Professional Documents
Culture Documents
T +31 15 285 70 00
F +31 15 285 70 57
info-ict@tno.nl
Theeffectsofinterpersonaltrustonjoint
eIDMinnovations
Date 8June2010
Author(s) TijsvandenBroek
NoorHuijboom
Prof.VictorBekkers(Review)
Version Finalreport
Assignor AlliantieVitaalBestuur
Reportnumber 35291
Numberofpages 64(incl.appendices)
Numberofappendices
Allrightsreserved.Nopartofthisreportmaybereproducedand/orpublishedinanyformbyprint,
photoprint,microfilmoranyothermeanswithoutthepreviouswrittenpermissionfromTNO.
AllinformationwhichisclassifiedaccordingtoDutchregulationsshallbetreatedbytherecipientinthe
samewayasclassifiedinformationofcorrespondingvalueinhisowncountry.Nopartofthis
informationwillbedisclosedtoanythirdparty.
Incasethisreportwasdraftedoninstructions,therightsandobligationsofcontractingpartiesare
subjecttoeithertheStandardConditionsforResearchInstructionsgiventoTNO,ortherelevant
agreementconcludedbetweenthecontractingparties.Submittingthereportforinspectiontoparties
whohaveadirectinterestispermitted.
2010TNO
TNO report | 2 / 64
Contents
1 Introduction.................................................................................................................... 4
1.1 Motivation........................................................................................................................ 4
1.2 Research question ............................................................................................................ 5
1.3 Methodology.................................................................................................................... 6
4 Austria: Brgerkarte................................................................................................... 26
4.1 Introduction.................................................................................................................... 26
4.2 Technical solution: Brgerkarte..................................................................................... 28
4.3 The role of trust in the Brgerkarte innovation.............................................................. 30
7 Cross-case analysis....................................................................................................... 51
8 Conclusions................................................................................................................... 54
8.1 Factors on which trust is grounded ................................................................................ 54
8.2 Factors that change the level of trust over time ............................................................. 56
8.3 The influence of trust on joint innovation process......................................................... 57
TNO report | 4 / 64
1 Introduction
1.1 Motivation
Internet is a vital instrument for the interaction between individuals and organisations.
This interaction between individuals and government agencies can include the exchange
of sensitive data. Therefore a digital identity infrastructure consisting of one or more
electronic Identification Management systems is essential. Users should be aware of the
government agency they are communicating with and government agencies, in turn,
should be certain about the actual identity of the citizens they are communicating with.
The Digital Identity (DigiD) is a first and essential step in the Dutch Public Sector for
such a digital identification infrastructure.
This research focuses on the first part: the role of interpersonal trust in the realisation of
joint electronic IDentity Management (eIDM) systems. Government agencies
increasingly cooperate to improve efficiency and the quality of their services.
Therefore, processes and information systems usually cross organisational boundaries.
Due to this trend, ICT innovations are increasingly undertaken by a network of
government agencies, instead of just a single organisation. (Powel et al, 1996; Fountain
and Atkinson, 1998). These joint ICT innovations are more complex and risky.
Important hampering factors are: conflicting interests, complexity, low perceived
importance of ICT, lack of interoperability of standards and limited interaction between
individual actors. Consequently the adoption of joint ICT innovations lags far behind
compared to the private sector (Huijboom and Van Staden, 2005).
One of the areas in which more cross-agency cooperation is needed, is the electronic
identification for the provision of government services. Several studies have
demonstrated that the progress being made in this area remains behind expectations1. In
addition these studies show that eIDM policy and practice in Member States is too
fragmented with several public sectors having their own policy and eIDM solutions.
According to European policy, the (eIDM) systems of European countries have to be
integrated in one single system for all kind of electronic public services2. The past few
years Member States increasingly try to integrate various systems into one eIDM
solution for all government services. Therefore, multiple government agencies develop
1
Millard J (editor) (2007) European eGovernment 2005-2007: taking stock of good practice and progress
towards implementation of the i2010 eGovernment Action Plan, for the European Commission, published
in conjunction with the European Ministerial eGovernment Conference, Lisbon, 19-21 September 2007
2
IDABC, (2007), European eGovernment Services, eID Interoperability for PEGS, Brussels.
TNO report | 5 / 64
and implement such a single system jointly. Yet, like joint ICT innovations in general,
European research shows that the joint development of eIDM systems is often difficult3.
This research does not aim to give a broad overview of innovation studies and
sociology literature on trust. In contrast, it focuses specifically on the cross-road of
innovation and interpersonal trust. Recent literature shows that interpersonal trust
between individual actors in the process of a joint ICT innovation (e.g. Considine et al
2009, Edelenbos & Klijn, 2007, Nooteboom, Nooteboom, 20064) has an important
influence on the success of such projects5. In addition, many researchers studied system
failures of innovation, in which trust plays a role as well. For example, Klein Woolthuis
et al. (2005) describe interaction failures, such as strong and weak network failures.
However, according to Edelenbos & Klijn (2007) it remains currently unclear how
interpersonal trust precisely plays a role in the joint innovation process remains unclear.
How does trust manifests itself on interpersonal level in the innovation processes
(unlike the macro level in the systemic failure literature)? We focus our research on
interpersonal trust in the innovation process of eIDM projects, as these projects are
specifically interesting. First, developing and implementing an eIDM system is
typically a cross-agency and complex endeavour. Therefore, it needs multiple
stakeholders from different government agencies to build trust and cooperate. Second,
several European nations develop similar eIDM systems, which isolates the system
itself as an independent variable. This allows cross-country (and cross-culture)
comparison. The consequence of this choice is that the conclusions and implications
mostly hold for eIDM projects and to a lesser degree for other ICT projects.
TNO and the Alliantie Vitaal Bestuur have addressed this research question and jointly
invested in a research project to gain more insight into the influence of social factors
in particular trust on joint-up innovation projects in the public sector. This report is
the result of this research project and gives a detailed overview of the findings.
What is the role of trust in the realisation of public eIDM systems in particular
realised by governmental networks and chains?
This research question has been operationalised in the following sub questions:
1 What can be understood by the notion of trust?
2 How does trust become manifest in tangible innovation projects?
3 How does trust influence the joint innovation process?
4 What can be learned from the manifestation of trust in joint innovation projects?
The aim of this study is scientific in nature. This research aims to shed light on how
trust is affected and how it effects the innovation process, e.g. the mechanisms,
3
Millard, Huijboom N. and Leitner C., (2007) European eGovernment 2005-2007:Taking stock of
good practice and progress towards implementation of the i2010 eGovernment Action Plan, Brussels.
4
Bart Nooteboom, Essay for the Dutch Ministry of Economic Affairs, as background document for the
Innovation Lecture 2006, September 2006
5
Huijboom, N.M., (2006) The Domestication of ICTs in Government, DEXA eGovernment
Conference proceedings, Philadelphia.
TNO report | 6 / 64
The next paragraph describes how the research question has been answered.
1.3 Methodology
Literaturereview
First, existing scientific articles forms the basis of this research. The aim of the
literature review (section 2.1) is to study the role and effect of interpersonal trust on the
occurrence of joint, technological innovations in the public sector in particular the
development of eIDM systems. The most important academic papers were analyzed on
1) definition and concepts of trust 2) grounds of trust 3) process of trust and 4) trust in
joint innovation. The yielding from this literature review will structure the analysis of
each case.
Casestudyresearch
A multiple case study design is an excellent method to get an in-depth and qualitative
insight in the complicated process of joint innovations. 51 semi-open interviews were
held within a period of 3 months: 17 in Finland, 13 in Austria, 11 in Belgium and 10 in
the Netherlands. Most interviews were held face-to-face at the interviewees office, but
occasionally an interview was held by phone. The length of the interviews varied from
50 to 150 minutes. The decision was made to transcribe instead of record the interviews
due to the sensitive nature of the data.
The next paragraphs will describe how these criteria were applied and which cases are
selected in the end.
Table 2 Countries that implemented of diffused an eIDM system in the social security sector (marked grey) (Source: eID nteroperability for
PEGS, 2007)
Country Most significant Application type Country Most significant Application type
system system
Austria Citizen Card Social security Italy Carta didentit Tax
Tax elettronica Municipalities
Healthcare Police
Municipalities
Belgium SIS and Belpic Social security Malta eID Malta Social security
Tax Tax
Municipalities Transport
Municipalities
Denmark OCES Health Netherlands DigiD Social security
Education Tax
Tax Municipalities
Labour
Estonia ID-card Social security Slovenia CSP Healthcare
Tax Tax
Education
Finland FINEID and TUPAS Social Security Spain DNI-e Company registration
Employment Tax
Patent registration Municipalities
France Vitale/healthcare Healthcare Sweden BankID Tax
professional cards Healthcare
Registration of
companies
Ireland Reach (Public service Social security
broker)
In sum, the countries that qualify for the maturity and application type are: Austria,
Belgium, Estonia, Finland, Ireland, Malta and the Netherlands.
6
See minutes Alliantie vitaal Bestuur meeting on 16 juli 2009.
TNO report | 8 / 64
Level of trust
As we study the role of trust, the level of trust is an important criterion for sampling the
cases. Many researchers (e.g. Fukuyama, 1996, Nooteboom, 2002, Koppejan and Klijn,
2004) argue that the role of trust in inter-organizational networks depends on the
countrys specific social-cultural context. For example, spontaneous cooperation
between individual actors happens more often in countries with a high level of trust
than in countries with a low level of trust (Fukuyama, 1996). Therefore, the variable
high trust versus low trust countries is chosen to study how the role of trust vary in
different social-cultural contexts.
The World Values survey measures the level of trust in countries7. More specifically,
this survey asks: would you say that most people can be trusted or that you need to be
very careful in dealing with people? So, it measures to what degree citizens trust each
other. Table 3 shows a ranking of the average trust level in the countries that have a
mature eIDM system in the social security domain. The data have been collected
between 1981 and 2007. It clearly shows that Malta and Estonia have the lowest levels
of trust and the Netherlands and Finland have the highest level of trust.
Table 3 Average trust of citizens between 1981 and 2007 (source: The World Values Survey 2009)
Table 4 Effective number of parties and the number of elections between 1945-1996 (source: Lijphart, 1999)
7
www.worldvaluessurvey.org
8
Estonia was not studied by Lijphart (1999).
TNO report | 9 / 64
Picture 1 shows the relative position of the 6 candidate countries, when plotting the
level of trust against the type of democratic model. Two types of sampling are used:
extreme cases and similar cases. Extreme cases (e.g. Belgium, Austria, The Netherlands
/ Finland and Ireland) provide insight in how trust holds in different social-cultural and
political context. Similar cases (Finland The Netherlands and Malta-Austria) show
how the role of trust can differ in similar social-cultural and political context.
Consensual
Finland
Belgium
The Netherlands
Ireland
Austria
Malta Westminster
The contractor prefers to compare the Dutch case to enable this research to yield
recommendations for Dutch policy makers. Therefore, it has been decided to take the
Netherlands and Finland as similar cases and the Netherlands, Belgium and Austria as
extreme cases. Initially the research team chose Belgium, Austria and Ireland as
extreme cases (with this choice all quadrants of the figure would be covered). However,
during the planning of the interviews of the Irish case it appeared that almost none of
the Irish government practitioners was willing to give an interview and thus it became
unfeasible to carry out the Irish case. One of the practitioners explained: Success has
many parents and failure is an orphan Yet, current selection (Austria, Belgium,
Netherlands, Finland) still covers both low trust and high trust countries as well as
consensual and West Minister democracies. Consequently we expect that different
manifestations of trust can be found in the selected cases.
