scholarly journals ‘ETHICAL BIOMETRICS’ AND THE FACE OF THE CHILD: THE SURVEILLANCE OF CHILDREN WITHIN FACIAL RECOGNITION INDUSTRY DISCOURSE

Author(s):  
Christopher Allan O'Neill ◽  
Mark Andrejevic ◽  
Neil Selwyn ◽  
Xin Gu ◽  
Gavin Smith

In this paper we analyse data gathered through facial recognition tradeshow ethnographies and interviews with members of the biometrics industry, as we consider recent shifts in industry discourse towards promoting the ‘ethical’ use of biometric technology. As the biometrics industry increasingly moves towards a ‘Video Surveillance as a Service’ (VSaaS) model, the study of facial recognition infrastructures is becoming a crucial aspect of the interrogation of the Internet of Things. We demonstrate that the facial recognition industry is acutely aware of critiques of facial recognition cameras and biometric technologies as enabling social harms related to intrusiveness and bias (see Stark, 2019), and that members of the industry are keen to promote a more prosocial public image of the technology. Towards this end we find that biometric monitoring of children has gained a prominent place in the promotion of facial recognition technologies as a mode of ‘careful’ surveillance. We identify three key ‘use cases’ in which the face of the child takes on a prominent role as justifying and legitimating the use of facial recognition technologies – in the auditing of humanitarian food supply programs, in the detection of so-called ‘staging’ of family units at the US border, and in the detection of underage gambling in Australia. We argue that the immanent ‘ethical’ framing of the child’s face in this context serves to obscure the political ramifications of the extension of facial recognition and of biometric surveillance tools more broadly.

2019 ◽  
Vol 6 (1) ◽  
pp. 47-63 ◽  
Author(s):  
Bettina Nissen ◽  
Ella Tallyn ◽  
Kate Symons

Abstract New digital technologies such as Blockchain and smart contracting are rapidly changing the face of value exchange, and present new opportunities and challenges for designers. Designers and data specialists are at the forefront of exploring new ways of exchanging value, using Blockchain, cryptocurrencies, smart contracting and the direct exchanges between things made possible by the Internet of Things (Tallyn et al. 2018; Pschetz et al. 2019). For researchers and designers in areas of Human Computer Interaction (HCI) and Interaction Design to better understand and explore the implications of these emerging and future technologies as Distributed Autonomous Organisations (DAOs) we delivered a workshop at the ACM conference Designing Interactive Systems (DIS) in Edinburgh in 2017 (Nissen et al. 2017). The workshop aimed to use the lens of DAOs to introduce the principle that products and services may soon be owned and managed collectively and not by one person or authority, thus challenging traditional concepts of ownership and power. This workshop builds on established HCI research exploring the role of technology in financial interactions and designing for the rapidly changing world of technology and value exchange (Kaye et al. 2014; Malmborg et al. 2015; Millen et al. 2015; Vines et al. 2014). Beyond this, the HCI community has started to explore these technologies beyond issues of finance, money and collaborative practice, focusing on the implications of these emerging but rapidly ascending distributed systems in more applied contexts (Elsden et al. 2018a). By bringing together designers and researchers with different experiences and knowledge of distributed systems, the aim of this workshop was two-fold. First, to further understand, develop and critique these new forms of distributed power and ownership and second, to practically explore how to design interactive products and services that enable, challenge or disrupt existing and emerging models.


2017 ◽  
Vol 9 (1) ◽  
pp. 57-75 ◽  
Author(s):  
Seppo Leminen ◽  
Mervi Rajahonka ◽  
Mika Westerlund

This study investigates actors in the ecosystems of the Internet of Things (IoT). Previous research suggests that unstructured ecosystems make one of the greatest challenges for creating business models for the IoT. The present study concludes four contributions. First, the study reviews literature to develop a framework for role mechanisms in ecosystems and applies the framework to analyse data from fifteen interviews in six cases. Second, it identifies four diverse actor roles in IoT ecosystems: butterfly, ant and greenfly, spider, and the swarm of bees. Third, the study shows how actors take and make different roles in four emerging IoT ecosystems; product-, company-, industry-, and peer to peer ecosystems, which are structured in accordance with the identified actors' role behavior. Fourth, it suggests a new role pattern, role replication, where companies replicate their value designs and networks to other contexts.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 183
Author(s):  
M Vamsi Krishna ◽  
A Bhargav Reddy ◽  
V Sandeep

To verify that our daily life is going in a secure way. Lot of research programmers are going on in this entire society. The turning point comes through the internet of things, industry has been emerged with the lots of elements provided from IOT. We can able to connect our daily life things or objects with this had successfully evolved lots of things.  This Facial recognition door unlock system is a process is which will detect the face and identifies the among people. People are having different types of face cut, in that particularly there are many unique faces which are different from each other which inspired us, from that concept this process has been established. Our main aim to create the smart door system to a house, that will secure the house and all your personal things at your home. In this concept of our system we have been used alive web camera in the front side of the door, along with the display monitor. this web camera shows the owner/particular viewer the whom the house is his control, this shows the person who stood front of the door, the system is setup the voice output is being processed by the processor that which is used to show the answers/instructions as the output on the screen. We are using a stepper motor that which is used to lock/open then the by sliding method, so that a normal person stand in front of the door and access it. This process is done through this Microsoft face API application. The display is being operated on a Microsoft Visual Studio application.


