Social Acceptance of Biometric Technologies in Germany: ASurvey

Size: px
Start display at page:

Download "Social Acceptance of Biometric Technologies in Germany: ASurvey"

Transcription

1 Social Acceptance of Biometric Technologies in Germany: ASurvey A. Krupp, C. Rathgeb and C.Busch da/sec Biometrics and Internet Security Research Group, University of Applied Sciences Darmstadt, Germany Abstract: Since the past decade biometric technologies are field-proven, facilitating reliable and secure access control. Numerous successful deployments on large-scale systems, e.g. airports, confirm the feasibility of biometric recognition. However, applications of biometric systems involve privacy concerns, i.e. debates on social and ethical acceptance of biometrics reached levels never previously witnessed. In this work a comprehensive questionnaire regarding social acceptance of biometric technologies in Germany is presented. Results are obtained from a total number of 14 respondents, allowing a representative analysis of citizens attitudes towards biometric technologies. Relevant questions are put into view and perceptions of German citizens regarding the rise of biometric technologies are discussed in detail and interesting conclusions are drawn. 1 Introduction Biometric recognition [JRP4] refers to automatic authentication of humans by their physiological or behavioral characteristics or traits. Several biometric characteristics, e.g. fingerprints, iris, or face, have been discovered for robust and reliable recognition and reveal impressive performance in terms of recognition accuracyholding tremendous promise for applying biometric technologies in diverse application scenarios [JFR8]. So far, the vast majority of existing research conducted in biometrics in mainly focused on technical aspects. Without a doubt, biometric technologies are on the rise enforcing an integration of biometrics into daily life, e.g. passports or door-locks, which often leaves citizens with no choice but to accept biometrics. While majorities are convinced of the need for improved authentication controls and biometrics are claimed to provide secure long-time solutions for fundamental problems, public issues arise which citizens need to be heard on, e.g. convenience or transparency. Contemporary attitudes of citizens towards biometric recognition must be considered important, since a wide-spread use of biometrics may cause even more issues. For instance, attacks on biometric systems [RCB1], e.g. spoofing, hacking, reconstructing biometric information from templates, insider attacks, or even theft of body parts may all seem far-fetched now, but theycould become common if the use of biometrics and the value of the information protected by biometrics increases [Pat8]. While research already tackles some issues, e.g. privacy-protecting technologies [RU11, JNN8], others may not be considered a technical or scientific question. In con- 193

2 trast, issues such as social acceptance can only be taken into account by understanding the people -side of biometrics [CSR4]. The contribution of this work is the investigation of social acceptance of biometric technologies within Germany. Based on a comprehensive questionnaire, which focuses on current issues regarding deployments of biometric technologies, attitudes of 14 citizens of all over Germany are aggregated. Obtained results are interpreted and discussed in detail, whereat interesting conclusions emerge. The remainder of this paper is organized as follows: in Section 2 related studies are briefly summarized. The proposed questionnaire, obtained results and a discussion of these are presented in Section 3. In Section 4conclusions are given. 2 Related Studies As previously mentioned, only a few scientific works regarding biometric recognition focus on social acceptance of users. Furnell et al. [FDMR] proposed a questionnaire on the user-acceptance of biometric technologies which was completed by 175 respondents living in the UK. Interestingly, the survey has shown that, although demonstrably weak, typed passwords remained the most popular form of authentication in the minds of users. In [PW6] a survey is proposed in order to measure perception based on various uses of biometric technology as well as implantable RFID-chips in the human body as an enhanced biometric method. It was found that the 141 respondents in this survey were most willing to employ biometric identifiers into the United States Passport system (almost half of respondents). Conversely, respondents were least willing to employ biometric identifiers into a system to obtain a credit card with results showing nearly two-thirds of respondents unwilling. With respect to the implantable RFID-chips only less than half of respondents are unwilling to implant these. Heckle et al. [HPO7] presented a study, in which 24 participants were asked to role-play the use of afingerprint biometric identification system when making purchases at an online bookstore. The results showed that 21 out of 24 participants found it beneficial to use the fingerprint system. Participants were also asked why they might prefer to use a biometric system when making an online purchase. The most frequent response was that the system would be easier to use than a traditional username and password (6% of responses). Only 35% of the participants said they would prefer to use a biometric system because of an increase in security. The authors found that the participants relayed a sense of confusion when it came to assessing the security strength of biometrics. Interestingly, subjects stated that they would accept biometrics if it was the social norm. Jones et al. [JAE7] investigated the users perceptions of biometrics with respect to various application scenarios, e.g. building access, computer access, or financial transactions. Overall, the use of biometrics did not receive more acceptability compared to conventional authentication mechanisms, e.g. password-based authentication. In contrast, regarding biometrics the majority of the 115 respondents raised concerns about misuse with respect to fraud and tracking. Similar results were obtained in [FE7], in particular, 38% of 9 respondents were far from confident that biometric information will only be used for authentication purposes. In [EAGHR1] 7 volunteers were enrolled 194

3 Table 1: Distribution of the total number of respondents across different states of Germany. State Respondents State Respondents Baden-Württemberg 18 Niedersachsen 13 Bayern 19 Nordrhein-Westfalen 3 Berlin 4 Rheinland-Pfalz 7 Brandenburg 2 Saarland 1 Bremen Sachsen 6 Hamburg 2 Sachsen-Anhalt 4 Hessen 12 Schleswig-Holstein 13 Mecklenburg-Vorpommern 3 Thüringen 6 in biometric systems based on keystroke dynamics and face recognition. Interestingly, the majority of respondents found that the system based on keystroke dynamics outperformed the face recognition system, i.e. they were more satisfied with the system based on keystroke dynamics, although it actually revealed higher error rates compared to the face recognition system. Furthermore, the authors identified significant correlations between education level and respondents opinions about secret-based solutions against fraud and their concerns about privacy issues. In [BS] the procedure of selecting Passfaces from a grid of faces displayed on the screen is compared to conventional passwords. In this study,which was carried out with 34 student participants in a 3-month field trial, password caused substantial login failure rates compared to the Passface approach, i.e. the latter achieved improved usability. Recently, Mok and Kumar [MK12] investigated privacy related concerns in the deployment of biometrics and data protection technologies in China. In a survey in which 35 subjects participated it was found that the most acceptable biometric characteristics are fingerprint, iris, and face. In addition, it was found that Airports and Banks are the most preferred venues of deploying biometrics technologies. 3 Social Acceptance of Biometric Technologies in Germany In order to give an insight to the social acceptance of biometric technologies in Germany, a comprehensive questionnaire was proposed. In the following subsections the questionnaire, according evaluations are described in detail, obtained results are presented and the most interesting findings are discussed. 3.1 Proposed Questionnaire The survey which consists of 56 question was completed by a total number of 14 respondents, the distribution of respondents across different states of Germany issummarized in Table 1. As can be seen nearly all states are represented which forms an adequate basis for an representative investigation. This national distribution was achieved by publishing 195

