SlideShare a Scribd company logo
Global Challenges for Identity Policies. In the Technology, Work and Globalization Series.
Authors: Edgar A. Whitley & Gus Hosein. 2010 Basingstoke: Palgrave Macmillan.
ISBN 978-0-230-54223-5 (Hbk). 304 pages. 30 €

In spite of the title, this book mainly focuses on the attempt to introduce biometric
identity cards in the UK. The authors cover a time span from the introduction of the
Identity Cards Bill in 2004 to the first applications for biometric residence permits
for certain non-European foreign nationals in 2008. Due to the very detailed study of
the UK case, the reader will not only learn about the challenges of implementing a
new information system within the field of ICT and identity, but also gains insight
into British political processes.


Besides the strong focus on the UK, the authors pursue to map challenges of identity
policies more globally. Chapter two provides reviews of national identity policies,
mainly in European countries, but also in commonwealth countries, the Middle East,
Asia and the US. In the concluding chapter the authors give recommendations for
effective identity policies for the British case specifically, but also more generally.
Hence there are attempts to establish more global themes in identity policies also
outside the UK.


In spite of the somewhat ambiguous focus, this book is highly recommended for
anyone interested in identity policies, regardless if reading it as a detailed study of
the British case, or as a review of global challenges. The in-depth descriptions of the
debates and proceedings in the UK are also of interest for any scholar researching
policy-making and for political scientists specialized in British politics.


On an even more general level, this book touches upon one of the most pressing
challenges in contemporary society, namely that of the complex intersection between
discourses around the possibilities of information technology, security issues in a
post 9/11 world, personal integrity and the role of policy-making. However, readers
looking for theoretical tools to understand and approach this challenge will have to
go elsewhere. The UK identity policy-making procedure presented here, with all its
twists and turns, is rather suitable as a case to evaluate theory against.


This book highlights the difficulties and complexities in enforcing ICT policies in
general and identity politics in particular. A dominant theme is the difficult relation
between policy-making in sectoral national democratic institutions on one side, and
borderless information technology with multipurpose uses on the other. The UK case
underlines that the approach to technology among politicians is still dominated by an
instrumental attitude, technology as a tool for achieving well-defined and limited
purposes. This is unfortunate since uses will be difficult to mold according to
politicians preferences. At the same time, the authors stress that the many purposes
of identity policies, from combating terrorism to consumer identity verification,
could hardly be obtained in one single policy. The complexities and ambiguities
attached both to the issue of identity as well as to ICT’s, make it a particularly tricky
area in policy-making. This book is a good example to illustrate this point.



Jakob Svensson, Ph. D.
Is currently holding a position as Assistant Professor in Media and Communication Studies at
Karlstad University, Sweden. He is also directing the research network HumanIT, Human
Values of Information Technlogy, also based at Karlstad University.

More Related Content

Similar to Global challenges for identity policies

Rizkan
RizkanRizkan
Rizkan
Arya Ningrat
 
How will Brexit affect the digital landscape of the United Kingdom
How will Brexit affect the digital landscape of the United KingdomHow will Brexit affect the digital landscape of the United Kingdom
How will Brexit affect the digital landscape of the United Kingdom
Jeremiah Wakamu
 
Making eu innovation policies fit for the web def
Making eu innovation policies fit for the web defMaking eu innovation policies fit for the web def
Making eu innovation policies fit for the web def
osimod
 
CCABBusinessinEuropefullreport
CCABBusinessinEuropefullreportCCABBusinessinEuropefullreport
CCABBusinessinEuropefullreport
Laila Fernandez
 
Chapter 12 – From our weekly chapter reading, we learned that Crow.docx
Chapter 12 – From our weekly chapter reading, we learned that Crow.docxChapter 12 – From our weekly chapter reading, we learned that Crow.docx
Chapter 12 – From our weekly chapter reading, we learned that Crow.docx
bartholomeocoombs
 
Economics of information
Economics of informationEconomics of information
Economics of information
SudeshnaDatta6
 
Should Cigarette Smoking Be Banned Essay
Should Cigarette Smoking Be Banned EssayShould Cigarette Smoking Be Banned Essay
Should Cigarette Smoking Be Banned Essay
Ashley Arrington
 
Including the Excluded Can ICTs empower poor communities? Towards an alternat...
Including the Excluded Can ICTs empower poor communities? Towards an alternat...Including the Excluded Can ICTs empower poor communities? Towards an alternat...
Including the Excluded Can ICTs empower poor communities? Towards an alternat...
Soren Gigler
 
