177
Views
0
CrossRef citations to date
0
Altmetric
Research Article

The curious case of tweeting an Aadhaar number: trust/mistrust in security practices of public data infrastructures

ORCID Icon
Received 21 Sep 2022, Accepted 14 Jun 2023, Published online: 25 Aug 2023

References

  • Acquisti, Alessandro, and Ralph Gross. 2009. “Predicting Social Security Numbers from Public Data.” Proceedings of the National Academy of Sciences 106 (27): 10975–10980. https://doi.org/10.1073/pnas.0904891106.
  • Ahmed, Yasmin. 2020. “Former UIDAI Chief RS Sharma Suffers Aadhaar Fraud, Rs 6000 PM Kisan Fund Deposited in His Account.” India Today, December 14, 2020.
  • Breckenridge, Keith, and Simon Szreter. eds. 2012. Registration and Recognition: Documenting the Person in World History (Proceedings of the British Academy). Oxford: Oxford University Press.
  • Broussard, Meredith. 2018. Artificial Unintelligence: How Computers Misunderstand the World. Cambridge, MA: MIT Press.
  • CAG. 2021. Report of the Comptroller and Auditor General of India on Functioning of Unique Identification Authority of India. New Delhi.
  • Carey, Matthew. 2017. Mistrust: An Ethnographic Theory. Chicago, IL: HAU Books.
  • Chatterjee, Partha. 2002. A Princely Impostor? The Strange and Universal History of the Kumar of Bhawal. Princeton, NJ: Princeton University Press.
  • Cheney-Lippold, John. 2017. We Are Data: Algorithms and the Making of Our Digital Selves. New York: New York University Press.
  • Cohen, Lawrence. 2019. “The ‘Social’ De-Duplicated: On the Aadhaar Platform and the Engineering of Service.” South Asia: Journal of South Asian Studies 42 (3): 482–500. https://doi.org/10.1080/00856401.2019.1593597.
  • Dewey, John. 1927. The Public and Its Problems. New York: H. Holt and Company.
  • FTC. 2008. Security in Numbers: SSNs and ID Theft. Washington, DC: Federal Trade Commission.
  • Gelb, Alan, Anit Mukherjee, and Kyle Navis. 2020. Citizens and States: How Can Digital ID and Payments Improve State Capacity and Effectiveness? Washington, DC: Center for Global Development.
  • Gopinath, Ravindran. 2012. “Identity Registration in India During and After the Raj.” In In Registration and Recognition: Documenting the Person in World History, edited by Keith Breckenridge, and Simon Szreter, 299–322. Oxford: Oxford University Press.
  • Gray, Jonathan, Carolin Gerlitz, and Liliana Bounegru. 2018. “Data Infrastructure Literacy.” Big Data & Society 5 (2): 1–13. https://doi.org/10.1177/2053951718786316.
  • Greene, Daniel. 2021. The Promise of Access: Technology, Inequality, and the Political Economy of Hope. Cambridge, MA: MIT Press.
  • Herd, Pamela, and Donald P Moynihan. 2019. Administrative Burden: Policymaking by Other Means. 1st ed. New York: Russell Sage Foundation.
  • Hickok, Elonnai. 2015. “Aadhaar Number vs the Social Security Number.” CIS India Website. 2015. https://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number.
  • High Level Panel on Humanitarian Cash Transfers. 2015. Doing Cash Differently: How Cash Transfers Can Transform Humanitarian Aid. London: ODI.
  • Jonnalagadda, Kiran. 2017. “Public, Private and Secret Information.” Kaarana. 2017. https://medium.com/karana/public-private-and-secret-information-f857f3931f6b.
  • Khera, Reetika. ed. 2018. Dissent on Aadhaar: Big Data Meets Big Brother. Delhi: Orient BlackSwan.
  • Kulkarni, Tanu. 2015. “Aadhaar May Soon Replace Roll Numbers.” The Hindu, August 21, 2015.
  • Latonero, Mark. 2018. Governing Artificial Intelligence: Upholding Human Rights & Dignity. New York: Data & Society Research Institute.
  • Lee, John D, and Katrina A See. 2004. “Trust in Automation: Designing for Appropriate Reliance.” Human Factors: The Journal of the Human Factors and Ergonomics Society 46 (1): 50–80. https://doi.org/10.1518/hfes.46.1.50.30392.
