Select Committee on Science and Technology Written Evidence


APPENDIX 16

Memorandum from Professor Anne H Anderson, University of Glasgow

"SCIENTIFIC ADVICE, RISK AND EVIDENCE: HOW THE GOVERNMENT HANDLES THEM"

  1.  I welcome the opportunity to provide evidence to the committee as it deliberates this topic and the case study of the technologies supporting identity cards. I note that to date the committee has received little evidence regarding social science. I also note that the Home Office has indicated that they have made extensive use of "social science studies have been used extensively to guide the decision making process within the programme:

    —  Research has been used to guide scheme design on issues such as price acceptability and acceptable customer time commitment.

    —  It has also been used to support business case assumptions on volumetrics and likely customer behaviour.

    —  From a marketing perspective social science has also been used to guide the external marketing strategy by ensuring it is developed to address the public's issues and concerns.

  The mechanism for incorporating the result of social science work into the programme is predominantly a robust change control process. Assumptions are validate through research and when the research rejects a current assumption a change request is raised. All our marketers on the programme are also thoroughly briefed on the research findings and provide direct support into different work-streams. As such, they will share the findings across the programme".

  2.  Although this input from social science may well have been valuable to the Home Office with reference to the development of the National Identity Scheme, it is a narrow perspective on social science and where the social sciences could be used to improve the scheme.

  3.  I direct a major research programme (PACCIT) with leading academic researchers from the social and computing sciences in universities across the UK. When the research councils and the DTI committed to fund the PACCIT initiative they did so in the recognition that IT systems often fail to deliver their intended benefits because the systems have been designed with a lack of understanding about the users' needs and the context of use. Good multidisciplinary research drawing on both social and computing science is needed to help overcome these problems. From my knowledge of the development of the National Identity Scheme, there is a real danger of both of these problems. The challenges of implementing the various biometric technologies have been the focus of concern, and it appears that less attention has been given to the challenges of how to design and implement the system in ways that are usable, useful and appropriate.

  4.  If the further development of the scheme is to be successful, it will be important that the Home Office draws on expertise from a suitable range of expertise from social and computing science to ensure the National Identity Scheme is designed and implemented to meet these criteria. The specification for the system and the trials of the proposed technologies referred to in oral evidence to the Committee on 22 March 2006 must be broadly scoped to include not only the technologies in isolation, but the system as a whole. Sufficient time must be included to refine the design in the light of evidence from realistic trials of the system in operation. It will be important to ensure that the relevant expertise is available to gather and analyse this data on the whole system performance. The Home Office may need to engage independent experts to help evaluate the trials and help feed the information back in to the process of refining the design.

  5.  One important aspect of this process is the enrolment process. The performance of the various biometric technologies per se is important, but it is the performance of these technologies in the varied intended enrolment settings, with the staff who are likely to be operating the systems, with the range of likely potential customers, that is key. The Home Office state they have taken some advice from social scientists about the "acceptable customer time commitment". In addition the trials will need to consider and monitor the complete customer and staff experience of enrolment, to ensure the system works in an efficient and acceptable way, or to determine what alterations are needed to make it do so.

  6.  The need for such considerations can be illustrated with reference to the information and case studies provided on the Home Office (www.identitycards.gov.uk). The site includes information about how ID card will work in practice and lists a wide variety of organisations that are expected to use the scheme to check the identities of their customers. These range from banks, Royal mail, Universities, airlines, vehicle and property rental companies, retailers of all kinds including internet based companies, libraries and video/DVD rental companies. A moment's reflection on these very different contexts of use, highlights the design challenges this very varied set of requirements presents. The Home Office web site acknowledges in its illustrative everyday examples, that these kinds of organisations will need different levels of security but the different contexts require more consideration than this.

