Personal identity management and electronic government: The case of the national identity card in the UK

Purpose – The purpose of this paper is to unpack some of the socio-technical relationships inherent in contemporary notions of personal identity management. For this purpose it considers the issue of personal identity management in terms of a framework, which distinguishes between the related processes of authentication, identification and enrolment. Design/methodology/approach – The conceptual model described in this paper is reflected against an important recent case in which issues of personal identity management are being enacted: the introduction of a UK national identity card. Both this issue and case are particularly examined in the light of the growth of e-Government in the UK. Findings – The paper relates issues associated with the technical infrastructure of e-Government with some of the costs and benefits associated with the social infrastructure of e-Government. This device offers a useful framing for a whole range of issues surrounding individual-organisation interaction in the Information Society that rely on elements of personal identity management. Research limitations/implications – In the paper the issue of personal identity management is under-represented in the Information Systems and Information Management literature. The conceptual approach adopted in the paper is used to identify areas of further research in terms of issues relevant to the technical infrastructure of e-Government. Practical implications – The paper identifies a number of personal identity management issues embedded in the technical infrastructure required for effective e-Government. Originality/value – This paper raises the importance of personal identity management to the success of the e-Government agenda. It also links classic information management issues to the issue of personal identity management and identifies the challenges for e-Government within this.

[1]  Jeffrey W. Seifert Data mining and the search for security: Challenges for connecting the dots and databases , 2004, Gov. Inf. Q..

[2]  John A. Taylor,et al.  PUBLIC ADMINISTRATION AND THE INFORMATION POLITY , 1991 .

[3]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[4]  Paul Beynon-Davies,et al.  Constructing electronic government: the case of the UK inland revenue , 2005, Int. J. Inf. Manag..

[5]  Roger A. Clarke,et al.  Information technology and dataveillance , 1988, CACM.

[6]  Stephen Saxby Editorial: Privacy and Data Sharing: The Way forward for Public Services? , 2002, Comput. Law Secur. Rev..

[7]  Vasilios Zorkadis,et al.  On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements , 2004, Inf. Manag. Comput. Secur..

[8]  Paul Beynon-Davies A case study in electronic democracy: Electronic voting in the UK , 2004 .

[9]  P. Beynon-Davies E-Business , 2004 .

[10]  C. Parolini The Value Net: A Tool for Competitive Strategy , 1999 .

[11]  Paul Beynon-Davies,et al.  Evaluating electronic local government in the UK , 2003, J. Inf. Technol..

[12]  Rob Kling,et al.  The Web of Computing: Computer Technology as Social Organization , 1982, Adv. Comput..

[13]  Grahame F. Thompson Between Hierarchies and Markets: The Logic and Limits of Network Forms of Organization , 2003 .

[14]  D. Osborne,et al.  Reinventing Government: How the En-trepreneurial Spirit is Transforming the Public Sector , 1992 .

[15]  H Margetts,et al.  Electronic Government: Method or Madness? , 2003 .

[16]  M. Castells The rise of the network society , 1996 .

[17]  Barrie Gunter,et al.  The prospects for e-government on digital television , 2004, Aslib Proc..

[18]  M. Porter Competitive Advantage: Creating and Sustaining Superior Performance , 1985 .

[19]  Perri,et al.  On the Cards: Privacy, Identity and Trust in the Age of Smart Technologies , 1996 .

[20]  Phillip J. Windley Digital identity , 2005 .

[21]  Edgar A. Whitley,et al.  The identity project: an assessment of the UK Identity Cards Bill and its implications , 2005 .

[22]  D. Burnham The rise of the computer state , 1983 .

[23]  Peter Checkland,et al.  Soft Systems Methodology: a 30-year retrospective , 1999 .

[24]  C. K. Ogden,et al.  The Meaning of Meaning , 1923 .

[25]  Shoshana Zuboff,et al.  In the Age of the Smart Machine: The Future of Work and Power , 1989 .

[26]  Roger Clarke,et al.  Human Identification in Information Systems , 1994 .

[27]  T. P. Hughes,et al.  The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology , 1989 .

[28]  Richard M. Nunno Electronic signatures: technology developments and legislative issues , 2000, Gov. Inf. Q..

[29]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[30]  L. Jean Camp,et al.  Digital identity , 2004, IEEE Technology and Society Magazine.

[31]  Lynda M. Applegate,et al.  Corporate information strategy and management , 2003 .

[32]  Leslie P. Willcocks,et al.  Risk assessment and information systems , 1993, ECIS.

[33]  George Kuk,et al.  The digital divide and the quality of electronic service delivery in local government in the United Kingdom , 2003, Gov. Inf. Q..

[34]  Richard T. Vidgen,et al.  Interactive E-Government: Evaluating the Web Site of the UK Inland Revenue , 2004, J. Electron. Commer. Organ..

[35]  David C. Yen,et al.  Biometric authentication: assuring access to information , 2002, Inf. Manag. Comput. Secur..

[36]  R. Stamper Information in business and administrative systems , 1973 .

[37]  Roger A. Clarke Just another piece of plastic in your wallet: the `Australian card' scheme , 1988, CSOC.

[38]  Eleanor Burt,et al.  Not-for-profits in the democratic polity , 2001, CACM.