-
1
-
-
84856186857
-
-
ACTIBIO. (n.d.). Unobtrusive authentication using activity related and soft biometrics (ACTIBIO), ACTIBIO ethical manual. Retrieved from
-
ACTIBIO. (n.d.). Unobtrusive authentication using activity related and soft biometrics (ACTIBIO), ACTIBIO ethical manual. Retrieved from
-
-
-
-
2
-
-
84856186853
-
-
ADABTS Automatic detection of abnormal behavior and threats in crowded spaces (ADABTS), quot;ADABTS WP3 abnormal behaviour. D.3." Retrieved from
-
ADABTS. (2010). Automatic detection of abnormal behavior and threats in crowded spaces (ADABTS), "ADABTS WP3 abnormal behaviour. D.3." Retrieved from
-
(2010)
-
-
-
3
-
-
84856141703
-
-
ADABTS Automatic detection of abnormal behavior and threats in crowded spaces (ADABTS), quot;ADABTS WP2 user needs. D.2.1." Retrieved from
-
ADABTS. (2011). Automatic detection of abnormal behavior and threats in crowded spaces (ADABTS), "ADABTS WP2 user needs. D.2.1." Retrieved from
-
(2011)
-
-
-
4
-
-
9544226886
-
"A piece of yourself": Ethical issues in biometric identification
-
Alterman, A. (2003). "A piece of yourself": Ethical issues in biometric identification. Ethics and Information Technology, 5, 139-150.
-
(2003)
Ethics and Information Technology
, vol.5
, pp. 139-150
-
-
Alterman, A.1
-
5
-
-
0001320762
-
Risk society revisited: Theory, politics and research programmes
-
B. Adam, U. Beck, amp; J. van Loon (Eds.) London: Sage.
-
Beck, U. (2000). Risk society revisited: Theory, politics and research programmes. In B. Adam, U. Beck, & J. van Loon (Eds.), The risk society and beyond (pp. 211-229). London: Sage.
-
(2000)
The risk society and beyond
, pp. 211-229
-
-
Beck, U.1
-
6
-
-
84856157812
-
Loser: Bad vibes
-
January. Retrieved from
-
Cherry, S., & Corley, A.-M. (2010). Loser: Bad vibes. IEEE Spectrum, January. Retrieved from
-
(2010)
IEEE Spectrum
-
-
Cherry, S.1
Corley, A.-M.2
-
7
-
-
33748369352
-
Privacy
-
Dandekar, N. (1993). Privacy. Philosophical Forum, 24(4), 331-348.
-
(1993)
Philosophical Forum
, vol.24
, Issue.4
, pp. 331-348
-
-
Dandekar, N.1
-
8
-
-
34548077572
-
Fingerprint-based recognition
-
Dass, S. C., & Jain, A. K. (2007). Fingerprint-based recognition. Technometrics, 49(3), 262-276.
-
(2007)
Technometrics
, vol.49
, Issue.3
, pp. 262-276
-
-
Dass, S.C.1
Jain, A.K.2
-
9
-
-
84856141699
-
-
European Network and Information Security Agency (ENISA) ENISA Briefing: Behavioural Biometrics. Retrieved from
-
European Network and Information Security Agency (ENISA). (2010). ENISA Briefing: Behavioural Biometrics. Retrieved from
-
(2010)
-
-
-
10
-
-
0003187764
-
Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
European Parliament.
-
European Parliament. (1995). Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal, L281, 31-50.
-
(1995)
Official Journal
, vol.281
, pp. 31-50
-
-
-
11
-
-
84856163381
-
-
Future of Identity in the Information Society (FIDIS) D3.10: Biometrics in identity management. Retrieved from
-
Future of Identity in the Information Society (FIDIS). (2009). D3.10: Biometrics in identity management. Retrieved from
-
(2009)
-
-
-
12
-
-
84967153591
-
The rise of risk
-
A. Doyle & V. R. Ericson (Eds.) Toronto: University of Toronto Press.
-
Garland, D. (2003). The rise of risk. In A. Doyle & V. R. Ericson (Eds.), Risk and morality (pp. 48-86). Toronto: University of Toronto Press.
-
(2003)
Risk and morality
, pp. 48-86
-
-
Garland, D.1
-
13
-
-
85016716695
-
Urban surveillance and panopticism: Will we recognize the facial recognition society?
-
Gray, M. (2003). Urban surveillance and panopticism: Will we recognize the facial recognition society? Surveillance & Society, 1(3), 314-330.
-
(2003)
Surveillance & Society
, vol.1
, Issue.3
, pp. 314-330
-
-
Gray, M.1
-
14
-
-
84856141698
-
EU to monitor deviant behavior in fight against terrorism
-
October 21. Retrieved from
-
Heck, W. (2009). EU to monitor deviant behavior in fight against terrorism. Spiegel Online, October 21. Retrieved from
-
(2009)
Spiegel Online
-
-
Heck, W.1
-
15
-
-
0003987134
-
-
New York: Springer.
-
Jain, A., Bolle, R., & Pankanti, S. (1996). Biometrics, personal identification in networked society. New York: Springer.
-
(1996)
Biometrics, personal identification in networked society
-
-
Jain, A.1
Bolle, R.2
Pankanti, S.3
-
16
-
-
84856469086
-
Quantum surveillance and "shared secrets". A biometric step too far? Justice and home affairs
-
Retrieved from
-
Lodge, J. (2010). Quantum surveillance and "shared secrets". A biometric step too far? Justice and home affairs. CEPS Liberty and Security in Europe, 1-39. Retrieved from
-
(2010)
CEPS Liberty and Security in Europe
, pp. 1-39
-
-
Lodge, J.1
-
17
-
-
8844247551
-
Facing the future: Seeking ethics for everyday surveillance
-
Lyon, D. (2001). Facing the future: Seeking ethics for everyday surveillance. Ethics and Information Technology, 3, 171-181.
