Identifying the Key Drivers of Digital Signature Implementation in Iran (Using Fuzzy Delphi Method)
Subject Areas : ICTGhorbanali Mehrabani 1 * , Fatemeh Zargaran khouzani 2
1 - Strategic Department, University of Management, Supreme National Defense University, Tehran, Iran
2 -
Keywords: Digital Signature, Digital Transformation, fuzzy Delphi, Information Security, Authentication, Key Drivers,
Abstract :
Despite the emphasis of researchers and experts on the need to implement digital signatures and the progress of technology towards the digitization of all affairs and electronic governance, Iran is still facing the challenge of implementing digital signatures. The purpose of this article is to identify and analyze the key drivers of digital signature implementation in Iran with a fuzzy Delphi approach. In terms of practical purpose and in terms of information gathering, the research has benefited from a hybrid approach. The statistical community consists of all experts and specialists in the field of information technology and digital signature and articles in this field. The sample size of the statistical community of experts is 13 people who were selected by the purposeful sampling method. 31 articles were selected based on their availability and downloadable, non-technical nature, and relevance to the topic. The method of data analysis was done according to the fuzzy Delphi approach. Validity and reliability were calculated and confirmed using the CVR index and Cohen's kappa test with coefficients of 0.83 and 0.93, respectively. The results prove that the key drivers of digital signature implementation in Iran include 5 main dimensions and 30 concepts, which are 1) security (information confidentiality, information security, sender authentication, document authentication, privacy protection, trust between parties), 2) business (digital business models, communication needs, staff management, organization size, organizational structure, organization resources, organizational culture, top managers, competition ecosystem, e-governance), 3) user (perceived convenience, perceived benefit, consumer behavior, consumer literacy, consumer lifestyle), 4) technical (development of technical infrastructure, systems integration, system complexity, system tanks, design quality, technical speed of certificate production and verification, impermeability of hackers) and 5) Legal (legal licenses, penal laws, legislative body, e-commerce laws). It is suggested that in the field of digital signature implementation, special attention should be paid to rewriting rules, training users, creating a security culture, and digital signature policymakers should invite knowledge-based companies to cooperate in developing infrastructure and making relevant software competitive.
[1] Zhang, J. (2010). A study on application of digital signature technology. In 2010 International Conference on Networking and Digital Society (Vol. 1, pp. 498-501). IEEE.
[2] Tavakoli Rad, R; Zargaran Khouzani, F (2023). Successful Organizational Digital Transformation Model, the 6th International Conference on Interdisciplinary Studies in Management and Engineering. Tehran.(in Persian).
[3] Kumalo, M. O. (2020). A framework for digital signature implementations for e-government services. Internet in public administration Municipal government -- Data processing. Masters
[4] Pancholi, V. R., Patel, B. P., & Hiran, D. (2018). A Study on Importance of Digital Signature for E-Governance Schemes. vol, 4, 7-10. IJIRST –International Journal for Innovative Research in Science & Technology| Volume 4 | Issue 10 | March 2018
[5] Khashei, V., Zargaran, F., (2018). Strategic Management of Lynch, Fozhan pub, Tehran. .(in Persian).
[6] Singh, S., Iqbal, M. S., & Jaiswal, A. (2015). Survey on techniques developed using digital signature: public key cryptography. International Journal of Computer Applications, 117(16).
[7] Kaur, Ravneet; Kaur, Amandeep (2012). [IEEE 2012 International Conference on Computing Sciences (ICCS) - Phagwara, India (2012.09.14-2012.09.15)] 2012 International Conference on Computing Sciences - Digital Signature. , (), 295–301. doi:10.1109/ICCS.2012.25
[8] Gupta, A., Tung, Y. A., & Marsden, J. R. (2004). Digital signature: use and modification to achieve success in next generational e-business processes. Information & Management, 41(5), 561-575.
[9] Pooja, M., & Yadav, M. (2018). Digital Signature. International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), 3(6), 71-75.
[10] Mezher, A. E. (2018). Enhanced RSA cryptosystem based on multiplicity of public and private keys. International Journal of Electrical and Computer Engineering, 8(5), 3949.
[11] Pysarenko, V., Dorohan-Pysarenko, L., & Kantsedal, N. (2019). Application of new data formats for electronic document management in government bodies. In IOP Conference Series: Materials Science and Engineering (Vol. 568, No. 1, p. 012102). IOP Publishing.
[12] Afrianto, I., Heryandi, A., Finandhita, A., & Atin, S. (2018). E-Document Autentification With Digital Signature For Smart City: Reference Model. vol, 407, 1-6.
[13] Roy, A., & Karforma, S. (2014). Authentication of user in E-Governance: A Digital Certificate based approach. International Journal of scientific research and management (IJSRM), 2(8), 1212-1221.
[14] Singh, S., & Karaulia, D. S. (2011). E-governance: Information security issues. In International Conference on Computer Science and Information Technology (ICCSIT'2011) Pattaya (pp. 120-124).
[15] Na, Z., & Xi, X. G. (2008). The application of a scheme of digital signature in electronic government. In 2008 International Conference on Computer Science and Software Engineering (Vol. 3, pp. 618-621). IEEE.
[16] Blanchette, J. F. (2006). The digital signature dilemma. In Annales des télécommunications (Vol. 61, No. 7, pp. 908-923). Springer-Verlag.
