Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3025453.3025910acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

From Margins to Seams: Imbrication, Inclusion, and Torque in the Aadhaar Identification Project

Published: 02 May 2017 Publication History

Abstract

Problems of marginalization and inclusion are central to HCI scholarship and impact in the world, but are badly named in the binary models of access that currently dominate the field. Building on prior work in ICTD and infrastructure studies, this paper explores the problem of inclusion through historical and ethnographic study of Aadhaar, India's biometrics-based national identification project. We illustrate tensions between Aadhaar users' ability to register, authenticate and successfully deploy their registered identity to participate in the Public Distribution System (PDS), a government scheme that provides subsidized food grains to the Indian poor. We argue that rather than an all-or-nothing state, inclusion in ICTD infrastructures is an ongoing and fragile process, achieved (unevenly) at the seams of multiple interconnected systems. Finally, we show that questions of (effective) inclusion are determined not just at margins of a system (who is in and who is out) but also through the artful and often challenging negotiation of the seams that run through and connect complex distributed infrastructures.

References

[1]
Syed Ishtiaque Ahmed, Nusrat Jahan Mim, and Steven J Jackson. 2015. Residual Mobilities: Infrastructural Displacement and Post-Colonial Computing in Bangladesh. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, ACM, 437--446.
[2]
Ankita Anand and Nachiket Udupa. 2015. How to Get Married Without an Aadhaar Number. Caravan Magazine. Retrieved from http://www.caravanmagazine.in/vantage/how-get-married-without-aadhaar-number
[3]
Wiebe E. Bijker. 1995. Of Bicycles, Bakelites, and Bulbs: Toward a Theory of Sociotechnical Change. MIT Press, Cambridge, MA.
[4]
Geoffrey Bowker and Susan Leigh Star. 1999. Sorting Things Out: Classification and its Consequences. MIT Press, Cambridge, MA.
[5]
Keith Breckenridge and Simon Szreter (eds.). 2012. Registration and Recognition: Documenting the Person in World History (Proceedings of the British Academy). Oxford University Press, Oxford.
[6]
Sujata Chaturvedi. 2014. Resident Enrollment Process Version 2.2.1. Delhi. Retrieved from http://uidai.gov.in/images/mou/resident_enrolment_process_ver_2.2.1.pdf
[7]
Simon A Cole. 2001. Suspect Identities: A History of Fingerprinting and Criminal Identification. Harvard University Press, Cambridge, MA.
[8]
Paul DiMaggio, Esther Hargittai, Coral Celeste, and Steven Shafer. 2004. From Unequal Access to Differentiated Use: A Literature Review and Agenda for Research on Digital Inequality. In Social Inequality, Kathryn Neckerman (ed.). Russell Sage Foundation, New York, 355--400.
[9]
Jean Drèze. 2015. JAM and the Pursuit of Nirvana. The Wire. Retrieved from http://thewire.in/2015/11/06/jam-and-the-pursuit-of-nirvana-14873/
[10]
Paul N Edwards. 2003. Infrastructure and Modernity: Force, Time, and Social Organization in the History of Sociotechnical Systems. In Modernity and Technology, Thomas J Misa, Philip Brey and Andrew Feenberg (eds.). MIT Press, Cambridge, MA, 185--225.
[11]
Express News Service. 2013. Aadhaar gives hard time to postman. The New Indian Express. Retrieved from http://newindianexpress.com/cities/hyderabad/article1460030.ece
[12]
Graham Greenleaf. 2010. India's national ID system: Danger grows in a privacy vacuum. Computer Law & Security Review 26, 5: 479--491.
[13]
