Digital Identity Constructions

advertisement
CLEMENT p. 11
Performing Identities
A proposal submitted to the Standard Research Grants Program
of the Social Sciences and Humanities Research Council (SSHRC)
for the period April 1, 2008 to March 31, 2011
Principal Investigator
Andrew Clement
Faculty of Information Studies
University of Toronto
Toronto, Ontario, Canada M5S 2M8
140 St. George Street
416-978-3111
andrew.clement@utoronto.ca
Collaborators
David J. Phillips
Faculty of Information Studies
University of Toronto
Colin J. Bennett
Department of Political Science
University of Victoria
Information Policy Research Program
http://www.fis.utoronto.ca/research/iprp/
October 2007
CLEMENT p. 12
1. Summary
The past decade has seen a dramatic rise in attention to matters of personal identification. This has been
driven mainly by the expansion of digital networking into many facets of everyday life and by the raised
security concerns linked to the ‘war on terror’. New technologies, systems and policies are being
actively developed by governments and businesses with the promise of improved forms of identification,
but this is happening largely without an adequate understanding of what this means for the millions of
identity subjects, nor an appreciation for the serious personal and human rights concerns implied.
Academic research in this area can offer little help unless it is informed by empirical studies of identity
and identification practices from the perspective of individuals. This research seeks to fill these
academic and practical gaps in our understanding of how people perform and experience their individual
identities in their everyday encounters with identification based services and technologies.
This research will contribute to a better understanding of 'identity' in the social sciences as well as in
such practical matters as the design of organizational information systems and policies. Further it will
contribute to the articulation of 'identity rights,' as human rights distinct from other informational rights
such as privacy. This will also provide the basis for the development of sound 'human-centred’
identification devices, systems, policies, legislation, agencies and practices.
The central questions that will drive this research are:
 What are people’s attitudes to identity documentation and to the agencies that require it?
 What are their concerns about how their identities are established?
 What do people actually do in response to requirements to acquire and present identification?
 How do they present themselves when filling out forms, having their photo-ID or biometric
samples taken, and obtaining, showing or replacing their ID documents/tokens?
 How do they experience these interactions?
 How do people use identity tokens in ways not intended by their designers?
 How do people resist or appropriate institutional identities?
 What technical and organizational alternatives would better meet legitimate identification needs?
The field research will be qualitative, ethnographically informed and conducted through three broad,
intersecting and complementary approaches:
 Processual: We will follow particular individuals as well as their identity information through
various stages of identity performance (acquiring, presenting, updating, replacing, repairing).
 Person-Centred: We will ask individuals, chosen from among various population groups, to
show us and talk about the various forms of identification documents they possess and how they
use them in their identity performances.
 Constructive: In keeping with Participatory Design precepts and informed by the fieldwork, we
will develop prototypes of identity documentation, policies and systems to be tested in realistic
use scenarios.
In addition, based on the prior field work, we will commission a national survey of attitudes to personal
identity documentation consisting of approximately 8 questions with a national stratified sample size
usual in public opinion polling of about 1000.
While this research is designed to stand on its own, it also will fit well with and contribute to the
proposed SSHRC MCRI project, The New Transparency: Surveillance and Social Sorting, headed by
David Lyon of Queen’s University, of which Clement, Bennett and Phillips are research team members.
CLEMENT p. 13
2. Detailed Description
Objectives
We take ‘performing identities’ to mean the various ways in which people prepare and present
themselves and their identity documents to service-providing organizations for the purpose of exercising
a right, accessing information, traveling, communicating with others or receiving a service. The
objectives of this research are to:
 Explore the ways in which people perform and experience their individual identities in their
everyday encounters with identification-based services, both conventional and digital,
 Reveal the tensions between such identity performances and the identification requirements
embedded within technical/bureaucratic identity management systems and practices,
 Examine the implications for both individuals and service-providing organizations arising from
systemic identification mis-matches and other forms of identity impairment,
 Demonstrate what human-centred identity documentation, systems and practices might look like
through in situ prototyping informed by empirical field work,
 Compare privacy protection (informational self-determination) and identity integrity approaches
with a view to developing identity integrity as a principled information right,
 Contribute to contemporary policy debates concerning government and business initiated
identification schemes and their implications for identity integrity and privacy protection
 Train researchers in the concepts, methods and approaches of ethnographic field work,
qualitative analysis, social constructivism and policy oriented, participatory design to make ongoing contributions to the key emerging socio-technical fields of identity policy and systems.
Context - The growing importance of identity performance
The past decade has seen a dramatic rise in attention to matters of personal identification. This has been
driven mainly by the expansion of digital networking into many facets of everyday life and by the raised
security concerns linked to the ‘war on terror’. New technologies, systems and policies are being
actively developed by governments and businesses with the promise of improved forms of identification.
Countries such as US, UK and Australia, that historically have had an aversion to national ID schemes,
are now actively pursuing them (LSE Identity Project, 2005; Bennett & Lyon, 2008), and there is strong
pressure on Canada to follow suit (Boa et al, 2007; Clement et al, 2008). The claimed purposes for these
schemes are varied and in some ways inconsistent, but often include combating terrorism, identity theft
and fraud as well as managing borders, promoting commerce and developing e-government services
(House of Commons, 2003). Biometric capabilities feature prominently in these schemes as a novel but
contested factor. The International Civil Aviation Organization (ICAO) has adopted facial images,
finger prints and iris scans as the standard biometrics for passports, with many countries including
Canada upgrading their passports to comply. More locally, numerous enterprises are adopting more
stringent identification requirements in both face to face and on-line service encounters.
