{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:54:33Z","timestamp":1776106473208,"version":"3.50.1"},"reference-count":233,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T00:00:00Z","timestamp":1705104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM J. Comput. Sustain. Soc."],"published-print":{"date-parts":[[2024,3,31]]},"abstract":"<jats:p>We designed the system that manages, verifies and exchanges identity information for Namibia's national Digital-ID. We applied Grounded Theory methods to five focus groups to understand experiences, expectations and practices in different contexts of legal identity verification and sharing. Local perspectives on privacy aligned with prevalent models for Digital-ID, in which people individually own and trade their personal information, yet they cannot be disentangled from specific social relationships. Thus, our design responds to the ways people establish trust with organisations over time and relate consent for information exchange and privacy control to accountability. We use Situational Analysis to consider how data governance is constructed in a policy-design-adoption \u2018knot\u2019 and relates to Namibia's sociotechnical imaginary of \u2018unity in diversity\u2019. Unequal telecommunications access and adoption contributes to systems that produce inegalitarian data relations but is not central in Namibia's data protection and privacy discourse, thus our thick analysis prompted designing to strengthen collective voice in governance through Government Gazettes and civil society activism. Our reflections also suggest that although design research of a real-world system in Africa offers important insights about combining individualist and collectivist orientations in data governance, their wider scholarly contribution is impeded by norms imposed by the Global North.<\/jats:p>","DOI":"10.1145\/3616024","type":"journal-article","created":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T08:13:14Z","timestamp":1692173594000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Localised Trust in a Globalised Knot: Designing Information Privacy for Digital-ID"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9310-2617","authenticated-orcid":false,"given":"Stefanus","family":"Van Staden","sequence":"first","affiliation":[{"name":"University of Namibia, Namibia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4284-2180","authenticated-orcid":false,"given":"Nicola J.","family":"Bidwell","sequence":"additional","affiliation":[{"name":"University of Melbourne, Australia, International University of Management, Namibia, and Charles Darwin University, Australia"}]}],"member":"320","published-online":{"date-parts":[[2024,1,13]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1080\/13600834.2021.1849953"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998338"},{"key":"e_1_3_2_4_2","unstructured":"The African Commission. 2019. Declaration of Principles on Freedom of Expression and Access to Information in Africa 2019. Retrieved August 18 2023 from https:\/\/achpr.au.int\/en\/node\/902#:\u223c:text=The%20Declaration%20establishes%20or%20affirms to%20express%20and%20disseminate%20information"},{"key":"e_1_3_2_5_2","unstructured":"The African Union. 1981. African Charter on Human and Peoples\u2019 Rights. Retrieved August 18 2023 from https:\/\/au.int\/en\/treaties\/african-charter-human-and-peoples-rights"},{"key":"e_1_3_2_6_2","unstructured":"The African Union. 2020. List of Countries which have Signed Ratified\/Acceded to the African Union Convention on Cyber Security and Personal Data Protection. Addis Ababa Ethiopia. https:\/\/au.int\/sites\/default\/files\/treaties\/29560-sl-AFRICAN_UNION_CONVENTION_ON_CYBER_SECURITY_AND_PERSONAL_DATA_PROTECTION.pdf"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300410"},{"key":"e_1_3_2_8_2","first-page":"906","volume-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems","author":"Ahmed Syed Ishtiaque","year":"2017","unstructured":"Syed Ishtiaque Ahmed, Md. Romael Haque, Shion Guha, Md. Rashidujjaman Rifat, and Nicola Dell. 2017. Privacy, security, and surveillance in the Global South: A study of biometric mobile SIM registration in Bangladesh. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 906\u2013918"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3134652"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1080\/23323256.2013.11500041"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3283458.3283460"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594024"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2998581.2998610"},{"key":"e_1_3_2_14_2","volume-title":"Proceedings of the 21st Americas Conference on Information Systems","author":"Anteneh Salehu","year":"2015","unstructured":"Salehu Anteneh, France Belanger, Berhanu Borena, and Dejene Ejigu. 2015. Conceptualizing information privacy concern in low-income countries: An Ethiopian language instrument for social network sites context. In Proceedings of the 21st Americas Conference on Information Systems."},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1177\/1527476418806092"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.4159\/9780674238879"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipab027"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1541-0072.2009.00312.x"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2017.04.013"},{"key":"e_1_3_2_20_2","article-title":"Namibia plans privatisation of Namibia Telecom and MTC","author":"Barton James","year":"2020","unstructured":"James Barton. 2020. Namibia plans privatisation of Namibia Telecom and MTC. Developing Telecoms. Retrieved August 18, 2023 from https:\/\/developingtelecoms.com\/telecom-business\/market-reports-with-buddecom\/10087-namibia-plans-privatisation-of-namibia-telecom-and-mtc.html","journal-title":"Developing Telecoms"},{"key":"e_1_3_2_21_2","volume-title":"The Data Gaze: Capitalism, Power and Perception","author":"Beer David","year":"2018","unstructured":"David Beer. 2018. The Data Gaze: Capitalism, Power and Perception. SAGE."},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01079-z"},{"key":"e_1_3_2_23_2","volume-title":"BTI Country Report \u2013 Namibia","year":"2020","unstructured":"Bertelsmann Stiftung. 2020. BTI Country Report \u2013 Namibia. Bertelsmann Stiftung, Gutersloh, Germany. https:\/\/www.ecoi.net\/en\/file\/local\/2029538\/country_report_2020_NAM.pdf"},{"key":"e_1_3_2_24_2","volume-title":"Proceedings of the 12th International Conference on Social Implications of Computers in Developing Countries","author":"Bidwell Nicola J.","year":"2013","unstructured":"Nicola J. Bidwell, Thomas Reitmaier, Carlos Rey-Moreno, Zukile Roro, Masbulele Jay Siya, and Bongiwe Dlutu. 2013. Timely relations in rural Africa. In Proceedings of the 12th International Conference on Social Implications of Computers in Developing Countries."},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3449228"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54169-9_6"},{"key":"e_1_3_2_27_2","article-title":"Digital identity in Rwanda","author":"Binda Elvis Mbembe","year":"2021","unstructured":"Elvis Mbembe Binda. 2021. Digital identity in Rwanda. Centre for Internet and Society. Retrieved August 18, 2023 from https:\/\/digitalid.design\/RIA_Rwanda.html","journal-title":"Centre for Internet and Society"},{"key":"e_1_3_2_28_2","article-title":"\u201cThe cart before the horse\u201d \u2013 A Kenyan court just quashed a USD 95M biometric digital ID project","author":"Bingham Laura","year":"2021","unstructured":"Laura Bingham. 