{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T21:06:30Z","timestamp":1775163990597,"version":"3.50.1"},"reference-count":71,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T00:00:00Z","timestamp":1544054400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s10676-018-9493-1","type":"journal-article","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T13:32:16Z","timestamp":1544103136000},"page":"127-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Reframing biometric surveillance: from a means of inspection to a form of control"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2813-6159","authenticated-orcid":false,"given":"Avi","family":"Marciano","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,6]]},"reference":[{"issue":"2","key":"9493_CR1","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1177\/1741659006065401","volume":"2","author":"KF Aas","year":"2006","unstructured":"Aas, K. F. (2006). \u2018The body does not lie\u2019: Identity, risk and trust in technoculture. Crime, Media, Culture, 2(2), 143\u2013158. https:\/\/doi.org\/10.1177\/1741659006065401 .","journal-title":"Crime, Media, Culture"},{"issue":"7","key":"9493_CR2","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1080\/13621025.2012.669962","volume":"16","author":"B Ajana","year":"2012","unstructured":"Ajana, B. (2012). Biometric citizenship. Citizenship Studies, 16(7), 851\u2013870. https:\/\/doi.org\/10.1080\/13621025.2012.669962 .","journal-title":"Citizenship Studies"},{"issue":"3","key":"9493_CR3","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1111\/j.1540-4560.1977.tb01883.x","volume":"33","author":"I Altman","year":"1977","unstructured":"Altman, I. (1977). Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, 33(3), 66\u201384. https:\/\/doi.org\/10.1111\/j.1540-4560.1977.tb01883.x .","journal-title":"Journal of Social Issues"},{"key":"9493_CR4","volume-title":"Modernity and ambivalence","author":"Z Bauman","year":"1993","unstructured":"Bauman, Z. (1993). Modernity and ambivalence. Cambridge: Polity."},{"issue":"2","key":"9493_CR5","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1093\/bjc\/40.2.205","volume":"40","author":"Z Bauman","year":"2000","unstructured":"Bauman, Z. (2000). Social issues of law and order. British Journal of Criminology, 40(2), 205\u2013221. https:\/\/doi.org\/10.1093\/bjc\/40.2.205 .","journal-title":"British Journal of Criminology"},{"issue":"1","key":"9493_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/1369118X.2016.1216147","volume":"20","author":"D Beer","year":"2017","unstructured":"Beer, D. (2017). The social power of algorithms. Information, Communication & Society, 20(1), 1\u201313. https:\/\/doi.org\/10.1080\/1369118X.2016.1216147 .","journal-title":"Information, Communication & Society"},{"key":"9493_CR7","unstructured":"Biometric System Market. Biometric System Market by Authentication Type (Single-Factor and Multifactor), Functionality Type (Contact, Non-Contact, and Combined), Component (Hardware and Software), Application, and Geography - Global Forecast to 2023. http:\/\/www.goo.gl\/y2Q9K6 ."},{"key":"9493_CR8","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMicm1409635","author":"Y Chavarri-Guerra","year":"2015","unstructured":"Chavarri-Guerra, Y., & Soto-Perez-de-Celis, E. (2015). Loss of fingerprints. New England Journal of Medicine. https:\/\/doi.org\/10.1056\/NEJMicm1409635 .","journal-title":"New England Journal of Medicine"},{"key":"9493_CR9","unstructured":"Davis, A. (1997). The body as password. Wired."},{"key":"9493_CR10","volume-title":"Privacy impact assessment for the Automated Biometric Identification System (IDENT)","year":"2012","unstructured":"DHS (2012). Privacy impact assessment for the Automated Biometric Identification System (IDENT). In U. S. D. O. H. Security (Ed.): San Francisco: The Electronic Frontier Foundation."},{"key":"9493_CR11","unstructured":"DRM (2017). Analysis of the pilot\u2019s summarizing reports of the biometric database management authority (4th\u00a0edition)."