Beruflich Dokumente
Kultur Dokumente
6/18/13 4:53 PM
9.
Ration Card Digitisation and the PDS in Kerala: A brief history ....335
The Public Distribution SystemDossier Prepared
by Swagato Sarkar/Nandini Chami ...................................................340
10. The RSBY and Enrollers: A Field Report Arun Menon ..................353
11. Issues in Financial Inclusion S. Ananth .........................................360
THREE: THE DIGITAL ECOSYSTEM TECHNOLOGY ISSUES
12. Technologies In Aadhar: A Sociotechnical View Ravi Shukla .......372
Encryption Standards and Practices Elonnai Hickok ...................400
FINO: A case study S. Ananth ........................................................407
13. Legal Legacies of Identity Production Malavika Jayaram ............412
FOUR: THE DIGITAL ECOSYSTEM MIGRANT LIVES
14. Counting the Migrant in India: Forced Migration
and the Identification Project Sahana Basavapatna......................432
15. Migration and Financial Exclusion In AP S. Ananth .....................468
FIVE: THE DIGITAL ECOSYSTEM THE HOMELESS
16. Shelter, Enumeration and Homelessness:
Historical And Contemporary Contexts
For Delhi Diya Mehra......................................................................480
17. Being Singular: Figuring the Homeless Ecosystem
in the Shadow of the UID Akshaya Kumar ....................................497
SIX: THE DIGITAL ECOSYSTEM THE FINANCIALLY EXCLUDED
18. Issues in Credit to the Poor: Following the
Microfinance Crisis in Andhra Pradesh S. Ananth ........................514
Faction Wars S.V. Srinivas ..............................................................541
Extended Bibliography ..........................................................................546
6/18/13 4:53 PM
CHAPTER 12
Technologies in Aadhaar :
A sociotechnical view
Ravi Shukla
Centre for Studies in Science Policy, New Delhi
6/18/13 4:56 PM
6/18/13 4:56 PM
CHAPTER 12
6/18/13 4:56 PM
6/18/13 4:56 PM
CHAPTER 12
AADHAAR AS A SYSTEM
6/18/13 4:56 PM
6/18/13 4:56 PM
CHAPTER 12
6/18/13 4:56 PM
6/18/13 4:56 PM
CHAPTER 12
product. A review to check that the choices and decisions made are in tune
with the expected outcome and to take corrective action if required, are
generally seen as an inherent part of the process.
The deliverables for each phase are also shown in the figure. While the precise
list of deliverables mentioned as the outcome of the different phases may
depend on the specific nature of the projects and the methodologies followed,
those mentioned in the figure are general enough to be applicable to most
software projects. The Systems Planning phase for instance may include
activities such as project initiation, resource planning, and risk analysis with
deliverables such as project statement, draft or preliminary project plan, list of
deliverables, and others that may be included in the Preliminary Investigation
Report. There seems to be general agreement on the need for requirements
specifications, though some projects see it as an outcome of a separate
requirements phase and combine the analysis and design phases together.
Requirements documentation come in different formsfrom textual
descriptions and diagrams to prototype displays representing the various
screens and reports of the developed system; however, they are notorious
more for their inadequacy than for their clarity. Inadequately documented
requirements and a lack of communication, continues to be the fly in the
380 In the Wake of Aadhaar
6/18/13 4:56 PM
ointment for most software projects.23 Apart from JAD sessions mentioned
earlier, various frameworks such as I have cited, have attempted to address
this gap. The design documents that are the outcome of the design phase also
depend on the nature of the project and the methodology followed. While
most software projects are expected to provide a rationale of the list of design
documents they expect to produce, depending on the methodology, there are
some generally accepted documents, and diagrams that one may expect to
see. In addition to the deliverables listed in the figure, other deliverables that
also act as tools for keeping the project on course may include a requirements
traceability matrix, to trace the requirements through the development and
testing process to ensure that are adequately addressed; it may also include
test cases and test plans apart from pre-defined acceptance criteria.
Some
6/18/13 4:56 PM
CHAPTER 12
2.
3.
4.
Precondition:
1.
6/18/13 4:56 PM
2.
3.
4.
2.
The diagram and the text together describe one usage scenario. Depending
on the size of the system, the number of use cases could range from a dozen
to hundreds for a system of medium complexity. Recording of use cases after
interaction is generally considered a useful exercise, even if not absolutely
necessary. This is of course not intended to be an accurate representation as
much as indicative of the kind of documentation that can be expected from
a phased software delivery. Apart from usage, other specifications such as
performance or conditions of use may also form a part of the requirement.