Altogether these ID initiatives (which actively pursue interoperability) constitute a new and
consequential phase in the on-going development of society-wide identification infrastructures, relying
heavily on classification regimes that reflect and re-enforce pre-existing social categories (Bowker and
Star, 1999). Identification schemes thus contribute to social sorting (Gandy, 1993; Lyon, 2003; Adey,
2004) and as they are increasingly incorporated into everyday life, in effect make border-crossing
regimes ubiquitous (Lyon, 2005). From the perspective of individual identity subjects, these extensive
developments mean that the occasions on which they must establish and present their identities are
growing rapidly, as are the risks that come with ‘getting it wrong.’ Such ‘identity-impairments’ include
the relatively commonplace (forgetting to bring acceptable ID documents, equipment breakdowns) as
well as the more exceptional (being confused with another person of a similar name and birthdate,
CLEMENT p. 14
failure to properly capture a biometric sample, false matches when checked against a no-fly watch list
(Black, 2007), being treated as a ‘terror suspect’ based on risk profiling). The consequences of identity
impairment range from mildly annoying to life-shattering, as in the case of Maher Arar (Webb, 2007;
O’Connor, 2007). Evidently there are practical and human rights issues at stake here (Browne, 2005).
The conventional way in which identities are defined and stabilized in interactions with
organizations is through physical identity documents, usually cards. Increasingly, however, it is not
necessary that this interaction occur in direct face to face encounters. Identities are also defined via
indirect social relations, e.g., internet-mediated interaction with an institution. Moreover, there is
growing recognition in the social sciences in particular, that conventional notions of a stable identity are
inadequate for understanding contemporary societies (Hall, 2000; Bell, 2001). As new digital
technologies become commonplace, and mediate more of our everyday activities, they are contributing
to an unsettling of individual identities while offering new expressive possibilities.
Distinctive focus of the proposed research
The pervasiveness and intimacy of the institutional identity encounters, supported by ID artifacts and
technologies such as ID cards, photos, smartcards, application forms, biometric samples, databases and
interfaces, make them excellent sites to investigate the practices of identity performance. The
increasingly pervasive use of tracking and monitoring technologies makes it urgent to interrogate the
issues that surround the construction and performance of identities
This research will address these issues through as series of case studies that follow individuals
through the range of key activities that characterize social participation in contemporary life as they
enact everyday identifications. These roles, chosen because of their ‘ordinariness’ as well as their
seriousness to the identity-subject if they are unattainable or become impaired in some way, are shown
with their primary ID documents and ID issuing and requiring agencies in Table 1.
Identification
Immigrant
Worker
Student
Welfare recipient
Driver
Air traveler
International traveler
Credit worthy consumer
Health care recipient
Voter
Primary ID Document
Permanent resident card
Primary Agencies
Citizenship and Immigration Canada, refugee
board, immigrant advocacy orgs,…
SIN card
Human Resources Development Canada (HRSD)
Student card
Educational institution
Welfare card
City welfare office
Drivers License
Min of Transport, Service Ontario, police,
insurers, …
Gov photo ID
Air carriers, Canadian Air Transport Security
Authority (CATSA)
Passport, NEXUS
Passport Canada, Canada Border Services
Agency (CBSA)
Credit card
Banks, issuers, retailers
Health insurance card
Ministry of Health
Proof of residence
Various
Table 1
Relation to on-going research program
The studies proposed here extend and deepen the ethnographically informed program of research the
principal investigator (PI) has pursued for the past twenty-five years into privacy, identity and
information infrastructures. Beginning with his doctoral research in the early 1980s, in which he
analyzed the introduction of on-line transaction processing systems into a large corporate head office,
Clement became interested in the practices and technologies of workplace surveillance (Clement, 1984,
1988, 1992). More recently ‘identity’, rather than surveillance and privacy per se, has become a central
CLEMENT p. 15
concept for this work, since it appears better able to reflect the fundamental processes associated with
the computerization of everyday workplace, domestic and civic life. Clement also became directly
involved in public policy discussions around the development of national information infrastructures,
launching the Information Policy Research Program (IPRP) with a SSHRC strategic grant aimed mainly
at developing a national policy for “universal access” to Canada’s “information highway.” (Clement,
1998; Clement, Moll & Shade, 2001) In the late 1990s he began looking at another aspect of information
infrastructures – ‘smart’ (i.e. chip based) cards, such as used by Mondex Canada for electronic cash
transactions (Stalder & Clement, 1999) and the identification card initiated by the Ontario government
(Clement et al, 2001; Boa and Clement, forthcoming). A related paper examined critically the national
identification schemes proposed as a response to the 9/11 terrorist attacks (Clement et al, 2002).
This current proposal builds as well on several major research projects the PI has lead. The
Everyday Internet project studied the experiences of regular internet users in their homes and in public
access sites. It too adopted largely ethnographic approaches and highlighted broad policy implications.
Following this, the Digital Identity Constructions project focused specifically on the ways in which
individuals negotiated multiple forms of identity in intensively monitored workplaces (McPhail and
Clement, 2007). Most recently, CAN-ID Visions for Canada’s Identity Policies: Understanding Identity
Policy and Policy Alternatives, funded by the federal Office of the Privacy Commissioner, provided an
extensive analysis of national identity developments currently underway while offering alternative
approaches (Clement et al, forthcoming; Boa et al 2007)
Expected research contributions – empirical, conceptual and constructive
While ‘identity’ has been a prominent topic of research in the social sciences for the past decade
(Turkle, 1995; Bell 2001; du Gay, 2007), there has been remarkably little research into the forms of
identity and identification relevant to encounters between individuals and service providing
organizations, particularly from the point of view of these individuals. Two prominent research
programs in Canada have directly addressed identification issues – the On the Identity Trail project at
Ottawa U and The Surveillance Project at Queens, but most of the research to date has been from policy,
legal, socio-theoretic or philosophical perspectives, leaving a research gap in understanding how
individuals experience identity interactions. The main contributions of the proposed research are:
 Providing empirically-grounded illustrations of identity performance across a range of everyday
situations that reflect individuals acting in their roles as workers, consumers, citizens, etc. This will
enrich our understanding of the variety and contingencies of identity performances, as well as
provide the basis for developing conceptual models that highlight their commonalities.
 Refining the concept of ‘identity performance’ to enhance its utility both in theorizing and in
empirically analyzing a variety of identity transactions characteristic of contemporary, ‘security
conscious’ society - notably digitally mediated service encounters, ‘e-government’ services,
technologically intensive workplaces and domestic settings, and ‘high risk’ travel modes.
