{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:50:19Z","timestamp":1761324619773,"version":"3.40.4"},"publisher-location":"Singapore","reference-count":112,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819641574"},{"type":"electronic","value":"9789819641581"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-4158-1_2","type":"book-chapter","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T21:10:48Z","timestamp":1744146648000},"page":"15-72","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Navigating the Complex Landscape of Facial Recognition Technologies"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8554-7619","authenticated-orcid":false,"given":"Helena","family":"Machado","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1335-8648","authenticated-orcid":false,"given":"Susana","family":"Silva","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,30]]},"reference":[{"unstructured":"Abhishek, A. (2024, April 18). Thailand advances national AI strategy. Single digital ID platform to access govt services. Biometrics News. Retrieved May 17, 2024, from https:\/\/www.biometricupdate.com\/202404\/thailand-advances-national-ai-strategy","key":"2_CR1"},{"unstructured":"ACM. (2020). Statement on principles and prerequisites for the development, evaluation and use of unbiased facial recognition technologies. U.S. Technology Policy Committee. Retrieved May 21, 2024, from https:\/\/www.acm.org\/binaries\/content\/assets\/public-policy\/ustpc-facial-recognition-tech-statement.pdf","key":"2_CR2"},{"unstructured":"Ada Lovelace Institute (2019). Beyond face value: public attitudes to facial recognition technology. Retrieved April 19, 2024, from https:\/\/www.adalovelaceinstitute.org\/case-study\/beyond-face-value\/","key":"2_CR3"},{"issue":"8","key":"2_CR4","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.3390\/electronics9081188","volume":"9","author":"I Adjabi","year":"2020","unstructured":"Adjabi, I., Ouahabi, A., Benzaoui, A., & Taleb-Ahmed, A. (2020). Past, present, and future of face recognition: A review. Electronics, 9(8), 1188. https:\/\/doi.org\/10.3390\/electronics9081188","journal-title":"Electronics"},{"unstructured":"AI Sur. (2021). Reconocimiento facial em Am\u00e9rica Latina. Tendencias de implementaci\u00f3n de uma tecnolog\u00eda perversa. Retrieved May 22, 2024, from https:\/\/www.alsur.lat\/reporte\/reconocimiento-facial-en-america-latina-tendencias-en-implementacion-una-tecnologia","key":"2_CR5"},{"unstructured":"Amnesty International. (2022). Israel\u2019s apartheid against palestinians: Cruel system of domination and crime against humanity. Index Number:\u00a0MDE\u00a015\/5141\/2022. Retrieved 29 December 2024, from https:\/\/www.amnesty.org\/en\/documents\/mde15\/5141\/2022\/en\/Amnesty International (n\/d). Ban the scan. Retrieved May 4, 2024, from https:\/\/banthescan.amnesty.org\/","key":"2_CR6"},{"doi-asserted-by":"crossref","unstructured":"Amoore, L. (2020). Cloud ethics: Algorithms and the attributes of ourselves and others. Duke University Press.","key":"2_CR7","DOI":"10.1215\/9781478009276"},{"issue":"3","key":"2_CR8","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1177\/1474474010368604","volume":"17","author":"L Amoore","year":"2010","unstructured":"Amoore, L., & Hall, A. (2010). Border theatre: On the arts of security and resistance. Cultural Geographies, 17(3), 299\u2013319. https:\/\/doi.org\/10.1177\/1474474010368604","journal-title":"Cultural Geographies"},{"unstructured":"Andrejevic, M., Fordyce, R., Li, L., & Trott, V. (2020). Australian attitudes to facial recognition: A national survey. Monash University. Retrieved May 4, 2024, from https:\/\/www.monash.edu\/__data\/assets\/pdf_file\/0011\/2211599\/Facial-Recognition-Whitepaper-Monash,-ASWG.pdf","key":"2_CR9"},{"key":"2_CR10","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780192859624.001.0001","author":"C Aradau","year":"2022","unstructured":"Aradau, C., & Blanke, T. (2022). Algorithmic reason: The new government of self and others. Oxford University Press. https:\/\/doi.org\/10.1093\/oso\/9780192859624.001.0001","journal-title":"Oxford University Press"},{"doi-asserted-by":"crossref","unstructured":"Bakir, V., & McStay, A. (2022). Optimising emotions, incubating falsehoods. How to protect the global civic body from disinformation and misinformation. Palgrave MacMillan. https:\/\/link.springer.com\/book\/10.1007\/978-3-031-13551-4","key":"2_CR11","DOI":"10.1007\/978-3-031-13551-4"},{"unstructured":"Bauer, R. (2023). Taiwan\u2019s vast surveillance infrastructure: An achilles\u2019 heel if China invades. Modern War Institute. Retrieved August 28, 2024, from https:\/\/mwi.westpoint.edu\/taiwans-vast-surveillance-infrastructure-an-achilles-heel-if-china-invades\/","key":"2_CR12"},{"unstructured":"Big