  • Luhmann, Niklas. 2017. "Trust and Power." Translated by Christian Morgner and Michael King. 1st ed. Malden, MA: Polity.
  • Lyon, David. 2009. Identifying Citizens: Id Cards as Surveillance. Cambridge: Polity.
  • Madianou, Mirca. 2019. “Technocolonialism: Digital Innovation and Data Practices in the Humanitarian Response to Refugee Crises.” Social Media + Society 5 (3). https://doi.org/10.1177/2056305119863146.
  • Marcus, George E. 1995. “Ethnography in/of the World System: The Emergence of Multi-Sited Ethnography.” Annual Review of Anthropology 24 (1): 95–117. https://doi.org/10.1146/annurev.an.24.100195.000523.
  • Marwick, Alice E, and boyd danah. 2014. “Networked Privacy: How Teenagers Negotiate Context in Social Media.” New Media & Society 16 (7): 1051–1067. https://doi.org/10.1177/1461444814543995.
  • Masiero, Silvia, and S. Shakthi. 2020. “Grappling with Aadhaar: Biometrics, Social Identity and the Indian State.” South Asia Multidisciplinary Academic Journal 23. https://doi.org/10.4000/samaj.6279.
  • Mayer, Roger C, James H Davis, and F. David Schoorman. 1995. “An Integrative Model Of Organizational Trust.” The Academy of Management Review 20 (3): 709–734. https://doi.org/10.2307/258792.
  • Mcknight, D Harrison, Michelle Carter, Jason Bennett Thatcher, and Paul F Clay. 2011. “Trust in a Specific Technology.” ACM Transactions on Management Information Systems 2 (2). https://doi.org/10.1145/1985347.1985353.
  • McKnight, D Harrison, Vivek Choudhury, and Charles Kacmar. 2002. “Developing and Validating Trust Measures for E-Commerce: An Integrative Typology.” Information Systems Research 13 (3): 334–359. https://doi.org/10.1287/isre.13.3.334.81.
  • Monahan, Torin, David J Phillips, and David Murakami Wood. 2010. “Surveillance and Empowerment.” Surveillance & Society 8 (2): 106–112. https://doi.org/10.24908/ss.v8i2.3480.
  • Möllering, Guido. 2001. “The Nature of Trust: From Georg Simmel to a Theory of Expectation, Interpretation and Suspension.” Sociology 35 (2): 403–420. https://doi.org/10.1177/S0038038501000190.
  • Nair, Vijayanka. 2021. “Becoming Data: Biometric IDs and the Individual in ‘Digital India’.” Journal of the Royal Anthropological Institute 27 (S1): 26–42. https://doi.org/10.1111/1467-9655.13478.
  • Nilekani, Nandan, and Viral Shah. 2015. Rebooting India: Realizing a Billion Aspirations. Gurgaon: Penguin Books India.
  • Pahwa, Nikhil. 2017. “#AadhaarLeaks: A List of Aadhaar Data Leaks.” Medianama. 2017. https://www.medianama.com/2017/04/223-aadhaar-leaks-database/.
  • Pinney, Christopher. 2015. “Civil Contract of Photography in India.” Comparative Studies of South Asia, Africa and the Middle East 35 (1): 21–34. https://doi.org/10.1215/1089201X-2876068.
  • PTI. 2017a. “UIDAI Reveals 210 Govt Websites Made Aadhaar Details Public, Did Not Specify When Breach Took Place.” FirstPost, November 19, 2017.
  • PTI. 2017b. “UIDAI Suspends E-KYC Licence of Airtel, Airtel Payments Bank Over Alleged Aadhaar Misuse.” The Wire, December 17, 2017.
  • Ruppert, Evelyn S, Engin Isin, and Didier Bigo. 2017. “Data Politics.” Big Data & Society 4 (2): 1–7. https://doi.org/10.1177/2053951717717749.
  • Sadiq, Kamal. 2009. Paper Citizens: How Illegal Immigrants Acquire Citizenship in Developing Countries. Oxford: Oxford University Press.
