The proliferation of identification techniques for citizens throughout the ages

Manual identification techniques date back to ancient times, however the need to identify individuals has heightened particularly since the Industrial Revolution. This paper traces the use of identification techniques throughout the ages and focuses on the growing importance of citizen identification (ID) by governments. The paper uses a historical approach beginning with manual techniques such as tattoos, through to more recent automatic identification (auto-ID) techniques such as smart cards and biometrics. Data was collected primarily through qualitative document analysis, and the paper contains thick description typical of a narrative. The findings indicate that identification techniques born for one purpose have gradually found their way into alternate applications, and in some instances have been misused altogether. There is also strong evidence to suggest that governments are moving away from localized identification schemes to more global systems based on universal lifetime identifiers (ULI).

[1]  Chris Hibbert What to Do When They Ask for Your Social Security Number , 1996, Computerization and Controversy, 2nd Ed..

[2]  David B. Yoffie,et al.  Competing in the Age of Digital Convergence , 1997 .

[3]  William R. Kuhns The Post-Industrial Prophets: Interpretations of Technology , 1971 .

[4]  Harold Sackman Computers, system science, and evolving society : the challenge of man-machine digital systems , 1967 .

[5]  Chris Jones,et al.  Stigma: Tattooing and Branding in Graeco-Roman Antiquity , 1987, Journal of Roman Studies.

[6]  H. H. Scullard Festivals and ceremonies of the Roman Republic , 1981 .

[7]  Richard P. Kusserow The government needs computer matching to root out waste and fraud , 1984, CACM.

[8]  Michael A. Baker,et al.  Databanks in a free society , 1973, CSOC.

[9]  Primo Levi The Drowned and the Saved , 1986 .

[10]  A. Lunde,et al.  The person-number systems of Sweden, Norway, Denmark, and Israel. , 1980, Vital and health statistics. Series 2, Data evaluation and methods research.

[11]  A. Miller The assault on privacy : computers, data banks, and dossiers , 1972 .

[12]  Ugo Enrico Paoli Rome: Its People, Life and Customs , 1996 .

[13]  Christopher Thomas Anglim Religion and the Law: A Dictionary , 2000 .

[14]  R. Lifton The Nazi Doctors: Medical Killing and the Psychology of Genocide , 1986 .

[15]  T. Hausken,et al.  Hidden costs and benefits of government card technologies , 1994, IEEE Technology and Society Magazine.

[16]  Mark Dery,et al.  Escape Velocity: Cyberculture at the End of the Century , 1996 .

[17]  Henry C. Lee,et al.  Advances in Fingerprint Technology , 1991 .

[18]  Robert A. Heinlein The Number of the Beast , 1980 .

[19]  John D. Woodward,et al.  Biometrics: privacy's foe or privacy's friend? , 1997, Proc. IEEE.

[20]  Howard Falk,et al.  The Technological Society , 1965 .