Brother Watch. (2018). Face off report. Retrieved May 16, 2024, from https:\/\/bigbrotherwatch.org.uk\/campaigns\/stop-facial-recognition\/report\/","key":"2_CR13"},{"doi-asserted-by":"crossref","unstructured":"Bigo, D., Isin, E., & Ruppert, E. (2019). Data politics. Worlds, subjects, rights. Routledge.","key":"2_CR14","DOI":"10.4324\/9781315167305"},{"unstructured":"Bischoff, P. (2022). Facial Recognition Technology (FRT): Which countries use it? [100 analyzed]. Comparitech. Retrieved April 30, 2024, from https:\/\/www.comparitech.com\/blog\/vpn-privacy\/facial-recognition-statistics\/","key":"2_CR15"},{"issue":"7","key":"2_CR16","doi-asserted-by":"publisher","first-page":"1438","DOI":"10.1080\/1369118X.2021.2011948","volume":"26","author":"D Black","year":"2023","unstructured":"Black, D. (2023). Facial analysis: Automated surveillance and the attempt to quantify emotion. Information, Communication & Society, 26(7), 1438\u20131451. https:\/\/doi.org\/10.1080\/1369118X.2021.2011948","journal-title":"Information, Communication & Society"},{"unstructured":"Bledsoe, W. (1964). The model method in facial recognition (Technical report). Panoramic Research, Inc.: Palo Alto, CA, USA.","key":"2_CR17"},{"unstructured":"Bledsoe, W., & Chan, H. (1965). A man-machine facial recognition system. Some preliminary results. Technical Report PRI 19A, Panoramic Research, Inc., Palo Alto, California.","key":"2_CR18"},{"key":"2_CR19","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azaa032","author":"B Bradford","year":"2020","unstructured":"Bradford, B., Yesberg, J., Jackson, J., & Dawson, P. (2020). Live facial recognition: Trust and legitimacy as predictors of public support for police use of new technology. British Journal of Criminology. https:\/\/doi.org\/10.1093\/bjc\/azaa032","journal-title":"British Journal of Criminology"},{"issue":"6","key":"2_CR20","doi-asserted-by":"publisher","first-page":"1637","DOI":"10.1080\/15614263.2021.1942873","volume":"22","author":"A Bragias","year":"2021","unstructured":"Bragias, A., Hine, K., & Fleet, R. (2021). \u2018Only in our best interest, right?\u2019 Public perceptions of police use of facial recognition technology. Police Practice and Research, 22(6), 1637\u20131654. https:\/\/doi.org\/10.1080\/15614263.2021.1942873","journal-title":"Police Practice and Research"},{"key":"2_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.polgeo.2024.103193","volume":"114","author":"A Brooks","year":"2024","unstructured":"Brooks, A., & Griffiths, M. (2024). Beyond apartheid Israel. Political Geography, 114, 103193. https:\/\/doi.org\/10.1016\/j.polgeo.2024.103193","journal-title":"Political Geography"},{"doi-asserted-by":"publisher","unstructured":"Brown, T., Statman, A., & Sui, C. (2021). Public debate on facial recognition technologies in China. MIT case studies in social and ethical responsibilities of computing. Retrieved May 27, 2024, from https:\/\/doi.org\/10.21428\/2c646de5.37712c5c","key":"2_CR22","DOI":"10.21428\/2c646de5.37712c5c"},{"issue":"1","key":"2_CR23","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1177\/0263276419867752","volume":"37","author":"C Bueno","year":"2020","unstructured":"Bueno, C. (2020). The face revisited: Using Deleuze and Guattari to explore the politics of algorithmic face recognition. Theory, Culture & Society, 37(1), 73\u201391. https:\/\/doi.org\/10.1177\/0263276419867752","journal-title":"Theory, Culture & Society"},{"unstructured":"Buolamwini, J., & Gebru, T. (2018). Gender shades: intersectional accuracy disparities in commercial gender classification. Conference on Fairness, Accountability, and Transparency. Proceedings of Machine Learning Research, 81, 1\u201315. https:\/\/proceedings.mlr.press\/v81\/buolamwini18a\/buolamwini18a.pdf","key":"2_CR24"},{"key":"2_CR25","volume-title":"Unmasking AI: My mission to protect what is human in a world of machines","author":"J Buolamwini","year":"2023","unstructured":"Buolamwini, J. (2023). Unmasking AI: My mission to protect what is human in a world of machines. Random House."