Acceptance of Biometrics: Things That Matter That We Are Ignoring Andrew Patrick, Ph.D. Information Security Group Institute for Information Technology.

Slides:



Advertisements
Similar presentations
Session 3: Safer Services in a Digital Society Security with RFID Gérald Santucci European Commission Head of Unit DG INFSO/D4.
Advertisements

Developing a Positive Identity
The Perception of Privacy Risk Gerald W. Gates Chief Privacy Officer U.S. Census Bureau.
TRP Chapter Chapter 6.8 Site selection for hazardous waste treatment facilities.
This We Believe: Keys to Educating Young Adolescents The position paper of the Association for Middle Level Education.
They’re Computer Savvy, Right? Well, Maybe…
Broader Impacts: Meaningful Links between Research and Societal Benefits October 23, 2014 Martin Storksdieck I Center for Research on Lifelong STEM Learning.
Incorporating Literacy into the Science Classroom Michelle Buroker Scott High School Kenton County School District.
Renée A. Daugherty, Ph.D. and Sue E. Williams, Ph.D. Developing Effective Leaders Citizen Engagement through Public Deliberation.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
A workshop for STEM subjects on Sustainable Development The Higher Education Academy Session 3: STEM and ESD THE SUSTAINABLE PRACTITIONER.
Shades of Grey Suzy Jagger Challenging students in the area of Cyber-ethics.
Data-Sharing and Governance Consultation ANALYSIS OF RESPONSES.
MID/jpl 5/15/ © 1999 by James P. Litchko Total BS Security: Business-based Systems Security Jim Litchko (703) ext. 310.
The Science Council and Sustainability.
1 Suzanne Lockhart M.A. Criminology thesis University of Melbourne, 2005 Current: PhD candidate University of S.A Identity Fraud – Displacement effects.
Electronic Authentication for Flexible Learning Workshop Presentation (5 August 2003) Chris Connolly, CEO, Galexia Consulting.
Usable Biometrics Ashley Brooks Usability and Privacy Cranor, Reiter, and Hong April 11, 2006.
1-Experiential Learning The World Wide Web makes it possible for students to tackle a huge amount of human experience. In such a way, they can learn by.
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
Navigating Privacy and Security Issues for HIE: A Consumer Perspective Deven McGraw Chief Operating Officer National Partnership for Women & Families
MODULE 2 THE BRAND AND CULTURE. Your brand resides within the hearts and minds of customers, clients and prospects. It is the sum total of their experiences.
Techniques in Civic Engagement Presented by Bill Rizzo Local Government Specialist UW-Extension Local Government Center
Overview Science, Technology, Enterprise and Innovation Social issues related to Science and Technology (S&T) Communication of high.
Challenges to a Canadian Identity Policy: Learning from International Experiences Krista Boa, Andrew Clement & Gus Hosein Identity Project - Canada 7th.
Putting Patients First ‘Championing Consumers’ Rights’ Tania Thomas Deputy Health and Disability Commissioner April 2007.
Big Data and Governance in the United Kingdom AAAS, February 13 th 2015 Dr Claire Craig Director, Government Office for Science, UK.
© 2003 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Global Citizenship Walt Rosenberg.
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
ETHICS and COMPUTERS An Overview 23/04/2017.
Hosted by Employee Monitoring Balancing Best Practices and Privacy by Kevin Beaver, CISSP founder and principal consultant Principle Logic, LLC
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Are you… A.L.I.V.E. Ken Tucker B.Sc. MBA Business Mentors.
Communicating with Congress. 30 years working with Members & staff  Research, training, consulting, publications Communications integral to CMF’s mission.
Saleem Badat Vice-Chancellor, Rhodes University Reflecting Forward: Creating and Maintaining Opportunities to Engage with Key Stakeholders.
EHR stakeholder workshop – 11th October EHR integration for clinical research: Legal & Privacy issues Mats Sundgren – AstraZeneca Petra Wilson -
Climate Generation Day 3 Practical Stakeholder and community engagement.
The NMC strategy and its alignment with the education strategy Anne Trotter Assistant Director, Education and QA 16 October 2014.
GENET - European NGO Network on Genetic Engineering: 44 members in 24 countries Mission: to provide information on gene technologies and related topics.
CITEL – San Salvador | 16 April | Electromagnetic Fields: A WHO Perspective Dr E. van Deventer.
European Patients’ Academy on Therapeutic Innovation Aspects of pharmacovigilance: Public hearings.
Security Issues and Challenges in High Performance Grid Computing SASA SUBOTIC SASA SUBOTIC University of Pretoria.
Evaluating Engagement Judging the outcome above the noise of squeaky wheels Heather Shaw, Department of Sustainability & Environment Jessica Dart, Clear.
Digital Inclusion & Readiness: Role of Libraries John B. Horrigan, PhD Pew Research Center June 2015.
LEVEL MARGARET STREET BRISBANE QUEENSLAND 4000 AUSTRALIA P: F: E: Levels of Engagement Suzanne.
Dominique Brossard, Professor and Chair Department of Life Sciences Communication College of Agriculture and Life Sciences University of Wisconsin-Madison.
Multi-Stakeholder Processes : Why, and Where Next? Paul Hohnen UNED Forum Workshop New York, 28 April 2001.
Governance for a Board Monday March 14, Agenda  Introductions  Benefits and challenges of regional cooperation  What is governance  Governance.
Controlled Data Access for Precision Medicine: An Acceptable Trade-off? Yann Joly, Ph.D.
Current IAASB Developments
Intro to ERWC.
Developing a Positive Identity
Effective risk communication
Instructional Coaching Samir Omara RELO-NileTESOL Trainer s. m
BioCatch Fights Financial Fraud and Detects Online Threats via Behavioral Biometrics, All Powered by the Microsoft Azure Platform MICROSOFT AZURE TECH.
Konstantinos Karachalios Managing Director, IEEE Standards Association
Ice-breaker If you were fruit or vegetables, what would you like to be? Why?
Editage Insights Peer Reviewer Development Program
Five Characteristics that Make Top Performers Extraordinary President of Creative Sales Solutions Jim Facente Welcome to our webinar. We plan on providing.
Creating a Culture of Open Data in Academia
Global and local: Science for policy and the role of networks
Institute for Voluntary Action Research
Tonga Institute of Higher Education IT 141: Information Systems
Stakeholder Involvement in Nuclear issues Workshop: Milestones for Nuclear Power Infrastructure Development November 5-9, 2007 Why Stakeholders are.
Internet of Things (IoT) for Industrial Development and Automation
Tonga Institute of Higher Education IT 141: Information Systems
The devil is in the details
FIT4RRI Focus Group Meeting to discuss objectives related to embedding of RRI in monitoring system research. Mary Jane Monaghan Joseph Spencer.
CEng progression through the IOM3
Presentation transcript:

Acceptance of Biometrics: Things That Matter That We Are Ignoring Andrew Patrick, Ph.D. Information Security Group Institute for Information Technology

2 “Biometrics are unique identifiers, but they are not secrets.”

3 "Many people consider this to be a scientific or technical question, but it’s more than that. Ultimately we must adopt an integrated long-term system that is built on sound science, is socially and ethically acceptable to our citizens, and reflects their values. Citizens need to be heard on important public policy issues. This dialogue provides an opportunity for people who do not belong to stakeholder groups to consider the long-term issues in a thoughtful and structured manner and to talk about what they value in determining a way forward." Nuclear Waste Management Organization

4

5 policy matters

6

7 Public Policy Debate how to enhance the public-policy debate about biometrics? how to instill understanding of the technological capabilities and limitations? “…the debate is surrounding a technology that the vast majority of people have no actual experience of using, and therefore what is not so clear is what these people really understand about it” Furnell & Evangelatos, Computer Fraud & Security, 2007

8 context matters

9

10

11 Application Suitability Elliott, Massie, & Sutton, The perception of biometric technology: A survey IEEE Workshop on Automatic Identification Advanced Technologies.

12 Concerns are often not with the biometric system, but with the back-end processes and policies

13 privacy matters

14 Deloitte & Touche survey in 2007 found little interest in Registered Traveler Program, with 75% citing privacy concerns

15

16

17 Schneier’s Mantra “Biometrics are unique identifiers, but they are not secrets.” can biometrics be used to create unique secrets?

18 Ontario Privacy Commissioner and Biometric Encryption Biometric Encryption technology not only holds the promise of superior privacy and personal control for individuals over their own biometric data, but also stronger information security and greater user confidence and trust in biometric identification systems.

19 Selling Privacy Solutions "Here's a solution I've invented and patented which solves the problem you don't know you have, in ways you'll never understand. It gives you other benefits you never expected or sought and frankly wouldn't believe possible until you do the math, which you won't be able to." Microsoft lines up with the good guys on identity tech, By William Heath, 4th April 2008,

20 opinions matter

21 Furnell & Evangelatos study of perceptions about biometrics in the UK survey conducted Mar-June people via or paper 65% of people had “heard or read about” biometrics

22 Sources of Knowledge

23 Preferences For Applications

24 Risks to Health

25 Easy to Cheat?

26 Biometric Information Stolen

27 Limited Use

28 Andrew’s Challenges understand biometrics in-context address non-secret nature of biometrics address privacy issues make strengths and limitations of biometrics transparent engage in meaningful public policy debate