A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Introduction into the Use of Biometric Technology
[chapter]
2013
Privacy and Data Protection Issues of Biometric Applications
He is often credited with being the fi rst European to recognize the importance of fi ngerprint for identifi cation. 7 4 A. ...
The kings of Babylon were supposedly using an imprint of their right hands in the clay tables in order to authenticate the tables. 2 In Babylonia , fi ngerprints were also used in business transactions ...
Large scale biometric systems usually deploy the identifi cation mode which identifi es the data subjects and which in addition offers the advantages of allowing a duplicate enrolment check (e.g., systems ...
doi:10.1007/978-94-007-7522-0_2
fatcat:otoxbngsffaulksxg6ad75u52i
A Taxonomy of Government Approaches Towards Online Identity Management
2010
2010 43rd Hawaii International Conference on System Sciences
This debate is sometimes obscured by the lack of clarity regarding the specific approach that a government adopts towards identity management. ...
A government's approach towards establishing the online identity of its citizens is often subject to heated debate. ...
They are Australia (decentralized approach), the United States The data for these case studies was collected by the first author in the context of the project GUIDE, a European Union-funded project that ...
doi:10.1109/hicss.2010.38
dblp:conf/hicss/SeltsikasH10
fatcat:nmd3gh4zxbfnfelss6zwqxq4kq
Promises, Social, and Ethical Challenges with Biometrics in Remote Identity Onboarding
[chapter]
2022
Advances in Computer Vision and Pattern Recognition
Checking a person's physical presence and appearance has been an essential part of identity enrolling procedures to avoid the risk of identity forgery. ...
The main social and ethical issues with biometrics in remote identity onboarding are (1) the risk of harming integrity of personal identity and misuse of it; (2) the risk of privacy invasion and function ...
Acknowledgements This research was funded by the European Commission, grant number 883356-Image Manipulation Attack Resolving Solutions (iMARS). ...
doi:10.1007/978-3-030-87664-7_20
fatcat:cbw4bwttdjbrjd4bj66p76csnm
Access To Travel Documents (Deliverable 7.6)
2016
Zenodo
The objective of Work Package 7 (WP7) is to study, from the perspective of European Union citizenship, specific problems individuals face in exercising their civil rights and liberties in areas which fall ...
In keeping with the approach adopted in the WP thus far, the task leader (UA) drafted the following questionnaire for the purpose of drawing up country reports, a first d [...] ...
Council adopted by the European Union on 30 November1994. ...
doi:10.5281/zenodo.61783
fatcat:tga6lkguwrekxcrqhbz5yb6vxm
Assessment of the Turkish Local e-Governments: An empirical study
2008
International Journal of Human Sciences
In this research, we first evaluated the current practices of the Turkish local e-governments. ...
We suggest the results might provide a deeper understanding of local e-governments in Turkey and lend support to advances in this under-researched area. ...
The most frequent relationship occurs with government at this level (European Union [EU], 2003). ...
doi:10.14687/ijhs.v5i2.333
fatcat:yyweotaldjhfnogfnl5upcuxja
How to meet national quality initiatives: best practices
2009
Journal of Thrombosis and Thrombolysis
The implementation of ECVET instrument is still voluntary in the European Union. ...
report on education and training in the nuclear energy field in the European Union -the most recent Commission Staff Working Document, issued in October 2014 1 , gives overview of the latest E&T efforts ...
A great deal of additional information on the European Union is available on the Internet. It can be accessed through the Europa server http://europa.eu. ...
doi:10.1007/s11239-009-0406-3
pmid:19908125
fatcat:sxvxlm4y4jb4hkr6zbhgy6vh34
Identification for Development: The Biometrics Revolution
2013
Social Science Research Network
Formal identification is a prerequisite for development in the modern world. ...
Many programs now aim to provide individuals in poor countries with more robust official identity, often in the context of the delivery of particular services. ...
In this 1:N comparison, the computer checks the enrolled biometric template against each previously-enrolled template to see if there are any matches. ...
doi:10.2139/ssrn.2226594
fatcat:tbcm7dn6hfgx3f47owsbz3vria
Digital Identities and Verifiable Credentials
2021
Business & Information Systems Engineering
Luxembourg National Research Fund (FNR) and PayPal for their support of the PEARL project ''P17/IS/13342933/PayPal-FNR/Chair in DFS/Gilbert Fridgen''. ...
