Biometric Security and Privacy – Annotated Bibliography Example

Download full paperFile format: .doc, available for editing

The paper "Biometric Security and Privacy"  is a delightful example of an annotated bibliography on information technology. Annotated Bibliography Heimo, Olli I., AnttiHakkala, and Kai K. Kimppa. "How to Abuse Biometric Passport Systems. " Journal of Information, Communication & Ethics in Society 10.2 (2012): 68-81. ProQuest. Web. 15 Mar. 2016. Summary The authors of the article clearly point out how biometric passport has technical as well as social problems as far as their use is concerned. And the reason behind this is that there are problems with the database used for the collections of the data because the data is used for different purposes other than the intended reasons.

The authors argue that the problems pose serious challenges and are likely to erode both the privacy and trust of the parties concerned. They suggest that the issue can be solved through the use of the best technological solutions instead of using methods that are lacking and are full of errors. Social implications can be brought forward for public dialogues and acknowledged by the public through the sharing of ideas. Generally, the article contributes to the comprehension of the problems with the current RFID/biometric passport implementation and points out possible solutions that can be employed. Wickins, Jeremy.

"The Ethics Of Biometrics: The Risk Of Social Exclusion From The Widespread Use Of Electronic Identification. " Science & Engineering Ethics 13.1 (2007): 45-54. Academic Search Complete. Web. 15 Mar. 2016. Summary The author points out that most people tend to assume that discussions about biotechnology are always something to do with the manipulation of biological processes. In his article, Wickins clarifies that the field of biometrics, (measurements of physical) is also biotechnology and can affect the lives of people at a faster rate compared to any other means.

The likelihood of social exclusion that is brought about by the use of biometric data for uses such as the production of identity cars has not been extensively explored. The writer is quick to point out that social exclusion is unethical because it unfairly discriminates against humanity. The paper looks at measures through which social exclusions can come about from the use of biometric data and suggests a model of balancing the interests of people so that it is analyzed whether the act is justified to run the risk of excluding some members of the society so that others can benefit on their behalf. Bayly, Duncan, et al.

"Fractional Biometrics: Safeguarding Privacy in Biometric Applications. " International Journal of Information Security 9.1 (2010): 69-82. ProQuest. Web. 15 Mar. 2016. Summary: The authors of the paper provide a biometric system solution known as ‘ masks’ . According to the article, this refers to a fraction of the biometric image of an individual before it is submitted. And the main aim is to reduce the possibility of cases of forgery and conspiracy.

The authors point out that a prototype system is made for the fingerprints biometric. It then tested in three various security scenarios. The articles clarify that the implementation of the fractional biometric system does not affect accuracy extensively. The authors provide theoretical security analysis on the entropy. The article clearly demonstrates that through masking above 50% of the features, a considerable mix of security is attained. There is also assured robustness as well as accuracy to warrant future studies. And when about 75% of the features are masked, the authors point out that the theoretical guessing entropy was 42bits.

On average, it was discovered that 5 authenticators colluded before the system was compromised. The article is, therefore, part of the solutions to the problems associated with biometric identifications.

References

Kumar, Narendira V.K.. & Srinivasan, B. Biometric Passport Validation Scheme using Radio Frequency Identification. I. J. Computer Networks and Information Security, (2013) 5, 30-39.

Schimke, S., Kiltz, s. Vielhauer, C. Security Analysis for Biometric Data in ID Documents. Retrieved on March 17, 2016 from < http://wwwiti.cs.uni- magdeburg.de/~kiltz/5681_48.pdf>

Bell, Colleen D. “Grey's Anatomy Goes South: Global Racism and Suspect Identities in the Colonial Present”. The Canadian Journal of Sociology / Cahiers canadiens de Sociologie 38.4 (2013): 465–486

Behrensen, Maren. "Identity as Convention: Biometric Passports and the Promise of Security." Journal of Information, Communication & Ethics in Society 12.1 (2014): 44-59. ProQuest. Web. 15 Mar. 2016.

Hendow, Maegan, AlinaCibea, and Albert Kraler. "Using Technology to Draw Borders: Fundamental Rights for the Smart Borders Initiative." Journal of Information, Communication & Ethics in Society 13.1 (2015): 39-57. ProQuest. Web. 15 Mar. 2016.

Bayly, Duncan, et al. "Fractional Biometrics: Safeguarding Privacy in Biometric Applications." International Journal of Information Security 9.1 (2010): 69-82. ProQuest. Web. 15 Mar. 2016.

Wickins, Jeremy. "The Ethics Of Biometrics: The Risk Of Social Exclusion From The Widespread Use Of Electronic Identification." Science & Engineering Ethics 13.1 (2007): 45-54. Academic Search Complete. Web. 15 Mar. 2016.

Heimo, Olli I., AnttiHakkala, and Kai K. Kimppa. "How to Abuse Biometric Passport Systems." Journal of Information, Communication & Ethics in Society 10.2 (2012): 68-81. ProQuest. Web. 15 Mar. 2016.

Download full paperFile format: .doc, available for editing
Contact Us