{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:10:32Z","timestamp":1729653032264,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335051","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T17:50:11Z","timestamp":1448301011000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Biometric identification: Are we ethically ready?"],"prefix":"10.1109","author":[{"given":"Karen","family":"Renaud","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Hoskins","sequence":"additional","affiliation":[]},{"given":"Rossouw","family":"von Solms","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Google's tax avoidance is called &#x2018;capitalism&#x2019; says chairman Eric Schmidt","article-title":"Daily Telegraph","year":"2012","key":"ref39"},{"article-title":"Understanding Privacy","year":"2008","author":"solove","key":"ref38"},{"key":"ref33","article-title":"A crying shame: sexual abuse in children shelters","author":"raza","year":"2012","journal-title":"Firstpost"},{"journal-title":"Police Launch Mugshots Database to Catch Criminals Moving Around the Country","year":"2012","author":"peachey","key":"ref32"},{"journal-title":"Summary of NIST Standards for Biometric Accuracy Tamper Resistance and Interoperability NIST Tech Rep","article-title":"NIST","year":"2002","key":"ref31"},{"article-title":"Surveillance Creep in the Genetic Age","year":"2003","author":"nelkin","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2005.1594817"},{"journal-title":"High Level Summary of Statistics Trend","article-title":"Scottish Government","year":"2011","key":"ref36"},{"key":"ref35","article-title":"Warning over pupil fingerprinting","author":"sellgren","year":"2010","journal-title":"BBC News"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.euroecorev.2010.12.006","article-title":"Cross-country causes and consequences of the crisis: An update","volume":"55","author":"rose","year":"2011","journal-title":"European Economic Review"},{"journal-title":"Clitheroe pub loses licence after underage sales","article-title":"Clitheroe Advertiser and Times","year":"2011","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1177\/1750698008093795"},{"journal-title":"UK Government loses data on 25 million Britons","article-title":"Computer Weekly","year":"2007","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1283920.1283947"},{"year":"2010","author":"deuze","key":"ref13"},{"article-title":"A Mind So Rare: The Evolution of Human Consciousness","year":"2002","author":"donald","key":"ref14"},{"key":"ref15","article-title":"The perception of biometric technology: A survey. Automatic Identification Advanced Technologies","author":"elliott","year":"2007","journal-title":"IEEE Workshop on"},{"journal-title":"Off-licences worsen teenage drinking report warns News scotsman com","year":"2012","author":"foster","key":"ref16"},{"journal-title":"Discipline and Punish","year":"1979","author":"foucault","key":"ref17"},{"journal-title":"From the Iriscode to the Iris A New Vulnerability of Iris Recognition Systems White paper for Black Hat USA","year":"2012","author":"galbally","key":"ref18"},{"article-title":"Premediation: Affect and Mediality After 9\/11","year":"2012","author":"grusin","key":"ref19"},{"key":"ref28","article-title":"Bad news: Murdoch's Australian and the shaping of the nation","volume":"43","author":"manne","year":"2011","journal-title":"Quarterly essay"},{"journal-title":"Government loses one PC a week","article-title":"BBC","year":"2008","key":"ref4"},{"article-title":"When Biometrics Fail: Gender, Race and the Technology of Identity","year":"2012","author":"magnet","key":"ref27"},{"journal-title":"Blitz targets under-age drinking","article-title":"BBC","year":"2004","key":"ref3"},{"journal-title":"Glasgow Nightclubs start using fingerprint data","article-title":"BBC","year":"2011","key":"ref6"},{"key":"ref29","article-title":"Orphan children in Haryana, India subject to biometric data gathering","author":"mayhew","year":"2012","journal-title":"Biometric Update com"},{"journal-title":"Company loses data on criminals","article-title":"BBC","year":"2008","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4135\/9781446288153"},{"journal-title":"Data breaches 10 times worse say ICO figures","article-title":"BBC","year":"2012","key":"ref7"},{"key":"ref2","article-title":"Biometrics, identifying data and human rights","author":"ameisen","year":"0","journal-title":"Opinion No 98 National Consultative Ethics Committee for Health and Life Science"},{"article-title":"Memory practices in the sciences","year":"2005","author":"bowker","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/08913810902952903"},{"article-title":"Do we want trust in government? in Democracy and Trust","year":"1999","author":"hardin","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1177\/1750698011402570"},{"journal-title":"Can you lose your fingerprints? Scientific American","year":"2009","author":"harmon","key":"ref21"},{"article-title":"Privacy and Freedom","year":"1967","author":"westin","key":"ref42"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"article-title":"Ethical aspects of Biometric Identification Technologies in a Multicultural Society","year":"0","author":"venier","key":"ref41"},{"journal-title":"Media and Memory","year":"2012","author":"hoskins","key":"ref23"},{"key":"ref26","article-title":"City clubbers give scanner thumbs up","volume":"27","author":"mackenzie","year":"2011","journal-title":"Scottish Licenced Trade News"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-007-9003-z"},{"key":"ref25","first-page":"1","article-title":"The European Commission's proposed data protection regulation: A copernican revolution in European data protection law","volume":"6","author":"kuner","year":"2012","journal-title":"Bloomberg BNA Privacy and Security Law Report"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","start":{"date-parts":[[2015,8,12]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335051.pdf?arnumber=7335051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T20:14:45Z","timestamp":1498248885000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335051\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335051","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}