000 05667nam a22005775i 4500
001 978-3-642-12595-9
003 DE-He213
005 20160624102141.0
007 cr nn 008mamaa
008 100508s2010 gw | s |||| 0|eng d
020 _a9783642125959
_9978-3-642-12595-9
024 7 _a10.1007/978-3-642-12595-9
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
082 0 4 _a004.6
_223
245 1 0 _aEthics and Policy of Biometrics
_h[electronic resource] :
_bThird International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010. Revised Papers /
_cedited by Ajay Kumar, David Zhang.
260 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aVIII, 169p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6005
505 0 _aPrivacy Protection and Challenges -- Challenges Posed by Biometric Technology on Data Privacy Protection and the Way Forward -- The Dangers of Electronic Traces: Data Protection Challenges Presented by New Information Communication Technologies -- Privacy and Biometrics for Authentication Purposes: A Discussion of Untraceable Biometrics and Biometric Encryption -- From the Economics to the Behavioral Economics of Privacy: A Note -- Legal Challenges -- Legislative and Ethical Questions regarding DNA and Other Forensic "Biometric" Databases -- Are We Protected? The Adequacy of Existing Legal Frameworks for Protecting Privacy in the Biometric Age -- Have a Safe Trip Global Mobility and Machine Readable Travel Documents: Experiences from Latin America and the Caribbean -- Engineering and Social Challenges -- On Analysis of Rural and Urban Indian Fingerprint Images -- Privacy Protection in High Security Biometrics Applications -- Face Recognition and Plastic Surgery: Social, Ethical and Engineering Challenges -- Human Face Analysis: From Identity to Emotion and Intention Recognition -- Creating Safe and Trusted Social Networks with Biometric User Authentication -- Ethical and Medical Concerns -- Ethical Values for E-Society: Information, Security and Privacy -- Ethical Issues in Governing Biometric Technologies -- Interdisciplinary Approaches to Determine the Social Impacts of Biotechnology -- Medical Safety Issues Concerning the Use of Incoherent Infrared Light in Biometrics -- Policy Issues and Deployments in Asia -- The Status Quo and Ethical Governance in Biometric in Mainland China -- Building an Ecosystem for Cyber Security and Data Protection in India -- Challenges in Large Scale Biometrics Identification -- The Unique Identification Number Project: Challenges and Recommendations -- The Unique ID Project in India: A Skeptical Note.
520 _aThe past decade has seen tremendous growth in the demand for biometrics and data security technologies in applications ranging from law enforcement and immigration control to online security. The benefits of biometrics technologies are apparent as they become important technologies for information security of governments, business enterprises, and individuals. At the same time, however, the use of biometrics has raised concerns as to issues of ethics, privacy, and the policy implications of its wi- spread use. The large-scale deployment of biometrics technologies in e-governance, e-security, and e-commerce has required that we launch an international dialogue on these issues, a dialogue that must involve key stakeholders and that must consider the legal, poli- cal, philosophical and cultural aspects of the deployment of biometrics technologies. The Third International Conference on Ethics and Policy of Biometrics and Inter- tional Data Sharing was highly successful in facilitating such interaction among - searchers, policymakers, consumers, and privacy groups. This conference was supported and funded as part of the RISE project in its ongoing effort to develop wide consensus and policy recommendations on ethical, medical, legal, social, cultural, and political concerns in the usage of biometrics and data security technologies. The - tential concerns over the deployment of biometrics systems can be jointly addressed by developing smart biometrics technologies and by developing policies for the - ployment of biometrics technologies that clearly demarcate conflicts of interest - tween stakeholders.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData encryption (Computer science).
650 0 _aComputer software.
650 0 _aInformation systems.
650 0 _aInformation Systems.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aData Encryption.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aComputers and Society.
650 2 4 _aInformation Systems Applications (incl.Internet).
700 1 _aKumar, Ajay.
_eeditor.
700 1 _aZhang, David.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642125942
786 _dSpringer
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6005
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-12595-9
942 _2EBK9009
_cEBK
999 _c38303
_d38303