메뉴 건너뛰기




Volumn 29, Issue 1, 2012, Pages 21-36

From identity verification to behavior prediction: Ethical implications of second generation biometrics

Author keywords

ADABTS; Behavior prediction; Discrimination; Ethical issues; FAST; First generation biometrics; Informed consent; Moral autonomy; Privacy; Second generation biometrics; Stigmatization; Surveillance; Trust

Indexed keywords

AUTONOMY; BEHAVIORAL RESPONSE; BIOMETRY; DATA; HUMAN BEHAVIOR; SURVEILLANCE AND ENFORCEMENT;

EID: 84856188684     PISSN: 1541132X     EISSN: 15411338     Source Type: Journal    
DOI: 10.1111/j.1541-1338.2011.00536.x     Document Type: Article
Times cited : (26)

References (35)
  • 1
    • 84856186857 scopus 로고    scopus 로고
    • ACTIBIO. (n.d.). Unobtrusive authentication using activity related and soft biometrics (ACTIBIO), ACTIBIO ethical manual. Retrieved from
    • ACTIBIO. (n.d.). Unobtrusive authentication using activity related and soft biometrics (ACTIBIO), ACTIBIO ethical manual. Retrieved from
  • 2
    • 84856186853 scopus 로고    scopus 로고
    • ADABTS Automatic detection of abnormal behavior and threats in crowded spaces (ADABTS), quot;ADABTS WP3 abnormal behaviour. D.3." Retrieved from
    • ADABTS. (2010). Automatic detection of abnormal behavior and threats in crowded spaces (ADABTS), "ADABTS WP3 abnormal behaviour. D.3." Retrieved from
    • (2010)
  • 3
    • 84856141703 scopus 로고    scopus 로고
    • ADABTS Automatic detection of abnormal behavior and threats in crowded spaces (ADABTS), quot;ADABTS WP2 user needs. D.2.1." Retrieved from
    • ADABTS. (2011). Automatic detection of abnormal behavior and threats in crowded spaces (ADABTS), "ADABTS WP2 user needs. D.2.1." Retrieved from
    • (2011)
  • 4
    • 9544226886 scopus 로고    scopus 로고
    • "A piece of yourself": Ethical issues in biometric identification
    • Alterman, A. (2003). "A piece of yourself": Ethical issues in biometric identification. Ethics and Information Technology, 5, 139-150.
    • (2003) Ethics and Information Technology , vol.5 , pp. 139-150
    • Alterman, A.1
  • 5
    • 0001320762 scopus 로고    scopus 로고
    • Risk society revisited: Theory, politics and research programmes
    • B. Adam, U. Beck, amp; J. van Loon (Eds.) London: Sage.
    • Beck, U. (2000). Risk society revisited: Theory, politics and research programmes. In B. Adam, U. Beck, & J. van Loon (Eds.), The risk society and beyond (pp. 211-229). London: Sage.
    • (2000) The risk society and beyond , pp. 211-229
    • Beck, U.1
  • 6
    • 84856157812 scopus 로고    scopus 로고
    • Loser: Bad vibes
    • January. Retrieved from
    • Cherry, S., & Corley, A.-M. (2010). Loser: Bad vibes. IEEE Spectrum, January. Retrieved from
    • (2010) IEEE Spectrum
    • Cherry, S.1    Corley, A.-M.2
  • 8
    • 34548077572 scopus 로고    scopus 로고
    • Fingerprint-based recognition
    • Dass, S. C., & Jain, A. K. (2007). Fingerprint-based recognition. Technometrics, 49(3), 262-276.
    • (2007) Technometrics , vol.49 , Issue.3 , pp. 262-276
    • Dass, S.C.1    Jain, A.K.2
  • 9
    • 84856141699 scopus 로고    scopus 로고
    • European Network and Information Security Agency (ENISA) ENISA Briefing: Behavioural Biometrics. Retrieved from
    • European Network and Information Security Agency (ENISA). (2010). ENISA Briefing: Behavioural Biometrics. Retrieved from
    • (2010)
  • 10
    • 0003187764 scopus 로고
    • Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • European Parliament.
    • European Parliament. (1995). Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal, L281, 31-50.
    • (1995) Official Journal , vol.281 , pp. 31-50
  • 11