},{"issue":"1","key":"9493_CR12","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1080\/1369183032000076731","volume":"29","author":"K Erjavec","year":"2003","unstructured":"Erjavec, K. (2003). Media construction of identity through moral panics: Discourses of immigration in Slovenia. Journal of Ethnic and Migration Studies, 29(1), 83\u2013101. https:\/\/doi.org\/10.1080\/1369183032000076731 .","journal-title":"Journal of Ethnic and Migration Studies"},{"key":"9493_CR13","unstructured":"EUlisa (2013). Annual report on the 2013 activities of the Central Unit of Eurodac pursuant to Article 24(1) of Regulation (EC) No 2725\/2000. The European Commission."},{"key":"9493_CR14","first-page":"201","volume-title":"Routledge handbook of surveillance studies","author":"P Fussey","year":"2012","unstructured":"Fussey, P., & Coaffee, J. (2012). Urban spaces of surveillance. In K. Ball, K. D. Haggerty & D. Lyon (Eds.), Routledge handbook of surveillance studies (pp.\u00a0201\u2013208). Abingdon: Routledge."},{"issue":"4","key":"9493_CR15","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1177\/1440783304048378","volume":"40","author":"P Gale","year":"2004","unstructured":"Gale, P. (2004). The refugee crisis and fear: Populist politics and media discourse. Journal of Sociology, 40(4), 321\u2013340.","journal-title":"Journal of Sociology"},{"key":"9493_CR16","volume-title":"Coming to terms with chance: Engaging rational discrimination and cumulative disadvantage","author":"OH Gandy","year":"2009","unstructured":"Gandy, O. H. (2009). Coming to terms with chance: Engaging rational discrimination and cumulative disadvantage. Farnham: Ashgate."},{"key":"9493_CR17","first-page":"125","volume-title":"Routledge handbook of surveillance studies","author":"OH Gandy","year":"2012","unstructured":"Gandy, O. H. (2012). Statistical surveillance: Remote sensing in the digital age. In K. Ball, K. D. Haggerty & D. Lyon (Eds.), Routledge handbook of surveillance studies (pp.\u00a0125\u2013132). Abingdon: Routledge."},{"key":"9493_CR18","volume-title":"Identification for development: The biometrics revolution, Working paper 315","author":"A Gelb","year":"2013","unstructured":"Gelb, A., & Clark, J. (2013). Identification for development: The biometrics revolution, Working paper 315. Washington, DC: Centre for Global Development."},{"issue":"2","key":"9493_CR19","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1177\/0261018303023002006","volume":"23","author":"S Graham","year":"2003","unstructured":"Graham, S., & Wood, D. (2003). Digitizing surveillance: Categorization, space, inequality. Critical Social Policy, 23(2), 227\u2013248. https:\/\/doi.org\/10.1177\/0261018303023002006 .","journal-title":"Critical Social Policy"},{"key":"9493_CR20","unstructured":"IBDMA (2013). The protocol for the experimentation of the biometric system."},{"key":"9493_CR21","unstructured":"IBDMA (2014). The first IBDMA\u2019s periodical report."},{"issue":"6","key":"9493_CR22","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1177\/0263276411418131","volume":"28","author":"LD Introna","year":"2011","unstructured":"Introna, L. D. (2011). The enframing of code: Agency, originality and the plagiarist. Theory, Culture & Society, 28(6), 113\u2013141. https:\/\/doi.org\/10.1177\/0263276411418131 .","journal-title":"Theory, Culture & Society"},{"issue":"2\/3","key":"9493_CR23","first-page":"177","volume":"2","author":"LD Introna","year":"2004","unstructured":"Introna, L. D., & Wood, D. (2004). Picturing algorithmic surveillance: The politics of facial recognition systems. Surveillance & Society, 2(2\/3), 177\u2013198.","journal-title":"Surveillance & Society"},{"key":"9493_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4135\/9781848608276","volume-title":"Handbook of citizenship studies","author":"EF Isin","year":"2002","unstructured":"Isin, E. F., & Turner, B. S. (2002). Citizenship studies: An introduction. In E. F. Isin & B. S. Turner (Eds.), Handbook of citizenship studies (pp.\u00a01\u201310). London: Sage."},{"key":"9493_CR25","unstructured":"Jones, C. (2014). Analysis: 11 years of Eurodac. (Vol. 16): Statewatch Analyses."