{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T03:39:45Z","timestamp":1770781185769,"version":"3.50.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2020,12,29]],"date-time":"2020-12-29T00:00:00Z","timestamp":1609200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,12,29]],"date-time":"2020-12-29T00:00:00Z","timestamp":1609200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100010663","name":"H2020 European Research Council","doi-asserted-by":"publisher","award":["787123"],"award-info":[{"award-number":["787123"]}],"id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Biometric technologies have become the main focus in the design of state-of-the-art border security solutions. While respective research in the field of multimedia vision has been centred around improving quality and accuracy of identity recognition, the impact of such technologies upon society and legal regulations still remains a topic unaddressed, specifically within the engineering community. Research in technology can and in some respect must include collaboration with social sciences and social practice. Building on participation in the EU funded research project PERSONA [18] (Privacy, Ethical, Regulatory and SOcial No-gate crossing point solutions Acceptance), authors of this paper look at the challenges associated with biometrics-based solutions in no-gate border crossing point scenarios. This included the procedures needed for the assessment of their social, ethical, privacy and regulatory acceptance, particularly in view of the impact on both, the passengers and border control authorities as well as the potential pitfalls of biometric technology due to fraudulent activities. In consultation with the collaborating border control authorities, the paper reports on the formal assessment of biometric technologies for real-world acceptance to cope with the increasing demand of global travellers crossing state borders.<\/jats:p>","DOI":"10.1007\/s11042-020-10266-0","type":"journal-article","created":{"date-parts":[[2020,12,29]],"date-time":"2020-12-29T09:02:26Z","timestamp":1609232546000},"page":"23665-23678","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Biometric technology in \u201cno-gate border crossing solutions\u201d under consideration of privacy, ethical, regulatory and social acceptance"],"prefix":"10.1007","volume":"80","author":[{"given":"Susanne","family":"Binder","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Iannone","sequence":"additional","affiliation":[]},{"given":"Chad","family":"Leibner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,29]]},"reference":[{"key":"10266_CR1","unstructured":"[Online]. Available: https:\/\/gdpr-info.eu\/"},{"key":"10266_CR2","unstructured":"[Online]. Available: https:\/\/tractica.omdia.com\/biometrics\/in-biometrics-which-error-rate-matters\/"},{"key":"10266_CR3","unstructured":"[Online]. Available: https:\/\/www.khaleejtimes.com\/news\/general\/soon-clear-immigration-at-dubai-airport-within-15-seconds"},{"key":"10266_CR4","unstructured":"[Online]. Available: https:\/\/www.statista.com\/statistics\/273598\/international-tourist-arrivals-in-europe\/"},{"key":"10266_CR5","unstructured":"abinformatica, \u201cabinformatica,\u201d 2006. [Online]. Available: https:\/\/abinformatica.com.br\/public\/images\/bodysearch2.jpg."},{"key":"10266_CR6","unstructured":"Brownsword R, Yeung K (eds) (2008) Regulating technologies: legal futures, regulatory frames and technological fixes. Hart Publishing"},{"key":"10266_CR7","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.robot.2016.08.027","volume":"86","author":"A Carnevale","year":"2016","unstructured":"Carnevale A (2016) Will robots know us better than we know ourselves? Robot Auton Syst 86:144\u2013151","journal-title":"Robot Auton Syst"},{"key":"10266_CR8","first-page":"45","volume":"4","author":"DS Dariusz Kloza","year":"2017","unstructured":"Dariusz Kloza DS (2017) Trans-Atlantic data privacy relations as a challenge for democracy. Intersentia: Cambridge 4:45\u2013505","journal-title":"Intersentia: Cambridge"},{"key":"10266_CR9","doi-asserted-by":"crossref","unstructured":"Dommering E. and Asscher L. (eds.), Coding regulation: volume 12 \u2013 Essays on the normative role of information technology, T.M.C. Asser Press, 2006.","DOI":"10.1007\/978-90-6704-595-7"},{"key":"10266_CR10","unstructured":"Executive Council of the Government of Dubai, Dubai Code of Conduct, (2009)"},{"key":"10266_CR11","volume-title":"Redistribution or recognition? A political-philosophical exchange","author":"AHN Fraser","year":"2004","unstructured":"Fraser AHN (2004) Redistribution or recognition? A