Rebecca E. Grinter, Michael L. Best, W. Keith Edwards, and Elizabeth D. Mynatt. 2010. Computing at the Margins: Report from NSF Sponsored Workshop. Atlanta, Georgia. Retrieved from http://www.computing-margins.org/
[14]
Ole Hanseth and Nina Lundberg. 2001. Designing Work Oriented Infrastructures. Computer Supported Cooperative Work (CSCW) 10, 3--4: 347--372.
[15]
Eszter Hargittai. 2002. Second-Level Digital Divide: Differences in People's Online Skills. First Monday 7, 4. Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/942/864
[16]
Richard Harper (ed.). 1998. Inside the IMF: An Ethnography of Documents, Technology and Organisational Action. Academic Press, New York.
[17]
Thomas P Hughes. 1983. Networks of Power. Electrification in Western Society, 1880--1930. The Johns Hopkins University Press, Baltimore/London.
[18]
Matthew S Hull. 2012. Documents and Bureaucracy. Annual Review of Anthropology 41, 1: 251--267.
[19]
Lilly Irani, Janet Vertesi, Paul Dourish, Kavita Philip, and Rebecca E Grinter. 2010. Postcolonial Computing: A Lens on Design and Development. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 1311--1320.
[20]
Reetika Khera. 2016. On Aadhaar Success, It's All Hype - That Includes The World Bank. NDTV. Retrieved from http://www.ndtv.com/opinion/yes-aadhaar-is-a-game-changer-in-wrecking-welfare-schemes-1434424
[21]
Martha Lampland and Susan Leigh Star. 2009. Standards and their Stories: How Quantifying, Classifying, and Formalizing Practices shape Everyday Life. Cornell University Press, Ithaca.
[22]
Brian Larkin. 2013. The Politics and Poetics of Infrastructure. Annual Review of Anthropology 42: 327--343.
[23]
Legal Correspondent. 2013. Final hearing on Aadhaar card on Oct. 22. The Hindu. Retrieved from http://www.thehindu.com/news/national/final-hearing-on-aadhaar-card-on-oct-22/article5214215.ece
[24]
Legal Correspondent. 2015. Supreme Court extends Aadhaar use to more schemes while saying it's purely voluntary. The Hindu. Retrieved from http://www.thehindu.com/news/national/aadhaar-purely-voluntary-says-supreme-court-but-extends-its-use-to-more-schemes/article7765893.ece
[25]
David Lyon. 2009. Identifying citizens: ID cards as Surveillance. Polity, Cambridge.
[26]
Gary Marsden, Andrew Maunder, and Munier Parker. 2008. People are People, but Technology is not Technology. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 366, 1881: 3795--3804. Retrieved from http://rsta.royalsocietypublishing.org/content/366/1881/3795.abstract
[27]
Taha Mehmood. 2008. Notes from a contested history of National Identity Card in India: 1999--2007. South Asia Citizens Web. Retrieved from http://www.sacw.net/article391.html
[28]
Ministry of Finance. 2016. The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill. PRS Legislative Research, India. Retrieved from http://www.prsindia.org/billtrack/the-aadhaar-targeted-delivery-of-financial-and-other-subsidies-benefits-and-services-bill-2016--4202/
[29]
Prachi Mishra. 2013. Financial and Distributional Implications of the Food Security Law. Economic and Political Weekly, 28--30. Retrieved from http://www.epw.in/journal/2013/39/national-food-security-act/financial-and-distributional-implications-food-security
[30]
National e-Governance Division. 2011. Saaransh: Compendium of mission mode project under National e-Governance Plan. New Delhi. Retrieved from http://deity.gov.in/sites/upload_files/dit/files/Compendium_FINAL_Version_220211(1).pdf
[31]
Nandan Nilekani and Viral Shah. 2015. Rebooting India: Realizing a Billion Aspirations. Penguin Books India, Gurgaon.
[32]
