800
Views
50
CrossRef citations to date
0
Altmetric
SPECIAL SECTION

Who do you think you are? A review of the complex interplay between information systems, identification and identity

, &
Pages 17-35 | Published online: 28 Jan 2019

References

  • Aichholzer C and Strauss S (2010) Electronic identity management in e-government 2.0: exploring a system innovation exemplified by Austria. Information Polity 15(1/2), 139–152.
  • Albert S, Ashforth BE and Dutton JE (2000) Organizational identity and identification: charting new waters and building new bridges. Academy of Management Review 25(1), 13–17.
  • Albert S and Whetten DA (1985) Organizational identity. In Research in Organizational Behavior (Cummings LL and Staw BM, Eds), pp 263–295, JAI Press, Greenwich, CT.
  • AllAfrica.com. (2010) Mozambique: Biometric passports rejected. (22 March) [WWW document] http://allafrica.com/stories/201003221610.html (accessed 18 October 2013).
  • Alterman A (2003) ‘A piece of yourself’: ethical issues in biometric identification. Ethics and Information Technology 5(3), 139–150.
  • Alvarez R (2008) Examining technology, structure and identity during an enterprise system implementation. Information Systems Journal 18(2), 203–224.
  • Alvesson M (1994) Talking in organizations: managing identity and impressions in an advertising agency. Organization Studies 15(4), 535–563.
  • Alvesson M, Ashcraft KL and Thomas R (2008) Identity matters: reflections on the construction of identity scholarship in organization studies. Organization 15(1), 5–28.
  • Amoore L (2008) Governing by identity. In Playing the Identity Card: Surveillance, Security and Identification in Global Perspective (Bennett CJ and Lyon D, Eds), pp 21–36, Routledge, London.
  • Arora S (2008) National e-ID card schemes: a European overview. Information Security Technical Report 13(2), 46–53.
  • Ashforth BE and Mael F (1989) Social identity theory and the organization. Academy of Management Review 14(1), 20–39.
  • Ashforth BE and Mael F (1996) Organizational identity and strategy as a context for the individual. In Advances in Strategic Management (Baum JAC and Dutton JE, Eds), pp 19–64, JAI Press, Greenwich, CT.
  • Atkeson LR, Bryant LA, Hall TE, Saunders KL and Alvarez RM (2010) A new barrier to participation: heterogeneous application of voter identification policies. Electoral Studies 29(1), 66–73.
  • Backhouse J, Hsu C, Tseng JC and Baptista J (2005) A question of trust: an economic perspective on quality standards in the certification services market. Communications of the ACM 48(9), 87–91.
  • Bai X, Nunez M and Kalagnanam JR (2012) Managing data quality risk in accounting information systems. Information Systems Research 23(2), 453–473.
  • Bailey SGM and Caidi N (2005) How much is too little? Privacy and smart cards in Hong Kong and Ontario, Journal of Information Science 31(5), 354–364.
  • Ball K, Daniel EM and Stride C (2012) Dimensions of employee privacy: an empirical study. Information Technology and People 25(4), 376–394.
  • Barnard-Wills D and Ashenden D (2011) Public sector engagement with online identity Management. Identity in the Information Society 3(1), 657–674.
  • Barrett MI and Scott SV (2004) Electronic trading and the process of globalization in traditional futures exchanges: a temporal perspective. European Journal of Information Systems 13(1), 65–79.
  • Barrett MI and Walsham G (1999) Electronic trading and work transformation in the London insurance market. Information Systems Research 10(1), 1–22.
  • BBC News. (2013) Bomb threat tweet sent to classicist Mary Beard. (4 August) [WWW document] http://www.bbc.co.uk/news/23565145 (accessed 18 October 2013).
  • Beech N and Huxham C (2004) Cycles of identity formation in interorganizational collaborations. International Studies of Management & Organization 33(3), 28–52.
  • Bennett CJ and Lyon D (Eds) (2008) Playing the Identity Card: Surveillance, Security and Identification in Global Perspective. Routledge, London.
  • Berghel H (2000) Identity theft, social security numbers and the web. Communications of the ACM 43(2), 17–21.
  • Berghel H (2006) Fungible credentials and next-generation fraud. Communications of the ACM 49(12), 15–19.
  • Bernat L (2011) National strategies and policies for digital identity management in OECD countries. OECD [WWW document] http://dx.doi.org/10.1787/5kgdzvn5rfs2-en (accessed 18 October 2013).