 Enlarging the identity technology, systems design and policy repertoire to include a wider range of
identification options, notably anonymity and pseudo-nymity, which are sensitive to the social,
organizational and human implications of identity performance in everyday life.
The wider social benefits of this research will come in contributing to public policy debates concerning
the development of identification schemes and in particular the privacy and identity policies adopted by
government and business organizations. We also aim to contribute to better public understandings of
what is a stake for individuals in identity construction and performance and what some of the viable
alternatives are.
Theoretical approaches – Science and Technology Studies (STS) – SCOT and ANT
This research adopts as its central theoretical perspectives those associated with science and technology
studies (STS), most notably social construction of technology (SCOT) and Actor-Network Theory
CLEMENT p. 16
(ANT) insofar as they enable a focus on the interplay and interrelationships between the social and the
technical. This approach recognizes that use practices are important in shaping technological systems,
even as the nature of individual systems makes them more or less responsive and adaptable to the needs
of their various stakeholders (Bjiker, Hughes & Pinch, 1987; Bjiker & Law, 1992; Mackenzie &
Wajcman, 1999; Oudshoorn and Pinch, 2003). In keeping with ANT perspectives, we view the
acquisition and enactment of identity as a performative ‘becoming’, in which individual identities
become simultaneously hybridized and stabilized through their interactions with a variety of identityrequiring and -providing organizations and technologies. This identity-becoming involves a series of
performative encounters in which individuals enroll their ID documents and a variety of other resources
as needed in a ‘front-stage’ presentation of self as a legitimate identity subject (Goffman, 1959). At the
same time we expect there to be significant ‘backstage’ performances by the individual, as well as by
relevant organizational agents as they access and update databases largely out of view. These
performances are historically, temporally and spatially situated, usually conducted on an institutionally
prescribed stage and typically producing traces recorded in secondary documents and agency databases
that play a part in subsequent encounters. Scripts, both official and informal, guide these encounters,
with improvisational aspects becoming prominent when interactional difficulties or exceptional
conditions arise. These breakdowns are especially important since it is at these times that hitherto
‘black-boxed’ sociotechnical assemblages (Law, 1987) are most likely to reveal their constitutive actors
and contingent translations.
A methodological implication of this approach is that we will follow specific individuals in specific
contexts through a series of encounters as they perform the identities enumerated above. This will
involve highlighting the local conditions and factors that contribute to the generation, use, recognition
(or non-recognition), and implications of identity performance in situ. At the same time, a synthetic
conceptual model of ‘identity performance in context’ will be prototyped and refined within the research
team over the three-year course of this research. Inspired by ANT, this model will centrally figure
‘performed identity,’ but in relation to the other various recurring actors (human and non-human) that
are relevant to its development and maintenance. The preliminary version of the model will serve as an
integrating framework for the individual case studies, and through empirical testing and successive
refinement, emerge as one of the main research contributions.
Methodology – coordinated qualitative case studies – both analytic and constructive
For this research we have chosen a case study approach, in which we will examine a variety of identity
performances in practice at close range, with careful attention to locally contingent factors. Case studies
are particularly appropriate since we want to acquire an in-depth understanding of the dynamics of the
environment and the negotiations in which the actors are involved. The specific qualitative methods will
be adapted to the particular sites and include a mix of: gathering data through directly observing sites of
intensive identity-mediated interactions; interviewing the main participants; examining the documents
used in developing the identification technologies and practices, and recording interactions, interviews
and documents (via audio, photographic or videographic means as appropriate):
The field research will be ethnographically informed and conducted through three broad, intersecting
and complementary approaches:
 Processual: We will follow particular individuals as well as their identity information through
various stages of identity performances related to a specific process. As participant observers, we
will interview these individuals and engage with them as they perform their identities through the
sequence of steps involved in exercising a claimed right or service (immigrating, obtaining
welfare, driving a car, traveling by air, etc.) This will involve observing them as they fill out
paper as well as on-line forms, provide biometric samples, and interact with agency staff. Where
possible we will document interactions at various sites or moments along the way (e.g. at photo
ID studios and kiosks; departure lounges, immigrant counseling offices, passport offices, motor
CLEMENT p. 17
vehicle licensing offices, border crossing points; public access internet sites for welfare and other
services). Where the informants are willing, we will assist them in tracking their identity
information trails into the organization, through the databases and possibly beyond, invoking
when necessary the Openness, Access and Challenging Compliance provisions of Canadian
privacy regulations (e.g. Principles 8, 9 and 10 of the CSA model code in PIPEDA (2001)).
 Person-Centred: We will ask individuals to show us and talk about all the various forms of
identification documents they possess and how they use them in their identity performances. In
the spirit of a ‘wallet- or purse-ethnography’ (Wyatt, 2007), we will employ a think-aloud
protocol as they give a 'guided tour' of the identity documents or tokens they carry in their purses
and wallets or store on their laptop, PDA or mobile phone. We will be interested to learn about
the number and range of these ID tokens, which are most important to our research subjects,
what happens when they lose their ID, and generally what meanings these tokens hold for them.
 Constructive: In keeping with the precepts of participatory design (PD) and informed by the
fieldwork, we will develop prototypes of identity documentation, policies and systems to be
tested by our informants in realistic use scenarios. The aim will be to co-develop identification
requirements that meet the needs of identity subjects in terms of convenience, respect, identity
integrity and other civil rights while providing the service-providing organizations with the
information they require to conduct the transactions effectively, efficiently and accountably.
Our strategy for recruiting informants with will be opportunistic and iterative. A primary place for
making initial contact will be the areas where people wait to take some step in acquiring their ID or to
presenting it (e.g. welfare, employment, immigrant and motor vehicle licensing offices, departure
lounges, ID photo booths and studios, Service Ontario self-serve kiosks and the like). In these settings
people will be oriented to their ID concerns and often have some time on their hands to talk with us. We
will approach people with an account of our research project and assess their willingness to participate.
