메뉴 건너뛰기




Volumn 28, Issue 6, 2005, Pages 547-566

Complexity and counterterrorism: Thinking about biometrics

Author keywords

[No Author keywords available]

Indexed keywords


EID: 27944490811     PISSN: 1057610X     EISSN: 15210731     Source Type: Journal    
DOI: 10.1080/10576100591008962     Document Type: Review
Times cited : (13)

References (85)
  • 9
    • 0036461372 scopus 로고    scopus 로고
    • The Rise of Complex Terrorism
    • January/February
    • Thomas Homer-Dixon, "The Rise of Complex Terrorism," Foreign Policy (January/February 2002), p. 56.
    • (2002) Foreign Policy , pp. 56
    • Homer-Dixon, T.1
  • 11
    • 27944485748 scopus 로고    scopus 로고
    • note
    • Where is this not the case, as in many developing countries, massive and spectacular building failure is not uncommon.
  • 12
    • 27944436173 scopus 로고    scopus 로고
    • note
    • Ibid.
  • 13
    • 27944439331 scopus 로고    scopus 로고
    • Institute for Security Technology Studies, Dartmouth University, December
    • See "Cyber Security of the Electric Power Industry," Institute for Security Technology Studies, Dartmouth University, December 2002. Available at (http://www.ists.dartmouth.edu/ISTS/ ists_docs/cselectric.pdf) and
    • (2002) Cyber Security of the Electric Power Industry
  • 17
    • 27944457997 scopus 로고    scopus 로고
    • Institute for Security Technology Studies, Dartmouth University
    • For a discussion of such problems see "Cyberterrorism: Regional and Local Response, A Virtual Socratic Dialogue," Institute for Security Technology Studies, Dartmouth University, available at (http://www.ists. dartmouth.edu/IML/cyberterrorism/).
    • Cyberterrorism: Regional and Local Response, a Virtual Socratic Dialogue
  • 19
    • 27944500710 scopus 로고    scopus 로고
    • Rand Documented Briefing Prepared for the Virginia State Crime Commission
    • John D. Woodward, Jr., Christopher Horn, Julius Gatune, and Aryn Thomas, "Biometrics: A Look at Facial Recognition," Rand Documented Briefing Prepared for the Virginia State Crime Commission, 2003, 1. Available at (http://www.rand.org/publications/DB/DB396/DB396.pdf).
    • (2003) Biometrics: a Look at Facial Recognition , pp. 1
    • Woodward Jr., J.D.1    Horn, C.2    Gatune, J.3    Thomas, A.4
  • 20
    • 27944481315 scopus 로고    scopus 로고
    • Gaps Seen in 'Virtual Border' Security System, New York Times, 31 May 2004, and "Prepare to be Scanned
    • See the website of the US-VISIT program at 4 December
    • See the website of the US-VISIT program at (http://www.dhs.gov/us-visit); also John Markoff and Eric Lichtblau, "Gaps Seen in 'Virtual Border' Security System, New York Times, 31 May 2004, and "Prepare to be Scanned," The Economist, 4 December 2003.
    • (2003) The Economist
    • Markoff, J.1    Lichtblau, E.2
  • 21
    • 27944469572 scopus 로고    scopus 로고
    • US Moving with Switch to 'Biometric' Passports
    • 15 May
    • Frank James, "US Moving with Switch to 'Biometric' Passports," Chicago Tribune, 15 May 2004.
    • (2004) Chicago Tribune
    • James, F.1
  • 27
    • 27944470989 scopus 로고    scopus 로고
    • Technology Strains to Find Menace in the Crowd
    • 31 May
    • See Barnaby Feder, "Technology Strains to Find Menace in the Crowd," New York Times, 31 May 2004;
    • (2004) New York Times
    • Feder, B.1
  • 28
    • 0035924712 scopus 로고    scopus 로고
    • Friend or Foe? Face Recognition Goes to War
    • 20 December
    • Warren Webb, "Friend or Foe? Face Recognition Goes to War," EDN, 20 December 2001.
    • (2001) EDN
    • Webb, W.1
  • 31
    • 84868475540 scopus 로고    scopus 로고
    • Keeping terror out: Immigration policy and asymmetric warfare
    • Spring
    • Cited in Mark Krikorian, "Keeping Terror Out: Immigration Policy and Asymmetric Warfare," The National Interest (Spring 2004), p. 78.
    • (2004) The National Interest , pp. 78
    • Krikorian, M.1
  • 35
    • 27944496431 scopus 로고    scopus 로고
    • Is your security system accurate?
    • See 10 May