  • Beynon-Davies P (2011) The U.K. national identity card, Journal of Information Technology Teaching Cases 1(1), 12–21.
  • Bing J (2009) Protecting personal data in wartime: the destruction of the alphabetic tabulators in Oslo. Computer Law & Security Review 25(1), 89–96.
  • Birch DGW (2009) Psychic ID: a blueprint for a modern national identity scheme. Identity in the Information Society 1(1), 189–201.
  • Bose I, Ngai EWT, Teo TSH and Spiekermann S (2009) Managing RFID projects in organizations. European Journal of Information Systems 18(6), 534–540.
  • Bowyer KW, Baker SE, Hentz A, Hollingworth K, Peters T and Flynn PJ (2009) Factors that degrade the match distribution in iris biometrics. Identity in the Information Society 2(3), 327–343.
  • Broeders D (2007) The new digital borders of Europe: EU databases and the surveillance of irregular migrants. International Sociology 22(1), 71–92.
  • Bromby M (2010) Identification, trust and privacy: how biometrics can aid certification of digital signatures. International Review of Law Computers & Technology 24(1), 133–141.
  • Cabinet Office. (2012) GPG 43 Requirements for secure delivery of online public services, (version 1.1) (December) [WWW document] https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/138004/GPG_43_RSDOPS_issue_1.1_Dec-2012.pdf (accessed 18 October 2013).
  • Cabinet Office. (2013a) Draft Identity Assurance Principles. (17 June) [WWW document] https://www.gov.uk/government/consultations/draft-identity-assurance-principles (accessed 18 October 2013).
  • Cabinet Office. (2013b) GPG 45 Identity proofing and verification of an individual. (Version 2.0) (May) [WWW document] https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/204448/GPG_45_Identity_proofing_and_verification_of_an_individual_2.0_May-2013.pdf (accessed 18 October 2013).
  • Cameron K (2005) The laws of identity. (5 November) [WWW document] http://www.identityblog.com/stories/2005/05/13/TheLawsOfldentity.pdf (accessed 18 October 2013).
  • Carter B (1998) Implementation implications of biometrics. Information Security Technical Report 3(1), 60–69.
  • Cheney G and Christensen LT (2001) Organizational identity: linkages between ‘internal’ and ‘external’ organizational communication. In The New Handbook of Organizational Communication (Jablin FM and Putnam LL, Eds), pp 231–269, Sage, Thousand Oaks.
  • Ciborra C and Associates. (2000) From Control to Drift: The Dynamics of Corporate Information Infrastructures. Oxford University Press, Oxford.
  • Collings T (2008) Some thoughts on the underlying logic and process underpinning Electronic Identity (e-ID). Information Security Technical Report 13(2), 61–70.
  • Compeau D, Marcoun B, Kelley H and Higgins C (2012) Research commentary — generalizability of information systems research using student subjects — a reflection on our practices and recommendations for future research. Information Systems Research 23(4), 1093–1109.
  • Cordella A and Willcocks LP (2010) Outsourcing, bureaucracy and public value: reappraising the notion of the ‘contract state’. Government Information Quarterly 27(1), 82–88.
  • Corley KG and Gioia DA (2003) Semantic learning as change enabler: relating organizational identity & organizational learning. In Handbook of Organizational Learning and Knowledge Management (Easterby-Smith M and Lyles MA, Eds), pp 621–636, Blackwell, London.
  • Corley KG and Gioia DA (2004) Identity ambiguity and change in the wake of a Corporate Spin-off. Administrative Science Quarterly 49(2), 173–208.
  • Corley KG, Harquail CV, Pratt MG, Glynn M, Fiol CM and Hatch MJ (2006) Guiding organizational identity through aged adolescence. Journal of Management Inquiry 15(2), 85–99.
  • Cornelissen JP, Haslam SA and Balmer JMT (2007) Social identity, organizational identity and corporate identity: towards an integrated understanding of processes, patternings and products. British Journal of Management 18(special issue), 1–16.
  • Currah P and Mulqueen T (2011) Securitizing gender: identity, biometrics and transgender bodies at the airport. Social Research 78(2), 557–582.
  • Darking ML and Whitley EA (2007) Towards an understanding of FLOSS: infrastructures, materiality and the digital business ecosystem. Science & Technology Studies 20(2), 13–33.