    • 84856163381 scopus 로고    scopus 로고
    • Future of Identity in the Information Society (FIDIS) D3.10: Biometrics in identity management. Retrieved from
    • Future of Identity in the Information Society (FIDIS). (2009). D3.10: Biometrics in identity management. Retrieved from
    • (2009)
  • 12
    • 84967153591 scopus 로고    scopus 로고
    • The rise of risk
    • A. Doyle & V. R. Ericson (Eds.) Toronto: University of Toronto Press.
    • Garland, D. (2003). The rise of risk. In A. Doyle & V. R. Ericson (Eds.), Risk and morality (pp. 48-86). Toronto: University of Toronto Press.
    • (2003) Risk and morality , pp. 48-86
    • Garland, D.1
  • 13
    • 85016716695 scopus 로고    scopus 로고
    • Urban surveillance and panopticism: Will we recognize the facial recognition society?
    • Gray, M. (2003). Urban surveillance and panopticism: Will we recognize the facial recognition society? Surveillance & Society, 1(3), 314-330.
    • (2003) Surveillance & Society , vol.1 , Issue.3 , pp. 314-330
    • Gray, M.1
  • 14
    • 84856141698 scopus 로고    scopus 로고
    • EU to monitor deviant behavior in fight against terrorism
    • October 21. Retrieved from
    • Heck, W. (2009). EU to monitor deviant behavior in fight against terrorism. Spiegel Online, October 21. Retrieved from
    • (2009) Spiegel Online
    • Heck, W.1
  • 16
    • 84856469086 scopus 로고    scopus 로고
    • Quantum surveillance and "shared secrets". A biometric step too far? Justice and home affairs
    • Retrieved from
    • Lodge, J. (2010). Quantum surveillance and "shared secrets". A biometric step too far? Justice and home affairs. CEPS Liberty and Security in Europe, 1-39. Retrieved from
    • (2010) CEPS Liberty and Security in Europe , pp. 1-39
    • Lodge, J.1
  • 17
    • 8844247551 scopus 로고    scopus 로고
    • Facing the future: Seeking ethics for everyday surveillance
    • Lyon, D. (2001). Facing the future: Seeking ethics for everyday surveillance. Ethics and Information Technology, 3, 171-181.
    • (2001) Ethics and Information Technology , vol.3 , pp. 171-181
    • Lyon, D.1
  • 18
    • 85072817685 scopus 로고    scopus 로고
    • Surveillance as social sorting: Computer codes and mobile bodies
    • D. Lyon (Ed.) London: Routledge.
    • Lyon, D. (2003). Surveillance as social sorting: Computer codes and mobile bodies. In D. Lyon (Ed.), Surveillance as social sorting: Privacy, risk and automated discrimination (pp. 13-31). London: Routledge.
    • (2003) Surveillance as social sorting: Privacy, risk and automated discrimination , pp. 13-31
    • Lyon, D.1
  • 19
    • 45949110476 scopus 로고    scopus 로고
    • Moral identification in identity management systems. In IFIP international federation for information processing
    • Manders-Huits, N., & van der Hoven, J. (2008). Moral identification in identity management systems. In IFIP international federation for information processing. The Future of Identity in the Information Society, 262, 77-91.
    • (2008) The Future of Identity in the Information Society , vol.262 , pp. 77-91
    • Manders-Huits, N.1    van der Hoven, J.2
  • 21
    • 85071464967 scopus 로고    scopus 로고
    • Beyond Foucault: Towards a contemporary theory of surveillance
    • C. J. M. Norris (Ed.) Aldershot: Ashgate.
    • McCahill, M. (1998). Beyond Foucault: Towards a contemporary theory of surveillance. In C. J. M. Norris (Ed.), Surveillance, closed circuit television and control (pp. 41-65). Aldershot: Ashgate.
    • (1998) Surveillance, closed circuit television and control , pp. 41-65
    • McCahill, M.1
  • 22
    • 84856163384 scopus 로고    scopus 로고
    • Biometric technologies
