Digital Identity-Aadhaar
Digital Identity-Aadhaar
Digital Identity-Aadhaar
Arpan K. Kar
Associate Professor
Indian Institute of Technology Delhi, New Delhi
National Capital Territory of Delhi, India
Email: [email protected]
Yogesh K. Dwivedi
Professor
Swansea University, UK
Email: [email protected]
M. P. Gupta
Professor
Indian Institute of Technology Delhi, New Delhi
National Capital Territory of Delhi, India
Email: [email protected]
R.S Sharma
Chairman
Telecom Regulatory Authority of India (TRAI), New Delhi
National Capital Territory of Delhi, India
Email: [email protected]
captured as part of the identity surrounding the citizens which decides what
services and products one is entitled to and can access. At present, there are still
around 1.1 billion people in the world without any official identity. To address
this concern, United Nations through its 16th Sustainable Development Goals
national digital identity program successfully requires expertise, time, and huge
financial commitments. This paper takes Aadhaar as a case study and uses Design
Theory (DT) and Critical Success Factor theory (CSF) as a theoretical lens and
attempts to evaluate design and execution choices made during the tenure of the
project. The study also identifies and prioritizes primary goals of Aadhaar based
on the secondary data, expert opinion through a Focus Group Discussion (FGD)
The expert opinion from the FGD was analyzed using the Best-Worst method
analysis. The study identified uniqueness, security and privacy as the top priority
goals in an identity system and is 11 times more crucial than scalability which is
considered as a reference for other countries that aim to develop and implement
those attributes that makes an entity unique and distinguishable from others (Olson, 2015).
(Ben Ayed, 2014) also defined identity as a set of qualities and characteristics, by which an
entity can be defined, distinguished and recognized in comparison to other entities. With a
focus on context, International Telecommunication Union (ITU) has defined identity as a set
of one or more attributes that distinguish a particular entity within a context (ITU-T, 2010).
The International Organization for Standardization (ISO) defines digital identity as “item
organization, a device, a subsystem, or a group of such items that has a recognizably distinct
existence.” (ISO, 2011). Further, World Economic Forum (WEF) defined digital identity as
“collection of individual attributes that describe an entity and determine the transactions in
India became the first nation with a population exceeding 1 billion citizens to
implement digital identity for all its citizens. With a population of 1.3 billion (Bank, 2016),
India is second most populous country in the world. For such a country to roll out a program
like Aadhaar, which is world’s largest digital identity program as of July 2019, by Unique
practical challenges like high illiteracy rate (26% as per 2011 census), diverse cultures,
political beliefs, varied demographics and many more. The primary purpose of Aadhaar –
random number (Barnwal, 2015) tightly coupled with biometric details of an individual like a
photograph, fingerprints, iris and demographic information like age, date of birth, gender and
address. India has issued Aadhaar cards to more than 1 billion residents after initial launch
(Dixon, 2017). As of February 2019, more than 1.2 billion people have already been issued
Aadhaar numbers (UIDAI, 2019) and hence it surpasses the US's biometric project called
VISIT, which was earlier considered to be the world's largest biometric project (Epstein,
2008). This current study is much needed for giving a roadmap for implementation of digital
identity considering the recent recommendations by United Nations in its 16th SDG that each
individual should be provided a legal identity by 2030 (UN, 2016). One of the driving
motivation for this study is that at a global level, despite the focus brought out in the 16th
SDG of the UN, 24% of the developing countries do not have any form of digital identity
system, and among others only 3% of the countries have foundational identity system that
could be used in both online and offline domains (BankWorld, 2016; Segovia, Álvaro, &
Enríquez, 2018). Countries that do not possess any national identity scheme could use this
roadmap such that the desired objectives of identity for all is achieved in a timely and cost-
efficient manner. For meeting such an objective, this study is useful for benchmarking design
and execution objectives of digital identity programs, considering its developmental cost,
Anthopoulos, Reddick, Giannakidou, & Mavridis, 2016; Elkadi, 2013). One of the main
reasons for the failure of e-government projects is the divergent interests and differences in
the stakeholder expectations from the project (Sivamalai, 2013). Further, Sivamalai using
perceive Aadhaar differently and how the analysis of design decisions before implementation
could solve this problem. The present study takes it forward from there and evaluates the
design and implementation decisions made during the tenure of the project such that the risks
of the possible project failure could be mitigated. This study makes an attempt to breakdown
the complexity of developing a digital identity system like Aadhaar in a way that it becomes
easier for others to follow the process and develop a biometric based digital identity system
Aadhaar and multiple criteria associated with each goal can be considered as a MCDM
problem because each goal is dependent on multiple factors/criteria that need to be taken care
of right from the planning phase. From theoretical perspective this study uses CSF and DT to
study overarching goals and their design and executions choices respectively. Both the
theories have been used extensively in the e-government literature e.g. (Rana, Dwivedi, &
Williams, 2013) used CSF to identify challenges and barriers of e-government adoption,
(Akhtar Shareef, Kumar, Kumar, & Dwivedi, 2014) identified ability to use and assurance to
use as the critical factors in the adoption of electronic government, (Shah, Braganza, &
Morabito, 2007) identified organizational factors critical to e-business, and (Bergeron &
Bégin, 1989) highlighted the use of CSF in evaluating information systems. Similarly, extant
research literature about DT is nicely covered (Agogué & Kazakçi, 2014). Studies have
proposed DT for market surveillance (Li, Sun, Chen, Fung, & Wang, 2015), digital platforms
supporting online communities (Spagnoletti, Paolo, Resca, & Lee, 2015), and for developing
policy alternatives (Pluchinotta, Kazakçi, Giordano, & Tsoukiàs, 2019). Some of general
utility areas of DT are design and development of policies (Esfahlan & Valilai, 2019;
Howlett, 2014; May, P.J, 2003; Mintrom & Luetjens, 2016) and decision making (Le
• What are the overarching design and implementation goals of India’s digital
identity – Aadhaar?
• How can we establish the priority among these overarching design and
implementation goals?
• What are the influencing factors that made it possible to design, develop and
To answer these questions, a MCDM method, namely the Best-Worst MCDM method
has been adopted for evaluating the experts’ feedback gathered from a multi-stakeholder
workshop. All these experts were identified from the government and private sector having
direct and senior role in the implementation of Aadhaar. Inputs from experts are analyzed and
transformed into the list of weighted criteria based on their significance corresponding to the
and risk assessment roadmap for large projects similar to Aadhaar and can enhance the
probability of a project to be successful. It can also increase the transparency, acceptance and
utility of a particular project. Further, two well established methodologies, TISM and
The remaining sections are organized as follows: Section 2 describes the unique
identification concept primarily from biometrics perspective, including its functional utility,
technical architecture and process flow. Section 3 presents Aadhaar as a digital identity case
study. Section 4 discusses about the research gaps in the domain and contribution made. The
theoretical lens for this study is covered in section 5. Section 6 introduces the focus group
followed by data analysis part of the study using BWM for prioritization. Verification of
BWM output using TISM and MICMAC is covered in section 7 and finally, discussions
about the theoretical and practical contribution of this paper along with the future research
This section is subdivided into three sub-sections. The first subsection focuses on the utility
of biometrics for citizens from a functional perspective. The second sub-section explores the
technical architecture for such a solution and process mechanism for biometrics in practice is
Biometrics could be used for identity recognition based on various biological traits like voice,
iris, face, fingerprints, palm, DNA, ear, retina or behavioral characteristics like handwriting,
signature and body movements, also called gait (Hoang & Caudill, 2012) Among all;
fingerprints are the oldest biometrics in use. Traditionally, fingerprints were used in ink and
paper documents for legal purposes. In the recent past, DNA as biometric has also gained
much interest among researchers. However, any biological or behavioral trait can be used as
Criteria Description
Universal Every individual should have the particular biometric attribute. The attribute
must be scarcely lost to accidents or health related illness.