Targeted research on best practices among vulnerable groups (WP3)
Targeted research on best practices among vulnerable groups (WP3)Targeted research on best practices among vulnerable groups (WP3)
Targeted research on best practices among vulnerable groups (WP3)
Jaakko Hyytiä
 
Adult Education as a Means to Active Participatory Citizenship: A Concept Note
Adult Education as a Means to Active Participatory Citizenship: A Concept NoteAdult Education as a Means to Active Participatory Citizenship: A Concept Note
Adult Education as a Means to Active Participatory Citizenship: A Concept Note
Jaakko Hyytiä
 
Future Research on Convergence and Social Media
Future Research on Convergence and Social Media Future Research on Convergence and Social Media
Future Research on Convergence and Social Media
Oles Kulchytskyy
 
Adult education policies and practices in EU Member States and Turkey – the r...
Adult education policies and practices in EU Member States and Turkey – the r...Adult education policies and practices in EU Member States and Turkey – the r...
Adult education policies and practices in EU Member States and Turkey – the r...
Jaakko Hyytiä
 
Heitor - What do we need to measure to foster “Knowledge as Our Common Future”?
Heitor - What do we need to measure to foster “Knowledge as Our Common Future”?Heitor - What do we need to measure to foster “Knowledge as Our Common Future”?
Heitor - What do we need to measure to foster “Knowledge as Our Common Future”?
innovationoecd
 
How can 'IT' improve national competitiveness
How can 'IT' improve national competitivenessHow can 'IT' improve national competitiveness
How can 'IT' improve national competitiveness
Mike Backhouse
 
Thomas Social Capital, Migrants And Ict Use, A Comparative Study
Thomas Social Capital, Migrants And Ict Use, A Comparative StudyThomas Social Capital, Migrants And Ict Use, A Comparative Study
Thomas Social Capital, Migrants And Ict Use, A Comparative Study
ftr_
 
Discussion 1 Please review the chapter once again. Chapter 1 is a.docx
Discussion 1 Please review the chapter once again. Chapter 1 is a.docxDiscussion 1 Please review the chapter once again. Chapter 1 is a.docx
Discussion 1 Please review the chapter once again. Chapter 1 is a.docx
cuddietheresa
 
A Global Digital Rulebook? EU and US
A Global Digital Rulebook? EU and USA Global Digital Rulebook? EU and US
A Global Digital Rulebook? EU and US
Mirela Marcut
 
Summarising, paraphrasing and quoting worksheet one hour
Summarising, paraphrasing and quoting worksheet    one hourSummarising, paraphrasing and quoting worksheet    one hour
Summarising, paraphrasing and quoting worksheet one hour
RhianWynWilliams
 
Educational technology and the war on public education
Educational technology and the war on public educationEducational technology and the war on public education
Educational technology and the war on public education
Richard Hall
 
Consider some of the organizations you have been affiliated with..docx
Consider some of the organizations you have been affiliated with..docxConsider some of the organizations you have been affiliated with..docx
Consider some of the organizations you have been affiliated with..docx
bobbywlane695641
 

Similar to Global challenges for identity policies (20)

Rizkan
RizkanRizkan
Rizkan
 
How will Brexit affect the digital landscape of the United Kingdom
How will Brexit affect the digital landscape of the United KingdomHow will Brexit affect the digital landscape of the United Kingdom
How will Brexit affect the digital landscape of the United Kingdom
 
Making eu innovation policies fit for the web def
Making eu innovation policies fit for the web defMaking eu innovation policies fit for the web def
Making eu innovation policies fit for the web def
 
CCABBusinessinEuropefullreport
CCABBusinessinEuropefullreportCCABBusinessinEuropefullreport
CCABBusinessinEuropefullreport
 
Chapter 12 – From our weekly chapter reading, we learned that Crow.docx
Chapter 12 – From our weekly chapter reading, we learned that Crow.docxChapter 12 – From our weekly chapter reading, we learned that Crow.docx
Chapter 12 – From our weekly chapter reading, we learned that Crow.docx
 
Economics of information
Economics of informationEconomics of information
Economics of information
 
Should Cigarette Smoking Be Banned Essay
Should Cigarette Smoking Be Banned EssayShould Cigarette Smoking Be Banned Essay
Should Cigarette Smoking Be Banned Essay
 
Including the Excluded Can ICTs empower poor communities? Towards an alternat...
Including the Excluded Can ICTs empower poor communities? Towards an alternat...Including the Excluded Can ICTs empower poor communities? Towards an alternat...
Including the Excluded Can ICTs empower poor communities? Towards an alternat...
 