In the case of a positive response we will conduct an informal interview aimed at exploring the
feasibility of accompanying the individual through the process. In addition we will follow up selectively
with research subjects to probe their experiences further through the ‘wallet ethnography’ and in-depth
interviewing. Given the potentially sensitive character of the information requested, we will be
especially careful to assure informants of the voluntary nature of their participation, the confidentiality
of information collected, and anonymity in research reporting.
We aim to include informants who reflect a range of possible identity performances – i.e. ‘normal’
encounters, in which things go relatively smoothly, as well as a variety of problematic ones, where
identities are difficult to acquire, enact, maintain, repair, etc. In particular, we will focus on difficulties
that individuals experience when providing the common, and typically taken-for-granted elements of
identification such as their name, date and place of birth, place of residence, and gender (i.e. the
‘biographical core’) as well as the conventional indicators of uniqueness which increasingly are treated
biometrically (signature, facial image, finger print, iris scan). While these key components are assumed
to be readily available, people may have quite legitimate reasons for not being able to provide them
easily and so risk not being able to authenticate relevant identities.
We will focus initially on those roles listed in Table 1 that are most commonly and
unproblematically enacted, such as becoming a student, a car driver, an health care recipient and a
credit-worthy consumer and then with experience pursue those that are more challenging (e.g. an
international air traveler, welfare recipient, trusted traveler, immigrant). To find people with the more
exceptional experiences of identity impairment, we will follow up media stories about identity thefts,
no-fly list refusals etc., by contacting individuals mentioned in them. Altogether we expect to engage
about 40 individuals in total in the in-depth processual case studies. This will be supplemented by
information obtained through interviewing and ‘wallet ethnographies’.
The case studies will be integrated in several ways. We will develop a conceptual model of identity
performance that will both inform and draw on the empirical work. We will use this model and the
CLEMENT p. 18
materials collected in the research to prototype alternative identity documents and practices. Annual
two-day research workshops will provide the main occasions for presenting research findings,
highlighting the connections and discrepancies between the individual case studies, obtaining feedback,
refining the conceptual model and prototypes, and setting the direction for further research. All the field
researchers and collaborators will be invited to participate. Regular local project meetings as well as
email and the project web site will enable more informal collaborations between the annual meetings.
In addition, based on the field work, conceptual modeling and prototyping, we will in the final year
of the project commission a national survey of attitudes to personal identity documentation consisting of
approximately 8 semi-open ended questions with a national stratified sample size usual in public opinion
polling of about 1000.
While this research is designed to stand on its own, it also will fit well with and contribute to the
proposed SSHRC MCRI project, The New Transparency: Surveillance and Social Sorting, headed by
David Lyon of Queen’s University, of which Clement, Bennett and Phillips are research team members.
Communication of Results
We will disseminate the research findings in a multi-disciplinary mix of relevant national and
international academic conferences (e.g., the American Anthropological Association (AAA);
Participatory Design (PDC); Society for Social Studies of Science (4S); Association of Internet
Researchers (AOIR), Computers, Freedom and Privacy (CFP), European Association for the Study of
Science and Technology (EASST), all of which the research team members have presented papers in.
We will target the following refereed academic journals: Information Society; Ethics &
Information Technology; Information Communication & Society; Media Culture and Society; Science,
Technology, and Human Values; Surveillance and Society, Computer Supported Cooperative Work;
Canadian Journal of Communications; Journal of the American Society of Information Science;
Information Technology and People; Social Studies of Science; Communications of the ACM,
Government Information Quarterly, (again most of which we have published in previously).
The research workshop in the final year of the project will be enlarged by inviting other researchers
active in the identity field to participate by presenting their recent work and commenting on the work of
others. The results will be an edited collection to be published by a university press (e.g. Toronto,
McGill-Queens, UBC or Athabasca – Canada’s first open access academic publisher).
For the non-academic community, the prime policy venue will be the relevant conferences and
publications of the federal Policy Research Initiative. Our personal policy contacts in the federal
Treasury Board Secretariat, Departments of Industry and Public Safety, the provincial Service Ontario,
as well as in the Federal and Ontario Privacy Commissions will also be interested in learning the results
of this project and further disseminating them within their respective institutions.
For more popular audiences, a series of short videos derived from the interviews, ‘wallet
ethnographies’ and prototyping sessions will be posted to YouTube.
Also, the principal investigator and collaborators are frequently approached by print and electronic
media for comment on ICT and identity-related events. This research will provide useful materials for
such interviews and will likely be of media interest in its own right.
The description, reported findings, YouTube videos of this project will become a prominent part of
the existing Information Policy Research Program (IPRP) website, which has become an internationally
recognized repository of materials in several aspects of information policy, notably universal access,
community networking and identity issues. (See: http://www.fis.utoronto.ca/research/iprp)
If the ‘New Transparency’ MCRI project mentioned above is funded, this will also provide a good
mechanism for further disseminating research findings to these various audiences.
CLEMENT p. 19
3. References
Adey, P. (2004). "Secured and sorted mobilities: examples from the airport," Surveillance & Society,
1(4), pp. 500-519.
Agre, Philip E. (1994). ''Understanding the digital individual''. The Information Society, 10, 2, 73-76.
Bell, David (2001), An introduction to cybercultures, London, Routledge.
Bennett, Colin and David Lyon (2008) Playing the Identity Card, Routledge
Bijker, Wiebe E; Hughes, Thomas P; Pinch, Trevor, . (1987) [1999]. ''General Introduction''. In Bijker,
Wiebe E; Hughes, Thomas Pinch, Trevor (Eds.), The Social Construction of Technological Systems:
New Directions in the Sociology and History of Technology (pp. 1 - 6). Cambridge, Massachusetts:
MIT Press.
Black, Katie (2007). Excuse me, are you a threat to aviation security? Canada's No-Fly List, The OBA
Privacy Law Review: (August), 8(1).