[17] Brown, P. W. (1993). Digital signatures: can they be accepted as legal signatures in EDI?. In Proceedings of the 1st ACM conference on Computer and communications security (pp. 86-92).
[18] Lääveri, L. (2021). Consumer acceptance and usage of digital signature technologies. Jyväskylä University School of Business and Economics, Master’s Thesis
[19] Afrianto, I., Heryandi, A., Finandhita, A., & Atin, S. (2021). User Acceptance Test For Digital Signature Application In Academic Domain To Support The Covid-19 Work From Home Program. IJISTECH (International Journal of Information System and Technology), 5(3), 270-280.
[20] Sepashvili, E (2020). Digital Chain of Contemporary Global Economy: E-Commerce through E-Banking and E-Signature. Economia Aziendale Online Business and Management Sciences International Quarterly Vol 11, No 3.
[21] Theuermann, K. ., Tauber, A. and Lenz, T. , (2019). "Mobile-Only Solution for Server-Based Qualified Electronic Signatures," ICC 2019 - IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1-7, doi: 10.1109/ICC.2019.8762076.
[22] Antolino-Hernandes, Anastacio, Ferreira-Medina, Heberto, Torres-Millarez, Cristhian and OLIVARES Carlos. (2019). Management of digital documents with encrypted signature, through the use of centralized PKI, and distributed using blockchain for a secure exchange. Journal of Research and Development, 5-15: 26-37.
[23] Aydin, S., Handan, Ç. A. M., & Alipour, N. (2018). Analyzing the factors affecting the use of digital signature system with the technology acceptance model. Journal of Economics Bibliography, 5(4), 238-252.
[24] Srivastava, A. (2011). Resistance to change: six reasons why businesses don’t use e-signatures. Electronic Commerce Research, 11(4), 357–382. doi:10.1007/s10660-011-9082-4
[25] Chang, I.-C., Hwang, H.-G., Hung, M.-C., Lin, M.-H., & Yen, D. C. (2007). Factors affecting the adoption of electronic signature: Executives’ perspective of hospital information department. Decision Support Systems, 44(1), 350–359. doi:10.1016/j.dss.2007.04.006
[26] Carayannis, E. G., & Turner, E. (2006). Innovation diffusion and technology acceptance: The case of PKI technology. Technovation, 26(7), 847–855. doi:10.1016/j.technovation.2005.06.013
[27] Srivastava, A. (2005). Is internet security a major issue with respect to the slow acceptance rate of digital signatures?. Computer Law & Security Review, 21(5), 392-404.
[28] L. Tkachev Pravovoy status of computer documents: Basic characteristics. Moscow, 2000, p. 8
[29] Dahabiyeh, L., & Constantinides, P. (2022). Legitimating digital technologies in industry exchange fields: the case of digital signatures. Information and Organization, 32(1), 100392.
[30] Costa, A. A., Arantes, A., & Tavares, L. V. (2013). Evidence of the impacts of public e-procurement: The Portuguese experience. Journal of Purchasing and Supply Management, 19(4), 238-246.
[31] Mohungoo, I., Brown, I., & Kabanda, S. (2020). A systematic review of implementation challenges in public E-Procurement. In Responsible Design, Implementation and Use of Information and Communication Technology: 19th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6–8, 2020, Proceedings, Part II 19 (pp. 46-58). Springer International Publishing.
[32] Kittur, A. S., & Pais, A. R. (2017). Batch verification of digital signatures: approaches and challenges. Journal of information security and applications, 37, 15-27.
[33] Ţurcanu, D., Popovici, S., & Țurcanu, T. (2020). Digital signature: advantages, challenges and strategies. Journal of Social Sciences, 4(3), 62-72.
[34] Ziaeipour, E; Rajabzadeh Qatari, A; Taghizadeh, A(1401). Explaining the adoption process of software-focused networks (SDN) using a foundational and systemic approach. Iran biannual information technology and communication. 51 (14). 172-194. (In Persian).
[35] Karami,, M., Tabatabaeian, S. H., Hanafizadeh, P. H., & Bamdad Soofi, J. (2018). Factors influencing diffusion of Digital Signature in Iranian public Organizations. Iranian Journal of Public Policy, 4(3), 87-102. doi: 10.22059/ppolicy.2018.68428. (In Persian).
[36] Pourqasmi, M; Hadi Pikani, M (2018). Identifying factors affecting the establishment of digital signature system in Isfahan municipality with phenomenological approach, the fourth international research conference in science and engineering. (In Persian).
[37] Esfahani, F; Sarghi Sharbian, M; Mirftahi, M (2019). Authentication in Internet of Things using digital signature, the third national conference of knowledge and technology of electrical, computer and mechanical engineering of Iran. (In Persian).
[38] Pasalar, I (2015). Identifying factors influencing the acceptance of technology among the citizens of Bushehr city; (Study subject: digital signature). Master's thesis. Persian Gulf University. (In Persian).
[39] Mahmoudkhani, Z (2011) Investigating the impact of effective factors on organizational readiness to use digital signatures in electronic banking. Master's thesis, Payam Noor Tehran Center. (In Persian).
[40] Elsan, M (2004). The role of digital signature in electronic document registration. Center, No. 55. (In Persian).
[41] Sandelowski, M., Barroso, J., & Voils, C. I. (2007). Using qualitative metasummary to synthesize qualitative and quantitative descriptive findings. Research in nursing & health, 30(1), 99-111.