scholarly journals Fingerprint analysis (AFIS) and biometric system of identification by fingerprints: issue of artificial papillary pictures

2021 ◽  
Vol 1 (3) ◽  
pp. 129-145
Author(s):  
Vitali Kirvel

The article discusses the theoretical and applied aspects, as well as prospects for the development of fingerprint examination, fingerprint records (automated fingerprint identification systems-AFIS) in the disclosure and uncovering of crimes, as well as biometric identification systems by fingerprints to protect personal data, control access to corporate and personal information, time tracking in the information sector of the economy. The paper presents methods form an ufacturing models with artificial papillary patterns (falsification of papillary patterns of fingerprints), the results of experiments that consisted in creating a model (dummy) of the nail phalanx of the finger with an artificial papillary pattern and verification of a biometric scanner using biometric technologies.

2021 ◽  
Vol 2021 (2) ◽  
pp. 88-110
Author(s):  
Duc Bui ◽  
Kang G. Shin ◽  
Jong-Min Choi ◽  
Junbum Shin

Abstract Privacy policies are documents required by law and regulations that notify users of the collection, use, and sharing of their personal information on services or applications. While the extraction of personal data objects and their usage thereon is one of the fundamental steps in their automated analysis, it remains challenging due to the complex policy statements written in legal (vague) language. Prior work is limited by small/generated datasets and manually created rules. We formulate the extraction of fine-grained personal data phrases and the corresponding data collection or sharing practices as a sequence-labeling problem that can be solved by an entity-recognition model. We create a large dataset with 4.1k sentences (97k tokens) and 2.6k annotated fine-grained data practices from 30 real-world privacy policies to train and evaluate neural networks. We present a fully automated system, called PI-Extract, which accurately extracts privacy practices by a neural model and outperforms, by a large margin, strong rule-based baselines. We conduct a user study on the effects of data practice annotation which highlights and describes the data practices extracted by PI-Extract to help users better understand privacy-policy documents. Our experimental evaluation results show that the annotation significantly improves the users’ reading comprehension of policy texts, as indicated by a 26.6% increase in the average total reading score.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Heather J. Parker ◽  
Stephen Flowerday

Purpose Social media has created a new level of interconnected communication. However, the use of online platforms brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Design/methodology/approach Fourteen university students participated in a mixed-methods experiment, where responses to Likert-type scale items were combined with responses to interview questions to provide insight into the cost–benefit analysis users conduct when disclosing information online. Findings Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by fear of missing out (FOMO) further allows users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Originality/value This study provides insight into privacy and information disclosure on social media in South Africa. To the knowledge of the researchers, this is the first study to include a combination of the theory of planned behaviour and the privacy calculus model, together with the antecedent factors of personal valuation of information, trust in the social media provider, FOMO.


Author(s):  
Sami M. Fawzy ◽  
Tarek M. Esmael ◽  
Hany Hosny ◽  
Abdulmajeed Al Amri ◽  
Khalid Al Malki ◽  
...  

Progress in deciding the opinion of head-teachers on the instructional and logistical characteristics needed for a fundamental cardiopulmonary resuscitation (b-CPR) program for adolescents in secondary school. The purpose of the thesis is to explore the level of educators' preparation to cope with life-threatening circumstances. This paper aims to determine the connection between the score of the instructor to the questions drawn up and their knowledge of BSL. And we have studied the participants' student conduct without any impact on their behaviour. Teachers from chosen primary schools are the partners. There will also be a record of population characteristics. There will be registered personal data and documents. Some of the information involves the compilation of gender, gender, degree of education and weight data using survey questions. A high degree of secrecy would be ensured through this study. In addition, all information from the participants will be collected voluntarily. The educators would be allowed to have an answer to all the questions. The primary aim of the research is to raise awareness of the importance of critical support for life in schools. At the beginning of each academic year, this study is proposed to create a compulsory training session for teachers, and the outcome is gathered using survey questions to produce using personal information and data such as sex, gender, level of education and weight details.


2017 ◽  
Vol 6 (1) ◽  
pp. 1-8
Author(s):  
Jorida Xhafaj ◽  
Almarin Frakulli

The main object of this paper is the tender balance that exists and arises even more between the use of personal information that people provide in the course of most public security actions and privacy. This study analyze the most famous and strong related decision of the European Court of Human Rights, with the aim to give our opinion how has to be understand the barrier between the power of individuals over information and the power of public institutions to guaranties security. The protection of personal data is of fundamental importance to a person’s enjoyment of his or her right to respect for private and family life, and how law allocates power over information in different countries, will give us the possibility to define the most important criteria’s which define the existence of abuse or not over personal data and information.


2019 ◽  
Author(s):  
Vaclav Janecek

This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, the article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates.


Author(s):  
Anna Rohunen ◽  
Jouni Markkula

Personal data is increasingly collected with the support of rapidly advancing information and communication technology, which raises privacy concerns among data subjects. In order to address these concerns and offer the full benefits of personal data intensive services to the public, service providers need to understand how to evaluate privacy concerns in evolving service contexts. By analyzing the earlier used privacy concerns evaluation instruments, we can learn how to adapt them to new contexts. In this article, the historical development of the most widely used privacy concerns evaluation instruments is presented and analyzed regarding privacy concerns' dimensions. Privacy concerns' core dimensions, and the types of context dependent dimensions, to be incorporated into evaluation instruments are identified. Following this, recommendations on how to utilize the existing evaluation instruments are given, as well as suggestions for future research dealing with validation and standardization of the instruments.