Boa, K. (2007). Privacy outside the castle: Surveillance technologies and reasonable expectations of
privacy in Canadian judicial reasoning. Surveillance & Society: Special Issue on ‘Surveillance and
Criminal Justice’ Part 1, 4(3) (forthcoming)
Boa, Krista, Andrew Clement, Simon Davies and Gus Hosein (2007) CAN ID? Visions for
Canada: Identity Policy Projections and Policy Alternatives, University of Toronto & London
School of Economics, http://www.fis.utoronto.ca/research/iprp/publications/PDFs/CAN-ID/CANIDreportv2gaJul3.pdf
Bowker, Geoffrey C.; Star, Susan Leigh (1999). Sorting things out: classification and its consequences.
Cambridge, MA: MIT Press.
Brown, Geoffrey. (1990). The information game: ethical issues in a microchip world. Atlantic
Highlands, N.J.: Humanities Press International.
Browne, Simone. (2005). "Getting Carded: Border Control and the Politics of Canada's Permanent
Resident Card," Citizenship Studies, 9:4, 423-438.
Callon, Michel. (1986a). Some elements of a sociology of translation: domestication of the scallops and
the fishermen of St. Brieuc Bay. In Law, John (Ed.), Power, Action and Belief: A New Sociology of
Knowledge? Sociological Review Monograph, 32, 196-233. (pp. 196-233). London, UK: Routledge
& Kegan Paul.
Callon, Michel. (1986b). The Sociology of an Actor-Network: The Case of the Electric Vehicle. In
Callon, Michel; Law, John, Rip, Arie (Eds.), Mapping the dynamics of science and technology (pp.
19-34). London, UK: Macmillan Press.
Callon, Michel. (1999) [1987]. ''Society in the Making: The Study of Technology as a Tool for
Sociological Analysis''. In Bijker, Wiebe E; Hughes, Thomas PPinch, Trevor (Eds.), The Social
Construction of Technological Systems: New Directions in the Sociology and History of Technology
(pp. 83-103). Cambridge, Massachusetts: MIT Press.
CLEMENT p. 20
Callon, Michel; Law, John. (1997). After the individual in society: Lessons on collectivity from science,
technology and society. Canadian Journal of Sociology, 22, 2, 165-182
Clarke, Roger. (1994, June). ''The digital persona and its application to data surveillance''. The
Information Society, 10, 2 [Online]. Available at:
http://www.anu.edu.au/people/Roger.Clarke/DV/DigPersona.html [1999, Nov. 9]
Clement Andrew, Krista Boa, Simon Davies and Gus Hosein (2008) Toward a National ID Card for
Canada? External drivers and internal complexities, to appear in Colin Bennett and David Lyon,
editors Playing the Identity Card, Routledge (forthcoming)
Clement, A. (1984) "Electronic Management: The New Technology of Workplace Surveillance",
Proceedings of the Canadian Information Processing Society National Conference, Calgary, May
9_11, 1984, pp. 259_268.
Clement, A. (1988) "Office Automation and the Technical Control of Information Workers", in The
Political Economy of Information, Vincent Mosco and Janet Wasko (editors) Madison: University of
Wisconsin, pp. 217-246.
Clement, A. (1992) "Electronic Workplace Surveillance: Sweatshops and Fishbowls", Canadian Journal
of Information Science, Vol. 17, #4, 1992, pp. 18-45.
Clement, A. (ed.) (1998) “Key Elements of a National Access Strategy: A Public Interest Proposal",
Information Policy Research Program, University of Toronto, 17 pp.
http://www.fis.utoronto.ca/research/iprp
Clement, A.(1996) "Considering Privacy in the Development of Multi-media Communications", in
Kling, R. (editor) Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed.,
Academic Press, San Diego, pp. 383-406.
Clement, A., “Everyday Internet Use and Community Networking”, in the Community Networking in
Canada session of the National Policy Research Conference, Ottawa, December 6, 2001
Clement, A., Aspinall, J., Viseu, A. & Shade, L., “Everyday internet experiences: A ‘neighbourhood
ethnography’ of public versus domestic access to on-line services”, Association of Internet
Researchers (AoIR) International Conference, Internet Research 3.0 Maastricht, The Netherlands,
October 13-16, 2002.
Clement, A., Aspinall, J., Viseu, A. & Suchman, L. “The Everyday Internet project: A ‘neighbourhood
ethnography’ informed by current Canadian policy concerns”, presented at the Ethnographies of the
Internet: Grounding Regulation in Lived Experience research conference held at Oxford University,
March 8, 2002.
Clement, A., Guerra, R, Johnson, J., & Stalder, F. (2002) “National Identification Schemes (NIDS): A
Remedy Against Terrorist Attack?” Proceedings of the Sixth Conference on Human Choice and
Computers HCC6, IFIP World Computer Congress, Kluwer, Dordrecht, Netherlands, 10pp.
Clement, A., Moll, M. & Shade, L.R. (2001) “Debating Universal Access in the Canadian Context: The
Role of Public Interest Organizations”, in E-commerce vs E-commons: Communications in the
Public Interest, Moll, Marita & Shade, Leslie (editors), Canadian Centre for Policy Alternatives,
Ottawa, pp. 23-48.
CLEMENT p. 21
Clement, A., Stalder, F., Superle, T. & Viseu, A. (2001). Efficiency, Privacy, and Accountability in
Identity Technologies: The Case of the Ontario ‘Smart Card ’ Proposal. Paper presented at the
International Workshop on Surveillance Categories, Risk, and Social Ordering. Queen’s University,
Kingston. May 3-5.
Du Gay, Paul. (2007). Organizing Identities, London, Sage.
Gandy, Oscar (1993). The panoptic sort: A political economy of personal information. Boulder, CO.
Westview.
Goffman, Erving. (1959). The Presentation of Self in Everyday Life. New York: Anchor Books
Gorman, G.E. & Clayton, P. (1997). Qualitative research for the information professional. London:
Library Association Publishing.
Hall, Stuart. (2001) ‘Who needs “identity”?’, in P. du Gay, J. Evans, and P. Redman (eds) Identity: a
reader, London, Sage.