Acknowledgements We thank Jasmin Huber for compiling an identity management bibliography; we thank Alexandre Amard, Tamara Roth, and our anonymous reviewer for their valuable feedback; and we gratefully acknowledge the ...
and Trust Services Regulation (Alamillo-Domingo 2020; The Council of the European Union 2014). ...
doi:10.1007/s12599-021-00722-y
fatcat:fhumgpmumvgubcqcrtkea5it2u
Transforming travel and border controls: Checkpoints in the Open Society
2005
Government Information Quarterly
By looking at the negotiations between the U.S. and the European Commission on passenger name records (PNR), the debates in Canada regarding the collection of passenger information, and the deployment ...
Prior concerns regarding terrorism resulted in a rush to legislate. Now terrorism is not the only issue in the new security agenda, and we appear to have stopped rushing our legislative processes. ...
border checks. 93 When the EU begins fingerprinting all nationals of its member states to provide biometric border checks and passports, as it intends to do within the next two years, perhaps questions ...
doi:10.1016/j.giq.2006.01.002
fatcat:hz74nd3s75fotcm42dpwx43zxy
Polish-Soviet Relations 1932–1939
1964
International Affairs
A lin e to be determined on th e spot running toward s th e northeas t th en towards th e n orth , passin g between Lak e Bolosza and Lake Dringis, and leaving in Lithuanian territory th e localities ...
Done at Moscow in duplicate, in the Polish and Russian langu ages, the 5th da y of M ay, 1934. ...
with the U.S.S.R., and has adopted a hostile attitude towards the Soviet Union. ...
doi:10.2307/2609748
fatcat:mgddrsfwzfc7pjij52x2qt7ilq
Polish-Soviet Relations1
1934
International Affairs
A lin e to be determined on th e spot running toward s th e northeas t th en towards th e n orth , passin g between Lak e Bolosza and Lake Dringis, and leaving in Lithuanian territory th e localities ...
Done at Moscow in duplicate, in the Polish and Russian langu ages, the 5th da y of M ay, 1934. ...
with the U.S.S.R., and has adopted a hostile attitude towards the Soviet Union. ...
doi:10.2307/2603138
fatcat:xfcuweacvzeg3of3y2hrrdojje
Biometrics: In Search of Identity and Security (Q & A)
2017
IEEE Multimedia
Despite the great progress in the field, several exigent problems have yet to be addressed to unleash biometrics full potential. ...
To address the issues like identity theft and security threats, a continuously evolving technology known as biometrics is presently being deployed in a wide range of personal, government, and commercial ...
ACKNOWLEDGMENT This research work has been partially supported by a grant from the European Commission (H2020 MSCA RISE 690907 "IDENTITY"). ...
doi:10.1109/mmul.2017.265090754
fatcat:lab3frtx2na6tc65gcp4cxfdqm
The Future of Transnational Self-Regulation Enforcement and Compliance in Professional Services
2017
Social Science Research Network
due to become China's first comprehensive trade and investment agreement with a supranational customs union. ...
This article examines such developments in the area of professional services. ...
enrolled as an advocate. ...
doi:10.2139/ssrn.2954143
fatcat:e434sq2c7vfjfnqpkmondylv2a
The Development of Citizen Oriented Informatics
2010
Informatică economică
Quality characteristics are set for computer applications developed in the conditions of citizen-oriented computing and outline the development cycle for these applications. ...
We define the concept of citizen-oriented computer application. ...
citizen of the European Union; achieving a single market for information society and media. ...
doaj:e3d5b6ca3832497a963bde47d9c8a7e2
fatcat:yezcv2x75vh5rlig2kgndzgkne
REGULATORY CONVERGENCE IN EU SECURITIES REGULATION
2007
Tilburg Law Review
check the balance of executive power. ...
Barber, "Legal Pluralism and the European Union" (2006) 12 ELJ 306. ...
doi:10.1163/221125907x00489
fatcat:sskh4k5qh5dvhnsk4hx6avgjyq
« Previous
Showing results 1 — 15 out of 711 results