Who do you think you are? A review of the complex interplay between information systems, identification and identity

This paper introduces the special issue on information systems, identity and identification. In addition to introducing the papers in the special issue, it provides a state-of-the-art review of research into identity and identification to contextualise the contributions of the special issue papers. The paper reviews research themes in personal and organisational identity as well as research challenges in identification before considering the interplay between these two strands.

[1]  K. Cameron The Laws of Identity , 2005 .

[2]  A. Michael Froomkin Identity Cards and Identity Romanticism , 2008 .

[3]  T. S,et al.  MANAGING RFID PROJECTS IN ORGANIZATIONS , 2012 .

[4]  Edgar A. Whitley,et al.  Departmental Influences on Policy Design How the U.K.is confusing identity fraud with other policy agendas. , 2008 .

[5]  M. Diamond Organizational Identity , 1988 .

[6]  J. Dutton,et al.  Keeping An Eye on the Mirror: Image and Identity In Organizational Adaptation , 1991 .

[7]  J. Romero India's big bet on identity , 2012, IEEE Spectrum.

[8]  Annemette Kjærgaard,et al.  Identity in information systems , 2009, ECIS.

[9]  A. Adam Whatever happened to information systems ethics? Caught between the devil and the deep blue sea , 2004 .

[10]  Tamara Dinev,et al.  Internet privacy concerns and beliefs about government surveillance - An empirical investigation , 2008, J. Strateg. Inf. Syst..

[11]  Edgar A. Whitley,et al.  Towards an Understanding of FLOSS: Infrastructures, Materiality and the Digital Business Ecosystem , 2007 .

[12]  Carmen Weigelt,et al.  Leveraging supplier capabilities: The role of locus of capability deployment , 2013 .

[13]  John M. T. Balmer,et al.  Social Identity, Organizational Identity and Corporate Identity: Towards an Integrated Understanding of Processes, Patternings and Products , 2007 .

[14]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[15]  Lonna Rae Atkeson,et al.  A new barrier to participation: Heterogeneous application of voter identification policies , 2010 .

[16]  C. Huxham,et al.  Cycles of Identity Formation in Interorganizational Collaborations , 2003 .

[17]  Jayant Kalagnanam,et al.  Managing Data Quality Risk in Accounting Information Systems , 2012, Inf. Syst. Res..

[18]  Robert E. Kraut,et al.  Building Member Attachment in Online Communities: Applying Theories of Group Identity and Interpersonal Bonds , 2012, MIS Q..

[19]  A.C.J. Sprokkereef,et al.  ETHICAL PRACTICE IN THE USE OF BIOMETRIC IDENTIFIERS WITHIN THE EU , 2007 .

[20]  C. Marlene Fiol,et al.  Capitalizing on Paradox: The Role of Language in Transforming Organizational Identities , 2002, Organ. Sci..

[21]  David Lyon,et al.  Identifying Citizens: ID Cards as Surveillance , 2009 .

[22]  A. Miriam B. Lips Reconstructing, attributing and fixating citizen identities in digital-era government , 2013 .

[23]  Tobias Mahler,et al.  Governance Models for Interoperable Electronic Identities , 2011 .

[24]  Paul Beynon-Davies,et al.  The UK national identity card , 2011, ICIS.

[25]  Leslie P. Willcocks,et al.  Evolving IS Capabilities to Leverage the External IT Services Market , 2007, MIS Q. Executive.

[26]  Kevin G. Corley,et al.  Identity Ambiguity and Change in the Wake of a Corporate Spin-off , 2004 .

[27]  Hichang Cho,et al.  Online privacy, government surveillance and national ID cards , 2009, Commun. ACM.

[28]  Karen Ruhleder,et al.  Steps Toward an Ecology of Infrastructure: Design and Access for Large Information Spaces , 1996, Inf. Syst. Res..

[29]  Gerrit Hornung Biometric Passports and Identity Cards: Technical, Legal, and Policy Issues , 2005 .

[30]  M. Alvesson Talking in Organizations: Managing Identity and Impressions in an Advertising Agency , 1994 .

[31]  Vernon J. Richardson,et al.  The Consequences of Information Technology Control Weaknesses on Management Information Systems: The Case of Sarbanes-Oxley Internal Control Reports , 2012, MIS Q..

[32]  Benoît Otjacques,et al.  Interoperability of E-Government Information Systems: Issues of Identification and Data Sharing , 2007, J. Manag. Inf. Syst..

