European Journal of Information Systems

, Volume 17, Issue 6, pp 668–677

Doing the politics of technological decision making: due process and the debate about identity cards in the U.K.

Original Article

Abstract

The U.K. Government, in presenting its proposals for biometric identity cards, made strong claims about the technology and science underlying the proposed National Identity Scheme. In this paper, we use insights from science and technology studies (STS), particularly Latour's ‘Politics of Nature’ argument, to analyse the parliamentary debates about the technological and scientific aspects of the proposals. The authors were part of a team that produced a report that raised a series of perplexities about the Scheme in an attempt to counter the short-circuiting of discussion of these perplexities in the parliamentary debate. The paper analyses the government's attempts at short-circuiting in light of Latour's argument and the introduction of perplexities by our report. It demonstrates the extent to which this form of STS can enhance political debate about technological decisions.

Keywords

identity cards biometrics databases science and technology studies due process informed advocates 

References

  1. Agar J (2005) Identity cards in Britain: past experience and policy implications. History and Policy. Archived at http://www.historyandpolicy.org/archive/policy-paper-33.html.
  2. Anonymous (n.d.) Liveness detection in biometric systems. Archived at http://www.biometricsinfo.org/whitepaper1.htm.
  3. Avgerou C and McGrath K (2007) Power, rationality and the art of living through socio-technical change. MIS Quarterly 31 (2), 295–315.Google Scholar
  4. Barnes B, Bloor D and Henry J (1996) Scientific Knowledge: A Sociological Analysis. Athlone, London.Google Scholar
  5. Barry A (2001) Political Machines: Governing a Technological Society. Athlone, London.Google Scholar
  6. Baskerville R and Wood-Harper AT (1998) Diversity in information systems action research methods. European Journal of Information Systems 7 (2), 90–107.CrossRefGoogle Scholar
  7. Bauchspies WK, Croissant J and Restivo S (2006) Science, Technology, and Society: A Sociological Approach. Blackwell, Oxford.Google Scholar
  8. BBC News (2005a) £300 price tag on ID cards ‘mad’, 16 June. Archived at http://news.bbc.co.uk/1/hi/uk_politics/4099356.stm.
  9. BBC News (2005b) ID cards academic attacks Clarke, 5 July. Archived at http://news.bbc.co.uk/1/hi/uk_politics/4651299.stm.
  10. BBC News (2007) ID cards will give ‘false’ data. Archived at http://news.bbc.co.uk/1/hi/programmes/file_on_4/6922882.stm.
  11. Berghel H (2006) Fungible credentials and next-generation fraud. Communications of the ACM 49 (12), 15–19.CrossRefGoogle Scholar
  12. Bijker WE, Hughes TP and Pinch T (Eds), (1987) The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology. The MIT Press, Cambridge, MA.Google Scholar
  13. Blair T (2005) Prime minister's press conference, 27 June. Archived at http://www.number10.gov.uk/output/Page7728.asp.
  14. British Telecommunications PLC (2004) Memorandum submitted by British telecommunications plc to the select committee on home affairs, January. Archived at http://www.publications.parliament.uk/pa/cm200304/cmselect/cmhaff/130/130we04.htm.
  15. Cabinet Office (2008) Data Handling Procedures in Government: Final Report.Google Scholar
  16. Collins H and Evans R (2007) Rethinking Expertise. University of Chicago Press, Chicago.CrossRefGoogle Scholar
  17. Collins H and Pinch T (1998) The Golem: What you Should Know About Science. Canto, Cambridge.Google Scholar
  18. Collins HM (1981) Stages in the empirical programme of relativism. Social Studies of Science 11 (1), 3–10.CrossRefGoogle Scholar
  19. Collins HM (1992) Changing Order: Replication and Induction in Scientific Practice. University of Chicago Press, Chicago.Google Scholar
  20. Cutcliffe SH (2000) Ideas, Machines and Values: An Introduction to Science, Technology and Society Studies. Rowman and Littlefield, Lanham.Google Scholar
  21. Davies H (2005) Letter: LSE report on ID cards cost. The Times, 2 July. Archived at http://www.timesonline.co.uk/article/0,,59-1677135,00.html.
  22. Davies H (2006) Letter to the prime minister, 20 January. Archived at http://identityproject.lse.ac.uk/daviestoblair.pdf.
  23. Dunleavy P, Margetts H, Bastow S and Tinkler J (2006) Digital Era Governance: IT Corporations, the State and E-Government. Oxford University Press, Oxford.CrossRefGoogle Scholar