},{"issue":"2","key":"2_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/20539517221129549","volume":"9","author":"F Cabitza","year":"2022","unstructured":"Cabitza, F., Campagner, A., & Mattioli, M. (2022). The unbearable (technical) unreliability of automated facial emotion recognition. Big Data & Society, 9(2), 1\u201317. https:\/\/doi.org\/10.1177\/20539517221129549","journal-title":"Big Data & Society"},{"unstructured":"CBP (2024). Say hello to the new face of efficiency, security and safety. U.S. Customs and Border Protection. Retrieved June 17, 2024, from https:\/\/www.cbp.gov\/travel\/biometrics","key":"2_CR27"},{"doi-asserted-by":"crossref","unstructured":"Caeiro, C. (2022). Regulating facial recognition in Latin America. Policy lessons from police, surveillance in Buenos Aires and S\u00e3o Paulo. Research Paper. US and the Americas Programme. Chatham House, the Royal Institute of International Affairs. Retrieved May 9, 2024, from https:\/\/www.chathamhouse.org\/sites\/default\/files\/2022-11\/2022-11-11-regulating-facial-recognition-in-latin-america-caeiro.pdf","key":"2_CR28","DOI":"10.55317\/9781784135409"},{"issue":"2","key":"2_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2022.102482","volume":"47","author":"W Chen","year":"2023","unstructured":"Chen, W., & Wang, M. (2023). Regulating the use of facial recognition technology across borders: A comparative case analysis of the European Union, the United States, and China. Telecommunications Policy, 47(2), 102482. https:\/\/doi.org\/10.1016\/j.telpol.2022.102482","journal-title":"Telecommunications Policy"},{"unstructured":"Coalition for Critical Technology. (2020). Abolish the #TechToPrisonPipeline. Crime prediction technology reproduces injustices and causes real harm. Retrieved August 24, 2024, from https:\/\/medium.com\/@CoalitionForCriticalTechnology\/abolish-the-techtoprisonpipeline-9b5b14366b16","key":"2_CR30"},{"doi-asserted-by":"crossref","unstructured":"Dauvergne, P. (2022). Identified, tracked, and profiled: the politics of resisting facial recognition technology. Edward Elgar Publishing.","key":"2_CR31","DOI":"10.4337\/9781803925899"},{"unstructured":"Davis, N., Perry, L., & Santow, E. (2022). Facial recognition technology: Towards a model law. Human Technology Institute, the University of Technology Sydney. Retrieved June 3, 2024, from https:\/\/www.uts.edu.au\/human-technology-institute\/projects\/facial-recognition-technology-towards-model-law","key":"2_CR32"},{"key":"2_CR33","volume-title":"The history of information security: A comprehensive handbook","author":"K de Leeuw","year":"2007","unstructured":"de Leeuw, K., & Bergstra, J. (2007). The history of information security: A comprehensive handbook. Elsevier."},{"unstructured":"del Bosque, M. (2023, February 8). Facial recognition bias frustrates black asylum applicants to US, advocates say. The Guardian. https:\/\/www.theguardian.com\/us-news\/2023\/feb\/08\/us-immigration-cbp-one-app-facial-recognition-bias","key":"2_CR34"},{"unstructured":"ECNL (2023). Technology and counter-terrorism: mapping the impact of biometric surveillance and social media platforms on civic space. Retrieved June 17, 2024, from https:\/\/ecnl.org\/publications\/ct-and-tech-mapping-impact-biometric-surveillance-and-social-media-platforms-civic","key":"2_CR35"},{"unstructured":"EDPB (2023, May 17). Guidelines 05\/2022 on the use of facial recognition technology in the area of law enforcement. European data protection board. Retrieved May 22, 2024, from https:\/\/www.edpb.europa.eu\/our-work-tools\/our-documents\/guidelines\/guidelines-052022-use-facial-recognition-technology-area_en","key":"2_CR36"},{"issue":"4","key":"2_CR37","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1111\/j.1533-8525.2011.01218.x","volume":"52","author":"A Ellerbrok","year":"2011","unstructured":"Ellerbrok, A. (2011). Playful biometrics: Controversial technology through the lens of play. Sociological Quarterly, 52(4), 528\u2013547. https:\/\/doi.org\/10.1111\/j.1533-8525.2011.01218.x","journal-title":"Sociological Quarterly"},{"key":"2_CR38","doi-asserted-by":"publisher","first-page":"219","DOI":"10.3233\/IP-211538","volume":"27","author":"M Eneman","year":"2022","unstructured":"Eneman, M., Ljungberg, J., Raviola, E., & Rolandsson, B. (2022). The sensitive nature of facial recognition: Tensions between the Swedish police and regulatory authorities. Information Polity, 27, 219\u2013232. https:\/\/doi.org\/10.3233\/IP-211538","journal-title":"Information Polity"},{"unstructured":"Field, S. (2023, September 28). Facial recognition is everywhere\u2014But Australia\u2019s privacy laws are \u2018falling way behind\u2019. Forbes Australia. Retrieved May 20, 2024, from https:\/\/www.forbes.com.au\/news\/innovation\/facial-recognition-is-everywhere-but-australias-privacy-laws-are-falling-way-behind\/","key":"2_CR39"},{"unstructured":"Flores, N. (2021, November 11). En M\u00e9xico operan tres sistemas de vigilancia con reconocimiento facial. Contral\u00ednea. Retrieved June 6, 2024, from https:\/\/contralinea.com.mx\/interno\/semana\/en-mexico-operan-tres-sistemas-de-vigilancia-con-reconocimiento-facial\/","key":"2_CR40"},{"unstructured":"Foucault, M. (1980). Power\/knowledge: Selected interviews and other writings, 1972\u20131977. Harvester Press.","key":"2_CR41"},{"unstructured":"Fouquet H. (2019, October 3). France set to roll out