2006
DOI: 10.1016/j.clsr.2006.03.007
|View full text |Cite
|
Sign up to set email alerts
|

An assessment model for the use of biometrics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Using one's face as a payment MORIUCHI | 1743 method extends the complexity of security and risk as it is more than just identification. Furthermore, Grijpink (2006) argued that there is no biometric system that offers complete security. Thus, biometric systems have the potential to serve as a threat or benefit toward privacy and security, which leads to potential privacy risks or protection.…”
Section: Utautmentioning
confidence: 99%
“…Using one's face as a payment MORIUCHI | 1743 method extends the complexity of security and risk as it is more than just identification. Furthermore, Grijpink (2006) argued that there is no biometric system that offers complete security. Thus, biometric systems have the potential to serve as a threat or benefit toward privacy and security, which leads to potential privacy risks or protection.…”
Section: Utautmentioning
confidence: 99%
“…According to Uludag et al [82], the security issues regarding biometric implementations are much more complex than with any other IT system. Although no biometric system offers complete security [35], studies indicate that high-priced systems, such as iris scanners, are more effective and less likely to make false identifications than cheaper systems like signature dynamics [79]. As a range of technologies which identify the individual, either accurately or inaccurately, and with or without their knowledge and consent, biometric identification systems have potential to both enhance and threaten privacy and it is the security of the whole system which leads to potential privacy risks or protection.…”
Section: The Biometric Identification Systemsmentioning
confidence: 99%
“…The model is presented to avoid creating obstacles when new technology is applied to solving existing problems. It is not clear whether such a model could be usefully applied to a wider set of biometric-based deployments, apart from the biometric passport example that Grijpink (2006) has discussed briefly.…”
Section: Rest Of This Papermentioning
confidence: 96%
“…Schouten and Jacobs (2009) present an evaluation of the Netherlands' proposed implementation of a biometric passport, largely focusing on technical aspects of specific biometric technologies (such as face and fingerprint recognition) but also making reference to international agreements and standards (such as ICAO and the EU's ''Extended Access Control'') and discussing the privacy issue in terms of traditional security concepts such as confidentiality. Grijpink (2006) presents an assessment model for the use of biometrics which conceptualises new technology, biometrics in this case, as a spoiler if applied to a problem from an administrative perspective rather than an informant if applied from a judicial perspective. The model is presented to avoid creating obstacles when new technology is applied to solving existing problems.…”
Section: Rest Of This Papermentioning
confidence: 99%