4 6 6 6 Amount of respondents(%) Amount of respondents(%) Amount of respondents(%) < >6 No Sometimes PIN Password No (a) Distribution of respondents across different age groups. (b) Do you find it hard to remember PINs/ passwords? your PIN/ (c) Have you ever forgotten passwword? Figure 1: Age distribution of respondents to the proposed questionnaire and experience of respondents with respect to remembering or forgetting PINs and passwords PINs/ Passwords Physical Keys Cards >7 No No (a) Howmany PINs/ passwords, physical keys, or cards do you possess? (b) Do you frequently re-use (c) Do you frequently PINs/ passwords? change PINs/ passwwords? Figure 2: Amount of PINs, passwords, physical keys, or cards respondents possess and the common behavior of re-using or changing PINs and passwords. the survey via diverse Internet platforms, e.g. Facebook 1 and Twitter 2. The distribution of participants across different age-groups is depicted in Fig. 1(a), i.e. the vast majority of respondents is between and 29 years old. The entire group consisted of 9 males and 5 females and the majority of respondents were either students or employees. In this work only the most important and most interesting results will be presented. 3.2 Obtained Results Within initial questions emphasis was put on the convenience of knowledge-based authentication mechanism, in particular PINs and passwords. As shown in Fig. 1(b) the majority of respondents finds it hard to remember PINs or passwords. As aconsequence, see Fig. 1 (c), people tend to forget PINs and passwords, interestingly, passwords are forgotten more often than PINs. Fig. 2(a) illustrates the amount of PINs or passwords, physical keys,

5 Know Fingerpint Face Iris Accept On. Signature Speaker/Voice None No Personal Intimate Frightening (a) Biometric recognition based on which characteristics do you know/ accept? (b) Do you consider biometric recognition as too personal/ intimate or frightening? Figure 3: Knowledge and acceptance of biometric recognition based on different characteristics and the attitude of respondents with respect to personal privacy. and chip cards German citizens have to maintain on average. While most respondents posses only 4-5 physical keys, the majority of participants has to remember more than 7 passwords. Based on the fact that most respondents find it hard to remember PINs and passwords these are re-used at various application scenarios while the majority does not frequently change their PINs or passwords, as shown in Fig. 2(b)-(c). Based on these results, knowledge-based authentication systems requiring PINs or passwords appear inconvenient. Focusing on biometrics, which may represent a suitable solution to these issues, the most well-known biometric characteristics are fingerprints, iris, face and speaker/ voice recognition, see Fig. 3(a). In addition, the acceptability of biometric characteristics is depicted in Fig. 3(a). Obviously, the highest acceptability is gained for fingerprint recognition which is also the most well-known technology, which coincides with the findings in [HPO7], where participants state that a more common use of technology brings about more social acceptance. In contrast, while the majority of respondents is familiar with face and speaker/ voice, recognition based on these characteristics is only accepted by a few. The majority of respondents answered in the negative when they were asked whether they consider biometric recognition as too personal, intimate or even frightening, as illustrated in Fig. 3(b). While biometrics are deployed at a great variety of applications still only 45% of respondents have already registered with at least one biometric system, see Fig. 4(a) (in most cases fingerprint recognition systems). While only a slight majority believes that biometric systems facilitate everyday lives 75% are convinced that biometric access control systems are necessary at distinct venues, as illustrated in Fig. 4(a). The effects of aging on biometric recognition [Lan1] has been investigated in past years and numerous biometric characteristics, e.g. fingerprints [HGL + 11, DAB4] and iris [FB12], were found to be highly influenced by aging. When asking participants what they consider an adequate time lapse after which a re-registration with the biometric system is required, rather short time lapses of 3or6months are acceptable for only afew respondents, as shown in Fig 4(b), again, convenience plays an important role. 197

6 No Registered Facilitate Neccessary 3Mos 6Mos 1Yr 2Yrs 3Yrs Never (a) Have you used biometrics? Do biometrics facilitate daily life/ are theynecessary? (b) What do you consider as an adequate time lapse after which re-registration is required? Figure 4: Amount of respondents which have already used biometric systems, the common attitude with respect to daily life, and time-lapses considered adequate for re-registration Positive Negative Neutral Knowl. Biom. Neutral Knowl. Biom. Neutral (a) How doyou face the future (b) Do you consider biometrics (c) Which type of authentication development of biometric technologiestion more tamper-proof? or knowledge-based authentica- do you think provides more advantages? Figure 5: Future perspectives of respondents regarding biometric technologies and the comparison between knowledge-based authentication and biometric systems. While 25% of respondents are not concerned about the future of biometric technologies a majority of 45% face a positive future for the development of biometric systems, see Fig. 5(a). Compared to knowledge-based authentication schemes most respondents believe that biometrics are more tamper-proof while improved security may not be considered as amajor advantage as shown in Fig. 5(b)-(c). 3.3 Discussion Users seem to be annoyed by maintaining several PINs and passwords, i.e. biometrics, which can not be lost or forgotten, bring about substantial benefits with respect to usability. However, while citizens are familiar with most biometric characteristics, in general the acceptance of biometrics appears quite disillusioning. For instance, while 25% (!) of respondents did not accept biometric recognition at all, only one third or less of the 198

