Results for 'biometric identification'

1000+ found
Order:
  1.  97
    Biometrics, identification and surveillance.David Lyon - 2008 - Bioethics 22 (9):499-508.
    Governing by identity describes the emerging regime of a globalizing, mobile world. Governance depends on identification but identification increasingly depends on biometrics. This 'solution' to difficulties of verification is described and some technical weaknesses are discussed. The role of biometrics in classification systems is also considered and is shown to contain possible prejudice in relation to racialized criteria of identity. Lastly, the culture of biometric identification is shown to be limited to abstract data, artificially separated from (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  2.  13
    Biometric Identification, Law and Ethics.Marcus Smith & S. R. M. Miller - unknown
    This book undertakes a multifaceted and integrated examination of biometric identification, including the current state of the technology, how it is being used, the key ethical issues, and the implications for law and regulation. The five chapters examine the main forms of contemporary biometrics–fingerprint recognition, facial recognition and DNA identification– as well the integration of biometric data with other forms of personal data, analyses key ethical concepts in play, including privacy, individual autonomy, collective responsibility, and joint (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3. "A piece of yourself": Ethical issues in biometric identification[REVIEW]Anton Alterman - 2003 - Ethics and Information Technology 5 (3):139-150.
    The proliferation of biometric identification technology raises difficult issues in the matter of security, privacy and identity. Though biometric "images" are not images per se, they are both unique representations of an individual in themsevles and a means of access to other identifying information. I compare biometric imaging with other kinds of identifying representations and find that there are issues specific to biometric ID's. Because they represent information that is written into the body they are (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  4. The illegal body: `Eurodac' and the politics of biometric identification[REVIEW]Irma van der Ploeg - 1999 - Ethics and Information Technology 1 (4):295-302.
    Biometrics is often described as `the next big thingin information technology'. Rather than IT renderingthe body irrelevant to identity – a mistaken idea tobegin with – the coupling of biometrics with ITunequivocally puts the body center stage. The questions to be raised about biometrics is howbodies will become related to identity, and what thenormative and political ramifications of this couplingwill be. Unlike the body rendered knowable in thebiomedical sciences, biometrics generates a readable body: it transforms the body's surfaces andcharacteristics into (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  5.  37
    Biometric and Emotion Identification: An ECG Compression Based Method.Susana Brás, Jacqueline H. T. Ferreira, Sandra C. Soares & Armando J. Pinho - 2018 - Frontiers in Psychology 9.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  75
    The ethics of biometrics: The risk of social exclusion from the widespread use of electronic identification.Jeremy Wickins - 2007 - Science and Engineering Ethics 13 (1):45-54.
    Discussions about biotechnology tend to assume that it is something to do with genetics or manipulating biological processes in some way. However, the field of biometrics––the measurement of physical characteristics––is also biotechnology and is likely to affect the lives of more people more quickly than any other form. The possibility of social exclusion resulting from the use of biometrics data for such uses as identity cards has not yet been fully explored. Social exclusion is unethical, as it unfairly discriminates against (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  7.  78
    Recombinant identities: Biometrics and narrative bioethics.Btihaj Ajana - 2010 - Journal of Bioethical Inquiry 7 (2):237-258.
    In recent years, there has been a growing interest in finding stronger means of securitising identity against the various risks presented by the mobile globalised world. Biometric technology has featured quite prominently on the policy and security agenda of many countries. It is being promoted as the solution du jour for protecting and managing the uniqueness of identity in order to combat identity theft and fraud, crime and terrorism, illegal work and employment, and to efficiently govern various domains and (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  8.  43
    Biometric Technology and Ethics: Beyond Security Applications.Andrea North-Samardzic - 2020 - Journal of Business Ethics 167 (3):433-450.
    Biometric technology was once the purview of security, with face recognition and fingerprint scans used for identification and law enforcement. This is no longer the case; biometrics is increasingly used for commercial and civil applications. Due to the widespread diffusion of biometrics, it is important to address the ethical issues inherent to the development and deployment of the technology. This article explores the burgeoning research on biometrics for non-security purposes and the ethical implications for organizations. This will be (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  9.  25
    Biometrics: body odor authentication perception and acceptance.Martin D. Gibbs - 2010 - Acm Sigcas Computers and Society 40 (4):16-24.
