Abstract
Purpose
– This paper aims to examine the central place of the list and the associated concept of an identifier within the “scaffolding” of contemporary government order.
Design/methodology/approach
– These terms are deliberately chosen to make strange and help unpack the constitutive capacity of information systems and information technology within and between contemporary government agencies. We draw upon the substantial body of work by John Searle to help understand the place of lists in the constitution of the order of governance.
Findings
– To enable us to ground our discussion of the potentiality and problematic associated with lists, we describe a significant and modern instance of list-making, situated around the issue of digital identity management.
Originality/value
– The theoretical framework discussed allows us to better explain breakdowns in the institutional order characteristic of this domain.
Subject
Information Systems and Management,Computer Science Applications,Public Administration
Reference24 articles.
1. Agerfalk, P.J.
and
O., Eriksson
(2011), “The stolen identifier: an inquiry into the nature of indentification and the ontological status of information systems”, International Conference on Information Systems, Shanghai.
2. Austin, J.L.
(1971),
How to Do Things with Words
, Oxford University Press, Oxford.
3. Beynon-Davies, P.
(2006), “Personal identity management in the information polity: the case of the UK national identity card”,
Information Polity
, Vol. 11 No. 1, pp. 3-20.
4. Beynon-Davies, P.
(2007), “Personal identity management and electronic government: the case of the national identity card in the UK”,
Journal of Enterprise Information Management
, Vol. 20 No. 3, pp. 244-270.
5. Beynon-Davies, P.
(2011),
Significance: Exploring the Nature of Information, Systems and Technology
, Palgrave, Houndmills, Basingstoke.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献