Article

``A piece of yourself'': Ethical issues in biometric identification

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

Without Abstract

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... Privacy is a crucial human right even its absolutism is contested and in today's advanced world, it is the cornerstone that safeguards who are and supports our on-going struggle to maintain our autonomy and self-determination in the face of increasing state power. The Universal Declaration of Human Rights (12) and the International Convention on the Protection of All migrant Workers and Members of Their families (14) states "The right to privacy is upheld by an array of global and regional international human right treaties. ...
... Indeed, this specific feature of biometric information is one of the reasons that these technologies tend to evoke such heightened privacy concerns [11]. It was argued in [12] that, because biometric images facilitate our identification, we have a fundamental interest in controlling their creation and use, and that morally we have a greater interest in body-based information owing to the relationship between our body and our conception of self. Different experiences and interactions feed into this sense of self, which engenders a degree of complexity to each individual's personal identity. ...
... Consent also implies that an individual should be able to make a voluntary choice regarding his/her participation in a biometric application (Alterman, 2003). There may be situations where an individual does not wish to participate in a biometric application, i.e. he/she opts out. ...
Article
Full-text available
Biometrics is any physical or biological feature that can be measured and used for the purpose of identification and authentication. Its features can be either physiological e.g. fingerprint, hand geometry, the face, the iris, the retina or behavioral e.g. voice pattern and gait (way of walking). The use of biometrics has seen an increase in the invasion of individual privacy due to security concerns. In this paper, we discuss the privacy concerns in biometrics and also provide some remedies to these concerns.
... Unlike other technological innovations, biometrics leads to additional ethical concerns. Collecting biometric data have been described as "giving up a piece of yourself" (Alterman 2003), akin to extracting a biological sample (Milligan 1999), making it "intrusive" (Sprokkereef and de Hert 2012) and "invasive" (Jain and Kumar 2012) for data subjects. With the advent of second-generation behavioral biometrics, issues extend to covert data capture and lack of transparency and consent (Sprokkereef and de Hert 2012). ...
... With the advent of second-generation behavioral biometrics, issues extend to covert data capture and lack of transparency and consent (Sprokkereef and de Hert 2012). This impinges on people's right to control their identity (Alterman 2003;Milligan 1999). This requires an examination and exploration of the ethical implications of the use of biometrics in and by organizations. ...
... The literature on biometrics and ethics positions privacy as an issue of autonomy (Karkazis and Fishman 2017;Sutrop and Laas-Mikko 2012) and the individual's control over how and when they are represented to others (Alterman 2003). Privacy has been conceptualized differently. ...
Article
Full-text available
Biometric technology was once the purview of security, with face recognition and fingerprint scans used for identification and law enforcement. This is no longer the case; biometrics is increasingly used for commercial and civil applications. Due to the widespread diffusion of biometrics, it is important to address the ethical issues inherent to the development and deployment of the technology. This article explores the burgeoning research on biometrics for non-security purposes and the ethical implications for organizations. This will be achieved by reviewing the literature on biometrics and business ethics and drawing from disciplines such as computer ethics to inform a more robust discussion of key themes. Although there are many ethical concerns, privacy is the key issue, with associated themes. These include definitions of privacy, the privacy paradox, informed consent, regulatory frameworks and guidelines, and discrimination. Despite the proliferation of biometric technology, there is little empirical research on applied biometrics and business ethics. As such, there are several avenues for research to improve understanding of the ethical implications of using this technology.
... Iris-based technologies are supposed to be 100% accurate, the most accurate among other biometric solutions and the fastest among all available biometric security solutions [20]. To be recognized, the individual needs only to look at a scanner/reader that takes a high-resolution picture of the eye, and a match is performed between the "live" digital image of the iris and a previously recorded image or template of the individual's iris [21]. ...
... Refugees reported that some locals demanded a commission from families in exchange for providing transportation to an ATM to redeem their payments. Another risk is the danger of retaliation by the country of origin should they obtain, somehow, the iris data for their own nationals [21]. ...
... One of the guidelines, as Alterman [21] correctly argued, is based on the fact that the ethics of biometrics, including the iris, cannot rest on the assumption that its related data are absolutely secure. Threats to privacy in the form of uncontrolled collection of personal data and unauthorized access to personal information are all possible with iris data as with any other. ...
Article
Biometrics are the unique characteristics of the individual that differentiate him or her from any other person. Down and Sands [1] explained that the physiological characteristics refer to the inherited traits that are shaped in the early embryonic stages of the human development. Physical biometrics include, among other things, DNA, fingerprints, hand geometry, vein patterns, face structure, skin luminescence, palm prints, iris patterns, periocular features, retina patterns, ear shape, lip prints, heartbeats, tongue prints, and body odor/scent [2]?[8]. Behavioral characteristics are not inherited but acquired and learned throughout the life of the individual [1]. These include, but also are not limited to, signature, handwriting, vocal prints, keystroke dynamics, and gait?body motion [3]. As a result, the biometrics of a person cannot be stolen, forgotten, or forged. It is what we are [2].
... The first generation of biometrics answers the question, "who are you?" As such, a related ethical concern to answering this question revolves around privacy, which refers to whether an individual has control over how and when their personal information is presented to others (Alterman, 2003). Various forms of privacy may be threatened by biometric technologies (Martin, 2016;North-Samardzic, 2020), including, but not limited to, privacy of the person (i.e., the right to bodily functions and characteristics), privacy of behavior (i.e., the right to enact activities in private and public spaces), privacy of thoughts and feelings (i.e., the right to independent thought), and privacy of location and space (i.e., the right to move in public without being monitored). ...
... Privacy and discrimination are still relevant in cases Content courtesy of Springer Nature, terms of use apply. Rights reserved. of identity mismanagement or tracking fugitives (Alterman, 2003;Norval & Prasopoulou, 2017), but surveillance capitalism is especially concerning for the third generation of biometrics as firms increasingly digitalize work practices and dehumanize employees by converting human data into digital form for analysis (Leidner & Tona, 2021;Prasopoulou, 2017). Moreover, our proposal of six biometric affordances, categorized as inhibiting and augmenting, offers insight into how firms actualize biometric technologies for the purposes of organizational control (i.e., inhibiting) and the production of knowledge and providing feedback to employees (i.e., augmenting). ...