nationwide facial recognition ID program. Bloomberg. Retrieved May 23, 2024, from https:\/\/www.bloomberg.com\/news\/articles\/2019-10-03\/french-liberte-tested-by-nationwide-facial-recognition-id-plan","key":"2_CR42"},{"unstructured":"Fry, H. (2018). Hello world: How to be human in the age of the machine. W. W. Norton & Company.","key":"2_CR43"},{"unstructured":"Galligan, C., Rosenfeld, H., Kleinman, M., & Parthasarathy, S. (2020). Cameras in the classroom: Facial recognition technology in schools (technology assessment report). Gerald R. Ford School of Public Policy. Science, technology, and public policy, University of Michigan. Retrieved April 16, 2024, from https:\/\/stpp.fordschool.umich.edu\/sites\/stpp\/files\/uploads\/file-assets\/cameras_in_the_classroom_full_report.pdf","key":"2_CR44"},{"unstructured":"Gates, K. (2011). Our biometric future: Facial recognition technology and the culture of surveillance. New York University Press.","key":"2_CR45"},{"doi-asserted-by":"crossref","unstructured":"Gentile, G. (2023). Does big brother exist? Face recognition technology in the United Kingdom (LSE Law, Society and Economy Working Papers, 7\/2023). https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=4394694","key":"2_CR46","DOI":"10.2139\/ssrn.4394694"},{"key":"2_CR47","volume-title":"Radical technologies: The design of everyday life","author":"A Greenfield","year":"2017","unstructured":"Greenfield, A. (2017). Radical technologies: The design of everyday life. Verso."},{"issue":"1","key":"2_CR48","doi-asserted-by":"publisher","first-page":"95","DOI":"10.3390\/electronics13010095","volume":"13","author":"G Gupta","year":"2023","unstructured":"Gupta, G., Raja, K., Gupta, M., Jan, T., et al. (2023). A comprehensive review of DeepFake detection using advanced machine learning and fusion methods. Electronics, 13(1), 95. https:\/\/doi.org\/10.3390\/electronics13010095","journal-title":"Electronics"},{"key":"2_CR49","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s11023-020-09517-8","volume":"30","author":"T Hagendorff","year":"2020","unstructured":"Hagendorff, T. (2020). The ethics of AI ethics: An evaluation of guidelines. Minds and Machines, 30, 99\u2013120. https:\/\/doi.org\/10.1007\/s11023-020-09517-8","journal-title":"Minds and Machines"},{"issue":"3","key":"2_CR50","doi-asserted-by":"publisher","first-page":"575","DOI":"10.2307\/3178066","volume":"14","author":"D Haraway","year":"1988","unstructured":"Haraway, D. (1988). Situated knowledges: The science question in feminism and the privilege of partial perspective. Feminist Studies, 14(3), 575\u2013599.","journal-title":"Feminist Studies"},{"unstructured":"Hao, K., & Swart, H. (2022, April 19). South Africa\u2019s private surveillance machine is fueling a digital apartheid. MIT Technology Review. Retrieved May 23, 2024, from https:\/\/www.technologyreview.com\/2022\/04\/19\/1049996\/south-africa-ai-surveillance-digital-apartheid\/","key":"2_CR51"},{"unstructured":"Heilweil, R. (2020, June 11). Big tech companies back away from selling facial recognition to police. That\u2019s progress. Recode. Retrieved April 11, 2024, from https:\/\/www.vox.com\/recode\/2020\/6\/10\/21287194\/amazon-microsoft-ibm-facial-recognition-moratorium-police.","key":"2_CR53"},{"issue":"10688","key":"2_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-022-14981-6","volume":"12","author":"I Hupont","year":"2022","unstructured":"Hupont, I., Tolan, S., Gunes, H., & Gomez, E. (2022). The landscape of facial processing applications in the context of the European AI act and the development of trustworthy systems. Scientific Reports, 12(10688), 1\u201314. https:\/\/doi.org\/10.1038\/s41598-022-14981-6","journal-title":"Scientific Reports"},{"unstructured":"ICO\u2014Information Commissioners\u2019 Office (2021, June 18). Information commissioner\u2019s opinion. The use of live facial recognition technology in public places. Retrieved April 18, 2024, from https:\/\/ico.org.uk\/media\/2619985\/ico-opinion-the-use-of-lfr-in-public-places-20210618.pdf","key":"2_CR55"},{"unstructured":"Instituto Garap\u00e9. (2023). Reconhecimento facial no Brasil. Retrieved April 17, 2024, from https:\/\/igarape.org.br\/infografico-reconhecimento-facial-no-brasil\/","key":"2_CR56"},{"doi-asserted-by":"publisher","unstructured":"Introna, L., & Wood, D. (2004). Picturing algorithmic surveillance: The politics of facial recognition systems. Surveillance & Society, 2(2\/3), 177\u2013198. https:\/\/doi.org\/10.24908\/ss.v2i2\/3.3373","key":"2_CR57","DOI":"10.24908\/ss.v2i2\/3.3373"},{"unstructured":"IPSOS (2019). Global public opinion on government use of AI and facial recognition. An Ipsos Survey for the World Economic Forum. Retrieved April 22, 2024, from