[33]  William G. Staples Playing the Identity Card: Surveillance, Security and Identification in Global Perspective , 2009 .

[34]  Patrick Dunleavy,et al.  Digital Era Governance , 2006 .

[35]  Helen Kelley,et al.  Research Commentary - Generalizability of Information Systems Research Using Student Subjects - A Reflection on Our Practices and Recommendations for Future Research , 2012, Inf. Syst. Res..

[36]  A. Kieser,et al.  Why the Rigour-Relevance Gap in Management Research is Unbridgeable , 2009 .

[37]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[38]  Pär J. Ågerfalk,et al.  Rethinking the Meaning of Identifiers in Information Infrastructures , 2010, J. Assoc. Inf. Syst..

[39]  David Lyon,et al.  Playing the identity card : surveillance, security and identification in global perspective , 2013 .

[40]  Sandra Mantu,et al.  Paper Citizens: How Illegal Immigrants Acquire Citizenship in Developing Countries , 2010 .

[41]  Bart Preneel,et al.  Insights on identity documents based on the Belgian case study , 2008, Inf. Secur. Tech. Rep..

[42]  José van Dijck,et al.  'You have one identity': performing the self on Facebook and LinkedIn , 2013 .

[43]  Majken Schultz,et al.  The Expressive Organization: Linking Identity, Reputation, and the Corporate Brand , 2000 .

[44]  S. Alexander Haslam,et al.  Psychology in Organizations: The Social-Identity Approach , 2000 .

[45]  Perri Should We Be Compelled to Have Identity Cards? Justifications for the Legal Enforcement of Obligations , 2005 .

[46]  Kevin D. Haggerty,et al.  The Public Politics of Opinion Research on Surveillance and Privacy , 2002 .

[47]  Tony Collings Some thoughts on the underlying logic and process underpinning Electronic Identity (e-ID) , 2008, Inf. Secur. Tech. Rep..

[48]  Ari Schwartz,et al.  Identity management and privacy , 2011, Commun. ACM.

[49]  Edgar A. Whitley,et al.  Departmental influences on policy design , 2008, CACM.

[50]  M. Schultz,et al.  Responding to Organizational Identity Threats: Exploring the Role of Organizational Culture , 2006 .

[51]  Nadia Caidi,et al.  How much is too little? Privacy and smart cards in Hong Kong and Ontario , 2005, J. Inf. Sci..

[52]  Paul A. Swatman,et al.  Biometrics and e-Identity (e-Passport) in the European Union: End-user perspectives on the adoption of a controversial innovation , 2006, J. Theor. Appl. Electron. Commer. Res..

[53]  Robin Williams,et al.  The sociology of a market analysis tool: How industry analysts sort vendors and organize markets , 2009, Inf. Organ..

[54]  Geoff Walsham,et al.  IT and Changing Professional Identity: Micro Studies and Macro-Theory , 1998, J. Am. Soc. Inf. Sci..

[55]  N. Ellemers,et al.  SOCIAL IDENTITY IN INDUSTRIAL AND ORGANIZATIONAL PSYCHOLOGY: CONCEPTS, CONTROVERSIES AND CONTRIBUTIONS , 2006 .

[56]  Patrick J. Flynn,et al.  Factors that degrade the match distribution in iris biometrics , 2009, Identity in the Information Society.

[57]  Verena Prebil,et al.  [A question of trust]. , 2007, Krankenpflege. Soins infirmiers.

[58]  Edgar A. Whitley,et al.  Global Challenges for Identity Policies , 2009, Technology, Work and Globalization.

[59]  Antonio Cordella,et al.  Outsourcing, bureaucracy and public value: Reappraising the notion of the "contract state" , 2010, Gov. Inf. Q..

[60]  Siraj Ahmed Shaikh,et al.  Characteristic trade-offs in designing large-scale biometric-based identity management systems , 2010, J. Netw. Comput. Appl..

[61]  S. Turkle Life on the Screen: Identity in the Age of the Internet , 1997 .

[62]  C. Marlene Fiol,et al.  Managing Culture as a Competitive Resource: An Identity-Based View of Sustainable Competitive Advantage , 1991 .

[63]  Blake E. Ashforth,et al.  Relational Identity and Identification: Defining Ourselves Through Work Relationships , 2007 .

[64]  Hal Berghel,et al.  Identity theft, social security numbers, and the Web , 2000, CACM.

