Identity, security and democracy the wider social and ethical implications of automated systems for human identification
Many people think of personal identification as only part of the security/surveillance apparatus. This is likely to be an oversimplification, which largely misrepresents the reality. 'Personal identity' means two separate concepts, namely that an individual belongs to specific categories a...
Saved in:
| Corporate Author: | NATO Advanced Research Workshop on Identity, Security and Democracy: the Wider Social and Ethical Implications of Automated Systems for Human Identification Jerusalem |
|---|---|
| Other Authors: | Mordini, E. (Emilio), Green, Manfred |
| Format: | Conference Proceeding Book |
| Language: | English |
| Published: |
Netherlands
IOS Press
2009
|
| Series: | NATO science for peace and security. Series E; Human and societal dynamics
vol. 49 |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Data science for cyber-security
Published: (2019)
Published: (2019)
Security in computing
by: Pfleegar, Charles P.
Published: (1997)
by: Pfleegar, Charles P.
Published: (1997)
Principles of information security
by: Whitman, Michael E
Published: (2003)
by: Whitman, Michael E
Published: (2003)
Algorithm in applications
Published: (2010)
Published: (2010)
Critical infrastructure protection against hybrid warfare security related challenges
Published: (2016)
Published: (2016)
Cryptography, automata and learning theory
Published: (2011)
Published: (2011)
Information security--the next decade : proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95
Published: (1995)
Published: (1995)
Firewalls don't stop dragons a step-by-step guide to computer security for non-techies
by: Parker, Carey
Published: (2018)
by: Parker, Carey
Published: (2018)
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Michael T.
Published: (2013)
by: Raggo, Michael T.
Published: (2013)
Changing the ways we work shaping the ICT-solutions for the next century : proceedings of the Conference on Integration in Manufacturing, Göteborg, Sweden, 6-8 October 1998
Published: (1998)
Published: (1998)
An investigation into the impact of a cyber exercise in Malaysia
by: Arniyati Ahmad
Published: (2020)
by: Arniyati Ahmad
Published: (2020)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Digital identity management
Published: (2015)
Published: (2015)
Database applications semantics proceedings of the IFIP WG 2.6 Working Conference on Database Applications Semantics (DS-6), Stone Mountain, Atlanta, Georgia, U.S.A., May 30-June 2, 1995
Published: (1997)
Published: (1997)
Database security, IX status and prospects : proceedings of the Ninth Annual IFIP TC11 Working Conference on Database Security, August 1995
Published: (1996)
Published: (1996)
IT governance and information security guides, standards, and frameworks
by: Maleh, Yassine, et al.
Published: (2022)
by: Maleh, Yassine, et al.
Published: (2022)
Web intelligence and security advances in data and text mining techniques for detecting and preventing terrorist activities on the web
Published: (2010)
Published: (2010)
Distributed platforms proceedings of the IFIP/IEEE International Conference on Distributed Platforms: client/server and beyond: DCE, CORBA, ODP and advanced distributed applications
Published: (1996)
Published: (1996)
Database security, volume X status and prospects : IFIP TC11/WG 11.3 Tenth International Conference on Database Security, 22-24 July 1996, Como, Italy
Published: (1997)
Published: (1997)
Computing and communication
Published: (2012)
Published: (2012)
Logics and languages for reliability and security
Published: (2010)
Published: (2010)
Meeting security challenges through data analytics and decision support
Published: (2016)
Published: (2016)
Management of information security
by: Whitman
Published: (2004)
by: Whitman
Published: (2004)
Quantum cryptography and computing--theory and implementation
Published: (2010)
Published: (2010)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
World Conference on Computers in Education VI WCCE '95, liberating the learner : proceedings of the sixth IFIP World Conference on Computers in Education, 1995
Published: (1995)
Published: (1995)
Fuzzy systems and data mining II proceedings of FSDM 2016
Published: (2016)
Published: (2016)
Simple computer security disinfect your PC
Published: (2007)
Published: (2007)
Advances in coastal structures and breakwaters proceedings of the international conference organizad by the Institution of Civil Egineers and held in London on 27-29 April,1995
Published: (1996)
Published: (1996)
Information hiding techniques for steganography and digital watermarking
by: lh
by: lh
Quantifier elimination and cylindrical algebraic decomposition
Published: (1998)
Published: (1998)
Recent advances in data mining of enterprise data algorithms and applications
Published: (2007)
Published: (2007)
Pengurusan bijak alam sekitar
Proceedings of the World Ethics and Integrity Forum 2005 building trust and international cooperation in strengthening integrity
Published: (2005)
Published: (2005)
Comparative regional integration theoretical perspectives
Published: (2003)
Published: (2003)
Knowledge engineering
Published: (2011)
Published: (2011)
Applications of data mining in e-business and finance
Published: (2008)
Published: (2008)
Product modeling for computer integrated design and manufacture TC5/WG5.2 International Workshop on Geometric Modeling in Computer Aided Design, 19-23 May, 1996, Airlie, Virginia, USA
Published: (1997)
Published: (1997)
Integrating information technology into education
Published: (1995)
Published: (1995)
Cloud storage security a practical guide
by: Wheeler, Aaron, et al.
Published: (2015)
by: Wheeler, Aaron, et al.
Published: (2015)
Similar Items
-
Data science for cyber-security
Published: (2019) -
Security in computing
by: Pfleegar, Charles P.
Published: (1997) -
Principles of information security
by: Whitman, Michael E
Published: (2003) -
Algorithm in applications
Published: (2010) -
Critical infrastructure protection against hybrid warfare security related challenges
Published: (2016)