2.1 Introduction
Many academics have examined the concept of trust, in particular in the scientific areas
of sociology and management (e.g. Nooteboom, 2002, Lane & Bachman, 1998,
Rousseau et al, 1998). The concept has been approached from various perspectives; e.g.
interpersonal trust, trust in institution and trust in objects. In addition, several
mechanisms related to trust have been examined; e.g. on the one hand the effect of
human behaviour, object characteristics and institutional arrangements on the presence
of trust and on the other hand the influence of trust on behaviour, the attributes of
objects and institutional features. The broadness and versatile character of the term trust
however has resulted in theoretical contradictions on the concept, with partly
overlapping and partly conflicting definitions, levels, types, sources, roles and
limitations of trust (Nooteboom, 2002). Hence, for contemporary research on trust it is
important to have a clear focus on specific types and manifestations of trust. The aim of
this literature review is to study the role and effect of interpersonal trust on the
occurrence of joint, technological innovations in the public sector in particular the
development of eIDM systems. First, it will describe the definition of interpersonal trust
and the different concepts of trust in literature. Next, the foundations and stages of
interpersonal trust are discussed: how is trust between persons developed over time and
how does the presence of trust change? Last, literature about the role of interpersonal
trust in innovation processes is briefly discussed. This chapter ends up with the
theoretical hypotheses, which form the analytical framework for the case studies.
There are many descriptions of trust. For some, trust is an expectation (see Lane &
Bachmann, 1998; Rousseau et al, 1998); for others it is the cement of society
(Fukuyama, 1995) or a container concept that can hardly be separated from the shared
norm or rules (see for instance Putnam 1995). To be useful in empirical research
however, the concept must be clearly and rather narrowly defined. When considering
Edelenbos & Klijn (2007) on trust, two important factors predict the need for
interpersonal trust:
Vulnerability (Based on Deaking & Michie, 1997). When an actor trusts another
actor, he or she is willing or assume an open and vulnerable position. He or she
expects the other to refrain from opportunistic behaviour even if there is the
possibility to show this behaviour. In this sense, the actor trusts that his or her
partner will take his or her interests into account (Nooteboom, 2002, Rousseau et al,
1998).
Risks (based on Chiles & McMackin, 1996; Gambetta, 1988a, 1988b; Lane &
Bachmann, 1998). Trust plays an important role in ambiguous, unpredictable and
risky situations. In risky situations, trust is a precondition for undertaking any
action. A conscious choice is made to take a risk because of the belief that the other
party can be trusted.
In this risky and vulnerable situation trust is based on mutual expectations (based on
Lane & Bachmann, 1998; Zucker, 1986). Trust is reciprocal in nature: one expects the
TNO report | 11 / 64
other not to behave in an opportunistic way. So, the concept of trust presumes a stable
positive expectation (or prediction) of the intentions and motives of other actors. Trust
reduces unpredictability, complexity, and ambiguity in interactions because one can
anticipate (some of) the behaviour of the other actor.
This paragraph gives an overview of the different concepts of trust, which are all taken
into account in the grounds, stages and evaluation of interpersonal trust in the
innovation process. Although most concepts of interpersonal trust share the three
common elements as set out in the previous section, theorists have conflicting views on
the social grounds on which trust may be based. These theoretic divergences are
predominantly caused by a different approach of the human nature (e.g. the extent to
which mankind is seen as being rational). Some theorists (mainly economists) perceive
trust as a rational assessment by an individual of the chance that the other will act in an
opportunistic way (e.g. Williamson, 1993, Preisendrfer 1995). In this perspective,
human action (and also trust in certain behaviour of the other) is based upon a rational
calculation of the costs and benefits and chance of opportunistic behaviour. According
to these theorists, a person is only willing to trust the other in situations in which he or
she expects that based upon a cost-benefit calculation the other will not act in an
opportunistic way. This instrumental approach of trust however has received much
critique.
Most critics contend that rational actor theories neglect the unpredictability of future
behaviour and incompleteness of information, which hamper a clear-cut assessment of
costs and benefits. Whereas Axelrod (1984) and Coleman (1990) for instance assume
that actors share expectations about the future, more sociological accounts would stress
that the unfolding of the future is in itself uncertain. Their uncertainty perspective of
trust is built incrementally and the relationship may change in an unpredictable
direction neither gain nor loss can ever be calculated with certainty. In other words, in
every relationship there are uncertainties which require a basis of trust for certain
human interaction and action. As Bradach and Eccles put it (1989: 108): the future is
rarely preordained; magnitude and timing of the trustees response is influenced by
social norms which complicate calculation: and, most importantly, the first step in a
game without history, taken in the face of incomplete information about the trustee,
requires a one-sided precommitment from the trustor based on mere
beliefs/expectations about the trustee.
There however is a third theoretical stream of scientists who contend that the grounds
for trust will vary with the social context of trust and/or that the nature of trust will vary
with the stage of a relationship reached. These theorists use a multidimensional concept
of trust which is based upon a combination of theoretical viewpoints. Common
combinations are cognitive trust with value- or emotion-based trust (e.g. Barber 1983,
Lewis and Weigert, 1985) and a combination of calculative with either cognitive or
morally based trust (Dasgupta, 1988, Chiles and McMackin, 1996). In both these two
theoretical approaches of trust, common cognitions are considered to have a
determining influence on the presence or non-presence of trust. Cognitions, defined as
the rules that constitute the nature of reality and the frames through which meaning is
made (Scott, 1995:40), are embodied in the expectations people have on the social
order in general and on specific interaction with others. Cognitions form a basis for
interpersonal trust or distrust in the sense that individuals base their expectations of the
TNO report | 12 / 64
others behaviour on shared social norms. Zucker (1986) for instance argues that
expectations are based upon social rules which provide a general framework for
behaviour. In addition, Zucker (1986) contends that the stronger the common social
framework of rules and routines (e.g. due to social homogeneity), the more likely it is
that trust will develop spontaneously.
This study will not specifically focus on one perspective on the concept of trust.
However, these perspectives are important in relation to the grounds of trust. For
example, the process of routinisation, which will be further explained in the next
paragraph, is a prime example of Williamsons (among others) rational perspective of
trust. The third dynamic perspective on trust is for example important to study how
presence of trust change over time, in other words the stages of trust.
Now the definition, need and concepts of trust are clear, how can one know that the
other will meet his or her expectation? Where does somebody ground his or her positive
expectations upon? This paragraph describes these foundations.
Personal characteristics
Personal characteristics, such as integrity, benevolence and capabilities, have an
important influence on interpersonal trust (e.g. Schoorman et al., 2007; Mayer et al.,
1995). The function of a person (including the organisation power) within the hierarchy
of an organisation can increase the predictability of a person. For example, one will
know that he or she is able (in terms of power) to live up his or her promises. Within
personal characteristics, this research will specifically focus on personal capabilities,
such as expertise.
Identification
A more psychological basis for trust is the sharing of experiences. Nooteboom
(2002:81) explains this as follows: One will more easily help someone when one can
identify with his need. One can more easily forgive someones breach of trust or
reliance when one can identify with the lack of competence or the motive that caused
it. Research (Frissen and Huijboom, 2009) for instance shows that the level of trust
between patients who suffer from the same disease is higher than the level of trust
between random chosen individuals. The fact that people share the same experiences,
concerns and struggles appears to have a bounding effect and increases interpersonal
trust.
Routinisation
TNO report | 13 / 64
Several scientists argue that the higher the routinisation in actions of a person the more
predictable the actions of that person and the more trust people have in the reliability of
that person. An example may be the reputation of an individual; if the person always
acts in a specific way, people will trust that he/she will act in the same way in the
future. Routinisation is a rational process, in which positive experiences build up
towards a positive reputation (Nooteboom, 1999). In contrast to transferability of trust,
routinisation takes place without a third person interfering in the interpersonal
relationship.
Strong ties
Several scientists argue that there are types of relationships in which there is in the vast
majority of cases a strong belief of mutual trust between persons (e.g. Lane and
Bachmann, 1998). Examples are ties within families, inner-circle of friends, but also
within sectarian groups. These relationships mostly consist of a long, intensive,
emotional and empathic contact and well-knowing of the other. Yet, also in these
relationships there are cases of distrust deriving from a feeling of the other being
unfaithful or dishonest. Trust is not a given element of a strong tie, but can often been
found in strong relationships (e.g. Lane and Bachmann, 1998).
Trust built up over time. Sometimes it can take ages between two persons two gain trust
in each other. Therefore the large majority of theorists argue that levels of interpersonal
trust and trustworthiness are not static but dynamic; e.g. trust and trustworthiness can
emerge and disappear (Zucker, 1986, Lindenberg, 2000, Nooteboom, 2002). In
literature, in particular attention is paid to the construction of trust. Schapiro
(1987:625) argues that Typically () social exchange relations evolve in a slow
process, starting with minor transactions in which little trust is required because little
risk is involved and in which partners can prove their trustworthiness, enabling them to
expand their relation and engage in major transactions. This argument has been
endorsed by others (e.g. van de Ven, 1992). McAllister (1995) proposes two stages of
trust development: cognition-based trust followed by affect-based trust. These stages
can easily be linked with the grounds for trust. Cognition-based trust is for example
grounded in personal capabilities (such as expertise) and Routinisation. On the other
hand, affect-based trust is based on identification and empathy. Lewicki and Bunker
(1996) proposed three stages of calculus-based, knowledge based and identification-
based trust. Nooteboom (2002:90) distinguishes between the following three stages of
the evolution of trust:
1 Stage of control in the absence of trust. In this stage trust is absent which forces
individuals to assess the competences and opportunism of the other. One way in
which people try to limit the risks is by taking small steps.
2 Stage of assessing trustworthiness and developing tolerance levels of trust. In this
stage, the involved persons mutually obtain more knowledge and experience which
TNO report | 14 / 64
forms the basis for setting tolerance levels of trust. The rational grounds for trust,
mentioned in the previous paragraph, are most dominant.
3 Stage of widening tolerance levels, In this stage the tolerance levels of trust are
widened upon the basis of identification and empathy.
Interpersonal trust can not only increase over time but also decrease. A decline of trust
between to individuals can emerge in case one of the involved parties does not live up
to the expectations of the other. However, Zucker (1986:59) argues that those
disappointments in the other do not necessarily break down trust. He states that: A
violation of expectations produces a sense of disruption of trust, or profound confusion,
but not of distrust. Distrust only emerges when the suspicion arises that the disruption
of expectations in one exchange is likely to generalize to other transactions. To distrust,
then, implies an attribution of intentionality that continuous throughout all interactions
or exchanges, at least of a particular type. The joint solution of conflict can enhance
and deepen trust, in several ways. On the one hand it may result in a learning process,
which confirms the value of the relation and thereby increases mutual commitment.
Moreover, the fact that the relation survived the test may increase interpersonal trust.
On the other hand, in particular between people who have a weak tie a violation of
expectations can result in mutual recrimination and suspicion.