https:\/\/www.ipsos.com\/sites\/default\/files\/ct\/news\/documents\/2019-09\/wef-global-public-opinion-on-government-use-of-facial-recognition.pdf","key":"2_CR58"},{"unstructured":"Jackson, A. (2024, January 15). A facial-recognition tour of New York. The New Yorker. Retrieved April 23, 2024, from https:\/\/www.newyorker.com\/magazine\/2024\/01\/22\/a-facial-recognition-tour-of-new-york","key":"2_CR59"},{"doi-asserted-by":"crossref","unstructured":"Jasanoff, S., Markle, G., Petersen, J., & Pinch, T. (Eds.). (1995). Handbook of science and technology studies. Sage Publications.","key":"2_CR60","DOI":"10.4135\/9781412990127"},{"unstructured":"Kassenova N., & Duprey, B. (Eds.). (2021). Digital silk road in Central Asia: Present and future. Davis Center for Russian and Eurasian Studies: Harvard University. Retrieved June 11, 2024, from https:\/\/daviscenter.fas.harvard.edu\/research-initiatives\/program-central-asia\/digital-silk-road-central-asia-present-and-future","key":"2_CR61"},{"issue":"2","key":"2_CR62","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1177\/0025802419893168","volume":"60","author":"P Kaur","year":"2020","unstructured":"Kaur, P., Krishan, K., Sharma, S., & Kanchan, T. (2020). Facial-recognition algorithms: A literature review. Medicine, Science and the Law, 60(2), 131\u2013139. https:\/\/doi.org\/10.1177\/0025802419893168","journal-title":"Medicine, Science and the Law"},{"issue":"1","key":"2_CR63","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1080\/09505431.2018.1519534","volume":"29","author":"S Kloppenburg","year":"2018","unstructured":"Kloppenburg, S., & van der Ploeg, I. (2018). Securing identities: Biometric technologies and the enactment of human bodily differences. Science as Culture, 29(1), 57\u201376. https:\/\/doi.org\/10.1080\/09505431.2018.1519534","journal-title":"Science as Culture"},{"key":"2_CR64","doi-asserted-by":"publisher","DOI":"10.1017\/dap.2023.25","volume":"5","author":"G Kostka","year":"2023","unstructured":"Kostka, G. (2023). Digital doubters in different political and cultural contexts: Comparing citizen attitudes across three major digital technologies. Data & Policy., 5, e27. https:\/\/doi.org\/10.1017\/dap.2023.25","journal-title":"Data & Policy."},{"issue":"6","key":"2_CR65","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1177\/09636625211001555","volume":"30","author":"G Kostka","year":"2021","unstructured":"Kostka, G., Steinacker, L., & Meckel, M. (2021). Between security and convenience: Facial recognition technology in the eyes of citizens in China, Germany, the United Kingdom, and the United States. Public Understanding of Science, 30(6), 671\u2013690. https:\/\/doi.org\/10.1177\/09636625211001555","journal-title":"Public Understanding of Science"},{"doi-asserted-by":"publisher","unstructured":"Kostka, G., Steinacker, L., & Meckel, M. (2023). Under big brother's watchful eye: Cross-country attitudes toward facial recognition technology. Government Information Quarterly, 40(1). https:\/\/doi.org\/10.1016\/j.giq.2022.101761","key":"2_CR66","DOI":"10.1016\/j.giq.2022.101761"},{"key":"2_CR67","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106894","volume":"124","author":"X Lai","year":"2021","unstructured":"Lai, X., & Rau, P. (2021). Has facial recognition technology been misused? A public perception model of facial recognition scenarios. Computers in Human Behavior, 124, 106894. https:\/\/doi.org\/10.1016\/j.chb.2021.106894","journal-title":"Computers in Human Behavior"},{"doi-asserted-by":"publisher","unstructured":"Leslie, D. (2020). Understanding bias in facial recognition technologies: An explainer. The Alan Turing Institute. Retrieved May 14, 2024, from https:\/\/doi.org\/10.5281\/zenodo.4050457","key":"2_CR68","DOI":"10.5281\/zenodo.4050457"},{"key":"2_CR69","first-page":"34","volume-title":"Surveillance and democracy","author":"D Lyon","year":"2010","unstructured":"Lyon, D. (2010). Identification, surveillance and democracy. In K. D. Haggerty & M. Samatas (Eds.), Surveillance and democracy (pp. 34\u201350). Routledge."},{"unstructured":"Macdonald, A. (2023, October 16). Taiwanese pols raise security concerns with biometric gear from China, Thailand. Biometric News. Retrieved May 15, 2024, from https:\/\/www.biometricupdate.com\/202310\/taiwanese-pols-raise-security-concerns-with-biometric-gear-from-china-thailand","key":"2_CR70"},{"key":"2_CR71","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-023-00387-1","author":"H Machado","year":"2023","unstructured":"Machado, H., Silva, S., & Neiva, L. (2023). Publics\u2019 views on ethical challenges of artificial intelligence: A scoping review. AI Ethics. https:\/\/doi.org\/10.1007\/s43681-023-00387-1","journal-title":"AI Ethics"},{"doi-asserted-by":"crossref","unstructured":"Magnet, S. (2011). When biometrics fail: Gender, race, and the technology identity.","key":"2_CR72","DOI":"10.2307\/j.ctv12101s4"},{"key":"2_CR73","doi-asserted-by":"publisher","first-page":"226","DOI":"10.4018\/978-1-7998-9609-8.ch013","volume-title":"Handbook of research on artificial intelligence in government practices and processes","author":"J Mart\u00ednez","year":"2022","unstructured":"Mart\u00ednez, J. (2022). The dark side of progress: Social and political movements against artificial intelligence in Spain. In J. Saura & F. Debasa (Eds.), Handbook of research on artificial intelligence in government practices and processes (pp. 226\u2013242). IGI Global."