What is worth noting is that the use case described above is not a part of
documented Aadhaar requirements specifications. It would appear therefore
that such a comprehensive set of requirements have not been released by the
UIDAI in the public domain. It is not clear if they do in fact exist.
DESIGN DELIVERABLES
As suggested above, the spirit of UML does not mandate a set of UML diagrams
to be used to describe the design blueprint of a system, and designers and engineers
6/18/13 4:56 PM
CHAPTER 12
are usually free to add their own diagrams. However it is certainly unusual if no
part of the standard UML is used. The list of diagrams that constitute valid UML
diagrams is shown below:
Figure 3: UML Diagrams. From Fowler, Martin, UML Distilled: A brief guide to
the Standard Object Modelling Language, Addison-Wesley, Boston, New York, San
Francisco, 2004. Page 12.
6/18/13 4:56 PM
Class designs are generally considered among the key diagrams in software
design. The figure above outlines some hypothetical object-types and their
relationships that may be used to represent the current system. As with the
requirements, it is only a sample subset of what a class diagram looks like
and is not reflective of the class hierarchies and relationships in the actual
Aadhaar implementation. The readily available documentation at the UIDAI
website does not seem to include either any documented use cases or any
design documents.
The lack of any mechanism to seek the views of the intended beneficiaries
of the Aadhaar scheme, supposedly each and every resident of the country, or to
understand their requirements, seems to be in contrast to established software
engineering practices. In other words, society at large appears to have no role but
to come across as a passive receptor of the governments development agenda. This
tendency seems to be reflected in the Concept paper on Social inclusion published
by the UIDAI in April 2012, two years after the first strategy overview document
was released in April 2010. The paper describes some of the fundamentals to be
adhered to as a result of field experience with Mission Convergence an NGO in
Delhi that undertook the task of enrollment for the UIDAI. Of the lessons learnt
from that experience, one suggestion is that it is the choice of the institutional
partner that determines the success of such camps; another that a focus (be) on
the needs and concerns of the enrollee.25 The notion that the needs and concerns
of the enrollee can and may have a role in deciding the system requirements and
design seems at best to be a passing insight gained late in the implementation
process with little attempt to translate it to practice. In this situation, one can
only question whether a system that fails to include the voices of the intended
beneficiaries in deciding requirements or design can lead to social inclusion upon
implementation. Or perhaps the more relevant question would be, who decided
what social inclusion is? Clearly, the views of technologists and decision makers
may be quite different from those of other residents or intended beneficiaries.
In the Wake of Aadhaar 385
6/18/13 4:56 PM
CHAPTER 12
Votes
% of Total
19
11
19
17
46
Unable to comment
37
100
Total
6/18/13 4:56 PM
The significance of this notion is that the values and mechanisms at the
development stage tend to gradually extend to the maintenance and then the
support phase. Often, the development team also does the maintenance and
support at least during the initial stages. Information systems, depending on
their level of accountability, may also store information about their internal
processes, evaluation and audit trails for example, as part of the system. This
must, therefore, also form a part of the development process, showing that
such systems also tend to be reflexive making it anomalous for outcomes to
be in contradiction to the systems own ways of functioning.
6/18/13 4:56 PM
CHAPTER 12
6/18/13 4:56 PM
a small group of technologists however brilliant they may be, might well be
cause for concern.
The concern and interest of the public at large in the objectives and
planning of the scheme are reflected in the nature of the Right to Information (RTI)
requests that the UIDAI has received, and from their responses to key requests.
A list of these, as mandated by the RTI act of 2005, is available at the UIDAI
website. While a detailed study of the requests and the responses is beyond the
scope of this essay, a few examples may be worth considering.
General public apprehensions are reflected an early request in December
2009. One Farid Khan from Jogeshwari, Mumbai sends a three-page
questionnaire comprising 40 questions that covers several aspects ranging
from the role of the UIDAI, its budgets, and structures, the need for a
centralised database, security and privacy issues, and so on. The less than
one-page response of the UIDAI clubs the questions into 5 groups, and its
answers broadly fall into two categoriesthose saying that answers may be
found on one of the documents on the UIDAI website, and those saying that
a Detailed Project Report (DPR) is yet to be finalised and all answers will be
known once the DPR will be finalised.31 Apart from the assumption that a
person taking the trouble to file an RTI request, no easy affair, would not be
aware of the other documents on the site, there are other noteworthy aspects
about the response. First, that the generally accepted norm of doing a detailed
study before initiating the project does not seem to be a consideration for
the UIDAI; secondly, that there is no effort to communicate to the person
making the request that the DPR would be communicated to them, once it is
available, and finally, the list of documents in the Publication and Reports
section of the website does seem to list any document that may be seen as a
Detailed Project Report even today.