    Odor detection and identification by machines is currently being done to evaluate perfumes, wine, olive, oil, and even find people buried in rubble. Extending body odor detection to authentication may seem far-fetched and unrealistic. Yet such an application is plausible, given that like a fingerprint or iris, the human body odor is unique. Although such technology still has strides to make before being applicable as either a stand-alone or supplemental technology to existing biometric tools, it still warrants research, (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  10. Biometric identity systems in law enforcement and the politics of (voice) recognition: The case of SiiP.Lina Dencik, Javier Sánchez-Monedero & Fieke Jansen - 2021 - Big Data and Society 8 (2).
    Biometric identity systems are now a prominent feature of contemporary law enforcement, including in Europe. Often advanced on the premise of efficiency and accuracy, they have also been the subject of significant controversy. Much attention has focussed on longer-standing biometric data collection, such as finger-printing and facial recognition, foregrounding concerns with the impact such technologies can have on the nature of policing and fundamental human rights. Less researched is the growing use of voice recognition in law enforcement. This (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  65
    Body, biometrics and identity.Emilio Mordini & Sonia Massari - 2008 - Bioethics 22 (9):488-498.
    According to a popular aphorism, biometrics are turning the human body into a passport or a password. As usual, aphorisms say more than they intend. Taking the dictum seriously, we would be two: ourself and our body. Who are we, if we are not our body? And what is our body without us? The endless history of identification systems teaches that identification is not a trivial fact but always involves a web of economic interests, political relations, symbolic networks, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  12.  6
    Biometric recognition system performance measures for lossy compression on EEG signals.Binh Nguyen, Wanli Ma & Dat Tran - forthcoming - Logic Journal of the IGPL.
    Electroencephalogram plays an essential role in analysing and recognizing brain-related diseases. EEG has been increasingly used as a new type of biometrics in person identification and verification systems. These EEG-based systems are important components in applications for both police and civilian works, and both areas process a huge amount of EEG data. Storing and transmitting these huge amounts of data are significant challenges for data compression techniques. Lossy compression is used for EEG data as it provides a higher compression (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  35
    Societal and Ethical Implications of Anti-Spoofing Technologies in Biometrics.Andrew P. Rebera, Matteo E. Bonfanti & Silvia Venier - 2014 - Science and Engineering Ethics 20 (1):155-169.
    Biometric identification is thought to be less vulnerable to fraud and forgery than are traditional forms of identification. However biometric identification is not without vulnerabilities. In a ‘spoofing attack’ an artificial replica of an individual’s biometric trait is used to induce a system to falsely infer that individual’s presence. Techniques such as liveness-detection and multi-modality, as well as the development of new and emerging modalities, are intended to secure biometric identification systems against (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  14.  15
    Who Needs Special Needs? On the Constitutionality of Collecting DNA and Other Biometric Data from Arrestees.D. H. Kaye - 2006 - Journal of Law, Medicine and Ethics 34 (2):188-198.
    Several commentators have argued that the police practice of taking DNA samples during custodial arrests is an unconstitutional search and seizure. This article proposes a “biometric identification exception” to the warrant and probable-cause requirements of the Fourth Amendment that would encompass certain systems of DNA sampling on arrest.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  7
    Autoencoder for ecg signal outlier processing in system of biometric authentication.Khoma V. V., Khoma Y. V., Khoma P. P. & Sabodashko D. V. - 2019 - Artificial Intelligence Scientific Journal 24 (1-2):108-117.
    A novel method for ECG signal outlier processing based on autoencoder neural networks is presented in the article. Typically, heartbeats with serious waveform distortions are treated as outliers and are skipped from the authentication pipeline. The main idea of the paper is to correct these waveform distortions rather them in order to provide the system with better statistical base. During the experiments, the optimum autoencoder architecture was selected. An open Physionet ECGID database was used to verify the proposed method. The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  7
    Protecting the genetic self from biometric threats: autonomy, identity, and genetic privacy.Christina Akrivopoulou (ed.) - 2015 - Hershey PA: Information Science Reference.
    This book considers all aspects of privacy and security relating to an individual's DNA, with a concentration on fundamental human rights as well as specific cases and examples, in addressing greater security and privacy in the modern world.
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  17
    Nouvelles techniques d'identification, nouveaux pouvoirs.Gérard Dubey - 2008 - Cahiers Internationaux de Sociologie 125 (2):263.
    Avec l’identification biométrique, nous passons imperceptiblement du contrôle à distance des populations pratiqué par les États modernes à des macro-systèmes techniques qui imposent de plus en plus leur propre logique. Du point de vue anthropologique ce déplacement de paradigme met en jeu la définition même de l’identité en renforçant le divorce entre l’identité civile et l’identité personnelle ou sociale. La frontière est désormais inscrite à même le corps biologique des individus au sein de l’espace géré depuis les terminaux du (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  18.  17
    On Investigating the Effectiveness of Biometric Readers in Thwarting Network Attacks: A Secure Architecture Design Proposal.Mohammad M. Masud, Mohamed Al Hemairy & Zouheir Trabelsi - 2015 - Journal of Intelligent Systems 24 (2):199-213.
    Biometrics readers are deployed in many public sites and are used for user identification and verification. Nowadays, most biometrics readers can be connected to local area networks, and consequently, they are potential targets for network attacks. This article investigates the robustness of several fingerprint and iris readers against common denial of service attacks. This investigation has been conducted using a set of laboratory experiments and DoS attack generator tools. The experiments show clearly that the tested biometric readers are (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  28
    A tattoo is not a face. Ethical aspects of tattoo-based biometrics.Fabio Bacchini & Ludovica Lorusso - 2018 - Journal of Information, Communication and Ethics in Society 16 (2):110-122.
    PurposeThis study aims to explore the ethical and social issues of tattoo recognition technology and tattoo similarity detection technology, which are expected to be increasingly used by state and local police departments and law enforcement agencies.Design/methodology/approachThe paper investigates the new ethical concerns raised by tattoo-based biometrics on a comparative basis with face-recognition biometrics.FindingsTRT raises much more ethically sensitive issues than face recognition, because tattoos are meaningful biometric traits, and tattoo identification is tantamount to the identification of many (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20. The Death of the Data Subject.Gordon Hull - 2021 - Law, Culture and the Humanities 2021.
    This paper situates the data privacy debate in the context of what I call the death of the data subject. My central claim is that concept of a rights-bearing data subject is being pulled in two contradictory directions at once, and that simultaneous attention to these is necessary to understand and resist the extractive practices of the data industry. Specifically, it is necessary to treat the problems facing the data subject structurally, rather than by narrowly attempting to vindicate its rights. (...)
     
    Export citation  
     
    Bookmark   1 citation  
  21.  20
    Mattering: feminism, science, and materialism.Victoria Pitts-Taylor (ed.) - 2016 - New York: New York University Press.
    Feminists today are re-imagining nature, biology, and matter in feminist thought and critically addressing new developments in biology, physics, neuroscience, epigenetics and other scientific disciplines. Mattering, edited by noted feminist scholar Victoria Pitts-Taylor, presents contemporary feminist perspectives on the materialist or ‘naturalizing’ turn in feminist theory, and also represents the newest wave of feminist engagement with science. The volume addresses the relationship between human corporeality and subjectivity, questions and redefines the boundaries of human/non-human and nature/culture, elaborates on the entanglements of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  22.  13
    Moving beyond settlement: on the need for normative reflection on the global management of movement through data.Natasha Saunders - 2023 - Journal of Global Ethics 19 (3):282-293.
    Normative theorists of migration are beginning to shift their focus away from an earlier obsession with whether the ‘liberal' or ‘legitimate’ state should have a right to exclude, and toward evaluation of how states engage in immigration control. However, with some notable exceptions – such as work of Rebecca Buxton, David Owen, Serena Parekh, and Alex Sager – this work tends not to focus on the global coordination of such control, and is still largely concerned with issues of membership. In (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  18
    Synthesis and Satisfaction: How Philosophy Scholarship Matters.Anita L. Allen - 2019 - Theoretical Inquiries in Law 20 (1):343-366.
    Privacy and technology clash in the courts. I elaborate the example of Puttaswamy v Union of India (2017), an example from the High Court of India, whose sweeping and inclusive jurisprudential style raises starkly the question of the influence that academic philosophers and other scholars have over how legitimate societal interests in exploiting information technology and protecting personal privacy are “balanced” by the courts. Philosophers will be satisfied to see that their theories are acknowledged in a landmark national decision finding (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  20
    Identity Rights: A Structural Void in Inclusive Growth.Mukesh Sud & Craig V. VanSandt - 2015 - Journal of Business Ethics 132 (3):589-601.
    This paper investigates a structural void that, especially in the context of poor or developing nations, prevents economic growth from being more inclusive and benefiting wider sections of society. The authors initially examine the imperative for inclusive growth, one encompassing a focus on poverty and development. Utilizing social choice theory, and a capability deprivation perspective, we observe that the poor experience deprivations due to a deficiency in their personal autonomy. This in turn is deeply interwoven with the concept of identity. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  25.  47
    No Will to Know: The Rise and Fall of African Civil Registration in Twentieth-Century South Africa.Keith Breckenridge - 2012 - In Registration and Recognition: Documenting the Person in World History. pp. 357-383.
    Vital statistics have been politically fraught in South Africa for decades, not least because the state made very little effort to record information about the well-being of African women and children. This chapter shows that in the last years of the nineteenth century a working system of vital registration was developed in the colony of Natal and in the native reserves of the Transkei. From the beginning this delegated bureaucracy faced opposition from African patriarchs, from parsimonious white elected leaders and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  26.  12
    Sovereignty, Linguistic Imperialism and the Quantification of Reality.David Lea - 2015 - Cultura 12 (1):17-29.
    The events of 9/11 have underlined the relevance of the thought of Georgio Agamben in so far as he attempts to explain the genesis of an authoritarianism that increasingly implements extraordinary measures and enhanced surveillance. This can be understood in terms of the expansion of a biopolitical regime. Biometric analysis: finger printing, iris and retina scans etc., are to be understood in their relation to the individual as bare life, the individual stripped of his/her political legal identity and thus (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  27.  18
    Managing public expectations of technological systems: A case study of a problematic government project.Aaron K. Martin & Edgar A. Whitley - 2007 - Spontaneous Generations 1 (1):67.
    In this discussion piece we address how the UK government has attempted to manage public expectations of a proposed biometric identity scheme by focussing attention on the handheld, i.e., the ID card. We suggest that this strategy of expectations management seeks to downplay the complexity and uncertainty surrounding this high-technological initiative, necessitating the selective use of expertise for the purpose of furthering government objectives. In this process, government often relegates counterexpertise, if not dismissing it outright, thereby greatly politicizing the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  28.  21
    Between surveillance and recognition: Rethinking digital identity in aid.Emrys Schoemaker, Aaron Martin, Margie Cheesman & Keren Weitzberg - 2021 - Big Data and Society 8 (1).
    Identification technologies like biometrics have long been associated with securitisation, coercion and surveillance but have also, in recent years, become constitutive of a politics of empowerment, particularly in contexts of international aid. Aid organisations tend to see digital identification technologies as tools of recognition and inclusion rather than oppressive forms of monitoring, tracking and top-down control. In addition, practices that many critical scholars describe as aiding surveillance are often experienced differently by humanitarian subjects. This commentary examines the fraught (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  6
    New Approach for Writer Verification Based on Segments of Handwritten Graphemes.Verónica Aubin, Marco Mora & Matilde Santos - 2022 - Logic Journal of the IGPL 30 (6):965-978.
    Traditional literature considers complex biometric sources such as words, letters and signatures for writer verification/identification. In this work the use of small segments of the handwritten stroke for writer verification is proposed. A grapheme is defined as the concatenation of smaller segments or fragments. Two models of grapheme are developed based on the idea that the segments are parts of a circle with or without direction. The average of Gray Level of the Perpendicular Line to the Skeleton and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  30. Handwritten Signature Verification using Deep Learning. [REVIEW]Eman Alajrami, Belal A. M. Ashqar, Bassem S. Abu-Nasser, Ahmed J. Khalil, Musleh M. Musleh, Alaa M. Barhoom & Samy S. Abu-Naser - manuscript
    Every person has his/her own unique signature that is used mainly for the purposes of personal identification and verification of important documents or legal transactions. There are two kinds of signature verification: static and dynamic. Static(off-line) verification is the process of verifying an electronic or document signature after it has been made, while dynamic(on-line) verification takes place as a person creates his/her signature on a digital tablet or a similar device. Offline signature verification is not efficient and slow for (...)
    Direct download  
     
    Export citation  
     
    Bookmark   25 citations  
  31.  23
    If you build it, they will come: unintended future uses of organised health data collections.Kieran C. O’Doherty, Emily Christofides, Jeffery Yen, Heidi Beate Bentzen, Wylie Burke, Nina Hallowell, Barbara A. Koenig & Donald J. Willison - 2016 - BMC Medical Ethics 17 (1):54.
