Electronic Identification (E-ID)

Total Page:16

File Type:pdf, Size:1020Kb

Electronic Identification (E-ID) EXPLAINING INTERNATIONAL IT APPLICATION LEADERSHIP: Electronic Identification Daniel Castro | September 2011 Explaining International Leadership: Electronic Identification Systems BY DANIEL CASTRO SEPTEMBER 2011 ITIF ALSO EXTENDS A SPECIAL THANKS TO THE SLOAN FOUNDATION FOR ITS GENEROUS SUPPORT FOR THIS SERIES. SEPTEMBER 2011 THE INFORMATION TECHNOLOGY & INNOVATION FOUNDATION | SEPTEMBER 2011 PAGE II TABLE OF CONTENTS Executive Summary ........................................................................................................ V Introduction..................................................................................................................... 1 Background ....................................................................................................................... 1 Box 1: Electronic Passports ............................................................................................. 3 Terminology and Technology ........................................................................................... 3 Electronic Signatures, Digital Signatures and Digital Certificates ............................... 3 Identification, Authentication and Signing ................................................................ 4 Benefits of e-ID Systems ............................................................................................ 5 Electronic Identification Systems: Deployment and Use .............................................. 6 Country Profiles .............................................................................................................. 9 Austria ............................................................................................................................... 9 Belgium ........................................................................................................................... 10 Denmark ......................................................................................................................... 12 Estonia ............................................................................................................................ 13 Malaysia .......................................................................................................................... 16 Norway ........................................................................................................................... 18 Sweden ............................................................................................................................ 19 Turkey ............................................................................................................................ 21 United States ................................................................................................................... 21 Box 2: U.S. Federal Government Electronic Identity Management Efforts ............... 22 Lessons from Early Adopters ......................................................................................... 25 Legal Framework for Electronic Signatures ...................................................................... 26 Cultural and Historical Factors ........................................................................................ 30 Country Demographics ........................................................................................... 30 National Registries .................................................................................................. 31 National Identification Card ................................................................................... 32 Organizational Issues ....................................................................................................... 33 The Degree of Centralization or Decentralization .................................................... 33 Entity Leading the Design and Implementation ...................................................... 33 Policy Issues .................................................................................................................... 34 Replacement of Existing ID Cards ........................................................................... 34 Government Programs to Spur Demand and Increase Use....................................... 34 THE INFORMATION TECHNOLOGY & INNOVATION FOUNDATION | SEPTEMBER 2011 PAGE III Public or Private Solution ........................................................................................ 35 Technology Issues............................................................................................................ 37 Form of e-ID ........................................................................................................... 37 Open Platform ........................................................................................................ 38 Use of Biometrics .................................................................................................... 38 Interoperability ........................................................................................................ 39 Affordability of e-ID Card ....................................................................................... 39 Privacy ............................................................................................................................ 41 Privacy-Enhancing Policies ...................................................................................... 42 Privacy-Enhancing Technologies ............................................................................. 43 Recommendations for the United States ...................................................................... 46 Create an e-ID implementation plan with broad input from all stakeholders, including the private sector ................................................................................................................... 47 Build an e-ID framework that supports both current and emerging technologies ............. 48 Use government to increase both supply and demand for e-IDs ....................................... 48 Design an e-ID solution that maximizes utility for both users and service providers ......... 50 Ensure that privacy does not come at the expense of eliminating useful information from the information economy ................................................................................................ 52 Strive for disruptive innovation, not just incremental innovation ..................................... 52 Ensure that e-ID solutions are accessible and available to all individuals .......................... 