Many information systems involve data about people. In order reliably to associate data with particular individuals, it is necessary that an effective and efficient identification scheme be established and maintained. There is remarkably little in the information technology literature concerning human identification. Seeks to overcome that deficiency by undertaking a survey of human identity and human identification. Discusses techniques including names, codes,knowledge‐based and token‐based identification, and biometrics. Identifies the key challenge to management as being to devise a scheme which is practicable and economic, and of sufficiently high integrity to address the risks the organization confronts in its dealings with people. Proposes that much greater use be made of schemes which are designed to afford people anonymity, or which enable them to use multiple identities or pseudonyms, while at the same time protecting the organization′s own interest. Describes multi‐purpose and inhabitant registration schemes, and notes the recurrence of proposals to implement and extend them. Identifies public policy issues. Of especial concern is the threat to personal privacy that the general‐purpose use of an inhabitant registrant scheme represents. Speculates that, where such schemes are pursued energetically, the reaction may be strong enough to threaten the social fabric.
Article navigation
1 December 1994
Conceptual Paper|
December 01 1994
Human Identification in Information Systems: Management Challenges and Public Policy Issues Available to Purchase
Roger Clarke
Roger Clarke
Australian National University, Canberra, Australia
Search for other works by this author on:
Publisher: Emerald Publishing
Online ISSN: 1758-5813
Print ISSN: 0959-3845
© MCB UP Limited
1994
Information Technology & People (1994) 7 (4): 6–37.
Citation
Clarke R (1994), "Human Identification in Information Systems: Management Challenges and Public Policy Issues". Information Technology & People, Vol. 7 No. 4 pp. 6–37, doi: https://doi.org/10.1108/09593849410076799
Download citation file:
Suggested Reading
Evaluating a Computerized Maintenance Management System
International Journal of Operations & Production Management (March,1993)
Outstanding Paper Award
Information Management & Computer Security (November,2008)
The Donn B. Parker Award
Information Management & Computer Security (November,2009)
The application of signature recognition to transparent handwriting verification for mobile devices
Information Management & Computer Security (June,2007)
Australian public affairs: links to European corporate communication
Corporate Communications: An International Journal (September,2000)
Related Chapters
Introduction and Overview
Organizational Neuroscience
Diversity Management and the Organizational Perspective
Celebrating the James Partridge Award: Essays Toward the Development of a More Diverse, Inclusive, and Equitable Field of Library and Information Science
‘Always Being On’: Exploring the Experience of Burnout Among Female Professionals in the Australian Public Relations Industry
Women’s Work in Public Relations
Recommended for you
These recommendations are informed by your reading behaviors and indicated interests.