6/18/13 4:56 PM
CHAPTER 12
The response to another query by one Shri B.N. Murthy initiated around
the same time (Nov. 2009) seems to have several discrepancies that are
difficult to interpret, the receipt date has been listed as 01 April 2010 on
the site, whereas the first response from the UIDAI office is dated 13 Nov.
2009; in a subsequent letter dated 01 April 2010, Shri Murthy thanks the
UIDAI official for the response given, points out several gaps in it and also
points out that quite a lot information is yet to be supplied. The subsequent
response from the UIDAI is of the opinion that the information requested is
not specific enough and cannot be furnished. A copy of the actual information
requested by Shri Murthy is not available in the document making it difficult
to interpret the UIDAIs response.32
As an example of the interest of civil rights groups across the country,
let us take the request of Mohd Asif Ayaz of the Association for Protection
of Civil Rights (APCR), Bangalore, in Jul 2011. Perhaps as a reminder of the
rejection of the similar efforts in other countries, Ayaz asks whether the
UIDAI has reviewed the Identity Card efforts in the UK, US, and Australia,
to which the reply is This information is not available. Although the
response claims that the motivation and rationality for identity system in
different countries are specific to the country and cannot be generalised,
it does not then go on to outline the specifics in India that prompted the
creation of a centralised, biometric database on an unprecedented scale,
using technologies not being used anywhere else in the world. In response
to a question on re-enrollment of biometric data, the UIDAI suggests that
updation facility will be available by Oct 2011. The RTI request also suggests
that iris and fingerprints may be spoofed and asks how the UIDAI proposes
to withdraw and re-assign a compromised biometric. The response to this
is that RTI act does not envisage providing information for hypothetical
instances and hence no information is available.33 However, the fact that
fingerprint spoofing was less than hypothetical at the time of the RTI is well
known; people in the field have indeed been involved in finding techniques
for detecting spoofing.34 The publishing of this and other academic papers
suggests, firstly, that it was well known that spoofing was or could be
done, and secondly, that there could be active ways to detect and avoid
390 In the Wake of Aadhaar
6/18/13 4:56 PM
6/18/13 4:56 PM
CHAPTER 12
CHANGING BIOMETRICS
The strategy overview document (2010) of the UIDAI outlines some updation
points at which the centralised database may need to be updated by residents.
It suggests that the resident will have to submit their new information at these
updation points with the required documentary evidence. This may also include
a biometric authentication prior to processing the request.41 The reference to
documentary evidence, non-existent for biometric updations, as well as the
inclusion of biometric authentication prior to update reveals an underlying
assumption that biometrics do not change over time. The release of version 1.0 of
the data updation policy, released on 29 June 2011, going by the date included in
the document name and the release of the next version of the document, accepts
that biometric information alters and needs to be regularly updated, but the
cause for the change seems to be either age or unusual circumstances. This seems
to be indicated by the list of reasons that require biometric updation which include
age, events like accidents or disease, facial change due to age, as well as updation
of biometrics due to false authentication failures. Changes due to age seem to
be along two lines, those that occur during ages 5 to 15, during which time the
document suggests an update every 5 years, or for those older than 15 years for
whom an update every ten years is recommended.42 The next release of the update
documentversion 1.1 released on 29 March 2012, does not talk about facial
change due to ageing, but it does talk about the use of biometrics as authentication
for other changes.43 Regarding changes and updates of the biometric data itself, it
suggests that the existing biometrics be used for authentication before updating
with the new biometric (ibid). Described in this way, it seems to be similar to
the familiar change password transaction available with most authenticated
software; however, the difference in the two is that the need for biometric updation,
unless it is part of the regular 5 or 10 yearly update, would arise only if there was
a false rejection of an authentication transaction. That this is likely to happen at
least for some cases is indicated by the changing fingerprints of pensioners that
do not match the recorded biometrics in as short a time span as a few months.44
Recent research has shown that iris scans, generally considered more robust and
reliable than fingerprints, may also be subject to change. Image comparisons of 64
6/18/13 4:56 PM
irises (32 persons) over a three year period 20082011 show an increase in False
Non Match Rate (FNMR) of 153%, with a confidence interval of 95% for a percent
increase of 85% to 307%. A summary of the results is shown below.
