Abstract
The U.K. Government, in presenting its proposals for biometric identity cards, made strong claims about the technology and science underlying the proposed National Identity Scheme. In this paper, we use insights from science and technology studies (STS), particularly Latour's ‘Politics of Nature’ argument, to analyse the parliamentary debates about the technological and scientific aspects of the proposals. The authors were part of a team that produced a report that raised a series of perplexities about the Scheme in an attempt to counter the short-circuiting of discussion of these perplexities in the parliamentary debate. The paper analyses the government's attempts at short-circuiting in light of Latour's argument and the introduction of perplexities by our report. It demonstrates the extent to which this form of STS can enhance political debate about technological decisions.
Similar content being viewed by others
References
Agar J (2005) Identity cards in Britain: past experience and policy implications. History and Policy. Archived at http://www.historyandpolicy.org/archive/policy-paper-33.html.
Anonymous (n.d.) Liveness detection in biometric systems. Archived at http://www.biometricsinfo.org/whitepaper1.htm.
Avgerou C and McGrath K (2007) Power, rationality and the art of living through socio-technical change. MIS Quarterly 31 (2), 295–315.
Barnes B, Bloor D and Henry J (1996) Scientific Knowledge: A Sociological Analysis. Athlone, London.
Barry A (2001) Political Machines: Governing a Technological Society. Athlone, London.
Baskerville R and Wood-Harper AT (1998) Diversity in information systems action research methods. European Journal of Information Systems 7 (2), 90–107.
Bauchspies WK, Croissant J and Restivo S (2006) Science, Technology, and Society: A Sociological Approach. Blackwell, Oxford.
BBC News (2005a) £300 price tag on ID cards ‘mad’, 16 June. Archived at http://news.bbc.co.uk/1/hi/uk_politics/4099356.stm.
BBC News (2005b) ID cards academic attacks Clarke, 5 July. Archived at http://news.bbc.co.uk/1/hi/uk_politics/4651299.stm.
BBC News (2007) ID cards will give ‘false’ data. Archived at http://news.bbc.co.uk/1/hi/programmes/file_on_4/6922882.stm.
Berghel H (2006) Fungible credentials and next-generation fraud. Communications of the ACM 49 (12), 15–19.
Bijker WE, Hughes TP and Pinch T (Eds), (1987) The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology. The MIT Press, Cambridge, MA.
Blair T (2005) Prime minister's press conference, 27 June. Archived at http://www.number10.gov.uk/output/Page7728.asp.
British Telecommunications PLC (2004) Memorandum submitted by British telecommunications plc to the select committee on home affairs, January. Archived at http://www.publications.parliament.uk/pa/cm200304/cmselect/cmhaff/130/130we04.htm.
Cabinet Office (2008) Data Handling Procedures in Government: Final Report.
Collins H and Evans R (2007) Rethinking Expertise. University of Chicago Press, Chicago.
Collins H and Pinch T (1998) The Golem: What you Should Know About Science. Canto, Cambridge.
Collins HM (1981) Stages in the empirical programme of relativism. Social Studies of Science 11 (1), 3–10.
Collins HM (1992) Changing Order: Replication and Induction in Scientific Practice. University of Chicago Press, Chicago.
Cutcliffe SH (2000) Ideas, Machines and Values: An Introduction to Science, Technology and Society Studies. Rowman and Littlefield, Lanham.
Davies H (2005) Letter: LSE report on ID cards cost. The Times, 2 July. Archived at http://www.timesonline.co.uk/article/0,,59-1677135,00.html.
Davies H (2006) Letter to the prime minister, 20 January. Archived at http://identityproject.lse.ac.uk/daviestoblair.pdf.
Dunleavy P, Margetts H, Bastow S and Tinkler J (2006) Digital Era Governance: IT Corporations, the State and E-Government. Oxford University Press, Oxford.
Elliot R (2006) An early experiment in national identity cards: the battle over registration in the First World War. Twentieth Century British History 17 (2), 145–176.
Fuchs S (1992) The Professional Quest for Truth: A Social Theory of Science and Knowledge. State University of New York Press, Albany, NY.