Unique Biometric attribute should be different for each individual. Attribute should
possess distinct properties such that one individual could be distinguished from
other.
Permanent Attribute should remain unchanged indefinitely. It should be constant over the
period of time and should not be subjected to any major change.
Recordable Once captured, biometric attribute should be storable such that it becomes easy
to handle and perform operations on it.
Based on the unique features of biometrics, biometrics based technologies have a wide
scope of applications like logical or physical security (Hodeghatta & Nayak, 2014),
Ross, & Prabhakar, 2004), time and attendance (Fenu, Marras, & Boratto, 2018), and
electronic signatures (Nunno, 2000). These studies highlighted that the design and execution
goals of any digital identity should address universality, distinctiveness, permanence,
It is found that researchers started publishing about biometric systems from 1960's. In the
year 1963, Mitchell Trauring published his work on fingerprint matching on automated
biometric recognition (Trauring, 1963). After that, other biometrics have been used in various
automated biometric systems like voice (Pruzansky, 1963), signature and Hand geometry
(Mauceri A.J, 1965) and iris (Daugman, 1993) systems were also developed subsequently.
Biometric systems have evolved over a period and have improved considerably
regarding performance, accuracy, and usability. Any new biometric technology is evaluated
against the benchmark set by National Institute of Standards and Technology (NIST) before it
can be made available for commercialization. NIST evaluation process is very complex and
takes into consideration various test conditions before finalizing the results (NIST, 2013).
The detailed explanation of these test conditions adopted by NIST is beyond the scope of this
paper. However, a few important parameters that Digital Identity Systems (DIS) use globally
has been illustrated in appendix section A.1. Some of the state-of-the-art biometric
technologies can achieve greater accuracy (Phillips, Flynn, & Bowyer, 2017). An overview of
the comparison of various biometric identifiers based on their application and design goals is
illustrated in Table 2.
Table 2: Important factors in biometric identity of citizens, extended from A. K. Jain et al.,
(2004)
Hand geometry
Thermogram
Finger-print
Biometric
Hand vein
Keystroke
Palmprint
Signature
Identifier
Retina
Facial
Voice
DNA
Odor
Face
Gait
Ear
Iris
Universality H M H H M M M M H L H M H L M
Distinctiveness H M L H H L M M H L H H H L L
Permanence H H M L H L M M H L H H M L L
Collectability L M H H M H H M M M L M L H M
Performance H M L M H L M M H L L H H L L
Acceptability L H H H M H M M L M M M L H H
Circumvention L M H L M M M L L M L M L H H
Inbuilt security H M M H M M M H H L L M H L M
Processing cost H M L M L H M H H L M M H L L
Convenience L M H M H L M L L H M M L H H
Robustness H M H M L L L H H L M M H L L
Utility L L H M H M M L H M L M H H M
Where H = High, M = Medium, and L = Low labels are based on the authors perception.
The National Science and Technology Council provides the following overview of biometric
sensor is used to collect the data and convert the information to a digital format. Signal
processing algorithms perform quality control activities and develop the biometric template.
A data storage component keeps information with which new biometric templates will be
compared to. A matching algorithm compares the new biometric template to one or more
templates maintained in data storage. Finally, a decision process (either automated or human-
assisted) uses the results from the matching component to make a system level decision.
Fig. 1. Process blueprint for the verification process through a biometric system
Fig 1 illustrates a process flow of a typical biometric system and categorizes processes
into three stages, citizen enrolment, citizen on-boarding and decision making. Citizen
enrolment is the first stage where in data is collected from the citizens and made ready for
further processing by cleaning and filtering data from noise. In the second stage biometric
templates are generated after feature extraction and in the final stage these templates are
(e.g., tokens, smart cards), what the individual knows (e.g., PIN, passwords) and what the
individual comprises of (e.g., iris, fingerprints). As per Census 2011 there are about 104
million elderly people aged above 60 years who often forget access credentials and is
expected to grow to 173 million by 2026 (GOI, 2016). Also such users often share their
credentials to others to access the services, due to which two factor authentication systems
became popular (Singh, Cabraal, Demosthenous, Astbrink, & Furlong, 2007). Similarly,
Matsumoto at Electric Imaging 2002 conference. He developed a fake finger with gelatin and
used a simple digital camera and a computer to fool a biometric device 80% of the time (BBC
News, 2002). However, with recent advancements in biometrics technology can detect fakes
by considering factors like sweat pores, conduction properties and finger on contorts the
It is important to note that biometric-based systems are not entirely foolproof (Pagnin &
Mitrokotsa, 2017). Even though biometric technology has come a long way in the last five
decades, it still has challenges and issues that are not sufficiently addressed yet (Bálint &
Bucko, 2013; Chandra & Calderon, 2005; Anil K. Jain, Nandakumar, & Ross, 2016; Uludag,
Pankanti, Prabhakar, & Jain, 2004). Resolving biometric technology issues in it-self is a
separate research area, and researchers are actively working in this field (Abate, Marcialis,
Poh, & Sansone, 2019; Arutyunov & Natkin, 2010; Baichoo et al., 2018; P.Down & J.Sands,
2004).
3. Aadhaar – The Indian Case Study
In 2009, Government of India came up with a proposal to provide every citizen of India a
Unique Identification which can be used to provide benefits of various government schemes
to desirable citizen directly. Considering the fact that India is the second most populous
country in the world it was extremely vital to use some technology which can effectively and
efficiently serve the purpose. With continuous improvement in accuracy and reliability of
biometric technology, it was one of the best options available for identifying people uniquely.
The primary purpose for rolling out Aadhaar was (a) to ensure proper utilization of
government subsidies (b) to provide a unique identity to every citizen of India which can be
accepted as identity and address proof throughout India (c) to tackle illegal immigrants (Dass,
2011; Ronald, Elizabeth, Noopur, & Neil, 2017; Zelazny, 2012). Technological architecture
of UIDAI is shown in Fig 2. For the implementation of Aadhaar, it was very vital to have a
mechanism that can deal with duplicates, be time efficient, scalable and should be feasible to
integrate with other existing systems like Public Distribution Systems (PDS). The
Biometric Committee was constituted which presented its report (Zelazny, 2012) to UIDAI.
