIN code These credentials represent the official eID in my country issued by the government An eID embedded in a public register (PKI) which in combination with eSignature allows to electronically sign … Obtained as an eBanking client An eID supported by a hardware device: a SIM card/mobile device combination Obtained in the context of my An eID supported by a hardware device: a One Time professional activities and used Password device for professional and private activities An eID supported by biometric information (fingerprint, iris Obtained in the context of my scan...). professional activities and ONLY used for professional activities 0% 10% 20% 30% 40% 50% Slide 15 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 12. Reasons for Not Using Some eID Types ….I’m not aware of the Username and password covering my real identity existence of these tools A “Nickname” not indicating my real name and password …I don’t believe these Username and password connected to a card (e.g. bank tools are technically payment card, frequent flyer card or smart card used secure for public transportation), verified by a 3rd party An eID supported by a hardware device: a chip …I don’t need these card/reader combination protected by PIN code tools User ID and password which are in addition verified by a number from a list of randomly generated numbers (“tokens”). …these tools are to An eID embedded in a public register (PKI) which in complicated for me combination with eSignature allows to electronically sign documents. An eID supported by a hardware device: a SIM …I don’t TRUST the card/mobile device combination issuers of these tools An eID supported by a hardware device: a One Time when they belong to Password device the PUBLIC sector …I don’t TRUST the An eID supported by biometric information issuers of these tools (fingerprint, iris scan...). when they belong to the PRIVATE sector 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Slide 16 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 13. Cross-Border Use of eID Online cross-border purchasing of goods and services (N=696) Yes. No, I don’t have a need to order goods or services from another member state. No, I do not trust merchants outside my country, because I think my rights as a consumer are not protected then. I can’t tell whether an Internet transaction I do is an international, cross-border transaction or not. 75% 15% 4% 5% Online cross-border money transfers (N=696) Yes, at least once a week. Yes, at least once a month. Yes, at least once a year. Sometimes, less than once a year. No, I never had a need to transfer money to another member state. No, I do not trust cross-border online money transfers. No, I do not trust online money transfers at all, I prefer to make the transaction in my bank personally. No, I am not aware of such online tools. 1% 2% 4% 19% 28% 18% 24% 4% Slide 17 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 14. E-Signature Use Slide 18 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 15. E-Signatures Possession of eSignature (N=713) Legal Qualification of eSignature (N=371) Yes No Don't know Yes 5% No I don’t know whether my eSignature is qualified 12% 43% 52% 14% 74% Use of eSignature (N=371) Signing a declaration for a public service (e.g. online tax-… Signing a registered mail Confirming an eBanking or eCommerce transaction Signing an order, invoice or other procurement message Signing a contract Other 0% 10% 20% 30% 40% 50% 60% Slide 19 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 16. E-Signature Technology A signature key stored on a smartcard with signing software to sign standard office documents (e.g. pdf, MS office, Open Office, e-mails…) A signature key stored on the desktop with signing software to sign standard office documents (e.g. pdf, MS office, Open Office, e-mails…) A signature key stored on a local server with signing software to sign standard office documents (e.g. pdf, MS office, Open Office, e-mails…) A signature key stored on a remote server or supported by a remote server which is used through a mobile device (such as a mobile phone or tablet pc) A signature key stored on a remote server with signing software to sign most of the standard office kind of documents (pdf, MS office, Open Office, e-mails…) Signing in connection with legacy applications such as accounting, ERP or procurement systems with signing of structured information such as XML or EDIFACT documents… 0% 10% 20% 30% 40% 50% Slide 20 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 17. Respondents Opinions 1) EU and National Regulation of eID 2) eID Federation and Cross-Sector Use 3) Privacy Issues Slide 21 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 18. Opinions on eID Regulation Need for EU regulation of eID (N=694) Yes, this is typically a task of European regulation. No, this needs to be addressed by each member state separately. No, leave this to the private sector. No opinion on this issue. 78% 7% 6% 9% Usefulness of EU proposals on eID and digital signature (N=692) Yes, they will really help. They may marginally help. No, I do not expect they will help. No opinion on this issue. 51% 27% 9% 12% Slide 22 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 19. Opinions on eID Regulation Need for eGovernment eID which can be used cross-border (N=686) Yes, this is absolutely necessary. Not necessarily, this is no core task of the government. Not at all, I prefer to maintain separate electronic identities for each Member State. Not at all, this is a task for the private sector. No opinion on this issue. 