Kyriazanos et al., 2019 - Google Patents
Automated decision making in airport checkpoints: Bias detection toward smarter security and fairnessKyriazanos et al., 2019
- Document ID
- 4209533690408211883
- Author
- Kyriazanos D
- Thanos K
- Thomopoulos S
- Publication year
- Publication venue
- IEEE Security & Privacy
External Links
Snippet
Automated decision making emerges as the enabler for risk-based and smarter security. However, ethics, privacy, and the General Data Protection Regulation (GDPR) provide a very challenging setting along with monitoring fairness and bias detection when applying …
- 238000001514 detection method 0 title abstract description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00103—Access-control involving the use of a pass with central registration and control, e.g. for swimming pools or hotel-rooms, generally in combination with a pass-dispensing system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C11/00—Arrangements, systems, or apparatus for checking, e.g. the occurrence of a condition, not provided for elsewhere
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fountain | The moon, the ghetto and artificial intelligence: Reducing systemic racism in computational algorithms | |
Molnar | Technology on the margins: AI and global migration management from a human rights perspective | |
Henman | Improving public services using artificial intelligence: possibilities, pitfalls, governance | |
Kosta | Algorithmic state surveillance: Challenging the notion of agency in human rights | |
Kyriazanos et al. | Automated decision making in airport checkpoints: Bias detection toward smarter security and fairness | |
Moraes et al. | Smile, you are being identified! Risks and measures for the use of facial recognition in (semi-) public spaces | |
Eastwood et al. | Biometric-enabled authentication machines: A survey of open-set real-world applications | |
Završnik | Big data: What is it and why does it matter for crime and social control? | |
Jasmontaite-Zaniewicz et al. | Disproportionate Surveillance: Technology-Assisted and Automated Decisions in Asylum Applications in the EU? | |
Forster et al. | Refugee protection in the artificial intelligence era | |
Satish et al. | A systematic review of passenger profiling in airport security system: Taking a potential case study of CAPPS II | |
Kgoale | An Analysis of International and European Union Legal Instruments for Holding Artificial Intelligence Accountable | |
Kavoliūnaitė-Ragauskienė | Right to Privacy and Data Protection Concerns Raised by the Development and Usage of Face Recognition Technologies in the European Union | |
Veltmeijer et al. | Legal and ethical implications of AI-based crowd analysis: the AI Act and beyond | |
Lai et al. | Post-pandemic follow-up audit of security checkpoints | |
Punia et al. | Ethical considerations and legal frameworks for biometric surveillance systems: the intersection of AI, soft biometrics, and human surveillance | |
Horkay et al. | Opportunities for the Use of biometric technology in Air transport | |
Albu et al. | Three sides of the same coin: datafied transparency, biometric surveillance, and algorithmic governmentalities | |
Kyriazanos et al. | Risk Based Security and Automated Decision Making in Airport Checkpoints | |
Lynch et al. | Facial recognition technology: considerations for use in policing | |
Busch et al. | Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics | |
Lodge | Nameless and faceless: The role of biometrics in realising quantum (in) security and (un) accountability | |
Mustafa et al. | On facial recognition and fundamental rights in India: a law and technology perspective | |
Anny | Ethical and Legal Challenges of AI Decision-Making in Government and Law Enforcement | |
Eneman et al. | The Epistemic Politics of Biometric Border Control |