Access the full text.
Sign up today, get DeepDyve free for 14 days.
F. Geels, B. Elzen, K. Green (2004)
General Introduction: System Innovation and Transitions to Sustainability
(2002)
Die Bürgerkarte: Basis und Infrastruktur für sicheres e-Government
A. Pfitzmann, M. Hansen (2010)
A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
Thierry Nabeth (2009)
Social web and identity: a likely encounterIdentity in the Information Society, 2
Ruth Halperin, J. Backhouse (2008)
A roadmap for research on identity in the information societyIdentity in the Information Society, 1
Siddharth Arora (2008)
National e-ID card schemes: A European overviewInf. Secur. Tech. Rep., 13
F. Geels (2004)
Understanding System Innovations: A Critical Literature Review and a Conceptual Synthesis
Mary Johnson, P. Wilcox (2007)
The World of Connected ThingsJournal of Government Financial Management, 56
F. Scharpf (1997)
Games real actors play
John Taylor, M. Lips, J. Organ (2008)
Identification practices in government: citizen surveillance and the quest for public service improvementIdentity in the Information Society, 1
(2008)
Auswirkungen der EU-DL Richtlinie auf die E-Gov-Welt
Wade Fagen, Karrie Karahalios (2007)
Exploring a New World of Identity with Identity 2.0 based Solutions
Alexander Schellong (2008)
Government 2.0Transforming Government: People, Process and Policy, 2
(2008)
The role of digital identity management in the internet economy: a primer for policymakers
S. Ostergaard (2008)
eGovernment 2 . 0 – How can Government benefi t from web 2 . 0 ?
Ulrich Dolata (2008)
The Transformative Capacity of New Technologies. How Innovations Affect Sectoral Change: Conceptual Considerations
M. Lips, Chiky Pang (2008)
Identity Management in Information Age Government: Exploring Concepts, Definitions, Approaches and Solutions
(2006)
An Evaluation of Identity-Sharing Behavior in Social Network Communities
David Osimo (2008)
Web 2.0 in Government: Why and How?
Hanna Krasnova, O. Günther, S. Spiekermann, K. Koroleva (2009)
Privacy concerns and identity in online social networksIdentity in the Information Society, 2
V. Schneider, Renate Mayntz (1995)
Akteurzentrierter Institutionalismus in der Technikforschung: Fragestellungen und Erklärungsansätze
Web 2.0 in its various shades is being embraced in the domain of e-government; sophisticated transaction services are becoming mainstream interactions and creating new challenges, particularly regarding security and privacy. The emerging field of electronic identity management (e-IDM) addresses these issues, while governments are introducing e-IDM systems at national level to support service provision. This paper conceptualizes the transition to such a system in Austria as a "system innovation" and uses the approach of "actor-centered institutionalism" to analyze the innovation process and its outcome. It identifies major particularities of the Austrian system such as the technology-neutral approach using multiple tokens and an ID-model with special provisions for privacy protection, traces their origin in the interplay of institutional context and actor constellations and assesses the pattern of this transformation. The current system represents a niche innovation, indeed with a transformation pattern implying considerable change for public administration as well as for citizens. Still controversial privacy implications and insufficient user value, reflected in slow take-up, remain the challenges. The system innovation perspective proved particularly valuable in identifying demands for adaptation by revealing barriers in the transition process towards the e-IDMS.
Information Polity – IOS Press
Published: Jan 1, 2010
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.