Article
Full-text available
Biometric technologies are at the forefront of organizational innovation, surveillance, and control. In many instances, the use of physiological and behavioral biometrics enhances individual and organizational performance. However, they also have the potential to hinder human wellbeing. In particular, recent generations of biometrics are capable of extracting deeper insights into human behavior, enabling organizational surveillance practices, but may also constrain individual rights and freedoms. While biometric technologies have been evidenced to infringe upon privacy and lead to discriminatory practices, little research has examined the impact of biometrics on dignity, an important ethical construct related to human wellbeing. In this conceptual paper, we draw from the theory of affordances to identify and delineate six affordances of biometric technologies, categorized into inhibiting and augmenting biometric affordances. We propose a framework in which inhibiting and augmenting biometric affordances may simultaneously support and humiliate dignity. This separation offers a theoretical base for future empirical research to explore the increasingly pervasive relationship between biometric adoption and human dignity. Moreover, we explain six paradoxical tensions across three forms of dignity—inherent, behavioral, and meritocratic—in the proposed framework. Finally, we discuss why firms should be responsible for addressing the tensions across dignity forms when they adopt biometric technologies to balance the trade-off between wealth creation and human wellbeing. This offers guidance for practitioners on how to integrate biometric technologies without hindering human dignity.
... Terminologies like "Security & Privacy" are sometimes interchangeably used but are two different concepts. They can be broadly categorized based on concepts, implementation, and applicability (Alterman, 2003). Alterman (2003) has investigated the privacy and ethical issues related to biometric identification which is an emergent category and has been the focus of many articles published in the Web of Science. ...
... They can be broadly categorized based on concepts, implementation, and applicability (Alterman, 2003). Alterman (2003) has investigated the privacy and ethical issues related to biometric identification which is an emergent category and has been the focus of many articles published in the Web of Science. Security and privacy can be considered as two opposing concepts that are inter-linked. ...
Article
Full-text available
This study aims a bibliometric analysis of the 100 top-cited articles extracted from the Web of Science database on the topic of information security in the business context. A retrospective method was applied to the dataset extracted from the Web of Science Database. A total of 500 most cited items were downloaded and the authors selected the articles related to information security and business for further analysis. It was found that the top-cited papers were published between the years 1990 and 2018 and had received 3,375 citations. While most of the articles followed the three-author pattern, the single author pattern articles had received the maximum citation impact. Cybersecurity policies were recognized as the most researched topic and the majority of articles had been published in Quartile-1 journals. Furthermore, the majority (67%) of the articles were published in journals having impact factors ranging from 2.3 to 6.95. The Journal of Management Information System was found to top the list of most prolific journals with 13 articles. This study identifies the trends and patterns of research publications on information security in the business. This evaluation is likely to develop awareness in understanding the scope and coverage of information security from a business perspective. The findings of this study have highlighted the various parameters of highly cited articles on information security published during the last three decades. The results might support new researchers' interest in information security in the context of businesses.
... He argues that our general right to privacy includes the right to control the creation and use of biometric images of ourselves because privacy is control over how and when we are represented to others. In Alterman's (2003) view, "the concept of privacy as related to an abstract self must be combined with the recognition that as moral agents we are also, noncontingently, biological human beings susceptible to certain types of sensations and emotions." Therefore, the right to privacy should be understood as a part of a general social interest in protecting our "embodied persons." ...
... Therefore, the right to privacy should be understood as a part of a general social interest in protecting our "embodied persons." 6 Fully acknowledging that his policy recommendations run counter to current practices, Alterman (2003) suggests that everyone who is asked to submit biometric identifiers voluntarily should be: "1) fully informed of the potential risks; 2) competent to understand the impact of their actions; and 3) under no threat of harm to agree to such an action." 7 We agree with Alterman that the main threat to privacy derives from the potential misuse of biometric data. ...
Chapter
Full-text available
Behavior detection technologies are currently being developed to monitor and manage malintents and abnormal behavior from a distance in order to prevent terrorism and criminal attacks. We will show that serious ethical concerns are raised by capturing biometric features without informing people about the processing of their personal data. Our study of a range of European projects of second-generation biometrics, particularly of Intelligent information system supporting observation, searching and detection for security of citizens in urban environments (INDECT) and Automatic Detection of Abnormal Behaviour and Threats in Crowded Spaces (ADABTS), shows that violations of privacy put several other values in jeopardy. We will argue that since privacy is in functional relationship with other values such as autonomy, liberty, equal treatment and trust, one should take this into account when limiting privacy for protecting our security. If indeed it should become necessary to restrict our privacy in specific situations, thoughtful consideration must be given to other ways of securing the values that form the foundation of our liberal democratic society.
... However, research on biometric authentication has seldom considered biometric characteristics. Unlike other IT systems, biometric authentication has been described as "giving up a piece of yourself" [33]. Biometric characteristics themselves could lead to great controversy, so biometric characteristics are essential for understanding user security behavior in biometric authentication. ...
... Other people's use of biometric characteristics for the purpose of identification is seen as a contradiction of Immanuel Kant's fundamental principle that "humans should be treated as ends in themselves, never merely as a means." (Alterman, 2003) Given that biometric templates digitize the human body, there have been concerns that the process of collecting biometric identifiers not only interferes with the privacy and right to protection of a personal data, but also with the integrity of an individual's body. Therefore, it has been paralleled to body searches or other measures that interfere with a person's physical integrity. ...
Article
Full-text available
The term biometrics derives from Greek (bio=life and metrics=measure) and implies the measurement of biological signs. Biometrics is the science of recognizing people based on their physical, behavioral, and physiological attributes, such as fingerprint, face scan, iris, retina, and voice. The present paper aims to develop a study on biometric identification. The major objective of the study is to conduct a survey among the Romanian population on the importance and knowledge of biometric identification methods. This objective was achieved by assessing the knowledge held by the general population of Romania regarding biometric indicators and the degree of adaptability and openness of citizens related to the widest possible implementation of biometrics. The study was based on conducting a quantitative analysis using a questionnaire. Due to the high degree of accessibility, the online environment was chosen as a method of application, distribution being made through social networks. A biometric template digitizes the human body, it has been argued that the collection of biometric identifiers not only interferes with the privacy and right to protection of a person's data, but also with the integrity of an individual's body. In conclusion, the creation and storage of a unique biometric template must be seen in relation to the purpose of the operation. The protection of citizens from criminal activities is a primary obligation of the state. However, it must be exercised with due respect for a number of fundamental ethical values and in the light of modern human rights law.
... On this basis, specific ethical governance principles of the second-order are formulated, such as the principle of purpose explanation and permission during the data collection and the principle of informed consent and transparency during application. Furthermore, on top of that, make specific operational guidelines for the third-order, such as during the data collection: anyone asked to voluntarily submit a biometric identifier should (i) be fully aware of the potential risks; (ii) have the ability to understand the consequences of their actions; and (iii) consent to such actions in the absence of harm or threat (35). The biggest challenge to this framework may come from social security. ...
Article
Full-text available
Biometric technology has transformed human biological characteristics into a new form of privacy, and the misuse of this technology poses challenges to protecting this new privacy. This article initially defines biometric technology and biometric characteristics, further demonstrating why biometric characteristics belong to personal privacy and how biometric technology poses challenges to its protection. Through analysis, this article argues that the essence of these challenges is the conflicts between the ethical principle of privacy protection and the ethical principle of maximizing social benefits. In order to address these challenges, it is necessary first to weigh the fundamental ethical principles. The two basic principles of privacy protection and maximizing social benefits are not mutual antagonism but hierarchy, and this hierarchy should be based on the principle of practical feasibility. That is, applying biometric technology should first meet the principle of practical feasibility and, on this premise, realize the principle of maximizing social benefits based on not infringing on the principle of privacy protection.