Neelam Pandey. 2013. Govt cracks the whip on firms behind delay in delivery of Aadhar cards. Hindustan Times. Retrieved from http://www.hindustantimes.com/India-news/NewDelhi/Govt-cracks-the-whip-on-firms-behind-delay-in-delivery-of-Aadhar-cards/Article1--1040585.aspx
[33]
Kavita Philip, Lilly Irani, and Paul Dourish. 2012. Postcolonial Computing: A Tactical Survey. Science, Technology & Human Values 37, 1: 3--29. Retrieved from http://www.jstor.org/stable/41511154
[34]
PIB. 2016. UIDAI cautions public against sharing of their Personal Information with unauthorized Agencies for Printing PVC (Plastic) Aadhaar Card. Press Information Bureau, Government of India. Retrieved from http://pib.nic.in/newsite/PrintRelease.aspx?relid=138755
[35]
Volkmar Pipek and Volker Wulf. 2009. Infrastructuring: Toward an Integrated Perspective on the Design and Use of Information Technology. Journal of the Association for Information Systems 10, 447--473. Retrieved December 15, 2016 from http://aisel.aisnet.org/jais/vol10/iss5/1
[36]
PTI. 2013. Andhra Pradesh Postal Department faces problems in delivery of Aadhaar card. NDTV. Retrieved from http://www.ndtv.com/article/south/andhra-pradesh-postal-department-faces-problems-in-delivery-of-aadhaar-card-341913
[37]
PTI. 2016. Aadhaar enrolment crosses 1 billion mark: Ravi Shankar Prasad. India Today. Retrieved from http://indiatoday.intoday.in/story/aadhaar-enrolments-hit-100-cr-boost-for-welfare-schemes-govt/1/635013.html
[38]
PTI. 2016. Jairam Ramesh moves Supreme Court against treating Aadhaar bill as money bill. The Hindu. Retrieved from http://www.thehindu.com/news/national/jairam-ramesh-moves-supreme-court-against-treating-aadhaar-bill-as-money-bill/article8446997.ece
[39]
Vanya Rakesh and Sumandro Chattapadhyay. 2016. Aadhaar Act as Money Bill: Why the Lok Sabha isn't Immune from Judicial Review. The Wire. Retrieved from http://thewire.in/2016/05/09/identity-of-the-aadhaar-act-supreme-court-and-the-money-bill-question-34721/
[40]
R. Ramakumar. 2010. The Unique ID Project in India: A Skeptical Note. In Ethics and Policy of Biometrics. Springer-Verlag, Berlin and New York, 154--168.
[41]
Usha Ramanathan. 2013. Mandatory or not? The government's flip-flop show. The Statesman. Retrieved from http://www.thestatesman.com/news/13706-mandatory-or-not-the-government-s-flip-flop-show.html
[42]
Nimmi Rangaswamy and Nithya Sambasivan. 2011. Cutting Chai, Jugaad, and Here Pheri: towards UbiComp for a global community. Personal and Ubiquitous Computing 15, 6: 553--564.
[43]
Ursula Rao. 2013. Biometric Marginality. Economic and Political Weekly 48, 13: 72--77. Retrieved from http://www.epw.in/review-urban-affairs/biometric-marginality.html
[44]
Ursula Rao and Graham Greenleaf. 2013. Subverting ID from above and below: The uncertain shaping of India's new instrument of e-governance. Surveillance & Society 11, 3: 287--300.
[45]
Nithya Sambasivan, Gulzar Azad, Paul M Aoki, and Saswati Saha Mitra. 2016. "We Call It Hi-Fi": Exposing Indian Households to High Speed Broadband Wireless Internet. Proceedings of the Eighth International Conference on Information and Communication Technologies and Development, ACM, 3:1--3:11.
[46]
James C Scott. 1998. Seeing like a State: How Certain Schemes to improve the Human Condition have Failed. Yale University Press, New Haven.
[47]
Chandak. Sengoopta. 2003. Imprint of the Raj: How Fingerprinting was born in Colonial India. Macmillan, London.
[48]
Aradhana. Sharma and Akhil Gupta (eds.). 2006. The Anthropology of the State: A Reader. Blackwell Publishing, Malden, MA.
[49]
Tarangini Sriraman. 2011. Revisiting Welfare: Ration Card Narratives in India. Economic and Political Weekly 46, 38: 52--59. Retrieved from http://www.epw.in/journal/2011/38/special-articles/revisiting-welfare-ration-card-narratives-india.html
