skip to main content
10.1145/3411764.3445553acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Biographies of Biometric Devices: The POS Machine at Work in India's PDS

Published: 07 May 2021 Publication History

Abstract

The centrality of the biometric point of sale (POS) machine in the administration of food security in Indian's public distribution system (PDS) invites scrutiny for its primacy as a non-negotiable artifact in the monthly PDS process. In this paper, I critically examine how the POS machine emerges as a site for varying imaginaries of a technologically-mediated welfare system for the three primary stakeholders of the PDS, consisting of the beneficiaries, dealers, and state administrators. Drawing on ethnographic fieldwork, the paper traces the histories of interaction and portraitures that the three stakeholders bring to their description and interpretation of the POS machine. It shows that an active POS machine provokes the stakeholders in the PDS to view it as an artifact that invites engagement on practical, moral, and knowledge dimensions. The varying ‘biographies’ that stakeholders narrate of the POS machine, collectively reveal the design, disposition, and functioning of a social justice infrastructure that rests on the compulsions of biometric technologies to improve inclusion and deter corruption in welfare delivery.

References

[1]
National Food Security Act. 2013. The Gazette of India. Retrieved from http://www.egazette.nic.in/WriteReadData/2013/E_29_2013_429.pdf
[2]
Madeleine Akrich, 1992. The De-Scription of Technical Objects in Bijker and Law (eds.) Shaping Technology/Building Society: Studies in Sociotechnical Change
[3]
Syed Intishab Ali. 2016. Fair Price Shop Dealers Intensify Protest for More Commission. The Times of India. Retrieved from https://timesofindia.indiatimes.com/city/jaipur/Fair-price-shops-dealers-intensify-protest-for-more-commission/articleshow/51630348.cms
[4]
Anthony Amicelle, Claudia Aradau, and Julien Jeandesboz. 2015. Questioning Security Devices: Performativity, Resistance, Politics. Security Dialogue. 46.4, 293-306. https://doi/10.1177/0967010615586964
[5]
Arjun Appadurai. 1986. Introduction: commodities and the politics of value. In The Social Life of Things: Commodities in Cultural Perspectives. Ed. Arjun Appadurai. pp. 03-63. Cambridge University Press.
[6]
Kristin Boehner, Janet Vertesi, Phoebe Sengers, and Paul Dourish. 2007. How HCI Interprets the Probes. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 1077-1086. New York, NY, USA: Association for Computing Machinery. https://dl.acm.org/doi/10.1145/1240624.1240789
[7]
Geoffrey Bowker and Susan Leigh Star. 2000. Sorting Things Out: Classification and its Consequences. Cambridge, MA: MIT Press.
[8]
Rajesh Chandwani and Neha Kumar. 2018. Stitching Infrastructures to Facilitate Telemedicine for Low-Resource Environments. In Proceedings of the 2018 SIGCHI Conference on Human Factors in Computing Systems. New York, NY, USA: Association for Computing Machinery. https://doi.org/10.1145/3173574.3173958
[9]
Bidisha Chaudhuri and Lion Koenig. 2018. The Aadhaar Scheme: A Cornerstone of a New Citizenship Regime in India? Contemporary South Asia. 26: 2. 127-142. https://doi.org/10.1080/09584935.2017.1369934
[10]
Bidisha Chaudhuri. 2019. Paradoxes of Intermediation in Aadhaar: Human Making of a Digital Infrastructure. South Asia: Journal of South Asian Studies 42 (3). 572-587. https://doi.org/10.1080/00856401.2019.1598671
[11]
Bidisha Chaudhuri. 2020. Distant, Opaque, and Seamful: Seeing the State through the Workings of Aadhaar in India. Information Technology for Development. 1-13. https://doi.org/10.1080/02681102.2020.1789037
[12]
Juliet Corbin and Anselm Strauss. 2008. Theoretical Sampling. Basics of Qualitative Research. Sage Publications.
[13]
Jean Dreze and Reetika Khera. 2015. Understanding Leakages in the Public Distribution System. Economic and Political Weekly. 1:7. 39-42.
[14]