},{"issue":"1","key":"9493_CR26","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1080\/1369118X.2016.1154087","volume":"20","author":"R Kitchin","year":"2017","unstructured":"Kitchin, R. (2017). Thinking critically about and researching algorithms. Information, Communication & Society, 20(1), 14\u201329. https:\/\/doi.org\/10.1080\/1369118X.2016.1154087 .","journal-title":"Information, Communication & Society"},{"issue":"3","key":"9493_CR27","doi-asserted-by":"publisher","first-page":"544","DOI":"10.2307\/3105385","volume":"27","author":"M Kranzberg","year":"1986","unstructured":"Kranzberg, M. (1986). Technology and history: \u201cKranzberg\u2019s laws\u201d. Technology and Culture, 27(3), 544\u2013560.","journal-title":"Technology and Culture"},{"issue":"2","key":"9493_CR28","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.biopsycho.2007.01.007","volume":"75","author":"M Larsson","year":"2007","unstructured":"Larsson, M., Pedersen, N. L., & Stattin, H. (2007). Associations between iris characteristics and personality in adulthood. Biological Psychology, 75(2), 165\u2013175. https:\/\/doi.org\/10.1016\/j.biopsycho.2007.01.007 .","journal-title":"Biological Psychology"},{"key":"9493_CR29","unstructured":"Lebovic, N., & Pinchuk, A. (2010, The State of Israel and the biometric database law: Political centrism and the post-democratic state. The Israel Democracy Institute."},{"key":"9493_CR30","unstructured":"Levin, S. (2016). A beauty contest was judged by AI and the robots didn\u2019t like dark skin. The Guardian."},{"issue":"3","key":"9493_CR31","doi-asserted-by":"publisher","first-page":"412","DOI":"10.24908\/ss.v1i3.3348","volume":"1","author":"M Lianos","year":"2003","unstructured":"Lianos, M. (2003). Social control after Foucault. Surveillance & Society, 1(3), 412\u2013430.","journal-title":"Surveillance & Society"},{"issue":"2","key":"9493_CR32","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1093\/bjc\/40.2.261","volume":"40","author":"M Lianos","year":"2000","unstructured":"Lianos, M., & Douglas, M. (2000). Dangerization and the end of deviance: The institutional environment. British Journal of Criminology, 40(2), 261\u2013278.","journal-title":"British Journal of Criminology"},{"key":"9493_CR33","volume-title":"From fingerprints to DNA: Biometric data collection in US immigrant communities and beyond","author":"J Lynch","year":"2012","unstructured":"Lynch, J. (2012). From fingerprints to DNA: Biometric data collection in US immigrant communities and beyond. San Francisco: The Electronic Frontier Foundation"},{"key":"9493_CR34","first-page":"13","volume-title":"Surveillance as social sorting: Privacy, risk, and digital discrimination","author":"D Lyon","year":"2003","unstructured":"Lyon, D. (2003). Surveillance as social sorting: Computer codes and mobile bodies. In D. Lyon (Ed.), Surveillance as social sorting: Privacy, risk, and digital discrimination (pp.\u00a013\u201330). London: Routledge."},{"issue":"1","key":"9493_CR35","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1093\/police\/pam015","volume":"1","author":"D Lyon","year":"2007","unstructured":"Lyon, D. (2007). National ID cards: Crime-control, citizenship and social sorting. Policing, 1(1), 111\u2013118. https:\/\/doi.org\/10.1093\/police\/pam015 .","journal-title":"Policing"},{"issue":"9","key":"9493_CR36","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1111\/j.1467-8519.2008.00697.x","volume":"22","author":"D Lyon","year":"2008","unstructured":"Lyon, D. (2008). Biometrics, identification and surveillance. Bioethics, 22(9), 499\u2013508. https:\/\/doi.org\/10.1111\/j.1467-8519.2008.00697.x .","journal-title":"Bioethics"},{"key":"9493_CR37","first-page":"1","volume-title":"Routledge handbook of surveillance studies","author":"D Lyon","year":"2012","unstructured":"Lyon, D., Haggerty, K. D., & Ball, K. (2012). Introducing surveillance studies. In K. Ball, K. D. Haggerty & D. Lyon (Eds.), Routledge handbook of surveillance studies (pp.\u00a01\u201311). Abingdon: Routledge."},{"issue":"1","key":"9493_CR38","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1080\/14680777.2011.558352","volume":"12","author":"S Magnet","year":"2011","unstructured":"Magnet, S., & Rodgers, T. (2011). Stripping for the state: Whole body imaging technologies and the surveillance of othered bodies. Feminist Media Studies, 12(1), 101\u2013118. https:\/\/doi.org\/10.1080\/14680777.2011.558352 .","journal-title":"Feminist Media Studies"},{"key":"9493_CR39","doi-asserted-by":"publisher","DOI":"10.1215\/9780822394822","volume-title":"When biometrics fail: Gender, race, and the technology of identity","author":"SA Magnet","year":"2011","unstructured":"Magnet, S. A. (2011). When biometrics fail: Gender, race, and the technology of identity. Durham: Duke University Press."