... It embodies the way in which these student cards indirectly unrecognise, deny access to, discriminate against and exclude transgender bodies at the entry points to universities and their facilities. In most cases, student access identity cards contain biometric information, including facial photographs, student numbers, gender markers and study programmes, to provide access not only to the wider campus premises but also to various specific facilities, such as libraries, laboratories and residences (Alterman 2003). Most public universities in South Africa are fenced, and access to campuses or buildings is controlled by security staff who authenticate students and staff through the scanning of access identity cards (Hans 2014) and verifying that the holder is the person whose particulars (including their photo) appear on the card or the access system. ...
Article
Full-text available
This study aimed to critically assess the current state of transgender student inclusion in South African universities, highlighting the challenges, progress and potential areas for improvements that exist. This article highlights the complexities of legal identity, self-determined identity and the recognition of transgender identity in South Africa. Using photovoice and drawings as data collection tools, this study explored the lived realities of seven transgender university participants in a society that upholds heteronormative values and practices. Purposive and snowball sampling approaches allowed us to identify participants for the study among a population that would otherwise be difficult to reach. Contribution: The findings of this study are discussed under themes that are evocative of the students’ experiences of exclusion practices in their institutions of learning. We argue that South African universities should focus not only on increasing diversity but also on creating inclusive environments that support the success and well-being of all student populations, in this case, transgender students.
... In effect, cyberspace has made it easier for businesses to carry out data breaches and consequently violate privacy protection rights according to their customers. 2 Companies have also compromised the privacy of their employees, using the Panopticon phenomenon or the electronic eyes in the workplace to control employees and their performance with the excuse of increasing business productivity. Additionally, such malpractices often claim to enhance the customers' trust and loyalty. ...
Article
Full-text available
Background: This paper deals with the ethical limitations of e-commerce. The aim is to discover areas where the protection is not granted as users would expect and to make proposals for improvement. The authors will begin the paper by proposing the market of e-commerce and how it is directly linked to society’s daily life. The method adopted for the legal perspective is case studies, where the Kingdom of Saudi Arabia’s (KSA) legal context will be explored. In the end, the paper will answer two main questions: What are the ethical challenges facing the issue of data protection in electronic commerce? What are essential legal frameworks that regulate the subject of data protection in Saudi Arabia? Methods: The normative method is applied to identify the main legislations used in e-commerce and data protection, especially regarding big data regulations. A case study analysis is also used where KSA legislation is investigated. Results and Conclusions: The authors saw that e-commerce is an insecure place to protect customer data. This data is stored electronically, so it is very easy to steal it in addition to the use of this data by companies without the permission of the customer. Research proves that laws are unable to keep pace with technological developments and are unable to provide effective protection for data stored in the cloud.
... Consent is also an issue. To give genuine, informed consent for biometric data collection a person needs to be [1] fully informed of the potential risks, [2] competent and understand the impact of their actions and [3] under no threat of harm to agree to such an action (Alterman 2003, p. 147). In 2016, the UN Office of Internal Oversight Services produced an audit of UNHCR's BIMS (OIOS 2016), which found that in four out of five country operations reviewed, the information provided to refugees about the biometric program did not comply with UNHCR's Policy on the Protection of Personal Data of Persons of Concern. ...
Article
Full-text available
Human vulnerability is at the core of refugee status determination and human rights provides its regulatory frame, so to speak of artificial intelligence within the refugee context may seem troubling at least, dystopian at worst. But the rapid development of artificial intelligence in government decision-making will unlikely be slowed by such ethical quandaries. The potential integration of automation, machine learning and algorithmic decision-making into global migration regulation and policy has far-reaching implications for refugee law. The consequences for efficiency, legality, accountability, transparency and human rights warrant a timely and critical conversation about the possible impact of existing and future technologies on refugee status determination. Predictive analytics, biometrics, automated credibility assessments and algorithmic decision-making are technologies that could have utility for refugee status determination processing, credibility assessments and decision-making. Each technology is considered through a lens of ‘risk and potential’, which is measured in terms of ‘fair, efficient and effective’ refugee status determination. The opportunities that artificial intelligence offers for efficiency and effectiveness in refugee status determination are compelling. Artificial intelligence allows for faster data processing and the ability to undertake high-volume, repetitive tasks. Increased consistency and up-to-date information, a capacity to plan for workloads and predict movements and the potential to ‘design out’ existing biases, promise to deliver positive outcomes for asylum seekers. But the risks of integrating artificial intelligence in a decision-making process that is defined by human vulnerability loom large. The lack of transparency in algorithms may result in a denial of procedural fairness, and algorithmic bias continues to be a vexing issue. If refugee and human rights are denied, international protection may be compromised. Technical and contextual issues may increase the potential for error, and unanswered questions remain around legality.
... Όταν τα άτομα υποβάλλουν εθελοντικά τις βιομετρικές τους πληροφορίες, πρέπει να έχουν επίγνωση των πιθανών κινδύνων που μπορεί να προκύψουν, πρέπει να είναι σε θέση να καταλάβουν τα πιθανά αποτελέσματα αυτής της πράξης τους και κυρίως να συναινούν ελεύθερα χωρίς να έχουν δεχτεί κάποια απειλή (Alterman, 2003). ...
Article
Full-text available
Με την ραγδαία ανάπτυξη της τεχνολογίας, αναπτύσσεται παράλληλα και η επιστήμη της βιομετρίας. Η βιομετρία είναι η επιστήμη που σχετίζεται με την αναγνώριση και την ταυτοποίηση των ατόμων βάσει των φυσικών ή συμπεριφορικών χαρακτηριστικών τους. Με την σειρά τους, τα βιομετρικά συστήματα επικυρώνουν με ακρίβεια την γνησιότητα αυτών των χαρακτηριστικών των ατόμων με αποτέλεσμα να έχουν πληθώρα εφαρμογών. Ωστόσο, αναφορικά με την διαχείριση των βιομετρικών δεδομένων τίθενται ηθικά και κοινωνικά ζητήματα. Τέτοια παραδείγματα είναι η ιδιωτικότητα, η αυτονομία, η διαφάνεια και ο κοινωνικός αποκλεισμός ατόμων διαφορετικών ομάδων, για παράδειγμα του γηραιότερου ηλικιακού πληθυσμού. Ανάλογα ερωτήματα τίθενται και για το πώς χρησιμοποιούνται τα βιομετρικά δεδομένα των προσφύγων από διάφορους οργανισμούς και κυβερνήσεις οι οποίες έχουν αναβαθμίσει τα συστήματα ταυτοποίησης στα σύνορα, με σκοπό την υψηλότερη ασφάλεια. Συνεπώς, ενώ η επιστήμη της βιομετρίας έχει συντελέσει στην βελτίωση του βιοτικού επιπέδου και της ασφάλειας των ανθρώπων, δύνοντας λύσεις σε πολλά προβλήματα, παραλληλα έχει αποτελέσει και αντικείμενο συζήτησης σχετικά με το αν παραβιάζει τα ανθρώπινα δικαιώματα.