53 Design an e-ID system for the global digital economy ..................................................... 54 Endnotes ........................................................................................................................ 55 Acknowledgements ........................................................................................................ 56 About The Author ......................................................................................................... 56 About ITIF .................................................................................................................... 56 THE INFORMATION TECHNOLOGY & INNOVATION FOUNDATION | SEPTEMBER 2011 PAGE IV EXECUTIVE SUMMARY Identification is routinely used to help facilitate commercial and government transactions, such as taking out a loan or applying for government benefits. While individuals can use traditional forms of identification in face-to-face transactions, these forms of identification are less useful for conducting business on the Internet. To address this challenge, many governments are creating national electronic identification (e-ID) systems—a collection of technologies and policies that enable individuals to electronically prove their identity or an attribute about their identity to an information system. This report reviews the programs and practices of some of the countries with the most advanced and widely deployed national e-ID systems. It highlights the successes and failures of different approaches and focuses on the lessons that policymakers, particularly in the United States, can learn from nations that have begun adopting and using e-ID systems. National e-ID systems offer a variety of benefits for individuals, businesses and governments. These systems can help reduce identity theft and enable individuals to use online applications more securely in a variety of industries such as health care and banking. Individuals can use an e-ID to authenticate to online services, securely communicate online, purchase goods and services, and create legally-binding electronic signatures, such as to sign a contract. Businesses can use identity management functions to better interact with their customers on the Internet, such as to authenticate users to online applications or to verify the ages of their customers. Finally, government can use e-IDs to streamline e- government services, allow individuals to sign and submit forms online, and offer innovative services. Many European countries have been investing in national e-ID systems, as have countries in the Middle East and Asia. While no country has achieved universal deployment and use of a national e-ID system, some countries have made more progress than others. At present the clear leader is Estonia, which has issued approximately 1.2 million e-ID smartcards to an eligible population of 1.3 million citizens (i.e. individuals age fifteen
Recommended publications
  • A Secure and Flexible Server-Based Mobile Eid and E-Signature Solution
    ICDS 2014 : The Eighth International Conference on Digital Society A Secure and Flexible Server-Based Mobile eID and e-Signature Solution Christof Rath, Simon Roth, Manuel Schallar and Thomas Zefferer Institute for Applied Information Processing and Communications Graz University of Technology Graz, Austria Email: {first name}.{last name}@iaik.tugraz.at Abstract—In our digital society, e-government, e-commerce, and Transactional online services from the e-government do- e-business are increasingly gaining importance. Many services main and related fields of application typically require reliable of these domains rely on reliable user authentication and remote identification and authentication of users. Given the electronic signatures. For many years, smart cards have been the obvious drawbacks of password-based eID and authentica- technology of choice to implement eID and e-signature solutions. tion schemes in terms of security, two-factor authentication Recently, mobile eID and e-signature solutions have emerged schemes have been developed for applications with high secu- as an attractive alternative, as they provide better usability compared to smart card based approaches while maintaining rity requirements such as transactional e-government services. the same level of security. Unfortunately, most current mobile Current two-factor authentication schemes typically comprise eID and e-signature solutions are tailored to the needs of specific the authentication factors possession and knowledge. application scenarios and hence cannot easily
    [Show full text]
  • Tax Identification Number Reference Guide
    Tax Identification Number (TIN). Reference Guide. The following are examples of TINs from some of the countries where our customers may have foreign tax residency. China India TIN on Certificate of Tax Registration Permanent Account TIN on Business Licence Number (PAN) (Credibility Code) TIN on Identification Card United Kingdom New Zealand Unique Taxpayer Reference Inland Revenue Number (UTR) Department Number (IRD) National Insurance Number (NINO) Korea Brazil MINISTERIO´ DA FAZENDA Resident Registration Secretaria da Receita Federal Number (RRN) Cadastro CPFde Pessoas F’sicas Numero de Inscri ‹o Cadastro de Pessoas 000.000.000-00 JUAN FAZENDA Nome 12.345.888/8888-24 Fisicas (CPF) NOME DA PESSOA Nascimento 01/01/1990 Cadastro Nacional da Pessoa Juridica (CNPJ) Phillipines REPUBLI C OF TH E P HILIPPINE S Malaysia DEPARTMENT OF FINANCE BUREAU OF INTERNAL REVENUE TIN Tax Payer 456-888-888-00000 DIREKTORAT JENDERAL PAJAK CRUZ, BAYANI Identification Number 10 REYES COMPOUND KALAYAAN SUBDIVISION, MUNTINLUPA CITY Nombor Cukai NPWP : 27.938.653.5-024.00 0 BIRTHDA TE ISSUE DATE Pendapatan (NPWP) RAHMAN EK A PUTR A 03/08/1981 1/27/1999 JL.KELAP A DUA NO. 18 RT.006/00 6 KELAP A DUA - KEBON JERU K JAKA RTA BAR AT 911550 ) TGL TERDAFT AH 06-10-200 5 Tax Identification Number (TIN). Reference Guide. The following are examples of TINs from some of the countries where our customers may have foreign tax residency. Canada USA Social Insurance Number (SIN) Social Security Number Business Number (BN) Indonesia Pakistan KEMENTERIAN KEUANGAN REPUBLIK INDONESIA DIREKTORAT JENDERAL PAJAK KEMENTERIAN KEUANGAN REPUBLIK INDONESIA National Tax NPWP : 31.806.502.6-422.000DIREKTORAT JENDERAL PAJAK NPWP : 31.806.502.6-422.000 Number (NTN) NAMA NAM: AMAHY: MAHYADI PANGGABEAN PANGGABEAN Nomor Pokok Wajib NIK : - NIK ALAM: AT- : JL.TERUSAN PASIRKOJA BELAKANG NO.130 RT 006 RW 001 Pajak (NPWP) JAMIKA-BOJONG LOA KALER BANDUNG ALAMAT KPP: JL.TERUSAN: 422 PASIRKOJA BELAKANG NO.130 RT 006 RW 001 JAMIKA-BOJONG LOA KALER BANDUNG KPP : 422 Singapore South Africa REPUBLIC OF SINGAPO RE IDENTITY CARD NO .