},{"issue":"1","key":"9493_CR40","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1177\/0163443712464558","volume":"35","author":"AK Martin","year":"2013","unstructured":"Martin, A. K., & Whitley, E. A. (2013). Fixing identity? Biometrics and the tensions of material practices. Media, Culture & Society, 35(1), 52\u201360. https:\/\/doi.org\/10.1177\/0163443712464558 .","journal-title":"Media, Culture & Society"},{"key":"9493_CR41","unstructured":"McCullagh, D. (2001). Call it Super Bowl face scan I. Wired."},{"key":"9493_CR42","first-page":"285","volume-title":"Routledge handbook of surveillance studies","author":"T Monahan","year":"2012","unstructured":"Monahan, T. (2012). Surveillance and terrorism. In K. Ball, K. D. Haggerty & D. Lyon (Eds.), Routledge handbook of surveillance studies (pp.\u00a0285\u2013291). Abingdon: Routledge."},{"issue":"3","key":"9493_CR43","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1080\/1362102042000257005","volume":"8","author":"BJ Muller","year":"2004","unstructured":"Muller, B. J. (2004). Dis)qualified bodies: Securitization, citizenship and \u2018identity management\u2019. Citizenship Studies, 8(3), 279\u2013294. https:\/\/doi.org\/10.1080\/1362102042000257005 .","journal-title":"Citizenship Studies"},{"issue":"4","key":"9493_CR44","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1080\/10714420701715415","volume":"10","author":"H Murray","year":"2007","unstructured":"Murray, H. (2007). Monstrous play in negative spaces: Illegible bodies and the cultural construction of biometric technology. The Communication Review, 10(4), 347\u2013365. https:\/\/doi.org\/10.1080\/10714420701715415 .","journal-title":"The Communication Review"},{"key":"9493_CR45","volume-title":"Biometrics: Identity verification in a networked world (Wiley tech brief series)","author":"S Nanavati","year":"2002","unstructured":"Nanavati, S., Thieme, M., & Nanavati, R. (2002). Biometrics: Identity verification in a networked world (Wiley tech brief series). New York: Wiley."},{"key":"9493_CR46","first-page":"251","volume-title":"Routledge handbook of surveillance studies","author":"C Norris","year":"2012","unstructured":"Norris, C. (2012). The success of failure: Accounting for the global growth of CCTV. In K. Ball, K. D. Haggerty & D. Lyon (Eds.), Routledge handbook of surveillance studies (pp.\u00a0251\u2013258). Abingdon: Routledge."},{"key":"9493_CR47","first-page":"255","volume-title":"Surveillance, closed circuit television, and social control","author":"C Norris","year":"1998","unstructured":"Norris, C., Moran, J., & Armstrong, G. (1998). Algorithmic surveillance: The future of automated visual surveillance. In C. Norris, J. Moran & G. Armstrong (Eds.), Surveillance, closed circuit television, and social control (pp.\u00a0255\u2013275). Aldershot: Ashgate."},{"issue":"2","key":"9493_CR48","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/j.ajhg.2011.07.004","volume":"89","author":"J Nousbeck","year":"2011","unstructured":"Nousbeck, J., Burger, B., Fuchs-Telem, D., Pavlovsky, M., Fenig, S., Sarig, O., et al. (2011). A mutation in a skin-specific isoform of SMARCAD1 causes autosomal-dominant adermatoglyphia. The American Journal of Human Genetics, 89(2), 302\u2013307. https:\/\/doi.org\/10.1016\/j.ajhg.2011.07.004 .","journal-title":"The American Journal of Human Genetics"},{"issue":"4","key":"9493_CR49","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1017\/S1049096505050377","volume":"38","author":"A Ong","year":"2005","unstructured":"Ong, A. (2005). (Re)Articulations of Citizenship. Political Science and Politics, 38(4), 697\u2013699. https:\/\/doi.org\/10.1017\/S1049096505050377 .","journal-title":"Political Science and Politics"},{"key":"9493_CR50","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674736061","volume-title":"The black box society: The secret algorithms that control money and information","author":"F Pasquale","year":"2015","unstructured":"Pasquale, F. (2015). The black box society: The secret algorithms that control money and information. Cambridge: Harvard University Press."