},{"unstructured":"McConvey, J. (2024a, February 12). Expansive facial recognition surveillance coming to Hong Kong, Bahrain, South Africa. Biometric News. Retrieved May 15, 2024, from https:\/\/www.biometricupdate.com\/202402\/expansive-facial-recognition-surveillance-coming-to-hong-kong-bahrain-south-africa","key":"2_CR74"},{"unstructured":"McConvey, J. (2024b, May 8). Thai government to collect iris and face biometrics from Myanmar nationals. Biometric News. Retrieved May 17, 2024, from https:\/\/www.biometricupdate.com\/202405\/thai-government-to-collect-iris-and-face-biometrics-from-myanmar-nationals","key":"2_CR75"},{"doi-asserted-by":"crossref","unstructured":"McGoey, L. (2019). The unknowers. How strategic ignorance rules the word. Zed.","key":"2_CR76","DOI":"10.5040\/9781350225725"},{"unstructured":"Metz, R. (2021, November 8). Facebook is shutting down its facial recognition software. CNN Business. Retrieved June 4, 2024, from https:\/\/edition.cnn.com\/2021\/11\/02\/tech\/facebook-shuts-down-facial-recognition\/index.html","key":"2_CR77"},{"unstructured":"Milmo, D. (2022, May 23). UK watchdog fines facial recognition firm \u00a37.5m over image collection. The Guardian. Retrieved May 6, 2024, from https:\/\/www.theguardian.com\/technology\/2022\/may\/23\/uk-data-watchdog-fines-facial-recognition-firm-clearview-ai-image-collection","key":"2_CR78"},{"key":"2_CR79","doi-asserted-by":"publisher","DOI":"10.1177\/00111287221150172","author":"T Miethe","year":"2023","unstructured":"Miethe, T., Dudinskaya, T., Forepaugh, C., & Sousa, W. H. (2023). Facial recognition technology in policing: A national survey of public support for this technology and privacy\/safety concerns. Crime & Delinquency. https:\/\/doi.org\/10.1177\/00111287221150172","journal-title":"Crime & Delinquency"},{"unstructured":"Mozur, P. (2019, April 14). One month, 500,000 face scans: How China is using A.I. to profile a minority. The New York Times. Retrieved June 6, 2024, from https:\/\/www.nytimes.com\/2019\/04\/14\/technology\/china-surveillance-artificial-intelligence-racial-profiling.html","key":"2_CR80"},{"unstructured":"Nash, J. (2023, March 17). SuperCom picks up last phase of suspect-monitoring project in Romania. Biometric News. Retrieved June 7, 2024, from https:\/\/www.biometricupdate.com\/202303\/supercom-picks-up-last-phase-of-suspect-monitoring-project-in-romania","key":"2_CR81"},{"unstructured":"Nash, J. (2023, October 4). Gang violence pushes Sweden to consider face biometrics as surveillance cameras multiply. Biometric News. Retrieved May 8, 2024, from https:\/\/www.biometricupdate.com\/202310\/gang-violence-pushes-sweden-to-consider-face-biometrics-as-surveillance-cameras-multiply","key":"2_CR82"},{"doi-asserted-by":"publisher","unstructured":"National Academies. (2024). Facial recognition technology: Current capabilities, future prospects, and governance (Consensus Study Report). The National Academies Press. Retrieved May 22, 2024, from https:\/\/doi.org\/10.17226\/27397","key":"2_CR83","DOI":"10.17226\/27397"},{"unstructured":"Nikolic, I. (2020, February 28). French court rules against facial recognition in high schools. B.I.R.D. Retrieved May 3, 2024, from https:\/\/bird.tools\/french-court-rules-against-facial-recognition-in-high-schools\/","key":"2_CR84"},{"unstructured":"NYPD - New York Police Department (2023). Facial recognition: Impact and use policy. Retrieved May 6, 2024, from https:\/\/www.nyc.gov\/assets\/nypd\/downloads\/pdf\/public_information\/post-final\/facial-recognition-nypd-impact-and-use-policy_4.9.21_final.pdf","key":"2_CR85"},{"unstructured":"O.D.I.A. (2022). Observatorio de derecho informatico argentino O.D.I.A. y otros contra gcba sobre amparo \u2013 otros. Juzgado en lo Contencioso Administrativo y Tributario N\u00ba 4 de la Ciudad Aut\u00f3noma de Buenos Aires. Retrieved June 4, 2024, from https:\/\/repositorio.mpd.gov.ar\/jspui\/handle\/123456789\/4658","key":"2_CR86"},{"unstructured":"Pearson, J. (2024, May 2). The breach of a face recognition firm reveals a hidden danger of