    [Show full text]
  • Application Guideline for Etsi's Mss Standards: V2.2
    FICOM’S (THE FINNISH FEDERATION FOR TELECOMMUNICATIONS AND TELEINFORMATICS) APPLICATION GUIDELINE FOR ETSI’S MSS STANDARDS: V2.2 2014-03-24 Version Description 1.0 Original version. 1.1 The MSS_Signature element required by WSDL has been added to the message format description and message examples (also missing from the ETSI TS 102 204 examples). WSDL added to the references. Support for organisation certificates added to SignatureProfile. 1.2 Added support for messaging mode ”asynchronous client-server”. Added support for operation MSS_StatusQuery. Added support for test certificates in SignatureProfile. Hash signs (#) omitted from the user experience. UserIdentifier element format corrected. The encoding of the DataToBeSigned element was corrected. It was emphasised that the event "number" begins either with a letter or an underscore (NCName). 2.0 Signature profiles were completely renewed. Position for value added service response messages was reserved in the StatusDetail element of signature responses. New value added services AE validation and PersonIdentity. Value added service SessionID renamed EventID. Support for the UserIdentifier element was omitted (replaced by the PersonIdentity service). The supported MSS_Format/MimeType/Encoding/SignatureProfi le combinations were written out. New MSS_Format PKCS1. 505 status code added for test identities. Added status code extensions (Appendix C). Synchronous messaging mode is not recommended. 2.1 Due to roadmap delays in MSSP implementations, some features from 2.0 have been tagged as “not supported in the current version”. Several errors corrected. Parameter min and max lengths defined more clearly. Excessive MimeType / Encoding combinations dropped. 2.2 Updated Chapter 5.1: Wait period for first status query reduced to 10 s.
    [Show full text]
  • TOWARDS BETTER PRACTICE in NATIONAL IDENTIFICATION MANAGEMENT (Guidance for Passport Issuing Authorities and National Civil Registration)
    TAG/MRTD/21-WP/4 International Civil Aviation Organization 22/11/12 Revised WORKING PAPER 05/12/12 English only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD) TWENTY-FIRST MEETING Montréal, 10 to 12 December 2012 Agenda Item 2: Activities of the NTWG TOWARDS BETTER PRACTICE IN NATIONAL IDENTIFICATION MANAGEMENT (Guidance for Passport Issuing Authorities and National Civil Registration) (Presented by the NTWG) 1. INTRODUCTION 1.1 At the Twentieth Meeting of the Technical Advisory Group on Machine Readable Travel Documents, held from 7 to 9 September 2011 (TAG/MRTD/20), the ICAO Secretariat presented TAG/MRTD/20-WP/5 on the Technical Report (TR) entitled Towards Better Practice in National Identification Management . This initiative has been led by the Secretariat within the framework of the NTWG, and presents an on-going work item to expand the relevance of the MRTD Programme to today’s travel document and border security needs. 1.2 The TAG/MRTD/20 acknowledged and supported the work done on evidence of identity in the Technical Report Towards Better Practice in National Identification Management , Version 1.0, and approved the continuation of the development of the report under the responsibility of the NTWG. 2. WORK DEVELOPMENT 2.1 A subgroup of the NTWG was formed to contribute and enhance the work achieved with the TR. A few members met in Fredericksburg on 24 to 25 May 2012, significantly progressing the development of the TR. Further exchanges were held during the NTWG meeting held in Zandvoort on 7 to 11 November 2011, and via electronic means throughout this process.
