iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1108/17410390710740727
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T18:07:07Z","timestamp":1706551627840},"reference-count":57,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2007,4,24]],"date-time":"2007-04-24T00:00:00Z","timestamp":1177372800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,4,24]]},"abstract":"Purpose<\/jats:title>The purpose of this paper is to unpack some of the socio\u2010technical relationships inherent in contemporary notions of personal identity management. For this purpose it considers the issue of personal identity management in terms of a framework, which distinguishes between the related processes of authentication, identification and enrolment.<\/jats:p><\/jats:sec>Design\/methodology\/approach<\/jats:title>The conceptual model described in this paper is reflected against an important recent case in which issues of personal identity management are being enacted: the introduction of a UK national identity card. Both this issue and case are particularly examined in the light of the growth of e\u2010Government in the UK.<\/jats:p><\/jats:sec>Findings<\/jats:title>The paper relates issues associated with the technical infrastructure of e\u2010Government with some of the costs and benefits associated with the social infrastructure of e\u2010Government. This device offers a useful framing for a whole range of issues surrounding individual\u2010organisation interaction in the Information Society that rely on elements of personal identity management.<\/jats:p><\/jats:sec>Research limitations\/implications<\/jats:title>In the paper the issue of personal identity management is under\u2010represented in the Information Systems and Information Management literature. The conceptual approach adopted in the paper is used to identify areas of further research in terms of issues relevant to the technical infrastructure of e\u2010Government.<\/jats:p><\/jats:sec>Practical implications<\/jats:title>The paper identifies a number of personal identity management issues embedded in the technical infrastructure required for effective e\u2010Government.<\/jats:p><\/jats:sec>Originality\/value<\/jats:title>This paper raises the importance of personal identity management to the success of the e\u2010Government agenda. It also links classic information management issues to the issue of personal identity management and identifies the challenges for e\u2010Government within this.<\/jats:p><\/jats:sec>","DOI":"10.1108\/17410390710740727","type":"journal-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T13:15:46Z","timestamp":1175778946000},"page":"244-270","source":"Crossref","is-referenced-by-count":20,"title":["Personal identity management and electronic government"],"prefix":"10.1108","volume":"20","author":[{"given":"Paul","family":"Beynon\u2010Davies","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022030820002446800_b1","unstructured":"Applegate, L.M., Austin, R.D. and McFarlan, F.W. (2003), Corporate Information Strategy and Management, McGraw\u2010Hill, Boston, MA."},{"key":"key2022030820002446800_b2","doi-asserted-by":"crossref","unstructured":"Austin, J.H. and David, C.Y. (2002), \u201cBiometric authentication: assuring access to information\u201d, Information Management & Computer Security, Vol. 10 No. 1, pp. 12\u201019.","DOI":"10.1108\/09685220210417463"},{"key":"key2022030820002446800_b3","doi-asserted-by":"crossref","unstructured":"Barnes, S.J. and Vidgen, R. (2004), \u201cInteractive e\u2010Government: evaluating the web site of the UK Inland Revenue\u201d, Journal of Electronic Commerce in Organisations, Vol. 2 No. 1, pp. 42\u201063.","DOI":"10.4018\/jeco.2004010104"},{"key":"key2022030820002446800_b4","unstructured":"BBC (2004), ID Card Scheme Unveiled by the Queen, BBC News Online."