Author(s):  
H. El Fadili ◽  
T. Mazri

Abstract. The Internet of Things (IoT) has frequently been used by people as a way to facilitate their connection to all types of devices. Thanks to this technology, healthcare field can also benefit from a perfect interaction taking advantage of a better diagnostic and treatment that facilitate life for both patients and doctors. Unfortunately, and similarly to other domains based on technology, the smart healthcare does also use IT programs and wireless network to exchange and analyse data the fact that makes it highly exposed to malicious actions. Moreover, if a good security level is not provided in order to save patients information once hackers get access to the mentioned data, patients might be affected or even lose their lives. This paper presents an overview of the security issues in smart healthcare fields and gives a state of art of some well-known network attacks in the field of smart healthcare. We also propose an impact evaluation of those attacks by adopting four scales of evaluation ‘Minor’, ‘Significant’, ‘Serious’ and ‘Critical’ proposed by EBIOS Gravity assessment. The proposed evaluation is classified based on three criteria: sensor’s nature, application field and intervention time.


Compiler ◽  
2017 ◽  
Vol 6 (2) ◽  
Author(s):  
Haruno Sajati ◽  
Astika Ayuningtyas ◽  
Dwi Kholistyanto

One of the development of computer technology is the availability of systems or applications that help human work everyday so that can be resolved quickly and correctly. The system, one of which is Computer Based Test (CBT). CBT is an application used for tests conducted using computers that are in the application there are some features of CBT security when working on the problem. CBT can use a stand-alone computer, a computer connected to a network or a computer connected to the internet. Facial recognition is a type of biometric application that can identify specific individuals in a digital image by analyzing and developing face patterns. In its implementation, CBT has a weakness in the security system that becomes the gap of CBT users to commit fraud, therefore required a good security system with the creation of CBT applications that use eigenface algorithm. It is necessary to have a security system that overcomes the problem that is required identification of face recognition of participants during the test so that cheating can be reduced. The results of the test using eigenface algorithm accuracy rate reached 82%, some things that affect the level of accuracy is, the intensity of light, facial position and the use of accessories on the face.


2013 ◽  
Vol 38 (4) ◽  
pp. 465-486 ◽  
Author(s):  
Colleen D. Bell

Abstract. This article explores the biometric documentation of civilians by coalition forces in the battle zones of the “war on terror.” With the growth of population-centric operations, harvesting body data is a key dimension of efforts to divide the population between civilians and insurgents, and also serves as a general strategy of population management over life perceived to be potentially dangerous. This article examines how these dividing and governance tactics are part of a global racism that is manifest in North-South conflict. The racism that underpins biometric technology is reflected in the racial dynamic of Western-led counter-insurgency operations, in which the US and its allies expand control over southern populations. In so doing, the insecurity of said populations is deepened and the political dimensions of global inequality are accentuated.


2020 ◽  
pp. 1587-1607
Author(s):  
Seppo Leminen ◽  
Mervi Rajahonka ◽  
Mika Westerlund

This study investigates actors in the ecosystems of the Internet of Things (IoT). Previous research suggests that unstructured ecosystems make one of the greatest challenges for creating business models for the IoT. The present study concludes four contributions. First, the study reviews literature to develop a framework for role mechanisms in ecosystems and applies the framework to analyse data from fifteen interviews in six cases. Second, it identifies four diverse actor roles in IoT ecosystems: butterfly, ant and greenfly, spider, and the swarm of bees. Third, the study shows how actors take and make different roles in four emerging IoT ecosystems; product-, company-, industry-, and peer to peer ecosystems, which are structured in accordance with the identified actors' role behavior. Fourth, it suggests a new role pattern, role replication, where companies replicate their value designs and networks to other contexts.


2019 ◽  
Vol 8 (4) ◽  
pp. 6129-6134

Agriculture is our main economic occupation for ages. But agriculture is primarily limited by the migration of people from rural to urban. To solve this problem, we will use IoT to develop smart agriculture techniques. The Internet of Things (IoT) technological developments has created a revolution in every common field of life, intelligent and smart. IoT refers to a network of things that create their own network. The development of IoT-based Intelligent Smart Farming equipment turns the face of farm manufacturing every day not only into an improvement, it also makes it cost-efficient and reduces waste. The primary objective of the project is to make agriculture intelligent through automation and IoT.


2021 ◽  
Author(s):  
Juan Prieto-Rodriguez ◽  
Rafael Salas ◽  
Douglas Noonan ◽  
Francisco Tomas Cabeza-Martinez ◽  
Javier Ramos-Gutierrez

Covid-19 pandemic was a challenge for the health systems of many countries. It altered people's way of life and shocked the world economy. In the United States, political ideology has clashed with the fight against the pandemic. President Trump's denial prevailed despite the warnings from the WHO and scientists who alerted of the seriousness of the situation. Despite this, some state governments did not remain passive in the absence of federal government measures, and passed laws restricting mobility (lockdowns). Consequently, the political polarity was accentuated. On the one hand, the defenders of more severe public health measures and, on the other, the advocates of individual rights and freedom above any other consideration. In this study, we analyze whether political partisanship and the political ideology has influenced the way Covid-19 was handled at the outbreak. Specifically, we analyze by using a Diff-in-Diff model, whether the ideology of each state, measure at three levels, affected the decrease in the NO2 levels observed after the pandemic outbreak in the US. We distinguish three alternative post-Covid periods and results show that the State ideology has a robust negative impact on the NO2 levels. There is an important difference between Democratic and Republican states, not just in the scope and following-up of the mobility and activity restrictions, but also in the speed they implemented them.


Sign in / Sign up

Export Citation Format

Share Document