    [Show full text]
  • 42Genno44.Pdf
    U.S. Customs and Border Protection CBP Decisions [USCBP 2007–0061; CBP Dec. No. 08–26] RIN 1651–AA69 8 CFR Parts 212 and 235 DEPARTMENT OF STATE 22 CFR Parts 41 and 53 Documents Required for Travelers Departing From or Arriving in the United States at Sea and Land Ports-of-Entry From Within the Western Hemisphere AGENCIES: U.S. Customs and Border Protection, Department of Homeland Security; Bureau of Consular Affairs, Department of State. ACTION: Final rule. SUMMARY: This rule finalizes the second phase of a joint Depart- ment of Homeland Security and Department of State plan, known as the Western Hemisphere Travel Initiative, to implement new docu- mentation requirements for U.S. citizens and certain nonimmigrant aliens entering the United States. This final rule details the docu- ments U.S. citizens1 and nonimmigrant citizens of Canada, Ber- muda, and Mexico will be required to present when entering the United States from within the Western Hemisphere at sea and land ports-of-entry. DATES: This final rule is effective on June 1, 2009. FOR FURTHER INFORMATION CONTACT: Department of Homeland Security: Colleen Manaher, WHTI, Office of Field Operations, U.S. Customs and Border Protection, 1300 1 ‘‘U.S. citizens’’ as used in this rule refers to both U.S. citizens and U.S. non-citizen na- tionals. 1 2 CUSTOMS BULLETIN AND DECISIONS, VOL. 42, NO. 44, OCTOBER 23, 2008 Pennsylvania Avenue, NW., Room 5.4–D, Washington, DC 20229, telephone number (202) 344–1220. Department of State: Consuelo Pachon, Office of Passport Policy, Planning and Advisory Services, Bureau of Consular Affairs, tele- phone number (202) 663–2662.
    [Show full text]
  • Moldova Mobile ID Case Study, Washington, DC: World Bank License: Creative Commons Attribution 3.0 IGO (CC by 3.0 IGO)
    Public Disclosure Authorized Public Disclosure Authorized Moldova Mobile ID Public Disclosure Authorized Case Study id4d.worldbank.org Public Disclosure Authorized 44540_Moldova_CVR.indd 3 5/23/19 10:49 AM © 2018 International Bank for Reconstruction and Development/The World Bank 1818 H Street, NW, Washington, D.C., 20433 Telephone: 202-473-1000; Internet: www.worldbank.org Some Rights Reserved This work is a product of the staff of The World Bank with external contributions. The findings, interpretations, and conclusions expressed in this work do not necessarily reflect the views of The World Bank, its Board of Executive Directors, or the governments they represent. The World Bank does not guarantee the accuracy of the data included in this work. The boundaries, colors, denominations, and other information shown on any map in this work do not imply any judgment on the part of The World Bank concerning the legal status of any territory or the endorsement or acceptance of such boundaries. Nothing herein shall constitute or be considered to be a limitation upon or waiver of the privileges and immunities of The World Bank, or of any participating organization to which such privileges and immunities may apply, all of which are specifically reserved. Rights and Permission This work is available under the Creative Commons Attribution 3.0 IGO license (CC BY 3.0 IGO) http:// creativecommons.org/licenses/by/3.0/igo. Under the Creative Commons Attribution license, you are free to copy, distribute, transmit, and adapt this work, including for commercial purposes, under the following conditions: Attribution—Please cite the work as follows: World Bank.