7 respondents which are familiar with face and speaker/ voice recognition accept these technologies. These results may be influenced by negative recent press releases, e.g. regarding Facebook sface recognition software. Generally speaking, based on the obtained results deployments of biometric systems need not face refusal due to physical invasion of privacy or even fear. While less than half of the participants have experience with biometric systems these are not considered as more convenient than, for instance, knowledge-based approaches. This implies biometric systems require improvements with respect to usability (which is also related to biometric performance rates). Usability is influenced by aging effects as well, while most participants accept only long time lapses ( 1 year) between re-enrollments. Overall, attitudes towards future developments of biometric technologies are positive while at the time citizens do not discover major advantages of biometrics over knowledge-based authentication mechanisms, despite improved security. Obtained results confirm that general awareness regarding biometric technologies requires major improvement in Germany, which may also improve the social acceptance of biometrics which appears still unsatisfying. 4 Conclusion In this paper results obtained from a survey on the social acceptance of biometric technologies, which wascompleted by 14 German citizens, are presented. Results of the comprehensive questionnaire, which was completed by people of almost all states of Germany, reflect the current general attitudes towards different biometrics-related topics within Germany, providing interesting insights. Nevertheless, the evaluation of the presented survey appears rather disillusioning confirming the fact that general awareness of biometric recognition technologies needs to be improved. Acknowledgment This work has been partially supported by the the Center for Advanced Security Research Darmstadt (CASED), Germany. References [BS] [CSR4] S. Brostoff and M. A. Sasse. Are Passfaces More Usable Than Passwords? A Field Trial Investigation. In Proceedings of HCI People and Computers XIV -Usability or Else!, pages ,. A. Chau, G. Stephens, and Jamieson R. Biometrics Acceptance - Perceptions of Use of Biometrics. In Proc. of the Australasian Conf. on Information Systems (ACIS 4), 199

8 [DAB4] pages 1 6, 4. H. Daum, M. Arnold, and C. Busch. Findings from the Projects BioFace and BioFinger. InProc. Int l Conf. ofthe Biometrics Special Interest Group (BIOSIG 4),4. [EAGHR1] M. El-Abed, R. Giot, B. Hemery, and C. Rosenberger. A study of users acceptance and satisfaction of biometric systems. In IEEE Int l Carnahan Conference on Security Technology (ICCST 1), pages , 1. [FB12] S. P. Fenker and K. W. Bowyer. Analysis of Template Ageing in Iris Biometrics. In Proc. of the IEEE Computer Society and IEEE Biometrics Council Workshop on Biometrics (CVPRW 12), pages 45 51, 12. [FDMR] [FE7] [HGL + 11] [HPO7] [JAE7] [JFR8] [JNN8] [JRP4] [Lan1] S. M. Furnell, P. S. Dowland, Illingworth H. M., and P. L. Reynolds. Authentication and Supervision: ASurvey of User Attitudes. Computers &Security,19(3): ,. S. Furnell and K. Evangelatos. Public awareness and perceptions of biometrics. Computer Fraud &Security, 7(1):8 13, 7. T. Hotz, C. Gottschlich, R. Lorenz, S. Bernhardt, M. Hantschel, and A. Munk. Statistical analyses of fingerprint growth. In Proc. of Int l Conf. of the Biometrics Special Interest Group (BIOSIG 11), pages 11 19, 11. R. R. Heckle, A. S. Patrick, and A. Ozok. Perception and acceptance of fingerprint biometric technology. InProc. of the 3rd Symposium on Usable Privacy and Security (SOUPS 7), pages , 7. L. A. Jones, A. I. Antón, and J. B. Earp. Towards Understanding User Perceptions of Authentication Technologies. In Proc. of the 7 ACM workshop on Privacy in electronic society (WPES 7), pages 91 98, 7. A. K. Jain, P. Flynn, and A. A. Ross. Handbook of Biometrics. Springer,8. Anil K. Jain, Karthik Nandakumar, and Abhishek Nagar. Biometric template security. EURASIP J. Adv. Signal Process, 8:1 17, 8. Anil K. Jain, Arun Ross, and Salil Prabhakar. An introduction to biometric recognition. IEEE Trans. on Circuits and Systems for Video Technology,14:4, 4. A. Lanitis. A survey of the effects of ageing on biometric identity verification. Int. Journal of Biometrics, 2(1):34 52, 1. [MK12] S. Y. Mok and Ajay Kumar. Addressing biometrics security and privacy related challenges in China. In Proc. Int l Conf. of the Biometrics Special Interest Group (BIOSIG 12), pages 1 8, 12. [Pat8] [PW6] A. S. Patrick. Acceptance of Biometrics: Things That Matter That We Are Ignoring. In Presentation to the International Workshop on Usability and Biometrics,8. C. Perakslis and R. Wolk. Social acceptance of RFID as abiometric security method. IEEE Technology and Society Magazine, 25(3):34 42, 6. [RCB1] N.K. Ratha, J.H. Connell, and R.M. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal,4(3): , 1. [RU11] C. Rathgeb and A. Uhl. A Survey on Biometric Cryptosystems and Cancelable Biometrics. EURASIP Journal on Information Security,11(3), 11.

Travel destination Iceland Denmark, United Kingdom, Germany and France

Travel destination Iceland Denmark, United Kingdom, Germany and France Travel destination Iceland Denmark, United Kingdom, Germany and France May 2012 The content of this document is copywritten infromation belonging to MMR/Market and media research ehf. All public distirbution

More information

Economic potentials of the refugee immigration in the long run

Economic potentials of the refugee immigration in the long run in the long run Dr. Wido Geis 5.10.2016, Berlin Refugee immigration and population development In 1.000 89.000 87.000 85.000 Statistisches Bundesamt 2015- variants 1-8 and W3 IW estimation 80% Intervall

More information

Biometrics: primed for business use

Biometrics: primed for business use Article Biometrics: primed for business use Introduction For the regular traveller, identity and security checks are becoming ever more intrusive. Walk though an airport today, and you are likely to be

More information

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology Biometric Technologies: Security and Privacy Dr. Rigoberto Chinchilla School of Technology Why Biometrics? Reliable authorization and authentication are becoming necessary for many everyday actions (or

More information

Research Article. ISSN (Print)

Research Article. ISSN (Print) Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(1A):37-41 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)

