Journal ArticleDOI
Biometrics and identity fraud protection: Two barriers to realizing the benefits of biometrics – A chain perspective on biometrics, and identity fraud – Part II
TLDR
This article tentatively suggests key ideas for an overall biometrics strategy that could better resist identity fraud, including an identity fraud resistant use of biometric passports.About:
This article is published in Computer Law & Security Review.The article was published on 2005-01-01. It has received 9 citations till now. The article focuses on the topics: Identity fraud & Biometrics.read more
Citations
More filters
Book ChapterDOI
Biometrics and the Challenge to Human Rights in Europe. Need for Regulation and Regulatory Distinctions
Paul De Hert,Paul De Hert +1 more
TL;DR: It is seen no good reason not to affirm that public or private controllers of data should not store raw data, not collect fingerprints, not store biometrics in a central database, or should encrypt biometric data used for processing.
Proceedings ArticleDOI
Systems Plan for Combating Identity Theft - A Theoretical Framework
TL;DR: In this paper, the roles of identity owner, issuer, checker, and protector are examined to provide a starting point for organizational and information systems design to combat identity fraud and theft.
Biometrics Technology: Understanding Dynamics Influencing Adoption for Control of Identification Deception Within Nigeria
TL;DR: In this article, the authors provided scholarly research about the factors that influenced the adoption of biometrics technology to reliably identify and verify individuals in Nigeria to control identity fraud, and the results indicated statistical correlation between adopt biometric technology and three other variables, ease of use, perceived usefulness, and awareness.
Book ChapterDOI
Biometrics, Privacy and Agency
A.C.J. Sprokkereef,Paul De Hert +1 more
TL;DR: In this paper, the authors identify the basic principles behind data protection law and show how these principles might affect the choice or even admissibility of the use of certain types of biometrics.
References
More filters
Journal Article
Chain‐computerisation for better privacy protection
TL;DR: In this article, the authors present a series of two articles in which the author presents some key elements from his recently completed thesis about functional, nonintrusive information infrastructures for interorganisational public policy implementation.