  • Saldanha, Alison. 2018. “164 Aadhaar-Related Frauds Reported Since 2011, Most in 2018: New Database.” IndiaSpend, May 22, 2018.
  • Scott, James C. 1998. Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed. New Haven: Yale University Press.
  • Sethi, Aman. 2017. “Fresh Concerns After Cops Bust Gang Cloning Fingerprints of Aadhaar Operators.” Hindustan Times, September 12, 2017.
  • Sethi, Aman. 2018. “AADHAAR Seeding Fiasco: How To Geo-Locate By Caste and Religion In Andhra Pradesh With One Click.” HuffPost. April 25, 2018. https://www.huffpost.com/archive/in/entry/aadhaar-seeding-fiasco-how-to-geo-locate-every-minority-family-in-ap-with-one-click_a_23419643.
  • SFLC. 2017. “Aadhaar Breaches and Leaks.” Software Freedom Law Center, India’s Website 2017. https://sflc.in/uidai-aadhaar-breaches-and-leaks.
  • Staff, Scroll. 2018. “UIDAI Warns Citizens Against Sharing Aadhaar Number in Public.” Scroll.In, 2018.
  • Staff, Scroll. 2022. “Centre Asks Not to Share Photocopies of Aadhaar, Then Withdraws Advisory.” Scroll.In, May 29, 2022.
  • Shahar, Avin, Belfield Haydn, Brundage Miles, Krueger Gretchen, Wang Jasmine, Weller Adrian, Anderljung Markus, et al. 2021. “Filling Gaps in Trustworthy Development of AI.” Science 374 (6573): 1327–1329. doi:10.1126/science.abi7176.
  • Shakthi, S. 2020. “Crafting “Integrity”: The Implications of Authentication Through Unique Identification Databases.” South Asia Multidisciplinary Academic Journal 23. https://doi.org/10.4000/samaj.6414.
  • Sharma, Ram Sewak. 2020. The Making of Aadhaar: World’s Largest Identity Platform. New Delhi: Rupa.
  • Silvast, Antti, and Mikko J. Virtanen. 2019. “An Assemblage of Framings and Tamings: Multi-Sited Analysis of Infrastructures as a Methodology.” Journal of Cultural Economy 12 (6): 461–477. https://doi.org/10.1080/17530350.2019.1646156.
  • Singh, Ranjit. 2019. “Give Me a Database and I Will Raise the Nation-State.” South Asia: Journal of South Asian Studies 42 (3): 501–518. https://doi.org/10.1080/00856401.2019.1602810.
  • Singh, Ranjit, and Steven J. Jackson. 2021. “Seeing Like an Infrastructure: Low-Resolution Citizens in the Aadhaar Identification Project.” Proceedings of the ACM on Human-Computer Interaction 5 (315):128. https://doi.org/10.1145/3476056.
  • Sinha, Amber, and Srinivas Kodali. 2017. Information Security Practices of Aadhaar (or Lack Thereof): A Documentation of Public Availability of Aadhaar Numbers with Sensitive Personal Financial Information. Bengaluru.
  • Sinha, Amber, and Srinivas Kodali. 2018. Clarification on the Information Security Practices of Aadhaar Report.” CIS India Website. 2018. https://cis-india.org/internet-governance/blog/clarification-on-the-information-security-practices-of-aadhaar-report.
  • Sircar, Sushovan, and Vakasha Sachdev. 2020. “Revealed: How Publicly Available Aadhaar Was Used in PM KISAN Scam.” The Quint, December 11, 2020.
  • Solove, Daniel J., and Danielle Keats Citron. 2018. “Risk and Anxiety: A Theory of Data-Breach Harms.” Texas Law Review 96 (4): 737–786.
  • Somanchi, Anmol. 2018. “Aadhaar Fraud Is Not Only Real, But Is Worth More Closely Examining.” The Wire, May 3, 2018.
  • Somanchi, Anmol. 2020. “Database of Aadhaar Fakes & Fradulent Transaction (DAFFT).” Google Document. 2020. https://docs.google.com/spreadsheets/d/1RGBHeWSxebftjIJGku4Z8MsMvqSwt934eFVNS1Tpl6Y/edit#gid = 1555027670.