Time Period
2008-2009
2008-2010
2008-2011
Given the magnitude of false non-matches for iris scans and the rapid
nature of the changes in fingerprints (especially for older people), perhaps
an easy way out of the authentication catch-22 would be to use iris scans
to authenticate fingerprint updations and fingerprints to authenticate iris
updations. However, the questionable underlying assumption here would be
that both do not change at the same time.
6/18/13 4:56 PM
CHAPTER 12
or there may possibly be some other explanation for it; however, on the face of it, it
does seem to point to a certain inconsistency in documentation if not in functioning.
The Technical shaping of social possibilities
Langdon Winner, one of the pioneers in the field of technology studies,
writing in the 1970s, has suggested that an increased dependence on
technologies that marks contemporary society may have led to a tendency
to seek technical solutions for human, social, or political problems.48
In effect, the reciprocal relationship that technologies have with human
activity suggests that they may be acting as mediators between the
individual, and the external world.49 Thus, what is humanly possible is
extended or restricted by the technological tools available. In other words,
each technology opens up certain social possibilities and closes others.
The Aadhaar scheme is seen as being instrumental in enabling an entire
digital ecosystem that includes state and market initiatives such as direct
transfers of state subsidies, employment guarantee schemes, banking,
insurance, and financial sectors.
The Panopticon goes virtual
The Aadhaar scheme has been seen as the first, enabling step in the
governmental agenda to implement national eGovernance. Unlike
earlier such initiatives that were based exclusively on information and
communication technologies, the use of biotechnology-based metrics
point to a convergence of technologies that may open up altogether new
possibilities. Biotechnology and information are two of a group of four
technologies, the others being nanotechnology and cognitive technologies,
together called NBIC, that have together been identified as converging
technologies having the potential to transform human life as we know it. A
report (2002) by the National Science Foundation (NSF) titled Converging
Technologies for Improving Human Performance, outlines the goal of this
convergence as that of improving human performance towards a golden
age that would be a turning point for human productivity and quality of
life.50 The combination of nano, bio, and information technology in effect
6/18/13 4:56 PM
offer the human body as one of the sites for assessing performance, making
a case for different forms of observation and surveillance. Together with an
enhanced information processing capability, the new forms of convergence
suggest the capabilities for data mining, new cross correlations for example
between genetics and social categories, or internal interventions.51
In addition to the other three, it has been widely argued that a deeper
understanding of cognitive processes may help in treating brain and related
disorders and also in the development of a range of technological devices to
supplement human efforts.52 While the implications of these convergences
for eGovernance initiatives may not be too clear, the deployment of a scheme
like Aadhaar opens up the possibility of enhancing the disciplinary power of
the state.
REFERENCES
Akshaya, Mukul, Parliamentary Panel Discusses multi-purpose I-card, Times of India,
21 Aug. 2003.
Antonelli A, Cappelli R, Maio D, and Maltoni D, Fake Finger Detection by Skin
Distortion Analysis, IEEE Trans. Information Forensics and Security, vol. 1, no. 3,
pp. 360373, Sept. 2006.
Attaran Mohsen, Exploring the relationship between information technology and business
process reengineering, Information and Management, Vol. 41, 2004.
Barry, Andrew and Don Slater, Introduction: The technological economy, Economy and
Society, Routledge, London, Volume 31 Number 2, May 2002.
Basili Victor R, Viewing Maintenance as Reuse-Oriented Software Development, IEEE
Software, January 1990.
Bhatti, Bharat, Dreze Jean, Khera Reetika, Experiments with Aadhaar, The Hindu, Opinion,
27 June 2012.
Booch, Grady, James Rumbaugh and Ivor Jakobson, Why Requirements Capture is
Difficult, The Unified Software Development Process, Addison-Wesley Longman
Inc., First Indian Reprint, New Delhi 1999, Original Edition, 1999, USA.
Braman, Sandra, Informational Meta-technologies, International relations, And Genetic
Power: The case of biotechnologies in Rosenau James N, Singh J. P. Ed,
Information Technologies and Global Politics: The Changing Scope of Power and
Governance, State University of New York Press, Albany, New York, 2002.