[65]  Bob Carter Implementation implications of biometrics , 1998, Inf. Secur. Tech. Rep..

[66]  Rosío Alvarez,et al.  Examining technology, structure and identity during an Enterprise System implementation , 2008, Inf. Syst. J..

[67]  Jungjoo Jahng,et al.  Personality traits and effectiveness of presentation of product information in e-business systems , 2002, Eur. J. Inf. Syst..

[68]  Daniel J. Canary,et al.  Organizational commitment and identification: An examination of conceptual and operational convergence , 1991 .

[69]  Martina Angela Sasse,et al.  A framework for the lived experience of identity , 2010 .

[70]  James D. McKeen,et al.  The Identity Management Challenge , 2011, Communications of the Association for Information Systems.

[71]  Jane E. Dutton,et al.  Organizational decision making: Strategic agenda building in organizations , 1996 .

[72]  K. Weick FROM SENSEMAKING IN ORGANIZATIONS , 2021, The New Economic Sociology.

[73]  David-Olivier Jaquet-Chiffelle,et al.  A TYPOLOGY OF IDENTITY-RELATED CRIME , 2009 .

[74]  Siddhartha Arora National e-ID card schemes: A European overview , 2008, Inf. Secur. Tech. Rep..

[75]  Justin M. Berg,et al.  in Cyberspace : How Boundary Work in Online Social Networks Impacts Professional Relationships , 2013 .

[76]  R. B. Redmon,et al.  Identity , 2021, Notre Dame J. Formal Log..

[77]  Dennis A. Gioia,et al.  Identity, Image, and Issue Interpretation: Sensemaking during Strategic Change in Academia. , 1996 .

[78]  John Taylor,et al.  IDENTITY MANAGEMENT, ADMINISTRATIVE SORTING AND CITIZENSHIP IN NEW MODES OF GOVERNMENT , 2009 .

[79]  Michael I. Barrett,et al.  Electronic trading and the process of globalization in traditional futures exchanges: a temporal perspective , 2004, Eur. J. Inf. Syst..

[80]  Kevin G. Corley,et al.  Semantic Learning as Change Enabler: Relating Organizational Identity and Organizational Learning , 2004 .

[81]  D. Cremer,et al.  Psychology in organizations: The social identity approach , 2001 .

[82]  D. Barnard-Wills,et al.  Public sector engagement with online identity management , 2010 .

[83]  D. Birch,et al.  Psychic ID: A blueprint for a modern national identity scheme , 2008 .

[84]  Dennis A. Gioia,et al.  From individual to organizational identity. , 1998 .

[85]  Brendan Van Alsenoy,et al.  Due processing of personal data in eGovernment ? a case Study of the Belgian electronic identity card , .

[86]  Anindya Ghose,et al.  Examining the Relationship Between Reviews and Sales: The Role of Reviewer Identity Disclosure in Electronic Markets , 2008, Inf. Syst. Res..

[87]  Anil K. Jain Technology: Biometric recognition , 2007, Nature.

[88]  Lucas D. Introna,et al.  Facial Recognition Technology A Survey of Policy and Implementation Issues , 2009 .

[89]  Shoshana Zuboff,et al.  In the Age of the Smart Machine: The Future of Work and Power , 1989 .

[90]  Geoff Walsham,et al.  Electronic Trading and Work Transformation in the London Insurance Market , 1999, Inf. Syst. Res..

[91]  Simon Davies,et al.  Biometrics - A civil liberties and privacy perspective , 1998, Inf. Secur. Tech. Rep..

[92]  Shoshana Amielle Magnet,et al.  When Biometrics Fail: Gender, Race, and the Technology of Identity , 2011 .

[93]  Christopher J. Davis,et al.  Through the Eyes of Experts: A Socio-Cognitive Perspective on the Automation of Fingerprint Work , 2007, MIS Q..

[94]  B. Doolin Narratives of Change: Discourse, Technology and Organization , 2003 .

[95]  M. Pratt,et al.  Classifying Managerial Responses to Multiple Organizational Identities , 2000 .

[96]  James Backhouse,et al.  A roadmap for research on identity in the information society , 2008 .

[97]  Marc Rotenberg Real id, real trouble? , 2006, CACM.

[98]  Dennis A. Gioia,et al.  Sensemaking and sensegiving in strategic change initiation , 1991 .

[99]  Blake E. Ashforth,et al.  Organizational Identity and Identification: Charting New Waters and Building New Bridges , 2000 .