},{"key":"key2022030820002446800_b5","unstructured":"Beynon\u2010Davies, P. (2004a), \u201cA case study in electronic democracy: electronic voting in the UK\u201d, paper presented at UKAIS Conference, Glasgow."},{"key":"key2022030820002446800_b6","unstructured":"Beynon\u2010Davies, P. (2004b), \u201cConstructing electronic government: the case of the UK Inland Revenue\u201d, paper presented at European Conference on Information Systems, Turku."},{"key":"key2022030820002446800_b7","unstructured":"Beynon\u2010Davies, P. (2004c), e\u2010Business, Palgrave, Basingstoke."},{"key":"key2022030820002446800_b8","doi-asserted-by":"crossref","unstructured":"Beynon\u2010Davies, P. and Williams, M.D. (2003), \u201cEvaluating electronic local government in the UK\u201d, Journal of Information Technology, Vol. 18 No. 2, pp. 137\u201049.","DOI":"10.1080\/0268396032000101180"},{"key":"key2022030820002446800_b10","unstructured":"Burnham, D. (1983), The Rise of the Computer State, Random House, New York, NY."},{"key":"key2022030820002446800_b11","unstructured":"Cabinet Office (2000), e\u2010Government \u2013 A Strategic Framework for the Public Services in the Information Age, Cabinet Office, London."},{"key":"key2022030820002446800_b12","unstructured":"Cabinet Office (2002a), Identity Fraud: A Study, HMSO, London."},{"key":"key2022030820002446800_b13","unstructured":"Cabinet Office (2002b), Privacy and Data Sharing: The Way Forward for Public Services, Cabinet Office, London."},{"key":"key2022030820002446800_b14","unstructured":"Cabinet Office (2005), Transformational Government: Enabled by Technology, HM Government, London."},{"key":"key2022030820002446800_b15","doi-asserted-by":"crossref","unstructured":"Camp, L.J. (2004), \u201cDigital identity\u201d, IEEE Technology and Society Magazine, Vol. 23 No. 3, pp. 34\u201042.","DOI":"10.1109\/MTAS.2004.1337889"},{"key":"key2022030820002446800_b16","unstructured":"CapGemini (2003), Online Availability of Public Services: How Is Europe Progressing?, Cap Gemini Ernst & Young, Woking."},{"key":"key2022030820002446800_b17","unstructured":"Castells, M. (1996), The Rise of the Network Society, Blackwell, Boston, MA."},{"key":"key2022030820002446800_b18","unstructured":"Checkland, P. (1999), Soft Systems Methodology: A 30\u2010year Retrospective, John Wiley, Chichester."},{"key":"key2022030820002446800_b19","doi-asserted-by":"crossref","unstructured":"Clarke, R. (1987), \u201cJust another piece of plastic in your wallet: the \u2018Australian Card\u2019 scheme\u201d, Computers and Society, Vol. 18 No. 1, pp. 7\u201021.","DOI":"10.1145\/47649.47650"},{"key":"key2022030820002446800_b20","doi-asserted-by":"crossref","unstructured":"Clarke, R. (1988), \u201cInformation technology and dataveillance\u201d, Communications of ACM, Vol. 31 No. 5.","DOI":"10.1145\/42411.42413"},{"key":"key2022030820002446800_b21","doi-asserted-by":"crossref","unstructured":"Clarke, R. (1994), \u201cHuman identification in information systems: management challenges and public policy issues\u201d, Information Technology & People, Vol. 7 No. 4.","DOI":"10.1108\/09593849410076799"},{"key":"key2022030820002446800_b22","unstructured":"Computer Weekly (2004), Identity Card Bill High on Government's Agenda, Computer Weekly, Sutton."},{"key":"key2022030820002446800_b23","unstructured":"Goodwin, B. (2004), \u201cSort out citizen database mess, MPs tell Whitehall\u201d, Computer Weekly, Sutton."},{"key":"key2022030820002446800_b24","unstructured":"Guardian (2003), Explained: ID Cards, Guardian Unlimited, Manchester."},{"key":"key2022030820002446800_b25","doi-asserted-by":"crossref","unstructured":"Gunter, B. (2004), \u201cThe prospects for e\u2010Government on digital television\u201d, ASLIB Proceedings, Vol. 4 No. 56, pp. 222\u201033.","DOI":"10.1108\/00012530410549259"},{"key":"key2022030820002446800_b26","unstructured":"Home Office (2002), Entitlement Cards and Identity Fraud: A Consultation Paper, HMSO, London."