Although the research area of trust and networked innovation is relatively immature,
several theorists have argued that the presence or non-presence of trust can have a
determining influence on the occurrence of networked innovation (e.g. Fountain, 2000,
Lane and Bachmann, 1998, Van de Ven 1999, Nooteboom, 2006). This importance of
trust can be explained by the risky nature of inter-agency cooperation. Nooteboom
(2006) and other authors argue that trust is relevant in relation to the following three
main risks underlying inter-agency cooperation:
Because of its explorative nature and strong interdependencies, collaborative
innovation can imply substantial risks and uncertainties for involved actors (both
individuals and organisations). As various partners are involved in the innovation,
there can be a lack of mutual understanding, or absorptive capacity. This might be
in particular the case in process innovation, where knowledge and competencies are
being developed. Business models are new and a common language still has to be
developed. On the one had cognitive distance and heterogeneity is needed in order
to innovate (to combine knowledge) and on the other hand cognitive distance can
hamper effective collaboration. Nooteboom (2006) speaks in this regard of the
optimal cognitive distance; large enough to yield novelty and at the same time
small enough to develop a mutual understanding. In the innovation literature Klein
Woolthuis et al. (2005) describe similar dilemma for interaction failures, such as the
presence of too strong ties (tunnel vision) and presence of too weak ties (high
transaction costs or inadequate knowledge transfer. Whether the relationship
between trust and creativity / innovativeness is direct or mediated by other variables
is not clear. For example, Sztompka (1999) argues that trust is needed for
cooperation and cooperation in its turn is needed for creative process. On the other
hand, Mamynika et al. (2002) shows that an atmosphere of trust directly affects the
creative collaboration in teams.
A second problem of inter-agency cooperation is the risk of spillover: competitive
advantage from commercially valuable new knowledge or competence may leak
to competitors. Although this problem seems not to exist in the public sector, there
TNO report | 15 / 64
In network collaboration there are several ways to manage relational risks. Nooteboom
describes three strategies to control risks:
Control. The first type is opportunity control. In this situation the undertaking of or
refraining from actions is heavily influenced by legal frameworks (e.g. contracts) or
hierarchy (e.g. within or between organisations). Escalation of a problem up the
hierarchy of two organisations is a prime example of hierarchical control. The
second type is motivation control, in which case actions are based upon incentives
(e.g. rewards).
Trust. Trustworthiness may be a result of an established ethic or practice of
behaviour, based on widely shared social norms and values. Within the relationship
trust may be based upon values developed during the relationship or empathy.
Empathy may lead to identification, e.g. the sense of shared experiences among
people who are in a comparable situation (e.g. patients). Trust and trustworthiness
may also arise from routinisation, where trust and trustworthiness is based upon
earlier positive experiences.
Third parties. For the control of conflict third parties may also play a role. A third
party and thus transferability of trust may serve as an independent intermediary
which manages conflicting interests, builds consensus and has a brokerage role in
case of conflicts between parties.
Trust plays different roles during the different phases of the joint innovation process:
initiation, development, implementation and diffusion.
In the initiation phase of a joint innovation, the sharing of (multi-disciplinary, inter-
sectoral and/or inter-level) expertise is an important driver for the creation of new
ideas. If the personal or company interests - such as intellectual property - are not
contractually arranged; the risks high and the power balances unequal, then a high
level of trust is needed to share expertise within the network.
Also in the implementation phase of joint innovations trust may be a prerequisite.
Often the interests of involved parties are divergent or even conflicting and the risks
for involved parties (poor return on investments or reputation damage) may be high.
Trust then is a precondition for the ability of bridging deviating interests and the
willingness of jointly taking risks.
TNO report | 16 / 64
In the diffusion phase trust as a determinant may be less important as the risks may
be lower because the impact and the outcome of the innovation may be less
uncertain.
2.7 Hypotheses
The theoretical sections 2.1-2.6 show three perspecitves of interpersonal trust in joint
innovation:
Factors on which trust is grounded
Factors which change the level of trust over time
The influence of trust in the joint innovation process.
The following hypotheses (see table 5) can be made for these three perspectives. The
intra and inter case analysis in chapters 3-7 will substantiate or nuance the hypotheses.
H1 (PERSONAL CHARACTERISTICS):
Trust can be based upon personal characteristics, such as integrity, benevolence and
capabilities.
H4 (ROUTINISATION):
The higher the routinisation (more knowledge and experience) in actions of a person
the more predictable the actions of that person and the more trust people have in the
reliability of that person.
H5 (TRANSFERABILITY OF TRUST):
Trust is transferable between individuals.
H7 (UNMET EXPECTATIONS):
A decline of trust between individuals can emerge in case one of the involved parties
does not live up to the expectations of the other, as it decreases the reciprocity of the
trust relation.
H9 (HIERARCHY):
In the case of a low level of trust during joint innovation, trust is compensated by
mechanisms of hierarchy.
H12 (CREATIVITY):
Trust is a necessary requisite for creativity in a team .
H15 (RISKS):
Trust is a precondition for the willingness of jointly taking risks.
TNO report | 19 / 64
3 Belgium: Belpic
3.1 Introduction
Initiation
1999 The e-Signature directive10 of the European Commission inspired Belgian
government
The National Register Department11 of the Ministry of the Interior
commissioned researchers to develop the legal framework and technical
specifications of the Belgian electronic identity card (Belpic)
2000 The Cabinet of Ministers formally decided to develop an electronic
identity card.
November
2001 The Ministry of the Interior commissioned the consultancy company CSC
to conduct a concept study
March
July A plan to develop the Belgian electronic identification card passed the
Cabinet of Ministers
A public tender for the development of the exploitation structure of the
Belpic, development of certificates and production of the card was
published. The Steria (formerly Bull N.V.) consortium won the tender.
Development
2002 The development of the exploitation structure by the Steria consortium
started. The infrastructure of the National Register and involved parties
January
had to be modified within six months.
2002 Zetes and Belgacom carried out the project to develop the card and
certificates which had a timeline of five months.
September
2003 The central government worked on the legal implementation of the
Belpic:
February
& March The sectoral committee of the National Register12 was established to
assess in concrete requests for access to personal information whether
the requirements of the legislation concerning population registration
and privacy law are met13.
Amendments to the National Register laws of 1983 and 1991 were
9
Mostly based on interviews and desk research (see also Huijboom, N.M. The influence of social capital on
joint innovation processes, forthcoming).
10 http://europa.eu/legislation_summaries/information_society/l24118_en.htm
11 http://www.ibz.rrn.fgov.be/index.php?id=141&L=1
12
http://www.privacycommission.be/nl/decisions/national_register/
13
http://www.dekamer.be/FLWB/pdf/50/2226/50K2226007.pdf
TNO report | 20 / 64
Implementation
2004 The decision to introduce the Belpic nation wide was made by the
Cabinet of Ministers and enacted by Royal Decree15.
March
2004 Establishment of a governmental agency responsible for the management
of the electronic identity cards. In addition, Fedict became responsible for
July
the management of the electronic identity card.
2004 The federal government organised trainings for the employees of
municipalities and provided municipalities with extra human resources
for the duration of three years16. Technical support was provided by the
Belpic helpdesk, a unit of the National Register.
Diffusion
2004 The electronic identity card was implemented in the first group of
municipalities (out of 578 municipalities)
October
2004 The electronic identity card was implemented in the second group of
municipalities (out of 578 municipalities)
December
2005 The electronic identity card was implemented in the third group of
municipalities (out of 578 municipalities)
February
2005 Some installation difficulties at municipalities were mentioned in the
Belgium parliament. Minister Dewael argued that the complaints were
based on one incident.
2006 and Increasingly critique raised on the Belpic, as a report from FEDICT
2007 showed a very low usage17. Merely 28% of the Internet users who had
and eID had used it at least one time18
2008 The disappointing usage of Belpic was confirmed by a report of the
Federal Government Agency19.
14
http://www.zdnet.be/news/38028/elektronische-identiteitskaart-vier-keer-duurder/
15
http://www.poureva.be/IMG/pdf/DOC_51_1371_021.pdf
16
Verantwoording van de algemene uitgavenbegroting, 9 November 2005,
http://www.dekamer.be/doc/flwb/pdf/51/2044/51k2044003.pdf
17
http://www.fedict.belgium.be/nl/binaries/diversiteit_tcm167-16726.pdf
18
FEDICT, Fed-e View Citizen, Longitudinaal onderzoek naar internet en eGovernment in Belgi. De
burger aan het woord, page 21-22. The most important applications for which the eID was used in 2006
concerned entrance to public spaces such as libraries and waist and recycling centres and the retrieving of
official documents at the local governments.
TNO report | 21 / 64
2009 An overview of the online services accessible through eID on the federal
eID website reveals that the number of services was in November 2009
still relatively low20. Until now only a few applications are accessible
with the Belpic solution.
2010-? Future goals are putting new services (e.g. on health) in place, integrating
the card with the social security card and herewith the stimulation of the
usage of the Belgian eID21.
The Belpic card is a mandatory electronic identity (eID) card that is intended to
facilitate access to e-Government services for all Belgian citizens from the age of 12
and up (IDABC, 2009). The Belpic solution is a PKI-based smartcard solution. The
identity card itself is an Axalto Cryptoflex JavaCard with 32K memory, equipped with
a 16 bit microcontroller and an additional crypto processor (IDABC, 2009). The card
has ROM, EEPROM and RAM. A Java Applet handles all communications with the
outside world, through the interfaces described below. The eID card can be read various
kinds of smart card readers22.
Figure 3 shows the appearance of the Belgium Belpic card. Apart from personal
information, the card has a chip that contains two PKI key pairs and certificates: one for
authentication and one qualified signatures. The Belpic card is a key to the databases of
the National Register. The database of the Belgian National Register consists of a set of
authentic attributes for all Belgian citizens registered in it. Many of the attributes stored
in the authentication certificate of the Belpic card are obtained directly from the
National Register. The National Register uses a Register number, which functions as a
unique identifier for Belgian citizens in e-Government services. Apart from being the
main access key to the National Register, this number is also included as a serial
number on the certificates of the eID card. The price of the eID card ranges between 10
and 15 .
19
Federale Overheidsdienst Economie, K.M.O., Middenstand en Energie, (2008) Toekomstgerichte studie
over de potentile economische mogelijkheden van het gebruik van de elektronische identiteitskaart en de
elektronische handtekening, Brussel.
20
http://welcome-to-e-belgium.be/nl/home.php?nav=6
21
http://www.ibz.fgov.be/download/activiteitenverslag_2007/Instellingen%20en%20bevolking/55298%20Inst
ell_Bevolk_NL.pdf
22
http://www.cardreaders.be/en/default.htm
TNO report | 22 / 64
of eIDM systems were not always shared between the parties, but did not seem to block
cooperation.
H3 (IDENTIFICATION AND EMPATHY): The fact that people share the same
experiences, concerns and struggles appears to have a bound
No examples of identification and empathy in relation to trust were found in the Belpic
case.
H8 (JOINT SOLUTION OF CONFLICT): the joint solution of conflict can enhance and
deepen trust
Solving conflicts helped to build trust, after it was lost. There were many technical
difficulties in the Belpic innovation, e.g. with the installation of the card readers.
Consequently, the National Register often came with change requests for the Steria
consortium. Interviews revealed that adequately solving those problems helped the
Steria consortium to gain trust at the National Register.