Jean Dreze. 2016. Dark Clouds Over the PDS. The Hindu. Retrieved from http://www.thehindu.com/opinion/lead/Dark-clouds-over-the-PDS/article14631030.ece
[15]
Jean Dreze, Nazar Khalid, Reetika Khera, and Anmol Somanchi. 2017. Aadhaar and Food Security in Jharkhand. Economic & Political Weekly 52: 51.
[16]
Michaelanne Dye, David Nemer, Laura R. Pina, Nithya Sambasivan, Amy S. Bruckman, and Neha Kumar. 2017. Locating the Internet in the Parks of Havana. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 3867-3878.
[17]
Virginia Eubanks. 2018. Automating Inequality. How High-Tech Tools Profile, Police, and Punish the Poor. St. Martin's Press. New York.
[18]
Elihu Gerson and Susan Leigh Star. 1986. Analyzing Due Process in the Workplace. ACM Transactions on Information Systems. 4:3. 257-270.
[19]
Elihu Gerson. 2008. Reach, Bracket, and the Limits of Rationalized Coordination: Some Challenges for CSCW. In Resources, Co-Evolution and Artifacts. Springer London (2008), 193-220.
[20]
Xinning Gui and Yunan Chen. 2019. Making Healthcare Infrastructure Work: Unpacking the Infrastructuring Work of Individuals. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 3867-3878.
[21]
Meghan K. Halpern, Ingrid Erikson, Laura Forlano, and Geri K. Gay. 2013. Designing Collaboration: Comparing Cases Exploring Cultural Probes as Boundary-Negotiating Objects. In Proceedings of the 2013 Conference of Computer Supported Cooperative Work, 1093-1102. CSCW’13. New York, NY, USA: Association for Computing Machinery. https://dl.acm.org/doi/10.1145/2441776.2441900
[22]
Donna Haraway. 1991. Simians, Cyborgs, and Women: The Reinvention of Nature. New York: Routledge
[23]
Donna Haraway. 2000. Morphing in the Order: Flexible Strategies, Feminist Science Studies, and Primate Revisions. In Primate Encounters: Models of Science, Gender, and Society. Eds. Shirley Strum and Linda Fedigan. University of Chicago Press.
[24]
Sampsa Hyysalo, Neil Pollock, and Robin Williams. 2019. Method Matters in the Social Study of Technology: Investigating the Biographies of Artifacts and Practices. Science and Technology Studies. 32.3. 2-25. https://doi.org/10.23987/sts.65532
[25]
Lily Irani. 2019. Chasing Innovation: Making Entreprenurial Citizens in Modern India. Volume 22. Princeton University Press. https://escholarship.org/uc/item/3239b1qv
[26]
Katya Lindskov Jacobsen. 2015. Political Violence and Humanitarian Technology. Retrieved from http://politicalviolenceataglance.org/2015/05/04/political-violence-and-humanitarian-technology/
[27]
Katya Lindskov Jacobsen. 2017. On Humanitarian Refugee Biometrics and New Forms of Intervention. Journal of Intervention and State Building. https://doi.org/10.1080/17502977.2017.1347856
[28]
Aditya Johri and Janaki Srinivasan. 2014. The Role of Data in Aligning the ‘Unique Identity’ Infrastructure in India. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing. pp. 697-709. https://doi.org/10.1145/2531602.2531687
[29]
Naveena Karusala and Neha Kumar. 2017. Women's Safety in Public Spaces: Examining the Efficacy of Panic Buttons in New Delhi. In Proceedings of the 2017 SIGCHI Conference on Human Factors in Computing Systems. CHI’2017. pp. 3340-3351. https://doi.org/10.1145/3025453.3025532
[30]
Reetika Khera, 2011. Revival of the public distribution system: evidence and explanations. Economic and Political Weekly. 36-50.
[31]
Reetika Khera. 2011. The UID Project and Welfare Schemes. Economic and Political Weekly. Vol. 46. 9. 38-43.
[32]
Reetika Khera. 2018. The Aadhaar Debate: Where are the Sociologists? Contributions to Indian Sociology. 52 (3). 336-342. https://doi.org/10.1177%2F0069966718787029
[33]
Igor Kopytoff. 1986. The Cultural Biography of Things: Commoditization as a Process. In The Social Life of Things: Commodities in Cultural Perspectives. Ed. Arjun Appadurai. pp. 64-91. Cambridge University Press.
[34]
Martha Lampland and Susan Leigh Star. 2009. Standards and their Stories: How Quantifying, Classifying, and Formalizing Practices shape Everyday Life. Cornell University Press, Ithaca