... However, Tsai et al. (2020) did not analyse multimodal data but rather asked students about other more typically types of data commonly used in learning analytics, such as clickstreams, academic, and socio-demographic-economic data. In our study, multimodal data includes physiological data, electrophysiological activity of the brain, and body-related data, which are perceived as more invasive (under-the-skin) types of data that can impose an additional moral dilemma -one's right to control the use and disposition of one's body (Alterman, 2003). ...
Article
Full-text available
Lay Description What is already known about this topic Many MLA systems are designed without learners' involvement. Understanding of how multimodal data can support learners' authentic needs is needed. MLA have the potential to enable the automated generation of models to provide real‐time feedback. What this paper adds Understanding how learners perceive multimodal data and the learning context. The findings outline the soft challenges in using multimodal data in the learning practice. Ten dimensions were identified to serve as guidelines for researchers and designers. The paper reports learners' perspectives describing new, intriguing, and under‐developed ideas about potential uses of multimodal data in educational context. The discussion on the need for human‐centred design approaches for educational technologies has been presented. Implications for practice and/or policy Relevant pointers for what is appropriate and ethically necessary when designing learning technologies. Change in perspective among educators, on how they address progress and engagement in learning.
... All this is not to say that we should embrace bio-metrics as an unproblematic panacea. As Alterman (2003) has correctly shown, there are many risks and limits in the use of such technologies as well. But it is significant that digital ICTs, in their transformation of the information society into a digital community, are partly restoring, partly improving (see the case of Martin Guerre) that reliance on personal acquaintance that characterized relations of trust in any small town. ...
Chapter
The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they can also alter its nature and hence our understanding and appreciation of it; (d) a change in our ontological perspective, brought about by digital ICTs, suggests considering each person as being constituted by his or her information and hence regarding a breach of one’s informational privacy as a form of aggression towards one’s personal identity.
... The central ethical issue raised by biometric technology is the concept of privacy and security. 16 The researcher siting three instances that show gross violation of privacy on private biometric data. First scenario is where the government have legitimate access to an individual biometric data and it is later used for purposes different from the original intention as in surveillance. ...
Article
Biometric authentication technology are being increasingly used for many applications. Since such technology requires high level human interaction, effective implementation and acceptability of such system depends on users' perception, particularly, in the area of system safety and privacy. This study was conducted using a survey design accomplished through the use of a descriptive rating, Likert‐type survey instrument. Quantitative data were collected from participants in four tertiary academic institutions and Statistical Package for Social Science version 23 was used for data analysis. The survey focuses on three universities and a polytechnic situated in Kaduna metropolis. Deliberate sampling technique was used in selecting the four academic institutions, stratified random sampling technique was used in administering the survey instrument to 50 respondents from each institutions. The survey sampled 200 participants. Result from the study revealed the importance of considering users' perception before the implementation of biometric system. Major factors that significantly influence perception in this study are users' knowledge of biometric system and gender. Furthermore, 99.5% of the respondents show that public enlightenment and formulation of appropriate legal guidelines to back the use of biometric information will instil confidence in users of biometric technology.
... An important part of exercising autonomy is informed consent (19). Anton Alterman proposed that biometrics should have informed consent in the application, and individuals who voluntarily submit biometric information should: (i) be fully informed of potential risks; and (ii) be able to understand the possible effects of their actions; (iii) Make such behavior without any threat (23). Therefore, in order to ensure the individual's informed consent, it is important that the individual understands the purpose and meaning of the biometric system (9). ...
Article
Full-text available
In recent years, the social application of biometrics has brought great benefits, but also caused people’s concerns about privacy protection, autonomy, and social exclusion. Here we have sorted out the ethical issues related to the application of biometrics, such as privacy protection, functional transformation, body informationization, informed consent, and social exclusion, and analyzed their core and unique issues. We believe that the current management specifications for the development and application of biometric technology are significantly behind their development. In addition to the introduction of policies, the regulation or governance of biometrics technology should also accelerate the practice of ethical governance and regulatory governance.
... For instance, biometrics in general pose the same threats to data privacy as any other user data (e.g. unwarranted identification and threats to the individual, undesired collection of personal data, and unauthorized access to personal information), however they also impose an additional moral dilemma because biocentric data has an impact on one's right to control the use and disposition of one's body (Alterman, 2003). ...
Article
Full-text available
ABSTRACT This article aims to investigate the Grand Challenges which arise in the current and emerging landscape of rapid technological evolution towards more intelligent interactive technologies, coupled with increased and widened societal needs, as well as individual and collective expectations that HCI, as a discipline, is called upon to address. A perspective oriented to humane and social values is adopted, formulating the challenges in terms of the impact of emerging intelligent interactive technologies on human life both at the individual and societal levels. Seven Grand Challenges are identified and presented in this article: Human-Technology Symbiosis; Human-Environment Interactions; Ethics, Privacy and Security; Well-being, Health and Eudaimonia; Accessibility and Universal Access; Learning and Creativity; and Social Organization and Democracy. Although not exhaustive, they summarize the views and research priorities of an international interdisciplinary group of experts, reflecting different scientific perspectives, methodological approaches and application domains. Each identified Grand Challenge is analyzed in terms of: concept and problem definition; main research issues involved and state of the art; and associated emerging requirements. BACKGROUND This article presents the results of the collective effort of a group of 32 experts involved in the community of the Human Computer Interaction International (HCII) Conference series. The group’s collaboration started in early 2018 with the collection of opinions from all group members, each asked to independently list and describe five HCI grand challenges. During a one-day meeting held on the 20th July 2018 in the context of the HCI International 2018 Conference in Las Vegas, USA, the identified topics were debated and challenges were formulated in terms of the impact of emerging intelligent interactive technologies on human life both at the individual and societal levels. Further analysis and consolidation led to a set of seven Grand Challenges presented herein. This activity was organized and supported by the HCII Conference series. This is a Public Access article available at: https://doi.org/10.1080/10447318.2019.1619259
... It is worth stressing that face recognition technology has a strong impact on selfidentification. Many scholars in the past years have faced the topic of the relationship Face recognition technology between biometric technology and people's identity and pointed out that biometric technology has a strong influence on identity, because it creates and uses body-based representations to identify people (Alterman, 2003). ...