    • R. Chadwick (Ed.), 2nd ed. Amsterdam: Elsevier.
    • McCarthy, P. (2012). Biometric technologies. In R. Chadwick (Ed.), Encyclopaedia of applied ethics, 2nd ed. Amsterdam: Elsevier.
    • (2012) Encyclopaedia of applied ethics
    • McCarthy, P.1
  • 23
    • 84856163385 scopus 로고    scopus 로고
    • Can behavioral biometrics help detect terrorists entering the U.S?
    • September 22. Retrieved from
    • Messmer, E. (2010). Can behavioral biometrics help detect terrorists entering the U.S? Network World, September 22. Retrieved from
    • (2010) Network World
    • Messmer, E.1
  • 24
    • 0042856886 scopus 로고    scopus 로고
    • Commitee to Review the Scientific Evidence on the Polygraph (National Research Council (United States)). Washington, DC: National Academies Press.
    • Moore, M. H. (2002). The polygraph and lie detection. Commitee to Review the Scientific Evidence on the Polygraph (National Research Council (United States)). Washington, DC: National Academies Press.
    • (2002) The polygraph and lie detection
    • Moore, M.H.1
  • 25
  • 26
    • 54049094791 scopus 로고    scopus 로고
    • Body, biometrics and identity
    • Mordini, E., & Massari, S. (2008). Body, biometrics and identity. Bioethics, 22(9), 488-498.
    • (2008) Bioethics , vol.22 , Issue.9 , pp. 488-498
    • Mordini, E.1    Massari, S.2
  • 28
    • 0032282474 scopus 로고    scopus 로고
    • Protecting privacy in information age: The problem of privacy in public
    • Nissenbaum, H. (1998). Protecting privacy in information age: The problem of privacy in public. Law and Philosophy, 17, 559-596.
    • (1998) Law and Philosophy , vol.17 , pp. 559-596
    • Nissenbaum, H.1
  • 30
    • 84856163382 scopus 로고    scopus 로고
    • U.S. Department of Homeland Security Privacy impact assessment for the future attribute screening technology (FAST) project. Retrieved from
    • U.S. Department of Homeland Security. (2008). Privacy impact assessment for the future attribute screening technology (FAST) project. Retrieved from
    • (2008)
  • 31
    • 84856157811 scopus 로고    scopus 로고
    • U.S. Department of Homeland Security FAST (future attribute screening technology) project description. Retrieved from
    • U.S. Department of Homeland Security. (2011). FAST (future attribute screening technology) project description. Retrieved from
    • (2011)
  • 32
    • 84856141701 scopus 로고    scopus 로고
    • Identity, biometrics and behavior predictability. RISE European multi-stakeholder conference on "ethics and governance of biometrics and identification technologies," 9-10 December, Brussels.Retrieved from
    • van der Ploeg, I. (2010). Identity, biometrics and behavior predictability. RISE European multi-stakeholder conference on "ethics and governance of biometrics and identification technologies, "9-10 December, Brussels.Retrieved from
    • (2010)
    • van der Ploeg, I.1
  • 33
    • 0004281423 scopus 로고
    • Cambridge: Cambridge University Press.
    • Williams, B. (1973). Problems of the self. Cambridge: Cambridge University Press.
    • (1973) Problems of the self
    • Williams, B.1
  • 34
    • 0004231635 scopus 로고
    • Cambridge: Cambridge University Press.
    • Williams, B. (1981). Moral luck. Cambridge: Cambridge University Press.
    • (1981) Moral luck
    • Williams, B.1
  • 35
    • 84856186854 scopus 로고    scopus 로고
    • Machine that predicts terrorists' intent showing progress
    • Retrieved from
    • Wright, A. (2009). Machine that predicts terrorists' intent showing progress. National Defence, Retrieved from
    • (2009) National Defence
    • Wright, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.