[35]
Brian Larkin. 2013. The Politics and Poetics of Infrastructure. The Annual Review of Anthropology. 42:327-43.
[36]
Shoshana Magnet. 2011. When Biometrics Fail. Gender, Race, and the Technology of Identity. Duke University Press.
[37]
Megh Marathe and Priyank Chandra. 2020. Officers Never Type: Examining the Persistence of Paper in e-Governance. In Proceedings of the 2020 SIGCHI Conference on Human Factors in Computing Systems CHI’ 2020. https://doi.org/10.1145/3313831.3376216
[38]
Noortje Marres and Javier Lezaun. 2011. Material and Devices of the Public: An Introduction. Economy and Society. 40 (4). 489-509.
[39]
Sneha Menon. 2017. Aadhaar-based Biometric Authentication for PDS and Food Security: Observations on Implementation in Jharkhand's Ranchi District. Indian Journal of Human Development. 11:3. 387-401. https://doi.org/10.1177%2F0973703017748384
[40]
Silvia Masiero. 2015. Redesigning the Indian Food Security System through e-Governance: The Case of Kerala. World Development. 67: 126-137.
[41]
Preeti Mudliar. 2018. Public WiFi is for Men and Mobile Internet is for Women: Interrogating Politics of Space and Gender around WiFi Hotspots. In Proceedings of the 2018 ACM Human-Computer Interaction. 2, CSCW, Article 126. https://doi.org/10.1145/3274395
[42]
Preeti Mudliar. 2020. Whither Humane-Computer Interaction? Adult and Child Value Conflicts in the Biometric Fingerprinting for Food. In Proceedings of the 2020 CHI Consference on Human Factors in Computing Systems. (CHI '20). Association for Computing Machinery, New York, NY, USA, 1–12.
[43]
Preeti Mudliar. 2020. In Mangal's New World. In TwentyForty: Utopias for a Digital Society. Ed. Benedikt Fecher. pp. 79-87. Alexander von Humboldt Institute for Internet and Society, Berlin, Germany.
[44]
Preeti Mudliar. 2020. Broken Data: Repairs in the Production of Biometric Bodies. In Lives of Data: Essays on Computational Cultures from India. Ed. Sandeep Mertia. pp. 89-98. https://networkcultures.org/wp-content/uploads/2020/12/LivesofData.pdf
[45]
Neil Pollock and Robin Williams. 2010. E-infrastructures: How Do We Know and Understand Them? Strategic Ethnography and the Biography of Artefacts. Computer Supported Cooperative Work. 19:521-556. https://doi.org/10.1007/s10606-010-9129-4
[46]
Ursula Rao. 2013. Biometric Marginality. Economic and Political Weekly 48, 13: 72–77. Retrieved from http://www.epw.in/review-urban-affairs/biometricmarginality.html 44.
[47]
Ursula Rao and Graham Greenleaf. 2013. Subverting ID from above and below: The uncertain shaping of India's new instrument of e-governance. Surveillance & Society 11, 3: 287–300.
[48]
Ursula Rao. 2018. Biometric Bodies, or How to Make Electronic Fingerprinting Work in India. Body & Society. 24(3): 1-27.
[49]
Samanwaya Rautray. 2018. Aadhaar Verdict: Legal, but Limit Use to Government Benefits, Says Supreme Court. Economic Times. Retrieved from. https://economictimes.indiatimes.com/news/politicsand-nation/aadhaar-verdict-legal-but-limit-use-togovernment-benefits-says-supremecourt/articleshow/65973337.cms?from=mdr
[50]
Simon Robinson, Jennifer Pearson, Shashank Ahire, Rini Ahirwar, Bhakti Bhikne, Nimish Maravi, Matt Jones. 2018. Revisiting “Hole in the Wall” Computing: Private Smart Speakers and Public Slum Settings. In Proceedings of the 2018 SIGCHI Conference on Human Factors in Computing Systems CHI’ 2018. pp. 1-11 Association for Computing Machinery, New York, NY, USA.
[51]
Steve Sawyer, Ingrid Erickson, and Mohammad Hossein Jarrahi. 2019. Infrastructural Competence. In Digital STS: A Field Guide for Science & Technology Studies. Eds. Janet Vertesi and David Ribes. Princeton University Press.
[52]
Amartya Sen. 1988. Property and Hunger. Economics and Philosophy, 4, pp 57-68
[53]
Amartya Sen. 2009. The Idea of Justice. Harvard University Press.
[54]
