Designing an Effective Long-Term Identity Management Strategy for a Mature e-State

  • Silvia LipsEmail author
  • Krista Aas
  • Ingrid Pappel
  • Dirk Draheim
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11709)


Countries that have a well-functioning e-governance ecosystem (infrastructure, processes, interoperability network, user-friendly e-services etc.) reach a particularly high e-governance maturity level. To ensure continuous development and adoption to the changing technological environment the systematic consideration of users’ needs is important in the definition of long-term strategical goals. Identity management is a corner stone of each mature e-governance ecosystem. This paper focuses on the process of creating the new Estonian strategy for identity management and identity documents and the analysis of this process from different aspects (responsibilities, engaged stakeholders and interest groups, key competences, scope, implementation). In addition, we give an overview of the underlying strategical and legal regulatory framework. The objective is to map the best practices and bottlenecks of the strategy creation process and propose a model for area specific long-term strategical documents. We aim at understanding best practices and bottlenecks in the process of creating the ID strategy. In service of this, we have conducted qualitative interviews with several high-ranking experts that have been involved as stakeholders in the strategy building process. Based on this, we propose a model for area-specific long-term strategical documents. Furthermore, the research results indicate that it is necessary to invest continuously into public-private partnership.


Identity management Strategy building Electronic identity Change management 


  1. 1.
    e-Estonia Briefing Centre Homepage. Accessed 21 Feb 2019
  2. 2.
    Laurent, M., Bouzefrane, S., Pomerol, J.: Digital Identity Management. ISTE Press, London (2015)Google Scholar
  3. 3.
    Identity Management and Identity Documents. White Paper 1.0. Accessed 13 Mar 2019
  4. 4.
    Identity Documents Act. Accessed 13 Mar 2019
  5. 5.
    Peppard, J., Ward, J.: The Strategic Management of Information Systems, 4th edn. Wiley, Hoboken (2016)Google Scholar
  6. 6.
    Muldme, A., Pappel, I., Lauk, M., Draheim, D.: A survey on customer satisfaction in national electronic ID user support. In: Terán, L., Meier, A. (ed.) Piscataway 5th International Conference on eDemocracy & eGovernment (ICEDEG), Piscataway, NJ, Quito, pp. 31–37 (2018)Google Scholar
  7. 7.
    Petersson, A., Lundberg, J.: Applying action design research (ADR) to develop concept generation and selection methods. In: Wang, L., Kjellberg, T. (eds.) Procedia 26th CIRP Design Conference, vol. 50, pp. 222–227. Elseiver, Amsterdam (2016)Google Scholar
  8. 8.
    Tsap, V., Pappel, I., Draheim, D.: Key success factors in introducing national e-identification systems. In: Dang, T.K., Wagner, R., Küng, J., Thoai, N., Takizawa, M., Neuhold, E.J. (eds.) FDSE 2017. LNCS, vol. 10646, pp. 455–471. Springer, Cham (2017). Scholar
  9. 9.
    Cameron, E., Green, M.: Making Sense of Change Management, 4th edn. Kogan Page Limited, London (2015)Google Scholar
  10. 10.
    Paide, K., Pappel, I., Vainsalu, H., Draheim, D.: On the systematic exploitation of the Estonian data exchange layer X-road for strengthening public private partnerships. In: Kankanhalli, A., Ojo, A., Soares, D. (eds.) 11th International Conference on Theory and Practice of Electronic Governance, ICEGOV 2018, pp. 34–41. ACM Press, Galaway (2018)Google Scholar
  11. 11.
    Development Plans. Accessed 24 Feb 2019
  12. 12.
  13. 13.
    Estonian Information Society Development Plan. Accessed 25 Feb 2019
  14. 14.
    Järvsoo, M., Norta, A., Tsap, V., Pappel, I., Draheim, D.: Implementation of information security in the EU information systems. In: Al-Sharhan, S.A., et al. (eds.) I3E 2018. LNCS, vol. 11195, pp. 150–163. Springer, Cham (2018). Scholar
  15. 15.
    Electronic Identification and Trust Services for Electronic Transactions Act. Accessed 30 Mar 2019
  16. 16.
    Lips, S., Pappel, I., Tsap, V., Draheim, D.: Key factors in coping with large-scale security vulnerabilities in the eID field. In: Kő, A., Francesconi, E. (eds.) EGOVIS 2018. LNCS, vol. 11032, pp. 60–70. Springer, Cham (2018). Scholar
  17. 17.
    E-Eesti nõukogu toetas ID-kaardi ja eidentiteedi 10 aasta arenguplaani. Accessed 24 Feb 2019
  18. 18.
    CAB Forum Homepage. About the CA/Browser Forum - CAB Forum. Accessed 13 Mar 2019
  19. 19.
    APMG-international: Effective Change Manager’s Handbook - Essential guidance to the change management body of knowledge, 1st ed. Kogan Page Limited, London (2015)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Silvia Lips
    • 1
    Email author
  • Krista Aas
    • 2
  • Ingrid Pappel
    • 1
  • Dirk Draheim
    • 1
  1. 1.Tallinn University of TechnologyTallinnEstonia
  2. 2.Estonian Police and Border Guard BoardTallinnEstonia

Personalised recommendations