Buttles-Valdez Palma, Svolu Agapi, Valdez Fred, A Holistic Approach to Process
Improvement Using the People CMM and the CMMI-DEV: Technology, Process,
6/18/13 4:56 PM
CHAPTER 12
6/18/13 4:56 PM
Manuel, Imaz, Benyon David, Designing with Blends: Conceptual Foundations of HumanComputer Interaction and Software Engineering, The MIT Press, Cambridge, Mass,
London, England, 2007.
Roco, M.C. and W.S. Bainbridge, Executive Summary, in Mikhail C Roco and William Sims
Bainbridge, National Science Foundation, Converging Technologies for Improving
Human Performance: Nanotechnology, Biotechnology, Information Technology and
Cognitive Science, National Science Foundation, Arlington, Virginia, June 2002.
Seetharaman M S, UIDAI Data Update Policy Ver 1.1, UIDAI, Planning Commission, Govt
of India, 29 March 2012.
Selic B, Models, Software models and UML, in Lavagno Luciano, Martin Grant, Selic
Brian Edited, UML for Real: Design of Embedded Real-time systems, Kulwer
Academic Publishers, New York, Boston, Dordrecht, London, Moscow, 2003.
page 14.
Sethi Nitin, NGO shelters shut after it pointed out flaws, The Times of India, 04 July
2011.
Software Engineering Standards Committee of the IEEE Computer Society, IEEE
Recommended Practice for Software Requirement Specifications, IEEESA,
Standards Body, Approved 25 June 1998, Reaffirmed 9 Dec. 2009.
Special Correspondent, Discrepancies in issue of Aadhaar Cards, The Hindu, 2 October,
2012.
UIDAI, Aadhaar Enrollment Client Installation and Setup Manual, Planning Commission,
Govt of India, 2010.
UIDAI, Strategy Overview: Creating a Unique Identity Number for Every Resident in India,
UIDAI, Planning Commission, Govt of India, Apr. 2010.
UIDAI, UIDAI Data Updation Ver 1.0, UIDAI, Planning Commission, Govt of India, 29 June
2011.
UIDAI, UIDAI Strategy Overview: Creating a Unique Identity Number for Every Resident in
India, UIDAI, Planning Commission, Govt of India, Apr. 2010.
Winner Langdon, Autonomous Technology, The MIT Press, Cambridge, Massachusetts
and London, England, 1977, pp. 1017.
NOTES
1
London School of Economics and Political Science, The Identity Project: An Assessment of the
UK Identity Card Project and Its Implications, June 2005, page 6.
Press Release, First tranche of multipurpose national identity cards handed over to the
citizens, Press Information Bureau, Govt of India, Ministry of Home Affairs, 26 May 2007.
UIDAI, Strategy Overview: Creating a Unique Identity Number for Every Resident in
6/18/13 4:56 PM
CHAPTER 12
Technology, The American Heritage Dictionary of the English Language, Fourth Edition,
2000 by Houghton Mifflin Company1) The application of science, especially to industrial or
commercial objectives. 2) The scientific method and material used to achieve a commercial or
industrial objective.
See Heidegger, The Question Concerning Technology, in Scharff and Val Dusek Ed, Philosophy of
Technology. The technological condition. An anthology, 2003, pp. 25264. Jacques Ellul,
On the Aims of a Philosophy of Technology, in ibid. pp. 182185. Heidegger sees human beings as
being delivered to it (technology) in the worst possible way; in the effort to be free of the chains of
technology, he suggests, one needs to see beyond the obvious to the how the specific technology is
revealing nature as a resource for human use. He gives the example of a dam on a river revealing
the river as a source of electrical power to illustrate the point. Ellul sees contemporary social life as a
technological society, where technology is like autonomous force, an end in itself, to be regarded
as an organism tending towards closure and self-determination. He describes a technological
society as the summation of all the techniques in a society taken together which is related to every
factor in the life of modern man.
10 Kline and Pinch, The Social Construction of Technology, in Mackenzie and Wajcman Ed, 1985/1999,
pp. 11314.
11 Andrew and Slater, Introduction: The technological economy, Economy and Society, 2002,
pp 177.
12 UIDAI Strategy Overview: Creating a Unique Identity Number for Every Resident in India, Apr. 2010.
pp 1.