    [Show full text]
  • Payroll Operations in the Americas
    Payroll Operations in the Americas — essential compliance and reporting considerations Introduction This booklet contains market-by- on newly established, standalone market guidance on the key HR operations. Where the Americas payroll and immigration matters to operation is a regional headquarters be considered as you expand your or a holding company for foreign operations across Americas, current subsidiaries, or if there are existing as of March 2019. operations in Americas, other In our experience, careful considerations must be taken into consideration of these matters at the account. outset is the most effective way of In all situations, we recommend that avoiding any issues and ensuring an you seek specific professional advice optimal set-up structure of your from the contacts listed in each business and employees in new chapter. They will take into Americas markets. consideration your specific This booklet is general in nature and circumstances and objectives. not to be relied on as professional advice. Further, the chapters focus Contents Introduction .............................................2 Ecuador .................................................20 EY contact ................................................3 El Salvador .............................................24 Argentina .................................................4 Guatemala ..............................................26 Brazil .......................................................6 Mexico ...................................................28 Canada.....................................................8
    [Show full text]
  • The Hidden Costs of Terrorist Watch Lists
    University of Chicago Law School Chicago Unbound Journal Articles Faculty Scholarship 2013 The Hidden Costs of Terrorist Watch Lists Anya Bernstein Follow this and additional works at: https://chicagounbound.uchicago.edu/journal_articles Part of the Law Commons Recommended Citation Anya Bernstein, "The Hidden Costs of Terrorist Watch Lists," 61 Buffalo Law Review 461 (2013). This Article is brought to you for free and open access by the Faculty Scholarship at Chicago Unbound. It has been accepted for inclusion in Journal Articles by an authorized administrator of Chicago Unbound. For more information, please contact [email protected]. BUFFALO LAW REVIEW VOLUME 61 MAY 2013 NUMBER 3 The Hidden Costs of Terrorist Watch Lists ANYA BERNSTEIN† INTRODUCTION The No Fly List, which is used to block suspected terrorists from flying, has been in use for years. But the government still appears “stymied” by the “relatively straightforward question” of what people who “believe they have been wrongly included on” that list should do.1 In recent months, courts have haltingly started to provide their own answer, giving some individuals standing to sue to remove their names or receive additional process.2 This step is particularly important as the No Fly List continues † Bigelow Fellow and Lecturer in Law, The University of Chicago Law School. J.D., Yale Law School; Ph.D., Anthropology, The University of Chicago. Thanks to Daniel Abebe, Ian Ayres, Alexander Boni-Saenz, Anthony Casey, Anjali Dalal, Nicholas Day, Bernard Harcourt, Aziz Huq, Jerry Mashaw, Jonathan Masur, Nicholas Parrillo, Victoria Schwartz, Lior Strahilevitz, Laura Weinrib, Michael Wishnie, and James Wooten for helpful commentary.
    [Show full text]
  • The Social Security Number: Legal Developments Affecting Its Collection, Disclosure, and Confidentiality
    Order Code RL30318 The Social Security Number: Legal Developments Affecting Its Collection, Disclosure, and Confidentiality Updated February 21, 2008 Kathleen S. Swendiman Legislative Attorney American Law Division The Social Security Number: Legal Developments Affecting Its Collection, Disclosure, and Confidentiality Summary While the social security number (SSN) was first introduced as a device for keeping track of contributions to the Social Security system, its use has been expanded by government entities and the private sector to keep track of many other government and private sector records. Use of the social security number as a federal government identifier was based on Executive Order 9393, issued by President Franklin Roosevelt. Beginning in the 1960s, federal agencies started adopting the social security number as a governmental identifier, and its use for keeping track of government records, on both the federal and state levels, greatly increased. Section 7 of the Privacy Act of 1974 limits compulsory divulgence of the social security number by government entities. While the Privacy Act does provide some limits on the use of the social security number by state and federal entities, exceptions provided in that statute and succeeding statutes have resulted in only minimal restrictions on governmental usage of the social security number. Constitutional challenges to social security number collection and dissemination have, for the most part, been unsuccessful. Private sector use of the social security number is widespread and continues to be largely unregulated by the federal government. The chronology in this report provides a list of federal developments affecting use of the social security number, including federal regulation of the number, as well as specific authorizations, restrictions, and fraud provisions concerning its use.
