[go: up one dir, main page]

Presley, 2021 - Google Patents

Face the Facts: Canada's Approach to Privacy and Accuracy Issues in Facial Recognition Technology

Presley, 2021

View PDF
Document ID
5912951106378390163
Author
Presley L
Publication year
Publication venue
Carleton Perspectives on Public Policy

External Links

Snippet

Facial recognition technology (FRT) is a tool employed by both public and private actors, with uses ranging from personalized marketing to security. However, FRT's negative reputation for accuracy issues and potential privacy invasion has created cause for concern …
Continue reading at ojs.library.carleton.ca (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Similar Documents

Publication Publication Date Title
Miller et al. Representative bureaucracy and attitudes toward automated decision making
Wang et al. Beyond surveillance: privacy, ethics, and regulations in face recognition technology
Christen et al. Linking sensitive data
Sontowski Speed, timing and duration: Contested temporalities, techno-political controversies and the emergence of the EU’s smart border
Baert et al. Labour market discrimination against former juvenile delinquents: Evidence from a field experiment
Moraes et al. Smile, you are being identified! Risks and measures for the use of facial recognition in (semi-) public spaces
Radiya-Dixit et al. A sociotechnical audit: Assessing police use of facial recognition
Zalnieriute Burning bridges: the automated facial recognition technology and public space surveillance in the modern state
Concepción Jr Need not apply: The racial disparate impact of pre-employment criminal background checks
van Hoboken et al. Regulating disinformation in Europe: Implications for speech and privacy
Leasure et al. Women, criminal records, and certificates of relief: An experimental study
Chan Towards a calibrated trust-based approach to the use of facial recognition technology
CHA Beating biometric bias
Kavoliūnaitė-Ragauskienė Right to Privacy and Data Protection Concerns Raised by the Development and Usage of Face Recognition Technologies in the European Union
Aziz Justice in the Age of Artificial Intelligence: A Comparative Study of the Legal Framework for Forensic Evidence in Saudi Arabia and Global Practices
Martin Facial Recognition in Law Enforcement
Ruhrmann Facing the future: protecting human rights in policy strategies for facial recognition technology in law enforcement
Erdos Statutory regulation of professional journalism under European data protection: Down but not out?
Presley Face the Facts: Canada’s Approach to Privacy and Accuracy Issues in Facial Recognition Technology
Brown et al. Chimes of Freedom Flashing: For Each Unharmful Gentle Soul Misplaced Inside a Jail
Brown et al. Voicing concerns: the balance between data protection principles and research developments in forensic speech science
Hickok et al. Facial Recognition Technology in India
Gottschalk et al. White-Collar Crime Detection
Wong et al. Examining recidivism among foreign-born jail inmates: does immigration status make a difference over the long term?
Galang et al. Philippine Social Security System: An Evaluation Of Strategic Approach To Digital Services