67% 16% 7% 2% 8% Need for cross-border eID to access private services (N=684) Yes, this is absolutely necessary. Not necessarily, this is no core task of the government. Not at all, this is a task for the private sector. No opinion on this issue. 55% 26% 10% 9% Slide 23 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 20. Federation and Cross-Sector Use of eID eID federation use (N=700) Yes, I use it always because it makes the log-in easier. Yes, but I use it only when I see possible benefit of sharing eIDs between both services. Yes, but I use it rarely. Never, I do not want to provide information about what service I use to another company. Never, I have never heard of it. No opinion on this issue. 10% 17% 18% 45% 6% 5% Opinion on future cross-sector use of eID (N=700) The only way forward. Can have some positive effects. Not a good idea. No opinion on this issue. 23% 44% 25% 9% Slide 24 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 21. Privacy Issues Need for specific privacy rules for companies holding significant identity information (N=696) Yes, specific regulation and control is necessary. No, specific rules are not required, other than already existing general privacy protection rules. Not at all, this is a normal evolution, every one gives this information on a voluntarily basis. No opinion on this issue. 82% 11% 3% 4% Right to online anonymity (N=696) Yes, in fact, anonymous access must be the rule; only in exceptional cases “strong identification” can be requested Yes, in certain circumstances anonymity is preferable Yes, but anonymity must be “conditional”, can be lifted by court order for example (when criminal acts are involved) No, anonymity must be the exception No, all online actions must be traceable and identifiable so that people can be held responsible No opinion on this issue. 34% 27% 28% 4% 4% 4% Slide 25 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 22. Secure Electronic Document Exchange Slide 26 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 23. Secure Electronic Document Exchange Internet exchange of sensitive documents (N=133) 12% Yes, I exchange sensitive documents via Iternet No, I do not 88% Types of sensitive documents exchanged Technical solutions used (N=116) Invoices Regular email Contracts Internet web portals Purchase Orders Business to Secure email business… Other Other solutions documents 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Slide 27 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 24. Secure Electronic Document Exchange Problems encountered (N=116) Would you increase electronic documents exchange if you had I have never encountered any problem Problems encountered a secure electronic 51% 49% address?(N=116) Problems encountered Yes Problems related to spam and No spam filtering Poor traceability/unclear status I already have a secure electronic of transaction address linked to my company eID Problems identifying the 15% sender of a document received Denial of delivery by recipient 53% 32% Delivery to wrong recipient Other problems 0% 10% 20% 30% Slide 28 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 25. CONCLUSIONS Slide 33 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 26. CONCLUSIONS: Use of eID • Most frequent – user ID/password credential mostly obtained to • create an email account • become a member of a social network • to purchase goods or services online • Username/password credential connected to a card (e.g. bank payment card or smart card used for public transportation) used by 76% • Progress of SIM card/Mobile related eID – 3 times more use of these credentials on daily basis then registered one year ago for the expert panel • Hardware devices (including code-generating tokens, SIM card mobile devices, and card readers with PIN verification) usually obtained for eBanking • Low use of more sophisticated identification methods based on PKI, hardware devices, and biometrics Slide 34 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 27. CONCLUSIONS: Opinions on eID Regulation • Importance of public sector involvement – EU regulation needed – Governments should ensure the acceptance of eID • in other member states • both for public and private services Slide 36 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 28. CONCLUSIONS: eID Federation and Privacy • privacy concerns of users – Need for specific privacy protection rules in the future • Respondents not willing to use the eID federation – Reason: reluctant to provide information about the service used to 3rd party X – majority would support eID federation in case they can foresee positive effects • right to online anonymity is preferred Slide 38 , 18/04/2013 WWW.EID-SSEDIC.EU
  • 29. SSEDIC 2012 eID Survey Thank you for your attention. Jiri Bouchal (IS-practice) jiri-bouchal@is-practice.eu Slide 40 , 18/04/2013 WWW.EID-SSEDIC.EU

Editor's Notes

  1. The fundamental goal of this eID survey was to collect the information about the use of electronic identity (eID) by the European general public and about its opinions on eID regulation, use, and privacy issues.The Year 2 eID Adoption Survey is a continuation of the Year 1 eID Adoption Survey (Nov 2011). Year 2 survey modified to make it comprehensive for non-experts and to reach for a wider public Approach, structure and the user profile kept - possible to compare the Year 1 and Year 2 results