},{"key":"key2022030820002446800_b27","unstructured":"Huber, N. (2004), \u201cID card costs soar as supplier slams technology\u201d, Computer Weekly, Sutton."},{"key":"key2022030820002446800_b28","doi-asserted-by":"crossref","unstructured":"Jain, A. (2000), \u201cBiometric identification\u201d, Communications of ACM, Vol. 43 No. 2, pp. 90\u20109.","DOI":"10.1145\/328236.328110"},{"key":"key2022030820002446800_b29","doi-asserted-by":"crossref","unstructured":"Kling, R. and Scaachi, W. (1982), \u201cThe web of computing: computer technology as social organisation\u201d, Advances in Computers, Vol. 21, pp. 1\u201090.","DOI":"10.1016\/S0065-2458(08)60567-7"},{"key":"key2022030820002446800_b30","doi-asserted-by":"crossref","unstructured":"Kuk, G. (2002), \u201cThe digital divide and the quality of electronic service delivery in local government in the United Kingdom\u201d, Government Information Quarterly, Vol. 20, pp. 353\u201063.","DOI":"10.1016\/j.giq.2003.08.004"},{"key":"key2022030820002446800_b31","unstructured":"LGA (2002), egov@local: Towards a National Strategy for Local E\u2010Government, Local Government Association, London."},{"key":"key2022030820002446800_b32","unstructured":"LSE (2005), The Identity Project: An Assessment of the UK Identity Cards Bill and its Implications, London School of Economics and Political Science, London."},{"key":"key2022030820002446800_b33","unstructured":"MapleLeafWeb (2003), National ID Cards: An International Perspective, Maple Leaf Web, Lethbridge."},{"key":"key2022030820002446800_b34","unstructured":"Margetts, H. (2003), \u201cElectronic government: method or madness?\u201d, working paper, March, School of Public Policy, UCL, London."},{"key":"key2022030820002446800_b35","unstructured":"Margetts, H. and Dunleavy, P. (2002), Cultural Barriers to e\u2010Government: Academic Article in Support of Better Public Services through e\u2010Government, National Audit Office, London."},{"key":"key2022030820002446800_b36","unstructured":"Millard, J. (2003), ePublic Services in Europe: Past, Present and Future, Danish Technology Institute, Copenhagen."},{"key":"key2022030820002446800_b37","doi-asserted-by":"crossref","unstructured":"Nunno, R.M. (2000), \u201cElectronic signatures: technology developments and legislative issues\u201d, Government Information Quarterly, Vol. 17 No. 4, pp. 395\u2010401.","DOI":"10.1016\/S0740-624X(00)00049-6"},{"key":"key2022030820002446800_b38","unstructured":"ODPM (2005), Government Connect, Cabinet Office, London."},{"key":"key2022030820002446800_b39","unstructured":"Ogden, C.K. and Richards, I.A. (1923), The Meaning of Meaning, Routledge & Kegan Paul, London."},{"key":"key2022030820002446800_b40","unstructured":"Ooe\u2010Envoy (2002), Channels Framework: Delivering Government Services in the New Economy, Office of the e\u2010Envoy, London."},{"key":"key2022030820002446800_b41","unstructured":"Ooe\u2010Envoy (2003), Policy Framework for a Mixed Economy in the Supply of e\u2010Government Services, Cabinet Office, London."},{"key":"key2022030820002446800_b42","unstructured":"Osborne, D. and Gaebler, T. (1992), Reinventing Government: How the Entrepreneurial Spirit Is Transforming the Public Sector, Addison\u2010Wesley, Reading: MA."},{"key":"key2022030820002446800_b43","unstructured":"Paolini, C. (1999), The Value Net: A Tool for Competitive Strategy, John Wiley, Chichester."},{"key":"key2022030820002446800_b44","unstructured":"Perri6 (1997), Holistic Government, Demos, London."},{"key":"key2022030820002446800_b45","unstructured":"Perri6 and Briscoe, I. (1996), On the Cards: Privacy, Identity and Trust in the Age of Smart Technologies, Demos, London."},{"key":"key2022030820002446800_b46","unstructured":"Porter, M.E. (1985), Competitive Advantage: Creating and Sustaining Superior Performance, Free Press, New York, NY."