Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Ethical issues associated with biometrics
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Ethical issues associated with biometrics
When we hear the term “Biometrics” the first thing that comes to our minds is an advanced or futuristic security system and we automatically remember movies like Star Wars and James Bond. What do these movies have in common and how are they related to Biometrics? The answer is simple, the security system in the doors. Star Wars characters don’t use handles to open doors they use a kind of palm print scanner and in James Bond movies we can see how they open doors with fingerprint scanners, palm prints, voice and iris recognition. Biometrics is defined as “the measurement and analysis of unique physical or behavioral characteristics especially as a means of verifying personal identity” by Merriam-Webster Dictionary. Biometric systems are so attractive because they let us recognize or identify a person by using unique characteristics and traits they have like DNA and fingerprints. Biometric systems are all over the world and we use them on a daily basis, airports use biometric recognition by taking digital pictures and scanning the fingerprints of all the individuals that decide to travel and some airports use other type of biometric recognition like palm print scanning to be aware of the traveler’s identity. Biometrics is a new identification system that is going to be crucial for the development and survival of future businesses.
The first idea of biometrics appeared thousands of years ago when cavemen used their hands and, in some cases, fingerprints to sign their drawings (Biometric Authentication). This practice was not really effective but it had the same basic concept that unique traits, such as handprints, will be able to identify us. In 1891, an Argentinian detective named Juan Vucetich started creating a collection of finge...
... middle of paper ...
...An Overview", Second Generation Biometrics: The Ethical, Legal and Social Context, E. Mordini and D. Tzovaras (Eds.), pp. 49-79, Springer, 2012.
S. Prabhakar, A. Ivanisov, and A. K. Jain, "Biometric Recognition: Sensor Characteristics and Image Quality", IEEE Instrumentation & Measurement Society Magazine, Vol. 14, No. 3, pp. 10-16, June 2011
A. K. Jain, A. Ross, and K. Nandakumar, "Introduction to Biometrics", Springer, 2011
Babich, Aleksandra “Biometric Authentification: Types of biometric identifiers”. Diss. HAAGA-HELIA University of applied Sciences, 2012: Helsinki, 2012. PDF
Wikipedia contributors. "Biometrics." Wikipedia, The Free Encyclopedia. Wikipedia, The Free Encyclopedia, 28 Nov. 2013. Web. 5 Dec. 2013.
"Biometric." Merriam-Webster.com. Merriam-Webster, 2013. Web. November 2013.
"DNA." Merriam-Webster.com. Merriam-Webster, 2013. Web. November 2013.
In William Safire’s “The Threat of National ID”, he argues against a National ID card. Safire published an article in the New York Times to establish different context. Safire gives details about the use of National ID card at different places in different situations. He emphasizes that many Americans are willing to give up personal privacy in return for greater safety, but none of us have privacy regarding where we go and what we do all the time. Safire disputes that mandatory National ID become necessary for people to prevent fear of terror attack.
Gest, Ted. " DNA "Fingerprinting " is Facing a Major Legal Challenge from Defense Attorneys and Civil Libertarians."
Now-a-day, biometric authentication system or simply biometric system, offers a reliable and user-friendly solution to the problem of identity management by establishing the identity of an individual based on “who the person is”, rather than the knowledge-based i.e. “what the person knows" or token-based i.e. “what the person carries” (Jain et al., 1999). The word biometrics is derived from the Greek words bios (meaning life) and metron (meaning measurement); biometric identifiers are measurements from living human body (Maltoni et al., 2003). Biometric system refers to automatically identify or verify an individual's identity based on his physiological characteristics (e.g. fingerprints, face, iris and hand geometry) and behavioral characteristics (e.g. gait, voice and signature) (Figure 2.1). Ancillary characteristics (also known as soft biometric) such as gender, ethnicity, age, eye color, skin color, scars and tatoos also provide some information about the identity of a person. However, soft biometric traits do not provide sufficient evidence to precisely determine the identity (Jain et al., 2004a). Biometric traits provide a unique and permanent binding between an individual and his identity. This “binding" cannot be easily lost, forgotten, shared or forged and free from making false repudiation claims. Biometrics offers several advantages over conventional security measures. These include
It is easy to think of biometrics as the future science technology are always happened in some fictions, associated with solar car and clones together. In fact, it has long history that people understood the basic principle and application of the biometric. Thousands of years ago, the people of the Nile basin used the biometric in everyday transactions (such as scarring, skin tone, eye color, height, etc.) for identification. Of course, they had no any automatic electronic identification system, or computer network, but the principle is similar.