2021. \u201cThe cart before the horse\u201d \u2013 A Kenyan court just quashed a USD 95M biometric digital ID project. Voices at Temple Law. Retrieved August 18, 2023 from https:\/\/ww2.law.temple.edu\/voices\/the-cart-before-the-horse-a-kenyan-court-just-quashed-a-usd-95m-biometric-digital-id-project\/","journal-title":"Voices at Temple Law"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.420"},{"key":"e_1_3_2_30_2","unstructured":"Patricia Boshe. 2021. Digital Identity in Tanzania Case Study Conducted as Part of a Ten-country Exploration of Socio-Digital ID Systems in Parts of Africa (Towards the Evaluation of Digital ID Ecosystems in Africa: Findings from Ten Countries). Research ICT Africa (RIA). https:\/\/researchictafrica.net\/publication\/digital-identity-in-tanzania-case-study-conducted-as-part-of-a-ten-country-exploration-of-socio-digital-id-systems-in-parts-of-africa\/"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1515\/9781503602304"},{"key":"e_1_3_2_32_2","unstructured":"The Brief. 2022. 78% of Namibian Schools Lack ICT Infrastructure. Retrieved August 18 2023 from https:\/\/www.thebrief.com.na\/index.php\/component\/k2\/item\/1434-78-of-namibian-schools-lack-ict-infrastructures"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1681-4835.2009.tb00267.x"},{"key":"e_1_3_2_34_2","first-page":"319","article-title":"Privacy protection in a global context a comparative overview","volume":"47","author":"Bygrave Lee A.","year":"2004","unstructured":"Lee A. Bygrave. 2004. Privacy protection in a global context a comparative overview. Scandinavian Studies in Law 47 (2004), 319\u2013348.","journal-title":"Scandinavian Studies in Law"},{"key":"e_1_3_2_35_2","volume-title":"Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis","author":"Charmaz Kathy","year":"2006","unstructured":"Kathy Charmaz. 2006. Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis. SAGE."},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1080\/02681102.2020.1789037"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3193120"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359248"},{"key":"e_1_3_2_39_2","volume-title":"Situational Analysis Grounded Theory After the Interpretive Turn","author":"Clarke Adele E.","year":"2017","unstructured":"Adele E. Clarke, Carrie Friese, and Rachel Washburn. 2017. Situational Analysis Grounded Theory After the Interpretive Turn. SAGE."},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF00988593"},{"key":"e_1_3_2_41_2","unstructured":"Communications Regulatory Authority of Namibia. n.d. Communication and Regulation Authority of Namibia Government Gazettes. Retrieved August 18 2023 from https:\/\/www.cran.na\/government-gazettes\/"},{"key":"e_1_3_2_42_2","unstructured":"DataReportal. 2022. Digital 2022: Namibia. Retrieved August 18 2023 from https:\/\/datareportal.com\/reports\/digital-2022-namibia"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.7591\/9781501721243"},{"key":"e_1_3_2_44_2","unstructured":"Deloitte. 2018. Cybersecurity Security Survey for Namibia: Keeping an Eye on What Matters. Retrieved August 18 2023 from https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/na\/Documents\/risk\/na-Deloitte-Cyber-Security-Survey-for-Namibia.pdf"},{"key":"e_1_3_2_45_2","unstructured":"Deloitte. 2017. Privacy Is Paramount: Personal Data Protection in Africa. Retrieved August 18 2023 from https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/za\/Documents\/risk\/za_Privacy_is_Paramount-Personal_Data_Protection_in_Africa.pdf"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000590"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2103_2"},{"key":"e_1_3_2_48_2","unstructured":"Namibia Economist. 2022. Census Postponed Yet Again. (March 2022). Retrieved August 18 2023 from https:\/\/economist.com.na\/68572\/extra\/census-postponed-yet-again\/"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-006-9113-3"},{"key":"e_1_3_2_50_2","unstructured":"European Union. 2022. Complete Guide to GDPR Compliance. Retrieved August 18 2023 from https:\/\/gdpr.eu\/"},{"key":"e_1_3_2_51_2","first-page":"1","article-title":"The relation between privacy protection and risk attitudes, with a new experimental method to elicit the implicit monetary value of privacy","volume":"296","author":"Frik Alisa","year":"2016","unstructured":"Alisa Frik and Alexia Gaudeul. 2016. The relation between privacy protection and risk attitudes, with a new experimental method to elicit the implicit monetary value of privacy. CEGE Discussion Papers 296 (Nov. 2016), 1\u201351.","journal-title":"CEGE Discussion Papers"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78941-1_19"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3283458.3283476"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5859-7_52"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3129416.3129435"},{"key":"e_1_3_2_56_2","first-page":"178","volume-title":"Selected Proceedings of the 40th Annual Conference on African Linguistics","author":"Frydman Jenna","year":"2011","unstructured":"Jenna Frydman. 2011. A critical analysis of Namibia's English-only language policy. In Selected Proceedings of the 40th Annual Conference on African Linguistics, Eyamba G. Bokamba et al. (Eds.). Cascadilla Proceedings Project, Somerville, MA, 178\u2013189."},{"issue":"12","key":"e_1_3_2_57_2","first-page":"1332","article-title":"Settler governance and privacy: Canada's Indian Residential School Settlement Agreement and the mediation of state-based violence","author":"Fullenwieder Lara","year":"2018","unstructured":"Lara Fullenwieder and Adam Molnar. 2018. Settler governance and privacy: Canada's Indian Residential School Settlement Agreement and the mediation of state-based violence. International Journal of Communication 12 (2018), 1332\u20131349.","journal-title":"International Journal of Communication"},{"key":"e_1_3_2_58_2","doi-asserted-by":"crossref","unstructured":"Seeta Pe\u00f1a Gangadharan. 2012. Digital inclusion and data profiling. First Monday. Retrieved August 18 2023 from https:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/3821\/3199","DOI":"10.5210\/fm.v17i5.3821"},{"key":"e_1_3_2_59_2","volume-title":"Digital Identity in Mozambique: Case Study Conducted As Part of a Ten-Country Exploration of Socio-Digital ID Systems in Parts of Africa","author":"Gaster Polly","year":"2021","unstructured":"Polly Gaster and Iazalde Martins. 2021. Digital Identity in Mozambique: Case Study Conducted As Part of a Ten-Country Exploration of Socio-Digital ID Systems in Parts of Africa. Research ICT Africa."},{"key":"e_1_3_2_60_2","volume-title":"Proceedings of the 2020 Conference on Human Factors in Computing Systems (CHI\u201920)","author":"Gautam Aakash","year":"2020","unstructured":"Aakash Gautam. 2020. Usable, acceptable, appropriable: Towards practicable privacy. In Proceedings of the 2020 Conference on Human Factors in Computing Systems (CHI\u201920)."},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1177\/20539517221112925"},{"key":"e_1_3_2_62_2","volume-title":"Identification for Development: The Biometrics Revolution","author":"Gelb Alan","year":"2013","unstructured":"Alan Gelb and Julia Clark 2013. Identification for Development: The Biometrics Revolution. Working Paper No. 315. Center for Global Development. https:\/\/ssrn.com\/abstract=2226594"},{"key":"e_1_3_2_63_2","article-title":"Data protection increasingly a Namibian concern","author":"Gervasius-Nakale Nashilongo","year":"2018","unstructured":"Nashilongo Gervasius-Nakale. 