[50]
Susan Leigh Star. 2006. Orphans of Infrastructure: Engendering, Commodifying, and the Making of Non-People. Stanford University Event Calendar. Retrieved from http://events.stanford.edu/events/97/9744/
[51]
Susan Leigh Star and Geoffrey C Bowker. 2007. Enacting Silence: Residual Categories As a Challenge for Ethics, Information Systems, and Communication. Ethics and Information Technology 9, 4: 273--280.
[52]
Susan Leigh Star and Karen Ruhleder. 1996. Steps Toward an Ecology of Infrastructure: Design and Access for Large Information Spaces. Information Systems Research 7, 1: 111--134.
[53]
Susan Leigh Star and Anselm Strauss. 1999. Layers of Silence, Arenas of Voice: The Ecology of Visible and Invisible Work. Computer Supported Cooperative Work (CSCW) 8, 1--2: 9--30.
[54]
Lucy Suchman. 1993. Working Relations of Technology Production and Use. Computer Supported Cooperative Work (CSCW) 2, 1: 21--39.
[55]
Simon Szreter. 2007. The Right of Registration: Development, Identity Registration, and Social Security A Historical Perspective. World Development 35, 1: 67--86. Retrieved March 25, 2015 from http://www.sciencedirect.com/science/article/pii/S0305750X06001811
[56]
UIDAI. UID and PDS System. New Delhi. Retrieved from https://www.uidai.gov.in/images/resource/uid_and_pds.pdf
[57]
UIDAI. Aadhaar Enrolment / Correction Form. uidai.gov.in. Retrieved January 1, 2015 from https://uidai.gov.in/images/uid_download/enrolment_form.pdf
[58]
UIDAI. 2010. UIDAI Strategy Overview: Creating a Unique Identity Number for Every Resident in India. New Delhi. Retrieved from https://uidai.gov.in/images/commdoc/other_doc/Strategy_Overveiw-001.pdf
[59]
UIDAI. 2011. Aadhaar Authentication Framework (Version 1.0). New Delhi. Retrieved from http://uidai.gov.in/images/authDoc/d2_authentication_framework_v1.pdf
[60]
UIDAI. 2014. Aadhaar Technology and Architecture: Principles, Design, Best Practices, & Key Lessons. New Delhi. Retrieved from https://uidai.gov.in/images/AadhaarTechnologyArchitecture_March2014.pdf
[61]
UIDAI. 2014. E-Aadhaar. eaadhaar.uidai.gov.in. Retrieved January 1, 2016 from https://eaadhaar.uidai.gov.in/
[62]
UIDAI. 2015. Standard Protocol Covering the Approach and Process for Seeding Aadhaar Numbers in Service Delivery Databases. New Delhi. Retrieved from http://uidai.gov.in/images/commdoc/aadhaar_seeding_october_2014_v098_14112014.pdf
[63]
UIDAI Committee on Biometrics. 2009. Biometrics Design Standards for UID Applications. New Delhi. Retrieved from https://uidai.gov.in/UID_PDF/Committees/Biometrics_Standards_Committee_report.pdf
[64]
Janet Vertesi. 2014. Seamful Spaces: Heterogeneous Infrastructures in Interaction. Science, Technology & Human Values 39, 2: 264--284. Retrieved from http://sth.sagepub.com/content/39/2/264.abstract
[65]
Karel Vredenburg, Ji-Ye Mao, Paul W Smith, and Tom Carey. 2002. A Survey of User-centered Design Practice. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 471--478.
[66]
World Bank Group. 2016. Identification for Development: Strategic Framework. Washington DC. Retrieved from http://pubdocs.worldbank.org/pubdocs/publicdoc/2016/2/179901454620206363/Jan-2016-ID4D-Strategic-Roadmap.pdf
[67]
Anumeha Yadav. 2016. Rajasthan presses on with Aadhaar after fingerprint readers fail: We'll buy iris scanners. Scroll.in. Retrieved from http://scroll.in/article/806243/rajasthan-presses-on-with-aadhaar-after-fingerprint-readers-fail-well-buy-iris-scanners
[68]
2014. Right to Food Campaign. righttofoodcampaign.in. Retrieved August 5, 2016 from http://www.righttofoodcampaign.in/about

