Presley, 2021 - Google Patents
Face the Facts: Canada's Approach to Privacy and Accuracy Issues in Facial Recognition TechnologyPresley, 2021
View PDF- Document ID
- 5912951106378390163
- Author
- Presley L
- Publication year
- Publication venue
- Carleton Perspectives on Public Policy
External Links
Snippet
Facial recognition technology (FRT) is a tool employed by both public and private actors, with uses ranging from personalized marketing to security. However, FRT's negative reputation for accuracy issues and potential privacy invasion has created cause for concern …
- 238000005516 engineering process 0 title abstract description 39
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Miller et al. | Representative bureaucracy and attitudes toward automated decision making | |
Wang et al. | Beyond surveillance: privacy, ethics, and regulations in face recognition technology | |
Christen et al. | Linking sensitive data | |
Sontowski | Speed, timing and duration: Contested temporalities, techno-political controversies and the emergence of the EU’s smart border | |
Baert et al. | Labour market discrimination against former juvenile delinquents: Evidence from a field experiment | |
Moraes et al. | Smile, you are being identified! Risks and measures for the use of facial recognition in (semi-) public spaces | |
Radiya-Dixit et al. | A sociotechnical audit: Assessing police use of facial recognition | |
Zalnieriute | Burning bridges: the automated facial recognition technology and public space surveillance in the modern state | |
Concepción Jr | Need not apply: The racial disparate impact of pre-employment criminal background checks | |
van Hoboken et al. | Regulating disinformation in Europe: Implications for speech and privacy | |
Leasure et al. | Women, criminal records, and certificates of relief: An experimental study | |
Chan | Towards a calibrated trust-based approach to the use of facial recognition technology | |
CHA | Beating biometric bias | |
Kavoliūnaitė-Ragauskienė | Right to Privacy and Data Protection Concerns Raised by the Development and Usage of Face Recognition Technologies in the European Union | |
Aziz | Justice in the Age of Artificial Intelligence: A Comparative Study of the Legal Framework for Forensic Evidence in Saudi Arabia and Global Practices | |
Martin | Facial Recognition in Law Enforcement | |
Ruhrmann | Facing the future: protecting human rights in policy strategies for facial recognition technology in law enforcement | |
Erdos | Statutory regulation of professional journalism under European data protection: Down but not out? | |
Presley | Face the Facts: Canada’s Approach to Privacy and Accuracy Issues in Facial Recognition Technology | |
Brown et al. | Chimes of Freedom Flashing: For Each Unharmful Gentle Soul Misplaced Inside a Jail | |
Brown et al. | Voicing concerns: the balance between data protection principles and research developments in forensic speech science | |
Hickok et al. | Facial Recognition Technology in India | |
Gottschalk et al. | White-Collar Crime Detection | |
Wong et al. | Examining recidivism among foreign-born jail inmates: does immigration status make a difference over the long term? | |
Galang et al. | Philippine Social Security System: An Evaluation Of Strategic Approach To Digital Services |