Ethics and Policy of Biometrics Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010. Revised Papers /

The past decade has seen tremendous growth in the demand for biometrics and data security technologies in applications ranging from law enforcement and immigration control to online security. The benefits of biometrics technologies are apparent as they become important technologies for information s...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Kumar, Ajay (Επιμελητής έκδοσης), Zhang, David (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Lecture Notes in Computer Science, 6005
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 05644nam a22005775i 4500
001 978-3-642-12595-9
003 DE-He213
005 20151204162314.0
007 cr nn 008mamaa
008 100508s2010 gw | s |||| 0|eng d
020 |a 9783642125959  |9 978-3-642-12595-9 
024 7 |a 10.1007/978-3-642-12595-9  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Ethics and Policy of Biometrics  |h [electronic resource] :  |b Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010. Revised Papers /  |c edited by Ajay Kumar, David Zhang. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2010. 
300 |a VIII, 169 p. 15 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 6005 
505 0 |a Privacy Protection and Challenges -- Challenges Posed by Biometric Technology on Data Privacy Protection and the Way Forward -- The Dangers of Electronic Traces: Data Protection Challenges Presented by New Information Communication Technologies -- Privacy and Biometrics for Authentication Purposes: A Discussion of Untraceable Biometrics and Biometric Encryption -- From the Economics to the Behavioral Economics of Privacy: A Note -- Legal Challenges -- Legislative and Ethical Questions regarding DNA and Other Forensic "Biometric" Databases -- Are We Protected? The Adequacy of Existing Legal Frameworks for Protecting Privacy in the Biometric Age -- Have a Safe Trip Global Mobility and Machine Readable Travel Documents: Experiences from Latin America and the Caribbean -- Engineering and Social Challenges -- On Analysis of Rural and Urban Indian Fingerprint Images -- Privacy Protection in High Security Biometrics Applications -- Face Recognition and Plastic Surgery: Social, Ethical and Engineering Challenges -- Human Face Analysis: From Identity to Emotion and Intention Recognition -- Creating Safe and Trusted Social Networks with Biometric User Authentication -- Ethical and Medical Concerns -- Ethical Values for E-Society: Information, Security and Privacy -- Ethical Issues in Governing Biometric Technologies -- Interdisciplinary Approaches to Determine the Social Impacts of Biotechnology -- Medical Safety Issues Concerning the Use of Incoherent Infrared Light in Biometrics -- Policy Issues and Deployments in Asia -- The Status Quo and Ethical Governance in Biometric in Mainland China -- Building an Ecosystem for Cyber Security and Data Protection in India -- Challenges in Large Scale Biometrics Identification -- The Unique Identification Number Project: Challenges and Recommendations -- The Unique ID Project in India: A Skeptical Note. 
520 |a The past decade has seen tremendous growth in the demand for biometrics and data security technologies in applications ranging from law enforcement and immigration control to online security. The benefits of biometrics technologies are apparent as they become important technologies for information security of governments, business enterprises, and individuals. At the same time, however, the use of biometrics has raised concerns as to issues of ethics, privacy, and the policy implications of its wi- spread use. The large-scale deployment of biometrics technologies in e-governance, e-security, and e-commerce has required that we launch an international dialogue on these issues, a dialogue that must involve key stakeholders and that must consider the legal, poli- cal, philosophical and cultural aspects of the deployment of biometrics technologies. The Third International Conference on Ethics and Policy of Biometrics and Inter- tional Data Sharing was highly successful in facilitating such interaction among - searchers, policymakers, consumers, and privacy groups. This conference was supported and funded as part of the RISE project in its ongoing effort to develop wide consensus and policy recommendations on ethical, medical, legal, social, cultural, and political concerns in the usage of biometrics and data security technologies. The - tential concerns over the deployment of biometrics systems can be jointly addressed by developing smart biometrics technologies and by developing policies for the - ployment of biometrics technologies that clearly demarcate conflicts of interest - tween stakeholders. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Computer programming. 
650 0 |a Data encryption (Computer science). 
650 0 |a Algorithms. 
650 0 |a Computers and civilization. 
650 0 |a Management information systems. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Data Encryption. 
650 2 4 |a Programming Techniques. 
650 2 4 |a Management of Computing and Information Systems. 
650 2 4 |a Algorithm Analysis and Problem Complexity. 
650 2 4 |a Computers and Society. 
700 1 |a Kumar, Ajay.  |e editor. 
700 1 |a Zhang, David.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642125942 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 6005 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-12595-9  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)