},{"key":"key2022030820002446800_b47","doi-asserted-by":"crossref","unstructured":"Prabhakar, S. (2003), \u201cBiometric recognition: security and privacy concerns\u201d, IEEE Security and Privacy, pp. 33\u201042.","DOI":"10.1109\/MSECP.2003.1193209"},{"key":"key2022030820002446800_b48","doi-asserted-by":"crossref","unstructured":"Seifert, J.W. (2004), \u201cData mining and the search for security: challenges for connecting the dots and databases\u201d, Government Information Quarterly, Vol. 21 No. 4, pp. 461\u201081.","DOI":"10.1016\/j.giq.2004.08.006"},{"key":"key2022030820002446800_b49","unstructured":"Stamper, R.K. (1973), Information in Business and Administrative Systems, Batsford, London."},{"key":"key2022030820002446800_b50","doi-asserted-by":"crossref","unstructured":"Taylor, J. and Burt, E. (2001), \u201cNot\u2010for\u2010profits in the democratic polity\u201d, Communications of ACM, Vol. 44 No. 1, pp. 58\u201062.","DOI":"10.1145\/357489.357507"},{"key":"key2022030820002446800_b51","doi-asserted-by":"crossref","unstructured":"Taylor, J.A. and Williams, H. (1991), \u201cPublic administration and the information polity\u201d, Public Administration, Vol. 69, pp. 171\u201090.","DOI":"10.1111\/j.1467-9299.1991.tb00789.x"},{"key":"key2022030820002446800_b52","unstructured":"Thompson, B. (2004), Who Do You Think You Are?, BBC News Online, London."},{"key":"key2022030820002446800_b53","doi-asserted-by":"crossref","unstructured":"Thompson, G.F. (2003), Between Hierarchies and Markets: The Logic and Limits of Network Forms of Organization, Oxford University Press, Oxford.","DOI":"10.1093\/acprof:oso\/9780198775270.001.0001"},{"key":"key2022030820002446800_b54","unstructured":"Turner, B.S. (1993), \u201cContemporary problems in the theory of citizenship\u201d, in Turner, B.S. (Ed.), Citizenship and Social Theory, Sage, London, pp. 1\u201018."},{"key":"key2022030820002446800_b55","doi-asserted-by":"crossref","unstructured":"Wilcocks, L. and Margetts, H. (1994), \u201cRisk assessment and information systems\u201d, European Journal of Information Systems, Vol. 3 No. 2, pp. 127\u201038.","DOI":"10.1057\/ejis.1994.13"},{"key":"key2022030820002446800_b56","doi-asserted-by":"crossref","unstructured":"Zorkadis, V. and Donos, P. (2004), \u201cOn biometric\u2010based authentication and identification from a privacy\u2010protection perspective: deriving privacy\u2010enhancing requirements\u201d, Information Management & Computer Security, Vol. 12 No. 1, pp. 125\u201037.","DOI":"10.1108\/09685220410518883"},{"key":"key2022030820002446800_b57","unstructured":"Zuboff, S. (1988), In the Age of the Smart Machine: The Future of Work and Power, Heinemann, London."},{"key":"key2022030820002446800_frg1","unstructured":"Bijker, W.E., Hughes, T.P. and Pinch, T.J. (1987), The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology, MIT Press, Cambridge, MA."}],"container-title":["Journal of Enterprise Information Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/17410390710740727","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/17410390710740727\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/17410390710740727\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T09:54:21Z","timestamp":1683798861000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/17410390710740727\/full\/html"}},"subtitle":["The case of the national identity card in the UK"],"short-title":[],"issued":{"date-parts":[[2007,4,24]]},"references-count":57,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,4,24]]}},"alternative-id":["10.1108\/17410390710740727"],"URL":"http:\/\/dx.doi.org\/10.1108\/17410390710740727","relation":{},"ISSN":["1741-0398"],"issn-type":[{"value":"1741-0398","type":"print"}],"subject":[],"published":{"date-parts":[[2007,4,24]]}}}