  24. Elliot R (2006) An early experiment in national identity cards: the battle over registration in the First World War. Twentieth Century British History 17 (2), 145–176.CrossRefGoogle Scholar
  25. Fuchs S (1992) The Professional Quest for Truth: A Social Theory of Science and Knowledge. State University of New York Press, Albany, NY.Google Scholar
  26. GAO (2005) Homeland security: some progress made, but many challenges remain on U.S. visitor and immigrant status indicator technology program general accounting office. Archived at http://www.gao.gov/new.items/d05202.pdf.
  27. Habermas J (1970) Toward a Rational Society: Student Protest, Science and Politics. Beacon Press, Boston.Google Scholar
  28. Heath N (2008) ID-cards scheme will ‘drown’ in mismatches ZDNet, 29 September. Archived at http://news.zdnet.co.uk/security/0,1000000189,39495664,00.htm.
  29. Heeks R and Stanforth C (2007) Understanding e-government project trajectories from an actor-network perspective. European Journal of Information Systems 16 (2), 165–177.CrossRefGoogle Scholar
  30. Hencke D and Dodd V (2006) Defence expert undermines Blair on safety of ID cards, 13 February. Archived at http://www.guardian.co.uk/idcards/story/0,,1708461,00.html.
  31. Home Affairs Committee (2004) Identity cards: fourth report of session 2003–2004, 20 July. Archived at http://www.publications.parliament.uk/pa/cm200304/cmselect/cmhaff/130/13002.htm.
  32. Home Office (2002) Entitlement cards and identity fraud: a consultation paper. Archived at http://ips.gov.uk/identity/downloads/entitlement-cards.pdf.
  33. Home Office (2005a) Home office response to the London school of economics' ID cards cost estimates & alternative blueprint. Archived at http://identityproject.lse.ac.uk/HomeOffice_ResponseTo_LSE_AlternativeBlueprint.pdf.
  34. Home Office (2005b) Regulatory impact assessment. Archived at http://www.ips.gov.uk/identity/downloads/Identity-cards-bill-regulatory-impact.pdf.
  35. Horton KS and Wood-Harper TA (2006) The shaping of IT trajectories: evidence from the U.K. public sector. European Journal of Information Systems 15 (2), 214–224.CrossRefGoogle Scholar
  36. Hosein I (2004) The sources of laws: policy dynamics in a digital and terrorized world. The Information Society 20 (3), 187–199.CrossRefGoogle Scholar
  37. House of Lords (2005) Bills and how they become Law. Archived at http://www.parliament.uk/documents/upload/HofLBpBillsandhow.pdf.
  38. Jain AK, Ross A and Pankanti S (2006) Biometrics: a tool for information security. IEEE Transactions on Information Forensics and Security 1 (2), 125–143.CrossRefGoogle Scholar
  39. Jasanoff S (2005) Designs on Nature: Science and Democracy in Europe and the United States. Princeton University Press, Princeton.CrossRefGoogle Scholar
  40. Kabatoff M and Daugman J (2008) Pattern recognition: biometrics, identity and the state – an interview with John Daugman. Biosocieties 3 (1), 81–86.CrossRefGoogle Scholar
  41. Latour B (1999) Pandora's Hope: Essays on the Reality of Science Studies. Harvard University Press, Cambridge, MA.Google Scholar
  42. Latour B (2004) The Politics of Nature: How to Bring the Sciences into Democracy. Harvard University Press, Cambridge, MA.Google Scholar
  43. Lindgren R, Henfridsson O and Schultze U (2004) Design principles for competence management systems: a synthesis of an action research study. MIS Quartlery 28 (3), 435–472.Google Scholar
  44. LSE Identity Project (2005a) Interim report, 21 March. Archived at http://identityproject.lse.ac.uk/interimreport.pdf.
  45. LSE Identity Project (2005b) Main report, 27 June. Archived at http://identityproject.lse.ac.uk/identityreport.pdf.
  46. LSE Identity Project (2006a) All party briefing for report stage: voluntary v. compulsory regimes. London School of Economics and Political Science, 23 January. Archived at http://identityproject.lse.ac.uk/voluntarybriefing.pdf.
  47. LSE Identity Project (2006b) Research status report, 15 January. Archived at http://identityproject.lse.ac.uk/statusreport.pdf.
  48. Macnaghten P, Kearnes MB and Wynne B (2005) Nanotechnology, governance, and public deliberation: what role for the social sciences? Science Communication 27 (2), 268–291.CrossRefGoogle Scholar
  49. Mansfield T, Kelly G, Chandler D and Kane J (2001) Biometric product testing final report national physical laboratory, 19 March. Archived at http://www.cesg.gov.uk/policy_technologies/biometrics/media/biometrictestreportpt1.pdf.