H9 (HIERARCHY): In the case of a low level of trust during joint innovation, trust is
compensated by mechanisms of hierarchy
TNO report | 24 / 64
H10 (LEGAL MECHANISMS): In the case of a low level of trust during joint
innovation, trust is compensated by legal mechanisms, e.g. contracts
Respondents explicitly mentioned contracts or in a weaker form joint statements as
both a compensation of trust and a driver of trust. At beginning of Belpic, two CIOs had
to work in the same organisation. As there was no tie between them, they made their
own contract (or co-existence agreement), in which they agreed on their task division. It
helped to make their collaboration more predictable and therefore increased
interpersonal trust. The contract had also an external function: they showed their own
organisation and external parties that they were cooperating and not easily to be
separated. As one of the CIOs said: the contract made a strong coalition of us. We
have a very strong tie now.
H11 (TRUSTED THIRD PARTY): In the case of a low level of trust during joint
innovation, trust is compensated by putting a third party / opinion in place
There was one case of a trusted third party. To ensure that the Steria consortium will
meet its obligations, the National Register hired a consultant to monitor and assess the
contract. Presumably, the trust in this consultant was not high enough as the National
Register fired the consultant shortly.
H13 (MOTIVATIONAL CONTROL): In the case of a low level of trust during joint
innovation, trust is compensated by motivational control, such as (financial) incentives
Motivational control was very apparent in the Belpic case. Especially, the buyer-
supplier relation was used for motivational control. For example, the Belpic tenders
were important for consultants to gain access to the European eIDM systems markets.
The buyer was aware of this dependency and could optimally control the buyer-supplier
relationship. This was opposed by the more independent position of the academics. As
one of the respondents stated: Consultants would do a lot to please the customer, but
researchers are not directly paid and are therefore not that dependent. It must be
noted that academic parties can be dependent in other ways, e.g. in reputation, data
availability or visibility.
H15 (RISKS): Trust is a precondition for the willingness of jointly taking risks.
TNO report | 25 / 64
Organisational complexity was an important risk for suppliers in the Belpic case, as
they had to work with many different parties in their consortium. They needed to have a
high level of trust among them to efficiently work together.
H OTHER (EFFICIENCY)
Apart from the hypotheses, respondents stated that trust had a very positive effect on the
speed of the innovation process and on accessing knowledge within the social network.
For example, it was easier to agree and get things done in the inter-organisational teams
that highly trusted each other.
TNO report | 26 / 64
4 Austria: Brgerkarte
4.1 Introduction
Initiation
1999 The e-Europe initiative of the European Commission put the Information
Society high on the Austrian political agenda
1999 The Austrian Secure Information Technology Centre (A-SIT) was
founded as a National Confirmation Body, which was required by the e-
Signature Act.24
1999 The Austrian government officially decided to use smart card technology
in order to simplify their citizens official business25.
November
2000 The e-Europe initiative led to the initiative e-Austria in e-Europe26.
2000 The Federal Ministry for Public Service and Sports set up the Task Force
e-Austria, existing of leading experts, to implement the e-Austria in e-
Europe project27. The development of a Brgerkarte or citizen card28
was one of the significant e-government projects of the taskforce.
2001 An ICT board to coordinate e-government services was established29. The
members were the Chief Information Officers (CIOs) of the Ministries,
June
who were nominated by their respective ministers. Working groups were
formed to provide advice and assistance to ministries, provinces, cities
and local authorities. One of those working groups concerned the
development of an eIDM system for government services to citizens.
Development
2001 The federal chancellery established the ICT Strategy Unit30, which
existed of a technical unit which developed applications, a public
relations unit which was responsible for the marketing of the applications
and an administrative unit which dealt with internal procedures. This unit
developed the PKI infrastructure for the Brgerkarte.
2002 The providing of certificates was mandated to the company A-Trust,
which is a shared service provider of several Austrian banks and
23
Mostly based on interviews and desk research (see also Huijboom, N.M. The influence of social capital on
joint innovation processes, forthcoming).
24
http://www.a-sit.at/pdfs/About_ASIT_2009_en_MH.pdf;
25
http://www.acsac.org/2002/papers/22.pdf
26
http://is.jrc.ec.europa.eu/pages/ISG/documents/Austria_000.pdf
27
http://www.eipa.eu/files/repository/eipascope/scop2001_Special_ENGLISH.pdf
28
http://www.sibis-eu.org/files/D4-2_Annex.pdf
29
http://ec.europa.eu/idabc/servlets/Doc?id=1305
30
ftp://ftp.freenet.at/beh/buergerkartegrundlagen.pdf
TNO report | 27 / 64
companies and thus far the only accredited and certified trust centre in
Austria according to EU law.
2002 The inspection and approval of Brgerkarte certificates, signature creation
devices and underlying infrastructure was mandated to A-SIT31.
2002 The Austrian government established the Central Residents Register, in
which all Austrian residents are registered and assigned a unique personal
identification number (PIN). This PIN is one of the key identifiers used
by the application of the Brgerkarte concept.32
Implementation
2002 The first pilot project with the Brgerkarte concept was launched in 2002
2003 by the Austrian Computer Society (ACS)33. The electronic ID cards were
issued by the ACS from 24 February 2003 on, in cooperation with A-
Trust and the ICT Strategy Unit of the Federal Chancellery34.
2004 The Master card of several Austrian Banks and the student chip card of
the Vienna University of Economics and Business became Brgerkarte
prepared35.
2004 The Austrian Parliament passed e-Government legislation building a legal
framework for the Brgerkarte.
2005 A mobile application (A1) for citizen authentication became available as
well as the social security card, which included the possibility to activate
the Brgerkarte function.
End of The contracts of the employees of the ICT Strategy Unit terminated. It
2005 was decided to continue some of the work in a unit called Chief
Information Office under the Federal Chancellery and to mandate the
technical work to EGIZ, a new established unit of the Technical
University of Graz.
2005 The ICT Board was replaced by the platform Digital Austria in which
Autumn the counties and municipalities were also represented36.
Diffusion
2007 The take-up by citizens was behind expectations: 20.000 Brgerkarten
had been activated, whereas the government had planned 50.000 by
200637.
2008 The federal Chancellery undertook several actions to stimulate take-up:
A large campaign started to encourage students to use their students
ID card as Brgerkarte by giving them free card-readers. Acceptance
rate was limited due to privacy concerns.
31
http://www.asit.at/pdfs/About_ASIT_2009_en_MH.pdf
32
http://ec.europa.eu/idabc/en/document/4486/5584
33
http://www.rechtsprobleme.at/doks/burgerkarte-gerstbach.pdf
34
http://www.epractice.eu/en/news/284155
35
http://www.rechtsprobleme.at/doks/burgerkarte-gerstbach.pdf
36
http://www.epractice.eu/en/document/288171
37
http://www2.argedaten.at/php/cms_monitor.php?q=PUB-TEXT-ARGEDATEN&s=18047gle
TNO report | 28 / 64
2008 The eCard of the social security institutions fully replaces the traditional
signatures40 and new legislation simplified the issuance of the Brgerkarte
January
2008 The first version of the new online citizen card middleware architecture
MOCCA was released41. This middleware aimed to lower usage
November
thresholds by making the software more user-friendly.
2009 120.000 Brgerkarte certificates are issued and only few services were
available through the Burkerkarte concept
November
2010 - ? The future diffusion, maintenance and development of the Brgerkarte
concept is coordinated by the Chief Information Office of the Federal
Chancellery42. Diffusion will focus on offering more services and
stimulating citizens to activate the Brgerkarte functionality. Also the
participation of the Austrian government in European projects such as
STORK will have a strong priority.
38
http://www.asit.at/de/dokumente_publikationen/videos/index.php
39
http://www.buergerkarte.at/en/index.html
40
http://www.epractice.eu/en/document/288173
41
http://www.epractice.eu/en/document/288168
42
http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6VB34T0FF98
2&_user=603085&_rdoc=1&_fmt=&_orig=search&_sort=d&_docanchor=&view=c&_searchStrId=10
90110470&_rerunOrigin=google&_acct=C000031079&_version=1&_urlVersion=0&_userid=603085
&md5=b345d0ab93053ea6e50118980b670861
TNO report | 29 / 64
persons is used. The core element is a so-called identity link The identity link is an
attestation signed by the authority that links a citizens qualified electronic signature to
the unique identifier sourcePIN derived from the base registers. The sourcePIN may
only be stored in the identity link in the citizen card, thus is under sole control of the
citizen (IDABC, 2009).
SourcePIN-Register
Central Register of
Residents
Sector specific personal
irreversible identifier (ssPIN) Register
service sector number
Central Register of
Residents: 109
+ cryptographic hash
derivation = of residence: 7011
Prohazka, Frantiek Matching
impossible
2411
Ministry of
Each administrational Finance
unit has its own Sector specific personal
service sector number irreversible identifier (ssPIN) ministry
Service sector number
Tax authority 911 + cryptographic hash
derivation
= of finance: 8924
Prohazka, Frantiek
Matching
2411
impossible
University
Sector specific personal
identifier (ssPIN): 1818
irreversible
Matriculation number: 356
+ cryptographic hash
derivation = Prohazka, Frantiek
The sourcePIN Register Authority (which is the data protection and privacy
commission) provides services in connection with the sector-specific eIDM model. The
sourcePIN model allows data exchange between sectors without involvement of the
citizen where such data exchanges are admissible. The unique identifiers sourcePIN and
also the sector-specific PINs are legally protected by the eGovernment Act (IDABC,
2009).
The token itself is a secure signature-creation device that contains (IDABC, 2009):
a qualified electronic signature (i.e. the signature-creation data and a qualified
certificate)
an identity link is issued by the sourcePIN Register Authority.
the sourcePIN which is the citizens unique identifier from the CRR
the citizens name and date of birth
data that links the identity link to the qualified certificate stored on the token
the signature of the sourcePIN Register Authority
The token has two PKI-based key pairs a qualified signature for authentication and
the second key pair for electronic signatures or encryption. Just the qualified certificate
is needed for the citizen card function. The certificates are provided by the private
sector certification service provider A-Trust.
TNO report | 30 / 64
H2 (NORMS AND VALUES): Trust can be based upon the sharing of norms and values
between individuals
Several respondents stated that shared norms, values and interests were highly
important for trusted relationships. For example, members of one of the teams in the
Brgerkarte project described themselves as young, enthusiastic and tolerant, which
increased trust within the team. Respecting cultural values seemed to be important as
well. One respondent visited each county involved in the Brgerkarte project to show
them their interest and respect in their cultural values, which was according to her an
important driver for trust.
H4 (ROUTINISATION):
The higher the routinisation (more knowledge and experience) in actions of a person
the more predictable the actions of that person and the more trust people have in the
reliability of that person
Like the Belgian Belpic case, routinisation seems to be a very important mechanism for
building trust. The basis for the intense and good collaboration within the technical
team of the Federal Chancellery was rooted in the previous cooperation at the Technical
University of Graz. One of the respondents stated: During my master thesis we had a
good opportunity to trust each other, after 6 or 8 months, we had good trust
relationship. The intense collaboration on defining and developing the eIDM system
increased the trust in the team. As one of the respondents stated: Everybody knows
each other and for about 10 months you make a project and meet more often as a
reason for high trust in the team. Difficult situations (e.g. technical barriers) helped to
test the predictability of behaviour. One of the stakeholders entered the Brgerkarte
project in a later stage. Several respondents did not trust this person, because his
presence was abrupt and they found it hard to explain his behaviour. One of the
respondents at the Federal Chancellery stated that he trusted a specific stakeholder at
the Ministry of Finance, because he worked with him (routinisation).
