Abstract
Despite growing interest in the technologies of biometrics such as fingerprinting, facial recognition and iris scanning, there are too few in-depth case studies exploring their deployment on a national scale. This paper offers a qualitative analysis of biometric technologies by examining the National Identity Scheme – a recently abandoned United Kingdom government-sponsored program for a national identity card infrastructure. Leveraging organizing visions theory, it focuses in particular on government discourses about implementing a national infrastructure for biometrics. The discussion reflects on how the vision for implementing biometrics in the Scheme unravelled and tries to explain the course of these discourses in the political context of the UK.
Chapter PDF
Similar content being viewed by others
Keywords
References
Chau, A., Stephens, G., Jamieson, R.: Biometrics Acceptance – Perceptions of Use of Biometrics. In: Proceedings of the 15th Australasian Conference on Information Systems, Hobart, Tasmania, Australia, pp. 1–6 (2004)
Clarke, N.L., Furnell, S.M., Rodwell, P.M., Reynolds, P.L.: Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices. Computers & Security 21(3), 220–228 (2002)
Cragg Ross Dawson: Identity cards – People with special issues: Response to the proposed customer experience report (2004)
Davis, C.J., Hufnagel, E.M.: Through the Eyes of Experts: A Socio-Cognitive Perspective on the Automation of Fingerprint Work. Management Information Systems Quarterly 31, 681–704 (2007)
Deane, F., Barrelle, K., Henderson, R., Mahar, D.: Perceived acceptability of biometric security systems. Computers and Security 14(3), 225–231 (1995)
Fairclough, N.: Critical Discourse Analysis: The Critical Study of Language. Longman, New York (2010)
Firth, D.: The Organizing Vision for Customer Relationship Management. In: Proceedings of the 7th Americas Conference on Information Systems, Boston, Massachusetts, USA (2001)
Furnell, S.M., Dowland, P.S., Illingworth, H.M., Reynolds, P.L.: Authentication and Supervision: A Survey of User Attitudes. Computers & Security 19(6), 529–539 (2000)
Furnell, S., Evangelatos, K.: Public awareness and perceptions of biometrics. Computer Fraud & Security 2007(1), 8–13 (2007)
Heckle, R.R., Patrick, A.S., Ozok, A.: Perception and acceptance of fingerprint biometric technology. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 153–154. ACM, Pittsburgh (2007)
Ho, G., Stephens, G., Jamieson, R.: Biometric Authentication Adoption Issues. In: Proceedings of the 14th Australasian Conference on Information Systems, Perth, Western Australia (2003)
Home Office: Entitlement Cards and Identity Fraud: A Consultation Paper. Stationery Office, London (2002)
Home Office: Identity Cards Briefing (2005)
Identity & Passport Service: Strategic Action Plan for the National Identity Scheme: Safeguarding Your Identity. Home Office, London (2006)
Identity & Passport Service: National Identity Scheme Strategic Supplier Framework Prospectus. Home Office, London (2007)
James, T., Pirim, T., Boswell, K., Reithel, B., Barkhi, R.: Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model. Journal of Organizational and End User Computing 18(3), 1–24 (2006)
Jones, L.A., Antón, A.I., Earp, J.B.: Towards Understanding User Perceptions of Authentication Technologies. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, pp. 91–98. ACM, Alexandria (2007)
Lettice, J.: ID card astroturf - No2ID beats the truth out of IPS. The Register (2010)
Miles, M.B.: Qualitative Data as an Attractive Nuisance: The Problem of Analysis. Administrative Science Quarterly 24(4), 590–601 (1979)
Moody, J.: Public Perceptions of Biometric Devices: The Effect of Misinformation on Acceptance and Use. In: Issues in Informing Science and Information Technology, Rockhampton, Australia, pp. 753–761 (2004)
O’Gorman, L.: Comparing Passwords, Tokens, and Biometrics for User Authentication. Proceedings of the IEEE 91(12), 2021–2040 (2003)
Otjacques, B., Hitzelberger, P., Feltz, F.: Interoperability of E-Government Information Systems: Issues of Identification and Data Sharing. Journal of Management Information Systems 23(4), 29–52 (2007)
Perakslis, C., Wolk, R.: Social Acceptance of RFID as a Biometric Security Method. IEEE Technology and Society Magazine 25, 34–42 (2006)
Ponemon Institute: Global Study on the Public’s Perceptions about Identity Management. Unisys Corporation, USA (2006)
Prior, L.: Using Documents in Social Research. Sage, London (2003)
Swanson, E.B.: Talking the IS Innovation Walk. In: Wynn, E.H., Whitley, E.A., Myers, M.D., DeGross, J.I. (eds.) Global and Organisational Discourse about Information Technology, pp. 15–32. Kluwer, Boston (2003)
Swanson, E.B., Ramiller, N.: The Organizing Vision in Information Systems Innovation. Organization Science 8(5), 458–474 (1997)
Swanson, E.B., Ramiller, N.C.: Innovating Mindfully with Information Technology. MIS Quarterly 28(4), 553–583 (2004)
Wang, P.: Popular Concepts beyond Organizations: Exploring New Dimensions of Information Technology Innovations. Journal of the Association for Information Systems 10(1), 1–30 (2009)
Weick, K.E.: Sensemaking in Organizations. Sage, Thousand Oaks (1995)
Whitley, E.A.: Perceptions of Government Technology, Surveillance and Privacy: the UK Identity Cards Scheme. In: Neyland, D., Goold, B. (eds.) New Directions in Privacy and Surveillance, Willan, Cullompton, UK, pp. 133–156 (2009)
Whitley, E.A., Hosein, G.: Global Identity Policies and Technology: Do We Understand the Question? Global Policy 1(2), 209–215 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Martin, A.K. (2012). National Identity Infrastructures: Lessons from the United Kingdom. In: Hercheui, M.D., Whitehouse, D., McIver, W., Phahlamohlaka, J. (eds) ICT Critical Infrastructures and Society. HCC 2012. IFIP Advances in Information and Communication Technology, vol 386. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33332-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-33332-3_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33331-6
Online ISBN: 978-3-642-33332-3
eBook Packages: Computer ScienceComputer Science (R0)