Who do you think you are? A review of the complex interplay between information systems, identification and identity
暂无分享,去创建一个
[1] K. Cameron. The Laws of Identity , 2005 .
[2] A. Michael Froomkin. Identity Cards and Identity Romanticism , 2008 .
[3] T. S,et al. MANAGING RFID PROJECTS IN ORGANIZATIONS , 2012 .
[4] Edgar A. Whitley,et al. Departmental Influences on Policy Design How the U.K.is confusing identity fraud with other policy agendas. , 2008 .
[5] M. Diamond. Organizational Identity , 1988 .
[6] J. Dutton,et al. Keeping An Eye on the Mirror: Image and Identity In Organizational Adaptation , 1991 .
[7] J. Romero. India's big bet on identity , 2012, IEEE Spectrum.
[8] Annemette Kjærgaard,et al. Identity in information systems , 2009, ECIS.
[9] A. Adam. Whatever happened to information systems ethics? Caught between the devil and the deep blue sea , 2004 .
[10] Tamara Dinev,et al. Internet privacy concerns and beliefs about government surveillance - An empirical investigation , 2008, J. Strateg. Inf. Syst..
[11] Edgar A. Whitley,et al. Towards an Understanding of FLOSS: Infrastructures, Materiality and the Digital Business Ecosystem , 2007 .
[12] Carmen Weigelt,et al. Leveraging supplier capabilities: The role of locus of capability deployment , 2013 .
[13] John M. T. Balmer,et al. Social Identity, Organizational Identity and Corporate Identity: Towards an Integrated Understanding of Processes, Patternings and Products , 2007 .
[14] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[15] Lonna Rae Atkeson,et al. A new barrier to participation: Heterogeneous application of voter identification policies , 2010 .
[16] C. Huxham,et al. Cycles of Identity Formation in Interorganizational Collaborations , 2003 .
[17] Jayant Kalagnanam,et al. Managing Data Quality Risk in Accounting Information Systems , 2012, Inf. Syst. Res..
[18] Robert E. Kraut,et al. Building Member Attachment in Online Communities: Applying Theories of Group Identity and Interpersonal Bonds , 2012, MIS Q..
[19] A.C.J. Sprokkereef,et al. ETHICAL PRACTICE IN THE USE OF BIOMETRIC IDENTIFIERS WITHIN THE EU , 2007 .
[20] C. Marlene Fiol,et al. Capitalizing on Paradox: The Role of Language in Transforming Organizational Identities , 2002, Organ. Sci..
[21] David Lyon,et al. Identifying Citizens: ID Cards as Surveillance , 2009 .
[22] A. Miriam B. Lips. Reconstructing, attributing and fixating citizen identities in digital-era government , 2013 .
[23] Tobias Mahler,et al. Governance Models for Interoperable Electronic Identities , 2011 .
[24] Paul Beynon-Davies,et al. The UK national identity card , 2011, ICIS.
[25] Leslie P. Willcocks,et al. Evolving IS Capabilities to Leverage the External IT Services Market , 2007, MIS Q. Executive.
[26] Kevin G. Corley,et al. Identity Ambiguity and Change in the Wake of a Corporate Spin-off , 2004 .
[27] Hichang Cho,et al. Online privacy, government surveillance and national ID cards , 2009, Commun. ACM.
[28] Karen Ruhleder,et al. Steps Toward an Ecology of Infrastructure: Design and Access for Large Information Spaces , 1996, Inf. Syst. Res..
[29] Gerrit Hornung. Biometric Passports and Identity Cards: Technical, Legal, and Policy Issues , 2005 .
[30] M. Alvesson. Talking in Organizations: Managing Identity and Impressions in an Advertising Agency , 1994 .
[31] Vernon J. Richardson,et al. The Consequences of Information Technology Control Weaknesses on Management Information Systems: The Case of Sarbanes-Oxley Internal Control Reports , 2012, MIS Q..
[32] Benoît Otjacques,et al. Interoperability of E-Government Information Systems: Issues of Identification and Data Sharing , 2007, J. Manag. Inf. Syst..
[33] William G. Staples. Playing the Identity Card: Surveillance, Security and Identification in Global Perspective , 2009 .
[34] Patrick Dunleavy,et al. Digital Era Governance , 2006 .