TNO report | 31 / 64
H5 (TRANSFERABILITY OF TRUST):
Trust is transferable between individuals
Transferability of trust occurred within high trust teams. One of the respondents stated:
If you have a core team with trust relation, it is easier to trust external bodies, with the
knowledge that your personal trust partners trust some body else. The trusted team
members formed a first basis to decide if somebody could be trusted: it was for me the
first thing to decide whether I could trust the person or not. It helped a lot in first
contact phase.
H7 (UNMET EXPECTATIONS):
A decline of trust between individuals can emerge in case one of the involved parties
does not live up to the expectations of the other
How often someone changes his or her opinion is an important hampering factor for
interpersonal trust. A few respondents stated that one of the key stakeholders in the
Brgerkarte case changes his opinion on the Brgerkarte very often. It is hard to predict
his or her actions (routinisation) and often he does not meet the expectations of all
stakeholders. For example, this happened when new software modules of the
Brgerkarte were developed. As one of the respondents put it: He has good ideas, but
when he has the idea he wants to realize it and next day he has a new idea or (no
trust because) he jumps around with new technologies.
H9 (HIERARCHY):
TNO report | 32 / 64
In the case of a low level of trust during joint innovation, trust is compensated by
mechanisms of hierarchy
Hierarchy was clearly recognized as a compensation for trust: you have personal trust
and trust you have to obey or in other words you have to trust or without it you have to
follow the hierarchical norms. We found institutionalization in the Brgerkarte case
when government agencies from different organizations needed to cooperate and there
was not a basis of trust that the ICT board would recognize all interests. For example,
there were 15 to 20 working groups in which central and local government dealt with
specific issues around e-government. Another example is the integration of the ICT
Strategy Unit into the Federal chancellery. As one respondent puts it: A reason that
some people dont want to have the taskforce on same level is that they want to control
it, under their power. A necessary prerequisite for trust is the backing of a superior for
decision making. As one of the respondents puts it: trust in the influence of people:
decision power is necessary. So, top managements support seems to be an important
basis for trust. On the other hand, when trust is present, hierarchical measures were not
necessary in the Austrian case. One of the managers said that trust made him feel like
one of the team members instead of a superior: I trusted everyone and from hierarchy
point of view I was not superior, but one of them.
H12 (CREATIVITY):
Trust is a necessary requisite for creativity in a team
The technical developers of the Brgerkarte case, working at the Federal chancellery,
stated that the high level of trust allowed them to work efficiently and in a creative way.
As one of the respondents stated: it made us definitely more efficient, it is place of
work no need act politically at least in our unit,
Within the team of developers in the Federal chancellery, everybody was able to
express his own ideas. Status (hierarchical mechanism) did not play such an important
role due to the presence of trust. However: only the best ideas prevailed, not part of
who had the idea. If you had the right idea and right arguments you had it. Trust was
also needed to bridge the technical and legal aspects of the Brgerkarte: if we would
not have a good relationship, it would not function: it was a problem of putting the
technical and legal part together
H15 (RISKS):
Trust is a precondition for the willingness of jointly taking risks
The Austrian eIDM system is technically, legally and organisationally complex.
Therefore, the risks of spilling resources was very high and trust was needed. One of the
respondents stated If you can not trust, you wont spend money or time with him in the
project.
H OTHER: CLOSURE
In the absence of trust, people will try to keep the distrusted person out of decisions in
the innovation process. This group closure occurred in the Brgerkarte. For example,
one of the members of the ICT Strategy Unit said: he (one of the CIOs) tried to not to
involve him (a rival CIO) in each and every decision he made, he tried to do so by
making decisions not only in the official board, but also in internal meetings where
officials met regularly, he makes decisions in the network.
TNO report | 34 / 64
5 Finland: VETUMA
5.1 Introduction
Initiation
2002 Two government practitioners of the municipalities Vantaa44 and Espoo45
developed the idea to create an eIDM system.
2003 The municipalities of Helsinki46 and Kaunianen47 became involved
2003 The founding members decided to involve the Information Society
program of the Prime Ministers Office
March
2003 Two new laws were enacted:
the Act on Electronic Services and Communication in the Public
Sector48: to improve smoothness and rapidity of services and
communication as well as information security in the administration,
in the courts and other judicial organs and in the enforcement
authorities by promoting the use of electronic data transmission49.
the Act on Electronic Signatures50: to promote the use of electronic
signatures and the supply of products and services relating to them
and to enhance the information security and data protection in the
field of electronic commerce and electronic services51.
Development
2004 A steering group and project group were established. In the steering group
were representatives of the Ministry of the Interior (JUHTA), Ministry of
Finance, the four initiating municipalities and the Information Society
Programme. In the project group were the municipalities, JUHTA and the
overall project management was with the city of Vantaa. One of the key
activities of the project group was the definition of tender specifications
for the procurement of an eIDM system.
43
Mostly based on interviews and desk research (see also Huijboom, N.M. The influence of social capital on
joint innovation processes, forthcoming).
44
http://www.vantaa.fi/i_etusivu.asp?path=1
45
http://www.espoo.fi/
46
http://www.hel.fi/wps/portal/Helsinki_en?WCM_GLOBAL_CONTEXT=/Helsinki/en/Etusivu
47
http://www.kauniainen.fi/
48
http://www.finlex.fi/pdf/saadkaan/E0030013.PDF
49
http://ec.europa.eu/idabc/servlets/Doc?id=28744
50
http://www.finlex.fi/en/laki/kaannokset/2003/en20030014.pdf
51
http://ec.europa.eu/idabc/servlets/Doc?id=28744
TNO report | 35 / 64
2005 Helsinki was able to publish the bid on behalf of the VETUMA team,
Fujitsu was awarded the project57.
October
2006 Fujitsu developed the first version of VETUMA and in the first pilots
were launched in a pilot group of municipalities. Based on the evaluation
Spring
the system was improved and ready for the implementation of the first
services.
Implementation
2006 One of the first electronic services which made use of the VETUMA
platform was the tennis court payment of the city of Helsinki58
Begin
2006 - Other municipalities started to use VETUMA for the provision of online
2007 services to citizens. Fujitsu presented the VETUMA solution during
several gatherings of municipalities in Finland.59 In addition, the project
group launched a website on which municipalities could find information
on how to implement and use the VETUMA solution60. Fujitsu provided
trainings to municipalities on how to use VETUMA
2006 - Discussions emerged on the ownership and financing of VETUMA.
Information Society Programme had stated that the central government
52
InternaldocuementofthecitiesofEspoo,Vantaa,HelsinkiandKaunianen;LondbladAhonen,
A.andT.Karakorpi,reportonthegovernanceandfundingofVETUMA,February2005,
paragraph2.2.
53
http://ec.europa.eu/information_society/activities/ict_psp/documents/eid_good_practices_modinis
_study.pdf
54
https://www.tunnistus.fi/,
55
http://www.finlex.fi/fi/laki/kaannokset/1992/en19921505.pdf
56
http://www.hansel.fi/en/activities/publicprocurement
57
Seepowerpoint,TapaniPuisto,GovernmentITservicecenter,StateTreasury,page2
58
https://asp.innofactor.com/hkiliikunta/EnrolmentClient/calendarselect.aspx
59
Seeforinstance
http://www.huoltovarmuus.fi/documents/7/Verkkotunnistautuminen_Jukka%20Keso.pdf
60
http://www.suomi.fi/suomifi/laatuaverkkoon/asiointi_ja_lomakkeet/sahkoinen_asiointi/verkkotun
nistaminen_ja_maksaminen/
TNO report | 36 / 64
2007 was willing to pay a substantial part of the VETUMA development and
implementation, but this programme would end in 2007.
2006 Several systems were already integrated in VETUMA, such as the
FINEID card identification, the TUPAS identification of the banks and
2007
the next step would be to also integrate mobile identification into the
platform. However, the Finnish organisation for Telecom Operators,
faced several problems.
2007 Fifteen services of government entities were available61 making use of the
VETUMA platform. A statistical analysis of the ministry of Finance
showed that in 2007 over 80% of the citizens who used the VETUMA
platform to obtain a government service used it in combination with the
TUPAS online identification solution of the banks62.
Diffusion
2008 34 government organisations had joined up the VETUMA project.63
Ministry of Finance together with Fujitsu continued to present the
January
solution during seminars across Finland, to stimulate government
organisations to join up.
2008 The National Audit Office published a critical report on Finnish eIDM
systems64. The main conclusions & recommendations:
January
development of eIDM systems has been inefficient due to the lack of
central coordination and presence of competition between several
eIDM systems.
development and operating costs of eIDM systems were from in total
approximately 40 million euro. Stronger coordination could have
reduced this expenditure.
more uniform and streamlined operation and monitoring of online
identity management is needed.
2009 The VETUMA project moved from the VALT IT Department of the
Ministry of Finance to the State IT Service Centre of the State Treasury65.
2009 The VETUMA solution was used by around 60 government
organisations66
Spring
2009 A new tender was published for the further development of the VETUMA
platform.67 Plans included that the VETUMA service would be made
June
interoperable with other identity services (e.g. KATSO system)68.
September The Act on Electronic Authentication and Signatures came into force69,
2009 which implied that all service providers offering strong eIDM services
will fall under the supervision, controls and new regulations70.
61
Seehttp://www.vtv.fi/files/145/161_2008_Tunnistuspalvelut_NETTI.pdf
62
http://b2cpro.vtt.fi/documents/seminar/b2cproseminaarimikkola.pdf
63
http://www.fujitsu.com/fi/services/sahkoinenasiointi/
64
http://www.vtv.fi/files/135/1622008_Metsahallitus_NETTI.pdf
65
http://www.statskontoret.fi/public/Default.aspx?culture=svFI&contentlan=3&nodeid=15808,see
http://www.icait.org/conf43/docs/Conf43_The_Status_of_ICT_in_Governments_2009.pdf,page4
66
http://ec.europa.eu/idabc/servlets/Doc?id=32305
67
http://www.hankintailmoitukset.fi/sv/notice/search/?all=1
68
http://ec.europa.eu/idabc/servlets/Doc?id=32305
TNO report | 37 / 64
2010 - ? More legislative changes are anticipated to change the Finnish eIDM
landscape in 2010. A new Population Register Act, the amendments to the
Passport Act and a totally new Identity Act are under preparation at the
Ministry of Interior and will come into force in 201071. Most of these
changes are still underway and not currently implemented in practice
today. Mobile PKI services are most likely to appear soon in the Finnish
eIDM market as well as Open ID. The future of the FINEID card is still
unclear. By the end of December 2009, Citizen Certificates had been
issued to a total of 286,000 people72. There are no concrete plans to boost
its adoption among citizens.