Article
Purpose This study aims to explore whether face recognition technology – as it is intensely used by state and local police departments and law enforcement agencies – is racism free or, on the contrary, is affected by racial biases and/or racist prejudices, thus reinforcing overall racial discrimination. Design/methodology/approach The study investigates the causal pathways through which face recognition technology may reinforce the racial disproportion in enforcement; it also inquires whether it further discriminates black people by making them experience more racial discrimination and self-identify more decisively as black – two conditions that are shown to be harmful in various respects. Findings This study shows that face recognition technology, as it is produced, implemented and used in Western societies, reinforces existing racial disparities in stop, investigation, arrest and incarceration rates because of racist prejudices and even contributes to strengthen the unhealthy effects of racism on historically disadvantaged racial groups, like black people. Practical implications The findings hope to make law enforcement agencies and software companies aware that they must take adequate action against the racially discriminative effects of the use of face recognition technology. Social implications This study highlights that no implementation of an allegedly racism-free biometric technology is safe from the risk of racially discriminating, simply because each implementation leans against our society, which is affected by racism in many persisting ways. Originality/value While the ethical survey of biometric technologies is traditionally framed in the discourse of universal rights, this study explores an issue that has not been deeply scrutinized so far, that is, how face recognition technology differently affects distinct racial groups and how it contributes to racial discrimination.
... However, processing biometric data raises additional ethical and legal issues, in particular with respect to privacy. Biometric data, similar to genetic material, carries biological traits that are unique to data subjects and which could be easily used to reidentify them [57]. However, it must be noted that, although entailing sensitive personal information, the processing of biometric data can be lawful even without subjects' consent if processing serves the public interest or scientific or statistical research purposes (eg, Article 9.2.(j) of the European General Data Protection Regulation, GDPR) [58]. ...
Article
Full-text available
Advances in information technology are changing public health at an unprecedented rate. Participatory surveillance systems are contributing to public health by actively engaging digital (eg, Web-based) communities of volunteer citizens to report symptoms and other pertinent information on public health threats and also by empowering individuals to promptly respond to them. However, this digital model raises ethical issues on top of those inherent in traditional forms of public health surveillance. Research ethics are undergoing significant changes in the digital era where not only participants’ physical and psychological well-being but also the protection of their sensitive data have to be considered. In this paper, the digital platform of Influenzanet is used as a case study to illustrate those ethical challenges posed to participatory surveillance systems using digital platforms and mobile apps. These ethical challenges include the implementation of electronic consent, the protection of participants’ privacy, the promotion of justice, and the need for interdisciplinary capacity building of research ethics committees. On the basis of our analysis, we propose a framework to regulate and strengthen ethical approaches in the field of digital public health surveillance.
... However, processing biometric data raises additional ethical and legal issues, in particular with respect to privacy. Biometric data, similarly to genetic material, carries biological traits that are unique to data subjects and which could be easily used to re-identify them [57]. However, it must be noted that, although entailing sensitive personal information, the processing of biometric data can be lawful even without subjects' consent if processing serves the public interest or scientific or statistical research purposes (e.g., Article 9.2.(j) of the European General Data Protection Regulation) [58]. ...
Article
Full-text available
Advances in information technology are changing public health at an unprecedented rate. Participatory surveillance systems are contributing to public health by actively engaging digital (eg, Web-based) communities of volunteer citizens to report symptoms and other pertinent information on public health threats and also by empowering individuals to promptly respond to them. However, this digital model raises ethical issues on top of those inherent in traditional forms of public health surveillance. Research ethics are undergoing significant changes in the digital era where not only participants' physical and psychological well-being but also the protection of their sensitive data have to be considered. In this paper, the digital platform of Influenzanet is used as a case study to illustrate those ethical challenges posed to participatory surveillance systems using digital platforms and mobile apps. These ethical challenges include the implementation of electronic consent, the protection of participants' privacy, the promotion of justice, and the need for interdisciplinary capacity building of research ethics committees. On the basis of our analysis, we propose a framework to regulate and strengthen ethical approaches in the field of digital public health surveillance.
... Biometric data, similarly to genetic material, carries biological traits that are unique to data subjects and which could be easily used to re-identify them [49]. It must be noted that, although entailing the use of sensitive personal information, the processing of biometric data can be lawful even without subjects' consent if processing serves the public interest or scientific or statistical research purposes (e.g., Article 9. Protection Regulation) [50]. ...
Preprint
Full-text available
UNSTRUCTURED Advances made in information technology are changing public health at an unprecedented rate. Participatory surveillance systems are contributing to public health by actively engaging Web-based communities of volunteer citizens to report symptoms of public health threats and also by empowering individuals to promptly respond to them. However, such Web-based model raises its own set of ethical issues, on top of those inherent to more traditional forms of public health surveillance. Research ethics is undergoing significant changes in the digital era where it is not sufficient to consider only participants’ physical and psychological well-being, but also the protection of their sensitive data. In this paper, the Web-based platform of Influenzanet is used as a case study to illustrate those ethical challenges which participant-surveillance-systems involving the use of Web-based platforms and mobile apps have to deal with. These ethical challenges include the issues of electronic consent, the protection of participants’ privacy and the promotion of justice. Our analysis is followed by recommendations to strengthen ethical approaches in the field of Web-based public health surveillance, with a particular focus on the role of research ethics committees.
... In this work we focus on two classic obfuscation methods: data randomization and data anonymization (Agrawal and Srikant 2000;Bakken et al. 2004;Polat and Du 2003). Data anonymization is the process by which the values of a column are grouped into categories and each reading is replaced by an index of its corresponding category. ...
Conference Paper
Full-text available
Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world. Yet, surprisingly, metadata are often still catergorized as non-sensitive. Indeed, in the past, researchers and practitioners have mainly focused on the problem of the identification of a user from the content of a message. In this paper, we use Twitter as a case study to quantify the uniqueness of the association between metadata and user identity and to understand the effectiveness of potential obfuscation strategies. More specifically, we analyze atomic fields in the metadata and systematically combine them in an effort to classify new tweets as belonging to an account using different machine learning algorithms of increasing complexity. We demonstrate that through the application of a supervised learning algorithm, we are able to identify any user in a group of 10,000 with approximately 96.7% accuracy. Moreover, if we broaden the scope of our search and consider the 10 most likely candidates we increase the accuracy of the model to 99.22%. We also found that data obfuscation is hard and ineffective for this type of data: even after perturbing 60% of the training data, it is still possible to classify users with an accuracy higher than 95%. These results have strong implications in terms of the design of metadata obfuscation strategies, for example for data set release, not only for Twitter, but, more generally, for most social media platforms.
... The proliferation of representations that identify us uniquely thus involves a loss of privacy, and a threat to the self-respect which privacy rights preserve". According to Alterman (2003) and Rinehart (2000), whenever you give your biometric data, you authorise a form of control over yourself, because you offer up "a piece of yourself". Just as personal property rights preserve a material comfort zone "required to regenerate ourselves as Ethical aspects of tattoo-based biometrics participants in a commodified labor system" (Alterman, 2003, p. 143), privacy rights represent a barrier to alienation in the sense of protecting a personal "psychological comfort zone" necessary to participate in the social system. ...
