You are here: Resources > FIDIS Deliverables > Interoperability > D4.5: A Survey on Citizen’s trust in ID systems and authorities > 
Conclusion  Foreword



(2004) "Identity Cards: Will They Work?" in Economist, 29/04, pp. 57-58. 

ACLU (2005) American Civil Liberties Union: Surveillance Campaign Last accessed: August 29  Last updated: Address:

Andersson, C., et al. (2005) "Trust in Prime". in IEEE International Symposium on Signal Processing and Information Technology,  

Azjen, I. (2002) "Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior", Journal of Applied Social Psychology, 32 pp. 665-683. 

Backhouse and Halperin (2007) FIDIS Del 4.4 

Beck, A. and K. Broadhurst (1995) National Identity Cards in the European Union: The British Debate, Centre for the Study of Public Order, Leicester. 

Bennett, C. J. (1992) Regulating Privacy: Data Protection and Public Policy in Europe and the United States, Cornell University Press, New York. 

Bennett, C. J. and C. D. Raab (1997) "The Adequacy of Privacy: The European Union Data Protection Directive and the North American Response", The Information Society, 13 (3), pp. 245-264. 

Bhattacharya, R., T. M. Devinny and M. M. Pillutla (1998) "A Formal Model of Trust Based on Outcomes", The Academy of Management Review, 23 (3), pp. 459-472. 

Camenisch, J., et al. (2005) "Privacy and Identity Management for Everyone". in ACM DIM, Virginia, USA,  

Cappella, J. N. and K. H. Jamieson (1997) Spiral of Cynicism: The Press and the Public Good, Oxford University Press, New York. 

Creswell, J. W. (2003) Research Design: Qualitative, Quantitative and Mixed Method Approached, Sage, London. 

Culnan, M. J. (1993) "’How Did They Get My Name?’: An Exploratory Investigation of Consumer Attitudes Towards Secondary Information Use", MIS Quarterly, 17 (3), pp. 341-363. 

Davis, F. D., R. P. Bagozzi and P. R. Warshaw (1989) "User Acceptance of Computer Technology: A Comparison of Two Theoretical Models", Management Science, 35 (8), pp. 982-1003. 

EC (1995) Directive 95/46/Ec of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data Last accessed: July 29  Last updated: Address:

EC (2005) Public Opinion: Standard Eurobarometer 64 Last accessed: August 29  Last updated: Address:

Backhouse, J (2005) "D4.1: Structured Account of Approaches on Interoperability" FIDIS. 

Fukuyama, F. (1996) Trust: The Social Virtues and the Creation of Prosperity, Free Press, New York. 

Granovetter, M. (1973) "The Strength of Weak Ties", American Journal of Sociology, 78 (6), pp. 1360-1380. 

Great Britain Home Office (1995) Identity Cards: A Consultation Document, HMSO, London. 

Great Britain Home Office (2006) Why We Need Id Cards Great Britain Home Office Last accessed: August 29  Last updated: Address:

Hinsliff, G. (2006) "Brown to Let Shops Share Id Card Data". in The Observer, August 6, 2006,  

Hornung, G. (2004) "Biometric Identity Cards: Technical, Legal and Policy Issues". in Information Security Solutions Europe Conference, Vieweg,  

Hudson, J. (2006) "Institutional Trust and Subjective Well-Being across the Eu", Kyklos, 59 (1), pp. 43-62. 

Institute for Public Policy Research (1995) Identity Cards Revisited, Institute for Public Policy Research, London. 

John Stuart Mill Institute (1995) Identity Cards: A Response to the Home Office’s Consultation Paper, John Stuart Mill Institute, London. 

Kramer, R. M. (1999) "Trust and Distrust in Organizations: Emerging Perspective, Enduring Questions", Annual Review of Psychology, 50 pp. 569-598. 

Lasky, K. and A. Fletcher (1998) The Future of Privacy, Demos, London. 