[100]  Chris Huxham,et al.  Cycles of identity formation in collaboration , 2003 .

[101]  Roberta Lamb,et al.  Information and Communication Technology Challenges to Scientific Professional Identity , 2005, Inf. Soc..

[102]  Didier Bigo,et al.  Fighting cyber crime and protecting privacy in the cloud , 2012 .

[103]  Gerardine DeSanctis,et al.  Enacting language games: the development of a sense of ‘we‐ness’ in online forums , 2009, Inf. Syst. J..

[104]  Robert M. O'Keefe,et al.  Expectations and outcomes in electronic identity management: the role of trust and public value , 2010, Eur. J. Inf. Syst..

[105]  Margherita Bacigalupo,et al.  New Challenges and Possible Policy Options for the Regulation of Electronic Identity , 2009 .

[106]  Omer Tene Me, Myself and I: Aggregated and Disaggregated Identities on Social Networking Services , 2011 .

[107]  Luis Orihuela Peruvian National Registry of Identification and Civil States: A Successful Study in e-Governance , 2009 .

[108]  John Daugman,et al.  Pattern Recognition: Biometrics, Identity and the State—An Interview with John Daugman , 2008 .

[109]  Michael C. Bromby Identification, trust and privacy: How biometrics can aid certification of digital signatures , 2010 .

[110]  A. Stinchcombe Information and Organizations , 2019 .

[111]  Eric W. T. Ngai,et al.  Managing RFID projects in organizations , 2009, Eur. J. Inf. Syst..

[112]  Simson L. Garfinkel,et al.  Risks of social security numbers , 1995, CACM.

[113]  Ian R. Kerr,et al.  Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society , 2009 .

[114]  O. Hanseth,et al.  From Control to Drift: The Dynamics of Corporate Information Infrastructures , 2000 .

[115]  Albert L. Lederer,et al.  A Meta-Analysis of the Role of Environment-Based Voluntariness in Information Technology Acceptance , 2009, MIS Q..

[116]  Celia V. Harquail,et al.  Organizational images and member identification. , 1994 .

[117]  Elizabeth M. Daniel,et al.  Dimensions of Employee Privacy: An Empirical Study , 2012, Inf. Technol. People.

[118]  J. Dutton,et al.  KEEPING AN EYE ON THE MIRROR : IMAGE AND IDENTITY IN ORGANIZATIONAL ADAPTATION , 2005 .

[119]  Fred A. Mael,et al.  Social identity theory and the organization , 1989 .

[120]  Hal Berghel Fungible credentials and next-generation fraud , 2006, CACM.

[121]  Jeanette Van Akkeren,et al.  An epidemic of pain in an Australian radiology practice , 2007, Eur. J. Inf. Syst..

[122]  Jeremy Wickins,et al.  The ethics of biometrics: the risk of social exclusion from the widespread use of electronic identification , 2007, Sci. Eng. Ethics.

[123]  Xin Li,et al.  Why do we trust new technology? A study of initial trust formation with organizational information systems , 2008, J. Strateg. Inf. Syst..

[124]  Rodrigo Firmino,et al.  Empowerment or repression? Opening up questions of identification and surveillance in Brazil through a case of ‘identity fraud’ , 2009 .

[125]  Amany R. Elbanna,et al.  From Control to Drift: The Dynamics of Corporate Information Infrastructures , 2001 .

[126]  Gerrit Hornung,et al.  Data protection in Germany I: The population census decision and the right to informational self-determination , 2009, Comput. Law Secur. Rev..

[127]  Kevin G. Corley,et al.  The Intersection of Organizational Identity, Knowledge, and Practice: Attempting Strategic Change Via Knowledge Grafting , 2007 .

[128]  Mia Elisabeth Harbitz,et al.  Civil Registration and Identification Glossary , 2010 .

[129]  Intae Choi,et al.  Digital era governance: IT corporations, the state, and e-Government , 2016 .

[130]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[131]  Kevin G. Corley,et al.  Organizational Identity, Image, and Adaptive Instability , 2000 .

[132]  Edgar A. Whitley,et al.  On technology neutral policies for e–identity: a critical reflection based on UK identity policy , 2013 .

[133]  Ross Anderson,et al.  Database State: A Report Commissioned by the Joseph Rowntree Reform Trust Ltd. , 2009 .

[134]  Marek Rejman-Greene Security considerations in the use of biometric devices , 1998, Inf. Secur. Tech. Rep..