Targeted research on best practices among vulnerable groups (WP3)
Targeted research on best practices among vulnerable groups (WP3)Targeted research on best practices among vulnerable groups (WP3)
Targeted research on best practices among vulnerable groups (WP3)
 
Adult Education as a Means to Active Participatory Citizenship: A Concept Note
Adult Education as a Means to Active Participatory Citizenship: A Concept NoteAdult Education as a Means to Active Participatory Citizenship: A Concept Note
Adult Education as a Means to Active Participatory Citizenship: A Concept Note
 
Future Research on Convergence and Social Media
Future Research on Convergence and Social Media Future Research on Convergence and Social Media
Future Research on Convergence and Social Media
 
Adult education policies and practices in EU Member States and Turkey – the r...
Adult education policies and practices in EU Member States and Turkey – the r...Adult education policies and practices in EU Member States and Turkey – the r...
Adult education policies and practices in EU Member States and Turkey – the r...
 
Heitor - What do we need to measure to foster “Knowledge as Our Common Future”?
Heitor - What do we need to measure to foster “Knowledge as Our Common Future”?Heitor - What do we need to measure to foster “Knowledge as Our Common Future”?
Heitor - What do we need to measure to foster “Knowledge as Our Common Future”?
 
How can 'IT' improve national competitiveness
How can 'IT' improve national competitivenessHow can 'IT' improve national competitiveness
How can 'IT' improve national competitiveness
 
Thomas Social Capital, Migrants And Ict Use, A Comparative Study
Thomas Social Capital, Migrants And Ict Use, A Comparative StudyThomas Social Capital, Migrants And Ict Use, A Comparative Study
Thomas Social Capital, Migrants And Ict Use, A Comparative Study
 
Discussion 1 Please review the chapter once again. Chapter 1 is a.docx
Discussion 1 Please review the chapter once again. Chapter 1 is a.docxDiscussion 1 Please review the chapter once again. Chapter 1 is a.docx
Discussion 1 Please review the chapter once again. Chapter 1 is a.docx
 
A Global Digital Rulebook? EU and US
A Global Digital Rulebook? EU and USA Global Digital Rulebook? EU and US
A Global Digital Rulebook? EU and US
 
Summarising, paraphrasing and quoting worksheet one hour
Summarising, paraphrasing and quoting worksheet    one hourSummarising, paraphrasing and quoting worksheet    one hour
Summarising, paraphrasing and quoting worksheet one hour
 
Educational technology and the war on public education
Educational technology and the war on public educationEducational technology and the war on public education
Educational technology and the war on public education
 
Consider some of the organizations you have been affiliated with..docx
Consider some of the organizations you have been affiliated with..docxConsider some of the organizations you have been affiliated with..docx
Consider some of the organizations you have been affiliated with..docx
 

More from Jakob Svensson

Program meeting 22/1 2014
Program meeting 22/1 2014Program meeting 22/1 2014
Program meeting 22/1 2014
Jakob Svensson
 
What Kind of Cultural Citizenship? Dissent and Antagonism when Discussing Pol...
What Kind of Cultural Citizenship? Dissent and Antagonism when Discussing Pol...What Kind of Cultural Citizenship? Dissent and Antagonism when Discussing Pol...
What Kind of Cultural Citizenship? Dissent and Antagonism when Discussing Pol...
Jakob Svensson
 
Presentation compare
Presentation comparePresentation compare
Presentation compare
Jakob Svensson
 
Social Media and the Disciplining of Visibility
Social Media and the Disciplining of VisibilitySocial Media and the Disciplining of Visibility
Social Media and the Disciplining of Visibility
Jakob Svensson
 
M4D - Mobile Communication for Development - by Jakob Svensson & Caroline Wamala
M4D - Mobile Communication for Development - by Jakob Svensson & Caroline WamalaM4D - Mobile Communication for Development - by Jakob Svensson & Caroline Wamala
M4D - Mobile Communication for Development - by Jakob Svensson & Caroline Wamala
Jakob Svensson
 
