Perceptions of Privacy and the Consequences of Apathy: Biometrics in the 21st Century

Authors

  • Suzanne van den Hoogen

DOI:

https://doi.org/10.5931/djim.v5i1.54

Keywords:

Privacy, Biometrics

Abstract

 

Privacy, long considered one of our most valuable rights, is at risk. Younger generations are increasingly becoming de-sensitized to the disclosure of their personal and confidential information. With little or no contemplation, this information is bartered in exchange for the conveniences and luxuries that today’s technologies offer. Moreover, recent developments in the field of biometrics have created unprecedented opportunities for organizations to observe, gather, and share our personal information. This paper explores the evolution of biometrics, the benefits and challenges of this technology, and the potential threat it poses to future generations.

References

Ashbourn, J. (2005, January). The social implications of the wide scale implementation of biometric and related technologies. Retrieved November 10, 2008 from http://cybersecurity.jrc.ec.europa.eu/docs/LIBE%20Biometrics%20March%2005/SocialImplications_Ashbourn.pdf<br /> <br /> Brown, P. (2008, August 18). Privacy in an age of terabytes and terror. Scientific American. Retrieved November 23, 2008 from http://www.sciam.com/article.cfm?id=privacy-in-an- age<br /> <br /> Canadian Internet Policy and Public Interest Clinic (CIPPIC). (2007, June 2). Biometrics. Retrieved November 21, 2008 from http://www.cippic.ca/biometrics<br /> <br /> Clarke, R. (2001, April 15). Biometrics and privacy. Retrieved November 10, 2008 from http://www.anu.edu.au/people/Roger.Clarke/DV/Biometrics.html<br /> <br /> Crampton, J. (2007, July). The biopolitical justification for geosurveillance. Geographical Review, 97(3), 389-403.<br /> <br /> Crews Jr., C. (2003, July). Monitoring biometric technologies in a free society. USA Today Magazine, 132(2698), 16-18.<br /> <br /> Fixmer, R. (2001, October 1) Getting to know you. Interactive Week, 8(38), 6.<br /> <br /> Freeman, E. (2003, July/August). Biometrics, evidence, and personal privacy. Information Security Journal, 12(3), 4-8.<br /> <a href="http://dx.doi.org/10.1201/1086/43327.12.3.20030701/43621.2" target="_blank">http://dx.doi.org/10.1201/1086/43327.12.3.20030701/43621.2</a><br /> <br /> Gibb, F. (2008, October 21). DPP chief Sir Ken Macdonald attacks Big Brother state surveillance. Times Online. Retrieved from http://www.timesonline.co.uk/tol/news/uk/article4984788.ece<br /> <br /> Howitt, M. (1829). The spider and the fly. Retrieved on November 23, 2008 from http://www.love-poems.me.uk/howitt_the_spider_and_the_fly_funny.htm<br /> <br /> Jain, A., Hong, L. &amp; Pankanti, S. (2000, February). Biometric identification. Communications of the ACM, 43(2), 91-98.<br /> <a href="http://dx.doi.org/10.1145/328236.328110" target="_blank">http://dx.doi.org/10.1145/328236.328110</a><br /> <br /> Magi, T. (2007). The gap between theory and practice: A study of the prevalence and strength of patron confidentiality policies in public and academic libraries. Library Perceptions of Privacy and the Consequences of Apathy 14 and Information Science Research, 29(4), 455-470.<br /> <br /> National Science and Technology Council (NSTC). (2006, August 7). Biometrics history. Retrieved November 10, 2008 from http://www.biometrics.gov/Documents/BioHistory.pdf<br /> <br /> O&rsquo;Harrow, R. (2006). No place to hide. New York: Free Press.<br /> <br /> Osborn, A. (2005, August 17). Biometrics history: Looking at biometric technologies from the past to the present. Video Surveillance Guide. Retrieved November 10, 2008 from http://www.video-surveillance-guide.com/biometrics-history.htm<br /> <br /> Schenker, J. (2008, September 22). Point-of-sale advertising goes high tech; New in-store digital ads are using the latest technology to target messages to individual buyers, boosting sales and even helping to manage inventory. Business Week Online. Retrieved February 19, 2008 from http://www.businessweek.com/globalbiz/content/sep2008/gb20080922_109810.htm<br /> <br /> Stein, N. (2004, June 28). The fruits of safety Accenture's $10 billion contract marks a water-shed: The homeland-security market has hit the big time. Stand by for much, much more. Fortune. Retrieved November 19, 2008 from http://money.cnn.com/magazines/fortune/fortune_archive/2004/06/28/374384/index.htm<br /> <br /> van der Ploeg, I. (2003). Biometrics and privacy: A note on the politics of theorizing technology. Information Communications &amp; Society, 6(1), 85-104.<br /> <a href="http://dx.doi.org/10.1080/1369118032000068741" target="_blank">http://dx.doi.org/10.1080/1369118032000068741</a><br /> <br /> Woodward, J., Orlans, N. &amp; Higgins, P. (2003). Biometrics: Identity assurance in the information age. Berkley: McGraw Hill Osborne.<br />

Downloads

Issue

Section

Articles