000 05927nam a22006375i 4500
001 978-3-642-12595-9
003 DE-He213
005 20240730184726.0
007 cr nn 008mamaa
008 100508s2010 gw | s |||| 0|eng d
020 _a9783642125959
_9978-3-642-12595-9
024 7 _a10.1007/978-3-642-12595-9
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aEthics and Policy of Biometrics
_h[electronic resource] :
_bThird International Conference on Ethics and Policy of Biometrics and International Data Sharing, Hong Kong, January 4-5, 2010 /
_cedited by Ajay Kumar, David Zhang.
250 _a1st ed. 2010.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2010.
300 _aVIII, 169 p. 15 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v6005
505 0 _aPrivacy Protection and Challenges -- Challenges Posed by Biometric Technology on Data Privacy Protection and the Way Forward -- The Dangers of Electronic Traces: Data Protection Challenges Presented by New Information Communication Technologies -- Privacy and Biometrics for Authentication Purposes: A Discussion of Untraceable Biometrics and Biometric Encryption -- From the Economics to the Behavioral Economics of Privacy: A Note -- Legal Challenges -- Legislative and Ethical Questions regarding DNA and Other Forensic "Biometric" Databases -- Are We Protected? The Adequacy of Existing Legal Frameworks for Protecting Privacy in the Biometric Age -- Have a Safe Trip Global Mobility and Machine Readable Travel Documents: Experiences from Latin America and the Caribbean -- Engineering and Social Challenges -- On Analysis of Rural and Urban Indian Fingerprint Images -- Privacy Protection in High Security Biometrics Applications -- Face Recognition and Plastic Surgery: Social, Ethical and Engineering Challenges -- Human Face Analysis: From Identity to Emotion and Intention Recognition -- Creating Safe and Trusted Social Networks with Biometric User Authentication -- Ethical and Medical Concerns -- Ethical Values for E-Society: Information, Security and Privacy -- Ethical Issues in Governing Biometric Technologies -- Interdisciplinary Approaches to Determine the Social Impacts of Biotechnology -- Medical Safety Issues Concerning the Use of Incoherent Infrared Light in Biometrics -- Policy Issues and Deployments in Asia -- The Status Quo and Ethical Governance in Biometric in Mainland China -- Building an Ecosystem for Cyber Security and Data Protection in India -- Challenges in Large Scale Biometrics Identification -- The Unique Identification Number Project: Challenges and Recommendations -- The Unique ID Project in India: A Skeptical Note.
520 _aThe past decade has seen tremendous growth in the demand for biometrics and data security technologies in applications ranging from law enforcement and immigration control to online security. The benefits of biometrics technologies are apparent as they become important technologies for information security of governments, business enterprises, and individuals. At the same time, however, the use of biometrics has raised concerns as to issues of ethics, privacy, and the policy implications of its wi- spread use. The large-scale deployment of biometrics technologies in e-governance, e-security, and e-commerce has required that we launch an international dialogue on these issues, a dialogue that must involve key stakeholders and that must consider the legal, poli- cal, philosophical and cultural aspects of the deployment of biometrics technologies. The Third International Conference on Ethics and Policy of Biometrics and Inter- tional Data Sharing was highly successful in facilitating suchinteraction among - searchers, policymakers, consumers, and privacy groups. This conference was supported and funded as part of the RISE project in its ongoing effort to develop wide consensus and policy recommendations on ethical, medical, legal, social, cultural, and political concerns in the usage of biometrics and data security technologies. The - tential concerns over the deployment of biometrics systems can be jointly addressed by developing smart biometrics technologies and by developing policies for the - ployment of biometrics technologies that clearly demarcate conflicts of interest - tween stakeholders.
650 0 _aComputer networks .
_931572
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer programming.
_94169
650 0 _aElectronic data processing
_xManagement.
_9136456
650 0 _aAlgorithms.
_93390
650 0 _aComputers and civilization.
_921733
650 1 4 _aComputer Communication Networks.
_9136457
650 2 4 _aCryptology.
_931769
650 2 4 _aProgramming Techniques.
_9136458
650 2 4 _aIT Operations.
_931703
650 2 4 _aAlgorithms.
_93390
650 2 4 _aComputers and Society.
_931668
700 1 _aKumar, Ajay.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9136459
700 1 _aZhang, David.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9136460
710 2 _aSpringerLink (Online service)
_9136461
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642125942
776 0 8 _iPrinted edition:
_z9783642125966
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v6005
_9136462
856 4 0 _uhttps://doi.org/10.1007/978-3-642-12595-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c92449
_d92449