Ranjit Singh and Steven J Jackson. 2017. From Margins to Seams: Imbrication, Inclusion, and Torque in the Aadhaar Identification Project. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 4776–4824. https://doi.org/10.1145/3025453.3025910
[55]
Ranjit Singh. 2019. Give Me a Database and I will Raise the Nation State. South Asia: Journal of South Asian Studies. 42: 3. 501-518. https://doi.org/10.1080/00856401.2019.1602810
[56]
Janaki Srinivasan and Aditya Johri. 2013. Creating Machine Readable Men: Legitimizing the ‘Aadhaar’ mega e-infrastructure project in India. In Proceedings of the Sixth International Conference on Information and Communication Technologies and Development. ICTD’ 2013. Pp. 101-112. https://doi.org/10.1145/2516604.2516625
[57]
Susan Leigh Star. 1990. Power, Technology and the Phenomenology of Conventions: On Being Allergic to Onions." The Sociological Review 38, no. 1_suppl (1990): 26-56.
[58]
Susan Leigh Star. 1999. The Ethnography of Infrastructure. American Behavioral Scientist. 43:3. 377-391.
[59]
Susan Leigh Star. 2006. Orphans of Infrastructure: Engendering, Commodifying, and the Making of NonPeople. Stanford University Event Calendar. Retrieved from http://events.stanford.edu/events/97/9744/
[60]
Susan Leigh Star and James R. Griesemer. 1989. Institutional Ecology, ‘Translations’ and Boundary Objects. Social Studies of Science. Volume 19, No. 3. pp. 387-420 https://www.jstor.org/stable/pdf/285080.pdf
[61]
Anselm Strauss. 1985. Work and the division of labor. The Sociological Quarterly 26, 1 (1985), 1–19. 40.
[62]
Lucy Suchman. 1993. Working Relations of Technology Production and Use. Computer Supported Cooperative Work (CSCW) 2, 1: 21–39.
[63]
Lucy Suchman. 1995. Making work visible. Communications of the ACM 38, 9 (1995), 56–64.
[64]
Reem Talhouk, Lizzie Coles-Kemp, Rikke Bjerg Jensen, Madeline Balaam, Andrew Garbett, Hala Ghattas, Vera Araujo-Soares, Balsam Ahmad, Kyle Montague. 2020. Food Aid Technology: The Experience of a Syrian Refugee Community in Coping with Food Insecurity. Proceedings of the ACM Human Computer Interaction., Volume 4, CSCW 2, Article 134 https://doi.org/10.1145/3415205
[65]
Martina Tazzioli. 2019. Refugees’ Debit Cards, Subjectivities, and Data Circuits: Financial-Humanitarianism in the Greek Migration Laboratory. International Political Sociology. 13-4. pp. 392-408.
[66]
Sukhdeo Thorat and Joel Lee. 2006. Dalits and the Right to Food – Discrimination and Exclusion in Food-related Government Programmes. Indian Institute of Dalit Studies. Working Paper Series. Volume 1: 3. http://www.dalitstudies.org.in/download/wp/0603.pdf
[67]
Palashi Vaghela, Ramaravind K. Mothilal, and Joyojeet Pal. 2020. Birds of a Caste? How Caste Hierarchies Manifest in Retweet Behavior of Indian Politicians. In Proceedings of the ACM Human Computer Interaction., Volume 4, CSCW 3, Article 212. https://doi.org/10.1145/3432911
[68]
Govert Valkenberg and Irma van der Ploeg. 2015. Materialities Between Security and Privacy: A Constructivist Account of Airport Security Scanners. Security Dialogue. 46:4. pp. 326-344.
[69]
Janet Vertesi. 2014. Seamful Spaces: Heterogeneous Infrastructures in Interaction. Science, Technology & Human Values 39, 2: 264–284.
[70]
Antina Von Schnitzler. 2013. Traveling Technologies: Infrastructure, Ethical Regimes, and the Materiality of Politics in South Africa. Cultural Anthropology. 28: 4: 670-693.
[71]
Anumeha Yadav. 2016. Rajasthan presses on with Aadhaar after fingerprint readers fail: We'll buy iris scanners. Scroll.in. Retrieved from http://scroll.in/article/806243/rajasthan-presses-onwith-aadhaar-after-fingerprint-readers-fail-well-buyiris-scanners
[72]
Anumeha Yadav. 2016. In Rajasthan, there is ‘unrest at the ration shop’ because of error-ridden Aadhaar. Scroll. Retrieved from https://scroll.in/article/805909/in-rajasthan-there-is-unrest-at-the-ration-shop-because-of-error-ridden-aadhaar
[73]
Aumeha Yadav. 2016. Identity Project. Scroll. Retrieved from https://scroll.in/tags/38792/identity-project