Figure 4 (see next page) shows how the VETUMA system works in practice73. The
VETUMA authentication service for citizens is integrated into different communal
websites in order to users to access eServices. VETUMA system verifies the users
credentials through an LDAP framework offered by either PRC or the users bank
service. Upon successful authentication by either of the services, the end user can
access the local service. The user visits the communal website to access a local portal,
which redirects the user to the VETUMA authentication service website, from where
the user is identified by querying the Population Information System (in case of
FINEID) or the users bank service (TUPAS). When authentication is successful, the
VETUMA service logs in the end user at the local Internet service.
69
http://www.epractice.eu/en/news/293726and
http://www.ficora.fi/en/index/viestintavirasto/uutiset/2009/P_32.html
70
http://ec.europa.eu/idabc/servlets/Doc?id=32305
71
http://ec.europa.eu/idabc/servlets/Doc?id=32305
72
In2009theTUPASidentificationsystemstilldominatedtheFinnisheIDMpractice.InJuly2009,
theTUPAStokenswereusedupto99%aseIDtoobtainonlinegovernmentservices
http://ec.europa.eu/idabc/servlets/Doc?id=32305
73
Adopted from www.suomi.fi/vetuma and IDABC
TNO report | 38 / 64
Figure 4 Progress diagram of how a user authenticate, identify and pay with the VETUMA service
H2 (NORMS AND VALUES): Trust can be based upon the sharing of norms and values
between individuals.
Having the same interests was an important prerequisite for trust. The municipalities
and central government agencies shared the interest to deploy the VETUMA system on
a larger scale. Most stakeholders said that this shared interest or vision was present in
the initiation phase of the project. However, respondents hardly mentioned the role of
shared values, except honesty (which is obviously strongly related hypothesis 7: unmet
expectations) and being a professional. However, they mentioned trust as a social norm
in Finland a lot. It seemed that the fact that Finland is a high trust country came not as a
surprise for them. The social norm of openness (e.g. no hidden agendas) was appointed
as a result of the high level of trust in Finland.
struggled with the same problem: there was no common identification mechanism for
their e-Government services, which hampered service innovation. Although they
worked for many years together, this critical concern brought them together.
Additionally, the project managers stated that they went through many things (in other
words experiences) together: We have worked for so long, and made so many things
together. In the contrast, distrust raised when the ministry of finance had to take over
the ownership of VETUMA in the implementation phase. Some initial team members
doubted if the ministry of finance shared the same concern (and passion) for VETUMA
as the manager of the Information Society programme. One respondent described his
trust with another team member as chemistry: a quick and implicit feeling that he
could rely on this person. This intuition for trust was also observed in the Austrian case.
H4 (ROUTINISATION):
The higher the routinisation (more knowledge and experience) in actions of a person
the more predictable the actions of that person and the more trust people have in the
reliability of that person.
The four municipalities in the Helsinki region have been working together on ICT
projects for decades. This working experience that resulted in a network of strong ties
was essential in the initiation phase of the project: Trust played a role especially in the
planning phase, it was not just that we were geographically close, we knew each other
very well from different working groups, so sure trust was important. In the initial
planning team everybody knew each other: it affected yes, because I knew them almost
everybody in a way, at least in a name, easy to join the group. These routinized strong
ties helped to speed up the project in the beginning: It helped a lot in, without it we did
not get to fly. Knowing each other very well can have a negative effect as well.
According
H5 (TRANSFERABILITY OF TRUST):
Trust is transferable between individuals.
VETUMAs project manager was very well connected and known in the Finnish
government ICT world. Therefore, she was a linking pin for most project members
throughout the whole VETUMA project: Anna was the common background for all of
us. Transferability of trust seemed to be a mechanism here: that a new project member
knew the project manager was seen as a qualifier for trust.
H7 (UNMET EXPECTATIONS):
A decline of trust between individuals can emerge in case one of the involved parties
does not live up to the expectations of the other.
Strangely, despite the initial urgence expressed by the Helsinki region municipalities,
the number of e-Government services that use VETUMA identification is still lagging
behind. The expectation was that some large municipalities that were pressing
innovation in the start already had services on the shelf waiting for VETUMA. These
unmet expectations decreased trust in the diffusion phase of the VETUMA project: in
the working group Project Manager X always said that their time schedule is so rapid,
have to have it (VETUMA) fast. Now it is 4 or 5 years after these statements and
VETUMA has still not been implemented. We trusted that their signal that it will be
implemented, but that is not the case. So, it is important to meet the individual
expectations expressed at the start of a project. When expectations are not met due to
barriers, these have to be timely and explicitly communicated.
H9 (HIERARCHY):
In the case of a low level of trust during joint innovation, trust is compensated by
mechanisms of hierarchy
The VETUMA team consisted of two groups: a project team and a management board.
These organisational structures were seen as an institutionalization of trust: the whole
system that you have committees, working groups and agendas, therefore I would not
do something without trust. Respondents were aware of hierarchical mechanism, such
as escalation, that can compensate trust. The openness of communication between all
individuals (e.g. between the project board and the management board) was an enabler
for hierarchical mechanisms. One of the respondents said: It is such an open area, if
someone is doing so (opportunistic behaviour), it is clear that also his or her boss will
know about it. So, creating an open environment, in which all hierarchical layers can
follow the innovation process enables hierarchical mechanisms for trust.
Minutes were actually made, but had a technical communication function: during
formal follow up meetings there are minutes written, but these are mostly technical:
everything is written down as specifications. Specifically, no contracts or formal
minutes were made before the procurement of the system (so initiation phase). One
respondent recognized the absence of contracts and minutes as a problem: some people
expect that you have all agreements on paper, but we did not. Sometimes watch dogs
(e.g. political parties, inspectors, auditors) have distrust and when you do not agree you
can show that on paper. This refers to the state audit commission that assessed the
identity management infrastructure in Finland. That high trust can lead to an absence of
legal mechanisms can be problematic for the accountability and transparency of an
eIDM project.
H12 (CREATIVITY):
Trust is a necessary requisite for creativity in a team.
No specific comments were made on the creativity of the team. However, it was
described that a high level of trust stimulated cooperation. As one of the VETUMA
team members stated: There was a high level of trust. We had a perfect a group and
collaboration was good.
Trust allowed the VETUMA project members to discuss their interests and concerns
openly without damaging the interpersonal relation: If there were problems we could
discuss them, if we want it or something new, we could tell it and a respondent that
worked with the management board: we might have loud discussions, but we have still
TNO report | 42 / 64
a close relationship. Somebody coming from outside the group or from different culture
(e.g. low trust), will say that we would be arguing and would not lead to anything.
Another respondent said that everybody could see their role / interest: I did understand
the role of some people, and they are acting by their roles. ...we have very tight
discussions going on, but we can change the roles, no problem. There is a basis for
trust. So, interpersonal trust enables open communication within a project group,
which makes it easier to come to a consensus.
H15 (RISKS):
Trust is a precondition for the willingness of jointly taking risks.
The deployment of the VETUMA eIDM system was a risky business. Respondents for
example, said that there were privacy or hacking risks. To bear these risks, it was
important that that the VETUMA stakeholders could rely on each other, even when
difficulties in the project happened. Specific examples are difficulties with procurement
law or the slow take-up of VETUMA by services. Fujitsus business model was also
based on trust: the government agencies should pay per user instead of a fixed amount
for the development and implementation of the VETUMA system. This means a high
risk for Fujitsu when the number of users lags behind.
H OTHER (CLOSURE)
A question that was raised several times is: how open is the high level of trust organised
in the VETUMA project? Are distrusted people from the start avoided? One can
conclude that there were signs of group closure (e.g. see hypothesis 6). As one of the
respondents puts it: We Finnish people are not so open, outgoing, and when we are
around the table we have same issue. When we come at same table, trust is not the issue
at all. We wont have them at the table if we do not trust them. We just will not work
together. So, to what extent are groups of individuals with high trust really open? Is
this potential closure not a potential risk to the innovation process?
TNO report | 43 / 64
6 Netherlands: DIGID
6.1 Introduction
Initiation
1999 The Ministry of the Interior had been developing a nation wide Public
Key Infrastructure (PKI) for the identification and authentication of
citizens and businesses. The development of the PKI was conducted by a
Taskforce PKI, a commission which consisted of senior managers of
various ministries and government agencies and was coordinated by the
Ministry of the Interior. It seemed that the costs of the PKI solution were
too high in relation to the benefits of the system: a study revealed that the
frequency of contact between citizens and government were far too low to
counterbalance the expenses. The use of the PKI would also be complex
and difficult to use for citizens. Interviews revealed a lack of trust
between parties involved in the taskforce.
2002 Three senior managers of separate national social security agencies
agreed to jointly develop an eIDM system. Their organizations wanted to
offer their clients electronic services but did not have the means to
securely identify and authenticate those clients. In their view, the PKI
process was too complex, cumbersome and inert
2003 The three senior managers convinced other social security agencies to
draw up a white paper in which the parties jointly stressed the importance
to speed up the process. The white paper was signed by the CEOs of six
social security agencies, namely: the Centre for Labour and Income, the
Board of Health Insurances, the Institute for Employers Insurances, the
Information Management, the Social Security and the Tax Office.
Development
2003 The steering committee National Authentication Provision (NAP) was set
up, which aim was to coordinate the development of an eIDM system.
May
The intention of the NAP was to create a simple solution as around 80%
of the interaction between government and clients concerns relatively
insensitive data exchange which can be supported by a low security level
tool. A simple tool was also easier to implement than the complex PKI.
2003 The NAP gave the Bureau Chain Automation Labour (BKWI) and
Income the mandate to build the application. BKWI hired the consultancy
company Zenc to carry out a feasibility study and to define the technical
specifications.
2003 BKWI commissioned the company Alfa & Aris to develop the DIGID
74
Mostly based on interviews and desk research (see also Huijboom, N.M. The influence of social capital on
joint innovation processes, forthcoming).
TNO report | 44 / 64
2004 BKWI started pilot projects to test the solution developed by Alfa & Aris.
Implementation / diffusion
2004 The DIGID was ready for nation wide adoption by government agencies
and BKWI organised several conferences to stimulate the adoption.
Summer
2004 The management of DIGID solution shifted from the NAP group to the
ministry of interior. They temporarily delegated the management of
DIGID to the Tax Office and ICTU.
2004 The Ministry of the Interior established a joint management organisation,
called Gemeenschappelijke Beheer Organisatie (GBO) which task would
2005
be the management and further development of DigiD.
2006 2006 the GBO started its activities and herewith the financing and
management of DigiD became structural
January
2009 DigiD has been adopted by around 300 municipalities, 4 provinces, 8
Water Management Boards, 4 Health Insurance Companies and some 20
other government agencies
2010 - ? Noteworthy however is the recent discussion which has started about the
limited security level the DigiD system offers and the question has raised
how to increase the security level, for instance by using PKI technology
DigiD (digital identity) started as NAO. DigiD identifies and authenticates Dutch
citizens to enable the interaction between government and individuals. DigiD works on
the basis of a unique national identifier, the citizen service number (BSN -
BurgerServicenummer).Currently, DigiD has two security levels75: (1) username and
password (low security level) (2) username and password combined with a unique code
provided by text message (medium security level). In practice, citizens can apply for a
username and password by a digital form on the DigiD website. Five days after having
completed the electronic form, the user will receive a code by post with which he/she
can activate his/her username and password. When the username and password are
activated, the user can obtain the digital services of governments which require this low
security level. To use the medium security level citizens have to apply for the Short
Message Service (SMS) authentication through the DigiD website. This process is
similar to the application of the low level security. According to IDABC (2009), a third
security level was originally planned in the form of a national electronic identity card
75
See ePractice.eu and IDABC (2009)
TNO report | 45 / 64
(eNIK). However, the introduction of the eNIK card is delayed, as a judge ruled in 2007
that the procurement process would need to be redone.