2018. Data protection increasingly a Namibian concern. The Namibian. Retrieved August 18, 2023 from https:\/\/www.namibian.com.na\/data-protection-increasingly-a-namibian-concern\/","journal-title":"The Namibian"},{"key":"e_1_3_2_64_2","article-title":"Data protection and privacy in the absence of law: A Namibian exploration during COVID-19","author":"Gervasius Nashilongo","year":"2021","unstructured":"Nashilongo Gervasius. 2021. Data protection and privacy in the absence of law: A Namibian exploration during COVID-19. Open Internet for Democracy. Retrieved August 18, 2023 from https:\/\/openinternet.global\/news\/data-protection-and-privacy-absence-law-namibian-exploration-during-covid-19","journal-title":"Open Internet for Democracy"},{"key":"e_1_3_2_65_2","article-title":"Ensuring personal data protection and privacy \u2026 towards a desired 4IR national position","author":"Gervasius-Nakale Nashilongo","year":"2022","unstructured":"Nashilongo Gervasius-Nakale. 2022. Ensuring personal data protection and privacy \u2026 towards a desired 4IR national position. New Era. Retrieved August 18, 2023 from https:\/\/neweralive.na\/posts\/opinion-ensuring-personal-data-protection-and-privacy-towards-a-desired-4ir-national-position","journal-title":"New Era"},{"key":"e_1_3_2_66_2","article-title":"Digital Inclusion: Sub-Saharan Africa has world's most expensive data prices","author":"Gilbert Paula","year":"2021","unstructured":"Paula Gilbert. 2021. Digital Inclusion: Sub-Saharan Africa has world's most expensive data prices. Connecting Africa. Retrieved August 18, 2023 from https:\/\/www.connectingafrica.com\/author.asp?section_id=761&doc_id=768680","journal-title":"Connecting Africa."},{"key":"e_1_3_2_67_2","volume-title":"After Access: The State of ICT in South Africa","author":"Gillwald Alison","year":"2018","unstructured":"Alison Gillwald, Onkokame Mothobi, and Broc Rademan. 2018. After Access: The State of ICT in South Africa. Policy Paper 5. Research ICT Africa."},{"key":"e_1_3_2_68_2","volume-title":"The Discovery of Grounded Theory: Strategies for Qualitative Research","author":"Glaser Barney G.","year":"1967","unstructured":"Barney G. Glaser and Anselm L. Strauss. 1967. The Discovery of Grounded Theory: Strategies for Qualitative Research. Aldine, Chicago, IL."},{"key":"e_1_3_2_69_2","unstructured":"Global System for Mobile Communications Association (GSMA). 2021. Access to Mobile Services and Proof of Identity 2021: Revisiting SIM Registration and Know Your Customer (KYC) Contexts during COVID-19. Retrieved August 18 2023 from https:\/\/ww.gsma.com\/mobilefordevelopment\/wp-content\/uploads\/2021\/04\/Digital-Identity-Access-to-Mobile-Services-and-Proof-of-Identity-2021_SPREADs.pdf"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445779"},{"key":"e_1_3_2_71_2","volume-title":"Privacy and the Information Age","author":"Gutwirth Serge","year":"2002","unstructured":"Serge Gutwirth. 2002. Privacy and the Information Age. Rowman & Littlefield."},{"key":"e_1_3_2_72_2","volume-title":"Digital Identity Country Profile","author":"Handforth Calum","year":"2019","unstructured":"Calum Handforth and Matthew Wilson. 2019. Digital Identity Country Profile: Zambia. GSM Association."},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376415"},{"key":"e_1_3_2_74_2","article-title":"Lack of competition makes data expensive in Namibia-CRAN","author":"Heita Julia","year":"2022","unstructured":"Julia Heita. 2022. Lack of competition makes data expensive in Namibia-CRAN. Eagle FM. (June 2022). Retrieved August 18, 2023 from https:\/\/www.eaglefm.com.na\/news\/lack-of-competition-makes-data-expensive-in-namibia-cran\/","journal-title":"Eagle FM"},{"key":"e_1_3_2_75_2","volume-title":"The Constitution in the 21st Century: Perspectives on the Context and Future of Namibia's Supreme Law","author":"Hishoono Naita","year":"2011","unstructured":"Naita Hishoono. 2011. The Constitution in the 21st Century: Perspectives on the Context and Future of Namibia's Supreme Law. Namibia Institute for Democracy and the Institute for Public Policy Research."},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.4324\/9780429492921-7"},{"key":"e_1_3_2_77_2","first-page":"673","volume-title":"Proceedings of the International Conference on Recent Advancement on Computer and Communication","author":"Husin Jazri","year":"2018","unstructured":"Jazri Husin, Elizabeth Paulus, Dharm Singh Jat, and Durgesh Kumar Mishra. 2018. Internet victimization patterns over mobile phone in Namibia. In Proceedings of the International Conference on Recent Advancement on Computer and Communication. 673\u2013680."},{"key":"e_1_3_2_78_2","volume-title":"Challenges and Prospects of the General Data Protection Regulation (GDPR) in AfricaCIPESA ICT Policy Briefing Series. Collaboration on International ICT Policy in East and Southern Africa (CIPESA).","year":"2018","unstructured":"ICT Policy Centre for Eastern and Southern Africa. 2018. Challenges and Prospects of the General Data Protection Regulation (GDPR) in Africa. CIPESA ICT Policy Briefing Series. Collaboration on International ICT Policy in East and Southern Africa (CIPESA)."},{"key":"e_1_3_2_79_2","unstructured":"ID4Africa. n.d. ID4Africa Movement. Retrieved August 18 2023 from https:\/\/id4africa.com\/"},{"key":"e_1_3_2_80_2","unstructured":"International Telecommunications Union. 2016. Review of National Identity Programs. Retrieved August 18 2023 from https:\/\/www.itu.int\/en\/ITU-T\/focusgroups\/dfs\/Documents\/09_2016\/Review%20of%20National%20Identity%20Programs.pdf"},{"key":"e_1_3_2_81_2","unstructured":"International Telecommunications Union. 2020. Global Cybersecurity Index. Retrieved August 18 2023 from https:\/\/www.itu.int\/en\/ITU-D\/Cybersecurity\/Pages\/global-cybersecurity-index.aspx"},{"key":"e_1_3_2_82_2","unstructured":"The Internet Society Namibia Chapter. n.d. Home Page. Retrieved August 18 2023 from https:\/\/isocnamibia.org\/"},{"key":"e_1_3_2_83_2","unstructured":"Internet Society and Commission of the African Union. 2018. Personal Data Protection Guidelines for Africa. Retrieved August 18 2023 from https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/05\/AUCPrivacyGuidelines_2018508_EN.pdf"},{"key":"e_1_3_2_84_2","volume-title":"Chasing Innovation","author":"Irani Lilly","year":"2019","unstructured":"Lilly Irani. 2019. Chasing Innovation. Princeton University Press."},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359230"},{"key":"e_1_3_2_86_2","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441902"},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531674"},{"key":"e_1_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.1145\/3378393.3402290"},{"key":"e_1_3_2_89_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11024-009-9124-4"},{"key":"e_1_3_2_90_2","article-title":"Finance ministry struggles with ITAS registration","author":"Johannes Helena","year":"2020","unstructured":"Helena Johannes. 2020. Finance ministry struggles with ITAS registration. Windhoek Observer. Retrieved August 18, 2023 from https:\/\/www.observer24.com.na\/finance-ministry-struggles-with-itas-registration\/","journal-title":"Windhoek Observer"},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1086\/656423"},{"key":"e_1_3_2_92_2","first-page":"697","volume-title":"Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work and Social Computing","author":"Johri Aditya","year":"2014","unstructured":"Aditya Johri and Janaki Srinivasan. 