},{"key":"9493_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/13200968.2005.10854342","volume":"23","author":"J Pugliese","year":"2005","unstructured":"Pugliese, J. (2005). In silico race and the heteronomy of biometric proxies: Biometrics in the context of civilian life, border security and counter-terrorism laws. The Australian Feminist Law Journal, 23, 1\u201332.","journal-title":"The Australian Feminist Law Journal"},{"key":"9493_CR52","volume-title":"Biometrics: Bodies, technologies, biopolitics","author":"J Pugliese","year":"2010","unstructured":"Pugliese, J. (2010). Biometrics: Bodies, technologies, biopolitics. New York: Routledge)."},{"key":"9493_CR53","unstructured":"Puri, C., Narang, K., Tiwari, A., Vatsa, M., & Singh, R. (2010). On analysis of rural and urban Indian fingerprint images. In A. Kumar, & D. Zhang (Eds.), Ethics and policy of biometrics: Third international conference on ethics and policy of biometrics and international data sharing, ICEB 2010, Hong Kong, January 4\u20135, 2010: Revised selected papers (pp.\u00a055\u201361, Lecture notes in computer science, Vol. 6005). Berlin: Springer."},{"key":"9493_CR54","first-page":"64","volume-title":"Routledge handbook of surveillance studies","author":"JB Rule","year":"2012","unstructured":"Rule, J. B. (2012). \u201cNeeds\u201d for surveillance and the movement to protect privacy. In K. Ball, K. D. Haggerty & D. Lyon (Eds.), Routledge handbook of surveillance studies (pp.\u00a064\u201371). Abingdon: Routledge."},{"issue":"1","key":"9493_CR55","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1111\/j.1528-3577.2004.00158.x","volume":"5","author":"MB Salter","year":"2004","unstructured":"Salter, M. B. (2004). Passports, mobility, and security: How smart can the border be? International Studies Perspectives, 5(1), 71\u201391. https:\/\/doi.org\/10.1111\/j.1528-3577.2004.00158.x .","journal-title":"International Studies Perspectives"},{"key":"9493_CR56","volume-title":"The concept of the political","author":"C Schmitt","year":"1996","unstructured":"Schmitt, C. (1996). The concept of the political. Chicago: University of Chicago Press."},{"key":"9493_CR57","first-page":"77","volume-title":"Surveillance as social sorting: Privacy, risk, and digital discrimination","author":"F Stalder","year":"2003","unstructured":"Stalder, F., & Lyon, D. (2003). Electronic identity cards and social classification. In D. Lyon (Ed.), Surveillance as social sorting: Privacy, risk, and digital discrimination (pp.\u00a077\u201393). London: Routledge."},{"key":"9493_CR58","volume-title":"The invention of the passport: Surveillance, citizenship, and the state","author":"J Torpey","year":"2000","unstructured":"Torpey, J. (2000). The invention of the passport: Surveillance, citizenship, and the state (Cambridge studies in law and society). Cambridge: Cambridge University Press."},{"key":"9493_CR59","volume-title":"Niche envy: Marketing discrimination in the digital age","author":"J Turow","year":"2006","unstructured":"Turow, J. (2006). Niche envy: Marketing discrimination in the digital age. Cambridge: The MIT Press."},{"issue":"4","key":"9493_CR60","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1023\/A:1010064613240","volume":"1","author":"I Ploeg van der","year":"1999","unstructured":"van der Ploeg, I. (1999). The illegal body: `Eurodac\u2019 and the politics of biometric identification. Ethics and Information Technology, 1(4), 295\u2013302. https:\/\/doi.org\/10.1023\/A:1010064613240 .","journal-title":"Ethics and Information Technology"},{"key":"9493_CR61","first-page":"57","volume-title":"Surveillance as social sorting: Privacy, risk, and digital discrimination","author":"I Ploeg van Der","year":"2003","unstructured":"van Der Ploeg, I. (2003). Biometrics and the body as information: Normative issues of the socio-technical coding of the body. In D. Lyon (Ed.), Surveillance as social sorting: Privacy, risk, and digital discrimination (pp.\u00a057\u201373). London: Routledge."