Advertisement

National Identity Infrastructures: Lessons from the United Kingdom

  • Aaron K. Martin
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 386)

Abstract

Despite growing interest in the technologies of biometrics such as fingerprinting, facial recognition and iris scanning, there are too few in-depth case studies exploring their deployment on a national scale. This paper offers a qualitative analysis of biometric technologies by examining the National Identity Scheme – a recently abandoned United Kingdom government-sponsored program for a national identity card infrastructure. Leveraging organizing visions theory, it focuses in particular on government discourses about implementing a national infrastructure for biometrics. The discussion reflects on how the vision for implementing biometrics in the Scheme unravelled and tries to explain the course of these discourses in the political context of the UK.

Keywords

biometrics case study research e-government failure identification technology organizing visions surveillance 

References

  1. 1.
    Chau, A., Stephens, G., Jamieson, R.: Biometrics Acceptance – Perceptions of Use of Biometrics. In: Proceedings of the 15th Australasian Conference on Information Systems, Hobart, Tasmania, Australia, pp. 1–6 (2004)Google Scholar
  2. 2.
    Clarke, N.L., Furnell, S.M., Rodwell, P.M., Reynolds, P.L.: Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices. Computers & Security 21(3), 220–228 (2002)CrossRefGoogle Scholar
  3. 3.
    Cragg Ross Dawson: Identity cards – People with special issues: Response to the proposed customer experience report (2004)Google Scholar
  4. 4.
    Davis, C.J., Hufnagel, E.M.: Through the Eyes of Experts: A Socio-Cognitive Perspective on the Automation of Fingerprint Work. Management Information Systems Quarterly 31, 681–704 (2007)Google Scholar
  5. 5.
    Deane, F., Barrelle, K., Henderson, R., Mahar, D.: Perceived acceptability of biometric security systems. Computers and Security 14(3), 225–231 (1995)CrossRefGoogle Scholar
  6. 6.
    Fairclough, N.: Critical Discourse Analysis: The Critical Study of Language. Longman, New York (2010)Google Scholar
  7. 7.
    Firth, D.: The Organizing Vision for Customer Relationship Management. In: Proceedings of the 7th Americas Conference on Information Systems, Boston, Massachusetts, USA (2001)Google Scholar
  8. 8.
    Furnell, S.M., Dowland, P.S., Illingworth, H.M., Reynolds, P.L.: Authentication and Supervision: A Survey of User Attitudes. Computers & Security 19(6), 529–539 (2000)CrossRefGoogle Scholar
  9. 9.
    Furnell, S., Evangelatos, K.: Public awareness and perceptions of biometrics. Computer Fraud & Security 2007(1), 8–13 (2007)CrossRefGoogle Scholar
  10. 10.
    Heckle, R.R., Patrick, A.S., Ozok, A.: Perception and acceptance of fingerprint biometric technology. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 153–154. ACM, Pittsburgh (2007)CrossRefGoogle Scholar
  11. 11.
    Ho, G., Stephens, G., Jamieson, R.: Biometric Authentication Adoption Issues. In: Proceedings of the 14th Australasian Conference on Information Systems, Perth, Western Australia (2003)Google Scholar
  12. 12.
    Home Office: Entitlement Cards and Identity Fraud: A Consultation Paper. Stationery Office, London (2002)Google Scholar
  13. 13.
    Home Office: Identity Cards Briefing (2005)Google Scholar
  14. 14.
    Identity & Passport Service: Strategic Action Plan for the National Identity Scheme: Safeguarding Your Identity. Home Office, London (2006)Google Scholar
  15. 15.
    Identity & Passport Service: National Identity Scheme Strategic Supplier Framework Prospectus. Home Office, London (2007)Google Scholar
  16. 16.
    James, T., Pirim, T., Boswell, K., Reithel, B., Barkhi, R.: Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model. Journal of Organizational and End User Computing 18(3), 1–24 (2006)CrossRefGoogle Scholar
  17. 17.
    Jones, L.A., Antón, A.I., Earp, J.B.: Towards Understanding User Perceptions of Authentication Technologies. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, pp. 91–98. ACM, Alexandria (2007)CrossRefGoogle Scholar
  18. 18.
    Lettice, J.: ID card astroturf - No2ID beats the truth out of IPS. The Register (2010)Google Scholar
  19. 19.
    Miles, M.B.: Qualitative Data as an Attractive Nuisance: The Problem of Analysis. Administrative Science Quarterly 24(4), 590–601 (1979)CrossRefGoogle Scholar
  20. 20.
    Moody, J.: Public Perceptions of Biometric Devices: The Effect of Misinformation on Acceptance and Use. In: Issues in Informing Science and Information Technology, Rockhampton, Australia, pp. 753–761 (2004)Google Scholar
  21. 21.
    O’Gorman, L.: Comparing Passwords, Tokens, and Biometrics for User Authentication. Proceedings of the IEEE 91(12), 2021–2040 (2003)CrossRefGoogle Scholar
  22. 22.
    Otjacques, B., Hitzelberger, P., Feltz, F.: Interoperability of E-Government Information Systems: Issues of Identification and Data Sharing. Journal of Management Information Systems 23(4), 29–52 (2007)CrossRefGoogle Scholar
  23. 23.
    Perakslis, C., Wolk, R.: Social Acceptance of RFID as a Biometric Security Method. IEEE Technology and Society Magazine 25, 34–42 (2006)CrossRefGoogle Scholar
  24. 24.
    Ponemon Institute: Global Study on the Public’s Perceptions about Identity Management. Unisys Corporation, USA (2006)Google Scholar
  25. 25.
    Prior, L.: Using Documents in Social Research. Sage, London (2003)Google Scholar
  26. 26.
    Swanson, E.B.: Talking the IS Innovation Walk. In: Wynn, E.H., Whitley, E.A., Myers, M.D., DeGross, J.I. (eds.) Global and Organisational Discourse about Information Technology, pp. 15–32. Kluwer, Boston (2003)Google Scholar
  27. 27.
    Swanson, E.B., Ramiller, N.: The Organizing Vision in Information Systems Innovation. Organization Science 8(5), 458–474 (1997)CrossRefGoogle Scholar
  28. 28.
    Swanson, E.B., Ramiller, N.C.: Innovating Mindfully with Information Technology. MIS Quarterly 28(4), 553–583 (2004)Google Scholar
  29. 29.
    Wang, P.: Popular Concepts beyond Organizations: Exploring New Dimensions of Information Technology Innovations. Journal of the Association for Information Systems 10(1), 1–30 (2009)Google Scholar
  30. 30.
    Weick, K.E.: Sensemaking in Organizations. Sage, Thousand Oaks (1995)Google Scholar
  31. 31.
    Whitley, E.A.: Perceptions of Government Technology, Surveillance and Privacy: the UK Identity Cards Scheme. In: Neyland, D., Goold, B. (eds.) New Directions in Privacy and Surveillance, Willan, Cullompton, UK, pp. 133–156 (2009)Google Scholar
  32. 32.
    Whitley, E.A., Hosein, G.: Global Identity Policies and Technology: Do We Understand the Question? Global Policy 1(2), 209–215 (2010)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2012

Authors and Affiliations

  • Aaron K. Martin
    • 1
  1. 1.London School of Economics and Political ScienceInformation Systems and Innovation GroupUnited Kingdom

Personalised recommendations