Form-ing Institutional order

This paper examines the central place of the list and the associated concept of an identifier within the scaffolding of contemporary institutional order. These terms are deliberately chosen to make strange and help unpack the constitutive capacity of information systems and information technology within and between contemporary organisations. We draw upon the substantial body of work by John Searle to help understand the place of lists in the constitution of order. To enable us to ground our discussion of the potentiality and problematic associated with lists we describe a significant and modern instance of list-making, situated around the issue of digital identity management. The theoretical framework discussed allows us to better explain breakdowns in the institutional order characteristic of this domain.

[1]  Paul Beynon-Davies,et al.  Personal identity management and electronic government: The case of the national identity card in the UK , 2007, J. Enterp. Inf. Manag..

[2]  Pär J. Ågerfalk,et al.  Rethinking the Meaning of Identifiers in Information Infrastructures , 2010, J. Assoc. Inf. Syst..

[3]  Dov Te'eni The language-action perspective as a basis for communication support systems , 2006, CACM.

[4]  Annemette Kjærgaard,et al.  Who do you think you are? A review of the complex interplay between information systems, identification and identity , 2014, Eur. J. Inf. Syst..

[5]  Mark Poster Information Please: Culture and Politics in the Age of Digital Machines , 2006 .

[6]  J. Searle Intentionality: An Essay in the Philosophy of Mind , 1983 .

[7]  V. Aldrich,et al.  Signs, Language, and Beahavior , 1947 .

[8]  Edgar A. Whitley,et al.  The Construction of Social Reality , 1999 .

[9]  Frederick H. Lochovsky,et al.  Data Models , 2008, Encyclopedia of GIS.

[10]  Roger A. Clarke Just another piece of plastic in your wallet: the `Australian card' scheme , 1988, CSOC.

[11]  J. Searle Making the Social World: The Structure of Human Civilization , 2010 .

[12]  Mahmoud Ezzamel,et al.  Order and accounting as a performative ritual: Evidence from ancient Egypt , 2009 .

[13]  B. Latour Reassembling the Social: An Introduction to Actor-Network-Theory , 2005 .

[14]  Pär J. Ågerfalk,et al.  The Stolen Identifier: an Inquiry into the Nature of Identification and the Ontological Status of Information Systems , 2011, ICIS.

[15]  A. Koller,et al.  Speech Acts: An Essay in the Philosophy of Language , 1969 .

[16]  John Torpey Identifying Citizens: ID Cards as Surveillance , 2010 .

[17]  Thomas Neubauer,et al.  A Roadmap for Personal Identity Management , 2010, 2010 Fifth International Conference on Systems.

[18]  Paul Beynon-Davies,et al.  Personal identity management in the information polity: The case of the UK national identity card , 2006, Inf. Polity.

[19]  John Mingers,et al.  Embodying information systems: the contribution of phenomenology , 2001, Inf. Organ..

[20]  J. Searle The Construction of Social Reality , 1997 .

[21]  Paul Beynon-Davies,et al.  Significance: Exploring the Nature of Information, Systems and Technology , 2010 .

[22]  D. Schmandt-Besserat The Earliest Precursor of Writing , 1978, Communication in History.

[23]  Pär J. Ågerfalk Getting pragmatic , 2010, Eur. J. Inf. Syst..

[24]  G. McGough The checklist manifesto: how to get things right Atul Gawande The checklist manifesto: how to get things right Metropolitan Books £12.99 224pp 9780805091748 0805091742 , 2010 .

[25]  E. F. Codd,et al.  A relational model of data for large shared data banks , 1970, CACM.

[26]  Umberto Eco,et al.  The Infinity of Lists , 2009 .

[27]  Jr. R. J. Boland The in-formation of information systems , 1987 .

[28]  Susan Leigh Star,et al.  Sorting Things Out: Classification and Its Consequences , 1999 .

[29]  A. Gawande,et al.  The Checklist Manifesto: How to Get Things Right , 2011 .

[30]  Kaj Grønbæk,et al.  Cooperative Prototyping: Users and Designers in Mutual Activity , 1990, Int. J. Man Mach. Stud..

[31]  Allen Newell,et al.  Computer science as empirical inquiry: symbols and search , 1976, CACM.

[32]  Jan L. G. Dietz,et al.  Enterprise ontology - theory and methodology , 2006 .

[33]  J. Habermas,et al.  On the Pragmatics of Communication , 1998 .

[34]  Paul Beynon-Davies,et al.  The enactment of personal identity , 2011, ECIS.

[35]  C. Morris Signs, Language and Behavior , 1947 .

[36]  Gary Urton,et al.  Signs of the Inka Khipu: Binary Coding in the Andean Knotted-String Records , 2003 .

[37]  Csr Young,et al.  How to Do Things With Words , 2009 .

[38]  Roger Clarke,et al.  Human Identification in Information Systems , 1994 .

[39]  鈴木 新,et al.  学際的会計研究の軌跡(1) : Accounting, Organizations and Society, 1976-1985 , 2008 .

[40]  Kalle Lyytinen,et al.  ICIS Paper: Implications of Theories of Language for Information Systems , 1985, MIS Q..

[41]  Karen Barad Meeting the Universe Halfway: Quantum Physics and the Entanglement of Matter and Meaning , 2007 .

[42]  Wanda J. Orlikowski,et al.  Material knowing: the scaffolding of human knowledgeability , 2006, Eur. J. Inf. Syst..