2014. The role of data in aligning the \u2018unique identity\u2019 infrastructure in India. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work and Social Computing. 697\u2013709."},{"key":"e_1_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375859"},{"issue":"4","key":"e_1_3_2_94_2","first-page":"200","article-title":"A process analysis of the Namibian Health System: An exploratory case study","volume":"32","author":"Kapepo Meke","year":"2018","unstructured":"Meke Kapepo and Yashik Singh. 2018. A process analysis of the Namibian Health System: An exploratory case study. Ethiopian Journal of Health Development 32, 4 (2018), 200\u2013209.","journal-title":"Ethiopian Journal of Health Development"},{"key":"e_1_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/2838739.2838788"},{"key":"e_1_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322355"},{"key":"e_1_3_2_97_2","article-title":"Digital 2020: Namibia","author":"Kemp Simon","year":"2020","unstructured":"Simon Kemp. 2020. Digital 2020: Namibia. DataReportal. Retrieved August 18, 2023 from https:\/\/datareportal.com\/reports\/digital-2020-namibia","journal-title":"DataReportal"},{"issue":"2","key":"e_1_3_2_98_2","first-page":"27","article-title":"Enhancing service delivery in Namibia through public sector reform over the last 25 years: A case study of Namibia","author":"Keyter Charles","year":"2016","unstructured":"Charles Keyter. 2016. Enhancing service delivery in Namibia through public sector reform over the last 25 years: A case study of Namibia. African Journal of Public Administration and Management XXIV, 2 (2016), 27.","journal-title":"African Journal of Public Administration and Management"},{"key":"e_1_3_2_99_2","article-title":"Data protection must be a priority \u2013 Isaacks","author":"Klukowski Steven","year":"2023","unstructured":"Steven Klukowski. 2023. Data protection must be a priority \u2013 Isaacks. New Era. Retrieved August 18, 2023 from https:\/\/neweralive.na\/posts\/data-protection-must-be-a-priority-isaacks","journal-title":"New Era"},{"key":"e_1_3_2_100_2","unstructured":"Gazettes Africa. n.d. Namibia Gazettes 2022. Retrieved August 18 2023 from https:\/\/gazettes.africa\/gazettes\/na\/2022"},{"key":"e_1_3_2_101_2","doi-asserted-by":"publisher","DOI":"10.1145\/3448072"},{"issue":"1","key":"e_1_3_2_102_2","first-page":"62","article-title":"Understanding situational online information disclosure as a privacy calculus","volume":"51","author":"Li Han","year":"2010","unstructured":"Han Li, Rathindra Sarathy, and Heng Xu. 2010. Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems 51, 1 (2010), 62\u201371.","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_3_2_103_2","unstructured":"Frederico Links. 2018. AI biometrics and no protection from abuse. The Namibian. Retrieved August 18 2023 from https:\/\/www.namibian.com.na\/ai-biometrics-and-no-protection-from-abuse\/"},{"key":"e_1_3_2_104_2","article-title":"Ripe for surveillance abuse \u2013 Unpacking Namibia's SIM card registration limbo","author":"Links Frederico","year":"2020","unstructured":"Frederico Links. 2020. Ripe for surveillance abuse \u2013 Unpacking Namibia's SIM card registration limbo. Observer. Retrieved August 18, 2023 from https:\/\/www.observer24.com.na\/ripe-for-surveillance-abuse-unpacking-namibias-sim-card-registration-limbo\/","journal-title":"Observer"},{"key":"e_1_3_2_105_2","article-title":"Data retention regulations eradicate anonymity","author":"Links Frederico","year":"2021","unstructured":"Frederico Links. 2021. Data retention regulations eradicate anonymity. ACTION Namibia Coalition. (Nov. 2021). Retrieved August 18, 2023 from https:\/\/action-namibia.org\/data-retention-regulations-eradicate-anonymity\/","journal-title":"ACTION Namibia Coalition"},{"key":"e_1_3_2_106_2","article-title":"New surveillance regulations lurk threateningly in Namibia","author":"Links Frederico","year":"2022","unstructured":"Frederico Links. 2022. New surveillance regulations lurk threateningly in Namibia. Association for Progressive Communications. Retrieved August 18, 2023 from https:\/\/www.apc.org\/en\/news\/new-surveillance-regulations-lurk-threateningly-namibia","journal-title":"Association for Progressive Communications"},{"key":"e_1_3_2_107_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-12825-7_4"},{"issue":"1","key":"e_1_3_2_108_2","first-page":"122","article-title":"Harambee Prosperity Plan: A corpus-driven rhetorical and postcolonial reading","volume":"10","author":"Makamani Rewai","year":"2018","unstructured":"Rewai Makamani. 2018. Harambee Prosperity Plan: A corpus-driven rhetorical and postcolonial reading. African Journal of Rhetoric 10, 1 (2018), 122\u2013141.","journal-title":"African Journal of Rhetoric"},{"key":"e_1_3_2_109_2","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ips014"},{"key":"e_1_3_2_110_2","doi-asserted-by":"publisher","DOI":"10.4236\/blr.2016.73020"},{"key":"e_1_3_2_111_2","article-title":"The long arm of GDPR in Africa: Reflection on data privacy law reform and practice in Mauritius","author":"Makulilo Alex B.","year":"2020","unstructured":"Alex B. Makulilo. 2020. The long arm of GDPR in Africa: Reflection on data privacy law reform and practice in Mauritius. The International Journal of Human Rights, 1\u201330.","journal-title":"The International Journal of Human Rights"},{"key":"e_1_3_2_112_2","volume-title":"Communication Surveillance in Namibia: An Exploratory Study","author":"Mare Admire","year":"2019","unstructured":"Admire Mare. 2019. Communication Surveillance in Namibia: An Exploratory Study. Media Policy and Democracy Project."},{"key":"e_1_3_2_113_2","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v19i1.14547"},{"key":"e_1_3_2_114_2","first-page":"116","volume-title":"COVID-19 from the Margins: Pandemic Invisibilities, Policies and Resistance in the Datafied Society","author":"Masiero Silvia","year":"2021","unstructured":"Silvia Masiero. 2021. Beyond touchscreens: The perils of biometric social welfare in lockdown. In COVID-19 from the Margins: Pandemic Invisibilities, Policies and Resistance in the Datafied Society, Stefania Milan, Emiliano Trer\u00e9, and Silvia Masiero (Eds.). Institute of Network Cultures, 116\u2013119."},{"key":"e_1_3_2_115_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78941-1_18"},{"key":"e_1_3_2_116_2","article-title":"CRAN reduces interconnection rates","author":"Matthys Donald","year":"2022","unstructured":"Donald Matthys. 2022. CRAN reduces interconnection rates. Namibia Economist. (Sept. 2022). Retrieved August 18, 2023 from https:\/\/economist.com.na\/73363\/technology\/cran-reduces-interconnection-rates\/","journal-title":"Namibia Economist"},{"key":"e_1_3_2_117_2","article-title":"Efforts to increase digital ID issuance across Africa maintain steam","author":"MacDonald Ayang","year":"2023","unstructured":"Ayang MacDonald. 2023. Efforts to increase digital ID issuance across Africa maintain steam. Biometric Update. (Jan. 2023). Retrieved August 18, 2023 from https:\/\/www.biometricupdate.com\/202301\/efforts-to-increase-digital-id-issuance-across-africa-maintain-steam","journal-title":"Biometric Update"},{"key":"e_1_3_2_118_2","article-title":"African countries reach data, digital ID interoperability deal to foster growth","author":"MacDonald Ayang","year":"2023","unstructured":"Ayang MacDonald. 