More information

Aadhaar Based Voting System Using Android Application

Aadhaar Based Voting System Using Android Application Aadhaar Based Voting System Using Android Application Sreerag M 1, Subash R 1, Vishnu C Babu 1, Sonia Mathew 1, Reni K Cherian 2 1 Students, Department of Computer Science, Saintgits College of Engineering,

More information

Acceptance of Biometrics: Things That Matter That We Are Ignoring

Acceptance of Biometrics: Things That Matter That We Are Ignoring Acceptance of Biometrics: Things That Matter That We Are Ignoring Andrew Patrick, Ph.D. Information Security Group Institute for Information Technology http://iit-iti.nrc-cnrc.gc.ca Andrew.Patrick@nrc-cnrc.gc.ca

More information

Local security in Germany

Local security in Germany Local security in Germany Hermann Groß 1. Institutional frame The constitutional tradition in Germany and the regulations after World War II are the main factors for organizing police in Germany. (West)

More information

SUMMARY INTRODUCTION. xiii

SUMMARY INTRODUCTION. xiii SUMMARY INTRODUCTION The U.S. Army has a growing need to control access to its systems in times of both war and peace. In wartime, the Army s dependence on information as a tactical and strategic asset

More information

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified? Introduction Who are you?? Biometrics CSE 190-C00 Lecture 1 How are people identified? People are identified by three basic means: Something they have (identity document or token) Something they know (password,

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 23 April 11, 2012 CPSC 467b, Lecture 23 1/39 Biometrics Security and Privacy of Biometric Authentication

More information

BIOMETRICS - WHY NOW?

BIOMETRICS - WHY NOW? BIOMETRICS - WHY NOW? How big a part will biometric technologies play in our lives as they are adopted more widely in the future? The need to confirm ones Identity, in order to access facilities and services

More information

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means: Introduction Who are you?? Biometrics CSE 190-B00 Lecture 1 How are people identified? People are identified by three basic means: Something they have (identity document or token) Something they know (password,

More information

German Federal Ministry of the Interior 20 August / 6

German Federal Ministry of the Interior 20 August / 6 German Federal Ministry of the Interior 20 August 2008 1 / 6 KEESING Journal of Documents & Identity Issue October 2008 Andreas Reisen As Head of Biometrics, Travel & ID Documents, Registration Division

More information

Obtaining evidence from Germany for use in a US civil or commercial trial

Obtaining evidence from Germany for use in a US civil or commercial trial NEW YORK LONDON LOS ANGELES PARIS SAN FRANCISCO WASHINGTON, D.C. PHILADELPHIA PITTSBURGH OAKLAND MUNICH PRINCETON NORTHERN VA WILMINGTON NEWARK MIDLANDS, UK CENTURY CITY RICHMOND Obtaining evidence from

More information

Consumer Attitudes About Biometric Authentication

Consumer Attitudes About Biometric Authentication Consumer Attitudes About Biometric Authentication A UT CID Report by Rachel L. German and K. Suzanne Barber May 2018 The Center for Identity greatly appreciates and acknowledges the following organization

More information

E- Voting System [2016]

E- Voting System [2016] E- Voting System 1 Mohd Asim, 2 Shobhit Kumar 1 CCSIT, Teerthanker Mahaveer University, Moradabad, India 2 Assistant Professor, CCSIT, Teerthanker Mahaveer University, Moradabad, India 1 asimtmu@gmail.com

More information

Epicenter Cities and International Education 17th AIEC Melbourne, Victoria Australia

Epicenter Cities and International Education 17th AIEC Melbourne, Victoria Australia Epicenter Cities and International Education 17th AIEC Melbourne, Victoria Australia Thursday, 23 October 2003 Todd Davis, Ph.D. Senior Scholar Institute of International Education The idea of the global

More information

Identity and Diversity: Unity in diversity as an European vision

Identity and Diversity: Unity in diversity as an European vision EU-Grundtvig CONCORDIA Cooperation, Need for Communication and Resumption of Dialogue in relation to Age-groups Identity and Diversity: Unity in diversity as an European vision Prof. Dr. Caroline Y. Robertson-von

More information

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS?

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS? HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS? ACCENTURE CITIZEN SURVEY ON BORDER MANAGEMENT AND BIOMETRICS 2014 FACILITATING THE DIGITAL TRAVELER EXPLORING BIOMETRIC BARRIERS With

More information

Biometrics Technology for Human Recognition

Biometrics Technology for Human Recognition Biometrics Technology for Human Recognition Anil K. Jain Michigan State University http://biometrics.cse.msu.edu October 15, 2012 Foreigners Arriving at Incheon G20 Seoul Summit 2010 Face recognition system

More information

Introduction-cont Pattern classification

Introduction-cont Pattern classification How are people identified? Introduction-cont Pattern classification Biometrics CSE 190-a Lecture 2 People are identified by three basic means: Something they have (identity document or token) Something

More information

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data Stephen Kai-yi Wong Privacy Commissioner for Personal Data, Hong Kong Biometric Applications

More information

M-Polling with QR-Code Scanning and Verification

M-Polling with QR-Code Scanning and Verification IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 09 March 2017 ISSN (online): 2349-784X M-Polling with QR-Code Scanning and Verification Jaichithra K Subbulakshmi S B. Tech

More information

The Perception of Biometric Technology: A Survey

The Perception of Biometric Technology: A Survey The Perception of Biometric Technology: A Survey Stephen J. Elliott, Ph.D. Department of Industrial Technology, Purdue University West Lafayette, Indiana, USA elliottgpurdue.edu Sarah A. Massie Department

More information

CASE STUDY 2 Portuguese Immigration & Border Service

CASE STUDY 2 Portuguese Immigration & Border Service CASE STUDY 2 Portuguese Immigration & Border Service Page 1 Table of Contents EXECUTIVE SUMMARY... 3 1 CUSTOMER NAME... 4 2 BUSINESS CASE BUSINESS DRIVERS... 4 3 CHALLENGE... 4 4 SOLUTION DESCRIPTION...

