Working Party on Information Security and Privacy

نویسنده

  • English-Or English
چکیده

This report is intended to provide an understanding of the benefits and limitations of biometric-based technologies. It also includes information on existing privacy and security methodologies for assessing biometrics. It has been revised to take into account comments received from delegates following the October 2003 WPISP meeting in Oslo. The report has also been updated in a few areas. The report was prepared by Peter Hope-Tindall, Director and Chief Privacy Architect, dataPrivacy partners, a consultant to the OECD, under the supervision of the secretariat. Delegates are invited to submit their comments to the Secretariat by 27 February 2004 after which time, as agreed at the WPISP Oslo meeting, the document will be submitted to the ICCP Committee for declassification at its next meeting on 1-2 April 2004. 1. This report provides a general introduction to biometric technologies. It also discusses the various concerns raised by these technologies, with a focus on privacy and information security. 2. There is currently considerable interest and activity associated with the use of biometrics in many different areas such as banking, education and other public services as well as in the travel security context. Further biometric-based technologies hold the opportunity to identify individuals in remote network environments and through varied modalities of communications. Also the biometric industry has experienced substantial growth in the recent past and is expected to experience even more growth in the next five years. A number of biometric standards have been or are being developed to support the industry and the technology. World events and the search for a technological solution to the security problems that many have identified have increased the interest in biometric-based technologies and the biometric industry in general. 3. The world of biometric-based technologies brings with it new terms and concepts, an understanding of which is important to an informed discussion of the subject matter. The report introduces the following major biometric-based technologies:finger-scanning, hand geometry, facial recognition, iris scanning, retinal scanning, finger geometry, voice recognition and dynamic signature verification. A brief description of other, more obscure biometric-based technologies such as ear geometry, body odour measurement, keystroke dynamics and gait recognition is also provided. DNA-based technology, which is not strictly a biometric, but raises many of the same concerns as biometrics, is addressed in an annex. 4. All biometric systems operate in essentially the same manner. They capture a biometric sample, perform feature extraction or dataset creation and …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

A Sudy on Information Privacy Issue on Social Networks

In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...

متن کامل

تأثیر حریم خصوصی، امنیت و اعتماد ادراک شده بر رفتار به اشتراک‌گذاری اطلاعات در شبکه‌های اجتماعی موبایل: نقش تعدیل‌کننده متغیر جنسیت

The appearance of social networks has been one of the most important events in recent decades. One of the issues raised in these networks, is how to trust. The purpose of this paper is to examine the impact of security, trust and privacy about information sharing on mobile social networks. The study also describes how users' gender moderates the privacy and security impact on trust. The current...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004