  • Daugman J (1998) Recognizing people by their iris patterns. Information Security Technical Report 3(1), 33–39.
  • Davies SG (1998) Biometrics: a civil liberties and privacy perspective. Information Security Technical Report 3(1), 90–94.
  • Davis CJ and Hufnagel EM (2007) Through the eyes of experts: a socio-cognitive perspective on the automation of fingerprint work. MIS Quarterly 31(4), 681–704.
  • Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly 13(3), 319–340.
  • Davis FD, Bagozzi RP and Warshaw PR (1989) User acceptance of computer technology: a comparison of two theoretical models. Management Science 35(8), 982–1003.
  • De Cock D, Simoens K and Preneel B (2008) Insights on identity documents based on the Belgian case study. Information Security Technical Report 13(2), 54–60.
  • Dickey MH, Burnett G, Chudoba KM and Kazmer MM (2007) Do you read me? Perspective making and perspective taking in chat communities. Journal of the AIS 8(1, Article 3), 47–70.
  • Dinev T, Hart P and Mullen MR (2008) Internet privacy concerns and beliefs about government surveillance — an empirical investigation. Journal of Strategic Information Systems 17(3), 214–233.
  • Doolin B (2002) Enterprise discourse, professional identity and the organizational control of hospital clinicians. Organization Studies 23(4), 369–390.
  • Doolin B (2003) Narratives of change: discourse, technology and organization. Organization Studies 10(4), 751–770.
  • Dunleavy P (2005) Written evidence to the Public Administration Select Committee. (24 November) [WWW document] http://www2.lse.ac.uk/ERD/pressAndlnformationOffice/PDF/IDCard_Nov05WrittenEvidence.pdf (accessed 18 October 2013).
  • Dunleavy P, Margetts H, Bastow S and Tinkler J (2006) Digital Era Governance: IT Corporations, the State and E-Government. Oxford University Press, Oxford.
  • Dutton JE (1997) Strategic agenda building in organizations. In Organisational Decision Making (Shapira Z, Ed), Cambridge University Press, Cambridge.
  • Dutton JE and Dukerich JM (1991) Keeping an eye on the mirror: image and identity in organizational adaptation. Academy of Management Journal 34(3), 517–554.
  • Dutton JE, Dukerich JM and Harquail CV (1994) Organizational images and member identification. Administrative Science Quarterly 39(2), 239–263.
  • ENISA. (2009) Privacy Features of European eID Card Specifications. (27 January) [WWW document] http://www.enisa.europa.eu/activities/identity-and-trust/trust-services/eid-cards-en (accessed 18 October 2013).
  • Eriksson O and Agerfalk P (2010) Rethinking the meaning of identifiers in information infrastructures, Journal of the Association for Information Systems 11(8), 433–454.
  • Estonia Digi-ID. (2013) Digi-ID. [WWW document] http://www.politsei.ee/en/teenused/isikut-toendavad-dokumendid/digi-id/ (accessed 18 October 2013).
  • European Parliament. (2012) Fighting cybercrime and protecting privacy in the cloud. Directorate General for Internal Policies; Policy Department C: Citizens' rights and constitutional affairs. (October) [WWW document] http://www.europarl.europa.eu/committees/en/studiesdownload.html?languageDocument=EN&file=79050 (accessed 18 October 2013).
  • Fayard A and DeSanctis G (2010) Enacting language games: the development of a sense of we-ness in online forums. Information Systems Journal 20(4), 383–416.
  • Fiol CM (1991) Managing culture as a competitive resource: an identity-based view of sustainable competitive, Journal of Management 17(1), 191–211.
  • Fiol CM (2002) Capitalizing on paradox: the role of language in transforming organizational identities. Organization Science 13(6), 653–666.
  • FIPR. (2009) Database state: a report commissioned by the Joseph Rowntree Reform Trust Ltd. (22 March) [WWW document] http://www.cl.cam.ac.uk/~rja14/Papers/database-state.pdf (accessed 18 October 2013).
  • Forman C, Chose A and Wiesenfeld B (2008) Examining the relationship between reviews and sales: the role of social information in electronic markets. Information Systems Research 19(3), 291–313.
  • Froomkin AM (2009) Identity cards and identity romanticism. In Lessons From the Identity Trail: Anonymity, Privacy and Identity in A Networked Society (Kerr I, Ed), pp 245–263, Oxford University Press, Oxford.