2023. African countries reach data, digital ID interoperability deal to foster growth. Biometric Update. (May 2023). Retrieved August 18, 2023 from https:\/\/www.biometricupdate.com\/202305\/african-countries-reach-data-digital-id-interoperability-deal-to-foster-growth","journal-title":"Biometric Update"},{"key":"e_1_3_2_119_2","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3375174"},{"key":"e_1_3_2_120_2","unstructured":"R. Jesse McWaters and the Financial Services Community. 2016. A blueprint for digital identity: The role of financial institutions in building digital identity. World Economic Forum. Retrieved August 18 2023 from https:\/\/www3.weforum.org\/docs\/WEF_A_Blueprint_for_Digital_Identity.pdf"},{"key":"e_1_3_2_121_2","doi-asserted-by":"publisher","DOI":"10.1145\/3369457.3369477"},{"key":"e_1_3_2_122_2","volume-title":"From Rationality to Relationality: Ubuntu As an Ethical & Human Rights Framework for Artificial Intelligence Governance","author":"Mhlambi Sabelo","year":"2020","unstructured":"Sabelo Mhlambi. 2020. From Rationality to Relationality: Ubuntu As an Ethical & Human Rights Framework for Artificial Intelligence Governance. Carr Center Discussion Paper. Carr Center for Human Rights Policy. https:\/\/carrcenter.hks.harvard.edu\/files\/cchr\/files\/ccdp_2020-009_sabelo_b.pdf"},{"key":"e_1_3_2_123_2","volume-title":"Digital Identity in Tanzania: Case Study Conducted As Part of a Ten-Country Exploration of Socio-Digital ID Systems in Parts of Africa","author":"Ngwenya Nhlanhla","year":"2021","unstructured":"Nhlanhla Ngwenya. 2021. Digital Identity in Tanzania: Case Study Conducted As Part of a Ten-Country Exploration of Socio-Digital ID Systems in Parts of Africa. Research ICT Africa."},{"key":"e_1_3_2_124_2","volume-title":"Public Health Covid-19 General Regulations: Public and Environmental Health Act, 2015","year":"2020","unstructured":"Ministry of Health and Social Services. 2020. Public Health Covid-19 General Regulations: Public and Environmental Health Act, 2015. No. 233. Government Gazette of the Republic of Namibia, Windhoek, Namibia."},{"key":"e_1_3_2_125_2","volume-title":"ICT Systems Integration Assessment Report","year":"2021","unstructured":"Ministry of Home Affairs, Immigration, Safety and Security of the Republic of Namibia. 2021. ICT Systems Integration Assessment Report. MHAISS."},{"key":"e_1_3_2_126_2","unstructured":"Ministry of Justice of the Republic of Namibia. n.d. About NamibLII. Retrieved August 18 2023 from https:\/\/namiblii.org\/about"},{"key":"e_1_3_2_127_2","doi-asserted-by":"publisher","DOI":"10.22495\/jgr_v4_i3_c2_p10"},{"key":"e_1_3_2_128_2","doi-asserted-by":"publisher","DOI":"10.1086\/209566"},{"key":"e_1_3_2_129_2","doi-asserted-by":"publisher","DOI":"10.1145\/3449212"},{"key":"e_1_3_2_130_2","article-title":"The burden of black tax","author":"Mushaandja J.","year":"2015","unstructured":"J. Mushaandja. 2015. The burden of black tax. The Namibian. Retrieved August 18, 2023 from https:\/\/www.namibian.com.na\/the-burden-of-black-tax\/","journal-title":"The Namibian"},{"key":"e_1_3_2_131_2","article-title":"Kenya: Risks in transforming the national identification system to a digital ID system","author":"Mutung'u Grace","year":"2021","unstructured":"Grace Mutung'u. 2021. Kenya: Risks in transforming the national identification system to a digital ID system. Policy Commons. Retrieved August 18, 2023 from https:\/\/policycommons.net\/artifacts\/1804217\/kenya\/2535861\/","journal-title":"Policy Commons"},{"key":"e_1_3_2_132_2","article-title":"New system rejects 18,000 social grant recipients","author":"Nakashole Puyeipawa","year":"2022","unstructured":"Puyeipawa Nakashole and Eino Vatileni. 2022. New system rejects 18,000 social grant recipients. The Namibian. Retrieved August 18, 2023 from https:\/\/www.namibian.com.na\/new-system-rejects-18-000-social-grant-recipients\/","journal-title":"The Namibian"},{"key":"e_1_3_2_133_2","doi-asserted-by":"publisher","DOI":"10.1145\/3283458.3283472"},{"key":"e_1_3_2_134_2","unstructured":"Namibia Statistics Agency. 2021. Namibia Multidimensional Poverty Index (MPI) Report 2021. Retrieved August 18 2023 from https:\/\/www.unicef.org\/esa\/media\/9041\/file\/UNICEF-Namibia-Multidimensional-Poverty-Index-2021.pdf"},{"key":"e_1_3_2_135_2","article-title":"A Namibian 4IR faces fundamental issues","author":"Ndumbu Roswitha","year":"2021","unstructured":"Roswitha Ndumbu. 2021. A Namibian 4IR faces fundamental issues. The Namibian. Retrieved August 18, 2023 from https:\/\/www.namibian.com.na\/a-namibian-4ir-faces-fundamental-issues\/","journal-title":"The Namibian"},{"key":"e_1_3_2_136_2","doi-asserted-by":"publisher","DOI":"10.1177\/0266666920979009"},{"key":"e_1_3_2_137_2","unstructured":"New Era. 2006. A Few Thoughts about Service. Staff Report. 2006-02-20. https:\/\/neweralive.na\/posts\/a-few-thoughts-about-service"},{"key":"e_1_3_2_138_2","article-title":"Opinion \u2013 Pathetic customer care in Namibia","author":"Era New","year":"2021","unstructured":"New Era. 2021. Opinion \u2013 Pathetic customer care in Namibia. New Era. Retrieved August 18, 2023 from https:\/\/neweralive.na\/posts\/opinion-pathetic-customer-care-in-namibia","journal-title":"New Era"},{"key":"e_1_3_2_139_2","doi-asserted-by":"publisher","DOI":"10.29173\/irie17"},{"key":"e_1_3_2_140_2","volume-title":"Digital Identity in Zimbabwe: Case Study Conducted As Part of a Ten-Country Exploration of Socio-Digital ID Systems in Parts of Africa","author":"Ngwenya Nhlanhla","year":"2021","unstructured":"Nhlanhla Ngwenya. 2021. Digital Identity in Zimbabwe: Case Study Conducted As Part of a Ten-Country Exploration of Socio-Digital ID Systems in Parts of Africa. Research ICT Africa."},{"issue":"1","key":"e_1_3_2_141_2","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Washington Law Review 79, 1 (2004), 119\u2013157.","journal-title":"Washington Law Review"},{"key":"e_1_3_2_142_2","volume-title":"Namibia: The Effects of Apartheid on Culture and Education","author":"O'Calloghan Marion","year":"1977","unstructured":"Marion O'Calloghan. 1977. Namibia: The Effects of Apartheid on Culture and Education. UNESCO."},{"key":"e_1_3_2_143_2","unstructured":"Yinka Okeowo. 2021. Deployment of Over 1500 NIN Outlets Will Boost Enrolments \u2013 Danbata. Techdigest October 4 2021. https:\/\/techdigest.ng\/nin-outlets-will-boost\/"},{"key":"e_1_3_2_144_2","doi-asserted-by":"publisher","DOI":"10.1145\/3530190.3534802"},{"issue":"2","key":"e_1_3_2_145_2","first-page":"171","article-title":"Western Privacy and\/or Ubuntu? Some critical comments on the influences in the forthcoming data privacy bill in South Africa","volume":"26","author":"Olinger Hanno N.","year":"2007","unstructured":"Hanno N. Olinger, Johannes J. Britz, and Martin S. Olivier. 2007. Western Privacy and\/or Ubuntu? Some critical comments on the influences in the forthcoming data privacy bill in South Africa. International Review of Retail, Distribution and Consumer Research 26, 2 (2007), 171\u2013201.","journal-title":"International Review of Retail, Distribution and Consumer Research"},{"key":"e_1_3_2_146_2","doi-asserted-by":"crossref","unstructured":"Nokuthula Olorunju and Rachel Adams. 