13 Feenberg, 1991, pp. 1420.
14 Buttles-Valdez, Svolu, Valdez, 2006, pp. 110.
15 Braman, Sandra, , 2002, page 9194.
16 Litfin, in Ibid, page 65.
17 Doppelt, Democracy and Technology, 2006. pp. 8587.
18 Haag, Cummings, 2009, pp. 301320.
19 Selic B, Models, Software models and UML, in Lavagno, Martin and Selic ed. 2003. page 14.
20 Imaz and Benyon, 2007, pp 12.
21 Fowler, 2004. pp. 128.
22 Haag and Cummings 2010, pp 20.
23 Why Requirements Capture is Difficult, in Grady et al 1999, pp. 112116.
24 Software Engineering Standards Committee of the IEEE Computer Society, IEEE Recommended
Practice for Software Requirement Specifications, IEEE SA, Standards Body, Approved 25
June 1998, Reaffirmed 9 Dec. 2009.
25 Kachi, 2012, pp 78.
26 Basili, 1990, pp. 1925.
27 Attaran, 2004, pp. 585596.
28 Kachi, 2012. pp 1.
29 Sethi, Nitin, NGO shelters shut after it pointed out flaws, The Times of India, 04 Jul 2011.
6/18/13 4:56 PM
30 Bhatti Bharat, Dreze Jean, Khera Reetika, Experiments with Aadhaar, The Hindu, Opinion, 27 June
2012.
31 Jaya Dubey, ADG/CPIO, Farid Khan:A-11016/76/09UIDAI, UIDAI, Planning Commission, Govt
of India, 15 Jan 2010.
32 Jaya Dubey, ADG/CPIO, Murthy B N D-29013/RTI 486(10)/2009C & I, UIDAI, Planning
Commission, Govt of India, 13 Nov. 2009.
33 Ashish Kumar, ADG/CPIO, Mohd Asif Ayaz: F-12013/23/2011/RTI-UIDAI, UIDAI, Planning
Commission, Govt of India, 25 Jul. 2011.
34 An example of some of the detection techniques may be found in a paper by Antolelli et al in 2006,
pp. 360373.
35 Ashish Kumar, ADG/CPIO, Inderjeet Singh Sehzra: F-12013/08/2011/RTI-UIDAI, UIDAI,
Planning Commission, Govt of India, 25 Mar. 2011.
36 Ashish Kumar, ADG/CPIO, Shri Sudhir: F-12013/065/2012/RTI-UIDAI, UIDAI, Planning
Commission, Govt of India, 18 Apr. 2012.
37 Gupta Geeta, Aadhaar Letters lost: Phase I was tough says India Post, Indian Express, New Delhi,
25 Aug. 2012.
38 Special Correspondent, Discrepancies in issue of Aadhaar Cards, The Hindu, 2 October, 2012.
39 Ashish Kumar, ADG/CPIO, Ms Kusum Giri: F-12013/049/2012/RTI-UIDAI, UIDAI, Planning
Commission, Govt of India, 07 May 2012.
40 Ashish Kumar, ADG/CPIO, Sh Mark Quadros: F-12013/55/2012/RTI-UIDAI, UIDAI, Planning
Commission, Govt of India, Aug. 2011.
41 UIDAI, Strategy Overview: Creating a Unique Identity Number for Every Resident in
India, UIDAI, Planning Commission, Govt of India, Apr. 2010, page 20.
42 UIDAI, UIDAI Data Updation Ver 1.0, UIDAI, Planning Commission, Govt of India, 29 June 2011,
pp. 411.
43 Seetharaman M S, UIDAI Data Update Policy Ver 1.1, UIDAI, Planning Commission, Govt of India,
29 Mar. 2012.
44 Kaur Sukhdeep, Smart cards for pension hits hurdle: Changing fingerprints, Indian Express,
03 Aug. 2 012.
45 Fenker and Bowyer, 2012, pp. 6.
46 Dubey Jaya, Neeraj and Vikram Gaur: A-11016/76/09UIDAI, UIDAI, Planning Commission,
Govt of India, 18 May 2010.
47 UIDAI, Aadhaar Enrollment Client Installation and Setup Manual, Planning Commission,
Govt of India, 2010.
48 Winner, 1977, pp. 1017.
49 Kaptelinin and Nardi, 2006. pp. 4446.
50 Roco and Bainbridge, June 2002, pp. 421.
51 Light, 2010, pp. 583585.
52 Bonadio et al, 2002, pp. 179181
6/18/13 4:56 PM