{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T17:20:10Z","timestamp":1776705610986,"version":"3.51.2"},"reference-count":57,"publisher":"Association for Information Systems","issue":"1","funder":[{"DOI":"10.13039\/501100005602","name":"University of Ghana Business School","doi-asserted-by":"publisher","award":["UGBS\/2017-431"],"award-info":[{"award-number":["UGBS\/2017-431"]}],"id":[{"id":"10.13039\/501100005602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Technology for Development"],"published-print":{"date-parts":[[2021,1,2]]},"DOI":"10.1080\/02681102.2020.1818543","type":"journal-article","created":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T01:35:12Z","timestamp":1600479312000},"page":"91-110","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["From national to sector level biometric systems: the case of Ghana"],"prefix":"10.17705","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0155-0333","authenticated-orcid":false,"given":"John","family":"Effah","sequence":"first","affiliation":[{"name":"Department of Operations & Management Information Systems, University of Ghana Business School, Accra, Ghana"}]},{"given":"Emmanuel","family":"Owusu-Oware","sequence":"additional","affiliation":[{"name":"Department of Information Technology Studies, University of Professional Studies, Accra, Ghana"}]}],"member":"7521","published-online":{"date-parts":[[2020,9,18]]},"reference":[{"key":"CIT0001","unstructured":"Agyepong, S. & Twinomurinzi, H. (2016, June 12\u201315).\n                      Facilitating financial inclusion using ICT\u202f: Lessons from M-Pesa and E-Zwich\n                      . Twenty-Fourth European Conference on Information Systems (ECIS), Istanbul, Turkey."},{"issue":"2","key":"CIT0002","first-page":"62","volume":"1","author":"Al-Khouri A. M.","year":"2007","journal-title":"International Journal of Social Sciences"},{"issue":"12","key":"CIT0003","first-page":"257","volume":"34","author":"Boell S. K.","year":"2014","journal-title":"Communication of the Association for Information Systems"},{"issue":"2","key":"CIT0004","first-page":"77","volume":"3","author":"Braun V.","year":"2006","journal-title":"Psychiatric Quarterly"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1080\/2159676X.2019.1628806"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1080\/14780887.2019.1670765"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.3366\/afr.2010.0406"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1080\/00020184.2018.1540515"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1145\/1101779.1101784"},{"key":"CIT0010","volume-title":"Qualitative, quantitative, and mixed methods approaches. Research design","author":"Creswell J.","year":"2013"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.2307\/25148818"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1080\/00020184.2018.1519335"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1080\/03057070.2015.1049485"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2017.1414720"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1080\/10580530.2020.1732528"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008648532192"},{"key":"CIT0017","volume-title":"Identification for development: The biometrics Revolution","author":"Gelb A.","year":"2013"},{"key":"CIT0018","doi-asserted-by":"crossref","unstructured":"Gelb, A. & Diofasi, A. (2016).\n                      Biometric elections in poor countries: Wasteful or a worthwhile investment?\n                      (Working paper, Vol. 435).","DOI":"10.2139\/ssrn.2848544"},{"key":"CIT0019","volume-title":"Identification revolution: Can digital ID be harnessed for development","author":"Gelb A.","year":"2017"},{"key":"CIT0020","doi-asserted-by":"crossref","unstructured":"Islam, S. & Gr\u00f6nlund, \u00c5. (2010). The Bangladesh national biometric database: A transferable success? In K. N. Andersen, T. van, E. Francesconi, & A. Gronlund (Eds.),\n                      Proceedings of international conference on Electronic Government and the Information Systems Perspective\n                      , Bilbao, Spain (Vol. 6267 LNCS, pp. 189\u2013203).","DOI":"10.1007\/978-3-642-15172-9_19"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-018-9764-9"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1145\/328236.328110"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1145\/962081.962102"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2014.20"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.2307\/249410"},{"key":"CIT0026","volume-title":"Activity, consciousness, and personality","author":"Leont\u2019ev A. N.","year":"1978"},{"key":"CIT0027","unstructured":"Liberatore, A. (2005).\n                      Balancing security and democracy: The politics of biometric identification in the European Union\n                      (EUI Working Papers, RSCAS). Badia Fiesolana."},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2010.11.006"},{"key":"CIT0029","unstructured":"Martin, A. (2008, May 18\u201320).\n                      Biometrics and the United Kingdom national identity register: Exploring the privacy dilemmas of proportionality and secondary use of biometric information\n                      . 2008 International Conference on Information resources Management, Ontario, Canada."},{"key":"CIT0030","unstructured":"Martin, A. (2011).\n                      Envisioning technology through discourse: A case study of biometrics in the national identity scheme in the United Kingdom\n                      . London School of Economics and Political Science."},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33332-3_5"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1177\/0163443712464558"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1002\/isd2.12053"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2016\/40.2.12"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1080\/02681102.2010.498408"},{"key":"CIT0036","volume-title":"Qualitative data analysis: A methods sourcebook","author":"Miles M.","year":"2014","edition":"3"},{"key":"CIT0037","volume-title":"Qualitative research in business and management","author":"Myers M.","year":"2013"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/2137.003.0009"},{"key":"CIT0039","unstructured":"Owusu-Oware, E., Effah, J. & Boateng, R. (2017).\n                      Institutional enablers and constraints of national biometric identification implementation in developing countries\u202f: The case of Ghana\n                      . AMCIS (pp. 1\u201310)."},{"key":"CIT0040","volume-title":"Qualitative research and evaluation methods","author":"Patton M.","year":"2015","edition":"4"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1080\/13510347.2014.983906"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1504\/IJSS.2010.038669"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00508"},{"issue":"4","key":"CIT0044","first-page":"iii","volume":"37","author":"Sarker S.","year":"2013","journal-title":"MIS Quarterly"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.04.041"},{"key":"CIT0046","unstructured":"Vygotsky, L. S. (1978).\n                      Mind in society: The development of higher psychological processes\n                      ."},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.1995.9"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000589"},{"key":"CIT0049","first-page":"293","volume-title":"Information systems research","author":"Walsham G.","year":"2004"},{"key":"CIT0050","unstructured":"Whitley, E. (2018).\n                      Trusted digital identity provision: GOV.UK Verify\u2019s federated approach\n                      (No. CGD policy paper, 131). Washington, USA."},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2013.34"},{"key":"CIT0052","volume-title":"Global challenges for identity policies","author":"Whitley E.","year":"2010"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1111\/j.1758-5899.2010.00028.x"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1080\/01972240601059060"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.5120\/13285-0747"},{"key":"CIT0056","volume-title":"Case study research, design and methods","author":"Yin R.","year":"2003","edition":"3"},{"issue":"4","key":"CIT0057","first-page":"90","volume":"17","author":"Zviran M.","year":"2006","journal-title":"Communication of the Association for Information Systems"}],"container-title":["Information Technology for Development"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/02681102.2020.1818543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T16:28:11Z","timestamp":1776702491000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/02681102.2020.1818543"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,18]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1,2]]}},"alternative-id":["10.1080\/02681102.2020.1818543"],"URL":"https:\/\/doi.org\/10.1080\/02681102.2020.1818543","relation":{},"ISSN":["0268-1102","1554-0170"],"issn-type":[{"value":"0268-1102","type":"print"},{"value":"1554-0170","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,18]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=titd20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=titd20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-09-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}