Finally, demographic details, photograph, fingerprints of 10 fingers, and iris of both eyes
were included as necessary data inputs for the issuance of unique Aadhaar number (UIDAI,
2009). Rolling out an identity system which could suffice such a heterogeneous population
was a big challenge for UIDAI. Aadhaar was launched with the intention to provide legal
identity to the residents of the country so that they could avail various welfare benefits which
they were denied earlier because of the lack of official identity documents. In addition to that,
it was also intended to reduce corruption, reduce intermediation and agency costs, avoid
identity related frauds and most importantly to increase participation of people in various
It can be observed from the Table 2 that no single biometric technique can out-perform
others in all factors and hence a combination of biometric technologies is required based on
illustrated in Table 2. Our exploratory study indicated that biometrics used in Aadhaar -
Photograph, Finger-print, and Iris, complement each other in all factors. It indicates that
Aadhaar has required biometrics in place to deal with de-duplication, scalability, and
Where, FK = Foreign Key, PK = Primary Key, PDS = Public Distribution System, POS = Point of
Sale, RDPR = Rural Development and Panchayath Raj, and PAN = Permanent Account Number
India is the only country with such a large scale for national identification of its citizens
(exceeding 1 billion) through Aadhaar. As of February 2019, more than 1.2 billion citizens
out of 1.3 billion have enrolled under Aadhaar (UIDAI, 2019). Notably, India is not the only
country to implement national identification program, some of the other countries as shown
in Table A.1 have similar identification programs like Aadhaar although their purpose varies.
4. Research objectives
The utility, design and governance of digital identity system is an emerging area of research
which has not been studied much (McKinsey, 2019). Development, governance and
implementation of e-ID for public e-service delivery is quite challenging and requires a lot
coordination (Melin, Axelsson, & Söderström, 2016). Some Journals have published special
issues specifically for electronic identity and eGovernment related research covering the
multi-dimensional perspectives of e-IDs and its challenges and applications (Gal & Whitley,
2011; Irani et al., 2016; Meier & Terán, 2019; Whitley, Gal, & Kjaergaard, 2014). In
(Lentner & Parycek, 2016), authors have examined different legislative approaches adopted
government eGovernment services, similarly, (Seltsikas & O’Keefe, 2010) studied challenges
Karlsson, & Söderström, 2016) identified usability, attitude, behavior and privacy concerns
To the best of our knowledge, there is no such study found in the literature which has tried to
prioritize the attributes of any biometric identity project like Aadhaar and their
interdependence with each goal. Majority of the research on Aadhaar explores the application
side of it, e.g., electronic voting, payment systems, continuous verification of online exams,
financial inclusion, healthcare sector and in government welfare schemes. Therefore, the
motivation for this research is to analyze Aadhaar project from design and implementation
• To establish how these goals are linked to each other in meeting the overarching
This study contributes to three perspectives. First, it prioritizes the attributes of Aadhaar
for each goal based on the expert opinion. It gives us an opportunity to uncover how Aadhaar
project was approached during its incremental implementation phase which led to its
successful implementation. This study could act as a reference for implementation of similar
method on a real world, highly complex group decision-making problem. This study could be
used as a valuable case for the validation of BWM on real-world decision problems involving
more than a single decision maker. Further, the results of BWM is again verified by TISM
and MICMAC methodologies for identifying consistency in results. The case study highlights
how such an approach can be effectively used for prioritization and decision making, for
Thirdly, from theoretical perspective, DT for digital identity system is integrated with
CSF for a better understanding of digital identity systems. Both these theories are well
explained in the literature as mentioned in the introduction section and in the section for
theory development.
5. Theoretical lens
Theories like Deferred Action Theory (DAT), systems theory, and stakeholder theory are
options available that could have been used in this study, but DT is chosen over others
DAT is relatively new as compared to DT. The basic building blocks of DAT are
planned action, emergence, and deferred action (Schneberger, 2012). It helps to discover the
impact of emergence on the company and system design (Patel, 2007). DAT is suitable for
conceptualizing systems that are operating in a dynamic neighborhood and thereby causing
systems and organizations to be emergent (Patel & Hackney, 2010). DAT is relevant and
could have been used in this study as the primary theoretical lens but DT is preferred over
DAT because the researchers across specializations have widely accepted the former one
when stable systems are planned. Moreover, this study analyses an existing systems rather
than conceptualizing a new non-existent system and the possibility to evaluate a product and
elements in a system (Daniël F M Strauss, 2002; Von Bertalanffy, 1956). Systems theory and
its variants have been widely applied in various research areas like personality development
(Millová & Blatný, 2015), motivational development (M.E. Schneider, 2001; Marianne E.
(Champion, Kuziemsky, Affleck, & Alvarez, 2019; Clacy, Goode, Sharman, Lovell, &
Zahra Mansoor & Williams, 2018), and marketing (Mele, Pels, & Polese, 2010). Systems
theory does not provide a sophisticated mechanism to identify the problems that designers
may encounter (Buchanan, 2019). The theory is based on the assumption that a system is
composed of the entities that interact with one another, which in turn depicts a system as a
self-regulating entity. The focus of this study is to analyze the development and
implementation of Aadhaar which is not the main focus of systems theory and this does not
make systems theory a best choice for this study as compared to DT.
Further, Stakeholder Theory (ST) is a proven and widely applied theory in various
areas of research for focusing on groups which are vital to the survival of the organization
(Freeman, 1999; Stieb, 2009; Schneberger, 2012; Singh, Kar, & Ilavarsana, 2017). The
the literature (Knol, Janssen, & Sol, 2015; Brooks, Janssen, & Papazafeiropoulou, 2018;
Janssen & Estevez, 2013; Singh et al., 2017). ST is relevant in the context of this study and
could be used as a central theoretical lens, but because the main focus of this study is to
analyze the design and implementation process of Aadhaar explicitly, we have strictly
restricted our analysis to single stakeholder category that is primarily responsible for the
development and implementation of Aadhaar. While extending this study, we will be taking
multiple stakeholders into consideration like citizens, NGOs, and other public and private
sector participants.
This study attempts to validate the Aadhaar biometric identity system through the lens of DT.
DT is often applied to both processes and/or products (Gregor & Jones, 2007). In this
research we have used the lens of information systems DT (Walls, Widmeyer, & El Sawy,
DT is a widely accepted and implemented theory (Hatchuel et al., 2016). DT focuses on the
importance of early stakeholder engagement (Liedtka, King, & Bennett, 2013). It evaluates
and examines design as a concept and enables us to verify if the product and the process
practical by (Goldkuhl, 2004), principle based by (Markus, Majchrzak, & Gasser, 2002)
,basis for action by (Gregor & Jones, 2007) and dualist construct by (Simon, 1996; Walls et
al., 1992). Walls divided DT for information systems into two major components “Design
Product” and “Design Process” and defined DT for information systems as “a prescriptive
theory based on theoretical underpinnings which says how a design process can be carried out
In this study we have applied DT to analyze the process of developing a digital identity
system in India. Purpose of understanding and breaking down the whole developmental
process of Aadhaar using the DT is to validate the approach adopted which in turn will be
beneficial for the countries that might consider Aadhaar as a reference to build their own
implemented digital identity system –Aadhaar. Theoretical approach stresses upon “why” and
“how” aspects of the system components. Meta-requirements justifies why a particular goal is
important and meta-design explains how to achieve a particular goal with the help of design
and execution choices. Components of digital identity DT using CSFs are shown in Fig 4.
Identification of vital parameters in Aadhaar system is studied through CSF theory approach.
Data was collected from the existing academic research articles, official reports from UIDAI,
news articles, and from experts who were directly involved with the Aadhaar project right
from the beginning. Focus was to cover all the preliminary goals of Aadhaar no matter how
Critical success factors theory: Our research is rightly placed within the theory of CSF.
