Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

Big Data Privacy Issues in Public Social Media Reporter : Ximeng Liu Supervisor: Rongxing Lu School of EEE, NTU
Face Processing in Social Networking Services NTIA Privacy Multistakeholder Process: Commercial Facial Recognition Technology March 25, 2014 Olga Raskin.
Unit 7: Store and Retrieve it Database Management Systems (DBMS)
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
Computers Are Your Future Twelfth Edition
Cyberculture and Privacy Baase, Chp 2. Cyberculture and Privacy A.Computers and Privacy Computers are not needed for the invasion of privacy. 1.Computers.
The Role of Computers in Surveillance ~ Katie Hatland.
3 Ethics and Privacy.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
Discovering Computers Chapter 1 Discovering Computers & Microsoft Office 2010.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
Data Mining By Andrie Suherman. Agenda Introduction Major Elements Steps/ Processes Tools used for data mining Advantages and Disadvantages.
Karthiknathan Srinivasan Sanchit Aggarwal
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
© Paradigm Publishing, Inc. 5-1 Chapter 5 Application Software Chapter 5 Application Software.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
PRIVACY Britt, Beattie and Amy. What are the issues regarding privacy on the internet? Privacy issues arise everyday. Examples of when privacy becomes.
Sonja Campbell CSC 104. Index  Week 1  Topic 1 Topic 1  Topic 2 Topic 2  Week 2  Topic 1 Topic 1  Topic 2 Topic 2  Week 3  Topic 1 Topic 1  Topic.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Business Software What is database software? p. 145 Allows you to create, access, and manage data Add, change, delete, sort, and retrieve data Next.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
In general, the cloud is the concept of remotely hosted IT services (cloud apps) provided by a supplier (cloud providers)
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Face Recognition System By Arthur. Introduction  A facial recognition system is a computer application for automatically identifying or verifying a person.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
SECURITY IN CLOUD COMPUTING By Bina Bhaskar Anand Mukundan.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Wil Haywood Rossana Bua Rhishi Katoch Kelvyn Araujo-Valdez Steve Kim.
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
CS5038 The Electronic Society Lecture: Social Networking Lecture Outline Social Networking Service Social Networking Sites –Bebo –Friendster –MySpace Social.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Targeted Behavioral Advertising Ariel Pierre Section 001.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
SMART SHOPPING ONLINE. VOCABULARY: 30 Day Rule: merchants ship goods within 30 days or inform the customer of delays and their right to cancel the order.
Living in a Digital World Discovering Computers Fundamentals, 2011 Edition.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Machine Learning. Definition Machine learning is a subfield of computer science that evolved from the study of pattern recognition and computational.
Smart PWNs: An Ethical Analysis of Smart Phone Technology Colin O'Hanlon Josh Schwartz Norman Littlejohn.
Individual Activity: After reading the article, “Facial Recognition Technology” answer the questions on the assigned worksheet.
Lecture4 Information Privacy 1-1. Overview Introduction Perspectives on privacy Information disclosures Data mining 1-2.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Professor Jonathan Raper City University London & Placr Ltd. Rejecting the privacy transaction.
Ide kerülhet az előadás címe Julia Sziklay: Facial recognition – a relevant example of biometric data collection Sarajevo,
Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.
E-Commerce services.
Facebook privacy policy
Privacy and Public Policy Implications of IoT
Contract Lifecycle Management In the Disruptive Age
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
The Internet Industry Week Two.
MICROSOFT OUTLOOK and Outlook service Provider
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Merchant Stronghold Merchant Stronghold is the #1 High Risk Merchant Services Provider High Risk Merchant ServicesHigh Risk Merchant Services.
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Facial Recognition [Biometric]
Unit# 5: Internet and Worldwide Web
Privacy in the Age of Augmented Reality
Presentation transcript:

Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson Facial Recognition Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson

Facial Recognition A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. It is typically used in security systems. www.extremetech.com

How It Works Detect and isolate human faces captured by the camera Analyze them using an algorithm that extracts identifying features “Nodal points" creativentechno.wordpress.com

How the Professionals Thinks About Larry Strickling, the administrator of NTIA "Facial recognition technology has the potential to improve services for consumers… However, the technology poses distinct consumer privacy challenges…" The Federal Trade Commission "Facial recognition technology has been adopted in a variety of new contexts… Its increased use has raised a variety of privacy concerns.” pharmaceutical

Federal Law NO federal law explicitly addresses the collection and storage of faceprints. However, some states have dealt with the issue in their legislatures. theduncanlawfirm.blogspot.com

The Privacy Act of 1974 It governs collection, maintenance, and storage of records on individuals in the United States. “Record” - include any item, collection or grouping of information about an individual that is maintained by an agency...and that contains his name, or the identifying number, symbol, or other identifying particular assigned to the individual.