-
(2001)
Ethics and Information Technology
, vol.3
, pp. 171-181
-
-
Lyon, D.1
-
18
-
-
85072817685
-
Surveillance as social sorting: Computer codes and mobile bodies
-
D. Lyon (Ed.) London: Routledge.
-
Lyon, D. (2003). Surveillance as social sorting: Computer codes and mobile bodies. In D. Lyon (Ed.), Surveillance as social sorting: Privacy, risk and automated discrimination (pp. 13-31). London: Routledge.
-
(2003)
Surveillance as social sorting: Privacy, risk and automated discrimination
, pp. 13-31
-
-
Lyon, D.1
-
19
-
-
45949110476
-
Moral identification in identity management systems. In IFIP international federation for information processing
-
Manders-Huits, N., & van der Hoven, J. (2008). Moral identification in identity management systems. In IFIP international federation for information processing. The Future of Identity in the Information Society, 262, 77-91.
-
(2008)
The Future of Identity in the Information Society
, vol.262
, pp. 77-91
-
-
Manders-Huits, N.1
van der Hoven, J.2
-
21
-
-
85071464967
-
Beyond Foucault: Towards a contemporary theory of surveillance
-
C. J. M. Norris (Ed.) Aldershot: Ashgate.
-
McCahill, M. (1998). Beyond Foucault: Towards a contemporary theory of surveillance. In C. J. M. Norris (Ed.), Surveillance, closed circuit television and control (pp. 41-65). Aldershot: Ashgate.
-
(1998)
Surveillance, closed circuit television and control
, pp. 41-65
-
-
McCahill, M.1
-
22
-
-
84856163384
-
Biometric technologies
-
R. Chadwick (Ed.), 2nd ed. Amsterdam: Elsevier.
-
McCarthy, P. (2012). Biometric technologies. In R. Chadwick (Ed.), Encyclopaedia of applied ethics, 2nd ed. Amsterdam: Elsevier.
-
(2012)
Encyclopaedia of applied ethics
-
-
McCarthy, P.1
-
23
-
-
84856163385
-
Can behavioral biometrics help detect terrorists entering the U.S?
-
September 22. Retrieved from
-
Messmer, E. (2010). Can behavioral biometrics help detect terrorists entering the U.S? Network World, September 22. Retrieved from
-
(2010)
Network World
-
-
Messmer, E.1
-
24
-
-
0042856886
-
-
Commitee to Review the Scientific Evidence on the Polygraph (National Research Council (United States)). Washington, DC: National Academies Press.
-
Moore, M. H. (2002). The polygraph and lie detection. Commitee to Review the Scientific Evidence on the Polygraph (National Research Council (United States)). Washington, DC: National Academies Press.
-
(2002)
The polygraph and lie detection
-
-
Moore, M.H.1
-
25
-
-
77956937286
-
Defining privacy
-
Moore, A. (2008). Defining privacy. Journal of Social Philosophy, 39(3), 411-428.
-
(2008)
Journal of Social Philosophy
, vol.39
, Issue.3
, pp. 411-428
-
-
Moore, A.1
-
26
-
-
54049094791
-
Body, biometrics and identity
-
Mordini, E., & Massari, S. (2008). Body, biometrics and identity. Bioethics, 22(9), 488-498.
-
(2008)
Bioethics
, vol.22
, Issue.9
, pp. 488-498
-
-
Mordini, E.1
Massari, S.2
-
28
-
-
0032282474
-
Protecting privacy in information age: The problem of privacy in public
-
Nissenbaum, H. (1998). Protecting privacy in information age: The problem of privacy in public. Law and Philosophy, 17, 559-596.
-
(1998)
Law and Philosophy
, vol.17
, pp. 559-596
-
-
Nissenbaum, H.1
-
30
-
-
84856163382
-
-
U.S. Department of Homeland Security Privacy impact assessment for the future attribute screening technology (FAST) project. Retrieved from
-
U.S. Department of Homeland Security. (2008). Privacy impact assessment for the future attribute screening technology (FAST) project. Retrieved from
-
(2008)
-
-
-
31
-
-
84856157811
-
-
U.S. Department of Homeland Security FAST (future attribute screening technology) project description. Retrieved from
-
U.S. Department of Homeland Security. (2011). FAST (future attribute screening technology) project description. Retrieved from
-
(2011)
-
-
-
32
-
-
84856141701
-
-
Identity, biometrics and behavior predictability. RISE European multi-stakeholder conference on "ethics and governance of biometrics and identification technologies," 9-10 December, Brussels.Retrieved from
-
van der Ploeg, I. (2010). Identity, biometrics and behavior predictability. RISE European multi-stakeholder conference on "ethics and governance of biometrics and identification technologies, "9-10 December, Brussels.Retrieved from
-
(2010)
-
-
van der Ploeg, I.1
-
33
-
-
0004281423
-
-
Cambridge: Cambridge University Press.
-
Williams, B. (1973). Problems of the self. Cambridge: Cambridge University Press.
-
(1973)
Problems of the self
-
-
Williams, B.1
-
34
-
-
0004231635
-
-
Cambridge: Cambridge University Press.
-
Williams, B. (1981). Moral luck. Cambridge: Cambridge University Press.
-
(1981)
Moral luck
-
-
Williams, B.1
-
35
-
-
84856186854
-
Machine that predicts terrorists' intent showing progress
-
Retrieved from
-
Wright, A. (2009). Machine that predicts terrorists' intent showing progress. National Defence, Retrieved from
-
(2009)
National Defence
-
-
Wright, A.1
|