7. Herman T. Tavani, James H. Moor "Privacy Protection, Control of Information, and Privacy-Enhancing Technologies", Computers and Society, March 2001
The rapid growth in technology has been impressive over the past 20 years from television graphics and multi-purpose phones to world-wide connections. Unfortunately, the government is having trouble with this growth to protect the people from having their privacy violated due to the information being stored electronically. In “The Anonymity Experiment”, by Catherine Price, states how easily a person can be track and how personal can be lost. Also, in “Social Security and ID theft”, by Felipe Sorrells, states how social security numbers and personal identities can be stolen and how the government is trying to stop that theft. They both intertwine with technology and privacy though Price's article has a broad overview of that, while Sorrells's focus is mainly on social security number and identity thief part. Price and Sorrells shows that companies are taking too much advantage from the customer, the government, even though their trying, needs to start helping the people protect their privacy, and a balance between the amount of trust people should have giving out their sensitive records to which information is protected.
In today’s world, we can say that the main danger to privacy, security for people who lives in free democratic societies can come from the system that will create and apply supposedly very high tech national ID card.
Preview of main points: Now I am going to take you through the process of identifying, collecting and analyzing fingerprints.
The first recorded use of biometrics dates back to the 14th century when the Spanish explorer Joao de Barros witnessed Chinese parents pressing their children’s inked fingers and feet onto paper allowing them to differentiate one child from another. Through Barros’ travels, he noted that Chinese businessmen also closed various financial and business transactions with fingerprints. There are other pieces of historical evidence indicating the use of biometrics for various purposes prior to Barros’ records. However, none were successfully documented.
Privacy is one of the severe issue in today’s Modern Technology era, tied to human right around the world. Most countries have started thinking differently regarding between the people’s right and national security, and trying to leverage on new technology to detect potential national threats without hurting people’s privacy. However, there's a blurred line between privacy violation and government surveillance. (Sánchez, Levin & Del, 2012) It would be a learning process for governments to seek an optimum balance between retain integrity of privacy right and eliminate national threats in order to make the country better.
Judson, Olivia. (2008). Sticky fingers: fingerprints are one of the oldest biometric measures of identity. What do we actually know about them? Natural History. 117.10. p16.
Tomescu, Madalina, and Liliana Trofin. "Identity, Security and Privacy in the Information Society." Contemporary readings in law and social justice 2.2 (2010): 307-12. Print.
Wearing The Identity Badges With Photographs Sanctuary or Security is such an issue, which comes first in any kind of business; whether the business is small or vast or whether it is online or offline. There can be many kinds of threats that force the organization to obtain some security services. That again depends on the nature of business. In a memorandum from the director of a security and safety consulting service, the Security Company has analyzed that besides their security measures, they found out the wearing the identity badges with photographs is a very effective method in order to prevent any mishap in the organization. In personal identity the concern has been to determine whether anything in the body or mind remains constant; philosophers have reached no general agreement on this point. The term identity has also become increasingly important in modern psychology, largely through the work of Erik Erikson. He has used the term to designate a sense of self that develops in the course of a man's life and that both relates him to and sets him apart from his social milieu. Wearing Photo Identification Badges cards by all the employees is indeed an effective way of tracing if any stranger or outsider is moving or roaming or spying inside the organization. It is being observed that there can be many security measures that cause a feeling of discomfort in the employees. For example, the security guards; their all the time presence may annoy a person no matter if he is standing outside the room just to observe who s coming in and who s going out. Even it’s difficult to manage the videotapes for a long span of time. There are many companies and offices, which adapted this way of security that they put on camera in different ar...
Biometric technology is used for the ways humans can be identified by unique aspects of their bodies, such as fingerprints, body odor, our voices and many more. If one was to think about privacy rights, he/she would be concerned about the widespread adoption of these systems, since such systems could easily be used to develop a record of known rebellious people and/or dangerous criminals, to be used for social control purposes. Although that may seem pretty good and a positive thing for the society, one should take into account of the defects and errors of technology. Of the many biometrics technologies that are being developed and are already developed, facial recognition is one of the most threatening because it can be deployed secretly; one may not know whether or when they can be caught in a surveillance camera for such facial recognition biometrics. Additionally, tests have found that the miscalculations for facial biometrics technologies are very high. As a result, according to Privacy Rights Clearinghouse, innocent people can be erroneously identified as dangerous criminals and actual dangerous criminals and/or suspected terrorists can fail to be detected overall, allowing for a huge injustice and unfairness. Privacy rights concerned with biometrics have sparked a concern and should be dealt with; otherwise, this is just one of the
The purpose of biometrics is to identify a person based on the measure of his anatomical and physiological characteristics. This concept is not new, its history dates back to 14th century when Chinese used footprints to identify newborns and divorce records. In the 1880s, Henry Faulds, William Herschel and Francis Galton were the first who conceived the idea of using biometric identification to guaranty the security in civil areas, like using footprints for criminal identification and fingerprinting t...