The Stored Communication Act Electronic communications services - "any transfer of signs, signals, writing, images, sounds....“ Remote computing services How about videos?

The Fourth Amendment www.daytondui.com

Advantages What is facial recognition good for: Surveillance or tracking Automation in security systems It generally faster than other forms of security

Disadvantages What are the down sides to this technology Users may feel that this technology is a breach of their privacy will be more errors that will arise with this type of technology this type of technology is more expensive

What are some Current uses? Security Image Database investigations General identity verification Surveillance

Two Examples of these uses: Facebook Facial recognition is used for photo tagging and suggestions of who is in a picture TSA/Law Enforcement Agencies In airports for country entrance and for searching and tracking people that might be involve in criminal activities

Future of Facial Recognition Department Stores Police Departments Secure Buildings Streets Mobile Devices ..Everywhere

Mobilizing Facial Recognition Google Glass Smart Watches Smart Phones Wearable Tech

Big Data Social Media Cloud Computing

Big Data & Social Media “So essentially, we can start from an anonymous face, offline or online, and we can use facial recognition to give a name to that anonymous face thanks to social media data. But a few years back, we did something else. We started from social media data, we combined it statistically with data from U.S. government social security, and we ended up predicting social security numbers, which in the United States are extremely sensitive information.” - Alessandro Acquisti

Current Tech. In one experiment, Acquisti's team identified individuals on a popular online dating site where members protect their privacy through pseudonyms. In a second experiment, they identified students walking on campus — based on their profile photos on Facebook. In a third, the team predicted personal interests and, in some cases, even the Social Security numbers of the students, beginning with only a photo of their faces.

Future Apps Targeted advertizing in stores Real-world data mining Criminal identification

Legal Concerns Information such as click streams, likes, dislikes, and shopping history are not legally prevented from being sold.

Opt In or Opt Out? Opt out by sending personal information and a head-shot to a company in order to be placed on a “do not identify” list. Opt in by shopping at stores or locations that inform their customers that facial recognition is used in their facilities

Does Privacy Matter? "Ultimately, all this access is going to force us to reconsider our notions of privacy. It may also affect how we interact with each other" - Alessandro Acquisti

Resources Wikipedia contributors. "Facial recognition system."Wikipedia, The Free Encyclopedia. 31 Mar 2014. <http://en.wikipedia.org/wiki/Facial_recognition_system>. Levashov, Kirill. "The Rise of a New Type of Surveillance for Which the Law Wasn’t Ready." Columbia Science and Technology Law Review. (2013): n. page. Web. 2 Apr. 2014. <http://www.stlr.org/volumes/volume-xv-2013-2014/the-rise-of- a-new-type-of-surveillance-for-which-the-law-wasn’t-ready/>. Tummarello, Kate . "Administration will review facial recognition technology." Capitol Hill Publishing Corp. 31 Dec 2013, 16. Web. 2 Apr. 2014.

Resources Cont. Cooney, Michael . "Facial recognition security, privacy issues grab FTC attention; Facial recognition technology on the rise as governments increase use; Facebook, Microsoft implement it." Network World26 Sep 2011, n. pag. Web. 2 Apr. 2014. http://www.hhs.gov/ocr/privacy/hipaa/understanding/index.html http://www.hanvon.com/en/products/FaceID/downloads/FAQ.ht ml#03 http://wiki.answers.com/Q/ What_are_the_advantages_and_disadvantages_of_face_recog nition_system?#slide=3

Resources Cont. http://www.slideshare.net/avinash_mechies/facial-recognition- technology-15629643 https://www.facebook.com/help/122175507864081 http://electronics.howstuffworks.com/gadgets/high-tech- gadgets/facial-recognition4.htm http://arxiv.org/ftp/arxiv/papers/1403/1403.0485.pdf http://www.theverge.com/2014/2/6/5385674/senator-al-franken- raises-concerns-over-google-glass-facial-recognition-app http://www.ted.com/talks/alessandro_acquisti_why_privacy_mat ters/transcript#t-195317