feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV048270928
    Format: 1 Online-Ressource (1 Seiten)
    Series Statement: World Bank E-Library Archive
    Content: The report is organized into the following sections: section two presents the approach and methodology of the evaluation used. It gives an overview of the Identification Systems Analysis (ISA). Section three gives a detailed description of the Identity ecosystem in Cote d'Ivoire. It examines all the identification schemes that were considered of primary importance by the Mission and that were part of the interviews conducted. Where enough data was collected, the ISA analysis is performed and the color coded score is presented. Section four presents a series of recommendations to address the identification needs of the WB Project but also for improving the identification practices in the country in general. Those recommendations are based on the extensive experience that the World Bank ISA team has had in the course of applying the tool in similar environments. In addition to these primary sections, the report contains four appendices: appendix one presents the scoring methodology of ISA. Appendix two provides a brief history of identification regulations in Cote d'Ivoire. It is meant to give some legal context to the identification schemes currently in place. Appendix three discusses how the foundation of current identity schemes (national identity card and the voter register) were dictated by the Peace Accord of Ouagadougou, and what role identity played in the conflict and the exit from that period. Appendix four is a detailed overview of the important law on privacy. The so called Law No. 2013-450 related to the protection of personally identifying information, which was adopted in 2013 and is currently being enforced systematically. This is the Cote d'Ivoire adaptation of the ECOWAS law on data protection and it represents a very significant body of codified legislation
    Language: English
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_797849173
    Format: Online-Ressource
    ISBN: 9780821375815
    Content: All countries fund safety net programs for the protection of their people. Though an increasing number of safety net programs are extremely well thought out, adroitly implemented, and demonstrably effective, many others are not. This book aims to assist those concerned with social policy to understand why countries need social assistance, what kind of safety programs will serve those best and how to develop such programs for maximum effectiveness. Safety nets are part of a broader poverty reduction strategy interacting with and working alongside of social insurance; health, education, and financial services; the provision of utilities and roads; and other policies aimed at reducing poverty and managing risk. Though useful, safety nets are not a panacea, and there are real concerns over whether they are affordable and administratively feasible or desirable in light of the various negative incentives they might create. In most settings where there is political will to do so, such concerns can be managed through a number of prudent design and implementation features. Much information and innovation exist on these topics; this book summarizes, references, and builds on this knowledge base to promote well-crafted safety nets and safety net policy.
    Note: English , en_US
    Language: English
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    edoccha_9960786998102883
    Format: 1 online resource (1 pages)
    Series Statement: Other Public Sector Study
    Content: The report is organized into the following sections: section two presents the approach and methodology of the evaluation used. It gives an overview of the Identification Systems Analysis (ISA). Section three gives a detailed description of the Identity ecosystem in Cote d'Ivoire. It examines all the identification schemes that were considered of primary importance by the Mission and that were part of the interviews conducted. Where enough data was collected, the ISA analysis is performed and the color coded score is presented. Section four presents a series of recommendations to address the identification needs of the WB Project but also for improving the identification practices in the country in general. Those recommendations are based on the extensive experience that the World Bank ISA team has had in the course of applying the tool in similar environments. In addition to these primary sections, the report contains four appendices: appendix one presents the scoring methodology of ISA. Appendix two provides a brief history of identification regulations in Cote d'Ivoire. It is meant to give some legal context to the identification schemes currently in place. Appendix three discusses how the foundation of current identity schemes (national identity card and the voter register) were dictated by the Peace Accord of Ouagadougou, and what role identity played in the conflict and the exit from that period. Appendix four is a detailed overview of the important law on privacy. The so called Law No. 2013-450 related to the protection of personally identifying information, which was adopted in 2013 and is currently being enforced systematically. This is the Cote d'Ivoire adaptation of the ECOWAS law on data protection and it represents a very significant body of codified legislation.
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    gbv_1759716464
    Format: 1 Online-Ressource
    Content: The report is organized into the following sections: section two presents the approach and methodology of the evaluation used. It gives an overview of the Identification Systems Analysis (ISA). Section three gives a detailed description of the Identity ecosystem in Cote d’Ivoire. It examines all the identification schemes that were considered of primary importance by the Mission and that were part of the interviews conducted. Where enough data was collected, the ISA analysis is performed and the color coded score is presented. Section four presents a series of recommendations to address the identification needs of the WB Project but also for improving the identification practices in the country in general. Those recommendations are based on the extensive experience that the World Bank ISA team has had in the course of applying the tool in similar environments. In addition to these primary sections, the report contains four appendices: appendix one presents the scoring methodology of ISA. Appendix two provides a brief history of identification regulations in Côte d’Ivoire. It is meant to give some legal context to the identification schemes currently in place. Appendix three discusses how the foundation of current identity schemes (national identity card and the voter register) were dictated by the Peace Accord of Ouagadougou, and what role identity played in the conflict and the exit from that period. Appendix four is a detailed overview of the important law on privacy. The so called Law No. 2013-450 related to the protection of personally identifying information, which was adopted in 2013 and is currently being enforced systematically. This is the Côte d’Ivoire adaptation of the ECOWAS law on data protection and it represents a very significant body of codified legislation
    Note: Cote d'Ivoire , English , en_US
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Washington, DC : World Bank
    UID:
    gbv_797577211
    Format: Online-Ressource
    Series Statement: Social Safety Nets Primer Notes 20
    Content: To be successful, Social Safety Net (SSN) programs require three elements of policy design: technical correctness, administrative feasibility and political viability; yet the politically supportable aspect is often neglected. In this note, several features of political economy applicable to the choice, design, and implementation of safety net programs are discussed: modeling the electoral politics of targeting; the roles of attitudes and perceptions; centralized versus localized control; internal and organizational politics, and finally, politics and the different social objectives of safety ropes and safety nets. The note discusses the political viability of any SSN program, profoundly influenced by corruption and the perceptions of horizontal equity, process and administrative fairness, and effectiveness. Corruption subverts all three perceptions, and so is especially damaging to political support. Moreover, changes in the average poverty rate mask enormous "churning" as households move in and out of poverty. This volatility creates the demand not just for transfer programs to those whose incomes are chronically low (safety nets), but also for insurance-like programs that would pay off not only when income was absolutely low, but also when households experienced negative shocks (safety ropes). While safety "nets" seek to minimize income or expenditure poverty, the objective of safety "ropes" is to mitigate risk. If the targeting of social programs is judged exclusively on poverty or benefit incidence based on a cross sectional snapshot, then risk mitigation programs benefiting households who have suffered large shocks, but who are not "poor" may appear to have large "leakage" when in fact they are simply serving an alternative social objective. While a "safety net" program might be more popular, the more effectively it transfers from richer to poorer households, a "safety rope" program might cause little net redistribution, but be popular because it serves an important insurance function.
    Language: English
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages