Increasing international communications in volume and diversity (physical or virtual)
as well as increasing threats (terrorism, piracy...) appeal for a need to identify individuals. Indeed, important issues raise the numbers of terrorists, criminals and so on. People can prove their identity through what they own (objects), what they know (immaterial passes) and what they are (Biometrics). Many access controls fail because they use classical tools to identify people and grant them access, i.e. card, key, password... The fact is that people tend to accumulate codes and finally forget them, they can lose their keys as well, and their passes can be stolen: identification should be based on individuals' characteristics. Biometrics are the real-time identification of a person by measuring his/her unique and particular characteristics and comparing them to a database. The physiological category tends to be more reliable because these characteristics are better resistant to stress and are less prone to change during your lifetime (a face will vary with the age of an individual for example, but fingerprints, iris, voice, DNA, blood...are very stable).
[...] The methods can be explained with a 3-step procedure (see appendix Capture of the information of an individual via a sensor to obtain his/her "biometric signature". The information must be universal (everybody has unique (allows people to be distinguished), permanent (doesn't change during lifetime), collectable (easy to use for checking identity), measurable (can be compared then) and not reproducible. Data process: The biometric signature is standardized so that it can be integrated into a database (resolution, image and file size). Therefore, we talk about "normalized signature". Checking: The normalized signature can be used for two types of checking. [...]
[...] Bioinfoethics REFERENCES APPENDICES 1. Context Increasing international communications in volume and diversity (physical or virtual) as well as increasing threats (terrorism, piracy ) appeal for a need to identify individuals. Indeed, important issues raise the numbers of terrorists, criminals and so on. People can prove their identity through what they own (objects), what they know (immaterial passes) and what they are (Biometrics). Many access controls fail because they use classical tools to identify people and grant them access, i.e. card, key, password The fact is that people tend to accumulate codes and finally forget them, they can lose their keys as well, and their passes can be stolen: identification should be based on individuals' characteristics What are Biometrics? [...]
[...] Ethical principals address privacy and ownership, for example who owns the personal images. It also addresses the concept of confidentiality, security, collection and storage of the information. Lack of inadequate data protection may result in unwillingness of individuals to participate (CSSS Policy Brief #1/03-Nov 2003). These currently unanswered questions lead to novel challenges for public policy, i.e. laws to ensure privacy, security and confidentiality of the collected information. Unfortunately the development of guidelines, policies and legal standards has not kept pace with rapid technological progress (Smith, 2001). [...]
[...] Biometrics Table of content 1. Context 2. What are Biometrics? 3. How do Biometrics work? The main technologies 4. Adoption of 5. Applications Who should implement Biometric technologies? 6. [...]
[...] unethical or unwanted marketing campaign (Pons, 2006). Consumers expressed concerns regarding the security of collecting and storing the data and the access to this private information. Many consumers worry that retailers will use the technology to obtain private information without their knowledge (www.BiometricsExplained.com). Increases in screening and surveillance even after the consumers have left the retailer world could make some people feel uncomfortable and the whole world may look like one giant airport. Association with criminology (fingerprinting) worries a surprising number of people. [...]
Source aux normes APA
Pour votre bibliographieLecture en ligne
avec notre liseuse dédiée !Contenu vérifié
par notre comité de lecture