2017 ◽  
Vol 17 (1) ◽  
pp. 45
Author(s):  
Endre Győző Szabó ◽  
Balázs Révész

A magánélet és a biztonság népszerű ellentétpárként tűnhet fel az adatvédelmi gondolkodásban. Leegyszerűsítve olvashatjuk sokszor, hogy ha bizonyos feltételek hiányoznak, aránytalanul nagy áldozatot hozhatunk a személyes magánszféra, a privacy oldalán a biztonság érdekében, és magánszféránk túlzott feláldozása a biztonság oltárán visszafordíthatatlan folyamathoz és orwelli világhoz vezet. Más, a biztonság szempontjait mindenek felettinek hirdető érvelésben viszont a személyes adatok védelmére való hivatkozást alkotmányjogi bűvészkedésnek csúfolják és igyekeznek kisebbíteni a magánszféra-védelem egyébként méltányolandó értékeit. A magánélet és a személyes adatok védelmének pedig nagy a tétje, az adatok illetéktelenek részére való kiszolgáltatása, rosszhiszemű felhasználása egzisztenciákat, családokat tehet tönkre, boldogulási lehetőségeket hiúsíthat meg, ha a védelem alacsony szintre süllyed. Másrészről pedig az információszerzés, illetve előzetes adatgyűjtés a különböző bűnelkövetések, terrorcselekmények előkészületi cselekményei is egyben. Azzal, ha a személyes adataink, magánszféránk védelmében ésszerű lépéseket teszünk, élünk a jog és a technológia adta védelmi lehetőségekkel, adatainkat nemcsak az államtól és a piaci szereplőktől, de a bűnözőktől is elzárjuk, és ezzel mindannyiunk biztonságát szolgáljuk. Egy terület tehát biztosan létezik, ahol a biztonság és magánszféra mezsgyéje összeér: az adatbiztonságé és ezzel összefüggésben a tudatos, felelős felhasználói attitűdé, aminek azonban sokszor az emberi tényező a gátja. Jelen tanulmányban a magánszféra és biztonság kérdéskörének komplexitásáról szólunk, és közös nevezőt keresünk az adatkezelések nézőpontjából, kitérve az új adatvédelmi rendelet (GDPR) magánszféránkat és biztonságunkat egyaránt szolgáló leendő jogintézményeinek bemutatására is. --- Data in security – security in our data? Privacy and security may be deemed as a popular dichotomy. It is often argued that even if security is vital, we might sacrifice too much of our privacy in return. This may be irreversible when it comes to the intrusiveness of surveillance. On the other hand, it is also sometimes argued that the importance of personal data protection deserves less attention than security. There is much at stake when it comes to privacy and the protection of personal data. Misuse of personal information may damage families’ lives and ruin people’s livelihoods, thus this may all have significant repercussions for society as a whole – this is the price to be paid if protection is at a low level. Using sophisticated measures that technology and legal regulations can provide, privacy can be protected. Data security is a common field for the protection of privacy and security – crucial for both endeavours to make people’s lives better. This essay describes the complexity of issues related to privacy and security, while also taking new legislation of the European Union into account.


Author(s):  
Anastasia Kozyreva ◽  
Philipp Lorenz-Spreen ◽  
Ralph Hertwig ◽  
Stephan Lewandowsky ◽  
Stefan M. Herzog

AbstractPeople rely on data-driven AI technologies nearly every time they go online, whether they are shopping, scrolling through news feeds, or looking for entertainment. Yet despite their ubiquity, personalization algorithms and the associated large-scale collection of personal data have largely escaped public scrutiny. Policy makers who wish to introduce regulations that respect people’s attitudes towards privacy and algorithmic personalization on the Internet would greatly benefit from knowing how people perceive personalization and personal data collection. To contribute to an empirical foundation for this knowledge, we surveyed public attitudes towards key aspects of algorithmic personalization and people’s data privacy concerns and behavior using representative online samples in Germany (N = 1065), Great Britain (N = 1092), and the United States (N = 1059). Our findings show that people object to the collection and use of sensitive personal information and to the personalization of political campaigning and, in Germany and Great Britain, to the personalization of news sources. Encouragingly, attitudes are independent of political preferences: People across the political spectrum share the same concerns about their data privacy and show similar levels of acceptance regarding personalized digital services and the use of private data for personalization. We also found an acceptability gap: People are more accepting of personalized services than of the collection of personal data and information required for these services. A large majority of respondents rated, on average, personalized services as more acceptable than the collection of personal information or data. The acceptability gap can be observed at both the aggregate and the individual level. Across countries, between 64% and 75% of respondents showed an acceptability gap. Our findings suggest a need for transparent algorithmic personalization that minimizes use of personal data, respects people’s preferences on personalization, is easy to adjust, and does not extend to political advertising.


2019 ◽  
Vol 35 (3) ◽  
Author(s):  
Tanja Sobko ◽  
Gavin Brown

Activity trackers (ATs) equipped with biometric sensors may support deep knowledge acquisition of health and active learning. The mechanism may be via personal data being pushed to the students, which deepens the knowledge about their own health and may impact long-term health action processes. To understand health knowledge acquisition, 43 students attending an undergraduate university course were equipped with an AT over a period of five months. Weekly observation on emerging personal data and consequent actions (lifestyle adaptations) were reflected in an individual course-related ePortfolio. Students’ change in health action process was assessed using a short standard eHealth literacy scale at the beginning and end of the course. The usability of ePortfolio tool was tested with two previously validated scales. The combination of personal information from an AT and ePortfolio may have enhanced students’ critical assessment of health-related personal and available digital information. eHealth literacy scores significantly increased by the end of the course (p < .01). The ePortfolio helped with learning, and the usability of the ePortfolio did not really interfere. The combination of AT and ePortfolio constitutes a novel and productive method of using ePortfolios in higher education in regards to eHealth literacy acquisition.


Sign in / Sign up

Export Citation Format

Share Document