    Health research increasingly relies on organized collections of health data and biological samples. There are many types of sample and data collections that are used for health research, though these are collected for many purposes, not all of which are health-related. These collections exist under different jurisdictional and regulatory arrangements and include: 1) Population biobanks, cohort studies, and genome databases 2) Clinical and public health data 3) Direct-to-consumer genetic testing 4) Social media 5) Fitness trackers, health apps, and biometric (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  32.  24
    Full Disclosure of the ‘Raw Data’ of Research on Humans: Citizens’ Rights, Product Manufacturers’ Obligations and the Quality of the Scientific Database.Dennis J. Mazur - 2011 - Philosophy Compass 6 (2):90-99.
    This guide accompanies the following article(s): ‘Full Disclosure of the “Raw Data” of Research on Humans: Citizens’ Rights, Product Manufacturer’s Obligations and the Quality of the Scientific Database.’Philosophy Compass 6/2 (2011): 90–99. doi: 10.1111/j.1747‐9991.2010.00376.x Author’s Introduction Securing consent (and informed consent) from patients and research study participants is a key concern in patient care and research on humans. Yet, the legal doctrines of consent and informed consent differ in their applications. In patient care, the judicial doctrines of consent and informed (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  25
    Teaching & Learning Guide for: Full Disclosure of the ‘Raw Data’ of Research on Humans: Citizens’ Rights, Product Manufacturers’ Obligations and the Quality of the Scientific Database.Dennis J. Mazur - 2011 - Philosophy Compass 6 (2):152-157.
    This guide accompanies the following article(s): ‘Full Disclosure of the “Raw Data” of Research on Humans: Citizens’ Rights, Product Manufacturer’s Obligations and the Quality of the Scientific Database.’Philosophy Compass 6/2 (2011): 90–99. doi: 10.1111/j.1747‐9991.2010.00376.x Author’s Introduction Securing consent (and informed consent) from patients and research study participants is a key concern in patient care and research on humans. Yet, the legal doctrines of consent and informed consent differ in their applications. In patient care, the judicial doctrines of consent and informed (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  6
    COVID-19: What does it mean for digital social protection?Silvia Masiero - 2020 - Big Data and Society 7 (2).
    COVID-19 has hit a world in which social protection schemes are increasingly augmented with digital measures. Digital identity schemes are especially being adopted to match citizens’ data with social protection entitlements, enabling authentication through demographic and, increasingly, biometric data at the point of access. In this commentary, I discuss three sets of implications that COVID-19 has yielded on digital social protection, whose central trade-off – increasing the probabilities of accurate user identification, at the cost of greater exclusions – (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  14
    Secure Fingerprint Authentication Using Deep Learning and Minutiae Verification.S. Vadivel, Saad Bayezeed & V. M. Praseetha - 2019 - Journal of Intelligent Systems 29 (1):1379-1387.
    Nowadays, there has been an increase in security concerns regarding fingerprint biometrics. This problem arises due to technological advancements in bypassing and hacking methodologies. This has sparked the need for a more secure platform for identification. In this paper, we have used a deep Convolutional Neural Network as a pre-verification filter to filter out bad or malicious fingerprints. As deep learning allows the system to be more accurate at detecting and reducing false identification by training itself again and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  36. Biometrics and the Metaphysics of Personal Identity.Amy Kind - forthcoming - IET Biometrics.
    The vast advances in biometrics over the past several decades have brought with them a host of pressing concerns. Philosophical scrutiny has already been devoted to many of the relevant ethical and political issues, especially ones arising from matters of privacy, bias, and security in data collection. But philosophers have devoted surprisingly little attention to the relevant metaphysical issues, in particular, ones concerning matters of personal identity. This paper aims to take some initial steps to correct this oversight. After discussing (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  90
    The ethical application of biometric facial recognition technology.Marcus Smith & Seumas Miller - 2022 - AI and Society 37 (1):167-175.
    Biometric facial recognition is an artificial intelligence technology involving the automated comparison of facial features, used by law enforcement to identify unknown suspects from photographs and closed circuit television. Its capability is expanding rapidly in association with artificial intelligence and has great potential to solve crime. However, it also carries significant privacy and other ethical implications that require law and regulation. This article examines the rise of biometric facial recognition, current applications and legal developments, and conducts an ethical (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  38.  18
    Multimodal Biometric Fusion: Performance under Spoof Attacks.Sandeep Kale, Mohammed Rizwan & Zahid Akhtar - 2011 - Journal of Intelligent Systems 20 (4):353-372.