    • See Robert Dunn, "Is Your Security System Accurate?" Security Magazine, 10 May 2004. Available at (http://www.securitymagazine.com/CDA/ ArticleInformation/features/BNP_ Features_Item/0,5411,123071,00.html).
    • (2004) Security Magazine
    • Dunn, R.1
  • 36
    • 27944473969 scopus 로고    scopus 로고
    • See New York: Random House
    • One such advocate is Larry Ellison of the software company Oracle, who sees his firm as a potential vendor to any such system. See Jeffrey Rosen, The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age (New York: Random House, 2004), pp. 107-129.
    • (2004) The Naked Crowd: Reclaiming Security and Freedom in An Anxious Age , pp. 107-129
    • Rosen, J.1
  • 38
    • 27944433847 scopus 로고    scopus 로고
    • Al Qaeda may be stealing your ID
    • 26 August
    • For a discussion see Sheila R. Cherry, "Al Qaeda May Be Stealing Your ID," Insight on the News, 26 August 2002.
    • (2002) Insight on the News
    • Cherry, S.R.1
  • 41
    • 27944465333 scopus 로고    scopus 로고
    • see
    • Bruce Schneier is one of these skeptics; see Beyond Fear, p. 237;
    • Beyond Fear , pp. 237
  • 42
    • 27944509606 scopus 로고    scopus 로고
    • see also the work of George Smith, found, among other places, at National Security Notes, available at (http://www.soci.niu.edu/ ~crypt/) and (http://vmyths.com/).
    • National Security Notes
    • Smith, G.1
  • 43
    • 85015108003 scopus 로고    scopus 로고
    • Analytic models and policy prescription: Understanding recent innovation in US counterterrorism
    • This is discussed in Richard Falkenrath, "Analytic Models and Policy Prescription: Understanding Recent Innovation in US Counterterrorism," Studies in Conflict and Terrorism 24 (2001), pp. 167-168.
    • (2001) Studies in Conflict and Terrorism , vol.24 , pp. 167-168
    • Falkenrath, R.1
  • 45
    • 0008783791 scopus 로고    scopus 로고
    • Cyber attacks during the war on terrorism: A predictive analysis
    • 22 September
    • Michael Vatis, "Cyber Attacks During The War on Terrorism: A Predictive Analysis," Institute for Security Technology Studies Report, 22 September 2001, available at (http://www.ists.dartmouth.edu/ISTS/ counterterrorism/ cyber_attacks.htm).
    • (2001) Institute for Security Technology Studies Report
    • Vatis, M.1
  • 46
    • 27944458859 scopus 로고    scopus 로고
    • See note 30
    • See note 30.
  • 49
    • 0040374704 scopus 로고    scopus 로고
    • Falkenrath, "Analytic Models and Policy Prescription," p. 171. Falkenrath argues that the notion of this risk being largely perceptual is in a way misleading, for the long-term effect of dread can undermine the fabric of a society and its democratic institutions.
    • Analytic Models and Policy Prescription , pp. 171
    • Falkenrath1
  • 51
    • 0027769403 scopus 로고
    • Perceived risk, trust, and democracy
    • Paul Slovic, "Perceived Risk, Trust, and Democracy," Risk Analysis 13(6) (1993), pp. 675-681.
    • (1993) Risk Analysis , vol.13 , Issue.6 , pp. 675-681
    • Slovic, P.1
  • 57
    • 0003609864 scopus 로고    scopus 로고
    • Boston: Harvard Business School Press, This entire work is an excellent study of the digital technopositivism and what the authors see as some of the pitfalls of this view.
    • John Seely Brown and Paul Duguid, The Social Life of Information (Boston: Harvard Business School Press, 2000), p. 19. This entire work is an excellent study of the digital technopositivism and what the authors see as some of the pitfalls of this view.
    • (2000) The Social Life of Information , pp. 19
    • Brown, J.S.1    Duguid, P.2
  • 60
    • 27944482965 scopus 로고    scopus 로고
    • Biometrics
    • January/February The editors of this issue list biometrics as one of ten technologies that will "change the world."
    • Alexandra Stikeman, "Biometrics," Technology Review (January/February 2001), pp. 106-107. The editors of this issue list biometrics as one of ten technologies that will "change the world."
    • (2001) Technology Review , pp. 106-107
    • Stikeman, A.1
  • 61
    • 0035851501 scopus 로고    scopus 로고