More information

Secure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis

Secure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis Secure Electronic Voting: Capabilities and Limitations Dimitris Gritzalis Secure Electronic Voting: Capabilities and Limitations 14 th European Forum on IT Security Paris, France, 2003 Prof. Dr. Dimitris

More information

INTRODUCTION BACKGROUND. Chapter One

INTRODUCTION BACKGROUND. Chapter One Chapter One INTRODUCTION BACKGROUND The U.S. Army has a growing need to improve access control for its many systems, both in wartime and in peacetime. In wartime, the Army s dependence on information as

More information

M-Vote (Online Voting System)

M-Vote (Online Voting System) ISSN (online): 2456-0006 International Journal of Science Technology Management and Research Available online at: M-Vote (Online Voting System) Madhuri Mahajan Madhuri Wagh Prof. Puspendu Biswas Yogeshwari

More information

Game on Germany! Accessing New Markets in Europe

Game on Germany! Accessing New Markets in Europe Chris Schmidt - istockphoto Game on Germany! Accessing New Markets in Europe Peter Alltschekow Managing Director Marketing & Communications Director Eastern Germany I. The Company s Profile: About Germany

More information

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements Announcements Introduction-cont Pattern classification Biometrics CSE 190 Lecture 2 Sign up for the course. Web page is up: http://www.cs.ucsd.edu/classes/wi12/ cse190-c/ HW0 posted. Intro to Matlab How

More information

ABC systems in Europe and beyond - status and recommendations for the way forward

ABC systems in Europe and beyond - status and recommendations for the way forward ABC systems in Europe and beyond - status and recommendations for the way forward Markus Clabian, AIT Austrian Institute of Technology GmbH, Coordinator FastPass Andreas Kriechbaum-Zabini AIT Austrian

More information

The Impact of EU Privacy Legislation on Biometric System Deployment: Protecting citizens but constraining applications

The Impact of EU Privacy Legislation on Biometric System Deployment: Protecting citizens but constraining applications The Impact of EU Privacy Legislation on Biometric System Deployment: Protecting citizens but constraining applications Bustard, J. (2015). The Impact of EU Privacy Legislation on Biometric System Deployment:

More information

CHAPTER 2 LITERATURE REVIEW

CHAPTER 2 LITERATURE REVIEW 19 CHAPTER 2 LITERATURE REVIEW This chapter presents a review of related works in the area of E- voting system. It also highlights some gaps which are required to be filled up in this respect. Chaum et

More information

THE ICAO MRTD PROGRAMME MAURICIO SICILIANO ICAO

THE ICAO MRTD PROGRAMME MAURICIO SICILIANO ICAO THE ICAO MRTD PROGRAMME MAURICIO SICILIANO ICAO HOW WE GOT HERE ICAO S MANDATE FOR STANDARDS DEVELOPMENT: THE CONVENTION ON INTERNATIONAL CIVIL AVIATION 2 CHICAGO CONVENTION GOALS Establishes principles

More information

Smart Voting System using UIDAI

Smart Voting System using UIDAI IJIRST National Conference on Networks, Intelligence and Computing Systems March 2017 Smart Voting System using UIDAI Mrs. Nandhini M 1 Mr. Vasanthakumar M 2 1 Assistant Professor 2 B.Tech Final Year Student

More information

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A. IDEMIA Identity & Security N.A. Providing identity assurance to secure & simplify lives IDEMIA IDENTITY & SECURITY N.A. 3 Only you can assert your identity Identity is unique it s who we are, where we

More information

SMART VOTING. Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G# /17/$31.00 c 2017 IEEE ABSTRACT:

SMART VOTING. Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G# /17/$31.00 c 2017 IEEE ABSTRACT: SMART VOTING Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G#4 #1 Student, Department of Information Technology #2Student, Department of Information Technology #3Student, Department of

More information

International Biometrics & Identification Association

International Biometrics & Identification Association International Biometrics & Identification Association 1 Biometrics and Policy Presented by Walter Hamilton, Chairman & President The International Biometrics & Identification Association whamilton@idtp.com

More information

IDENTITY AND PASSPORT SERVICE IDENTITY SERVICE PROPOSITION A JOINT VENTURE WITH THE CRIMINAL RECORDS BUREAU REPORT

IDENTITY AND PASSPORT SERVICE IDENTITY SERVICE PROPOSITION A JOINT VENTURE WITH THE CRIMINAL RECORDS BUREAU REPORT IDENTITY AND PASSPORT SERVICE IDENTITY SERVICE PROPOSITION A JOINT VENTURE WITH THE CRIMINAL RECORDS BUREAU REPORT IDENTITY AND PASSPORT SERVICE IDENTITY SERVICE PROPOSITION A JOINT VENTURE WITH THE CRIMINAL

More information

Police. Report abrigded version

Police. Report abrigded version Police Crime Statistics Federal Republic of Germany Report 2015 abrigded version BKA - Statistics produced by: Bundeskriminalamt (Federal Criminal Police Office) Section IZ 33 D-65173 Wiesbaden Germany

More information

Young Adult Perception and Acceptance of Biometric Technology

Young Adult Perception and Acceptance of Biometric Technology Young Adult Perception and Acceptance of Biometric Technology By Anthony Allen Submitted in Partial Fulfillment of the Requirements For the Degree of Master of Science In the Computer Science and Information

More information

FastPass and EasyPASS ABC from science to solution

FastPass and EasyPASS ABC from science to solution FastPass and EasyPASS ABC from science to solution Presentation at Security Printers, December 6, 2013 10.12.2013 1 The work has been supported by the FastPass project. The research leading to these results

More information

DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL

DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL 1 KALAICHELVI V, 2 Dr.RM.CHANDRASEKARAN 1 Asst. Professor (Ph. D Scholar), SRC- Sastra University, Kumbakonam, India 2 Professor, Annamalai University,

More information

Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana)

Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana) Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana) Ayannor Issaka Baba 1, Joseph Kobina Panford 2, James Ben Hayfron-Acquah 3 Kwame Nkrumah University of Science and Technology Department

More information

LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY. Presented By: Cristian Morosan - University of Houston

LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY. Presented By: Cristian Morosan - University of Houston LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY Presented By: Cristian Morosan - University of Houston CRISTIAN MOROSAN ASSISTANT PROFESSOR CONRAD N. HILTON COLLEGE UNIVERSITY OF HOUSTON