political-philosophical exchange. Verso Book, New York"},{"key":"10266_CR12","volume-title":"Facts and norms","author":"J Habermas","year":"1992","unstructured":"Habermas J (1992) Facts and norms. MIT Press, Contributions to a Discourse Theory of Law and Democracy"},{"key":"10266_CR13","doi-asserted-by":"crossref","unstructured":"I. v. d. Poel (2013) Translating values into design requirements., Dordrecht: Springer Netherlands","DOI":"10.1007\/978-94-007-7762-0_20"},{"key":"10266_CR14","volume-title":"Code and other laws of cyberspace","author":"L Lessig","year":"1999","unstructured":"Lessig L (1999) Code and other laws of cyberspace. Basic Book, New York"},{"key":"10266_CR15","unstructured":"MAGNETO consortium, \u201cMAGNETO H2020 project,\u201d 2018. [Online]. Available: http:\/\/www.magneto-h2020.eu\/."},{"key":"10266_CR16","doi-asserted-by":"crossref","unstructured":"Mohammed Anzar ST, Sathidevi PS (2014) On combining multi-normalization and ancillary measures for the optimal score level fusion of fingerprint and voice biometrics. EURASIP Journal on Advances in Signal Processing, no. 10","DOI":"10.1186\/1687-6180-2014-10"},{"key":"10266_CR17","volume-title":"Travel and tourism ResearchAssociation: advancing tourism research globally","author":"C Morosan","year":"2011","unstructured":"Morosan C (2011) Opportunities and challenges for biometric Systems in Travel: a review. In: Travel and tourism ResearchAssociation: advancing tourism research globally"},{"key":"10266_CR18","unstructured":"PERSONA consortium, \u201cPERSONA H2020 project,\u201d 2019. [Online]. Available: http:\/\/persona-project.eu\/."},{"key":"10266_CR19","volume-title":"15th Nordic-Baltic conference on biomedical engineering and medical physics","author":"U Rubins","year":"2011","unstructured":"Rubins U, Upmalis V, Rubenis O, Jakovels D (2011) Real-time Photoplethysmography imaging system. In: 15th Nordic-Baltic conference on biomedical engineering and medical physics"},{"key":"10266_CR20","doi-asserted-by":"crossref","unstructured":"Scherhag U et al. (2017) Biometric systems under morphing attacks: assessment of morphing techniques and vulnerability reporting, in 17 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt","DOI":"10.23919\/BIOSIG.2017.8053499"},{"key":"10266_CR21","unstructured":"Tech Republic \u201chttps:\/\/www.techrepublic.com, 2018. [Online]. Available: https:\/\/www.techrepublic.com\/."},{"key":"10266_CR22","unstructured":"The Guardian, The Guardian, 2017. [Online]. Available: https:\/\/i.guim.co.uk\/img\/media\/4425f062b67828539ff5fb9edbe30e2e54ca9d16\/104_421_5830_3500\/master\/5830.jpg?width=620&quality=85&auto=format&fit=max&s=f1391cd4bea166832ba1e63380dbebc7."},{"key":"10266_CR23","volume-title":"Reclaiming conversation: the power of talk in the digital age","author":"S Turkle","year":"2015","unstructured":"Turkle S (2015) Reclaiming conversation: the power of talk in the digital age. Penguin Press, New York"},{"key":"10266_CR24","unstructured":"Casiraghi S, Kloza D, Konstantinou I, Calvi A, Burgess JP (2019) D3.1 - PERSONA assessment method (initial version), PERSONA H2020 project, 2019"},{"key":"10266_CR25","doi-asserted-by":"crossref","unstructured":"Kloza D, Van Dijk N, Casiraghi S, Vazquez Maymir S, Roda S, Tanas A, Konstantinou I (2019) Towards a method for data protection impact assessment: Making sense of GDPR requirements. Policy Brief, 1, 1-8 (2019), Brussels: d.pia.lab., 2019","DOI":"10.31228\/osf.io\/es8bm"}],"updated-by":[{"DOI":"10.1007\/s11042-021-10595-8","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T00:00:00Z","timestamp":1613606400000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10266-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10266-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10266-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,3]],"date-time":"2021-07-03T09:24:30Z","timestamp":1625304270000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10266-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,29]]},"references-count":25,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10266"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10266-0","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s11042-021-10595-8","asserted-by":"object"}]},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,29]]},"assertion":[{"value":"4 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 December 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2021","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11042-021-10595-8","URL":"https:\/\/doi.org\/10.1007\/s11042-021-10595-8","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}