    • IATA advocates biometrics security
    • 12 November
    • For one example of this conflation, the director of the International Air Transport Association spoke of 11 September 2001 as an intelligence failure, which could be resolved through biometric identification. Pierre Sparaco, "IATA Advocates Biometrics Security," Aviation Week and Space Technology, 12 November 2001, p. 50.
    • (2001) Aviation Week and Space Technology , pp. 50
    • Sparaco, P.1
  • 62
    • 27944432141 scopus 로고    scopus 로고
    • Too flaky to trust
    • 4 December
    • "Too Flaky to Trust," The Economist, 4 December 2003.
    • (2003) The Economist
  • 63
    • 27944473658 scopus 로고    scopus 로고
    • You'll love those national ID cards
    • 14 January
    • Amitai Etzioni, "You'll Love Those National ID Cards," Christian Science Monitor, 14 January 2002, p. 11.
    • (2002) Christian Science Monitor , pp. 11
    • Etzioni, A.1
  • 64
  • 65
    • 27944434926 scopus 로고    scopus 로고
    • Biometrics; The measure of man
    • 7 September
    • For these claims see Stikeman, "Biometrics"; "The Measure of Man," The Economist, 7 September 2000;
    • (2000) The Economist
    • Stikeman1
  • 66
    • 26044468491 scopus 로고    scopus 로고
    • And now, the good side of facial recognition
    • 4 February
    • John D. Woodward, "And Now, The Good Side of Facial Recognition," Washington Post, 4 February 2001, reprinted on the Rand website at (http://www.rand.org/commentary/020401WP.html).
    • (2001) Washington Post
    • Woodward, J.D.1
  • 69
    • 27944477777 scopus 로고    scopus 로고
    • Security blanket message: Firms capitalize on Americans' fears
    • 16 September
    • Jim Krande, "Security Blanket Message: Firms Capitalize on Americans' Fears," Marketing News, 16 September 2002.
    • (2002) Marketing News
    • Krande, J.1
  • 70
    • 27944448860 scopus 로고    scopus 로고
    • Shared risk, shared rewards
    • see 1 September
    • See, for example, the testimony by Joseph Atick, head of the biometric identification company Visionics before the Senate Committee on Terrorism, 14 November 2001. Federal Document dealing House. For a discussion of the financial dynamics of homeland security and counterterrorism technology, see Seth Grimes, "Shared Risk, Shared Rewards," Intelligent Enterprise, 1 September 2003.
    • (2003) Intelligent Enterprise
    • Grimes, S.1
  • 72
    • 27944468699 scopus 로고    scopus 로고
    • Don't let them hurt our children
    • 1 March
    • "Don't Let Them Hurt Our Children," Access Control and Security Systems, 1 March 2003. Similar arguments have been made in the United Kingdom regarding their national ID card; see
    • (2003) Access Control and Security Systems
  • 73
    • 27944491249 scopus 로고    scopus 로고
    • ID cards 'will protect youngsters from paedophiles
    • 24 April
    • James Lyons, "ID Cards 'Will Protect Youngsters from Paedophiles," The Scotsman, 24 April 2004.
    • (2004) The Scotsman
    • Lyons, J.1
  • 74
    • 27944507768 scopus 로고    scopus 로고
    • Prepare To Be Scanned
    • "Prepare To Be Scanned."
  • 75
    • 27944463151 scopus 로고    scopus 로고
    • See Note 31
    • See Note 31.
  • 80
    • 27944503418 scopus 로고    scopus 로고
    • Complexity, trust, and terror
    • see 22 October
    • For example, see Langdon Winner, "Complexity, Trust, and Terror," Netfuture no. 137 (22 October 2002), available at (http://www.netfuture.org/2002/Oct2202_137.html).
    • (2002) Netfuture , Issue.137
    • Winner, L.1
  • 81
    • 27944490831 scopus 로고    scopus 로고
    • Prepare to be Scanned
    • "Prepare to be Scanned."
  • 83
    • 4544366486 scopus 로고    scopus 로고
    • The problem of redundancy problem: Why more nuclear security forces may produce less nuclear security
    • Scott Sagan, "The Problem of Redundancy Problem: Why More Nuclear Security Forces May Produce Less Nuclear Security," Risk Analysis 24(4) (2004), pp. 935-946.
    • (2004) Risk Analysis , vol.24 , Issue.4 , pp. 935-946
    • Sagan, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.