CSF theory is defined as “the limited number of areas in which results if they are satisfactory
will ensure successful competitive performance for the organization”. CSFs were originally
defined by (Boynton & Zmud, 1984) as “those few things that must go well to ensure
success”. For any large project, the most tedious and challenging tasks are to take right
decisions at right time, without taking any risk for granted. The implementation of CSF
theory enables to facilitate stakeholders to focus on the significant factors that could lead to
achieve a desired goal successfully (Bai & Sarkis, 2013). Thus any initiative taken by an
organization must ensure that the performance of critical factors remains high or else there is
papers related to digital identity across economies from the Scopus database. Apart from
research articles, we also considered official reports from government especially UIDAI and
news articles published by some of the leading online news portals. A total of forty
preliminary goals were identified that are refined regrouped, renamed and classified into
fourteen generic themes out of which nine were selected as CSFs (these form the Meta-
requirements) by experts (see Table A.2). Initial classification was done by the authors based
on their experience and understanding of literature and classified forty preliminary goals into
fourteen themes. Out of fourteen themes, nine were selected by experts after building
consensus for the same in three iterations. The final nine accepted labels are shown in Table
A.2 in appendix section, and are used for further analysis and address our first research
objective i.e. to identify CSFs of Aadhaar. The overall research roadmap is shown in Fig. 3
below.
Fig. 3. Research roadmap to identify CSFs of Aadhaar
It identifies the list of goals on which theory is applied. For the identification of goals
literature review is done that resulted into an extensive list of objectives which was then
refined i.e. duplicates were removed, similar ones were combined, and loosely related ones
were dropped from the final list based on expert opinion. From the initial forty preliminary
objectives, nine goals were shortlisted using CSF theory. These nine goals form meta-
choices and execution choices. It was observed that some of the design choices are related to
execution choices on each meta-requirement is shown in Table A.8 in appendix section. The
design and execution choices focus on three aspects of implementation i.e., operational part
the set of technologies needed in the system and social aspect focusing on the societal
parameters that play a vital role in the acceptance and effectiveness of the system.
design choices were made during the tenure of Aadhaar system. The set of design choices
were identified from the extensive literature review and verified by the experts before
processing it further in the study. Design choices ensure that corresponding to each meta-
that some of the choices are common in design and execution choices of meta-design (see
Table A.8 in appendix). The relation between design and execution choices is many-to-many.
Fig. 4. Components of Digital Identity DT Using CSFs
Aadhaar digital identity system is tested in two phases. Based on the meta-requirements and
meta-design, UIDAI in 2010 conducted a proof-of-concept study in the three states of India
i.e. Bihar, Karnataka, and Andhra Pradesh. This helped in identifying the lacunas in the initial
version of the scheme. The gaps identified in critical areas like workflow, policy, and system
design were addressed in the modified version of scheme and then launched in other parts of
the country with corrective measures in place (Zelazny, 2012). Prototyping is considered as a
good low-cost tool to gain design information in the early part of design process (HALL,
2001). Another signal depicting successful implementation of Aadhaar could be that more
than 20 countries are keen to implement Aadhaar and its underlining technology for its
citizens (OECD, 2018). We tried to summarize impact of Aadhaar corresponding to its goals
and understand if intended goals of Aadhaar are being achieved in practice or not. Evidences
suggest that goals are being achieved to a larger extent but there are some cases were
progress is still slow. List of evidences corresponding to each goal are shown in Table 3 and
literature on Aadhaar. We searched for “Aadhaar” keyword on Scopus which is the largest
peer-reviewed database. Only journal articles were taken into consideration and a total of 76
articles were retrieved out of which 38 articles were found relevant for the study. Authors
classified 38 articles manually into three categories based on whether article is in support (17
studies), against (15 studies) or neutral (6 studies) towards the Aadhaar project.
6. Research Methodology
This study adopted focus group methodology to identify the confidence levels between the
over-all objectives, design, and execution of Aadhaar project as it is cost effective (Morgan,
1996) and time efficient (Caroline Tynan & Drayton, 1988) in case of in-depth information
retrieval about a particular topic is needed. FGD is very useful when there is not much
research literature available on a particular topic (Krueger & Casey, 1994), which holds true
for this study. Focus group methodology also known as group interviews is a well-known
interactive and systematic technique for receiving the opinion of experts on particular issues.
It has been used in the various domains like supply chain management (Lambert & Enz,
2017), smart city selection (Kumar, Singh, & Gupta, 2018), business communication
(Hartman, 2004), information systems (Burgess, 2010), and logistics (Coule, 2013;
O.Nyumba, Wilson, Derrick, & Mukherjee, 2018). FGD is an amalgamation of people from
similar backgrounds or experiences together to discuss a particular topic. It falls under the
qualitative research category where questions are asked based on the perception, beliefs,
opinions or ideas. All members of FGD are free to talk with each other and have discussion
based communication. Typically the number of people in a group varies from 6 to 12 people
In this study, an eight-member focus group was formed, each related to Aadhaar project
directly and having more than fifteen years of experience in developing and implementing
eGovernment projects. The eight experts ranging from senior management professionals,
involved in identifying the CSFs of Aadhaar. Identified factors were filtered and validated by
the experts, and the final list of CSFs was selected based on the consensus of all the experts.
Details of the focus group members are shown in appendix section A.2. Since it was not
feasible to arrange a face-to-face meeting with all the group members (many of who were
MCDM Methods
Since this study is based on the evaluation of multiple criteria's for making a final decision,
we should use some MCDM method. There have been various MCDM methods applied in
the literature (Triantaphyllou, 2013) (Wang, Chen, & Richards, 2018) (Kubler, Robert,
Neumaier, Umbrich, & Le, 2018). MCDM allows us to evaluate numerous criteria with
varying weights. From the literature, we found multiple MCDM methods being proposed and
their applicability in various sectors. Each MCDM method has its own advantages and
disadvantages. In Table A.3 we tried to summarize some of the commonly used MCDM
methods which could also have been used in our study. We mainly focused on preferred
Many MCDM methods are available among those we choose recently developed MCDM
know as Best-Worst Method (Rezaei, 2015, 2016). The reason to choose BWM is because it
produces more consistent results, requires fewer data points, does not rely on complete
pairwise comparison matrix like AHP and has sophisticated pairwise comparison procedure
(Rezaei, 2015). It is also believed by the decision makers that, BWM is very close to how
they actually process and make decisions in real life scenario. Because of its simplicity and
capability to produce consistent results, this method has been used in many problems like
exchange (Kaa, Janssen, & Rezaei, 2018), supplier classification (Torabi, Giahi, &
Sahebjamnia, 2016), risk assessment (Torabi et al., 2016) innovation management (Gupta &
Barua, 2016) supply chain management (Badri Ahmadi, Kusi-Sarpong, & Rezaei, 2017; Wan
Ahmad, Rezaei, Sadaghiani, & Tavasszy, 2017) , logistics performance measurement
(Rezaei, Roekel, & Tavasszy, 2018), measurement of research and development performance
(Salimi & Rezaei, 2018), and scientific output evaluation (Gupta & Barua, 2016).