More information

CODY SIMPSON CAPTION THAT PHOTO CONTEST OFFICIAL RULES

CODY SIMPSON CAPTION THAT PHOTO CONTEST OFFICIAL RULES CODY SIMPSON CAPTION THAT PHOTO CONTEST OFFICIAL RULES The Cody Simpson Caption That Photo Contest (the "Contest") is sponsored by Atlantic Recording Corporation, 1290 Avenue of the Americas, 28th Floor,

More information

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy Boston, 14-18 February 2008 AAAS Annual Meeting 1 Joint Research Centre (JRC) The European Commission s Research-Based Policy Support Organisation Biometrics in Border Management Grand Challenges for Security,

More information

Biometrics from a legal perspective dr. Ronald Leenes

Biometrics from a legal perspective dr. Ronald Leenes Biometrics from a legal perspective dr. Ronald Leenes TILT - Tilburg Institute for Law, Technology, and Society outline introduction biometrics, use legal aspects privacy/data protection biometrics as

More information

TERMS & CONDITIONS 1. DEFINITIONS 2. AGREEMENT 3. PLACING AN ORDER 4. PRICING AND PAYMENT

TERMS & CONDITIONS 1. DEFINITIONS 2. AGREEMENT 3. PLACING AN ORDER 4. PRICING AND PAYMENT TERMS & CONDITIONS Please read these terms and conditions ("Agreement") carefully: they govern your use of the website www.sunfire-music.com, and/or collaborating partners and associated webshops ( Website

More information

STATES OF AMERICA TENT PUBLIC TRACKER PERCEPTIONS OF THE REFUGEE CRISIS GERMANY YEAR /2017

STATES OF AMERICA TENT PUBLIC TRACKER PERCEPTIONS OF THE REFUGEE CRISIS GERMANY YEAR /2017 TENT PUBLIC TRACKER PERCEPTIONS OF THE REFUGEE CRISIS PUBLIC UNITED PERCEPTIONS STATES OF AMERICA OF TENT has THE partnered REFUGEE with global research agency CRISIS AudienceNet to conduct indepth research

More information

Novel E-Voting System with Biometric Authentication and Distributed Server System

Novel E-Voting System with Biometric Authentication and Distributed Server System Novel E-Voting System with Biometric Authentication and Distributed Server System PP Shendage *, PC Bhaskar Department of Technology, Shivaji University, Kolhapur, Maharashtra, India E-mail: shendagepriyanka1@gmail.com

More information

The United Nations study on fraud and the criminal misuse and falsification of identity

The United Nations study on fraud and the criminal misuse and falsification of identity The United Nations study on fraud and the criminal misuse and falsification of identity Facts and figures Total volume of fraud losses for the UK in 2005 was US$ 27.4 billion (ACPO study). Online banking

More information

Re-Selecting Members of the European Parliament

Re-Selecting Members of the European Parliament Re-Selecting Members of the European Parliament Elena Frech Re-Selecting Members of the European Parliament Candidate Selection, Party Goals, and Re-Election Probabilities Elena Frech Geneva, Switzerland

More information

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems. Aboutthe Tutorial This tutorial provides introductory knowledge on Biometrics. From this tutorial, you would get sufficient information about the basics of biometrics and different biometric modalities

More information

Intro Prefs & Voting Electoral comp. Voter Turnout Agency GIP SIP Rent seeking Partisans. 4. Voter Turnout

Intro Prefs & Voting Electoral comp. Voter Turnout Agency GIP SIP Rent seeking Partisans. 4. Voter Turnout 4. Voter Turnout Paradox of Voting So far we have assumed that all individuals will participate in the election and vote for their most preferred option irrespective of: the probability of being pivotal

More information

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver Machine Readable Travel Documents: Biometrics Deployment Barry J. Kefauver Smart Card Alliance March 10, 2004 International Civil Aviation Organization (ICAO) United Nations organization Established in

More information

Towards One Person, One Vote via Real-Time Voter s Registration and Identification

Towards One Person, One Vote via Real-Time Voter s Registration and Identification Towards One Person, One Vote via Real-Time Voter s Registration and Identification B. Isong 1, O. Ekabua 2 and M. Mbodila 3 1 Department of Computer Science and Information Systems, University of Venda,

More information

ONLINE VOTING PORTAL BASED ON AADHAAR CARD VERIFICATION

ONLINE VOTING PORTAL BASED ON AADHAAR CARD VERIFICATION International Journal of Computer Engineering and Applications, Volume XI, Issue V, May 17, www.ijcea.com ISSN 2321-3469 ONLINE VOTING PORTAL BASED ON AADHAAR CARD VERIFICATION Ayush Agarwal 1, Rishabh

More information

Conditions for Processing Banking Transactions via the Corporate Banking Portal and HBCI/FinTS Service

Conditions for Processing Banking Transactions via the Corporate Banking Portal and HBCI/FinTS Service Corporate Banking Conditions for Processing Banking Transactions via the Corporate Banking Portal and HBCI/FinTS Service (Status 13 January 2018) 1. Scope of services (1) The Customer and its authorised

More information

Bali Process Ad Hoc Group Workshop on Biometrics for Identity Integrity in Immigration India April 2012

Bali Process Ad Hoc Group Workshop on Biometrics for Identity Integrity in Immigration India April 2012 BALI PROCESS AD HOC GROUP WORKSHOP ON BIOMETRICS FOR IDENTITY INTEGRITY IN IMMIGRATION NEW DELHI, INDIA, 23-26 APRIL 2012 CO-CHAIRS' STATEMENT 1. The Bali Process on People Smuggling, Trafficking in Persons

More information

IMPLEMENTATION OF SECURE PLATFORM FOR E- VOTING SYSTEM

IMPLEMENTATION OF SECURE PLATFORM FOR E- VOTING SYSTEM IMPLEMENTATION OF SECURE PLATFORM FOR E- VOTING SYSTEM PROJECT REFERENCE NO.: 39S_BE_1662 COLLEGE BRANCH GUIDE STUDETS : AMRUTHA INSTITUTE OF ENGINEERING AND MANAGEMENT SCIENCE, BENGALURU : DEPARTMENT

More information

Biometrics & Accessibility

Biometrics & Accessibility Biometrics & Accessibility Rawlson O'Neil King Lead Researcher, Biometrics Research Group, Inc. Contributing Editor, BiometricUpdate.com rawlson@biometricupdate.com Biometrics Research Group, Inc. Biometrics

More information

SECURE REMOTE VOTER REGISTRATION

SECURE REMOTE VOTER REGISTRATION SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current

More information

City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013

City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013 City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013 Demonstration Time: Scheduled Breaks: Demonstration Format: 9:00 AM 4:00 PM 10:15 AM 10:30

More information

Biometrics how to put to use and how not at all?

