{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T14:20:37Z","timestamp":1648909237298},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Consumer Electron. Mag."],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/mce.2014.2317915","type":"journal-article","created":{"date-parts":[[2014,6,26]],"date-time":"2014-06-26T18:30:53Z","timestamp":1403807453000},"page":"62-69","source":"Crossref","is-referenced-by-count":0,"title":["Biometric Systems in the Czech Republic: Friends or foes?"],"prefix":"10.1109","volume":"3","author":[{"given":"Katerina","family":"Sulovska","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Security & privacy in large scale biometric systems","author":"snijder","year":"2012","journal-title":"Report European Biometrics Forum"},{"key":"ref38","article-title":"A trusted biometric system","author":"chen","year":"2002","journal-title":"Tech Rep"},{"key":"ref33","first-page":"530","article-title":"Security evaluation of behavioral biometric systems","author":"henniger","year":"2012","journal-title":"Security Evaluation of Behavioral Biometric System"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.02.003"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.05.001"},{"key":"ref30","article-title":"Computer Security SS3: Biometric authentication","author":"kothavale","year":"2001"},{"key":"ref37","article-title":"Privacy, trust and biometrics","author":"brown","year":"2009","journal-title":"Biometrics Working Group"},{"key":"ref36","article-title":"Biometrics: Who's watching you?","author":"abernathy","year":"2003"},{"key":"ref35","article-title":"techBiometric","year":"1999","journal-title":"Issues and concerns"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1561\/1100000004"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-009-0218-1"},{"key":"ref40","article-title":"Biometrics and privacy","author":"stevens","year":"2009","journal-title":"Computer Weekly com The Data Trust Blog"},{"key":"ref11","author":"arsten","year":"2011","journal-title":"AADHAR"},{"key":"ref12","article-title":"v.v.i. Tolerance to selected groups","year":"2011","journal-title":"press release"},{"key":"ref13","article-title":"v.v.i. Security risks for the Czech Republic according to the public","year":"2010","journal-title":"press release"},{"key":"ref14","article-title":"Biometry and Identity of Individual in Forensic and Commercial Applications","author":"rak","year":"2008"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"ref16","author":"jain","year":"1998","journal-title":"Biometrics Personal Identification in Networked Society"},{"key":"ref17","article-title":"Security & trust: Taking care of the human factor","volume":"9","author":"egger","year":"2011","journal-title":"Electronic Payment Systems Observatory Newsletter"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(95)00005-S"},{"key":"ref19","author":"norman","year":"2007","journal-title":"Integrated Security Systems Design Concepts Design and Implementation"},{"key":"ref28","article-title":"Prosperita.cz: O biometrii je nejve?t&#x0161;&#x00ED;z&#x00E1;jemveslu&#x017E;b&#x00E1;ch","author":"lesensk\u00fd","year":"2009"},{"key":"ref4","first-page":"2","article-title":"Biometrics: Identification and verification for tomorrow?","author":"richardson","year":"0","journal-title":"Technology and Privacy in the New Millenium"},{"key":"ref27","article-title":"The dark side of Biometrics: 9 million Israelis' hacked info hits the Web","author":"ungerleider","year":"2009"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2979\/eservicej.7.3.20"},{"key":"ref6","first-page":"67","article-title":"Transformative biometrics and the exercise of arbitrary power","author":"lodge","year":"0","journal-title":"Proc Int Conf of the Biometrics Special Interest Group (BIOSIG)"},{"key":"ref29","author":"pato","year":"2010","journal-title":"Biometric Recognition Challenges and Opportunities"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10610-006-9016-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2010.11.004"},{"key":"ref7","article-title":"Encyclopaedia of information ethics and security","author":"quigley","year":"2008","journal-title":"Hershey Medical Information Science Reference"},{"key":"ref2","year":"2009","journal-title":"Biometrics-Task Force Annual report FY09"},{"key":"ref9","year":"2009","journal-title":"Biometrics Enhancing security or invading privacy? Opinion"},{"key":"ref1","article-title":"Open Street CCTV in Australia: A comparative study of establishment and operation","author":"wilson","year":"2012"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1007\/b138151","author":"wayman","year":"2005","journal-title":"Biometric Systems Technology Design and Performance Evaluation"},{"key":"ref45","first-page":"3","article-title":"Latest iPAQ relies on fingerprint security","volume":"13","author":"castle","year":"2005","journal-title":"Biometric Technol Today"},{"key":"ref22","article-title":"Biometrics: Enhancing privacy, security and trust through Privacy by Design","author":"stoianov","year":"0","journal-title":"Proc IAPP Canada Privacy Symp"},{"key":"ref21","article-title":"Biometric identification & homeland security-Biometrics pros and cons","author":"zalman","year":"2012"},{"key":"ref42","first-page":"33","article-title":"Biometric vs. password authentication: A user's perspective","volume":"5","author":"dike-anyiam","year":"2006","journal-title":"J Information Warfare"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2006070101"},{"key":"ref41","first-page":"92","article-title":"Introduction of a multi-modular acceptance and usability questionnaire. Deliverable D6.5","author":"troitzsch","year":"2005","journal-title":"Introduction of a Multi-Modular Acceptance and Usability Questionnaire version 1 2"},{"key":"ref23","article-title":"Can you trust your biometric authentication system?-An NSA perspective, in","author":"ott","year":"0","journal-title":"Proc 2010 Biometric Consortium Conf Technology Expo Sept 21&#x2013;23 2010"},{"key":"ref44","first-page":"737","article-title":"A study of biometrics security system","volume":"2","author":"awasthi","year":"2013","journal-title":"International Journal of Innovative Research & Development"},{"key":"ref26","article-title":"Regional Office of Zl&#x00ED;n Region","year":"2012","journal-title":"Zl&#x00ED;n Region Population info"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2013.2239152"},{"key":"ref25","article-title":"A lack of biometrics trust","author":"kumar","year":"2008","journal-title":"CIO"}],"container-title":["IEEE Consumer Electronics Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962380\/6844917\/06844957.pdf?arnumber=6844957","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:56:01Z","timestamp":1642006561000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6844957\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":45,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mce.2014.2317915","relation":{},"ISSN":["2162-2248","2162-2256"],"issn-type":[{"value":"2162-2248","type":"print"},{"value":"2162-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7]]}}}