  • Gal U and Kjaergaard A (2009) Identity in information systems. In 17th European Conference on Information Systems (Newell S, Whitley EA, Wareham NPJ and Mathiassen L, Eds), pp 1999–2011, Verona, Italy. [WWW document] http://is2.lse.ac.uk/asp/aspecis/20090166.pdf (accessed 18 October 2013).
  • Gal U, Lyytinen K and Yoo Y (2008) The dynamics of it boundary objects, Information infrastructures, and organizational identities: the introduction of 3D modelling technologies into the architecture, engineering, and construction industry. European Journal of Information Systems 17(3), 290–304.
  • Garfinkel SL (1995) Risks of social security numbers. Communications of the ACM 38(10), 146.
  • Gates K (2008) The United States Real ID Act and the securitization of identity. In Playing the Identity Card: Surveillance, Security and Identification in Global Perspective (Bennett CJ and Lyon D, Eds), pp 218–232, Routledge, London.
  • Gates KA (2005) Technologies of identity and the identity of technology: race and the social construction of biometrics. In Race, Identity and Representation in Education (McGarthy C and Crichlow W, Eds) pp 59–71, Routledge, New York.
  • Gioia DA (1998) From individual to organizational identity. In Identity in Organizations — Building Theory Through Conversations (Whetten DA and Godfrey PC, Eds), pp 17–31, Sage, Thousand Oaks, CA.
  • Gioia DA and Chittipeddi K (1991) Sensemaking and sensegiving in strategic change initiation. Strategic Management Journal 12(6), 433–448.
  • Gioia DA, Schultz M and Corley KG (2000) Organizational identity, image, and adaptive instability. Academy of Management Review 25(1), 63–81.
  • Gioia Da and Thomas JB (1996) Identity, image, arid issue interpretation: sensemaking during strategic change in academia. Administrative Science Quarterly 41(3), 370–403.
  • Haggerty K and Gazso A (2005) The public politics of opinion research on surveillance and Privacy. Surveillance and Society 3(2/3), 173–180.
  • Halperin R and Backhouse J (2008) A roadmap for research on identity in the information society. Identity in the Information Society 1(1), 71–87.
  • Harbitz M and Boekle-Giuffrida B (2009) Democratic governance, citizenship, and legal identity: linking theoretical discussion and operational reality. InterAmerican Development Bank. [WWW document] http://www.iadb.org/intal/intalcdi/PE/2009/03791.pdf (accessed 18 October 2013).
  • Harbitz M and Molina JCB (2010) Civil registration and identification glossary. InterAmerican Development Bank. [WWW document] http://idbdocs.iadb.org/wsdocs/getdocument.aspx?docnum=35308547 (accessed 18 October 2013).
  • Haslam SA (2001) Psychology in Organizations: The Social Identity Approach. Sage, London.
  • Haslam SA and Ellemers N (2005) Social identity in industrial and organizational psychology: concepts, controversies and contributions. In International Review of Industrial and Organizational Psychology (Hodgkinson GP and Ford JK, Eds), pp 39–118, John Wiley & Sons Ltd, Chichester.
  • Henfridsson O and Bygstad B (2013) The generative mechanisms of digital infrastructure evolution. MIS Quarterly 37(3), 896–931.
  • Hm Passport Office. (2011) Basic passport checks. (9 February) [WWW document] https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/118783/basic-passport-checks.pdf (accessed 18 October 2013).
  • Hoikkanen A, Bacigalupo M, Compañó R, Lusoli W and Maghiros I (2010) New challenges and possible policy options for the regulation of electronic identity, Journal of International Commercial Law and Technology 5(1), 1–10.
  • Home Affairs Committee. (2008) A surveillance society? (8 June) [WWW document] http://www.publications.parliament.uk/pa/cm200708/cmselect/cmhaff/58/58i.pdf (accessed 18 October 2013).
  • Hornung G (2005) Biometric passports and identity cards: technical, legal and policy issues. European Public Law 11(4), 501–514.
  • Hornung G and Schnabel C (2009) Data protection in Germany I: the population census decision and the right to informational self-determination. Computer Law & Security Review 25(1), 84–88.
  • IAS Project. (2011) Study on an electronic identification, authentication and signature policy. [WWW document] http://www.iasproject.eu/ (accessed 18 October 2013).