House of Commons (2003) A National Identity Card for Canada?, (Interim) Report of the Standing
Committee on Citizenship and Immigration, October 2003.
http://cmte.parl.gc.ca/cmte/CommitteePublication.aspx?COM=3280&Lang=1&SourceId=61198
Kilger, Max. (1994). ''The digital individual''. i, 10, 2, 93-99
Latour, Bruno. (1991). Technology is society made durable. In Law, John (Ed.), A sociology of
monsters: Essays on power, technology and domination (pp. 103-131). London and New York:
Routledge.
Latour, Bruno. (1992). ''One more turn after the social turn... ''. In McMullin, E (Ed.), The Social
Dimension of Science (pp. 272-294). Notre Dame: Indiana University of Notre Dame Press.
Latour, Bruno. (1996). Aramis or the Love of Technology (translated by Catherine Porter). Harvard
University Press: Cambridge, MA.
Latour, Bruno. (2000 January/March). When things strike back: a possible contribution of 'science
studies' to the social sciences. British Journal of Sociology, 51, 1, 107-123
Laudon, Kenneth. (1986). The dossier society: Value choices in the design of national information
systems. New York: Columbia University Press
Law John (2004) After Method: Mess in social science research. London, Routledge.
Law, John (1987) Technology and Heterogeneous Engineering: The Case of Portuguese Expansion, in
in Bijker, Wiebe E; Hughes, Thomas Pinch, Trevor (Eds.), The Social Construction of Technological
Systems: New Directions in the Sociology and History of Technology, Cambridge, Massachusetts:
MIT Press, pp. 111–134
Law, John. (1999) [1987]. ''Technology and Heterogeneous Engineering: The Case of Portuguese
Expansion''. In Bijker, Wiebe E; Hughes, Thomas Pinch, Trevor (Eds.), The Social Construction of
Technological Systems: New Directions in the Sociology and History of Technology (pp. 111-134).
Cambridge, Massachusetts: MIT Press.
CLEMENT p. 22
LSE Identity Project http://identityproject.lse.ac.uk/
Lyon, David. (2005). The border is everywhere: ID cards, surveillance and the other. in Elia Zureik and
Mark Salter (Eds.) Global surveillance and policing: Borders, security, identity. Cullompton: Willan
Lyon, David. (2004) Identity cards: Social sorting by database. OII Internet Issue Brief, No.3.
www.oii.ox.ac.uk/resources/publications/IB3all.pdf
Lyon, David (ed) (2003) Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination,
London. Routledge.
Lyon, David. (1994). The electronic eye: The rise of surveillance society. Minneapolis, MN: University
of Minnesota Press.
MacKenzie, Donald; Wajcman, Judy. (1985). ''Introductory essay and general issues''. In MacKenzie,
Donald; Wajcman, Judy (ed) The social shaping of technology (pp. 2-25). Milton Keynes,
Philadelphia: Open University Press.
McPhail, Brenda and Andrew Clement, (2007) “We will investigate your complaint”: Performing
professional, peer and organizational identities in the monitored environment of a Canadian financial
services call centre, IPRP working paper.
O’Connor, Justice Dennis (2006) Canadian Commission Of Inquiry Into The Actions of Canadian
Officials In Relation to Maher Arar (‘Arar Commission’) http://www.ararcommission.ca/eng/
Oudshoorn, Nelly and Trevor Pinch (2003) How Users Matter: The co-construction of users and
technology, MIT Press
PIPEDA – Personal Information Protection and Electronic Documents Act, Canadian Parliament (2001)
Stake, R. E. (1994). Case Studies. In Denzin, N. K. & Lincoln, Y. S. Handbook of Qualitative Research
(pp. 236-247). Thousand Oaks, CA: Sage.
Stalder, F., & Clement, A. (1999) “Exploring Policy Issues of Electronic Cash: The Mondex Case”,
Canadian Journal of Communication, Vol. 24, No. 2.
Stalder, Felix and David Lyon Electronic identity cards and social classification, (2003) in D. Lyon (ed)
Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, pp 77-93, London:
Routledge.
Stalder, Felix. (2001). Making Money: Notes on Technology as Environment. Faculty of Information
Studies, University of Toronto: (doctoral thesis).
Turkle, Sherry. (1995). Life on the screen: identity in the age of the internet. New York: Touchstone.
Viseu, A., Clement, A., & Aspinall, J., “Situating privacy on-line: Complex perceptions and everyday
practices”, Association of Internet Researchers (AoIR.) International Conference, Internet Research
3.0 Maastricht, The Netherlands, October 13-16, 2002.
CLEMENT p. 23
Viseu, A., Clement, A., Aspinall, J., & Kennedy, T. (2006) “The Interplay of Public and Private Spaces
in Internet Access”, Information, Communication & Society (iCS), Vol. 9, No. 5 , October 2006, pp.
633 - 656
Viseu, A., Clement, A., & Aspinall, J.(2004). “Situating Privacy Online: Complex perceptions and
everyday practices”, Information, Communication & Society (iCS), Vol. 7, No. 1, March 2004, pp.
92–114
Webb, Maureen Webb (2007) Illusions of Security: Global Surveillance and Democracy in the Post9/11 World, City Lights.
Wyatt, S. (2007). Health & the handbag. Paper presented at Healthcare, technologies and places:
Contributions and provocations from humanists and artists, University of Toronto: Toronto, ON,
May 3-4.
Wong, M., Powell, A. & Clement, A. (2007). “Reading Service Set Identifiers (SSIDs): Marking and
Locating for Public and Private Wireless Spaces”, presented at the Association of Internet
Researchers (A.o.I.R.) International Conference, Internet Research 8.0, Vancouver, B.C., October
17 - 20, 2007.
CLEMENT p. 24
4A. Research Team
Andrew Clement (Principal Investigator) Professor, Faculty of Information Studies,
University of Toronto.