LogicaCMG (2006) "E-Identity: European Attitudes Towards Biometrics" LogicaCMG  

London School of Economics and Political Science (2005) The Identity Project: An Assessment of the Uk Identity Card Bill & Its Implications, The Department of Information Systems, London. 

Mayer, R. C., J. H. Davis and F. D. Schoorman (1995) "An Integrative Model of Organizational Trust", Academy of Management Review, 20 (3), pp. 709-734. 

McKnight, D. H., V. Choudhury and C. Kacmar (2002) "Developing and Validating Trust Measures for E-Commerce: An Integrative Typology", Information Systems Research, 13 (3), pp. 334-359. 

Metlay, D. (1999) "Institutional Trust and Confidence: A Journey into a Conceptual Quagmire" in Social Trust and the Management of Risk, (Cvetkovich, G. T. and R. E. Löfstedt eds) Earthscan, London. 

Mingers, J. (2001) "Combining Is Research Methods: Towards a Pluralist Methodology", Information Systems Research, 12 (3), pp. 240-259. 

NO2ID (2006) All About Id Schemes NO2ID Last accessed: August 29  Last updated: Address:

Oakeshott, S. (2006) "Labour U-Turn over Id Card Medical Details". in The Sunday Times, April 23 2006,  

O’Hara, K. (2004) Trust: From Socrates to Spin, Icon Books, Cambridge. 

O’Hara, K. (2006) "Trust, Information and Risk". in London,  

O’Hara, K., H. Alani, Y. Kalfoglou and N. Shadbolt (2004) "Trust Strategies for the Semantic Web". in ISWC’04 Workshop on Trust, Security and Reputation on the Semantic Web,  

O’Neill, O. (2002) A Question of Trust: The Bbc Reith Lectures, Cambridge University Press, Cambridge. 

Pavlou, P. A. (2002) "Institution-Based Trust in Interorganizational Exchange Relationships: The Role of Online B2b Marketplaces on Trust Formation", Journal of Strategic Information Systems, 11 (3), pp. 215-243. 

Peev, G. (2005) "Id Cards Will Lead to Massive Fraud". in The Scotsman, October 18,  

Poortinga, W. and N. F. Pidgeon (2003) "Exploring the Dimensionality of Trust in Risk Regulation", Risk Analysis, 23 (5), pp. 961-972. 

Smith, H. J., S. J. Milberg and S. J. Burke (1996) "Information Privacy: Measuring Individuals’ Concerns About Organizational Practices", MIS Quarterly, 20 (2), pp. 167-196. 

Stalder, F. and D. Lyon (2002) "Electronic Identity Cards and Social Classification" in Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, (Lyon, D. ed.) Routledge, New York, p. Chapter 4. 

Stamper, R., K. Liu, M. Hafkamp and Y. Ades (2000) "Understanding the Roles of Sign and Norms in Organizations - A Semiotic Approach to Information Systems Design", Behaviour & Information Technology, 19 (1), pp. 15-27. 

Stewart, K. A. and A. H. Segars (2002) "An Emperical Examination of the Concern for Privacy Instrument", Information Systems Research, 13 (1), pp. 36-49. 

Stone, E. F., D. G. Gardner, H. G. Gueutal and S. McClure (1983) "A Field Experiment Comparing Information-Privacy Values, Beliefs,  and Attitudes across Several Types of Organizations", Journal of Applied Psychology, 68 (3), pp. 349-411.

Tolbert, C. J. and K. Mossberger (2006) "The Effects of E-Government on Trust and Confidence in Government", Public Administration Review, 66 (3), pp. 354-369. 

Vanfleteren, M. and E. Kindt (2005) "Use of Credentials in E-Commerce" in Structured Account of Approaches on Interoperability, (Backhouse, J. ed.) FIDIS, London. 

Zucker, L. G. (1986) "Production of Trust: Institutional Sources of Economic Structure, 1840-1920", Research in Organizational Behavior, 8 pp. 53-111. 


Conclusion  fidis-wp4-del4.5.a_survey_on_EU_citizens_trust_04.sxw  
10 / 10