Based on the academic literature and official government reports published by UIDAI from
time to time, (Ronald et al., 2017; UIDAI, 2010; Zelazny, 2012) a list of nine over-arching
goals were identified. Inputs provided by the focus group were evaluated against these goals.
The complete list of identified goals is shown is Table 4 and explained in detail in appendix
section A.2.
In this study, multiple criteria which are vital for each goal were identified and BWM is
applied to compute weights of these criteria. Prioritization is done at two stages, first
corresponding to each goal its design and execution choices are prioritized which depicts the
importance of each criterion and second nine identified goals of Aadhaar are prioritized to
develop a final hierarchy of goals based on their significance making it easier to follow and
replicate. It will help in taking up the most important goal and then, based on their priority
order of design and execution choices could be followed to ensure success in implementation.
uniqueness goal in appendix section A.3. Similarly prioritization of each criteria for each goal
particular goal. Detailed results for remaining goals are added in the appendix section A.2.
prioritize the over-arching goals of Aadhaar. Here also BW method is used for prioritizing
these goals. From the Table 5 below it could be observed that out of nine goals Uniqueness
has the highest priority followed by Data Security and Privacy, Resident Convenience, Cost-
This prioritization could help in resource/budget allocation for each goal based on its
Further to verify our results, we used TISM Methodology for analyzing the
relationship among the goals; and MICMAC analysis to identify the driving and dependent
power of each goal. Idea is to check if computed priorities of goals are also supported by
TISM and MICMAC analysis or not. To keep it less textual we have used shorter labels for
goals and assigned code to each goal for computation as shown in Table A.4 in appendix.
6.1 TISM/ISM
Modeling – a process which is employed to transform unclear and ambiguous mental models
into clear visible models (Sushil, 2012). TISM tries to address the limitation of ISM by
answering one basic question of “why”. TISM and ISM has been widely used, (Kumar et al.,
2018) used it for choosing a city for smart city project, for food logistics (Shankar, Gupta, &
Pathak, 2018), (Shibin, Gunasekaran, & Dubey, 2017) used for explaining sustainable supply
chain performance, (Shukla & Mattar, 2019) used it to identify barriers in application of
Bigdata analytics based sustainable auditing system . In this study, it is used to prioritize the
goals of Aadhaar.
We have implemented TISM methodology elaborated by (Sushil, 2012) and (V. Jain
& Raj, 2015). The first phase in TISM is to identify and define elements whose priorities’ are
to be identified. Second, contextual relationships among factors are identified via pair-wise
comparisons. Third, interpretive logic – knowledge base is developed and each pair-wise
comparison is interpreted based on directional relations that operate in a given context by
answering interpretive query “A is of higher priority than B. All detailed matrix computations
are not shown in this paper as the purpose of applying TISM is to compare the results with
BWM.
In the next step, paired comparisons in the interpretive logic—knowledge base (see
Table A.9) are translated into initial reachability matrix. If the entry in knowledge base is “Y”
then corresponding cell in the reachability matrix is marked 1 or else 0. Once initial
reachability matrix is developed it is checked for transitivity property and finally converted
into final reachability matrix (Dubey & Ali, 2014; Sushil & Sushil, 2005). Transitivity
property means if p helps q and q helps r, then p helps r also. The final reachability matrix is
Next, factors are arranged into hierarchical form based on their ranking. Reachability
set (RS) and antecedent set (AS) corresponding to each factor is computed as shown in Table
A.6. Corresponding to each factor, intersection set (IS) is computed between RS and AS.
During iteration process if RS and IS are same for any factor then that factor is kept in the top
level of hierarchy. In the subsequent iterations, factors with levels assigned are removed from
the partition matrix and whole process is repeated for remaining factors. This iteration
process is continued till all factors are assigned a level (Warfield, 1974) and (Sushil, 2012).
appendix. In our case it took six iterations to determine the level of each element. The final
hierarchy model as shown in Fig 5. The TISM model indicates the prioritization and
could be seen from the hierarchy model that uniqueness is the most significant goal followed
by security and privacy (bottom level of the hierarchy means most significant whereas top
most level means least significant). Speed, cost and convenience are at the same level which
depicts they are of same importance followed by less significant one, inclusion which is rated
higher than platform. The final level of TISM model is shared by two least significant goals
results complement each other and are very similar. This similarity of results between BWM
6.2 MICMAC
MICMAC was evolved by Duperrin and Godet in 1973 (Hu, H.-Y, Chui, S.-I, Yen, 2009).
Based on the output of ISM methodology, it categorizes list of factors into four quadrants i.e.
drivers, linkages, dependents and autonomous. Each quadrant classifies factors based on their
position, which is identified by the driving and dependence power of a particular factor.
MICMAC and its variants have been used to solve different problems like identifying barriers
& Rees, 2019), identification of CSF for reusable plastic packing (Gardas, Raut, & Narkhede,
2019), categorization of critical infrastructure sectors in India (Narain, Gupta, & Ojha, 2014),
analysis of obstructions in the reduction of agri-food supply chain in India (Gokarn &
factors based on their driving and dependence power. Nine factors were categorized into
three categories. It was observed that F6 (Uniqueness) and F3 (Security and Privacy) possess
higher dependent power whereas F7 (Cost), F8 (Speed) and F9 (Convenience) form linkages
It differentiates between the set of goals based on their significance. From the Fig 6 above,
group of clusters is formed based on the driving and dependence strength of a particular goal.
Highest ranked goals in BW and TISM form driving factor category, and lowest ranked
goals form dependent factor category in MICMAC analysis whereas remaining goals form
linkage category. This way, MICMAC analysis also verifies the consistency, correctness and
8. Discussion
The success of any Biometric Identification Systems is related to the biometrics employed in
that system and how well they are performing. Purpose of the biometric system varies based
biometrics has been done based on (i) Functional utility (ii) Technical architecture and (iii) its
process flow. In the recent past, many countries have thought of having a unique
identification identity for its citizens for providing benefits to its citizens directly, some
countries have already implemented, and some are starting now. Considering the complexity
citizen identification at country level, a stringent action plan is needed to avoid any
unnecessary risks that might occur in the tenure of the project which could result in
substantial losses. To the best of our knowledge, we did not find any study in the literature
related to the prioritization of design and execution choices made during the development of
Fig 7 illustrates the final prioritization and classification hierarchy of digital identity goals.
High priority goals are labeled as drivers and less priority goals are labeled as dependents
whereas goals under linkage label have medium priorities. This prioritization could be very
helpful when implementing a biometric identification system from scratch as it depicts what
goals should be taken up first and what goals could be taken up in the later stages of the
project development.
8.1 Implications for theory
This study contributes to the theory on digital identity in a sense that it uses combination of
two theories to explain the phenomena of designing and developing a digital identity system.