I have been conducting qualitative field studies of information systems use and development since the
early 1980s. I have also supervised several graduate thesis projects and more than 100 course projects
involving similar field studies. In this research program, I will take overall responsibility for the day to
day research direction and the final project results. In consultation with other members of the research
team, I will develop and refine the conceptual model of identity performance as well as oversee the
informant recruiting criteria and strategies, the interview protocols, the video-recording, the analysis
methods, publication and presentation venues, project web site maintenance and financial priorities. This
will be linked to the ongoing supervision of the dissertation work of my PhD students involved in the
project. Each year I will convene a two-day research project workshop for the full team. This will give
all members an opportunity to present and discuss their research as well as to set the project direction for
the coming year. During the period of this project I currently have no other funded projects, so this will
be my primary research activity.
David J. Phillips (Collaborator) Associate Professor, Faculty of Information Studies,
University of Toronto
David Phillip’s research has combined theoretical work on surveillance to explore generative
possibilities of surveillance practice -- possibilities for transgressive visibility, subcultural identities and
knowledges, with case studies in infrastructure development, drawing on STS, legal, discursive, and
political economic analyses. His writings on such topics as privacy, surveillance, politics, queer theory,
visibility, sexual identity, pseudonymity, and information technology have appeared in journals across a
wide range of disciplines. Empirically, he is interested in activity in the technology, culture, policy, and
economics of identification, monitoring, and mapping. Theoretically, he is interested in investigating the
possibilities of infrastructures which more equitably distribute access to techniques of identification,
monitoring, mapping, etc. In this project Prof Phillips will provide advice to the research team on
theorizing identity and identification as well as assist in the interpretation of field data, specifically,
those aspects relating to the ways people selectively make (in)visible aspects of their identities.
Colin J. Bennett (Collaborator) Professor, Political Science, University of Victoria
Colin Bennett’s research interests have focused on the comparative analysis of information privacy
protection policies at the domestic and international levels. He has published Regulating Privacy: Data
Protection and Public Policy in Europe and the United States (Cornell University Press, 1992). He is
also co-editor of Visions of Privacy: Policy Choices for the Digital Age (University of Toronto Press,
1999), co-author of The Governance of Privacy: Policy Instruments in Global Perspective (MIT Press,
2006) and co-editor, with David Lyon, of the forthcoming Playing the Identity Card (Routledge, 2008).
He has recently completed an international study of privacy advocacy, so can provide a comparative
perspective of public attitudes and resistance to identification schemes. Prof Bennett will bring his
connections with Canadian Privacy Commissioners and extensive experience in policy, regulation and
advocacy in the privacy arena to bear on this project as it attempts to develop understandings in the less
developed arena of identity rights. His principal role in the project work will be in the annual research
workshop in Toronto, at which he will share his current research and provide constructive responses to
the research presentations.
CLEMENT p. 25
4B. Training (Role of Students)
The training of PhD and Masters students at the Faculty of Information Studies is central to this research
project. They will be involved in all aspects of the work – research design, informant recruiting,
interviewing, analysis and writing up results – and assisted as necessary throughout in mastering the
relevant skills. As with previous projects, student collaborators will be recognized as co-authors on
published works and supported in traveling to conferences to present their work (see the Contributions
to Training section of my CV which follows).
The main role for PhD students will be conducting the case studies. They will work those aspects
most directly pertinent to their dissertation research (sketched below) while highlighting the connections
to the common themes of identity performance. I am already supervising the research of the four
initially proposed PhD students:
Krista Boa – public consultation approaches to identity scheme development
Joseph Ferenbok – facialization of identity via automated facial recognition technologies
Karen Smith – on-line public policy consultation techniques, including via collaborative prototyping
Diane Dechief – challenges in naming for identification, especially in immigration settings
It is very likely that two or three of these PhD students will graduate during the course of this research
project. However, there should be no difficulty in recruiting other PhD students to work on the project.
The PhD program at FIS has more than 40 candidates currently enrolled and regularly attracts wellqualified applicants interested in doing studies of information use and policy. My active role in the
Knowledge Media Design Institute (KMDI and the Identity, Privacy and Security Initiative (IPSI) also
puts me in a good position to attract PhD students to this project from other collaborating units at the
University of Toronto.
Recruiting Masters students as needed should be no difficulty since there are over 300 Masters
students enrolled at FIS and from prior experience plenty are keen and able to do this type of work. Even
without being hired as salaried research assistants, I expect that some Masters students will be interested
in working with this project for their own thesis research as well as part of their course work. Two
graduate elective courses that I teach, FIS 2165 – Social Issues with Information and Communications
Technologies, and FIS 2198 – Seminar in Security Technology and Policy, have significant components
on identity technologies. This research will provide useful teaching materials as well as offer the basis
for term projects.
CLEMENT p. 26
4C. Previous and On-Going Research Results
SSHRC: Developing Information Policies for Canada’s Information Infrastructure
This was a three year collaborative project funded in 1995 by SSHRC’s Strategic Grants Program in
the area of Science and Technology Policy, and served as the foundation for the on-going Information
Policy Research Program (IPRP), based at the Faculty of Information Studies. Through its partnership
connections with several federal government departments, most notably Industry Canada, Canadian
Heritage, Human Resources Development Canada, this lead to a series of related projects oriented to
developing various aspects of Canadian access strategy. A major academic result was the development
of the ‘access rainbow’, a seven layered model of information infrastructure (Clement and Shade, 2000),
which has been found useful by other researchers in discussing specific aspects of ‘access’ beyond the
conventional focus on connectivity. Other work has contributed to understanding the notion
‘universality’ in light of Canadian policy over the past century, the emergence of electronic cash as a
part of Canadian national information infrastructure, the role of public interest organizations in access
policy, and the comparison of Canadian ‘information highway’ policies with those of other countries,
notably the US.