Figure 6 shows how the identification process works when the citizen acquired his
username/password and/or SMS service. According to IDABC (2009):
1 A citizen approaches a Service Provider (SP) for an eGovernment service.
authentication is necessary to receive this service
2 The SP sends a message to the DigiD to receive a Request Identifier (RID)
3 The SP receives a RID
4 The SP sends this RID to the citizen
5 The citizen is (with the RID) redirected toDigiD
6 DigiD checks whether the username and password are available in the DigiD
database
7 In cases where a higher level of assurance is required, DigiD sends an additional
SMS with a one-time password to the citizens mobile phone. If all is correct, DigiD
sends a message via the user to confirm that the user is authenticated
8 Via a direct and secure channel between DigiD and the SP, the SP can request the
Citizen Service Number
9 This Citizen Service Number is delivered to the SP
10 If necessary this number can be used by the SP to request additional information
about the user from a basic register
.
H1 (PERSONAL CHARACTERISTICS):
Trust can be based upon personal characteristics, such as integrity, benevolence and
capabilities.
Personal capabilities, both in personality and expertise, were important indicators for
the presence of interpersonal trust. Several respondents said strong expertise qualified
unknown persons for a trust relationship: I highly trusted him. He really knew what he
was talking about. He was a big wall of knowledge, a real expert. I immediately knew
that I wanted to hire him. Expertise is a specific ground, but can also help to build
trust over time: In the beginning the contact with him was very remote and reversed,
trust emerged at the moment we mutually recognised each others technical expertise
and professionalism. One of the respondents stated that they matched several personal
characteristics: We all pay a lot of attention to non-verbal communication, to mutual
feelings, to the emotional underflow. Similar personal characteristics can be the
underlying mechanism of the chemistry trusted people feel. Also in cases of distrust,
norms and values were addressed. One of the respondents did not trust another, because
this person was too busy with materialistic and status enhancing activities.
government and that we, in turn, were looking for potential pilots., Sharing the same
interests in a project increases trust as well from a more rational perspective, One of the
stakeholders told in an interview: I really trusted him, because he had the same agenda
and interests as I had. He never played a trick on me.
H4 (ROUTINISATION):
The higher the routinisation (more knowledge and experience) in actions of a person
the more predictable the actions of that person and the more trust people have in the
reliability of that person.
When we asked the stakeholders of DigiD why they trust someone, the strength of the
tie was answered in most cases. For example, one of the stakeholders said:You can
call the trust within this network solidified trust, it is trust with a history, trust that over
time has become so strong and so settled that no member will break it.
Predictability is also traded off against shared norms and values: He was very
transparent and honest about the interests of his organisation and about what he could
accomplish and what not. He really tried to move the national authentication system a
step further; he was constructive, transparent, open. However, his organisation had her
own interests. So I trust the person, but because of the interest within the organisation
he belonged to, he was not always predictable. Routinisation assumes that trust is not
just a given fact; it is built up over time. In the DigiD case, trust was reaffirmed during
project meetings, by stressing the common interests and vision. One of the project
managers states: we had to mutually reassess and reconfirm the level of trust at the
beginning of each meeting. I constantly reminded the group of our common interest: the
creation of one, shared infrastructure.
H5 (TRANSFERABILITY OF TRUST):
Trust is transferable between individuals.
Many interesting cases of transferability were found in the DigiD case. There seems to
be a direct and an indirect form of transferability in this case. The direct form refers to
sharing a friend of acquaintance that introduces you. This was mentioned several times,
for example: I trusted him. He has and had a very strong tie with my colleague, so we
had a shared acquaintance. A more indirect form of transferability is reputation. This
refers the knowledge the personal network has of the trustworthiness (e.g. based on
personal capabilities, etc.). As one of the respondents stated: I met or saw him once or
twice and I think he is a professional in what he does. He has a good reputation. I know
some people he also knows very well. A respondent stated that the mechanism of
TNO report | 48 / 64
H7 (UNMET EXPECTATIONS):
A decline of trust between individuals can emerge in case one of the involved parties
does not live up to the expectations of the other.
Meeting expectations is closely related to the concept of routinisation: does someone
structurally keep his word? A stakeholder in the DigiD case gave an example of unmet
expectations in a buyer-supplier relationship: I find reliability very important. If I
cannot trust somebody I wont work with him or her. We had a supplier once, who was
not honest about 5.000 euros. One may think that this is a small amount of money, but it
had severe consequences for this supplier. He has never been hired by me again.
Everybody knows that you cannot fool me without consequences. You have to be
honest.
H9 (HIERARCHY):
TNO report | 49 / 64
In the case of a low level of trust during joint innovation, trust is compensated by
mechanisms of hierarchy.
Hierarchal mechanisms worked in two ways. In the absence of trust, you have to trust in
the decision power or formal procedures. However, hierarchy instead of trust makes
decision processes slower and can therefore impact the speed of the innovation process.
In the view of some respondents in DigiD case, this has been the case in the PKI
project: Hierarchical trust is seen as decision power: The lack of trust in the PKI
project was an important barrier for progress, it made the process cumbersome, the
lack of trust paralyzed the process. On the other hand, having decision power over
others or within the organisation increases trust. This has been the case in the
hierarchical relationship between the consultant and the contractor in initiation phase of
the DigiD case.
H12 (CREATIVITY):
Trust is a necessary requisite for creativity in a team.
No specific cases of trust increasing or decreasing creativity have been found.
infrastructure. Although the parties had their different (and sometimes conflicting)
interests, they were open about it and stressed the common goal rather than the
deviating interests. The lack of trust between the rivalling projects (PKI and DigiD) did
certainly not help to bridge their deviating views on eIDM. As one of the respondents
puts it: I said to him stop the PKI development it is not going to work and he just
couldnt cape with my critique.
H15 (RISKS):
Trust is a precondition for the willingness of jointly taking risks.
With a rival project in the background (PKI), the DigiD project was not without any
risks. Financial and organisational (e.g. loss of jobs) risks seemed to play an important
role in the start of the project. Were the different stakeholders able and willing to invest
in a new system? Respondents stated that the high trust at start of the project was
critical in bearing these risks: The trust between parties was that large that we dared
to take risks and to invest money. The trust was large because all members had a good
reputation as regards keeping appointments, we were dependent on each other and we
all knew that not being reliable would have severe personal consequences. In case of
high risks, trust between the persons was a necessary prerequisite: In risky situation
you have to trust each other for a 100%, I worked with the people I fully trusted.
H OTHER (CLOSURE):
Apart from taking hierarchical, financial and legal measures, group closure was
mentioned as an important instrument in case of distrust. In the DigiD case this showed
that the initiators were reluctant to let people enter the group that did not want to make
the same progress: He wanted to join the group, but I did not want him to join the
group, neither did the others. This had to do with his personality and the low level of
trust. Besides we did not want the policy machinery to slow down the project. Another
respondent explicitly mentioned closure mechanisms as well: If someone is not
trustworthy he or she will not be actively involved in the network
TNO report | 51 / 64
7 Cross-case analysis
Table 6 shows how every hypothesis is manifested in each case. Such a table allows to
analyse the hypotheses on a higher aggregation level and to test if an observation in one
of the case studies is substantiated by the other case studies.
H1 (PERSONAL Independency and expertise Expertise was an important Technical and legal Personality and expertise
CHARACTERISTICS) were important grounds for ground for trust and was expertise proofed to be were important indicators for
trust. especially important in an important source for trust. Expertise can help to
All cases confirm lower hierarchies of the trust. Respondents said it build trust over time.
organization. was more important than
H2 (NORMS AND Norms and values was Highly important and Norms and values were High trust team that initiated
VALUES) present in trust present in the high trust in less important for trust. the DigiD project shared
relationships, but too a the team designing and Basis norms and values specific norms and values,
3 out of 4 cases lesser degree in distrust developing the eIDM were shared on a macro and persons that explicitly did
confirm relationships solution level: openness and not share these norms and
professionalism. values were distrusted.
H4 Routinisation and strong The basis for intense and The four initiating The strength of the tie and
(ROUTINISATION) ties were an important good collaboration in the municipalities had a predictability of persons was
mechanism to build trust. development team was routinised and strong mentioned as most important
All cases confirm found in strong ties at the relationship. They knew for trust relationship, more
university. what to expect. than values or personals
capabilities.
H5 There were no particular Transferability occurred Trusting a common Many cases of transferability
(TRANSFERABILITY cases of transferability occasionally between the person (in this case the
OF TRUST) found. members of high trust Project Manager) formed
teams. basis for trust.
3 out of 4 cases
confirm
TNO report | 52 / 64
H6 (CONTROL IN Serious cases of control in Mild cases of control in Only few cases of Respondents were very much
ABSENCE OF absence of trust. Integrity absence of trust. Control control in absence of aware of how to control a
TRUST) of action was assessed and manifested in being more trust. Control manifested relationship when distrust was
opportunistic behaviour is closed and institutionalizing in being more closed to high. Closure and hierarchical
All cases confirm opposed with hierarchical trust in working groups. external parties (e.g. the measures are taken.
measures (i.e. escalation). KATSO consortium)
H7 (UNMET No particular cases of Unmet expectations One case of unmet Unmet expectations
EXPECTATIONS) unmet expectations. happened: it is the opposite expectations happened. happened: it is the opposite of
of routinisation, as it Respondents expressed routinisation, as it decreases
3 out of 4 cases decreases the predictability. the need to live up the the predictability.
confirm promises made in the
early stage of VETUMA.
H8 (JOINT Solving conflicts clearly Solving conflicts clearly Not many conflicts. The No cases of solved conflicts
SOLUTION OF helped to build trust in the helped to build trust. It is only large conflict was were found, but respondents
CONFLICT) case no hierarchical closely linked to identity not solved, so no data. knew solving conflicts would
measures were needed to and empathy. help to (re)build trust.
2 out of 4 cases solve it.
confirm
H9 (HIERARCHY) Hierarchical measures Hierarchy was clearly seen Hierarchy played a mild In absence of trust, decision
(formal minutes, decision as a compensation for trust. role. Involving all power and formal procedures
All cases confirm power and escalations) Formal structures (e.g. hierarchical layers are important. Hierarchy
were taken in case of working groups) were enables trust: it create an makes the innovation process
conflict and high level of needed to bring distrusting open environment, where slower.
distrust. parties together. actions can be watched.
H10 (LEGAL Contracts and joint Respondents see contracts, No formal Not many legal mechanisms
MECHANISMS) statements were mentioned agreements and official documentation was seen were mentioned by the
as compensation and driver minutes as signs of distrust. as needed and contracts respondents of the DigiD
2 out of four cases of trust. It simply decreases became important when case.
confirm risk and increases commercial parties
predictability. entered the project. After
the project legal
mechanisms were seen
as necessary for external
parties that did not trust
the project (e.g. auditors)
H11 (TRUSTED An external consultant was No specific instances of On national scale, the Trusted Third Party worked
THIRD PARTY) used as a trusted third trusted third parties were state auditor commission as a broker in the DigiD case:
party, but was not found. was trusted third party bridging interests and so
No cases confirm successful as it was not (and mediator) between compensating the absence of
trusted enough. KATSO and VETUMA trust.
system.
