Australian Cyber Security Magazine, ISSUE 7, 2019

Page 74

Cyber Security

are also used as a diagnostic tool to identify glaucoma, and diabetes-related eye disorders. Examination of blood vessels in the eye is so effective as a diagnosis tool, tests are being conducted to determine whether it can be used to determine whether a subject is likely to have a major cardiac event, with some success. Retinal scans can also provide information about a subject’s age, blood pressure and smoking habits. Fingerprint scans can reveal information about some chromosomal diseases. Behavioural measurements such as gait recognition and signature recognition can also identify physical defects or neurological disease. This form of privacy violation is known as “identification beyond purpose”. Biometrics are also a concern for other privacyrelated reasons: people can potentially be identified who do not wish to be, or without their knowledge. These last two are especially prevalent concerns with the use of facial recognition technology becoming more widespread.

Trust Issues Trust is a major factor in the examination of the use of biometrics. Providing biometric information, voluntarily or involuntarily, is a proclamation of identity. A user must provide their personal information and be accepted within a system before they can proceed any further. Biometric systems often require the cooperation of the user, who must submit to their data being collected and stored. Biometric systems are not just a form of access control; they give an automated system the responsibility of identifying system users, and accessing further information associated with the user’s biometric profile. It has be trusted that biometric data will be used ethically; not only must a system ensure that adversaries do not access the biometric data itself, for fraudulent purposes, it must also prevent associated information about a user from being accessed.

Social Acknowledgement One of the requirements to be considered of a specific biometric system is its level of social acceptance. Users must trust that their data is being used accurately and ethically, but they also must be willing to submit to a physical examination. Some form of biometrics require physical contact with a machine, and, in the case of vascular biometrics, an internal examination can be required. Whether users are comfortable submitting to such an examination must be considered. The system used must also be accepted for its technology. People have a long history of being reluctant to uptake new technology. While this is traditionally seen in older generations, the rapid advancements in digital technology are currently experiencing backlash from younger generations trying to keep up. People are also sceptical of governmental use of their data, and how biometrics can be incorporated into this. Facial recognition is increasingly being used in public areas without the knowledge or permission of the general public. This form of involuntary identification can assist a governing body with compiling further information about individuals, and with no knowledge of what that

74 | Australian Cyber Security Magazine

information may be or how it is to be used, the general public can be reluctant to embrace the technology.

Targeted Concern While an awareness of a government’s acquisition and use of personal data is politic and sensible, it is important for users of technology to understand what information they are choosing to provide, where their information is going, and the far-reaching implications of this information becoming available to others. People are more comfortable accepting “voluntary” risks: life-threatening risks that they bring upon themselves, such as smoking, or drink-driving, than they are putting themselves in much less riskier situations that are out of their control. This phenomenon also seems to apply to risks regarding data management: people have a general dissatisfaction regarding government data collection, but are happy to hand over information of their own volition. Biometric technology is constantly improving and is become more prevalent in modern society, especially within the realm of facial recognition. An awareness of the potential for harm across all uses of biometrics is important for the security of personal data.


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.