2022. African Data Trusts: New Tools Towards Collective Data Governance? Retrieved August 18 2023 from https:\/\/researchictafrica.net\/publication\/african-data-trusts-new-tools-towards-collective-data-governance\/","DOI":"10.1080\/13600834.2023.2260678"},{"key":"e_1_3_2_147_2","doi-asserted-by":"publisher","DOI":"10.1007\/s43545-021-00162-1"},{"key":"e_1_3_2_148_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cresp.2021.100030"},{"key":"e_1_3_2_149_2","doi-asserted-by":"publisher","DOI":"10.1145\/3555631"},{"key":"e_1_3_2_150_2","doi-asserted-by":"publisher","DOI":"10.1145\/2212776.2223843"},{"key":"e_1_3_2_151_2","article-title":"70 000 uncollected ID cards at home affairs","author":"Petersen Shellegan","year":"2021","unstructured":"Shellegan Petersen. 2021. 70 000 uncollected ID cards at home affairs. The Namibian. Retrieved August 18, 2023 from https:\/\/www.namibian.com.na\/70-000-uncollected-id-cards-at-home-affairs\/","journal-title":"The Namibian"},{"key":"e_1_3_2_152_2","volume-title":"Intersectional Decency among Namibian Black, Female Nurses in Katutura, Windhoek: Class, Race, Tribe, Gender and Profession Constructing the Perceptions of Decency","author":"Pihlaja Ulla-Kaisa","year":"2017","unstructured":"Ulla-Kaisa Pihlaja. 2017. Intersectional Decency among Namibian Black, Female Nurses in Katutura, Windhoek: Class, Race, Tribe, Gender and Profession Constructing the Perceptions of Decency. Master's Thesis. University of Helsinki. https:\/\/helda.helsinki.fi\/bitstream\/handle\/10138\/175802\/Pihlaja_sosiologia.pdf?sequence=2"},{"key":"e_1_3_2_153_2","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533200"},{"key":"e_1_3_2_154_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781315246024-7"},{"key":"e_1_3_2_155_2","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.13226"},{"key":"e_1_3_2_156_2","volume-title":"The Right to Privacy in Namibia","author":"International Privacy","year":"2015","unstructured":"Privacy International. 2015. The Right to Privacy in Namibia. Universal Periodic Review Stakeholder Report: 24th Session, Namibia. Privacy International. https:\/\/privacyinternational.org\/sites\/default\/files\/2017-12\/Namibia%20UPR_PI_submission_FINAL.pdf"},{"key":"e_1_3_2_157_2","volume-title":"Digital Identity in Lesotho: Case Study Conducted As Part of a Ten-Country Exploration of Socio-Digital ID Systems in Parts of Africa","author":"Pule Nthhabiseng","year":"2021","unstructured":"Nthhabiseng Pule. 2021. Digital Identity in Lesotho: Case Study Conducted As Part of a Ten-Country Exploration of Socio-Digital ID Systems in Parts of Africa. Research ICT Africa."},{"key":"e_1_3_2_158_2","volume-title":"Understanding the Theory of Collective Rights: Redefining the Privacy Paradox","author":"Razzano Gabriella","year":"2021","unstructured":"Gabriella Razzano. 2021. Understanding the Theory of Collective Rights: Redefining the Privacy Paradox. Research ICT Africa."},{"key":"e_1_3_2_159_2","volume-title":"Data Localisation in South Africa: Missteps in the Valuing of Data","author":"Razzano Gabriella","year":"2021","unstructured":"Gabriella Razzano. 2021. Data Localisation in South Africa: Missteps in the Valuing of Data. Policy Brief 06. Mandela Institute. https:\/\/www.wits.ac.za\/media\/wits-university\/faculties-and-schools\/commerce-law-and-management\/research-entities\/mandela-institute\/documents\/research-publications\/800482%20PB6%20Missteps%20in%20valuing%20data_REV%20Dec2021.pdf"},{"key":"e_1_3_2_160_2","volume-title":"Digital Identity in South Africa: Case Study Conducted As Part of a Ten-Country Exploration of Socio-Digital ID Systems in Parts of Africa","author":"Razzano Gabriella","year":"2021","unstructured":"Gabriella Razzano. 2021. Digital Identity in South Africa: Case Study Conducted As Part of a Ten-Country Exploration of Socio-Digital ID Systems in Parts of Africa. Research ICT Africa."},{"key":"e_1_3_2_161_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025673"},{"key":"e_1_3_2_162_2","first-page":"1949","volume-title":"Proceedings of the 29th USENIX Security Symposium","author":"Reichel Jake","year":"2020","unstructured":"Jake Reichel, Fleming Peck, Mikako Inaba, Bisrat Moges, Brahmnoor Singh Chawla, and Marshini Chetty. 2020. \u2018I have too much respect for my elders\u2019: Understanding South African mobile users\u2019 perceptions of privacy and current behaviors on Facebook and WhatsApp. In Proceedings of the 29th USENIX Security Symposium. 1949\u20131966."},{"key":"e_1_3_2_163_2","first-page":"94","volume-title":"Proceedings of the African Cyber Citizenship Conference","author":"Renaud Karen","year":"2015","unstructured":"Karen Renaud, Stephen Flowerday, Lotfi ben Othmane, and Melanie Volkamer. 2015. \u201cI am because we are\u201d: Developing and nurturing an African digital security culture. In Proceedings of the African Cyber Citizenship Conference. 94."},{"key":"e_1_3_2_164_2","first-page":"1291","article-title":"Privacy versus relatedness: Managing device use in Australia's remote Aboriginal communities","volume":"12","author":"Rennie Ellie","year":"2018","unstructured":"Ellie Rennie, Tyson Yunkaporta, and Indigo Holcombe-James. 2018. Privacy versus relatedness: Managing device use in Australia's remote Aboriginal communities. International Journal of Communication 12 (2018), 1291\u20131309.","journal-title":"International Journal of Communication"},{"key":"e_1_3_2_165_2","unstructured":"Republic of Namibia. 1982. Protection of Information Act 1982. Retrieved August 18 2023 from https:\/\/namiblii.org\/akn\/na\/act\/1982\/84\/eng%401998-06-05"},{"key":"e_1_3_2_166_2","unstructured":"Republic of Namibia. 1996. Identifications Act 1996. Retrieved August 18 2023 from https:\/\/namiblii.org\/akn\/na\/act\/1996\/21\/eng%401996-11-22"},{"key":"e_1_3_2_167_2","unstructured":"Republic of Namibia. 1997. Namibia Central Intelligence Service Act 10 of 1997. Retrieved August 18 2023 from https:\/\/www.lac.org.na\/laws\/annoSTAT\/Namibia%20Central%20Intelligence%20Service%20Act%2010%20of%201997.pdf"},{"key":"e_1_3_2_168_2","unstructured":"Republic of Namibia. 2012. Financial Intelligence Act 13 of 2012. Retrieved August 18 2023 from https:\/\/www.lac.org.na\/laws\/annoSTAT\/Financial%20Intelligence%20Act%2013%20of%202012.pdf"},{"key":"e_1_3_2_169_2","unstructured":"Reporters Without Borders. 2022. The World Press Freedom Index: Namibia. Retrieved August 18 2023 from https:\/\/rsf.org\/en\/country\/namibia"},{"key":"e_1_3_2_170_2","first-page":"65","volume-title":"Community Networks: The Internet by the People, for the People","author":"Rey-Moreno Carlos","year":"2017","unstructured":"Carlos Rey-Moreno. 2017. Barriers for development and scale of community networks in Africa. In Community Networks: The Internet by the People, for the People. Escola de Direito do Rio de Janeiro da Funda\u00e7\u00e3o Getulio Vargas, Rio de Janeiro, 65\u201376."},{"key":"e_1_3_2_171_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-020-00407-6"},{"key":"e_1_3_2_172_2","first-page":"127","volume-title":"Proceedings of the 14th Symposium on Usable Privacy and Security","author":"Sambasivan Nithya","year":"2018","unstructured":"Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gayt\u00e1n-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchill. 2018. \u201cPrivacy is not for me, it's for those rich women\u201d: Performative privacy practices on mobile phones by women in South Asia. In Proceedings of the 14th Symposium on Usable Privacy and Security. 127\u2013142."},{"key":"e_1_3_2_173_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173626"},{"key":"e_1_3_2_174_2","doi-asserted-by":"publisher","DOI":"10.1145\/3555556"},{"key":"e_1_3_2_175_2","volume-title":"Financing Social Protection in Namibia","author":"Schade Klaus","year":"2019","unstructured":"Klaus Schade, Justina La, and Alexander Pick. 2019. Financing Social Protection in Namibia. OECD Development Policy Papers No. 19. OECD. https:\/\/www.oecd-ilibrary.org\/development\/financing-social-protection-in-namibia_6957c65a-en"},{"key":"e_1_3_2_176_2","unstructured":"Emily Schneider\u2013Waterberg. 