  50. Mansfield T and Rejman-Greene M (2003) Feasibility study on the use of biometrics in an entitlement scheme national physical laboratory. Archived at http://dematerialised.com/PDFs/Feasibility_study031111_V2.pdf.
  51. Matsumoto T, Matsumoto H, Yamada K and Hoshino S (2002) Impact of artificial ‘gummy’ fingers on fingerprint systems, 15 May. Archived at http://www.cryptome.org/gummy.htm.
  52. Mosse B and Whitley EA (2009) Critically classifying: U.K. e-government website benchmarking and the recasting of the citizen as customer. Information Systems Journal (forthcoming).Google Scholar
  53. NIST (2005) The myth of goats: how many people have fingerprints that are hard to match? National institute of science and technology. Archived at http://www.itl.nist.gov/iad/894.03/pact/ir_7271.pdf.
  54. Orlikowski W (2006) Material knowing: the scaffolding of human knowledgeability. European Journal of Information Systems 15 (5), 460–466.CrossRefGoogle Scholar
  55. Otjacques B, Hitzelberger P and Feltz F (2007) Interoperability of e-government information systems: issues of identification and data sharing. Journal of Management Information Systems 23 (4), 29–52.CrossRefGoogle Scholar
  56. Pouloudi A and Whitley EA (2000) Representing human and non-human stakeholders: on speaking with authority. In Organizational and Social Perspectives on Information Technology (BASKERVILLE R, STAGE J and GROSS JID, Eds), pp 339–354, Kluwer, Aalborg.CrossRefGoogle Scholar
  57. Poynter K (2008) Poynter review final report, 25 June. Archived at http://62.164.176.164/d/poynter_review250608.pdf.
  58. Rip A, Misa TJ and Schot J (Eds), (1995) Managing Technology in Society: The Approach of Constructive Technology Assessment. Pinter Publishers, London.Google Scholar
  59. Science and Technology Select Committee (2006) Identity card technologies: scientific advice, risk and evidence house of commons. Archived at http://www.publications.parliament.uk/pa/cm200506/cmselect/cmsctech/1032/1032.pdf.
  60. Sorensen C, Whitley EA, Madon S, Klyachko D, Hosein IR and Johnstone J (2001) Cultivating recalcitrance in information systems research. In Realigning Research and Practice in IS Development: The Social and Organisational Perspective (RUSSO N, FITZGERALD B and GROSS JID, Eds), pp 297–316, Kluwer, Boise, Idaho.Google Scholar
  61. UKIPS (2006) Strategic action plan for the national identity scheme. Archived at http://ips.gov.uk/identity/downloads/Strategic-Action-Plan.pdf.
  62. UKIPS (2008a) National identity scheme delivery plan, 6 March 2008. Archived at http://ips.gov.uk/identity/downloads/national-identity-scheme-delivery-2008.pdf.
  63. UKIPS (2008b) What is the national identity scheme? Archived at http://www.ips.gov.uk/identity/scheme-what.asp.
  64. West DM (2004) E-government and the transformation of service delivery and citizen attitudes. Public Administration Review 64 (1), 15–27.CrossRefGoogle Scholar
  65. Whitley EA (2009) Perceptions of government technology, surveillance and privacy: the U.K. identity cards scheme. In New Directions in Privacy and Surveillance (NEYLAND D and GOOLD B, Eds), Willan, Cullompton.Google Scholar
  66. Whitley EA and Hosein I (2001) Doing politics around electronic commerce: opposing the regulation of investigatory powers bill. In Realigning Research and Practice in IS Development: The Social and Organisational Perspective (RUSSO N, FITZGERALD B and GROSS JID, Eds), pp 415–438, Kluwer, Boise, Idaho.Google Scholar
  67. Whitley EA and Hosein IR (2005) Policy discourse and data retention: the technology politics of surveillance in the United Kingdom. Telecommunications Policy 29 (11), 857–874.CrossRefGoogle Scholar
  68. Whitley EA and Hosein IR (2008) Departmental influences on policy design: how the U.K. is confusing identity fraud with other policy agendas. Communications of the ACM 51 (5), 98–100.CrossRefGoogle Scholar
  69. Whitley EA and Hosein IR (2009) Global Issues in Identity Management. Palgrave, Basingstoke.Google Scholar
  70. Whitley EA, Hosein IR, Angell IO and Davies S (2007) Reflections on the academic policy analysis process and the U.K. identity cards scheme. The Information Society 23 (1), 51–58.CrossRefGoogle Scholar
  71. Yearley S (2005) Making Sense of Science: Understanding the Social Study of Science. Sage, London.Google Scholar

Copyright information

© Palgrave Macmillan 2008

Authors and Affiliations

  1. 1.Department of ManagementInformation Systems and Innovation Group, London School of Economics and Political ScienceU.K.

Personalised recommendations