biometrics. Wired. Retrieved June 4, 2024, from https:\/\/www.wired.com\/story\/outabox-facial-recognition-breach\/","key":"2_CR87"},{"unstructured":"Peng, K. (2020). Facial recognition datasets are being widely used despite being taken down due to ethical concerns. Here\u2019s how. Freedom to tinker. Research and commentary on digital technologies in public life. Retrieved May 8, 2024, from https:\/\/freedom-to-tinker.com\/2020\/10\/21\/facial-recognition-datasets-are-being-widely-used-despite-being-taken-down-due-to-ethical-concerns-heres-how\/","key":"2_CR88"},{"issue":"2","key":"2_CR89","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1177\/09636625221113131","volume":"32","author":"Y Peng","year":"2023","unstructured":"Peng, Y. (2023). The role of ideological dimensions in shaping acceptance of facial recognition technology and reactions to algorithm bias. Public Understanding of Science, 32(2), 190\u2013207. https:\/\/doi.org\/10.1177\/09636625221113131","journal-title":"Public Understanding of Science"},{"unstructured":"Polisen (2024). Facial recognition in airport. Retrieved June 4, 2024, from https:\/\/polisen.se\/en\/laws-and-regulations\/travel-to-and-stay-in-sweden\/border-control\/bearer-verification\/","key":"2_CR90"},{"key":"2_CR91","doi-asserted-by":"publisher","DOI":"10.4324\/9780203849415","author":"J Pugliese","year":"2010","unstructured":"Pugliese, J. (2010). Bodies, technologies, biopolitics. Routledge. https:\/\/doi.org\/10.4324\/9780203849415","journal-title":"Routledge"},{"doi-asserted-by":"crossref","unstructured":"Ramiro, A., & Cruz, L. (2023). The grey-zones of public-private surveillance: Policy tendencies of facial recognition for public security in Brazilian cities. Internet Policy Review. Journal of Internet Regulation, 12(1), 1\u201323.","key":"2_CR92","DOI":"10.14763\/2023.1.1705"},{"issue":"10","key":"2_CR93","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0258241","volume":"16","author":"K Ritchie","year":"2021","unstructured":"Ritchie, K., Cartledge, C., Growns, B., et al. (2021). Public attitudes towards the use of automatic facial recognition technology in criminal justice systems around the world. PLoS ONE, 16(10), e0258241. https:\/\/doi.org\/10.1371\/journal.pone.0258241","journal-title":"PLoS ONE"},{"issue":"6","key":"2_CR94","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1177\/03063127221119424","volume":"52","author":"K Rommetveit","year":"2022","unstructured":"Rommetveit, K., & Van Dijk, N. (2022). Privacy engineering and the techno-regulatory imaginary. Social Studies of Science, 52(6), 853\u2013877. https:\/\/doi.org\/10.1177\/03063127221119424","journal-title":"Social Studies of Science"},{"issue":"3","key":"2_CR95","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1080\/1369118X.2020.1792530","volume":"25","author":"J S\u00e1nchez-Monedero","year":"2022","unstructured":"S\u00e1nchez-Monedero, J., & Dencik, L. (2022). The politics of deceptive borders: \u2018Biomarkers of deceit\u2019 and the case of iBorderCtrl. Information, Communication & Society, 25(3), 413\u2013430. https:\/\/doi.org\/10.1080\/1369118X.2020.1792530","journal-title":"Information, Communication & Society"},{"doi-asserted-by":"publisher","unstructured":"Schiff, D. (2024). Framing contestation and public influence on policymakers: Evidence from US artificial intelligence policy discourse. Policy and Society, puae007. https:\/\/doi.org\/10.1093\/polsoc\/puae007","key":"2_CR96","DOI":"10.1093\/polsoc\/puae007"},{"key":"2_CR97","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s00146-021-01199-9","volume":"37","author":"M Smith","year":"2022","unstructured":"Smith, M., & Miller, S. (2022). The ethical application of biometric facial recognition technology. AI & Society, 37, 167\u2013175. https:\/\/doi.org\/10.1007\/s00146-021-01199-9","journal-title":"AI & Society"},{"doi-asserted-by":"publisher","unstructured":"Smith, M., & Miller, S. (2021). Facial recognition and privacy rights. In Biometric identification, law and ethics (pp. 21\u201328). Springer. https:\/\/doi.org\/10.1007\/978-3-030-90256-8_2","key":"2_CR98","DOI":"10.1007\/978-3-030-90256-8_2"},{"key":"2_CR99","volume-title":"AI for diversity","author":"R S\u00f8raa","year":"2023","unstructured":"S\u00f8raa, R. (2023). AI for diversity. Routledge."},{"doi-asserted-by":"publisher","unstructured":"Steinhoff, J. (2023). AI ethics as subordinated innovation network. AI & Society, 1\u201313. https:\/\/doi.org\/10.1007\/s00146-023-01658-5","key":"2_CR100","DOI":"10.1007\/s00146-023-01658-5"},{"unstructured":"Strong, M. (2023, October 13). Taipei city accused of using biometric recognition systems made in China. Taiwan News. Retrieved June 5, 2024, from https:\/\/www.taiwannews.com.tw\/news\/5019609","key":"2_CR101"},{"key":"2_CR102","first-page":"17","volume-title":"Digital silk road in central Asia: Present and future","author":"C Stryker","year":"2021","unstructured":"Stryker, C. (2021). Digital silk road and surveillance technology in central Asia. In N. Kassenova & B. Duprey (Eds.), Digital silk road in central Asia: Present and future (pp. 17\u201354). Davis Center for Russian and Eurasian Studies."