Sannord jakob caroline
Sannord jakob carolineSannord jakob caroline
Sannord jakob caroline
Jakob Svensson
 
Higher Seminar at KAU 5 /sep
Higher Seminar at KAU 5 /sepHigher Seminar at KAU 5 /sep
Higher Seminar at KAU 5 /sep
Jakob Svensson
 
New Media New Logics
New Media New LogicsNew Media New Logics
New Media New Logics
Jakob Svensson
 
Theorizing Citizenship in Late Modern ICT Societies
Theorizing Citizenship in Late Modern ICT SocietiesTheorizing Citizenship in Late Modern ICT Societies
Theorizing Citizenship in Late Modern ICT Societies
Jakob Svensson
 
Power and Participation in Digital Late Modernity: Towards a Network Logic
Power and Participation in Digital Late Modernity: Towards a Network LogicPower and Participation in Digital Late Modernity: Towards a Network Logic
Power and Participation in Digital Late Modernity: Towards a Network Logic
Jakob Svensson
 
Power and Participation in Digital Late Modernity - Towards a Network Logic
Power and Participation in Digital Late Modernity - Towards a Network LogicPower and Participation in Digital Late Modernity - Towards a Network Logic
Power and Participation in Digital Late Modernity - Towards a Network Logic
Jakob Svensson
 
Jakob epart11
Jakob epart11Jakob epart11
Jakob epart11
Jakob Svensson
 
ICT4 learning
ICT4 learningICT4 learning
ICT4 learning
Jakob Svensson
 
Becomming engagable
Becomming engagableBecomming engagable
Becomming engagable
Jakob Svensson
 
Becomming Engagable, Power and Participation among Activists in Southern Stoc...
Becomming Engagable, Power and Participation among Activists in Southern Stoc...Becomming Engagable, Power and Participation among Activists in Southern Stoc...
Becomming Engagable, Power and Participation among Activists in Southern Stoc...
Jakob Svensson
 
Paper for the nordmedia 2011 conference
Paper for the nordmedia 2011 conferencePaper for the nordmedia 2011 conference
Paper for the nordmedia 2011 conference
Jakob Svensson
 
Monitoring the Political Self
Monitoring the Political SelfMonitoring the Political Self
Monitoring the Political Self
Jakob Svensson
 
Edem11
Edem11Edem11
The expressive turn of citizenship in digital late modernity
The expressive turn of citizenship in digital late modernityThe expressive turn of citizenship in digital late modernity
The expressive turn of citizenship in digital late modernity
Jakob Svensson
 
M4d2010
M4d2010M4d2010

More from Jakob Svensson (20)

Program meeting 22/1 2014
Program meeting 22/1 2014Program meeting 22/1 2014
Program meeting 22/1 2014
 
What Kind of Cultural Citizenship? Dissent and Antagonism when Discussing Pol...
What Kind of Cultural Citizenship? Dissent and Antagonism when Discussing Pol...What Kind of Cultural Citizenship? Dissent and Antagonism when Discussing Pol...
What Kind of Cultural Citizenship? Dissent and Antagonism when Discussing Pol...
 
Presentation compare
Presentation comparePresentation compare
Presentation compare
 
Social Media and the Disciplining of Visibility
Social Media and the Disciplining of VisibilitySocial Media and the Disciplining of Visibility
Social Media and the Disciplining of Visibility
 
M4D - Mobile Communication for Development - by Jakob Svensson & Caroline Wamala
M4D - Mobile Communication for Development - by Jakob Svensson & Caroline WamalaM4D - Mobile Communication for Development - by Jakob Svensson & Caroline Wamala
M4D - Mobile Communication for Development - by Jakob Svensson & Caroline Wamala
 
Sannord jakob caroline
Sannord jakob carolineSannord jakob caroline
Sannord jakob caroline
 
Higher Seminar at KAU 5 /sep
Higher Seminar at KAU 5 /sepHigher Seminar at KAU 5 /sep
Higher Seminar at KAU 5 /sep
 
New Media New Logics
New Media New LogicsNew Media New Logics
New Media New Logics
 
Theorizing Citizenship in Late Modern ICT Societies
Theorizing Citizenship in Late Modern ICT SocietiesTheorizing Citizenship in Late Modern ICT Societies
Theorizing Citizenship in Late Modern ICT Societies
 
