Hiding Behind the Keyboard 2016
DOI: 10.1016/b978-0-12-803340-1.00009-4
|View full text |Cite
|
Sign up to set email alerts
|

Digital Identity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Biometric identity verification relies on immutable physical or behavioral attributes unique to each individual and is considered unalterable. Governments and security systems employ biometrics as a robust method of personal identification for this reason [14]. It is crucial to acknowledge that data gathered from sensors measuring an athlete's physiological responses do not inherently possess the same uniqueness or distinctiveness characteristic of biometric data.…”
Section: Physiological Sensorsmentioning
confidence: 99%
“…Biometric identity verification relies on immutable physical or behavioral attributes unique to each individual and is considered unalterable. Governments and security systems employ biometrics as a robust method of personal identification for this reason [14]. It is crucial to acknowledge that data gathered from sensors measuring an athlete's physiological responses do not inherently possess the same uniqueness or distinctiveness characteristic of biometric data.…”
Section: Physiological Sensorsmentioning
confidence: 99%
“…However, an entity may have several identities in one or different domains of application. Through a set of attributes such as date of birth, gender, phone number, account number, and so on, a particular person can be safely distinguished within an identity context [4].…”
mentioning
confidence: 99%