Cited By

View all
  • (2024)Digital citizenship and disability in the covid eraNew Media & Society10.1177/1461444823120165026:3(1249-1267)Online publication date: 26-Feb-2024
  • (2024)Intermediaries as infrastructure: Interrogating the phatic labor of state-buildingJournal of Sociology10.1177/14407833241234675Online publication date: 5-Mar-2024
  • (2024)Security Patchworking in Lebanon: Infrastructuring Across Failing InfrastructuresProceedings of the ACM on Human-Computer Interaction10.1145/36373978:CSCW1(1-26)Online publication date: 26-Apr-2024
  • Show More Cited By

Index Terms

  1. From Margins to Seams: Imbrication, Inclusion, and Torque in the Aadhaar Identification Project

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems
    May 2017
    7138 pages
    ISBN:9781450346559
    DOI:10.1145/3025453
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 May 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. ICTD
    2. India
    3. access
    4. biometrics
    5. bureaucracy
    6. inclusion
    7. infrastructure
    8. materiality

    Qualifiers

    • Research-article

    Conference

    CHI '17
    Sponsor:

    Acceptance Rates

    CHI '17 Paper Acceptance Rate 600 of 2,400 submissions, 25%;
    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI 2025
    ACM CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)70
    • Downloads (Last 6 weeks)13
    Reflects downloads up to 10 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Digital citizenship and disability in the covid eraNew Media & Society10.1177/1461444823120165026:3(1249-1267)Online publication date: 26-Feb-2024
    • (2024)Intermediaries as infrastructure: Interrogating the phatic labor of state-buildingJournal of Sociology10.1177/14407833241234675Online publication date: 5-Mar-2024
    • (2024)Security Patchworking in Lebanon: Infrastructuring Across Failing InfrastructuresProceedings of the ACM on Human-Computer Interaction10.1145/36373978:CSCW1(1-26)Online publication date: 26-Apr-2024
    • (2024)Seam Work and Simulacra of Societal Impact in Networking Research: A Critical Technical Practice ApproachProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642337(1-19)Online publication date: 11-May-2024
    • (2024)Understanding Contestability on the Margins: Implications for the Design of Algorithmic Decision-making in Public ServicesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3641898(1-16)Online publication date: 11-May-2024
    • (2024)Citizen laborAmerican Ethnologist10.1111/amet.1330351:3(376-387)Online publication date: 18-Jun-2024
    • (2024)Representing the adarsh biometric balak or the ideal biometric child: locating poor children’s care work in the Aadhaar welfare stateInformation, Communication & Society10.1080/1369118X.2024.230514827:4(665-682)Online publication date: 5-Feb-2024
    • (2023)Characterizing the Technology Needs of Vulnerable Populations for Participation in Research and Design by Adopting Maslow’s Hierarchy of NeedsProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581221(1-20)Online publication date: 19-Apr-2023
    • (2022)Programmed welfare: An ethnographic account of algorithmic practices in the public distribution system in IndiaNew Media & Society10.1177/1461444822107903424:4(887-902)Online publication date: 11-Apr-2022
    • (2022)Orchestrating a digital platform ecosystem to address societal challenges: A robust action perspectiveJournal of Information Technology10.1177/0268396222108833337:4(359-386)Online publication date: 7-Jun-2022
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media