This is for the first time that CSF and DT has been used together to explain the design and
development process of any digital identity system. The adoption of guidelines for
implementation and developmental cost of a typical digital ID scheme which is around £100-
250 million (Identity, 2018), in case of Aadhaar the total cost of Aadhaar project is INR
each decision beforehand with utmost importance such that no significant setbacks occur
afterwards. Having a sophisticated digital ID scheme in place could save £5-10 billion by
government schemes are complex and involve different actors, ambitions and perspectives
(Larsson & Grönlund, 2014). E-government schemes have multiple stakeholders, and it is
vital to give due diligence to their needs and aspirations right from the initial stages of the
project development such that the probability of project failure is minimized. Studies to
evaluate the significance of decisions taken during the design, development and
implementation phases with focus on stakeholder aspirations is said to have high impact in
the field of information and communication technology development. This study contributes
Social Construction of Technology (SCOT) study on Aadhaar (Sivamalai, 2013), that tries to
explain how perception of different stakeholders vary about Aadhaar based on the SCOT
framework. The result of this study not only supports the concept of stakeholder involvement
during e-governance project development but also suggests that the development and
highlighted that confidentiality must be enforced over enrolment (this study found security
and privacy as second most important goal) (Belanche-gracia, Casaló-ariño, & Pérez-rueda,
Failure of UK's National ID could be considered as a validity check for this research.
One of the primary reasons for scarping this project was its cost (Travis, 2010). UK
government spent around £4.5 billion from July 2002 to February 2010 on NID and had spent
£250 million on developing it. The price of a single ID card was £30 which was considered
too expensive. The significance of cost has been detrimental for National ID and this
significance is reflected in our research as well as cost is the fourth most important goal for
an identity system. Our study strengthens the understanding surrounding the factors which
impact the outcome of such digital identity projects, even in developed economies.
Considering the digital identity as domain, no such study was found from the literature which
has prioritized the goals of Aadhaar and decisions taken during design and development of
Aadhaar system. With a focus on identifying linkages among goals of Aadhaar and multiple
decisions evaluated during the design and implementation of the Aadhaar system, this study
The study is unique for its methodological contributions as well. From the research
methodology point of view, the main contribution of this study is the combination and
application of three different methodologies i.e. BWM, TISM and MICMAC, on a single
large scale project and to analyze the process and factors taken into consideration for decision
making in such a massive and critical national project. Also, the knowledge obtained through
the method and technique implemented for collecting data may be helpful in other studies on
analyzing large scale government initiatives. The integrated usage of three different
methodologies also ensures higher rigor in the methodology which brings more confidence
Overall findings from three different methods reveal that in an identity scheme
uniqueness of an entity and privacy and security of individual’s data is of utmost importance
and is the main driving factors of the whole scheme. The inclusion of entire population,
building identity project as a platform rather than a single standalone system, making project
as and when needed are those objectives which are vital in an identity system but could be
taken up in later stages of the project development. These four objectives are highly
dependent on drivers and linkages, and hence it is logical to focus on drivers and linkages
first as shown in prioritization hierarchy diagram. Linkages which comprise of cost, speed
and convenience act as intermediaries between drivers and dependent factors and have higher
priority than dependents. Based on the results we recommend to follow priority order
however in case of linkages, three objectives, i.e. cost, speed and convenience could be
Aadhaar has received much attention across the globe ever since UN recommended to
provide the legal identity for all in its SDG 16 (UNGA, 2016). Aadhaar being a massive
biometric project at present with more than 1.2 billion Aadhaar numbers issued, it has
become a system which other countries may contemplate replication while implementing a
biometric digital identity system. To start any such critical mega-project requires a lot of
planning while focusing on budget estimation, implementation policy, and development plan
and to identify various types of risks associated with the project at each stage. For developing
nations, it may not be feasible to reinvent the wheel and conduct this analysis because of
time, budget and expertise constraints. This research is intended to contribute in this space by
bringing out both design and implementation factors for public policy makers of future digital
identity systems. It will act as a reference for all those nations who are working on UN’s
SDG 16 for providing legal identity to all its individuals. It will be helpful in taking up a
priority tasks. It will help concerned nations to save significant amount of time and money
which otherwise would have been mandatory for conducting a pre-launch analysis. It will
also enable governments to identify different types of risks associated at various stages of
program and will allow them to have mitigation measures thereby increasing chances of
having a successful, efficient project in place. In this study, we have shown how important
each criterion is for accomplishing a particular goal. We also found how priority of same
criterion varies among different goals. Further, we also illustrated through a case study on
9. Conclusion
We conclude our study of prioritizing goals of Aadhaar by verifying our results with the help
of two more methodologies- TISM and MICMAC analysis. Original prioritization results are
also supported by both TISM and MICMAC results which further strengthen our findings.
Digital identities, in general, have the capacity for both bliss and misery. A well planned
digital identity system, having necessary measures in place that can address issues like
security, privacy, inclusion and citizen empowerment could unfold remarkable economic
values. In this work, we conducted a detailed study to identify the primary goals that are must
for any biometric identification system. India's biometric identification program- Aadhaar has
been used as a case study and has been analyzed from the perspective of DT in this study.
After prioritizing design goals of Aadhaar using Best-Worst Method and verified using TISM
and MICMAC, it was observed that three clusters of goals were formed. All three clusters are
critical for any biometric identification program but with varying priorities. First cluster (i.e.
drivers) has the highest priority and must be dealt on priority in the initial stages of the
program, second cluster (i.e. linkages) is the second most significant one and could be taken
right after the first cluster, and third cluster (i.e. dependents) which has comparatively less
priority as compared to drivers and linkages and could be taken up in the later stages of the
program development. This study also tests the application of BWM method on a real-world
Since this research is limited to only one case study –Aadhaar, we do not claim priorities
of goals as an absolute one. We hope to inspire researchers across the world to conduct
similar studies on other national biometric identity projects and develop a universal
prioritization hierarchy. Future research direction is to verify the prioritized goals on some
more existing biometric identification system and use the results of prioritization in designing
the real-world biometric identification system. Also, security and privacy have emerged as
the second most crucial goal in this study. However, frequent complaints related to the
security and privacy of Aadhaar highlights that something is still lacking. This gap could be
Funding
This research did not receive any specific grant from funding agencies in the public,
References:
Abate, A. F., Marcialis, G. L., Poh, N., & Sansone, C. (2019). Introduction to the special
https://doi.org/10.1016/j.patrec.2019.07.004
Agogué, M., & Kazakçi, A. (2014). 10 Years of C–K Theory: A Survey on the Academic and
6338-1_11
Agrawal, S., Banerjee, S., & Sharma, S. (2017). Privacy and Security of Aadhaar : A
Akhtar Shareef, M., Kumar, V., Kumar, U., & Dwivedi, Y. (2014). Factors affecting citizen
Anil, K. J., & Sharathchandra, P. (2001). A Touch of Money. IEEE Spectrum, 4123(March),
1–9.
Anthopoulos, L., Reddick, C. G., Giannakidou, I., & Mavridis, N. (2016). Why e-government
Arutyunov, V. V., & Natkin, N. S. (2010). Comparative analysis of biometric systems for
https://doi.org/10.3103/S0147688210020012
Badri Ahmadi, H., Kusi-Sarpong, S., & Rezaei, J. (2017). Assessing the social sustainability
of supply chains using Best Worst Method. Resources, Conservation and Recycling,
Bai, C., & Sarkis, J. (2013). A grey-based DEMATEL model for evaluating business process
Baichoo, S., Heenaye-Mamode Khan, M., Bissessur, P., Pavaday, N., Boodoo-Jahangeer, N.,
& Purmah, N. R. (2018). Legal and ethical considerations of biometric identity card:
Case for Mauritius. Computer Law & Security Review, 34(6), 1333–1341.
https://doi.org/10.1016/j.clsr.2018.08.010
Bálint, T., & Bucko, J. (2013). Comparative Analysis of Handwritten, Biometric and Digital
https://data.worldbank.org/indicator/SP.POP.TOTL
BankWorld. (2016). World Development Report 2016: Digital Dividends. The World Bank.
https://doi.org/10.1596/978-1-4648-0671-1
Barnwal, P. (2015). Curbing Leakage in Public Programs with Direct Benefit Transfers
Evidence from India ’ s Fuel Subsidies and Black Markets. Working Paper, (November
2014).