Article
Full-text available
Purpose This study aims to explore the ethical and social issues of tattoo recognition technology (TRT) and tattoo similarity detection technology (TSDT), which are expected to be increasingly used by state and local police departments and law enforcement agencies. Design/methodology/approach The paper investigates the new ethical concerns raised by tattoo-based biometrics on a comparative basis with face-recognition biometrics. Findings TRT raises much more ethically sensitive issues than face recognition, because tattoos are meaningful biometric traits, and tattoo identification is tantamount to the identification of many more personal features that normally would have remained invisible. TSDT’s assumption that classifying people in virtue of their visible features is useful to foretell their attitudes and behaviours is dangerously similar to racist thought. Practical implications The findings hope to promote an active debate on the ethical and social aspects of tattoo-based biometrics before it is intensely implemented by law enforcement agencies. Social implications Tattooed individuals – inasmuch as they are more controlled and monitored – are negatively discriminated in comparison to un-tattooed individuals. As tattooing is not uniformly distributed among population, many demographic groups like African–Americans will be overrepresented in tattoos databases used by TRT and TSDT, thus being affected by disproportionately higher risk to be found as a match for a given suspect. Originality/value TRT and TSDT represent one of the new frontiers of biometrics. The ethical and social issues raised by TRT and TSDT are currently unexplored.
... They require, however, adjusted technical equipment and the consent of the user to provide samples of their biometric data. The use of this technology raises a number of technological and ethical issues, mostly privacy concerns associated with data storage and the individual right to privacy (Alterman 2003;Bustard 2015;Van der Ploeg 2003). ...
Article
Full-text available
Research background: The ongoing digitisation process in the banking sector, coupled with widespread remote provision of services, is leading to the advent of new solutions in the field of broadly understood security. The increasingly sophisticated forms of attacks on banks’ IT systems and their users have engendered the need to implement authentication methods that would ensure high security levels, but would also be convenient for banks' clients and suited to the requirements of mass service. Biometric technology seems to be a solution to this issue. The two factors that may boost its proliferation are: the fact that banks need to adjust to more rigid regulations, and technological advancements leading to cost reduction and increased availability of biometric solutions in mobile devices. Purpose of the article: The purpose of the article is to assess the prospects for the application of biometrics by the banking sector in Poland in individual customer service channels. Methods: The basis for theoretical considerations comprises the analysis of literature on authentication techniques and research on the processes whereby consumers accept new technologies. The empirical part of the paper was based on the results of the authors’ questionnaire survey among representatives of the Polish banking sector. Findings & value added: The banking sector in Poland is on the verge of a sweeping bio-metric revolution in the coming years, because most traditional identity verification and authorisation methods currently available in banking do not comply with strict security and user convenience requirements and RTS regulations. Biometric technologies will be of use in all customer service channels, with the experts indicating authentication in bank branches, ATMs, and mobile banking as the primary implementation areas. Solutions which are most likely to be applied are those based on biometrics of fingerprints and finger veins, as well as voice biometrics.
... However, biometric identities are vulnerable to theft (Alterman, 2003). For example, face and voice biometrics can be easily captured without the user consent. ...
Article
This paper presents a roadmap for the transition from current gadget-centric digital services towards a gadget-free services environment called the Naked world. The main idea of the Naked world is that all the services which are currently provided by gadgets will be provided by the infrastructure, thus no gadgets will be needed to use any kind of digital services. When a user in the Naked world intends to use a service, the infrastructure senses the user, the nearby intelligent surrounding launches an interactive user interface, performs identi�cation through biometric identities, provides the service, and then closes the session when the user �nishes the job. Therefore, the Naked world comprises highly intelligent and context-aware interactive environments. The vision of the Naked world is an evolution towards a user-friendly and ubiquitously available digital services, which is naturally bounded by the technological advancement. Henceforth, this paper presents the essential technologies and functional requirements along with the current and forthcoming novel technological concepts and challenges for the realization of the Naked world.
Article
Artificial intelligence (AI) characterizes a new generation of global payment solutions, while the challenge lies in understanding how to effectively influence users’ behavioral intention toward AI-enabled face recognition payment within the business ethics domain. Drawing upon trust theory and trust transfer lens, our study introduces a model aimed at examining the counteracting influences of technology quality and ethical concerns on user behavioral intention through the mediating effect of trust. Specifically, we delineate two distinct forms of trust: trust in AI-enabled face recognition technology and trust in AI-enabled face recognition payment. An empirical survey was conducted, gathering 348 valid questionnaires from users of AI-enabled face recognition payment. The empirical results demonstrate a noteworthy interaction effect between technology quality and ethical concerns on trust and behavioral intention toward AI-enabled face recognition payment, indicating a conspicuous paradox of these two factors. Our findings also reveal a trust transfer mechanism between the two trust targets in the context of AI-enabled face recognition payment, which in turn affects users’ behavioral intention. The findings of this paper make a valuable contribution to the extant mobile payment literature and enhance our understanding regarding the dual role of AI technology in shaping trust and behavioral intentions in AI-enabled face recognition payment.
Article
The article questions digital agency as a subjective experience of refugees when crossing Europe's external and internal borders. More concretely, the article asks how refugees experience digital agency, and how this concrete experience is constituted in specific border practices. In doing so, it examines the contradictions that arise between European laws and human rights in the context of border practices. The analysis of the data of this paper reflects two important components of digital agency: the sense of ownership and control of one's body and actions, and the capacity to think independently and thus make considered choices. This study is based on a qualitative research approach based on narrative interviews. The data was imported to MAXQDA, a software package that allows data to be efficiently collected, organised, analysed and visualised electronically. The article shows how refugees and asylum seekers, when crossing the border to Europe, do not simply enter another country, but a (powerful) institutional system. In having their biometric and digital data collected, they are confronted with several practices of border and risk management that have become routinised and thus ‘normalised’ on an institutional level. Thus, their digital agency must be understood as precarious, underscored by an installed coercive environment.
Article
In this essay, I discuss the United Nations and its activities as they pertain to the use of blockchain technology. I argue that while this technology is rather new, the United Nations has been open to using such technological innovations to better solve human rights challenges that include fighting to end child trafficking, better distributing food aid, and reducing carbon emissions. Finally, the essay discusses the future prospects for blockchain technology and the UN.