Cited By

View all
  • (2024)Social Justice in HCI: A Systematic Literature ReviewProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642704(1-33)Online publication date: 11-May-2024
  • (2024)Representing the adarsh biometric balak or the ideal biometric child: locating poor children’s care work in the Aadhaar welfare stateInformation, Communication & Society10.1080/1369118X.2024.230514827:4(665-682)Online publication date: 5-Feb-2024
  • (2022)Orchestrating a digital platform ecosystem to address societal challenges: A robust action perspectiveJournal of Information Technology10.1177/0268396222108833337:4(359-386)Online publication date: 7-Jun-2022
  • Show More Cited By

Index Terms

  1. Biographies of Biometric Devices: The POS Machine at Work in India's PDS
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        CHI '21: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems
        May 2021
        10862 pages
        ISBN:9781450380966
        DOI:10.1145/3411764
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 07 May 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Aadhaar
        2. Biometrics
        3. Food security
        4. Infrastructure

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        CHI '21
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

        Upcoming Conference

        CHI 2025
        ACM CHI Conference on Human Factors in Computing Systems
        April 26 - May 1, 2025
        Yokohama , Japan

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)54
        • Downloads (Last 6 weeks)7
        Reflects downloads up to 21 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Social Justice in HCI: A Systematic Literature ReviewProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642704(1-33)Online publication date: 11-May-2024
        • (2024)Representing the adarsh biometric balak or the ideal biometric child: locating poor children’s care work in the Aadhaar welfare stateInformation, Communication & Society10.1080/1369118X.2024.230514827:4(665-682)Online publication date: 5-Feb-2024
        • (2022)Orchestrating a digital platform ecosystem to address societal challenges: A robust action perspectiveJournal of Information Technology10.1177/0268396222108833337:4(359-386)Online publication date: 7-Jun-2022
        • (2022)Imagining Caring Futures for Frontline Health WorkProceedings of the ACM on Human-Computer Interaction10.1145/35555816:CSCW2(1-30)Online publication date: 11-Nov-2022

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media

        pFad - Phonifier reborn

        Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

        Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


        Alternative Proxies:

        Alternative Proxy

        pFad Proxy

        pFad v3 Proxy

        pFad v4 Proxy