},{"key":"9493_CR62","volume-title":"The machine-readable body: Essays on biometrics and the informatization of the body","author":"I Ploeg van Der","year":"2005","unstructured":"van Der Ploeg, I. (2005). The machine-readable body: Essays on biometrics and the informatization of the body. Maastricht: Shaker Publishing."},{"key":"9493_CR63","first-page":"177","volume-title":"Surveillance and security: Technological politics and power in everyday life","author":"I Ploeg van Der","year":"2006","unstructured":"van Der Ploeg, I. (2006). Borderline identities: The enrollment of bodies in the technological reconstruction of borders. In T. Monahan (Ed.), Surveillance and security: Technological politics and power in everyday life (pp.\u00a0177\u2013193). New York: Routledge."},{"issue":"1","key":"9493_CR64","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1177\/0163443712464557","volume":"35","author":"L Zoonen van","year":"2013","unstructured":"van Zoonen, L. (2013). From identity to identification: Fixating the fragmented self. Media, Culture & Society, 35(1), 44\u201351. https:\/\/doi.org\/10.1177\/0163443712464557 .","journal-title":"Media, Culture & Society"},{"key":"9493_CR65","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/b138151","volume-title":"Biometric systems: Technology, design and performance evaluation","author":"J Wayman","year":"2005","unstructured":"Wayman, J., Jain, A., Maltoni, D., & Maio, D. (2005). An introduction to biometric authentication systems. In J. Wayman, A. Jain, D. Maltoni & D. Maio (Eds.), Biometric systems: Technology, design and performance evaluation (pp.\u00a01\u201320). London: Springer London."},{"key":"9493_CR66","volume-title":"Privacy and freedom","author":"AF Westin","year":"1967","unstructured":"Westin, A. F. (1967). Privacy and freedom. New York: Atheneum."},{"issue":"4","key":"9493_CR67","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1046\/j.0020-8833.2003.00277.x","volume":"47","author":"MC Williams","year":"2003","unstructured":"Williams, M. C. (2003). Words, images, enemies: Securitization and international politics. International Studies Quarterly, 47(4), 511\u2013531. https:\/\/doi.org\/10.1046\/j.0020-8833.2003.00277.x .","journal-title":"International Studies Quarterly"},{"key":"9493_CR68","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/1-4020-4899-8_5","volume-title":"Borders, mobility and technologies of control","author":"D Wilson","year":"2006","unstructured":"Wilson, D. (2006). Biometrics, borders and the ideal suspect. In S. Pickering & L. Weber (Eds.), Borders, mobility and technologies of control (pp.\u00a087\u2013109). The Netherlands: Springer."},{"key":"9493_CR69","volume-title":"The whale and the reactor: A search for limits in an age of high technology","author":"L Winner","year":"1986","unstructured":"Winner, L. (1986). The whale and the reactor: A search for limits in an age of high technology. Chicago: University of Chicago Press."},{"key":"9493_CR70","doi-asserted-by":"publisher","DOI":"10.1093\/annonc\/mdp278","author":"M Wong","year":"2009","unstructured":"Wong, M., Choo, S.-P., & Tan, E.-H. (2009). Travel warning with capecitabine. Annals of Oncology. https:\/\/doi.org\/10.1093\/annonc\/mdp278 .","journal-title":"Annals of Oncology"},{"key":"9493_CR71","volume-title":"Army biometric applications: Identifying and addressing sociocultural concerns","author":"JD Woodward","year":"2001","unstructured":"Woodward, J. D., Webb, K., Newton, W., Bradley, E. M., M., & Rubenson, D. (2001). Army biometric applications: Identifying and addressing sociocultural concerns. Santa Monica: Rand."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9493-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-018-9493-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9493-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T19:21:53Z","timestamp":1662578513000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-018-9493-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,6]]},"references-count":71,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["9493"],"URL":"https:\/\/doi.org\/10.1007\/s10676-018-9493-1","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,6]]},"assertion":[{"value":"6 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}