Article
Full-text available
The Regulation (EU) 2016/679 on the protection of natural persons regarding the processing of personal data (GDPR) is one of the key fundamental pieces of European legislation to protect human rights and freedoms. However, the development of AI systems that are capable of collecting and processing large amounts of data and predicting user habits and emotional states has affected traditional legal categories and tested their resilience. This paper assesses the limits of the current formulation of the GDPR which does not take expressly into account the category of inferred data as a special category of data. Furthermore, it questions whether the toolbox put in place by the GDPR is still effective in protecting data subjects from practices such as neuromarketing and eye-tracking systems. It shows that it is certainly the essential starting point, but that, on the other hand, cannot be spared criticism. For this, in the recent years, the European legislator has adopted further legislations including, in particular, the Digital Services Act (DSA) and the Artificial Intelligence Act (AIA). Although representing a step forward in protection against such technologies, they each have critical aspects that need to be considered.
Chapter
Since the early 2000s, many African countries have begun to reform their population’s civil identification policies. In doing so, they are following a global trend created by the United States’ post-9/11 security environment, the rise of Sahel terrorist threats, and maritime piracy. In a decade, biometric technologies have gained momentum in many African public administrations, making the continent a veritable global laboratory for new identification technologies. According to its proponents, the biometric turn represents progress and modernity. The national identity card is thus at the heart of a battle, certainly technological, but it has its source in the very definition of citizenship. There is a collusion between the market and the State in the provision of biometric services. The processes at work in making the Cameroonian identity take shape around certain legal instruments that make it possible to grasp the instrumental reality of public policy instruments. We show how the question of biometric identification goes beyond the strict issue of state control. Biometric identification technology, more than a policy instrument at the service of States, appears to be structured in the sense that it is expected to put an end, solely by virtue of its objectivity, to the recurring debate on legitimacy.KeywordsCameroonBiometric identificationPartnershipNational identityPublic interestSecurity
Article
Full-text available
Teknoloji etiği, evrensel etik değerler ve ilkeler çerçevesinde teknolojik ürünlerin geliştirilmesi, kullanılması ve toplum üzerindeki etkilerinin tartışılması ve değerlendirilmesini içerir. Bilim ve teknolojinin etiğin rehberliğinde gelişmesini sağlamak önümüzdeki günlerin en önemli konusu olmalıdır. Etik, teknolojik yenilikleri veya bilimsel araştırmaları frenleyen bir engel olarak değil, gelecekteki sorunlarla başa çıkmanın bir yolu olarak görülmeli ve sorumlulukla karşılanmalıdır. İnsanlar üzerinde yapılan tıbbi araştırmalar, yapay zekânın insan yaşamı üzerindeki olumsuz etkileri, doğal kaynakların tükenmesi ve kirlilik, mahremiyet ihlalleri, eşitsizliklerin büyümesi, kişisel verilerin kötüye kullanımı, güvenlik-mahremiyet dengesi, GPS teknolojisi ve izleme, teknolojinin silahlaşması gibi etik sorunların çözümü çok önemlidir. Uzayın ortak kullanımı, uzaydan gözlem ve gözetleme faaliyetleri, enkaz ve atık kirliliği, ileri ve geri kirlilik gibi konular insanlığı önemli etik ikilemlerle yüz yüze getirmektedir. Teknoloji sayesinde daha iyi bir yaşam beklerken, sadece insanın üretebileceği değer ve anlamı kaybetmenin sakıncalarını aşmanın yolları bulunmalıdır.
Article
Technological development has never been so rapid as today. Due to the emerging technologies, their users gain considerable advantages in their everyday life. At the same time, such facilitation has an effect on our privacy and entails a risk of a wide range of information becoming easily available to unauthorised entities or persons. However, the risk is even greater when the scope of data required to get access to a particular solution becomes broader. In some cases, the amount of data requested from the user seems largely redundant. In this context, it is worth mentioning, for example, biometric data increasingly used for authentication of the user wishing to access applications by means of fingerprint scanning or facial recognition. The question is whether this is really necessary in all situations, or possibly in some circumstances the use of biometrics may pose a greater threat to privacy than to the information protected this way. The author presents the current restrictions on the use of biometric data, along with their assessment.
Article
Facial recognition technology (FRT) has become a significant topic in CSCW owing to widespread adoption and related criticisms: the use of FRT is often considered an assault on privacy or a kind of neo-phrenology. This discussion has revolved around uses of FRT for identification, which are often non-voluntary, in particular for surveillance wherein people are (by and large) unwittingly recognized by FRT systems. At the same time, we have also seen a rise of forms of FRT for verification (e.g., passport control or Apple's Face ID), which typically are overt and interactive. In this paper we study an interactive FRT system used for guest check-in at a hotel in China. We show how guests and bystanders engage in 'self-disciplining work' by controlling their facial (and bodily) comportment both to get recognized and at times to avoid recognition. From our analysis we discuss the role of preparatory and remedial work, as well as dehumanization, and the importance of CSCW paying closer attention to the significance of interactional compliance for people using and bystanding facial recognition technologies.
Chapter
Computers have become ubiquitous and play an important role in our lives. To be usable, any computing device must allow some form of interaction with its user. Human-computer interaction is the point of communication between human users and computers. AI is gradually being integrated into the human-computer interaction. Designing traditional human-computer interaction courses faces new challenges with breakthroughs in third-generation AI technology. New interaction scenarios between humans and computers, such as smart homes and self-driving cars, are constantly emerging. As AI systems become more widespread, it will be essential to understand them from a human perspective. This chapter will provide an overview to the AI-based intelligent human-computer interaction.
Article
By engaging with network technologies on computers and digital devices, equipped with sensors such as cameras, we are part of the telematic society that can connect with people in real-time near as well as far apart. While digital technology enables us to connect and maintain relationships with other people, we still rely on virtual embodiment to represent our persona in the digital world. There is a range of visual representations that function as a virtual embodiment in the digital world, often a profile image, an avatar or a graphic device are used as a proxy. In this particular practice-based research project, I am exploring how the risks of sharing biometric data can be prevented, by prototyping an abstract virtual embodiment in an art installation. The computational design applied to procedures such as facial recognition driven by artificial intelligence (AI), and machine learning can result in intrusive experiences. If the act of being detected or identified by AI becomes intrusive, are there ways we can use abstract virtual embodiments to represent ourselves without being detected? This visual essay is positioning the practice-based research in an art context while documenting the conceptual process of an interactive prototype.
Article
Full-text available
The paper presented here comes from the research developed in Laboratório de Poéticas Fronteiriças (http://labfront.tk - CNPq/UEMG), a research, development and innovation group that proposes to think the barriers of the relationship between art, science and technology. Therefore, this paper aims to introduce an analysis of the applications, influences and possible results of the indiscriminate use of Biometric Identification Systems (BISs). We want to debate how all of the specific requirements and applications, needed in order to make biometric identifications possible, end up creating a social problem (in the biographic field) that goes beyond the matter of data privacy from its users, specially when they are applied with Artificial Intelligences (AIs).