    [Show full text]
  • Biometrics Takes Off—Fight Between Privacy and Aviation Security Wages On
    Journal of Air Law and Commerce Volume 85 Issue 3 Article 4 2020 Biometrics Takes Off—Fight Between Privacy and Aviation Security Wages On Alexa N. Acquista Southern Methodist University, Dedman School of Law, [email protected] Follow this and additional works at: https://scholar.smu.edu/jalc Recommended Citation Alexa N. Acquista, Biometrics Takes Off—Fight Between Privacy and Aviation Security Wages On, 85 J. AIR L. & COM. 475 (2020) https://scholar.smu.edu/jalc/vol85/iss3/4 This Comment is brought to you for free and open access by the Law Journals at SMU Scholar. It has been accepted for inclusion in Journal of Air Law and Commerce by an authorized administrator of SMU Scholar. For more information, please visit http://digitalrepository.smu.edu. BIOMETRICS TAKES OFF—FIGHT BETWEEN PRIVACY AND AVIATION SECURITY WAGES ON ALEXA N. ACQUISTA* ABSTRACT In the last two decades, the Department of Homeland Secur- ity (DHS) has implemented a variety of new screening and iden- tity verification methods in U.S. airports through its various agencies such as the Transportation Security Administration (TSA) and Customs and Border Protection (CBP). In particular, biometric technology has become a focal point of aviation secur- ity advances. TSA, CBP, and even private companies have started using fingerprint, iris, and facial scans to verify travelers’ identi- ties, not only to enhance security but also to improve the travel experience. This Comment examines how DHS, its agencies, and private companies are using biometric technology for aviation security. It then considers the most common privacy concerns raised by the expanded use of biometric technology: data breaches, func- tion creep, and data sharing.
    [Show full text]
  • Identity Documents Act (2000, Amended 2017)
    Issuer: Riigikogu Type: act In force from: 01.04.2017 In force until: 30.06.2017 Translation published: 28.03.2017 Identity Documents Act1 Passed 15.02.1999 RT I 1999, 25, 365 Entry into force 01.01.2000 Amended by the following acts Passed Published Entry into force 08.03.2000 RT I 2000, 26, 150 15.12.2000 21.03.2000 RT I 2000, 25, 148 29.03.2000 17.05.2000 RT I 2000, 40, 254 01.08.2000 08.11.2000 RT I 2000, 86, 550 02.12.2000 17.01.2001 RT I 2001, 16, 68 16.02.2001 07.03.2001 RT I 2001, 31, 173 07.04.2001 12.06.2001 RT I 2001, 56, 338 07.07.2001 19.06.2002 RT I 2002, 61, 375 01.08.2002 19.06.2002 RT I 2002, 63, 387 01.09.2002 15.10.2002 RT I 2002, 90, 516 01.12.2002 15.01.2003 RT I 2003, 13, 65 01.05.2003 22.01.2003 RT I 2003, 15, 87 27.02.2003 03.12.2003 RT I 2003, 78, 527 01.01.2004 17.12.2003 RT I 2004, 2, 4 16.01.2004 14.04.2004 RT I 2004, 28, 189 01.05.2004 14.12.2005 RT I 2006, 2, 3 01.07.2006 15.02.2006 RT I 2006, 12, 79 01.04.2006 17.05.2006 RT I 2006, 26, 191 01.08.2006 10.05.2006 RT I 2006, 26, 193 01.01.2007 07.06.2006 RT I 2006, 29, 221 28.08.2006, partially02.01.2007 14.11.2007 RT I 2007, 62, 394 Entry into force upon accession of Estonia to the European Union common visa space partially 21.12.2007 and partially 30.03.2008.
    [Show full text]
  • Denmark, Norway and Sweden Hansson
    Nordic countries: Denmark, Norway and Sweden Hansson, Kristofer; Lundin, Susanne 2010 Link to publication Citation for published version (APA): Hansson, K., & Lundin, S. (2010). Nordic countries: Denmark, Norway and Sweden. [Publisher information missing]. http://www.cit-part.at/Deliverable3_final.pdf Total number of authors: 2 General rights Unless other specific re-use rights are stated the following general rights apply: Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Read more about Creative commons licenses: https://creativecommons.org/licenses/ Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. LUND UNIVERSITY PO Box 117 221 00 Lund +46 46-222 00 00 CIT-PART Deliverable 3 Overview on XTP policies and related TA/PTA procedures Nik Brown, Siân Beynon-Jones (Eds.) With contributions by Agnes Allansdottir, Meaghan Brierley, Edna F. Einsiedel, Erich Griessler, Kristofer Hansson, Mavis Jones, Daniel Lehner, Susanne Lundin, Anna Pichelstorfer & Anna Szyma The project ―Impact of Citizen Participation on Decision-Making in a Knowledge Intensive Policy Field‖ (CIT-PART), Contract Number: SSH-CT-2008-225327, is funded by the European Commission within the 7th Framework Programme for Research – Socioeconomic Sciences and Humanities.
    [Show full text]