[35] Helen Kelley,et al. Research Commentary - Generalizability of Information Systems Research Using Student Subjects - A Reflection on Our Practices and Recommendations for Future Research , 2012, Inf. Syst. Res..
[36] A. Kieser,et al. Why the Rigour-Relevance Gap in Management Research is Unbridgeable , 2009 .
[37] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[38] Pär J. Ågerfalk,et al. Rethinking the Meaning of Identifiers in Information Infrastructures , 2010, J. Assoc. Inf. Syst..
[39] David Lyon,et al. Playing the identity card : surveillance, security and identification in global perspective , 2013 .
[40] Sandra Mantu,et al. Paper Citizens: How Illegal Immigrants Acquire Citizenship in Developing Countries , 2010 .
[41] Bart Preneel,et al. Insights on identity documents based on the Belgian case study , 2008, Inf. Secur. Tech. Rep..
[42] José van Dijck,et al. 'You have one identity': performing the self on Facebook and LinkedIn , 2013 .
[43] Majken Schultz,et al. The Expressive Organization: Linking Identity, Reputation, and the Corporate Brand , 2000 .
[44] S. Alexander Haslam,et al. Psychology in Organizations: The Social-Identity Approach , 2000 .
[45] Perri. Should We Be Compelled to Have Identity Cards? Justifications for the Legal Enforcement of Obligations , 2005 .
[46] Kevin D. Haggerty,et al. The Public Politics of Opinion Research on Surveillance and Privacy , 2002 .
[47] Tony Collings. Some thoughts on the underlying logic and process underpinning Electronic Identity (e-ID) , 2008, Inf. Secur. Tech. Rep..
[48] Ari Schwartz,et al. Identity management and privacy , 2011, Commun. ACM.
[49] Edgar A. Whitley,et al. Departmental influences on policy design , 2008, CACM.
[50] M. Schultz,et al. Responding to Organizational Identity Threats: Exploring the Role of Organizational Culture , 2006 .
[51] Nadia Caidi,et al. How much is too little? Privacy and smart cards in Hong Kong and Ontario , 2005, J. Inf. Sci..
[52] Paul A. Swatman,et al. Biometrics and e-Identity (e-Passport) in the European Union: End-user perspectives on the adoption of a controversial innovation , 2006, J. Theor. Appl. Electron. Commer. Res..
[53] Robin Williams,et al. The sociology of a market analysis tool: How industry analysts sort vendors and organize markets , 2009, Inf. Organ..
[54] Geoff Walsham,et al. IT and Changing Professional Identity: Micro Studies and Macro-Theory , 1998, J. Am. Soc. Inf. Sci..
[55] N. Ellemers,et al. SOCIAL IDENTITY IN INDUSTRIAL AND ORGANIZATIONAL PSYCHOLOGY: CONCEPTS, CONTROVERSIES AND CONTRIBUTIONS , 2006 .
[56] Patrick J. Flynn,et al. Factors that degrade the match distribution in iris biometrics , 2009, Identity in the Information Society.
[57] Verena Prebil,et al. [A question of trust]. , 2007, Krankenpflege. Soins infirmiers.
[58] Edgar A. Whitley,et al. Global Challenges for Identity Policies , 2009, Technology, Work and Globalization.
[59] Antonio Cordella,et al. Outsourcing, bureaucracy and public value: Reappraising the notion of the "contract state" , 2010, Gov. Inf. Q..
[60] Siraj Ahmed Shaikh,et al. Characteristic trade-offs in designing large-scale biometric-based identity management systems , 2010, J. Netw. Comput. Appl..
[61] S. Turkle. Life on the Screen: Identity in the Age of the Internet , 1997 .
[62] C. Marlene Fiol,et al. Managing Culture as a Competitive Resource: An Identity-Based View of Sustainable Competitive Advantage , 1991 .
[63] Blake E. Ashforth,et al. Relational Identity and Identification: Defining Ourselves Through Work Relationships , 2007 .
[64] Hal Berghel,et al. Identity theft, social security numbers, and the Web , 2000, CACM.
[65] Bob Carter. Implementation implications of biometrics , 1998, Inf. Secur. Tech. Rep..
[66] Rosío Alvarez,et al. Examining technology, structure and identity during an Enterprise System implementation , 2008, Inf. Syst. J..