Article
Full-text available
Earlier this year, the European Commission (EC) registered the ‘Civil society initiative for a ban on biometric mass surveillance practices’, a European Citizens’ Initiative. Citizens are thus given the opportunity to authorize the EC to suggest the adoption of legislative instruments to permanently ban biometric mass surveillance practices. This contribution finds the above initiative particularly promising, as part of a new development of bans in the European Union (EU). It analyses the EU’s approach to facial, visual and biometric surveillance,2 with the objective of submitting some ideas that the European legislator could consider when strictly regulating such practices.
Chapter
The human body holds much significance—it is one thing we share in common. As a biological organism, the body has long been an object of scientific investigations, medical objectification, and scientific discourse. It is, however, much more. In this chapter, we discuss the symbolic, aesthetic, sexual and scientific nature of the body. The body holds significance for individuals in the way that it can be owned or disowned, the latter often associated with illness. Further, it is both self and other, object and subject—and, thus, holds a number of binary oppositions. Within this chapter we explore the links between the body and philosophy, such as bodily awareness and myness, highlighting pertinent considerations for both contemporary curriculum development and clinical practice. Within health, the default is to view the body through a scientific lens, as an object. Alternatively, we highlight the importance of the lived body (e.g., the foot hurts versus my foot hurts), the complexities between body as subject/object (e.g., in diagnosing another’s body), and the problems with a scientific view (whiteness, gender bias).
Article
Full-text available
In low-and middle-income countries, many infants and children remain unregistered in both civil registration and healthcare records, limiting their access to essential rights-based services, including healthcare. A novel biometric registration prototype, applying a non-touch platform using smart phones and tablets to capture physical characteristics of infants and children for electronic registration, was tested in rural Mozambique. This study assessed acceptability and perceived barriers and facilitators to the usability of this biometric registration prototype in Manhiça district, southern Mozambique. The study followed a qualitative design consisting of 5 semi-structured interviews with healthcare providers, 7 focus group discussions with caregivers of infants aged between 0 and 5 years old, and 2 focus group discussions with data collectors involved in the implementation of the biometric registration pilot project. Data were thematically analysed. The results of this study show that there is wide acceptability of the biometric registration prototype among healthcare providers and caregivers. Participants were aware of the benefits of the biometric registration prototype. The perceived benefits included that the biometric registration prototype would solve the inefficiency of paper-based registration, and the perception of biometric registration as “healthcare norm”. Perceived potential barriers to the implementation of the biometric registration prototype included: myths and taboos, lack of information, lack of time, lack of father’s consent, and potential workload among healthcare providers. In conclusion, the biometric prototype was widely accepted due to its perceived usefulness. However, there is a need to address the perceived barriers, and involvement of children’s fathers and/or other relevant family members in the process of biometric registration.
Book
This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book will advance understanding of the ethical and legal aspects of cyberspace followed by the risks involved along with current and proposed cyber policies. This book serves as a summary of the state of the art of cyber laws in the United States and considers more than 50 cyber laws. It also, importantly, incorporates various risk management and security strategies from a number of organizations. Using easy-to-understand language and incorporating case studies, the authors begin with the consideration of ethics and law in cybersecurity and then go on to take into account risks and security policies. The section on risk covers risk identification, risk analysis, risk assessment, risk management, and risk remediation. The very important and exquisite topic of cyber insurance is covered as well—its benefits, types, coverage, etc. The section on cybersecurity policy acquaints readers with the role of policies in cybersecurity and how they are being implemented by means of frameworks. The authors provide a policy overview followed by discussions of several popular cybersecurity frameworks, such as NIST, COBIT, PCI/DSS, ISO series, etc. Each chapter is followed by an overall summary and review that highlights the key points as well as questions for readers to evaluate their understanding based on the chapter content. Cybersecurity: Ethics, Legal, Risks, and Policies is a valuable resource for a large audience that includes instructors, students, professionals in specific fields as well anyone and everyone who is an essential constituent of cyberspace. With increasing cybercriminal activities, it is more important than ever to know the laws and how to secure data and devices.
Conference Paper
Full-text available
Cilj ovoga rada je istražiti jednu relativno mladu tehnologiju, koja će po svim pokazateljima postati temelj svih sigurnosnih aplikacija u svijetu u budućnosti. Budući da živimo u brzorastućem, informacijskom i digitalnom dobu gdje se svakoga dana razvijaju nove tehnologije, prikazati će se i detaljno analizirati neke biometrijske metode i tehnike koje su danas u upotrebi s posebnim naglaskom na sektor turizma i hotelijerstva. Radi se o primjeni sustava za identifikaciju lica u turizmu s posebnim osvrtom na biometrijsku provjeru putnika u zračnim lukama, mogućnostima biometrijskog plaćanja otiskom prsta, efikasnijem upravljanju osobljem u području vođenja evidencije radnog vremena i kontroli pristupa. Biometrijska tehnologija tom sektoru nudi mogućnost da se izdigne iznad tradicionalnih koncepata u poboljšanju sigurnosti i cjelokupnog iskustva gostiju. Hoteli na taj način mogu poboljšati sustav upravljanja, a gostima se nudi najviši nivo komfora i pogodnosti. U radu se istražuju mogućnosti, snage i slabosti biometrije te utjecaj biometrije na čovjeka koji je u izravnoj interakciji s njom. Koliko su zapravo pouzdani biometrijski sustavi, štite li našu privatnost i ljudska prava samo su neka od pitanja na koja ovaj rad pokušava iznaći odgovore.
Chapter
The special nature of the characteristics used in biometric systems can present privacy challenges that might not arise with traditional identification methods, such as paper documents, because these data are derived from an individual's physical or behavioural features on the basis of a specific procedure, which is partly automated and yields a (reference) template. On account of their nature, these data require special precautions and the respect of the principles related with privacy and data protection.
Article
Full-text available
Privacy in the workplace is a pivotal concern for employees and employers. Employees expect to be in control of the personal information and access they provide to the organization. Employers, however, expect extensive information regarding their employees as well as extensive access to employees’ presence. The chasm between these two often competing expectations has been magnified by regulatory and technological trends. We begin the review by integrating viewpoints from multiple disciplines to disentangle definitions of privacy and to delineate the privacy contexts of information privacy and work environment privacy. We then identify the key stakeholders of privacy in the workplace and describe their interests. This discussion serves as a platform for our stakeholders’ privacy calculus model, which in turn provides a framework within which we review empirical findings on workplace privacy from organizational research and related disciplines and from which we identify gaps in the existing research. We then advance an extensive research agenda. Finally, we draw attention to emerging technologies and laws that have far-reaching implications for employees and employers. Our review provides a road map for researchers and practitioners to navigate the contested terrain of workplace privacy.
Chapter
The special nature of the characteristics used in biometric systems can present privacy challenges that might not arise with traditional identification methods, such as paper documents, because these data are derived from an individual's physical or behavioural features on the basis of a specific procedure, which is partly automated and yields a (reference) template. On account of their nature, these data require special precautions and the respect of the principles related with privacy and data protection.
ResearchGate has not been able to resolve any references for this publication.