GAO (2005) Homeland security: some progress made, but many challenges remain on U.S. visitor and immigrant status indicator technology program general accounting office. Archived at http://www.gao.gov/new.items/d05202.pdf.
Habermas J (1970) Toward a Rational Society: Student Protest, Science and Politics. Beacon Press, Boston.
Heath N (2008) ID-cards scheme will ‘drown’ in mismatches ZDNet, 29 September. Archived at http://news.zdnet.co.uk/security/0,1000000189,39495664,00.htm.
Heeks R and Stanforth C (2007) Understanding e-government project trajectories from an actor-network perspective. European Journal of Information Systems 16 (2), 165–177.
Hencke D and Dodd V (2006) Defence expert undermines Blair on safety of ID cards, 13 February. Archived at http://www.guardian.co.uk/idcards/story/0,,1708461,00.html.
Home Affairs Committee (2004) Identity cards: fourth report of session 2003–2004, 20 July. Archived at http://www.publications.parliament.uk/pa/cm200304/cmselect/cmhaff/130/13002.htm.
Home Office (2002) Entitlement cards and identity fraud: a consultation paper. Archived at http://ips.gov.uk/identity/downloads/entitlement-cards.pdf.
Home Office (2005a) Home office response to the London school of economics' ID cards cost estimates & alternative blueprint. Archived at http://identityproject.lse.ac.uk/HomeOffice_ResponseTo_LSE_AlternativeBlueprint.pdf.
Home Office (2005b) Regulatory impact assessment. Archived at http://www.ips.gov.uk/identity/downloads/Identity-cards-bill-regulatory-impact.pdf.
Horton KS and Wood-Harper TA (2006) The shaping of IT trajectories: evidence from the U.K. public sector. European Journal of Information Systems 15 (2), 214–224.
Hosein I (2004) The sources of laws: policy dynamics in a digital and terrorized world. The Information Society 20 (3), 187–199.
House of Lords (2005) Bills and how they become Law. Archived at http://www.parliament.uk/documents/upload/HofLBpBillsandhow.pdf.
Jain AK, Ross A and Pankanti S (2006) Biometrics: a tool for information security. IEEE Transactions on Information Forensics and Security 1 (2), 125–143.
Jasanoff S (2005) Designs on Nature: Science and Democracy in Europe and the United States. Princeton University Press, Princeton.
Kabatoff M and Daugman J (2008) Pattern recognition: biometrics, identity and the state – an interview with John Daugman. Biosocieties 3 (1), 81–86.
Latour B (1999) Pandora's Hope: Essays on the Reality of Science Studies. Harvard University Press, Cambridge, MA.
Latour B (2004) The Politics of Nature: How to Bring the Sciences into Democracy. Harvard University Press, Cambridge, MA.
Lindgren R, Henfridsson O and Schultze U (2004) Design principles for competence management systems: a synthesis of an action research study. MIS Quartlery 28 (3), 435–472.
LSE Identity Project (2005a) Interim report, 21 March. Archived at http://identityproject.lse.ac.uk/interimreport.pdf.
LSE Identity Project (2005b) Main report, 27 June. Archived at http://identityproject.lse.ac.uk/identityreport.pdf.
LSE Identity Project (2006a) All party briefing for report stage: voluntary v. compulsory regimes. London School of Economics and Political Science, 23 January. Archived at http://identityproject.lse.ac.uk/voluntarybriefing.pdf.
LSE Identity Project (2006b) Research status report, 15 January. Archived at http://identityproject.lse.ac.uk/statusreport.pdf.
Macnaghten P, Kearnes MB and Wynne B (2005) Nanotechnology, governance, and public deliberation: what role for the social sciences? Science Communication 27 (2), 268–291.
Mansfield T, Kelly G, Chandler D and Kane J (2001) Biometric product testing final report national physical laboratory, 19 March. Archived at http://www.cesg.gov.uk/policy_technologies/biometrics/media/biometrictestreportpt1.pdf.
Mansfield T and Rejman-Greene M (2003) Feasibility study on the use of biometrics in an entitlement scheme national physical laboratory. Archived at http://dematerialised.com/PDFs/Feasibility_study031111_V2.pdf.