  • ICAO. (2003) Technical advisory group on machine readable travel documents. Fourteenth meeting International Civil Aviation Organisation. (6–9 May) [WWW document] http://www2.icao.int/en/MRTD/Downloads/TAG-MRTD%20Reports/TAG-MRTD_14%20Report.pdf (accessed 18 October 2013).
  • Introna LD and Nussenbaum H (2009) Facial recognition technology: a survey of policy and implementation issues. (April) [WWW document] http://www.nyu.edu/projects/nissenbaum/papers/facial_recognition_report.pdf (accessed 18 October 2013).
  • Jahng JJ, Jain H and Ramamurthy K (2002) Personality traits and effectiveness of presentation of product information in e-business systems. European Journal of Information Systems 11(3), 181–195.
  • Jain AK (2007) Biometric recognition: Q&A. Nature 449(September), 38–40.
  • Jain AK, Ross A and Prabhakar S (2004) An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image-and Video-Based Biometrics 14(1), 4–20.
  • Jung CG (1971) Collected Works, Volume Six: Psychological Types. Princeton University Press, Princeton, NJ.
  • Kabatoff M and Daugman J (2008) Pattern recognition: biometrics, identity and the state — an interview with john daugman. Biosocieties 3(1), 81–86.
  • Kallinikos J (2004) Deconstructing information packages: organizational and behavioural implications of erp systems. Information Technology & People 17(1), 8–30.
  • Kerr I, Steeves V and Lucock C (Eds) (2009) Lessons From the Identity Trail: Anonymity, Privacy and Identity in a Networked Society. Oxford University Press, Oxford.
  • Kieser A and Leiner L (2009) Why the rigour — relevance gap in management research is unbridgeable, Journal of Management Studies 46(3), 516–533.
  • Kim H, Chan H and Atreyi K (2012) What motivates people to purchase digital items on virtual community websites? The desire for online self-presentation. Information Systems Research 23(4), 1232–1245.
  • Koops B-J, Leenes R, Meints M, Nvd Meulen and Jaquet-Chiffelle D-O (2009) A typology of identity-related crime: conceptual, technical, and legal issues. Information, Communication & Society 12(1), 1–24.
  • Krakovsky M (2011) India's elephantine effort. Communications of the ACM 54(1), 23–24.
  • Lamb R and Davidson E (2005) Information and communication technology challenges to scientific professional identity. The Information Society 21(1), 1–24.
  • Li C, Peters GF, Richardson VJ and Watson MW (2012) The consequences of information technology control weaknesses on management information systems: the case of sarbanes—oxley internal control reports. MIS Quarterly 36(1), 179–203.
  • Li X, Hess TJ and Valacich JS (2008) Why do we trust new technology? A study of initial trust formation with organizational information systems. Journal of Strategic Information Systems 17(1), 39–71.
  • Lim SS, Cho H and Sanchez MR (2009) Online privacy, government surveillance and national ID cards. Communications of the ACM 52(12), 116–120.
  • Lips AMB, Taylor JA and Organ J (2009) Identity management, administrative sorting and citizenship in new modes of government. Information, Communication & Society 12(5), 715–734.
  • Lips M (2013) Reconstructing, attributing and fixating citizen identities in digital-era government. Media, Culture and Society 35(1), 61–70.
  • Lyon D (2007) Surveillance Studies: An Overview. Polity, Cambridge.
  • Lyon D (2009) Identifying Citizens: ID Cards as Surveillance. Polity, Cambridge.
  • Ma M and Agarwal R (2007) Through a glass darkly: information technology design, identity verification, and knowledge contribution in online communities. Information Systems Research 18(1), 42–67.
  • Magnet SA (2011) When Biometrics Fail: Gender, Race and the Technology of Identity. Duke University Press, Durham.
  • Mahler T (2013) Governance models for interoperable electronic identities. Journal of International Commercial Law and Technology 8(2), 148–159.
  • Martin AK and Andrade NNGd (2013) Friending the taxman: on the use of social networking services for government eID in Europe. Telecommunications Policy 37(9), 715–724.
  • Martin AK and Whitley EA (2013) Fixing identity? Biometrics and the tensions of material practices. Media, Culture and Society 35(1), 52–60.
  • Monteiro E and Hanseth O (1995) Social shaping of information infrastructure: on being specific about the technology. In Information technology and changes in organizational work (Orlikowski WJ, Walsham G, Jones MR and DeGross JI, Eds), pp 325–343, Chapman & Hall, London.
