A. Chau, G. Stephens, and R. Jamieson, Biometrics Acceptance ? Perceptions of Use of Biometrics, Proceedings of the 15th Australasian Conference on Information Systems, pp.1-6, 2004.

N. L. Clarke, S. M. Furnell, P. M. Rodwell, and P. L. Reynolds, Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices, Computers & Security, vol.21, issue.3, pp.220-228, 2002.
DOI : 10.1016/S0167-4048(02)00304-8

C. Ross and D. , Identity cards ? People with special issues: Response to the proposed customer experience report, 2004.

C. J. Davis and E. M. Hufnagel, Through the Eyes of Experts: A Socio-Cognitive Perspective on the Automation of Fingerprint Work, Management Information Systems Quarterly, vol.31, pp.681-704, 2007.

F. Deane, K. Barrelle, R. Henderson, and D. Mahar, Perceived acceptability of biometric security systems, Computers & Security, vol.14, issue.3, pp.225-231, 1995.
DOI : 10.1016/0167-4048(95)00005-S

N. Fairclough, Critical Discourse Analysis: The Critical Study of Language, 2010.

D. Firth, The Organizing Vision for Customer Relationship Management, Proceedings of the 7th Americas Conference on Information Systems, 2001.

S. M. Furnell, P. S. Dowland, H. M. Illingworth, and P. L. Reynolds, Authentication and Supervision: A Survey of User Attitudes, Computers & Security, vol.19, issue.6, pp.529-539, 2000.
DOI : 10.1016/S0167-4048(00)06027-2

S. Furnell and K. Evangelatos, Public awareness and perceptions of biometrics, Computer Fraud & Security, vol.2007, issue.1, pp.8-13, 2007.
DOI : 10.1016/S1361-3723(07)70006-4

R. R. Heckle, A. S. Patrick, and A. Ozok, Perception and acceptance of fingerprint biometric technology, Proceedings of the 3rd symposium on Usable privacy and security, SOUPS '07, pp.153-154, 2007.
DOI : 10.1145/1280680.1280704

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.183.9431

G. Ho, G. Stephens, and R. Jamieson, Biometric Authentication Adoption Issues, Proceedings of the 14th Australasian Conference on Information Systems, 2003.

&. Identity and . Service, Strategic Action Plan for the National Identity Scheme: Safeguarding Your Identity, Home Office, 2006.

&. Identity and . Service, National Identity Scheme Strategic Supplier Framework Prospectus, Home Office, 2007.

T. James, T. Pirim, K. Boswell, B. Reithel, and R. Barkhi, Determining the Intention to Use Biometric Devices, Journal of Organizational and End User Computing, vol.18, issue.3, pp.1-24, 2006.
DOI : 10.4018/978-1-59904-945-8.ch098

L. A. Jones, A. I. Antón, and J. B. Earp, Towards understanding user perceptions of authentication technologies, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, pp.91-98, 2007.
DOI : 10.1145/1314333.1314352

J. Lettice, ID card astroturf -No2ID beats the truth out of IPS, The Register, 2010.

M. B. Miles, Qualitative Data as an Attractive Nuisance: The Problem of Analysis, Administrative Science Quarterly, vol.24, issue.4, pp.590-601, 1979.
DOI : 10.2307/2392365

J. Moody, Public Perceptions of Biometric Devices: The Effect of Misinformation on Acceptance and Use, Issues in Informing Science and Information Technology, pp.753-761, 2004.

O. 'gorman and L. , Comparing Passwords, Tokens, and Biometrics for User Authentication, Proceedings of the IEEE, pp.2021-2040, 2003.

B. Otjacques, P. Hitzelberger, and F. Feltz, Interoperability of E-Government Information Systems: Issues of Identification and Data Sharing, Journal of Management Information Systems, vol.23, issue.4, pp.29-52, 2007.
DOI : 10.2753/MIS0742-1222230403

C. Perakslis and R. Wolk, Social acceptance of RFID as a biometric security method, IEEE Technology and Society Magazine, vol.25, issue.3, pp.34-42, 2006.
DOI : 10.1109/MTAS.2006.1700020

L. Prior, Using Documents in Social Research, Sage, 2003.
DOI : 10.4135/9780857020222

E. B. Swanson, E. H. Wynn, E. A. Whitley, M. D. Myers, and J. Degross, Talking the is Innovation Walk, Global and Organisational Discourse about Information Technology, pp.15-32, 2003.
DOI : 10.1007/978-0-387-35634-1_2

E. B. Swanson and N. Ramiller, The Organizing Vision in Information Systems Innovation, Organization Science, vol.8, issue.5, pp.458-474, 1997.
DOI : 10.1287/orsc.8.5.458

E. B. Swanson and N. C. Ramiller, Innovating Mindfully with Information Technology, MIS Quarterly, vol.28, issue.4, pp.553-583, 2004.

P. Wang, Popular Concepts beyond Organizations: Exploring New Dimensions of Information Technology Innovations, Journal of the Association for Information Systems, vol.10, issue.1, pp.1-30, 2009.

K. E. Weick, Sensemaking in Organizations, 1995.

E. A. Whitley, Perceptions of Government Technology, Surveillance and Privacy: the UK Identity Cards Scheme, New Directions in Privacy and Surveillance, pp.133-156, 2009.

E. A. Whitley and G. Hosein, Global Identity Policies and Technology: Do we Understand the Question?, Global Policy, vol.17, issue.6, pp.209-215, 2010.
DOI : 10.1111/j.1758-5899.2010.00028.x