{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:11:50Z","timestamp":1743016310372,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642333316"},{"type":"electronic","value":"9783642333323"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33332-3_5","type":"book-chapter","created":{"date-parts":[[2012,9,21]],"date-time":"2012-09-21T06:43:55Z","timestamp":1348209835000},"page":"44-55","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["National Identity Infrastructures: Lessons from the United Kingdom"],"prefix":"10.1007","author":[{"given":"Aaron K.","family":"Martin","sequence":"first","affiliation":[]}],"member":"297","reference":[{"unstructured":"Chau, A., Stephens, G., Jamieson, R.: Biometrics Acceptance \u2013 Perceptions of Use of Biometrics. In: Proceedings of the 15th Australasian Conference on Information Systems, Hobart, Tasmania, Australia, pp. 1\u20136 (2004)","key":"5_CR1"},{"issue":"3","key":"5_CR2","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/S0167-4048(02)00304-8","volume":"21","author":"N.L. Clarke","year":"2002","unstructured":"Clarke, N.L., Furnell, S.M., Rodwell, P.M., Reynolds, P.L.: Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices. Computers & Security\u00a021(3), 220\u2013228 (2002)","journal-title":"Computers & Security"},{"unstructured":"Cragg Ross Dawson: Identity cards \u2013 People with special issues: Response to the proposed customer experience report (2004)","key":"5_CR3"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"681","DOI":"10.2307\/25148816","volume":"31","author":"C.J. Davis","year":"2007","unstructured":"Davis, C.J., Hufnagel, E.M.: Through the Eyes of Experts: A Socio-Cognitive Perspective on the Automation of Fingerprint Work. Management Information Systems Quarterly\u00a031, 681\u2013704 (2007)","journal-title":"Management Information Systems Quarterly"},{"issue":"3","key":"5_CR5","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/0167-4048(95)00005-S","volume":"14","author":"F. Deane","year":"1995","unstructured":"Deane, F., Barrelle, K., Henderson, R., Mahar, D.: Perceived acceptability of biometric security systems. Computers and Security\u00a014(3), 225\u2013231 (1995)","journal-title":"Computers and Security"},{"key":"5_CR6","volume-title":"Critical Discourse Analysis: The Critical Study of Language","author":"N. Fairclough","year":"2010","unstructured":"Fairclough, N.: Critical Discourse Analysis: The Critical Study of Language. Longman, New York (2010)"},{"unstructured":"Firth, D.: The Organizing Vision for Customer Relationship Management. In: Proceedings of the 7th Americas Conference on Information Systems, Boston, Massachusetts, USA (2001)","key":"5_CR7"},{"issue":"6","key":"5_CR8","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1016\/S0167-4048(00)06027-2","volume":"19","author":"S.M. Furnell","year":"2000","unstructured":"Furnell, S.M., Dowland, P.S., Illingworth, H.M., Reynolds, P.L.: Authentication and Supervision: A Survey of User Attitudes. Computers & Security\u00a019(6), 529\u2013539 (2000)","journal-title":"Computers & Security"},{"issue":"1","key":"5_CR9","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1361-3723(07)70006-4","volume":"2007","author":"S. Furnell","year":"2007","unstructured":"Furnell, S., Evangelatos, K.: Public awareness and perceptions of biometrics. Computer Fraud & Security\u00a02007(1), 8\u201313 (2007)","journal-title":"Computer Fraud & Security"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1145\/1280680.1280704","volume-title":"Proceedings of the 3rd Symposium on Usable Privacy and Security","author":"R.R. Heckle","year":"2007","unstructured":"Heckle, R.R., Patrick, A.S., Ozok, A.: Perception and acceptance of fingerprint biometric technology. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 153\u2013154. ACM, Pittsburgh (2007)"},{"unstructured":"Ho, G., Stephens, G., Jamieson, R.: Biometric Authentication Adoption Issues. In: Proceedings of the 14th Australasian Conference on Information Systems, Perth, Western Australia (2003)","key":"5_CR11"},{"unstructured":"Home Office: Entitlement Cards and Identity Fraud: A Consultation Paper. Stationery Office, London (2002)","key":"5_CR12"},{"unstructured":"Home Office: Identity Cards Briefing (2005)","key":"5_CR13"},{"unstructured":"Identity & Passport Service: Strategic Action Plan for the National Identity Scheme: Safeguarding Your Identity. Home Office, London (2006)","key":"5_CR14"},{"unstructured":"Identity & Passport Service: National Identity Scheme Strategic Supplier Framework Prospectus. Home Office, London (2007)","key":"5_CR15"},{"issue":"3","key":"5_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/joeuc.2006070101","volume":"18","author":"T. James","year":"2006","unstructured":"James, T., Pirim, T., Boswell, K., Reithel, B., Barkhi, R.: Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model. Journal of Organizational and End User Computing\u00a018(3), 1\u201324 (2006)","journal-title":"Journal of Organizational and End User Computing"},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/1314333.1314352","volume-title":"Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society","author":"L.A. Jones","year":"2007","unstructured":"Jones, L.A., Ant\u00f3n, A.I., Earp, J.B.: Towards Understanding User Perceptions of Authentication Technologies. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, pp. 91\u201398. ACM, Alexandria (2007)"},{"unstructured":"Lettice, J.: ID card astroturf - No2ID beats the truth out of IPS. The Register (2010)","key":"5_CR18"},{"issue":"4","key":"5_CR19","doi-asserted-by":"publisher","first-page":"590","DOI":"10.2307\/2392365","volume":"24","author":"M.B. Miles","year":"1979","unstructured":"Miles, M.B.: Qualitative Data as an Attractive Nuisance: The Problem of Analysis. Administrative Science Quarterly\u00a024(4), 590\u2013601 (1979)","journal-title":"Administrative Science Quarterly"},{"doi-asserted-by":"crossref","unstructured":"Moody, J.: Public Perceptions of Biometric Devices: The Effect of Misinformation on Acceptance and Use. In: Issues in Informing Science and Information Technology, Rockhampton, Australia, pp. 753\u2013761 (2004)","key":"5_CR20","DOI":"10.28945\/775"},{"issue":"12","key":"5_CR21","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.1109\/JPROC.2003.819611","volume":"91","author":"L. O\u2019Gorman","year":"2003","unstructured":"O\u2019Gorman, L.: Comparing Passwords, Tokens, and Biometrics for User Authentication. Proceedings of the IEEE\u00a091(12), 2021\u20132040 (2003)","journal-title":"Proceedings of the IEEE"},{"issue":"4","key":"5_CR22","doi-asserted-by":"publisher","first-page":"29","DOI":"10.2753\/MIS0742-1222230403","volume":"23","author":"B. Otjacques","year":"2007","unstructured":"Otjacques, B., Hitzelberger, P., Feltz, F.: Interoperability of E-Government Information Systems: Issues of Identification and Data Sharing. Journal of Management Information Systems\u00a023(4), 29\u201352 (2007)","journal-title":"Journal of Management Information Systems"},{"key":"5_CR23","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MTAS.2006.1700020","volume":"25","author":"C. Perakslis","year":"2006","unstructured":"Perakslis, C., Wolk, R.: Social Acceptance of RFID as a Biometric Security Method. IEEE Technology and Society Magazine\u00a025, 34\u201342 (2006)","journal-title":"IEEE Technology and Society Magazine"},{"unstructured":"Ponemon Institute: Global Study on the Public\u2019s Perceptions about Identity Management. Unisys Corporation, USA (2006)","key":"5_CR24"},{"key":"5_CR25","doi-asserted-by":"publisher","DOI":"10.4135\/9780857020222","volume-title":"Using Documents in Social Research","author":"L. Prior","year":"2003","unstructured":"Prior, L.: Using Documents in Social Research. Sage, London (2003)"},{"key":"5_CR26","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-0-387-35634-1_2","volume-title":"Global and Organisational Discourse about Information Technology","author":"E.B. Swanson","year":"2003","unstructured":"Swanson, E.B.: Talking the IS Innovation Walk. In: Wynn, E.H., Whitley, E.A., Myers, M.D., DeGross, J.I. (eds.) Global and Organisational Discourse about Information Technology, pp. 15\u201332. Kluwer, Boston (2003)"},{"issue":"5","key":"5_CR27","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1287\/orsc.8.5.458","volume":"8","author":"E.B. Swanson","year":"1997","unstructured":"Swanson, E.B., Ramiller, N.: The Organizing Vision in Information Systems Innovation. Organization Science\u00a08(5), 458\u2013474 (1997)","journal-title":"Organization Science"},{"issue":"4","key":"5_CR28","doi-asserted-by":"publisher","first-page":"553","DOI":"10.2307\/25148655","volume":"28","author":"E.B. Swanson","year":"2004","unstructured":"Swanson, E.B., Ramiller, N.C.: Innovating Mindfully with Information Technology. MIS Quarterly\u00a028(4), 553\u2013583 (2004)","journal-title":"MIS Quarterly"},{"issue":"1","key":"5_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17705\/1jais.00182","volume":"10","author":"P. Wang","year":"2009","unstructured":"Wang, P.: Popular Concepts beyond Organizations: Exploring New Dimensions of Information Technology Innovations. Journal of the Association for Information Systems\u00a010(1), 1\u201330 (2009)","journal-title":"Journal of the Association for Information Systems"},{"key":"5_CR30","volume-title":"Sensemaking in Organizations","author":"K.E. Weick","year":"1995","unstructured":"Weick, K.E.: Sensemaking in Organizations. Sage, Thousand Oaks (1995)"},{"unstructured":"Whitley, E.A.: Perceptions of Government Technology, Surveillance and Privacy: the UK Identity Cards Scheme. In: Neyland, D., Goold, B. (eds.) New Directions in Privacy and Surveillance, Willan, Cullompton, UK, pp. 133\u2013156 (2009)","key":"5_CR31"},{"issue":"2","key":"5_CR32","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1111\/j.1758-5899.2010.00028.x","volume":"1","author":"E.A. Whitley","year":"2010","unstructured":"Whitley, E.A., Hosein, G.: Global Identity Policies and Technology: Do We Understand the Question? Global Policy\u00a01(2), 209\u2013215 (2010)","journal-title":"Global Policy"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Critical Infrastructures and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33332-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T05:13:08Z","timestamp":1620709988000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33332-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642333316","9783642333323"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33332-3_5","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}