Biometrics how to put to use and how not at all? 1 Biometrics how to put to use and how not at all? How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics? Andreas Pfitzmann TU Dresden, Fakultät

More information

Structures and concepts for the resettlement of ( high risk -) prisoners in Germany

Structures and concepts for the resettlement of ( high risk -) prisoners in Germany ERNST MORITZ ARNDT UNIVERSITY OF GREIFSWALD DEPARTMENT OF CRIMINOLOGY Moritz von der Wense, Ineke Pruin, Frieder Dünkel Structures and concepts for the resettlement of ( high risk -) prisoners in Germany

More information

ABC and Integrated Border management

ABC and Integrated Border management ABC and Integrated Border management A solution concept for integrated border management and ABC ICAO MRTD Symposium 2014 - Montreal Dr. Matthias Kreuseler Mühlbauer ID Services GmbH Current Situation

More information

FAQ Frequently Asked Questions

FAQ Frequently Asked Questions FAQ Frequently Asked Questions You feel that you have been incorrectly treated by your doctor and you now wish to approach the Norddeutsche Schlichtungsstelle [Arbitration Board for North Germany]. The

More information

Biometrics How to Put to Use and How Not at All?

Biometrics How to Put to Use and How Not at All? Biometrics How to Put to Use and How Not at All? Andreas Pfitzmann TU Dresden, Faculty of Computer Science, 01062 Dresden, Germany Andreas.Pfitzmann@tu-dresden.de Abstract. After a short introduction to

More information

Acceptance of Biometric in the Kingdom of Saudi Arabia by Bushra Mohamed Elamin Elnaim

Acceptance of Biometric in the Kingdom of Saudi Arabia by Bushra Mohamed Elamin Elnaim Acceptance of Biometric in the Kingdom of Saudi Arabia by Bushra Mohamed Elamin Elnaim RESEARCH PROPSAL i Running Head: RESEARCH PROPOSAL Acceptance of Biometric in the Kingdom of Saudi Arabia Bushra Mohamed

More information

ICAO: THE TECHNICAL ADVISORY GROUP FOR MACHINE READABLE TRAVEL DOCUMENTS

ICAO: THE TECHNICAL ADVISORY GROUP FOR MACHINE READABLE TRAVEL DOCUMENTS ICAO: THE TECHNICAL ADVISORY GROUP FOR MACHINE READABLE TRAVEL DOCUMENTS International Civil Aviation Organization (ICAO) United Nations specialized agency Established in 1945 by Chicago Convention Headquarters

More information

Estonian National Electoral Committee. E-Voting System. General Overview

Estonian National Electoral Committee. E-Voting System. General Overview Estonian National Electoral Committee E-Voting System General Overview Tallinn 2005-2010 Annotation This paper gives an overview of the technical and organisational aspects of the Estonian e-voting system.

More information

Measuring Common Ground

Measuring Common Ground Social Cohesion Radar Measuring Common Ground Social Cohesion in Germany Executive Summary Social Cohesion Radar Measuring Common Ground Social Cohesion in Germany Executive Summary Autoren Georgi Dragolov,

More information

Opportunities and Challenges for Biometric Systems in Travel: a Review

Opportunities and Challenges for Biometric Systems in Travel: a Review University of Massachusetts Amherst ScholarWorks@UMass Amherst Tourism Travel and Research Association: Advancing Tourism Research Globally 2011 ttra International Conference Opportunities and Challenges

More information

AADHAR BASED ELECTRONIC VOTING SYSTEM USING BIOMETRIC AUTHENTICATION AND IOT

AADHAR BASED ELECTRONIC VOTING SYSTEM USING BIOMETRIC AUTHENTICATION AND IOT AADHAR BASED ELECTRONIC VOTING SYSTEM USING BIOMETRIC AUTHENTICATION AND IOT Sarankumar.V 1, Sasikumar.M 1, Ramprabu.K 1, Sathishkumar.A 1 Mr. S. Gladwin Moses Stephen 2 1 Student, 2 Assistant Professor

More information

Additional Case study UK electoral system

Additional Case study UK electoral system Additional Case study UK electoral system The UK is a parliamentary democracy and hence is reliant on an effective electoral system (Jones and Norton, 2010). General elections are held after Parliament

More information

Blind Signatures in Electronic Voting Systems

Blind Signatures in Electronic Voting Systems Blind Signatures in Electronic Voting Systems Marcin Kucharczyk Silesian University of Technology, Institute of Electronics, ul. Akademicka 16, 44-100 Gliwice, Poland marcin.kuchraczyk@polsl.pl Abstract.

More information

ID Checker Guidance Notes. DBS Online Disclosure Guide (ebulkplus)

ID Checker Guidance Notes. DBS Online Disclosure Guide (ebulkplus) ID Checker Guidance Notes DBS Online Disclosure Guide (ebulkplus) Contents ID Checker Guidance Notes... 1 Logging onto the System... 2-5 How to verify ID... 6-8 Find an application... 9 DBS List of Acceptable

More information

Biometrics Overview. Introduction. Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic:

Biometrics Overview. Introduction. Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic: Introduction Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic: As a process: 1. A measurable biological (anatomical and physiological) and

More information

The Open Biometrics Initiative and World Card

The Open Biometrics Initiative and World Card The Open Biometrics Initiative and World Card Notes on RealTechSupport for Biometrics Marc Böhlen, MediaRobotics Lab, University at Buffalo Out-collect the data collectors WhatTheHack2005, The Netherlands

More information

Biometric Technology for DLID

Biometric Technology for DLID Canada Day at DLID Summit, Houston, Texas, February 29 th, 2004 An introduction to the science (as applied to Canadian requirements) Ian Williams Principal www.idsysgroup.com Biometrics: Defined Automatically

More information

The electronic ID comes to Germany

The electronic ID comes to Germany The electronic ID comes to Germany The electronic ID comes to Germany 1 In just a matter of months, the first three million German citizens will be provided with an electronic ID card. At the same time,

More information

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD)

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD) International Civil Aviation Organization WORKING PAPER TAG-MRTD/18-WP/8 22/4/08 English only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD) EIGHTEENTH MEETING Montréal, 5 to

More information

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia State Electoral Office of Estonia General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-1.0 Date: 20 June 2017 Tallinn 2017 Annotation This

More information

Biometrics how to put to use and how not at all?

