Cargando…

Ethics and Policy of Biometrics Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, Hong Kong, January 4-5, 2010 /

The past decade has seen tremendous growth in the demand for biometrics and data security technologies in applications ranging from law enforcement and immigration control to online security. The benefits of biometrics technologies are apparent as they become important technologies for information s...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Kumar, Ajay (Editor ), Zhang, David (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Security and Cryptology ; 6005
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-12595-9
003 DE-He213
005 20220115024630.0
007 cr nn 008mamaa
008 100508s2010 gw | s |||| 0|eng d
020 |a 9783642125959  |9 978-3-642-12595-9 
024 7 |a 10.1007/978-3-642-12595-9  |2 doi 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
072 7 |a UKN  |2 thema 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Ethics and Policy of Biometrics  |h [electronic resource] :  |b Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, Hong Kong, January 4-5, 2010 /  |c edited by Ajay Kumar, David Zhang. 
250 |a 1st ed. 2010. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2010. 
300 |a VIII, 169 p. 15 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 6005 
505 0 |a Privacy Protection and Challenges -- Challenges Posed by Biometric Technology on Data Privacy Protection and the Way Forward -- The Dangers of Electronic Traces: Data Protection Challenges Presented by New Information Communication Technologies -- Privacy and Biometrics for Authentication Purposes: A Discussion of Untraceable Biometrics and Biometric Encryption -- From the Economics to the Behavioral Economics of Privacy: A Note -- Legal Challenges -- Legislative and Ethical Questions regarding DNA and Other Forensic "Biometric" Databases -- Are We Protected? The Adequacy of Existing Legal Frameworks for Protecting Privacy in the Biometric Age -- Have a Safe Trip Global Mobility and Machine Readable Travel Documents: Experiences from Latin America and the Caribbean -- Engineering and Social Challenges -- On Analysis of Rural and Urban Indian Fingerprint Images -- Privacy Protection in High Security Biometrics Applications -- Face Recognition and Plastic Surgery: Social, Ethical and Engineering Challenges -- Human Face Analysis: From Identity to Emotion and Intention Recognition -- Creating Safe and Trusted Social Networks with Biometric User Authentication -- Ethical and Medical Concerns -- Ethical Values for E-Society: Information, Security and Privacy -- Ethical Issues in Governing Biometric Technologies -- Interdisciplinary Approaches to Determine the Social Impacts of Biotechnology -- Medical Safety Issues Concerning the Use of Incoherent Infrared Light in Biometrics -- Policy Issues and Deployments in Asia -- The Status Quo and Ethical Governance in Biometric in Mainland China -- Building an Ecosystem for Cyber Security and Data Protection in India -- Challenges in Large Scale Biometrics Identification -- The Unique Identification Number Project: Challenges and Recommendations -- The Unique ID Project in India: A Skeptical Note. 
520 |a The past decade has seen tremendous growth in the demand for biometrics and data security technologies in applications ranging from law enforcement and immigration control to online security. The benefits of biometrics technologies are apparent as they become important technologies for information security of governments, business enterprises, and individuals. At the same time, however, the use of biometrics has raised concerns as to issues of ethics, privacy, and the policy implications of its wi- spread use. The large-scale deployment of biometrics technologies in e-governance, e-security, and e-commerce has required that we launch an international dialogue on these issues, a dialogue that must involve key stakeholders and that must consider the legal, poli- cal, philosophical and cultural aspects of the deployment of biometrics technologies. The Third International Conference on Ethics and Policy of Biometrics and Inter- tional Data Sharing was highly successful in facilitating such interaction among - searchers, policymakers, consumers, and privacy groups. This conference was supported and funded as part of the RISE project in its ongoing effort to develop wide consensus and policy recommendations on ethical, medical, legal, social, cultural, and political concerns in the usage of biometrics and data security technologies. The - tential concerns over the deployment of biometrics systems can be jointly addressed by developing smart biometrics technologies and by developing policies for the - ployment of biometrics technologies that clearly demarcate conflicts of interest - tween stakeholders. 
650 0 |a Computer networks . 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer programming. 
650 0 |a Electronic data processing-Management. 
650 0 |a Algorithms. 
650 0 |a Computers and civilization. 
650 1 4 |a Computer Communication Networks. 
650 2 4 |a Cryptology. 
650 2 4 |a Programming Techniques. 
650 2 4 |a IT Operations. 
650 2 4 |a Algorithms. 
650 2 4 |a Computers and Society. 
700 1 |a Kumar, Ajay.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Zhang, David.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642125942 
776 0 8 |i Printed edition:  |z 9783642125966 
830 0 |a Security and Cryptology ;  |v 6005 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-12595-9  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)