BBC News. (2002). Doubt cast on fingerprint security. Retrieved December 20, 2017, from
http://news.bbc.co.uk/2/hi/science/nature/1991517.stm
service smartcard success for smart cities development : A study based on citizens ’
https://doi.org/10.1016/j.giq.2014.12.004
Bergeron, F., & Bégin, C. (1989). The Use of Critical Success Factors in Evaluation of
111–124. https://doi.org/10.1080/07421222.1989.11517842
Bouchrika, I. (2017). A Survey of Using Biometrics for Smart Visual Surveillance: Gait
Boynton, A., & Zmud, R. (1984). An Assessment of Critical Success Factors. Sloan
Bredillet, C., Tywoniak, S., & Tootoonchy, M. (2018). ScienceDirect Why and how do
https://doi.org/10.1016/j.ijproman.2018.04.001
Buchanan, R. (2019). Systems Thinking and Design Thinking: The Search for Principles in
the World We Are Making. She Ji: The Journal of Design, Economics, and Innovation,
Burgess, S. (2010). The Use of Focus Groups in Information Systems Research. The
https://doi.org/10.18848/1833-1882/CGP/v05i02/51567
GUIDE FOR FIRST‐TIME USERS. Marketing Intelligence & Planning, 6(1), 5–9.
https://doi.org/10.1108/eb045757
Chandra, A., & Calderon, T. (2005). Challenges and Constraints to the Diffusion of
Coule, T. (2013). Theories of knowledge and focus groups in organization and management
Dixon, P. (2017). A Failure to Do No Harm – India ’ s Aadhaar biometric ID program and its
inability to protect privacy in relation to measures in Europe and the U . S . Health and
Technology. https://doi.org/10.1007/s12553-017-0202-6
Dubey, R., & Ali, S. S. (2014). Identification of flexible manufacturing system dimensions
and their interrelationship using total interpretive structural modelling and fuzzy
https://doi.org/10.1007/s40171-014-0058-9
Elkadi, H. (2013). Success and failure factors for e-government projects: A case from Egypt.
Epstein, C. (2008). Embodying Risk:Using Biometrics To Protect the Borders. In Risk and
https://www.academia.edu/2420067/_Embodying_Risk_Using_Biometrics_to_Protect_t
he_Borders_in_L_Amoore_and_M_de_Goede_ed._2008_Risk_and_the_War_on_Terro
r_Routledge_London
Esfahlan, E. H., & Valilai, O. F. (2019). A Knowledge Oriented Framework to Enable New
Models. In 2019 15th Iran International Industrial Engineering Conference (IIIEC) (pp.
Fenu, G., Marras, M., & Boratto, L. (2018). A multi-biometric system for continuous student
https://doi.org/10.1016/j.patrec.2017.03.027
Gal, U., & Whitley, E. A. (2011). Special Issue on Information Systems, Identity and
Gardas, B. B., Raut, R. D., & Narkhede, B. (2019). Identifying critical success factors to
facilitate reusable plastic packaging towards sustainable supply chain management.
https://doi.org/10.1016/j.jenvman.2019.01.113
Gelb, A., & Clark, J. (2013). Performance Lessons from India ’ s Universal Identification
http://mospi.nic.in/sites/default/files/publication_reports/ElderlyinIndia_2016.pdf
Gokarn, S., & Kuthambalayan, T. S. (2017). Analysis of challenges inhibiting the reduction
https://doi.org/10.1016/j.jclepro.2017.09.028
https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1127&context=jitta
Gregor, S., & Jones, D. (2007). The Anatomy of a Design Theory. Journal of the Association
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.232.743&rep=rep1&type=pdf
Gupta, H., & Barua, M. K. (2016). Identifying enablers of technological innovation for Indian
https://doi.org/https://doi.org/10.1016/j.techfore.2016.03.028
professional eID card within health care. Transforming Government: People, Process
Hoang, B., & Caudill, A. (2012). Biometrics. IEEE Emerging Technology Portal, 1–3.
Hodeghatta, U., & Nayak, R. (2014). Physical Security and Biometrics. In The InfoSec
4302-6383-8_14
Howlett, M. (2014). From the ‘old’ to the ‘new’ policy design: design thinking beyond
https://doi.org/10.1007/s11077-014-9199-0
Hu, H.-Y, Chui, S.-I, Yen, T.-M. (2009). Modified IPA for order-winner criteria
Identity, I. (2018). Digital Identity in the UK : The cost of doing nothing, (April).
Ilie-Zudor, E., Kemény, Z., van Blommestein, F., Monostori, L., & van der Meulen, A.
https://doi.org/10.1016/j.compind.2010.10.004
Irani, Z., Kamal, M., Axelsson, U. M., Karin, Wihlborg, E., & Janssen, M. (2016). Editorial.
https://doi.org/10.1108/TG-01-2016-0009
https://www.iso.org/standard/57914.html
ITU-T. (2010). X.1252 - Baseline identity management terms and definitions. Itu-T X-Series
Recommendations Data Networks, Open System Communications and Security, ITU-T
X.1252 (04/2010).
Jain, A K, Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE
https://doi.org/10.1109/TCSVT.2003.818349
Jain, Anil K., Nandakumar, K., & Ross, A. (2016). 50 years of biometric research:
105. https://doi.org/10.1016/j.patrec.2015.12.013
Jain, V., & Raj, T. (2015). Modeling and analysis of FMS flexibility factors by TISM and
Kaa, G. Van De, Janssen, M., & Rezaei, J. (2018). Technological Forecasting & Social
success factors for standard dominance using the Best Worst Method. Technological
https://doi.org/10.1016/j.techfore.2018.07.041
Krueger, R., & Casey, M. (1994). Focus Groups: A Practical Guide for Applied Research.
Sage Publications.