  • Sperfeldt, Christoph. 2022. “Legal Identity in the Sustainable Development Agenda: Actors, Perspectives and Trends in an Emerging Field of Research.” The International Journal of Human Rights, 217–238. https://doi.org/10.1080/13642987.2021.1913409.
  • Sriraman, Tarangini. 2018. In Pursuit of Proof: A History of Identification Documents in India. New Delhi: Oxford University Press.
  • Star, Susan Leigh, and Karen Ruhleder. 1996. “Steps Toward an Ecology of Infrastructure: Design and Access for Large Information Spaces.” Information Systems Research 7 (1): 111–134. https://doi.org/10.1287/isre.7.1.111.
  • Sztompka, Piotr. 2000. Trust: A Sociological Theory. New York: Cambridge University Press.
  • TEDxBangalore. 2016. Aadhar: A Number to Facilitate the Lives of the Next Billion | Dr. Pramod Varma. India: YouTube.
  • Thatcher, Jason Bennett, D. Harrison McKnight, E. W. Baker, R. E. Arsal, and N. H. Roberts. 2011. “The Role of Trust in Postadoption IT Exploration: An Empirical Examination of Knowledge Management Systems.” IEEE Transactions on Engineering Management 58 (1): 56–70. https://doi.org/10.1109/TEM.2009.2028320.
  • Thiebes, Scott, Sebastian Lins, and Ali Sunyaev. 2021. “Trustworthy Artificial Intelligence.” Electronic Markets 31 (2): 447–464. https://doi.org/10.1007/s12525-020-00441-4.
  • Turkkan, Candan. 2023. “Screening for Eligibility: Access and Resistance in Istanbul’s Food Banks.” Journal of Cultural Economy 16 (2): 151–167. https://doi.org/10.1080/17530350.2023.2176339.
  • UIDAI. 2010. UIDAI Strategy Overview: Creating a Unique Identity Number for Every Resident in India. New Delhi: Unique Identification Authority of India.
  • UIDAI. 2011. Aadhaar Authentication Framework (Version 1.0). New Delhi: Unique Identification Authority of India.
  • UIDAI. 2014. Aadhaar Technology and Architecture: Principles, Design, Best Practices, & Key Lessons. New Delhi: Unique Identification Authority of India.
  • UIDAI. 2016. Unique Identification Authority of India (Transaction of Business at Meetings of the Authority) Regulations. The Gazette of India.
  • UIDAI. 2017. Aadhaar Data Is Never Breached or Leaked: UIDAI. UIDAI Press Releases. November 20, 2017.
  • UIDAI. 2019. Compendium of Regulations, Circulars, & Guidelines for AUA, KUA, ASA, and Biometric Device Provider. New Delhi: Unique Identification Authority of India.
  • UIDAI. 2023. The Aadhaar (Sharing of Information) (First Amendment) Regulations, 2023. https://uidai.gov.in/images/Revised_Draft_Sharing_of_Information_Regulations_20042023_CEO_Sir_approved.pdf.
  • UIDAI. n.d. “Aadhaar Dashboard.” Unique Identification Authority of India. Accessed May 17, 2022. https://uidai.gov.in/aadhaar_dashboard/.
  • USAID. 2020. Identity in a Digital Age: Infrastructure for Inclusive Development. Washington, DC: Center for Digital Development, USAID.
  • Venkatanarayanan, Anand, and Srikanth Lakshmanan. 2017. “Aadhaar Mess: How Airtel Pulled Off Its Rs 190 Crore Magic Trick.” The Wire, December 21, 2017.
  • Warner, Michael. 2005. Publics and Counterpublics. New York: Zone Books.
  • Watson, Rod. 2009. “Constitutive Practices and Garfinkel’s Notion of Trust: Revisited.” Journal of Classical Sociology 9 (4): 475–499. https://doi.org/10.1177/1468795X09344453.
  • Weitzberg, Keren, Margie Cheesman, Aaron Martin, and Emrys Schoemaker. 2021. “Analysis and Best Parameters Selection for Person Recognition Based on Gait Model Using CNN Algorithm and Image Augmentation.” Journal of Big Data 8 (1): 1–7. https://doi.org/10.1186/s40537-020-00387-6.
  • World Bank Group. 2016. Identification for Development: Strategic Framework. Washington, DC: World Bank.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.