[67] Jungjoo Jahng,et al. Personality traits and effectiveness of presentation of product information in e-business systems , 2002, Eur. J. Inf. Syst..
[68] Daniel J. Canary,et al. Organizational commitment and identification: An examination of conceptual and operational convergence , 1991 .
[69] Martina Angela Sasse,et al. A framework for the lived experience of identity , 2010 .
[70] James D. McKeen,et al. The Identity Management Challenge , 2011, Communications of the Association for Information Systems.
[71] Jane E. Dutton,et al. Organizational decision making: Strategic agenda building in organizations , 1996 .
[72] K. Weick. FROM SENSEMAKING IN ORGANIZATIONS , 2021, The New Economic Sociology.
[73] David-Olivier Jaquet-Chiffelle,et al. A TYPOLOGY OF IDENTITY-RELATED CRIME , 2009 .
[74] Siddhartha Arora. National e-ID card schemes: A European overview , 2008, Inf. Secur. Tech. Rep..
[75] Justin M. Berg,et al. in Cyberspace : How Boundary Work in Online Social Networks Impacts Professional Relationships , 2013 .
[76] R. B. Redmon,et al. Identity , 2021, Notre Dame J. Formal Log..
[77] Dennis A. Gioia,et al. Identity, Image, and Issue Interpretation: Sensemaking during Strategic Change in Academia. , 1996 .
[78] John Taylor,et al. IDENTITY MANAGEMENT, ADMINISTRATIVE SORTING AND CITIZENSHIP IN NEW MODES OF GOVERNMENT , 2009 .
[79] Michael I. Barrett,et al. Electronic trading and the process of globalization in traditional futures exchanges: a temporal perspective , 2004, Eur. J. Inf. Syst..
[80] Kevin G. Corley,et al. Semantic Learning as Change Enabler: Relating Organizational Identity and Organizational Learning , 2004 .
[81] D. Cremer,et al. Psychology in organizations: The social identity approach , 2001 .
[82] D. Barnard-Wills,et al. Public sector engagement with online identity management , 2010 .
[83] D. Birch,et al. Psychic ID: A blueprint for a modern national identity scheme , 2008 .
[84] Dennis A. Gioia,et al. From individual to organizational identity. , 1998 .
[85] Brendan Van Alsenoy,et al. Due processing of personal data in eGovernment ? a case Study of the Belgian electronic identity card , .
[86] Anindya Ghose,et al. Examining the Relationship Between Reviews and Sales: The Role of Reviewer Identity Disclosure in Electronic Markets , 2008, Inf. Syst. Res..
[87] Anil K. Jain. Technology: Biometric recognition , 2007, Nature.
[88] Lucas D. Introna,et al. Facial Recognition Technology A Survey of Policy and Implementation Issues , 2009 .
[89] Shoshana Zuboff,et al. In the Age of the Smart Machine: The Future of Work and Power , 1989 .
[90] Geoff Walsham,et al. Electronic Trading and Work Transformation in the London Insurance Market , 1999, Inf. Syst. Res..
[91] Simon Davies,et al. Biometrics - A civil liberties and privacy perspective , 1998, Inf. Secur. Tech. Rep..
[92] Shoshana Amielle Magnet,et al. When Biometrics Fail: Gender, Race, and the Technology of Identity , 2011 .
[93] Christopher J. Davis,et al. Through the Eyes of Experts: A Socio-Cognitive Perspective on the Automation of Fingerprint Work , 2007, MIS Q..
[94] B. Doolin. Narratives of Change: Discourse, Technology and Organization , 2003 .
[95] M. Pratt,et al. Classifying Managerial Responses to Multiple Organizational Identities , 2000 .
[96] James Backhouse,et al. A roadmap for research on identity in the information society , 2008 .
[97] Marc Rotenberg. Real id, real trouble? , 2006, CACM.
[98] Dennis A. Gioia,et al. Sensemaking and sensegiving in strategic change initiation , 1991 .
[99] Blake E. Ashforth,et al. Organizational Identity and Identification: Charting New Waters and Building New Bridges , 2000 .
[100] Chris Huxham,et al. Cycles of identity formation in collaboration , 2003 .