Kubler, S., Robert, J., Neumaier, S., Umbrich, J., & Le, Y. (2018). Comparison of metadata
quality in open data portals using the Analytic Hierarchy Process. Government
Kumar, H., Singh, M. K., & Gupta, M. P. (2018). A policy framework for city eligibility
analysis: TISM and fuzzy MICMAC-weighted approach to select a city for smart city
transformation in India. Land Use Policy, 82(February 2018), 375–390.
https://doi.org/10.1016/j.landusepol.2018.12.025
Lambert, D. M., & Enz, M. G. (2017). Issues in Supply Chain Management: Progress and
https://doi.org/10.1016/j.indmarman.2016.12.002
Laurent, M., & Bouzefrane, S. (2015). Digital Identity Management. ISTE Press and
Elsevier. https://doi.org/10.1007/978-3-319-08231-8
Le Masson, P., Hatchuel, A., Le Glatin, M., & Weil, B. (2019). Designing Decisions in the
https://doi.org/10.1111/emre.12289
Lentner, G. M., & Parycek, P. (2016). Electronic identity (eID) and electronic signature
2013-0047
Li, X., Sun, S. X., Chen, K., Fung, T., & Wang, H. (2015). Design Theory for Market
https://doi.org/10.1080/07421222.2015.1063312
Markus, M. L., Majchrzak, A., & Gasser, L. (2002). A Design Theory for Systems That
https://doi.org/https://doi.org/10.1016/S0969-4765(06)70592-6
May, P.J. (2003). Policy design and implementation. In Handbook of public administration
(p. 233).
http://ccmrm.org/wp-content/uploads/2015/05/McKinsey-2010-inclusive-growth-
report.pdf
inclusive-growth.ashx
Mcwaters, R. J. (2016). A Blueprint for Digital Identity The Role of Financial Institutions in
Building Digital Identity. World Economic Forum, Future of Financial Services Series,
http://www3.weforum.org/docs/WEF_A_Blueprint_for_Digital_Identity.pdf
Meier, A., & Terán, L. (2019). Special Issue on eGovernment Research, Management, and
Innovation.
Melin, U., Axelsson, K., & Söderström, F. (2016). Managing the development of e-ID in a
public e-service context. Transforming Government: People, Process and Policy, 10(1),
72–98. https://doi.org/10.1108/TG-11-2013-0046
Narain, A., Gupta, M. P., & Ojha, A. (2014). Identifying critical infrastructure sectors and
NIST. (2013). Standards for Biometric Technologies. Retrieved July 21, 2019, from
https://www.nist.gov/speech-testimony/standards-biometric-technologies
O.Nyumba, T., Wilson, K., Derrick, C. J., & Mukherjee, N. (2018). The use of focus group
210X.12860
government/India-case-study-UAE-report-2018.pdf
https://plato.stanford.edu/entries/identity-personal/
https://doi.org/10.1155/2017/7129505
Phillips, P. J., Flynn, P. J., & Bowyer, K. W. (2017). Lessons from collecting a million
https://doi.org/https://doi.org/10.1016/j.imavis.2016.08.004
Pluchinotta, I., Kazakçi, A. O., Giordano, R., & Tsoukiàs, A. (2019). Design Theory for
https://doi.org/10.1121/1.1918467
Rana, N. P., Barnard, D. J., Baabdullah, A. M. A., & Rees, D. (2019). International Journal of
Rana, N. P., Dwivedi, Y. K., & Williams, M. D. (2013). Analysing challenges, barriers and
CSF of egov adoption. Transforming Government: People, Process and Policy, 7(2),
177–198. https://doi.org/10.1108/17506161311325350
Rezaei, J., Roekel, W. S. Van, & Tavasszy, L. (2018). Measuring the relative importance of
the logistics performance index indicators using Best Worst Method. Transport Policy,
Ronald, A., Elizabeth, S. B., Noopur, S., & Neil, S. B. (2017). State of aadhaar report 2016-
17.
Salimi, N., & Rezaei, J. (2018). Evaluating firms’ R&D performance using best worst
https://doi.org/10.1016/j.evalprogplan.2017.10.002
Segovia, A. I., Álvaro, D., & Enríquez, M. (2018). Digital Identity : the current state of
Seltsikas, P., & O’Keefe, R. M. (2010). Expectations and outcomes in electronic identity
management: the role of trust and public value. European Journal of Information
Systems, 19(1), 93–103. https://doi.org/10.1057/ejis.2009.51
Shah, M. H., Braganza, A., & Morabito, V. (2007). A survey of critical success factors in e-
Shankar, R., Gupta, R., & Pathak, D. K. (2018). Modeling critical success factors of
traceability for food logistics. Transportation Research Part E, 119(August 2017), 205–
222. https://doi.org/10.1016/j.tre.2018.03.006
Shibin, K. T., Gunasekaran, A., & Dubey, R. (2017). Explaining sustainable supply chain
https://doi.org/10.1016/j.spc.2017.06.003
Shukla, M., & Mattar, L. (2019). Computers & Industrial Engineering Next generation smart
sustainable auditing systems using Big Data Analytics : Understanding the interaction of
https://doi.org/10.1016/j.cie.2018.04.055
Simon, H. A. (1996). The Sciences of the Artificial (Third edit). London: MIT Press.
Retrieved from
https://monoskop.org/images/9/9c/Simon_Herbert_A_The_Sciences_of_the_Artificial_3
rd_ed.pdf
Singh, S., Cabraal, A., Demosthenous, C., Astbrink, G., & Furlong, M. (2007). Password
SIGCHI conference on Human factors in computing systems - CHI ’07 (p. 895). New
Sivamalai, L. (2013). Using the lens of “social construction of technology” to understand the
design and implementation of aadhaar (UID) project. IFIP Advances in Information and
0_45
Spagnoletti, Paolo, Resca, A., & Lee, G. (2015). A design theory for digital platforms
Sushil. (2012). Interpreting the interpretive structural model. Global Journal of Flexible
Sushil, & Sushil. (2005). Interpretive Matrix: A Tool to Aid Interpretation of Management
and Social Research. Global Journal of Flexible Systems Management, 6(2), 27–30.
Torabi, S. A., Giahi, R., & Sahebjamnia, N. (2016). An enhanced risk assessment framework
https://doi.org/https://doi.org/10.1016/j.ssci.2016.06.015
https://doi.org/10.1038/197938a0
Travis, A. (2010). ID cards scheme to be scrapped within 100 days. The Guardian Weekly.
scrapping-id-cards
UIDAI. (2009). Biometrics Design Standards For UID Applications. Retrieved from
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.189.2453&rep=rep1&type=pd
UIDAI. (2010). UIDAI Strategy Overview Creating a Unique Identity Number for Every
https://uidai.gov.in/aadhaar_dashboard/
Uludag, U., Pankanti, S., Prabhakar, S., & Jain, A. K. (2004). Biometric cryptosystems:
https://doi.org/10.1109/JPROC.2004.827372
https://www.un.org/sustainabledevelopment/peace-justice/
https://www.un.org/development/desa/disabilities/envision2030-goal16.html
https://medium.com/karana/aadhaar-enrolment-costs-bc17f0d30018
Walls, J. G., Widmeyer, G. R., & El Sawy, O. A. (1992). Building an Information System
Design Theory for Vigilant EIS. Information Systems Research, 3(1), 36–59.
https://doi.org/10.1287/isre.3.1.36
Wan Ahmad, W. N. K., Rezaei, J., Sadaghiani, S., & Tavasszy, L. A. (2017). Evaluation of
the external forces affecting the sustainability of oil and gas supply chain using Best
https://doi.org/https://doi.org/10.1016/j.jclepro.2017.03.166
Wang, D., Chen, C., & Richards, D. (2018). A prioritization-based analysis of local open
https://doi.org/10.1016/j.giq.2018.10.006
Whitley, E. A., Gal, U., & Kjaergaard, A. (2014). Who do you think you are? A review of the
https://doi.org/10.1080/13645579.1998.10846874
Zelazny, F. (2012). The Evolution of India ’ s UID Program Lessons Learned and
Implications for Other Developing Countries CGD Policy Paper 008, (August).