  • Moore GC and Benbasat I (1991) Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research 2(3), 192–220.
  • Mordini E and Massari S (2008) Body, biometrics and identity. Bioethics 27(9), 488–498.
  • Murakami Wood D and Frimino R (2009) Empowerment or represssion? Opening up questions of identification and surveillance in Brazil through a case of ‘identity fraud’. Identity in the Information Society 2(3), 297–317.
  • Nag R, Corley KG and Gioia DA (2007) The intersection of organizational identity, knowledge, and practice: attempting strategic change via knowledge grafting. Academy of Management Journal 50(4), 821–847.
  • Neyland D (2009) Who's who? The biometric future and the politics of identity. European Journal of Criminology 6(2), 135–155.
  • NG-Kruelle G, Swatman PA, Hampe JF and Rebne DS (2006) Biometrics and e-identity (e-passport) in the European Union: end-user perspectives on the adoption of a controversial innovation, Journal of Theoretical and Applied Electronic Commerce Research 1(2), 12–35.
  • Ollier-Mala Terre A, Rothbard N and Berg J (2013) When worlds collide in cyberspace: how boundary work in online social networks impacts professional relationships. Academy of Management Review 38(4), 645–669.
  • Orihuela L (2009) Peruvian national registry of identification and civil states: a successful study in e-governance. l-ways Journal of E-Government Policy and Regulation 32(2), 99–103.
  • Otjacques B, Hitzelberger P and Feltz F (2007) Interoperability of E-government information systems: issues of identification and data sharing, Journal of Management Information Systems 23(4), 29–52.
  • Perri 6. (2005) Should we be compelled to have identity cards? Justifications for the legal enforcement of obligations. Political Studies 53(2), 243–261.
  • Pollock N and Williams R (2009) The sociology of a market analysis tool: how industry analysts sort vendors and organize markets. Information and Organization 19(2), 129–151.
  • Pratt MG and Foreman PO (2000) Classifying managerial responses to multiple organizational identities. Academy of Management Review 25(1), 18–42.
  • Rahaman A and Sasse MA (2010) A framework for the lived experience of identity. Identity in the Information Society 3(3), 605–638.
  • Ramakumar R (2010) The unique ID project in India: a skeptical note. In ICEB 2010, Lecture Notes in Computer Science 6005 (Kumar A and Zhang D, Eds), pp 153–167, Springer, Berlin.
  • Ravasi D and Schultz M (2006) Responding to organizational identity threats: exploring the role of organizational culture. Academy of Management Journal 49(3), 433–458.
  • Rehman-Greene M (1998) Security considerations in the use of biometric devices. Information Security Technical Report 3(1), 77–80.
  • Romero JJ (2012) India's big bet on identity. IEEE Spectrum 49(3), 48–56.
  • Rotenberg M (2006) Real ID, Real trouble? Communications of the ACM 49(3), 128–128.
  • Sadiq K (2009) Paper Citizens: How Illegal Immigrants Acquire Citizenship in Developing Countries. Oxford University Press, Oxford.
  • Sarker S and Sahay S (2003) Understanding virtual team development: an interpretive study, Journal of the AIS 4(1, Article 1), 1–38.
  • Sass JS and Canaray DJ (1991) Organizational commitment and identification: an examination of conceptual and operational convergence. Western Journal of Speech Communication 55(3), 275–293.
  • Schultz M, Hatch MJ and Larsen MH (2000) The Expressive Organization: Linking Identity, Reputation, and the Corporate Brand. Oxford University Press, Oxford.
  • Schwartz A (2011) Identity management and privacy: a rare opportunity to get it right. Communications of the ACM 54(6), 22–24.
  • Scott SV and Orlikowski WJ (2012) Reconfiguring relations of accountability: materialization of social media in the travel sector. Accounting, Organizations and Society 37(1), 26–40.
  • Seltsikas P and O'keefe RM (2010) Expectations and outcomes in electronic identity management: the role of trust and public value. European Journal of Information Systems 19(1), 93–103.
  • Shaikh SA and Rabaiotti JR (2010) Characteristic trade-offs in designing large-scale biometric-based identity management systems, Journal of Network and Computer Applications 33(3), 342–351.
  • Sir James Crosby. (2008) Challenges and opportunities in identity assurance. (6 March) [WWW document] http://www.statewatch.org/news/2008/mar/uk-nat-identity-crosby-report.pdf (accessed 18 October 2013).