Matsumoto T, Matsumoto H, Yamada K and Hoshino S (2002) Impact of artificial ‘gummy’ fingers on fingerprint systems, 15 May. Archived at http://www.cryptome.org/gummy.htm.
Mosse B and Whitley EA (2009) Critically classifying: U.K. e-government website benchmarking and the recasting of the citizen as customer. Information Systems Journal (forthcoming).
NIST (2005) The myth of goats: how many people have fingerprints that are hard to match? National institute of science and technology. Archived at http://www.itl.nist.gov/iad/894.03/pact/ir_7271.pdf.
Orlikowski W (2006) Material knowing: the scaffolding of human knowledgeability. European Journal of Information Systems 15 (5), 460–466.
Otjacques B, Hitzelberger P and Feltz F (2007) Interoperability of e-government information systems: issues of identification and data sharing. Journal of Management Information Systems 23 (4), 29–52.
Pouloudi A and Whitley EA (2000) Representing human and non-human stakeholders: on speaking with authority. In Organizational and Social Perspectives on Information Technology (BASKERVILLE R, STAGE J and GROSS JID, Eds), pp 339–354, Kluwer, Aalborg.
Poynter K (2008) Poynter review final report, 25 June. Archived at http://62.164.176.164/d/poynter_review250608.pdf.
Rip A, Misa TJ and Schot J (Eds), (1995) Managing Technology in Society: The Approach of Constructive Technology Assessment. Pinter Publishers, London.
Science and Technology Select Committee (2006) Identity card technologies: scientific advice, risk and evidence house of commons. Archived at http://www.publications.parliament.uk/pa/cm200506/cmselect/cmsctech/1032/1032.pdf.
Sorensen C, Whitley EA, Madon S, Klyachko D, Hosein IR and Johnstone J (2001) Cultivating recalcitrance in information systems research. In Realigning Research and Practice in IS Development: The Social and Organisational Perspective (RUSSO N, FITZGERALD B and GROSS JID, Eds), pp 297–316, Kluwer, Boise, Idaho.
UKIPS (2006) Strategic action plan for the national identity scheme. Archived at http://ips.gov.uk/identity/downloads/Strategic-Action-Plan.pdf.
UKIPS (2008a) National identity scheme delivery plan, 6 March 2008. Archived at http://ips.gov.uk/identity/downloads/national-identity-scheme-delivery-2008.pdf.
UKIPS (2008b) What is the national identity scheme? Archived at http://www.ips.gov.uk/identity/scheme-what.asp.
West DM (2004) E-government and the transformation of service delivery and citizen attitudes. Public Administration Review 64 (1), 15–27.
Whitley EA (2009) Perceptions of government technology, surveillance and privacy: the U.K. identity cards scheme. In New Directions in Privacy and Surveillance (NEYLAND D and GOOLD B, Eds), Willan, Cullompton.
Whitley EA and Hosein I (2001) Doing politics around electronic commerce: opposing the regulation of investigatory powers bill. In Realigning Research and Practice in IS Development: The Social and Organisational Perspective (RUSSO N, FITZGERALD B and GROSS JID, Eds), pp 415–438, Kluwer, Boise, Idaho.
Whitley EA and Hosein IR (2005) Policy discourse and data retention: the technology politics of surveillance in the United Kingdom. Telecommunications Policy 29 (11), 857–874.
Whitley EA and Hosein IR (2008) Departmental influences on policy design: how the U.K. is confusing identity fraud with other policy agendas. Communications of the ACM 51 (5), 98–100.
Whitley EA and Hosein IR (2009) Global Issues in Identity Management. Palgrave, Basingstoke.
Whitley EA, Hosein IR, Angell IO and Davies S (2007) Reflections on the academic policy analysis process and the U.K. identity cards scheme. The Information Society 23 (1), 51–58.
Yearley S (2005) Making Sense of Science: Understanding the Social Study of Science. Sage, London.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Whitley, E., Hosein, I. Doing the politics of technological decision making: due process and the debate about identity cards in the U.K.. Eur J Inf Syst 17, 668–677 (2008). https://doi.org/10.1057/ejis.2008.53
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1057/ejis.2008.53