Biometrics how to put to use and how not at all? 1 Biometrics how to put to use and how not at all? How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics? Andreas Pfitzmann TU Dresden, Fakultät

More information

Identity Verification in Passport Issuance

Identity Verification in Passport Issuance Identity Verification in Passport Issuance and dcivil ilregistration i The importance of context and continuity of identity Mr Ross Greenwood Principal Identity Matters Consulting 1 PURPOSE To invite a

More information

Note: Exports of goods across borders. The top 10 exporting countries in 2014 (excluding re-exports). Source: WTO

Note: Exports of goods across borders. The top 10 exporting countries in 2014 (excluding re-exports). Source: WTO Section 2 Factors and elements of expansion of regional industries and exports in Germany and other countries. 1.Changes in exports by major countries First, we will look at changes in exports by individual

More information

THE FEASIBILITY OF HARMONIZATION OF NATIONAL IDENTITY DATA AND VOTER REGISTER: The Technical Challenges, Legal Obstacles and the Opportunities

THE FEASIBILITY OF HARMONIZATION OF NATIONAL IDENTITY DATA AND VOTER REGISTER: The Technical Challenges, Legal Obstacles and the Opportunities THE FEASIBILITY OF HARMONIZATION OF NATIONAL IDENTITY DATA AND VOTER REGISTER: The Technical Challenges, Legal Obstacles and the Opportunities Prof. Mahmood Yakubu Chairman, Independent National Electoral

More information

Assumption of TOBT Responsibility and Usage Agreement HAM CSA

Assumption of TOBT Responsibility and Usage Agreement HAM CSA Assumption of TOBT Responsibility and Usage Agreement HAM CSA (Airport CDM Common Situational Awareness Tool) Please mark with a cross as appropriate! We wish to agree the assumption of TOBT responsibility

More information

Identity management in Belgium

Identity management in Belgium 26.03.2015 Identity management in Belgium Peter Grouwels Directorate-General Institutions and Population Belgium Belgium 589 municipalities 11 190 845 inhabitants (1 st January 2015) - 9 927 576 Belgians

More information

NASS Resolution Reaffirming Support for the National Electronic Notarization Standards

NASS Resolution Reaffirming Support for the National Electronic Notarization Standards NASS Resolution Reaffirming Support for the National Electronic Notarization Standards Adopted on July 12, 2006 Reaffirmed on July 13, 2011 Mission Statement It is the goal of the National Association

More information

EVIDENCE OF IDENTIFICATION

EVIDENCE OF IDENTIFICATION Regional Seminar on MRTDs, Biometrics and Identification Management Sint Maarten, 9 11 July 2013 EVIDENCE OF IDENTIFICATION Mauricio Siciliano ICAO MRTD Officer Overview Where are we? ICAO Answer Guide

More information

Social Cohesion Radar

Social Cohesion Radar Social Cohesion Radar measuring common ground The complete study is only available in German: Radar gesellschaftlicher Zusammenhalt Sozialer Zusammenhalt in Deutschland 2017 Bertelsmann Stiftung (Hrsg.)

More information

Carbon Management and Institutional Issues in European Cities. Kristine Kern University of Minnesota

Carbon Management and Institutional Issues in European Cities. Kristine Kern University of Minnesota Carbon Management and Institutional Issues in European Cities Kristine Kern University of Minnesota 1 2 Contents 1. Introduction: Climate change policy in Europe 2. Cities, Europeanization and multi-level

More information

Right-Wing extremism in unified Germany

Right-Wing extremism in unified Germany Right-Wing extremism in unified Germany Unified Germany in Perspective Outline The Post-War years The Second Wave Unified Germany in Perspective Right-Wing Extremism (0/21) What is right, what is extremism?

More information

GI-Edition. Proceedings. Lecture Notes in Informatics. Robert Krimmer, Rüdiger Grimm (Eds.) 3 rd international Conference on Electronic Voting 2008

GI-Edition. Proceedings. Lecture Notes in Informatics. Robert Krimmer, Rüdiger Grimm (Eds.) 3 rd international Conference on Electronic Voting 2008 Gesellschaft für Informatik (GI) publishes this series in order to make available to a broad public recent findings in informatics (i.e. computer science and information systems), to document conferences

More information

edriver s Licenses The Convergence of Identity in Society and the future role of the Driver s License.

edriver s Licenses The Convergence of Identity in Society and the future role of the Driver s License. edriver s Licenses The Convergence of Identity in Society and the future role of the Driver s License. Neville Pattinson, SVP Government Sales August 28 th, 2013 What is the role of our Driver s License

More information

Secure and Reliable Electronic Voting. Dimitris Gritzalis

Secure and Reliable Electronic Voting. Dimitris Gritzalis Secure and Reliable Electronic Voting Dimitris Gritzalis Secure and Reliable Electronic Voting Associate Professor Dimitris Gritzalis Dept. of Informatics Athens University of Economics & Business & e-vote

More information

STRATEGIES AND USEFULNESS OF ID-e (DNI-e) Benito Fernández Fernández, Head secretary at CNP Identification Department.

STRATEGIES AND USEFULNESS OF ID-e (DNI-e) Benito Fernández Fernández, Head secretary at CNP Identification Department. Regional Seminar on MRTDs and Traveller Identification Management STRATEGIES AND USEFULNESS OF ID-e (DNI-e) Benito Fernández Fernández, Head secretary at CNP Identification Department. NATIONAL POLICE

More information