On the policy development front, we convened a series of three policy workshops that brought
federal policy officials together with academic and public interest policy researchers for intensive, two
and a half day discussions. These culminated in the formulation of Key Elements of a National Access
Strategy: A Public Interest Proposal, which we publicly presented to the Federal Ministers of Industry
and Heritage in 1998. This also lead to contributions to official recommendations to the Minister of
Health concerning access to Canada’s ‘health infostructure’, and to the Canadian Radio-television and
Telecommunications Commission (CRTC) Hearings on New Media. (see Final Productivity Report for
the SSHRC funded strategic project - Developing Information Policies for Canada’s Information
Infrastructure, and the IPRP website: http://fis.utoronto.ca/research/iprp/)
SSHRC: Electronic Representation of Workers Project
This SSHRC Standard Research grant was funded for three years in 1996, and extended by a one
year research grant from the Bell Canada University Laboratories, entitled “User modeling methods and
tools applied to Persona agents. Assessment of personal and social implications of the use of persona
technology”. The research focused on exploring how the identities of workers in intensively
computerized workplaces were shaped by interactions with the information systems, their managers and
their co-workers. On the conceptual front, we elaborated Clarke’s notions of a ‘digital persona’, to
make it applicable to workplace settings and its relationship to software agents. Empirically the work
has been based on participant observation in the call centres of two major financial institutions. Our
main finding is that computerized systems, especially for the detailed monitoring of work, can play a
significant role on how much influence workers exercise in presenting themselves to relevant others
(clients, co-workers and supervisors). However, even with fine-grained tracking systems, there are
multiple, conventional ways still available for self-presentation.
This project work has mainly been presented at workshops and conferences in Canada and
internationally (US, UK, Denmark, Norway and Hungary). (see Final Productivity Report for the
SSHRC funded project - Electronic Representation of Workers
SSHRC: Everyday Experiences with Networked Services
This three year Standard Research project was funded in 2001. This research sought to inform active
Canadian policy debates by investigating qualitatively how regular internet users experience on-line
services in the context of their everyday lives. The ethnographic fieldwork is being conducted in a
downtown Toronto neighbourhood that offers a variety of modes of internet access and that well reflects
the socio-economic and ethnic diversity of Canadian society along many of the key demographic
CLEMENT p. 27
dimensions of digital divide debates. Research results addressing mainly the issues of privacy and
domestic versus public access to internet services, have been presented at conferences in Ottawa, Oxford
(Clement, Aspinall, Viseu & Suchman, 2002) and Maastricht (Clement, Aspinall, Viseu & Shade, 2002;
Viseu, Clement & Aspinall, 2002), and published in refereed journals (Viseu, Clement, Aspinall,
Kennedy, 2006); Viseu, Clement & Aspinall, 2004).
SSHRC: Digital Identity Constructions
A direct continuation of the Electronic Representation of Workers Project, this research conducted three
in-depth case studies of digital identity construction – two in workplaces using ethnographic, participant
observer methods - telephone technical operations (Viseu, 2005) and banking call centres (McPhail &
Clement, in progress) – and one using freedom of information requests to analyse the development of
the Ontario Smart Card Project, a now cancelled jurisdictional identity card scheme (Boa, 2003, Boa and
Clement, in progress).
SSHRC: Canadian Research Alliance for Community Innovation and Networking
(CRACIN.ca)
Just completed, this INE Research Alliance project of which I was the principal investigator, has been
the principal focus of my research energies since 2003. Conducted as a linked set of in-depth case
studies of community networking initiatives across Canada, this research combined ethnographic and
other qualitative research methods to address local practitioner as well national policy issues. The
results have been presented in many venues: academic; policy oriented; and community focused. An
edited collection of the research results consisting of 22 chapters is to be submitted to a Canadian
academic publisher by the end of 2007.
Office of the Privacy Commission: Visions for Canada’s Identity Policies
Understanding Identity Policy and Policy Alternatives
Conducted this past year, this Contribution Program project provided an extensive analysis of national
identity developments currently underway in Canada and internationally and offered alternative
approaches. The results were presented at several conferences (Computers Freedom and Privacy, May,
2007; the Queen’s University Surveillance Project ID Card Workshop, June 2007, and Society for Social
Studies of Science (4S) conference, October 2007. It also produced a substantial report (Boa, Clement,
Davies & Hosein, 2007) and a chapter in the forthcoming Playing the Identity Card collection (Clement
et al, 2008).
Infrastructure Canada: Community Wireless Infrastructure Research Project (CWIRP.ca)
This two year project currently underway is exploring the options for community and municipal internet
infrastructure development. One aspect of this research examines how individuals and groups use their
service set identifiers (SSIDs) to signal their public or private availability (Wong, Powell & Clement,
2007).
Bell University Labs: PIPWatch – Privacy protection through social navigation
This one year project currently underway is producing a software tool designed to assist web users in
determining whether the sites they visit are compliant or not with Canadian privacy legislation, notably
PIPEDA.
CLEMENT p. 28
7. Request for adjudication by Committee 15
This research is appropriately multi-disciplinary in several important respects:
Central topic
‘Identity performance’ explicitly brings together social and technical phenomena so inextricably bound
up with each other that no single disciplinary perspective can do it justice.
Research team
The principal investigator holds a PhD in Computer Science, while one collaborator (Phillips) has a
Communications PhD and the other (Bennett) is a Political Scientist. The PhD candidates conducting the
case studies bring relevant educational backgrounds in English, Communications, Information Studies,
and physical sciences.
The project is based in the Faculty of Information Studies which identifies itself as multi-disciplinary,
reflecting the diverse range of its faculty members.
Literatures
The literatures cited in this proposal alone give a good indication of the disciplinary range of this
research. In addition to drawing from such interdisciplinary fields as Cultural Studies, Science and
Technology Studies, Gender Studies and Information Studies, the books and articles cited above reflect
such disciplines as Sociology, Management, Education, Computer Science, Political Economy, and
Psychology.
Methods
The qualitative methods draw principally on anthropological traditions (notably ethnography), but also
require an appreciation of the technical characteristics of the devices, databases and interfaces used
implicated in the digital identity construction.
None of the other SSHRC Committees fit all these various facets of the research well.
Therefore, we request that this proposal be adjudicated by Committee 15.
Download