[101] Roberta Lamb,et al. Information and Communication Technology Challenges to Scientific Professional Identity , 2005, Inf. Soc..
[102] Didier Bigo,et al. Fighting cyber crime and protecting privacy in the cloud , 2012 .
[103] Gerardine DeSanctis,et al. Enacting language games: the development of a sense of ‘we‐ness’ in online forums , 2009, Inf. Syst. J..
[104] Robert M. O'Keefe,et al. Expectations and outcomes in electronic identity management: the role of trust and public value , 2010, Eur. J. Inf. Syst..
[105] Margherita Bacigalupo,et al. New Challenges and Possible Policy Options for the Regulation of Electronic Identity , 2009 .
[106] Omer Tene. Me, Myself and I: Aggregated and Disaggregated Identities on Social Networking Services , 2011 .
[107] Luis Orihuela. Peruvian National Registry of Identification and Civil States: A Successful Study in e-Governance , 2009 .
[108] John Daugman,et al. Pattern Recognition: Biometrics, Identity and the State—An Interview with John Daugman , 2008 .
[109] Michael C. Bromby. Identification, trust and privacy: How biometrics can aid certification of digital signatures , 2010 .
[110] A. Stinchcombe. Information and Organizations , 2019 .
[111] Eric W. T. Ngai,et al. Managing RFID projects in organizations , 2009, Eur. J. Inf. Syst..
[112] Simson L. Garfinkel,et al. Risks of social security numbers , 1995, CACM.
[113] Ian R. Kerr,et al. Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society , 2009 .
[114] O. Hanseth,et al. From Control to Drift: The Dynamics of Corporate Information Infrastructures , 2000 .
[115] Albert L. Lederer,et al. A Meta-Analysis of the Role of Environment-Based Voluntariness in Information Technology Acceptance , 2009, MIS Q..
[116] Celia V. Harquail,et al. Organizational images and member identification. , 1994 .
[117] Elizabeth M. Daniel,et al. Dimensions of Employee Privacy: An Empirical Study , 2012, Inf. Technol. People.
[118] J. Dutton,et al. KEEPING AN EYE ON THE MIRROR : IMAGE AND IDENTITY IN ORGANIZATIONAL ADAPTATION , 2005 .
[119] Fred A. Mael,et al. Social identity theory and the organization , 1989 .
[120] Hal Berghel. Fungible credentials and next-generation fraud , 2006, CACM.
[121] Jeanette Van Akkeren,et al. An epidemic of pain in an Australian radiology practice , 2007, Eur. J. Inf. Syst..
[122] Jeremy Wickins,et al. The ethics of biometrics: the risk of social exclusion from the widespread use of electronic identification , 2007, Sci. Eng. Ethics.
[123] Xin Li,et al. Why do we trust new technology? A study of initial trust formation with organizational information systems , 2008, J. Strateg. Inf. Syst..
[124] Rodrigo Firmino,et al. Empowerment or repression? Opening up questions of identification and surveillance in Brazil through a case of ‘identity fraud’ , 2009 .
[125] Amany R. Elbanna,et al. From Control to Drift: The Dynamics of Corporate Information Infrastructures , 2001 .
[126] Gerrit Hornung,et al. Data protection in Germany I: The population census decision and the right to informational self-determination , 2009, Comput. Law Secur. Rev..
[127] Kevin G. Corley,et al. The Intersection of Organizational Identity, Knowledge, and Practice: Attempting Strategic Change Via Knowledge Grafting , 2007 .
[128] Mia Elisabeth Harbitz,et al. Civil Registration and Identification Glossary , 2010 .
[129] Intae Choi,et al. Digital era governance: IT corporations, the state, and e-Government , 2016 .
[130] Izak Benbasat,et al. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..
[131] Kevin G. Corley,et al. Organizational Identity, Image, and Adaptive Instability , 2000 .
[132] Edgar A. Whitley,et al. On technology neutral policies for e–identity: a critical reflection based on UK identity policy , 2013 .
[133] Ross Anderson,et al. Database State: A Report Commissioned by the Joseph Rowntree Reform Trust Ltd. , 2009 .
[134] Marek Rejman-Greene. Security considerations in the use of biometric devices , 1998, Inf. Secur. Tech. Rep..