    Biometrics is essentially a pattern recognition system that recognizes an individual using their unique anatomical or behavioral patterns such as face, fingerprint, iris, signature etc. Recent researches have shown that many biometric traits are vulnerable to spoof attacks. Moreover, recent works showed that, contrary to a common belief, multimodal biometric systems in parallel fusion mode can be intruded even if only one trait is spoofed. However, most of the results were obtained using simulated spoof attacks, under the assumption (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  47
    Reframing biometric surveillance: from a means of inspection to a form of control.Avi Marciano - 2019 - Ethics and Information Technology 21 (2):127-136.
    This paper reviews the social scientific literature on biometric surveillance, with particular attention to its potential harms. It maps the harms caused by biometric surveillance, traces their theoretical origins, and brings these harms together in one integrative framework to elucidate their cumulative power. Demonstrating these harms with examples from the United States, the European Union, and Israel, I propose that biometric surveillance be addressed, evaluated and reframed as a new form of control rather than simply another means (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  40.  36
    Biometric and developmental Gene-environment interaction: Looking back, moving forward.James Tabery - unknown
    I provide a history of research on G×E in this article, showing that there have actually been two distinct concepts of G×E since the very origins of this research. R. A. Fisher introduced what I call the biometric concept of G×E, or G×EB, while Lancelot Hogben introduced what I call the developmental concept of G×E, or G×ED. Much of the subsequent history of research on G×E has largely consisted in the separate legacies of these separate concepts, along with the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  41.  9
    Biometric Bodies, Or How to Make Electronic Fingerprinting Work in India.Ursula Rao - 2018 - Body and Society 24 (3):68-94.
    The rapid spread of electronic fingerprinting not only creates new regimes of surveillance but compels users to adopt novel ways of performing their bodies to suit the new technology. This ethnography uses two Indian case studies – of a welfare office and a workplace – to unpack the processes by which biometric devices become effective tools for determining identity. While in the popular imaginary biometric technology is often associated with providing disinterested and thus objective evaluation of identity, in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  12
    Biometrics: Enhancing Security or Invading Privacy? Executive Summary.Irish Council for Bioethics - 2010 - Jahrbuch für Wissenschaft Und Ethik 15 (1):383-390.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  10
    Biometrics and citizenship: Measuring diabetes in the United States in the interwar years.Arleen Marcia Tuchman - 2020 - History of Science 58 (2):166-190.
    In 1936, the journalist Hannah Lees published “Two Million Tightrope Walkers,” drawing attention to the significant number of people in the United States estimated to have diabetes. Focusing on how people with diabetes should live, she emphasized the importance of recording the exact values of everything they ate and avoiding all “riotous living” lest they be unable to keep careful measurements of calories, insulin, and sleep. Employing two meanings of measured – as counted and as moderate – Lees was doing (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  17
    The biometric defense of Darwinism.B. J. Norton - 1973 - Journal of the History of Biology 6 (2):283-316.
  45.  12
    The biometrical study of heredity.Ronald A. Fisher - 1924 - The Eugenics Review 16 (3):189.
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  46.  19
    Wearable Biometric Technologies and Public Health.Michael J. DiStefano - 2017 - American Journal of Bioethics 17 (1):79-81.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  47.  10
    Biometrics: possible safe haven or lost cause?Patrick Kosciuk - 2005 - Acm Sigcas Computers and Society 35 (1):1-1.
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  48.  6
    Biometric Revisions of the `Body' in Airports and US Welfare Reform.Erin Kruger, Shoshana Magnet & Joost Van Loon - 2008 - Body and Society 14 (2):99-121.
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  20
    Biometric Tracking From Professional Athletes to Consumers.Ryan H. Purcell & Karen S. Rommelfanger - 2017 - American Journal of Bioethics 17 (1):72-74.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  50. Biometrics technology for peace.Priyanka Sharma - 2006 - In Yajñeśvara Sadāśiva Śāstrī, Intaj Malek & Sunanda Y. Shastri (eds.), In Quest of Peace: Indian Culture Shows the Path. Bharatiya Kala Prakashan. pp. 2--701.
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000