Computer technology brought upon many unexpected ethical issues. When discussing about ethics, we need to talk about the importance of computers and be able to answer questions like: what is the reason for addressing the impact of computers on ethics? In his article “What is computer ethics?” Dr. James Moor analyzed and elaborated the very question. Dr. Moor begins his article by defining computer ethics. In his words, “computer ethics is the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of politics for the ethical use of such technology” (James Moor, 1985). Moor indicated that as computer technology became more entwined with people and their everyday activities, the ethical challenges would become more difficult to conceptualize and do not lend themselves to the development of a static set of rules (Moor, 1985).
I have taken up the research topic Biometrics and Ethics and would like to analyze how Biometric has become part of our everyday life and with it what are the ethical challenges human race faces. Biometrics is the statistical measure of biological beings; it is a system which is used in identifying a person by verifying a physical characteristic or attribute. The reason for its existence is to provide a single computer system login that can immediately detect fraudulent attempts seeking unauthorized access. It is the application of technologies that uses physical traits such as hand geometry, facial and voice recognition, iris and retinal scans in order to verify or recognize a person’s identity. (BITE, n.d.)
Biometrics unique characteristics have made it important in many domains of identification and authentication. The use of finger p...
... middle of paper ...
...h 10, 2011 from
“http://tychong.umuc.edu/tycho/IFSM/304/1102/5151/conference/launchconferencing. Tycho
Christopher Lakasik, 2004. Common Place
http://www.common-place.org/vol-05/no-01/lukasik/2.shtml. Accessed on March 10, 2011
CSSS Policy brief, Biometric identification technology ethics, 2003
http://danishbiometrics.files.wordpress.com/2009/08/news_2.pdf. Accessed on
March 10, 2011
Biometric security and business ethics, n.d.
http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=15. Accessed on
March 10, 2011
BITE, n.d.
http://www.biteproject.org/ethical_legal_social_aspects.asp. Accessed on March 10,
2011
Lorrie Faith Cranor, Simson Garfinkel. Security and Usability: Designing Secure Systems that
People can Use: O’Reilly, 2005
Samir Nanavati. Biometrics: Identity Verification in Networked World. John Wiley and
Sons, 2002
Ethics of technology is one important aspect of ethics and is required to answer all the ethical questions which are specific to the technological age. Ethics of technology can also be defined as “Cyber-ethics”. The main reason for the existence of cyber-ethics is to examine the impact that cyber related crimes has for our social, legal and moral systems. Cyber ethics can also help us in calculating the social policies and laws that we frame with respect to issues...
Biometrics is, “the automated use of physiological or behavioral characteristics to determine or verify identity (biometricgroup.com, 2014).”16 The purpose of the paper is to provide information about different forms of Biometrics. With the ever increasing threat of terrorism at home and abroad, biometrics is emerging as a way to increase security across the world. It is important to point out current issues dealing with Biometrics and how they relate to people that may one day have to use them.
Finally, the three-factor authentication deals with biometrics. This is the use of retinal scanning, voice prints, fingerprints, etc. This is one of the most effiecent authentication processes because the major credential is impossible to steal or imitate. This is because is uses the most unique person of a person. Among all the acess controls, fingerprint scanning is commonly used because fingerprints are unique to one individual noone shares the same finger print.
A biometric recognition system can be used with a number of physiological characteristics (e.g. fingerprint, palmprint, hand geometry, face, iris, ear shape, and retina vein) and behavioral characteristics (e.g. gait, voice, signature and keystroke dynamics) to provide automatic identification of individuals based on their inherent physical and /or behavioral characteristics. Among these biometrics, iris recognition is one of the most accurate and reliable biometric for identification because of following characteristics (i) Iris pattern has complex and distinctive pattern such as arching ligaments, crypts, corona, freckles, furrows, ridges, rings and a zigzag collarette [1]. (ii) possess 266 degrees-of-freedom in variability and uniqueness in the order of one in 1072 [2].