TNO report | 53 / 64
H12 (CREATIVITY) Creativity can be blocked Trust made the development No specific examples of No specific examples of
in cases of low trust (e.g. team rather efficient and influence of trust on influence of trust on creativity
1 out of 4 cases do not trust the ideas of the open. Creativity was not creativity were found. were found.
confirm other). explicitly mentioned.
H13 Motivational control was Commercial goals were Motivational controls Motivational control was seen
(MOTIVATIONAL very much apparent in the clear and used as a control (such as incentives) did in hierarchically asymmetric
CONTROL) Belgian case. Dependency mechanism. Market not compensate, but (i.e. dependent) relationships.
was used to control e.g. mechanisms made the increased trust.
All cases confirm commercial parties. interests predictable.
Independency makes
people more trustworthy.
H14 (BRIDGING In the Belpic case, trust was High level of trust in the High level of trust High level of trust is easier to
DEVIATING needed to express opposing development team created allowed expressing put all different interest
INTERESTS) views. an open environment and opposing interests, openly on the table, without
allowed criticism. Trust opinions and ideas in an provoking conflicts. This was
All cases confirm brought also technical and open environment, important in the initial and
legal perspectives on eIDM without interpersonal development phase.
together. relationships.
H15 (RISKS) Trust was needed to deal Without trust, parties would Trust was needed to bear In case of high risks
with organizational not have invested in the the financial and (organizational, technical and
All cases confirm complexity in the eIDM project. organizational risks, financial) in the DigiD
consortium that developed especially in the project, trust between persons
the eIDM infrastructure. initiation phase. was crucial.
H OTHER In the absence of trust, Distrust would block Closure was explicitly
(CLOSURE) people will try to keep collaboration. There mentioned as an important
distrusted persons out of were several signs of instrument in case of distrust.
decisions in the innovation group closure in the
process. Finnish case.
8 Conclusions
In this chapter conclusions and recommendations for each hypothesis studied in the
case studies are discussed. The mechanism, role in the innovation process and
recommendation for policy-makers and other government practitioners are outlined.
Role of innovation: In highly specialised society, knowledge is the key for innovation,
therefore it is important to have the right expertise in the innovation team.
Role in innovation: Strong norms and values and high level of trust can impact
innovation in two ways. First, it enables and speeds up the innovation process as no
control mechanisms are needed. Second, strong trust based on norms and values can
cause group closure (see the conclusion & recommendation on closure in 8.3.9).
are several similar innovations build by separate groups, identification and empathy is
more important as groups feel that they have a shared enemy.
8.1.4 Routinisation
Routinisation increases the information individuals have of the others; herewith it
increased the predictability of the other and decreases the uncertainty. In many cases we
have seen that people tend to rely on persons they already professionally know and their
track record, so that they can estimate the behaviour of the other.
Role in innovation process: On the one hand strong information of the expertise and
track record of others enable project managers to select the strongest team, but on the
other hand as the selection may be based on prejudices and can be implicit and
irrational. This can result in overlap and lack of expertise and skills within the
innovation process.
Role in innovation: In groups with many brokers, the information flow is not optimal,
as the opinion brokers control the access to contacts and information based upon their
interest. In optimal situation people are able to access unbiased information and trust
based on their assessment.
few. This can be very efficient during the implementation or diffusion phase of the
innovation process, but can hamper the more divergent processes needed for the initial
phases. So, government practitioners should pay attention to connectedness of the actors
involved and prevent that few opinion brokers control information in the process.
Therefore, it is necessary balance efficiency with an open environment, in which weak
ties feel welcome.
Role of innovation: It might be the case that conflicts without a solution seem to
polarize persons within the innovation process, whereas jointly solved conflicts build
trust and support cooperation. The conflict disrupts the innovation process, but the end
result might be that the trust after the conflict trusts, which may support and speed up
the innovation process in later phases.
Role in innovation: As the subordinate is dependent on the superior, the superior may
have more trust that the subordinate will act in his interest than vice versa. The effect in
innovation processes may be that the subordinate will serve the interests of the
subordinate rather than fully exploiting his or her knowledge or skills to support the
innovation process. In addition, the involvement of individuals higher in the hierarchy
may be particularly important in the initial phase of the innovation process, where
decisions are made and resources are allocated.
Role in innovation: Legal mechanisms are more rational and explicit than trust as
governance mechanisms. Although legal mechanisms will take more time in the
TNO report | 58 / 64
innovation process than trust, it creates an open environment with an explicit clear cut
overview of the rules of the game. However, it may decrease the benevolence and
spontaneous collaboration, which can particularly be needed in the design and
development phase.
8.3.4 Creativity
It seems that in high trust networks both limited and high creativity are present.
Creativity is grounded in the values of the groups, such as openness of deviant ideas. In
high trust networks, people can be closed or open to deviant ideas. Not trust, but the
value and norms within the group ultimately affect the creativity of the group. However,
a certain basis of trust is needed for information exchange. The values however
determine if deviant ideas are shared.
Role of innovation: The strength of weak ties (persons that are only indirectly involved
in the innovation process) for innovation depends on whether the group of trusted
people are open to deviating ideas from these weak ties.
Recommendation: The development and design of and eIDM innovation can only take
place with a certain basis of trust. If this is lacking, policy makers could question the
viability of the project. In case of only a severe innovation lock-in, actors could be
replaced by others to unlock the situation
8.3.7 Risks
Trust is clearly needed to jointly take risks. In order to be able to take a risk, actors have
to be certain that there interests will be respected by the other partners. In case there is
not this basis of trust, interdependencies can compensate this trust, e.g. creating the
feeling that we are all in the same boat. If the interests are in line, people are more
wiling to take risks, as they are more certain that the other will act in their interest.
Role of innovation: At the start and the development of the innovation, uncertainties are
high and there are many risks for the involved persons. This uncertain situation requires
a high level of trust to enable the development of the innovation process.
8.3.8 Efficiency
The observation that a high level of trust in the innovation process can stimulate
efficiency was only found in one of the four cases. However, this is an interesting
observation. A low level of interpersonal trust between actors involved can be one of
the barriers for the development and implementation of an eIDM system. In low trust
environments actors need to reconfirm agreements, to formalise decisions, only limited
information is shared and a high level of involvement is needed (e.g. all partners have to
attend all meetings as they do not trust that the other will take into account their
interests). In cases of low interpersonal trust the cooperation appears not only to be
slower but also less effcient than in in cases of high levels of trust.
8.3.9 Closure
In several cases we found that group closure caused a lock-in effect: opposing views
were not taken into account and distrusted people were excluded from the network.
Role in innovation: Lock-in effect can help to speed up the innovation process, but there
is a huge risk: it limited the access to new ideas in most cases. Lock-in and closure can
hamper rational and well-balanced decision making in the innovation process.
9 Policy implications
This study shows that trust has two sides in the innovation process of eIDM systems.
One the one hand, a high level of trust between the persons involved in such a project
enhances the speed and reach of sharing of information, knowledge and skills. eIDM
projects are knowledge intensive due to the technical, organisational and legal complex
nature. Therefore, a certain level of trust is necessary to deal with this complexity is
absolutely necessarey. On the other hand, most cases show that high levels of trust
combined with very strong norms and values can cause group closure and lock-in
effects. This might have severe consequences for the creative side of the innovation
process, as influence from weak ties (persons that are indirectly involved in the
innovation process) or outside the network is seen as undesirable.
The case studies show that trust is a crucial factor which influences the innovation
process, outcome and impact. However, the cases also show that the notion is versatile
and ambiguous. Whereas other factors, such as funding and legislation are explicit and
tangible, trust is implicit and difficult to grasp. This makes that policy recommendations
are more difficult to make for researchers. However, what we have seen in the cases is
that the large majority of policy makers did not deliberately pay attention to the social
setting and its impact. Before starting a joined-up ICT innovation process, project
managers could more deliberately assess the social characteristics of the network
involved (e.g. the level of interpersonal trust among partners) and based on this estimate
the feasibility of the cooperation.
This study points to the fact that different projects and project stages need rational
assessment of the trust configuration. Ouchi (1980) calls these trust configurations
network governance structures. According to him, there are three governance
mechanisms possible during an innovation process: based on trust, based on market
agreements (such as contracts and buyer-supplier relationships) and based on
hierarchical control (see figure 6). A critical trust assessment based on Ouchis network
TNO report | 61 / 64
Market
Hierarcy Trust
Future research (firmly grounded in the practice of government projects) should give
more normative guidance on these interpersonal trust configurations. A specific trust
configuration assessment for innovation could be used at three specific moments: (1)
start of a project (2) during a project and (3) after a project.
Literature overview
Bradach, J.L. and R.G. Eccles (1986), Markets versus hierarchies: From ideal types
to plural forms, in W.R. Scott (ed.), Annual Review of Sociology, 15:97-118
Chiles, T.H. and J.F. McMackin, (1996), Integrating variable risk preferences, trust
and transaction cost economics, Academy of management Review, 21/7:73-99
Considine, M., Lewis, J.M. and D. Alexander (2009), Networks, Innovation, and
Public Policy, Politicians, Bureaucrats and the Pathways to Change Inside
Government, Palgrave MacMillan: Hampshire.
Deaking, S., and F. Wilkinson (2001), Contract law and the economics of
interorganizational trust, Organization Studies, 22/2: 146-72
Ferrin, D.L, Dirks, K.T., Shah, P.P., (2006), Direct and indirect effects of third-
party relationships on interpersonal trust, Journal of applied psychology
Fox, A., (1974), Beyond contract: Work, power and trust relations, London: Basic
Books
Fukuyama (1995), Trust, The social virtues and the creation of prosperity, Simon &
Schuster, New York
Gambetta, D. (1988), Can we trust trust? in D. Gambetta (ed.), Trust: Making and
Breaking of Cooperative relations, Oxford, Blackwell: 213-37
Lindenberg, S., (2000), It takes both trust and lack of mistrust, The workings of
cooperation and relational signaling in contractual relationships, Journal of
Management and Governance, 4: 11-33
Lewicki, R.J., and B.B. Bunker (1996), Developing and maintaining trust in work
relationships, in R.M. Kramer and T.R. Tyler (eds), Trust in Organizations,
Frontiers of Theory and Research, Thousand Oaks, Sage Publications, 114-39
TNO report | 64 / 64
Nooteboom, B., (2002) Trust, Forms, Foundations, Functions, Failures and Figures,
Edward Elgar Publishing, Cheltenham
Rousseau, D., Sitkin, S., Burt, R.S. and C. Camerer, (1998), Not so different after
all: A cross discipline view of trust, Academy of Management Review, 23, 393-
404.
Sabel, C.F., (1993), Trust studies: Building new forms of cooperation in a volitale
economy, Human Relations, 9, 1133-1170
Shapiro, S.P. (1987), The social control of impersonal trust, American Journal of
Sociology, 93: 623-58
Ven, van de, (1999), The Innovation Journey, New York, Oxford University Press