scispace - formally typeset
Journal ArticleDOI

Biometrics and identity fraud protection: Two barriers to realizing the benefits of biometrics – A chain perspective on biometrics, and identity fraud – Part II

J.H.A.M. Grijpink
- 01 Jan 2005 - 
- Vol. 21, Iss: 3, pp 249-256
TLDR
This article tentatively suggests key ideas for an overall biometrics strategy that could better resist identity fraud, including an identity fraud resistant use of biometric passports.
About
This article is published in Computer Law & Security Review.The article was published on 2005-01-01. It has received 9 citations till now. The article focuses on the topics: Identity fraud & Biometrics.

read more

Citations
More filters
Book ChapterDOI

Biometrics and the Challenge to Human Rights in Europe. Need for Regulation and Regulatory Distinctions

TL;DR: It is seen no good reason not to affirm that public or private controllers of data should not store raw data, not collect fingerprints, not store biometrics in a central database, or should encrypt biometric data used for processing.
Proceedings ArticleDOI

Systems Plan for Combating Identity Theft - A Theoretical Framework

TL;DR: In this paper, the roles of identity owner, issuer, checker, and protector are examined to provide a starting point for organizational and information systems design to combat identity fraud and theft.

Biometrics Technology: Understanding Dynamics Influencing Adoption for Control of Identification Deception Within Nigeria

TL;DR: In this article, the authors provided scholarly research about the factors that influenced the adoption of biometrics technology to reliably identify and verify individuals in Nigeria to control identity fraud, and the results indicated statistical correlation between adopt biometric technology and three other variables, ease of use, perceived usefulness, and awareness.
Book ChapterDOI

Biometrics, Privacy and Agency

TL;DR: In this paper, the authors identify the basic principles behind data protection law and show how these principles might affect the choice or even admissibility of the use of certain types of biometrics.
References
More filters
Journal Article

Chain‐computerisation for better privacy protection

TL;DR: In this article, the authors present a series of two articles in which the author presents some key elements from his recently completed thesis about functional, nonintrusive information infrastructures for interorganisational public policy implementation.