},{"unstructured":"Tiremeurostodasuamira. (2022, June 21). Minha operadora. Ativistas pedem banimento do reconhecimento facial na seguran\u00e7a p\u00fablica. Retrieved April 19, 2024, from https:\/\/tiremeurostodasuamira.org.br\/minha-operadora-ativistas-pedem-banimento-do-reconhecimento-facial-na-seguranca-publica\/","key":"2_CR103"},{"unstructured":"Tyler, H. (2022, February 2). The increasing use of artificial intelligence in border zones prompts privacy questions. Migration Policy Institute. Retrieved April 12, 2024, from https:\/\/www.migrationpolicy.org\/article\/artificial-intelligence-border-zones-privacy","key":"2_CR104"},{"issue":"2\u20133","key":"2_CR105","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1080\/13600869.2018.1457002","volume":"32","author":"N van Dijk","year":"2018","unstructured":"van Dijk, N., Tanas, A., Rommetveit, K., & Raab, C. (2018). Right engineering? The redesign of privacy and personal data protection. International Review of Law, Computers and Technology, 32(2\u20133), 230\u2013256. https:\/\/doi.org\/10.1080\/13600869.2018.1457002","journal-title":"International Review of Law, Computers and Technology"},{"unstructured":"Van Noorden. (2020a, November 18). The ethical questions that haunt facial-recognition research. Nature\u2014News Feature. Retrieved May 9, 2024, from https:\/\/www.nature.com\/articles\/d41586-020-03187-3","key":"2_CR106"},{"unstructured":"Van Noorden. (2020b, November 19). What scientists really think about the ethics of facial recognition research. Nature\u2014News Feature. Retrieved May 9, 2024, from https:\/\/www.nature.com\/articles\/d41586-020-03257-6","key":"2_CR107"},{"unstructured":"Vavoula, N. (2020). Police information exchange. The future developments regarding Pr\u00fcm and the API Directive. Study commissioned for the LIBE Committee. Retrieved April 12, 2024, from https:\/\/www.europarl.europa.eu\/thinktank\/en\/document\/IPOL_STU(2020)658542","key":"2_CR108"},{"unstructured":"Viet-Ditlmann, K., & Asz\u00f3di, N. (2024, March 13). EU parliament votes on AI Act; Member states will have to plug surveillance loopholes. Algorithm Watch. Retrieved May 3, 2024, from https:\/\/algorithmwatch.org\/en\/eu-parliament-votes-on-ai-act\/","key":"2_CR109"},{"issue":"7","key":"2_CR111","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0254201","volume":"16","author":"P Weingart","year":"2021","unstructured":"Weingart, P., Joubert, M., & Connoway, K. (2021). Public engagement with science\u2014Origins, motives and impact in academic literature and science policy. PLoS ONE, 16(7), e0254201. https:\/\/doi.org\/10.1371\/journal.pone.0254201","journal-title":"PLoS ONE"},{"key":"2_CR112","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-023-01648-7","author":"Y Wen","year":"2023","unstructured":"Wen, Y., & Holweg, M. (2023). A phenomenological perspective on AI ethical failures: The case of facial recognition technology. AI & Society. https:\/\/doi.org\/10.1007\/s00146-023-01648-7","journal-title":"AI & Society"},{"issue":"1","key":"2_CR113","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1177\/0007650317718185","volume":"58","author":"SM West","year":"2019","unstructured":"West, S. M. (2019). Data capitalism: Redefining the logics of surveillance and privacy. Business & Society, 58(1), 20\u201341. https:\/\/doi.org\/10.1177\/0007650317718185","journal-title":"Business & Society"},{"issue":"1","key":"2_CR114","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2021.101652","volume":"39","author":"C Wilson","year":"2022","unstructured":"Wilson, C. (2022). Public engagement and AI: A values analysis of national strategies. Government Information Quarterly, 39(1), 101652. https:\/\/doi.org\/10.1016\/j.giq.2021.101652","journal-title":"Government Information Quarterly"}],"container-title":["Ethical Assemblages of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-4158-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T09:30:01Z","timestamp":1744277401000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-4158-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819641574","9789819641581"],"references-count":112,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-4158-1_2","relation":{},"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"30 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}