2016. Harambee vs Ubuntu. The Namibian Newspaper. Letters. 2016-05-13. www.namibian.com.na\/150703\/archive-read\/Harambee-vs-Ubuntu. Downloaded 10-07-22"},{"key":"e_1_3_2_177_2","volume-title":"Citizen Engagement: Politics and Digital Media in Namibia","author":"Shihomeka Sadrag P.","year":"2019","unstructured":"Sadrag P. Shihomeka. 2019. Citizen Engagement: Politics and Digital Media in Namibia. PhD Dissertation. University of Namibia."},{"key":"e_1_3_2_178_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511813740.003"},{"key":"e_1_3_2_179_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2008.01.006"},{"key":"e_1_3_2_180_2","doi-asserted-by":"publisher","DOI":"10.1177\/160940690800700201"},{"key":"e_1_3_2_181_2","volume-title":"Namibian Telecommunication Sector Performance Review: Towards Evidence-Based ICT Policy and Regulation","author":"Sherbourne Robin","year":"2010","unstructured":"Robin Sherbourne and Christoph Stork. 2010. Namibian Telecommunication Sector Performance Review: Towards Evidence-Based ICT Policy and Regulation. Vol. 2, Policy Paper 7. Research Africa ICT. https:\/\/www.researchictafrica.net\/publications\/ICT_Sector_Performance_Reviews_2010\/Vol%202%20Paper%207%20-%20Namibian%20Telecommunication%20Sector%20Performance%20Review%202010.pdf"},{"key":"e_1_3_2_182_2","first-page":"1","volume-title":"Proceedings of the IST-Africa Conference","author":"Silaa Julius","year":"2021","unstructured":"Julius Silaa, Mamoqenelo Morolog, Atlee Gamundani, and Fungi Bhunu-Shava. 2021. Towards user online security and privacy protection. In Proceedings of the IST-Africa Conference. IEEE, Los Alamitos, CA, 1\u20138."},{"key":"e_1_3_2_183_2","article-title":"Death by digital exclusion?: On faulty public distribution system in Jharkhand","author":"Sinh Shiv Sahay","year":"2019","unstructured":"Shiv Sahay Sinh. 2019. Death by digital exclusion?: On faulty public distribution system in Jharkhand. The Hindu. (July 2019). Retrieved August 18, 2023 from https:\/\/www.thehindu.com\/news\/national\/other-states\/death-by-digital-exclusion\/article28414768.ece","journal-title":"The Hindu"},{"key":"e_1_3_2_184_2","doi-asserted-by":"publisher","DOI":"10.2307\/1229546"},{"key":"e_1_3_2_185_2","doi-asserted-by":"publisher","DOI":"10.1145\/1929609.1929610"},{"key":"e_1_3_2_186_2","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_3_2_187_2","first-page":"745","article-title":"I've got nothing to hide and other misunderstandings of privacy","volume":"44","author":"Solove Daniel J.","year":"2007","unstructured":"Daniel J. Solove. 2007. I've got nothing to hide and other misunderstandings of privacy. San Diego Law Review 44 (2007), 745.","journal-title":"San Diego Law Review"},{"key":"e_1_3_2_188_2","first-page":"1482","article-title":"The myth of the privacy paradox","volume":"89","author":"Solove Daniel J.","year":"2021","unstructured":"Daniel J. Solove. 2021. The myth of the privacy paradox. GW Law Faculty Publications & Other Works 89 (2021), 1482.","journal-title":"GW Law Faculty Publications & Other Works"},{"key":"e_1_3_2_189_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300314"},{"key":"e_1_3_2_190_2","first-page":"1","article-title":"The poverty of privacy: Understanding privacy trade-offs from identity infrastructure users in India","volume":"12","author":"Srinivasan Janaki","year":"2018","unstructured":"Janaki Srinivasan, Savita Bailur, Emrys Schoemaker, and Sarita Seshagiri. 2018. The poverty of privacy: Understanding privacy trade-offs from identity infrastructure users in India. International Journal of Communication 12 (2018), 1\u201320.","journal-title":"International Journal of Communication"},{"key":"e_1_3_2_191_2","doi-asserted-by":"publisher","DOI":"10.1145\/2516604.2516625"},{"key":"e_1_3_2_192_2","doi-asserted-by":"publisher","DOI":"10.17351\/ests2020.276"},{"key":"e_1_3_2_193_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-954X.1990.tb03347.x"},{"key":"e_1_3_2_194_2","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675298"},{"key":"e_1_3_2_195_2","doi-asserted-by":"publisher","DOI":"10.1080\/01419870.2014.948476"},{"key":"e_1_3_2_196_2","volume-title":"Grounded Theory in Practice","author":"Strauss Anselm L.","year":"1998","unstructured":"Anselm L. Strauss and Juliet M. Corbin. 1998. Grounded Theory in Practice. SAGE."},{"key":"e_1_3_2_197_2","volume-title":"Group Privacy: New Challenges of Data Technologies","author":"Taylor Linnet","year":"2016","unstructured":"Linnet Taylor, Luciano Floridi, and Bart Van der Sloot (Eds.). 2016. Group Privacy: New Challenges of Data Technologies. Vol. 126. Springer."},{"key":"e_1_3_2_198_2","volume-title":"Proceedings of the 16th Participatory Design Conference (PDC\u201920)","author":"Teli Maurizio","year":"2020","unstructured":"Maurizio Teli, Marcus Foth, Mariacristina Sciannamblo, Irina Anastasiu, and Peter Lyle. 2020. Tales of institutioning and commoning\u2014Participatory design processes with a strategic and tactical perspective. In Proceedings of the 16th Participatory Design Conference (PDC\u201920)."},{"key":"e_1_3_2_199_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2021.101717"},{"key":"e_1_3_2_200_2","unstructured":"Yiannis Theodorou. 2022. On the Road to Digital-ID Success in Africa: Leveraging Global Trends. (June 2022). Retrieved August 18 2023 from https:\/\/institute.global\/policy\/road-digital-id-success-africa-leveraging-global-trends#:\u223c:text=Making%20or%20Breaking%20a%20Digital%2DID%20Ecosystem&text=In%20addition%2C%20digital%2DID%20holders of%20the%20personal%20information%20collected"},{"key":"e_1_3_2_201_2","article-title":"The data delusion: Protecting individual data isn't enough when the harm is collective","author":"Tisn\u00e9 Martin","year":"2020","unstructured":"Martin Tisn\u00e9. 2020. The data delusion: Protecting individual data isn't enough when the harm is collective. Luminate. (July 2020). Retrieved August 18, 2023 from https:\/\/luminategroup.com\/storage\/1023\/The-Data-Delusion\u2014July-2020.pdf","journal-title":"Luminate"},{"key":"e_1_3_2_202_2","doi-asserted-by":"publisher","DOI":"10.1145\/3382494.3422162"},{"key":"e_1_3_2_203_2","unstructured":"Transparency International. 2021. Corruption Perceptions Index. Retrieved August 18 2023 from https:\/\/www.transparency.org\/en\/cpi\/2021"},{"key":"e_1_3_2_204_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.08.022"},{"key":"e_1_3_2_205_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15346-4_8"},{"key":"e_1_3_2_206_2","unstructured":"United Nations Conference on Trade and Development. 2021. Data Protection and Privacy Legislation Worldwide. Retrieved August 18 2023 from https:\/\/unctad.org\/page\/data-protection-and-privacy-legislation-worldwide"},{"key":"e_1_3_2_207_2","unstructured":"United Nations Department of Economic and Social Affairs. 2020. E-Government Survey 2020: Digital Government in the Decade of Action for Sustainable Development. Retrieved August 18 2023 from https:\/\/publicadministration.un.org\/egovkb\/Portals\/egovkb\/Documents\/un\/2020-Survey\/2020%20UN%20E-Government%20Survey%20(Full%20Report).pdf"},{"key":"e_1_3_2_208_2","unstructured":"United States Agency for International Development. 