  2. 95% use the Internet on daily basis for professional purposes such as checking e-mail or searching information. Social networks are visited by almost 60% of users on daily or weekly basis (34% daily). Approximately the same amount of respondents, with only a little lower frequency, uses the Internet regularly to administer their bank account via the Internet banking. Most of the people do that on weekly rather than on daily basis.Half of the respondents use the Internet daily or weekly to watch online videos or TV, listen to online music or radio streaming, download movies or music etc.Active participation at discussions and blogs, posting opinions at news websites, Twitter etc. is the daily or weekly activity for 30% of respondents Almost 60% of respondents access the Internet for the online shopping at least once a month.Quite surprisingly, only 5% of respondents do not purchase goods or services online at all. The use of online auction sites as eBay is considerably lower, with only 20% purchasing at such websites at least monthlyphone or webcam video calls -56% of respondents at least once a month.The lowest frequency of the Internet use was found out in the case of online gaming and downloading computer and video games (This result can be influenced by the very low representation of younger Internet users)
  3. Use of Electronic IdentityThe most frequently used credentials are the traditional and relatively weak user ID/password based credentials for accessing websites. Username and password connected to a card (e.g. bank payment card or smart card used for public transportation) with the personal information verified by a 3rd party is used by the 76% of respondents.A considerable number of respondents do not or rarely use the more sophisticated identification methods based on biometrics, PKI and hardware devices. The username/password credentials are mostly obtained to create an email account, to become a member of a social network, or to purchase goods or services online. An other interesting finding is the progress in one year time what concerns SIMcard/Mobile related eID’s: actually 3 times more use of these credentials on daily basis then registered one year ago for the expert panel.Hardware devices, including code-generating tokens, SIM card mobile devices, and card readers with PIN verification, are usually obtained for eBanking purposes.The use of PKI infrastructures (allowing to sign documents electronically with eSignature) are mostly connected to the official government issued eIDs.The most common reason for not possessing or hardly using the listed types of eID credentials was no need to use these tools, followed by disbelief that these tools are technically secure and lack of trust in the issuers of these tools.
  4. Cross-border use of eID: Online Shopping and Money TransfersThe surprisingly large majority of survey participants (75%) buy goods or services via the Internet from other countries.A 51% majority of respondents makes online money transfers to other EU member state (e.g via online banking or other payment services such as PayPal) at least once a year and additional 18% make such payments less frequently.
  5. Opinion on Electronic Identity regulationThe respondents clearly expressed the importance of public sector involvement in the eID regulation. The clear majority thinks that the regulation on the European level is needed and expects the new EU proposals to help with eID take-up and its wider use. The respondents would also like their governments to ensure the use and acceptance of their eID in other MS to online access both public and private services (the majority is more distinct in the case of eGovernment services). The Y1 expert survey brought similar results with even higher support for the eID legal framework on the EU level and clear statement that digital identities should be interoperable across borders. Consistently with the Y2 findings, the experts stress the importance of public sector involvement to stimulate the use of eID both in the public and private sector.
  6. eID federation and Privacy IssuesThe respondents are well aware of privacy concerns of the Internet and eID use and would like to see specific privacy protection rules in the future. ¨They are usually not willing to use the eID federation because they do not want to provide information about what service they use to another company (3rd party) unless it is necessary. However, the majority of respondents would support the eID federation in case they can foresee future positive effects and user scenarios that would make their online transactions easier and more transparent. The right to online anonymity is preferred by a large majority and shall be lifted only under certain circumstances (such as criminal acts). These findings are in line with the privacy recommendation of eID experts in the SSEDIC Y1 survey.
  7. Secure Electronic Document Exchange and Digital Identity Replies in this section prove that there are still many problems and security issues in the field of electronic documents exchange. The regular email is the most used communication tool to exchange sensitive electronic documents. Most of the respondents would increase their sensitive online communication if they had a secure electronic address linked to their company eID. The future potential for the take-up of eID and eSignature seems to be obvious in this domain.