[135]  Edgar A. Whitley,et al.  Doing the politics of technological decision making: due process and the debate about identity cards in the U.K. , 2008, Eur. J. Inf. Syst..

[136]  Ritu Agarwal,et al.  Through a Glass Darkly: Information Technology Design, Identity Verification, and Knowledge Contribution in Online Communities , 2007, Inf. Syst. Res..

[137]  Kalle Lyytinen,et al.  The dynamics of IT boundary objects, information infrastructures, and organisational identities: the introduction of 3D modelling technologies into the architecture, engineering, and construction industry , 2008, Eur. J. Inf. Syst..

[138]  Jannis Kallinikos,et al.  Deconstructing information packages: Organizational and behavioural implications of ERP systems , 2004, Inf. Technol. People.

[139]  Giles Hogben,et al.  Privacy Features: Privacy features of European eID card specifications , 2008 .

[140]  Edgar A. Whitley,et al.  Global Identity Policies and Technology: Do we Understand the Question? , 2010 .

[141]  Edgar A. Whitley,et al.  Fixing identity? Biometrics and the tensions of material practices , 2013 .

[142]  R. Ramakumar,et al.  The Unique ID Project in India: A Skeptical Note , 2010, ICEB.

[143]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[144]  Kamal Sadiq,et al.  Paper Citizens: How Illegal Immigrants Acquire Citizenship in Developing Countries , 2008 .

[145]  Atreyi Kankanhalli,et al.  What Motivates People to Purchase Digital Items on Virtual Community Websites? The Desire for Online Self-Presentation , 2012, Inf. Syst. Res..

[146]  E. Mordini,et al.  Body, Biometrics and Identity , 2008, Bioethics.

[147]  Michelle M. Kazmer,et al.  Do You Read Me? Perspective Making and Perspective Taking in Chat Communities , 2007, J. Assoc. Inf. Syst..

[148]  M. Alvesson,et al.  Identity Matters: Reflections on the Construction of Identity Scholarship in Organization Studies , 2008 .

[149]  Suprateek Sarker,et al.  Understanding Virtual Team Development: An Interpretive Study , 2003, J. Assoc. Inf. Syst..

[150]  John Daugman,et al.  Recognizing people by their iris patterns , 1998, Inf. Secur. Tech. Rep..

[151]  Norberto Nuno Gomes de Andrade,et al.  Friending the taxman , 2013 .

[152]  H. Tajfel,et al.  An integrative theory of intergroup conflict. , 1979 .

[153]  D. Lyon Surveillance Studies: An Overview , 2007 .

[154]  A. Alterman,et al.  ``A piece of yourself'': Ethical issues in biometric identification , 2003, Ethics and Information Technology.

[155]  J. Turner Explaining the nature of power: a three-process theory , 2005 .

[156]  Georg Aichholzer,et al.  Electronic identity management in e-Government 2.0: Exploring a system innovation exemplified by Austria , 2010, Inf. Polity.

[157]  Marina Krakovsky India's elephantine effort , 2011, Commun. ACM.

[158]  Kevin G. Corley,et al.  Guiding Organizational Identity Through Aged Adolescence , 2006 .

[159]  Susan V. Scott,et al.  Reconfiguring relations of accountability: Materialization of social media in the travel sector , 2011 .

[160]  Jon Bing Protecting personal data in wartime: The destruction of the alphabetic tabulators in Oslo , 2009, Comput. Law Secur. Rev..

[161]  T. Mulqueen,et al.  Securitizing Gender: Identity, Biometrics, and Transgender Bodies at the Airport , 2011 .

[162]  Dennis Broeders,et al.  The New Digital Borders of Europe , 2007 .

[163]  Bill Doolin,et al.  Enterprise Discourse, Professional Identity and the Organizational Control of Hospital Clinicians , 2002 .

[164]  Lars Thøger Christensen,et al.  Organizational Identity. Linkages between ‘Internal’ and ‘External’ Organizational Communication , 2004 .

[165]  Rebekah Thomas Biometrics, International Migrants and Human Rights , 2006 .

[166]  Bendik Bygstad,et al.  The Generative Mechanisms of Digital Infrastructure Evolution , 2013, MIS Q..

[167]  Mia Elisabeth Harbitz,et al.  Democratic Governance, Citizenship, and Legal Identity: Linking Theoretical Discussion and Operational Reality , 2009 .

[168]  skyrider [영어로 보는 과학] Surveillance Society , 2007 .