Power and Participation in Digital Late Modernity: Towards a Network Logic
Power and Participation in Digital Late Modernity: Towards a Network LogicPower and Participation in Digital Late Modernity: Towards a Network Logic
Power and Participation in Digital Late Modernity: Towards a Network Logic
 
Power and Participation in Digital Late Modernity - Towards a Network Logic
Power and Participation in Digital Late Modernity - Towards a Network LogicPower and Participation in Digital Late Modernity - Towards a Network Logic
Power and Participation in Digital Late Modernity - Towards a Network Logic
 
Jakob epart11
Jakob epart11Jakob epart11
Jakob epart11
 
ICT4 learning
ICT4 learningICT4 learning
ICT4 learning
 
Becomming engagable
Becomming engagableBecomming engagable
Becomming engagable
 
Becomming Engagable, Power and Participation among Activists in Southern Stoc...
Becomming Engagable, Power and Participation among Activists in Southern Stoc...Becomming Engagable, Power and Participation among Activists in Southern Stoc...
Becomming Engagable, Power and Participation among Activists in Southern Stoc...
 
Paper for the nordmedia 2011 conference
Paper for the nordmedia 2011 conferencePaper for the nordmedia 2011 conference
Paper for the nordmedia 2011 conference
 
Monitoring the Political Self
Monitoring the Political SelfMonitoring the Political Self
Monitoring the Political Self
 
Edem11
Edem11Edem11
Edem11
 
The expressive turn of citizenship in digital late modernity
The expressive turn of citizenship in digital late modernityThe expressive turn of citizenship in digital late modernity
The expressive turn of citizenship in digital late modernity
 
M4d2010
M4d2010M4d2010
M4d2010
 

Recently uploaded

JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 

Recently uploaded (20)

JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 

Global challenges for identity policies

  • 1. Global Challenges for Identity Policies. In the Technology, Work and Globalization Series. Authors: Edgar A. Whitley & Gus Hosein. 2010 Basingstoke: Palgrave Macmillan. ISBN 978-0-230-54223-5 (Hbk). 304 pages. 30 € In spite of the title, this book mainly focuses on the attempt to introduce biometric identity cards in the UK. The authors cover a time span from the introduction of the Identity Cards Bill in 2004 to the first applications for biometric residence permits for certain non-European foreign nationals in 2008. Due to the very detailed study of the UK case, the reader will not only learn about the challenges of implementing a new information system within the field of ICT and identity, but also gains insight into British political processes. Besides the strong focus on the UK, the authors pursue to map challenges of identity policies more globally. Chapter two provides reviews of national identity policies, mainly in European countries, but also in commonwealth countries, the Middle East, Asia and the US. In the concluding chapter the authors give recommendations for effective identity policies for the British case specifically, but also more generally. Hence there are attempts to establish more global themes in identity policies also outside the UK. In spite of the somewhat ambiguous focus, this book is highly recommended for anyone interested in identity policies, regardless if reading it as a detailed study of the British case, or as a review of global challenges. The in-depth descriptions of the debates and proceedings in the UK are also of interest for any scholar researching policy-making and for political scientists specialized in British politics. On an even more general level, this book touches upon one of the most pressing challenges in contemporary society, namely that of the complex intersection between discourses around the possibilities of information technology, security issues in a post 9/11 world, personal integrity and the role of policy-making. However, readers looking for theoretical tools to understand and approach this challenge will have to go elsewhere. The UK identity policy-making procedure presented here, with all its twists and turns, is rather suitable as a case to evaluate theory against. This book highlights the difficulties and complexities in enforcing ICT policies in general and identity politics in particular. A dominant theme is the difficult relation between policy-making in sectoral national democratic institutions on one side, and borderless information technology with multipurpose uses on the other. The UK case
  • 2. underlines that the approach to technology among politicians is still dominated by an instrumental attitude, technology as a tool for achieving well-defined and limited purposes. This is unfortunate since uses will be difficult to mold according to politicians preferences. At the same time, the authors stress that the many purposes of identity policies, from combating terrorism to consumer identity verification, could hardly be obtained in one single policy. The complexities and ambiguities attached both to the issue of identity as well as to ICT’s, make it a particularly tricky area in policy-making. This book is a good example to illustrate this point. Jakob Svensson, Ph. D. Is currently holding a position as Assistant Professor in Media and Communication Studies at Karlstad University, Sweden. He is also directing the research network HumanIT, Human Values of Information Technlogy, also based at Karlstad University.