2017. Identity in a Digital Age: Infrastructure for Inclusive Development. Retrieved July 21 2018 from https:\/\/www.usaid.gov\/digital-development\/digital-id\/report"},{"key":"e_1_3_2_209_2","unstructured":"U.S. Department of State. 2019. 2019 Country Reports on Human Rights Practices: Namibia. Retrieved August 18 2023 from https:\/\/www.state.gov\/reports\/2019-country-reports-on-human-rights-practices\/namibia\/"},{"key":"e_1_3_2_210_2","first-page":"1","volume-title":"Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems","author":"Ut Christine","year":"2021","unstructured":"Christine Ut, Steffen Becker, Theodor Schnitzler, Florian M. Farke, Franziska Herbert, Leonie Schaewitz, Martin Degeling, and Markus D\u00fcrmuth. 2021. Apps against the spread: Privacy implications and user acceptance of COVID-19-related smartphone apps on three continents. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1\u201322."},{"key":"e_1_3_2_211_2","volume-title":"Towards the Evaluation of Socio-Digital ID Ecosystems in Africa: Comparative analysis of findings from Ten Country Case Studies","author":"van der Spuy Anri","year":"2021","unstructured":"Anri van der Spuy, Vrinda Bhandari, Shruti Trikanad, and Yesha Tshering Paul. 2021. Towards the Evaluation of Socio-Digital ID Ecosystems in Africa: Comparative analysis of findings from Ten Country Case Studies. Research ICT Africa."},{"key":"e_1_3_2_212_2","article-title":"E-Government interoperability: A cooperative architecture model to facilitate information sharing in Namibia","author":"Staden Stefanus Van","year":"2011","unstructured":"Stefanus Van Staden. 2011. E-Government interoperability: A cooperative architecture model to facilitate information sharing in Namibia. Afribary. Retrieved August 18, 2023 from https:\/\/afribary.com\/works\/e-government-interoperability-a-cooperative-architecture-model-to-facilitate-information-sharing-in-namibia","journal-title":"Afribary"},{"key":"e_1_3_2_213_2","unstructured":"Stefanus Van Staden and Paulus Sheetekela 2018. Unified cooperative population identification architecture to enhance the national identity ecosystem of developing countries. In 2018 IST-Africa Week Conference (IST-Africa) IEEE 1."},{"key":"e_1_3_2_214_2","volume-title":"Proceedings of the 2018 IST-Africa Week Conference (IST-Africa\u201918)","author":"Staden Stefanus Van","year":"2018","unstructured":"Stefanus Van Staden and Paulus Sheetekela 2018. Unified cooperative population identification architecture to enhance the national identity ecosystem of developing countries. In Proceedings of the 2018 IST-Africa Week Conference (IST-Africa\u201918). IEEE, Los Alamitos, CA."},{"key":"e_1_3_2_215_2","volume-title":"Aadhaar Technology & Architecture: Principles, Design, Best Practices, & Key Lessons","year":"2014","unstructured":"Unique Identification Authority of India Planning Commission. 2014. Aadhaar Technology & Architecture: Principles, Design, Best Practices, & Key Lessons. Government of India."},{"key":"e_1_3_2_216_2","doi-asserted-by":"publisher","DOI":"10.1145\/3209811.3209818"},{"key":"e_1_3_2_217_2","doi-asserted-by":"publisher","DOI":"10.1037\/xge0000175"},{"issue":"2","key":"e_1_3_2_218_2","first-page":"573","article-title":"A relational theory for data governance","volume":"131","author":"Viljoen Salom\u00e9","year":"2022","unstructured":"Salom\u00e9 Viljoen. 2022. A relational theory for data governance. Yale Law Journal 131, 2 (2022), 573\u2013654.","journal-title":"Yale Law Journal"},{"key":"e_1_3_2_219_2","doi-asserted-by":"publisher","DOI":"10.1177\/20539517211006744"},{"key":"e_1_3_2_220_2","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675229"},{"key":"e_1_3_2_221_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300492"},{"key":"e_1_3_2_222_2","doi-asserted-by":"publisher","DOI":"10.1145\/3608113"},{"key":"e_1_3_2_223_2","unstructured":"World Bank Group's Identification for Development. 2018. Private Sector Economic Impacts from Identification Systems. World Bank Group Washington DC."},{"key":"e_1_3_2_224_2","volume-title":"Private Sector Economic Impacts from Identification Systems","year":"2018","unstructured":"World Bank Group's Identification for Development. 2018. Private Sector Economic Impacts from Identification Systems. World Bank Group, Washington, DC."},{"key":"e_1_3_2_225_2","unstructured":"World Bank Group's Identification for Development. 2019. Digital ID and the Data Protection Challenge: Practitioner's Note. Retrieved August 18 2023 from https:\/\/openknowledge.worldbank.org\/bitstream\/handle\/10986\/32629\/Digital-ID-and-the-Data-Protection-Challenge-Practitioners-Note.pdf?sequence=1&isAllowed=y"},{"key":"e_1_3_2_226_2","unstructured":"World Bank Group's Identification for Development. 2022. ID4D Global Dataset. Retrieved August 18 2023 from https:\/\/id4d.worldbank.org\/global-dataset"},{"key":"e_1_3_2_227_2","unstructured":"World Bank Group. 2016. Namibia Identity Management System Analysis Report. Retrieved August 18 2023 from https:\/\/documents1.worldbank.org\/curated\/en\/184451466711154296\/Namibia-Identity-Management-System-Analysis-Report.pdf"},{"key":"e_1_3_2_228_2","volume-title":"ID4D Country Diagnostic: Namibia","year":"2016","unstructured":"World Bank. 2016. ID4D Country Diagnostic: Namibia. World Bank Publications, Washington, DC. https:\/\/documents1.worldbank.org\/curated\/en\/922381468196196254\/pdf\/Namibia-ID4D-Diagnostic-WebV042018.pdf"},{"key":"e_1_3_2_229_2","volume-title":"World Development Report 2021: Data for Better Lives","year":"2021","unstructured":"World Bank Group. 2021. World Development Report 2021: Data for Better Lives. World Bank Group, Washington DC. https:\/\/wdr2021.worldbank.org\/"},{"key":"e_1_3_2_230_2","unstructured":"World Bank Group. 2021. The Global Findex Database 2021: Financial Inclusion Digital Payments and Resilience in the Age of COVID-19. https:\/\/www.worldbank.org\/en\/publication\/globalfindex"},{"key":"e_1_3_2_231_2","unstructured":"World Bank Group. 2021. The Global Findex Database 2021: Financial Inclusion Digital Payments and Resilience in the Age of COVID-19. Retrieved August 18 2023 from https:\/\/www.worldbank.org\/en\/publication\/globalfindex"},{"key":"e_1_3_2_232_2","unstructured":"World Bank Group. 2021. Creating Markets in Namibia: Country Private Sector Diagnostic. Retrieved August 18 2023 from https:\/\/www.ifc.org\/wps\/wcm\/connect\/publications_ext_content\/ifc_external_publication_site\/publications_listing_page\/cpsd-namibia"},{"key":"e_1_3_2_233_2","doi-asserted-by":"publisher","DOI":"10.5325\/jinfopoli.7.2017.0111"},{"key":"e_1_3_2_234_2","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2015.5"}],"container-title":["ACM Journal on Computing and Sustainable Societies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3616024","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3616024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T17:40:29Z","timestamp":1756402829000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3616024"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,13]]},"references-count":233,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,3,31]]}},"alternative-id":["10.1145\/3616024"],"URL":"https:\/\/doi.org\/10.1145\/3616024","relation":{},"ISSN":["2834-5533"],"issn-type":[{"value":"2834-5533","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,13]]},"assertion":[{"value":"2023-04-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-04-21","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}