|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-12595-9 |
003 |
DE-He213 |
005 |
20220115024630.0 |
007 |
cr nn 008mamaa |
008 |
100508s2010 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642125959
|9 978-3-642-12595-9
|
024 |
7 |
|
|a 10.1007/978-3-642-12595-9
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Ethics and Policy of Biometrics
|h [electronic resource] :
|b Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, Hong Kong, January 4-5, 2010 /
|c edited by Ajay Kumar, David Zhang.
|
250 |
|
|
|a 1st ed. 2010.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2010.
|
300 |
|
|
|a VIII, 169 p. 15 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 6005
|
505 |
0 |
|
|a Privacy Protection and Challenges -- Challenges Posed by Biometric Technology on Data Privacy Protection and the Way Forward -- The Dangers of Electronic Traces: Data Protection Challenges Presented by New Information Communication Technologies -- Privacy and Biometrics for Authentication Purposes: A Discussion of Untraceable Biometrics and Biometric Encryption -- From the Economics to the Behavioral Economics of Privacy: A Note -- Legal Challenges -- Legislative and Ethical Questions regarding DNA and Other Forensic "Biometric" Databases -- Are We Protected? The Adequacy of Existing Legal Frameworks for Protecting Privacy in the Biometric Age -- Have a Safe Trip Global Mobility and Machine Readable Travel Documents: Experiences from Latin America and the Caribbean -- Engineering and Social Challenges -- On Analysis of Rural and Urban Indian Fingerprint Images -- Privacy Protection in High Security Biometrics Applications -- Face Recognition and Plastic Surgery: Social, Ethical and Engineering Challenges -- Human Face Analysis: From Identity to Emotion and Intention Recognition -- Creating Safe and Trusted Social Networks with Biometric User Authentication -- Ethical and Medical Concerns -- Ethical Values for E-Society: Information, Security and Privacy -- Ethical Issues in Governing Biometric Technologies -- Interdisciplinary Approaches to Determine the Social Impacts of Biotechnology -- Medical Safety Issues Concerning the Use of Incoherent Infrared Light in Biometrics -- Policy Issues and Deployments in Asia -- The Status Quo and Ethical Governance in Biometric in Mainland China -- Building an Ecosystem for Cyber Security and Data Protection in India -- Challenges in Large Scale Biometrics Identification -- The Unique Identification Number Project: Challenges and Recommendations -- The Unique ID Project in India: A Skeptical Note.
|
520 |
|
|
|a The past decade has seen tremendous growth in the demand for biometrics and data security technologies in applications ranging from law enforcement and immigration control to online security. The benefits of biometrics technologies are apparent as they become important technologies for information security of governments, business enterprises, and individuals. At the same time, however, the use of biometrics has raised concerns as to issues of ethics, privacy, and the policy implications of its wi- spread use. The large-scale deployment of biometrics technologies in e-governance, e-security, and e-commerce has required that we launch an international dialogue on these issues, a dialogue that must involve key stakeholders and that must consider the legal, poli- cal, philosophical and cultural aspects of the deployment of biometrics technologies. The Third International Conference on Ethics and Policy of Biometrics and Inter- tional Data Sharing was highly successful in facilitating such interaction among - searchers, policymakers, consumers, and privacy groups. This conference was supported and funded as part of the RISE project in its ongoing effort to develop wide consensus and policy recommendations on ethical, medical, legal, social, cultural, and political concerns in the usage of biometrics and data security technologies. The - tential concerns over the deployment of biometrics systems can be jointly addressed by developing smart biometrics technologies and by developing policies for the - ployment of biometrics technologies that clearly demarcate conflicts of interest - tween stakeholders.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer programming.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Programming Techniques.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Algorithms.
|
650 |
2 |
4 |
|a Computers and Society.
|
700 |
1 |
|
|a Kumar, Ajay.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Zhang, David.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642125942
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642125966
|
830 |
|
0 |
|a Security and Cryptology ;
|v 6005
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-12595-9
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|