  • Sluss DM and Ashforth BE (2007) Relational identity and identification: defining ourselves through work relationships. Academy of Management Review 32(1), 9–32.
  • Smith HA and McKeen JD (2011) The identity management challenge. Communications of the AIS 28(Article 11), 169–178.
  • Sprokkereef A and De Hert P (2007) Ethical practice in the use of biometric identifiers within the EU. Law, Science and Policy 3(2), 177–202.
  • Star SL and Ruhleder K (1996) Steps toward an ecology of infrastructure: design and access for large information space. Information Systems Research 7(1), 111–134.
  • Tajfel H and Turner JC (1979) An integrative theory of intergroup conflict. In The Social Psychology of Intergroup Relations (Austin WG and Worchel S, Eds), pp 33–47, Brooks/Cole, Monterey, CA.
  • Tene O (2013) Me, Myself and I: aggregated and disaggregated identities on social networking services, Journal of International Commercial Law and Technology 8(2), 118–133.
  • The Tribune. (2012) Coriander, s/o Pulav, gets Aadhaar card in Andhra. (16 April) [WWW document] http://www.tribuneindia.com/2012/20120416/main6.htm (accessed 18 October 2013).
  • Thomas R (2005) Biometrics, international migrants and human rights. European Journal of Migration Law 7(4), 377–411.
  • Turkle S (1996) Life on the Screen: Identity in the Age of the Internet. Weidenfeld & Nicholson, London.
  • Turner JC (2005) Explaining the nature of power: a three-process theory. European Journal of Social Psychology 35(1), 1–22.
  • UNICEF. (2007) Progress for Children: A World Fit for Children Statistical Review, Number 6. United Nations Children's Fund. [WWW document] http://www.unicef.org/publications/files/Progress_for_Children_No_6_revised.pdf (accessed 18 October 2013).
  • Van Akkeren J and Rowlands B (2007) An epidemic of pain in an Australian radiology practice. European Journal of Information Systems 16(6), 695–711.
  • Van Alsenoy B and De Cock D (2008) Due processing of personal data in eGovernment? A case study of the Belgian electronic identity card. Datenschutz und Datensicherheit 32(3), 178–183.
  • van Dijk J (2013) You have one identity: performing the self on facebook and Linkedln. Media, Culture and Society 35(2), 199–215.
  • Walsham G (1998) IT and changing professional identity: micro-studies and macro-theory, Journal of the American Society for Information Science 49(12), 1081–1089.
  • Weick KE (1995) Sensemaking in Organizations. Sage, Thousand Oaks, CA.
  • Weigelt C (2013) Leveraging supplier capabilities: the role of locus of capability deployment. Strategic Management Journal 34(1), 1–21.
  • Whitley EA (2013) On technology neutral policies for e-identity: a critical reflection based on U.K. identity policy, Journal of International Commercial Law and Technology 8(2), 134–147.
  • Whitley EA and Hosein G (2010a) Global Challenges for Identity Policies. Palgrave Macmillan, Basingstoke.
  • Whitley EA and Hosein G (2010b) Global identity policies and technology: do we understand the question? Global Policy 1(2), 209–215.
  • Whitley EA and Hosein IR (2008a) Departmental influences on policy design: how the U.K. is confusing identity fraud with other policy agendas. Communications of the ACM 51(5), 98–100.
  • Whitley EA and Hosein IR (2008b) Doing the politics of technological decision making: due process and the debate about identity cards in the U.K. European Journal of Information Systems 17(6), 668–677.
  • Wickins J (2007) The ethics of biometrics: the risk of social exclusion from the widespread use of electronic identification. Science and Engineering Ethics 13(1), 45–54.
  • Willcocks LP, Reynolds P and Feeny D (2007) Evolving IS capabilities to leverage the external IT services market. MISQ Executive 6(3), 128–145.
  • Wu J and Lederer A (2009) A meta-analysis of the role of environment-based voluntariness in information technology acceptance. MIS Quarterly 33(2), 419–132.
  • Yuqing R et al (2012) Building members' attachment in online communities: applying theories of group identity and interpersonal bonds. MIS Quarterly 36(3), 841–864.
  • Zuboff S (1988) In the Age of the Smart Machine: The Future of Work and Power. Basic Books, New York.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.