Within the article the authors point out the use of biometric and multi-modal authentication techniques, pointing out the strengths and weaknesses of different authentication approaches. The article has substantial background information and study results, not only point out the impact of such methods but also shows how the active authentication can take place to benefit the
By definition, “biometrics” (Woodward, Orlans, and Higgins, 2003) is the science of using biological properties to identify individuals; for example, fingerprints, retina scans, and voice recognition. We’ve all seen in the movies, how the heroes and the villains have used other’s fingerprints and voice patterns to get into the super, secret vault. While these ideas were fantasy many years ago, today biometrics are being used and you may not even know it.
The computer is considered one of the most technological advances of the twentieth century. As the general public becomes increasingly ‘computer literate,' the gap between technology and peoples' intellect notably shrinks. The readily available computers, software, and assorted output devices have enlightened many but, in turn, have increased the using of computers for unethical activities, privacy invasion and illegal purposes. Legal sanctions against abusive use of computers are a reactive approach. A proactive approach is to teach students about computer ethics in classrooms. An effective teaching method are the presentation of ethical scenarios. It is anticipated that through this method, students will personalize the need for developing ethical standards of behavior. The ultimate goal is for students, if necessary, to change their set of personal beliefs to include ethics.
Biometric technology is used for the ways humans can be identified by unique aspects of their bodies, such as fingerprints, body odor, our voices and many more. If one was to think about privacy rights, he/she would be concerned about the widespread adoption of these systems, since such systems could easily be used to develop a record of known rebellious people and/or dangerous criminals, to be used for social control purposes. Although that may seem pretty good and a positive thing for the society, one should take into account of the defects and errors of technology. Of the many biometrics technologies that are being developed and are already developed, facial recognition is one of the most threatening because it can be deployed secretly; one may not know whether or when they can be caught in a surveillance camera for such facial recognition biometrics. Additionally, tests have found that the miscalculations for facial biometrics technologies are very high. As a result, according to Privacy Rights Clearinghouse, innocent people can be erroneously identified as dangerous criminals and actual dangerous criminals and/or suspected terrorists can fail to be detected overall, allowing for a huge injustice and unfairness. Privacy rights concerned with biometrics have sparked a concern and should be dealt with; otherwise, this is just one of the
After the September 11, 2001, terrorist attacks the biometric community has made vast technological improvements in protecting the United States and its borders (The Biometric Consortium, 2012). Biometrics is an automated method of recognizing an individual based on a physiological or behavioral characteristic. Biometrics includes features such as face, fingerprints, hand geometry, handwriting,
Tavani, H. T. (2011). Ethical Aspects of Emerging and Converging Technology. Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing (3rd ed., pp. 363,364). Hoboken, N.J.: Wiley.
Reynolds, G. (2012). Ethics in information technology ( 4th ed.). Boston, MA: Course Technology, Cengage.
...puter technology are rooted in the general ethical issues that people in society deal with. For example, the ethical issues such as invasion of privacy, theft, and fraud have been around since human beings began interacting with each other. The fact is that elements of these ethical issues are not unique to the computer field or computer technology. These current technologies raise the same ethical dilemmas with conditions that are unique to computer and cyber technology. This explains why we general ethical issue are such as privacy, theft and fraud are reexamined as informational privacy, identity theft and computer fraud in computer technology.
In this section, we will discuss about the usage of computer in a wrong ways which violates the computer ethics. First of all, unethical behaviour is an act that should not be done by someone as it can bring many disadvantages. These behaviours can be done by everyone in this world, for example, engineer, doctor, professionals, prime minister in their politician and in businessman. Unethical behaviour is depending on the level of someone’s discipline.
“The term -information security- means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction” (United States Code, 2008). In order to ensure the identity of who is trying to access the information, the concept of “Biometric Technology” has been developed in the last years. This essay will start explaining this concept and the characteristics of its development through the time. Then, the essay will offer a brief explanation of biometric systems operation and a description of different biometric systems developed until now. Finally, this research analyzes the current and future applications and the issues that surround it.
Technology has transformed the world. The ability to represent and process information digitally, including text, values, images, and sound, has allowed us to be more productive and to extend our intellect and understanding of life in this universe. The power of computing can improve the everyday aspect of life, both professionally and personally. Along with a variety of benefits, computers also generate a wide variety of ethical dilemmas, such as the digital divide, property rights, privacy, freedom of speech, and health-related issues associated with living a digital