[135] Edgar A. Whitley,et al. Doing the politics of technological decision making: due process and the debate about identity cards in the U.K. , 2008, Eur. J. Inf. Syst..
[136] Ritu Agarwal,et al. Through a Glass Darkly: Information Technology Design, Identity Verification, and Knowledge Contribution in Online Communities , 2007, Inf. Syst. Res..
[137] Kalle Lyytinen,et al. The dynamics of IT boundary objects, information infrastructures, and organisational identities: the introduction of 3D modelling technologies into the architecture, engineering, and construction industry , 2008, Eur. J. Inf. Syst..
[138] Jannis Kallinikos,et al. Deconstructing information packages: Organizational and behavioural implications of ERP systems , 2004, Inf. Technol. People.
[139] Giles Hogben,et al. Privacy Features: Privacy features of European eID card specifications , 2008 .
[140] Edgar A. Whitley,et al. Global Identity Policies and Technology: Do we Understand the Question? , 2010 .
[141] Edgar A. Whitley,et al. Fixing identity? Biometrics and the tensions of material practices , 2013 .
[142] R. Ramakumar,et al. The Unique ID Project in India: A Skeptical Note , 2010, ICEB.
[143] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[144] Kamal Sadiq,et al. Paper Citizens: How Illegal Immigrants Acquire Citizenship in Developing Countries , 2008 .
[145] Atreyi Kankanhalli,et al. What Motivates People to Purchase Digital Items on Virtual Community Websites? The Desire for Online Self-Presentation , 2012, Inf. Syst. Res..
[146] E. Mordini,et al. Body, Biometrics and Identity , 2008, Bioethics.
[147] Michelle M. Kazmer,et al. Do You Read Me? Perspective Making and Perspective Taking in Chat Communities , 2007, J. Assoc. Inf. Syst..
[148] M. Alvesson,et al. Identity Matters: Reflections on the Construction of Identity Scholarship in Organization Studies , 2008 .
[149] Suprateek Sarker,et al. Understanding Virtual Team Development: An Interpretive Study , 2003, J. Assoc. Inf. Syst..
[150] John Daugman,et al. Recognizing people by their iris patterns , 1998, Inf. Secur. Tech. Rep..
[151] Norberto Nuno Gomes de Andrade,et al. Friending the taxman , 2013 .
[152] H. Tajfel,et al. An integrative theory of intergroup conflict. , 1979 .
[153] D. Lyon. Surveillance Studies: An Overview , 2007 .
[154] A. Alterman,et al. ``A piece of yourself'': Ethical issues in biometric identification , 2003, Ethics and Information Technology.
[155] J. Turner. Explaining the nature of power: a three-process theory , 2005 .
[156] Georg Aichholzer,et al. Electronic identity management in e-Government 2.0: Exploring a system innovation exemplified by Austria , 2010, Inf. Polity.
[157] Marina Krakovsky. India's elephantine effort , 2011, Commun. ACM.
[158] Kevin G. Corley,et al. Guiding Organizational Identity Through Aged Adolescence , 2006 .
[159] Susan V. Scott,et al. Reconfiguring relations of accountability: Materialization of social media in the travel sector , 2011 .
[160] Jon Bing. Protecting personal data in wartime: The destruction of the alphabetic tabulators in Oslo , 2009, Comput. Law Secur. Rev..
[161] T. Mulqueen,et al. Securitizing Gender: Identity, Biometrics, and Transgender Bodies at the Airport , 2011 .
[162] Dennis Broeders,et al. The New Digital Borders of Europe , 2007 .
[163] Bill Doolin,et al. Enterprise Discourse, Professional Identity and the Organizational Control of Hospital Clinicians , 2002 .
[164] Lars Thøger Christensen,et al. Organizational Identity. Linkages between ‘Internal’ and ‘External’ Organizational Communication , 2004 .
[165] Rebekah Thomas. Biometrics, International Migrants and Human Rights , 2006 .
[166] Bendik Bygstad,et al. The Generative Mechanisms of Digital Infrastructure Evolution , 2013, MIS Q..
[167] Mia Elisabeth Harbitz,et al. Democratic Governance, Citizenship, and Legal Identity: Linking Theoretical Discussion and Operational Reality , 2009 .
[168] skyrider. [영어로 보는 과학] Surveillance Society , 2007 .