  7.  One of the complications in designing and implementing an effective National Identity Scheme, is first identifying who are the prime "users" of the technology, whose needs the scheme should be designed to serve. Some of the benefits described by the Home Office are described in terms of benefits to the customer, in terms of the speed and efficiency with which they can establish their rights to certain services. In the examples however the focus seems more on the needs of the service provider to check identification. This may reflect the nature of core Home Office responsibilities for services such as crime and immigration, where the "customers" and their needs are not particularly salient. The important point is that the design specification that may emerge from this standpoint, may not lead to appropriate or acceptable solutions in other areas.

  8.  One of the case studies illustrates this, and the point made by Professor Thomas in his oral evidence to the committee on the need to distinguish between authentication and identification. (3/5/06 response to Q489). To use the ID card to prove you are old enough to buy alcohol or obtain an-over 65 discount, you need to establish that you have reached the legal age. You do not as the case study describes, need to have the shop assistant confirming the customer's identity or date of birth. Many people would regard the latter as an invasion of privacy. The key point I want to make is that the Home Office needs to be more sensitised to these social concerns and ensure that the system is designed to ensure what the European Courts are defining as "a reasonable expectation of privacy". This sensitivity needs to extent to scoping the system specification appropriately. The card should not make available to service providers more information than they genuinely need. So for example the card might indicate, without the need to access the data base, that someone is over 18 but not their date of birth.

  9.  The list of potential user of the scheme include "retailers of all kinds" which again has some worrying implications for privacy as well as raising similar design challenges. In many cases all retailers require to know is that the customer has the means to pay for the goods or services. The identity of the customer might be very valuable information for retailers for marketing or customer profiling but the system should not allow access to more information than is needed. The Home Office web site provides assurances that identity checks can only be conducted with the customer's consent, and that these checks will simply confirm "your identity or other known facts, such as your address details from NIR". The scope of the "other known facts", and to whom they are made available, needs careful consideration. The design of the system has to ensure that even when consent has been given, the system allows access to the minimum necessary information. The very wide variety of potential contexts of use, make this design requirement essential.

  10.   Multiple Identities. In social science it is acknowledged that we all have multiple roles and identities. We are parents, employees, spouses, citizens, sufferers from various illnesses, football fans, opera lovers, recovering alcoholics etc etc. We quite legitimately might wish to keep these roles and identities separate. Both English and Scots Law allow individuals to be known by a variety of names. For some individuals this is not just a matter of personal preference but a very serious matter. To take just three examples, for women leaving abusive relationships or for individuals being stalked, or for celebrities, apparently innocuous identity information about name(s) and addresses may be very sensitive. If such information has to be revealed and verified in a wide range of service encounters from libraries to video rentals to travel agents, serious invasions of privacy may occur. The design and implementation of the National Identity System must be flexible enough to protect information individuals consider sensitive or to allow other forms of verification of entitlement to services.

11.  IN SUMMARY

  The National Identity Scheme is a very challenging project. It is a complex socio-technical system and to be effective will require that the Home Office considers the social as well as the technical dimensions. The effective design and implementation of IT systems requires among other things, an understanding of the users' needs and the context of use, and this information needs to feed into the design of the system. At present the Home Office may not be very well connected to sources of independent expertise on the social and computing sciences, which could be useful in helping them scope the requirements of the proposed system. The design of the system should ensure that the system respects the privacy of individuals, and enshrines the "reasonable expectation of privacy". The design should support the distinction between authentication and identification and should allow service providers to access only necessary information. It will be essential to conduct substantial and realistic trials of the system. These should be independently evaluated, including in terms of the customer and staff experience. The data should feed into refinements to the proposed system.

  12.  The views expressed are my own. Some of the concepts in this evidence emerged from discussions with colleagues on the DTI Foresight Project on Cyber Trust & Crime Prevention, (see R Mansell & B Collins (Eds) Trust and Crime in Information Societies (2005). Edward Elgar: Cheltenham) and the Royal Academy of Engineering Working Group on Dilemmas of Privacy & Surveillance (report to be published this year).

June 2006





 
previous page contents next page

House of Commons home page Parliament home page House of Lords home page search page enquiries index

© Parliamentary copyright 2006
Prepared 4 August 2006