File #2831: "2020_Book_FaceRecognitionTechnology.pdf"

2020_Book_FaceRecognitionTechnology.pdf

Text

1|Preface|6
1|Acknowledgements|8
1|Contents|14
1|Abbreviations|18
1|List of Figures|20
1|Table of Cases|21
1|Table of Statutes|23
1|Chapter 1: Introduction|24
2|1.1 The Digitised Image and Face Recognition Technology|24
2|1.2 Face Recognition Technology|25
2|1.3 Face Recognition Technology and Privacy|26
2|1.4 Face Recognition Technology and Surveillance|28
2|1.5 Face Recognition Technology and Its Ethical and Legal Implications|28
2|1.6 Face Recognition Technology and Personal Autonomy|29
2|1.7 Face Recognition Technology and Big Data|29
2|References|30
1|Chapter 2: What Is Face Recognition Technology?|32
2|2.1 Introduction: What Is Face Recognition Technology?|32
2|2.2 How Does Face Recognition Work?|33
2|2.3 Face Recognition Algorithms|34
2|2.4 Other Approaches|37
2|2.5 Weaknesses and Failures of FRT|38
2|2.6 Face Recognition Vulnerability|38
2|2.7 Face Spoofing Counter-Measures|39
2|2.8 Current Uses of Face Recognition Technology|40
3|2.8.1 Passports and Other Government Uses|40
3|2.8.2 Law Enforcement|42
3|2.8.3 Commerce|43
3|2.8.4 Gambling and Banking|45
2|References|46
1|Chapter 3: Some Ethical and Legal Issues of FRT|49
2|3.1 Fears and Misconceptions of FRT|49
3|3.1.1 Disney World|50
3|3.1.2 Driver Licences|50
3|3.1.3 New York Domain Awareness System|52
2|3.2 Some Deeper Issues: FRT, Data Protection and Civil Liberties|53
2|3.3 Face Recognition: Civil Liberty and Public Disclosure|55
3|3.3.1 Public Disclosure|56
3|3.3.2 Public Interest Disclosure and FRT|58
2|References|58
1|Chapter 4: Privacy and Surveillance Surveyed|61
2|4.1 Introduction: Privacy and Surveillance|61
2|4.2 The Data Subject and Surveillance|63
2|4.3 Biometric Data and Civil Liberties|65
2|4.4 The Data Subject and Privacy|68
2|4.5 The Data Subject and Autonomy|68
2|4.6 Privacy, Informatisation and Photography|71
2|4.7 The Data Subject and Biometric Data|74
2|4.8 The Socio-Political Context|75
2|References|77
1|Chapter 5: Autonomy, Liberty and Privacy|79
2|5.1 The Concept of Autonomy|79
2|5.2 Freedom and Privacy|81
2|5.3 Dworkin´s First and Second-Order Autonomy|82
2|5.4 Autonomy and Freedom|85
2|5.5 Negative and Positive Liberty|86
2|5.6 Kafka and Negative Liberty|87
2|5.7 Foucault´s Police and Bentham´s Prisoners|88
2|5.8 Privacy and Autonomy|90
2|References|95
1|Chapter 6: Compulsory Visibility?|97
2|6.1 Introduction|97
2|6.2 Body-Worn Cameras|98
2|6.3 Compulsory Visibility and Coercion|98
2|6.4 Compulsory Visibility and Face Recognition|101
2|6.5 Big Data|102
2|6.6 Big Data and Face Recognition|103
2|6.7 Compulsory Visibility and Autonomy|104
2|References|106
1|Chapter 7: The Law and Data Protection|108
2|7.1 Introduction|108
2|7.2 Data Protection and Privacy|110
2|7.3 Informational Privacy|112
2|7.4 Data Protection and Privacy: The United States Sectoral Approach|114
2|7.5 Reconciling US and EU Provisions|117
2|7.6 Data Protection and Face Recognition|118
2|7.7 Biometric Data and the Development of the General Data Protection Regulation|122
2|7.8 Human Rights: Civil Liberty, Privacy and the Law|126
2|References|130
1|Chapter 8: The Law and Surveillance|134
2|8.1 Surveillance, Regulatory Power and Rights|134
2|8.2 Human Rights, Mass Surveillance and UK Case Law|139
3|8.2.1 Human Rights: Interference|141
2|8.3 Face Recognition: Accountability and Trust|143
2|8.4 Face Recognition: Privacy and Image Ownership|143
2|References|144
1|Chapter 9: State Paternalism and Autonomy|146
2|9.1 State Paternalism: Active and Passive|146
2|9.2 Ethics and State Power|148
3|9.2.1 Liberty and State Power|149
3|9.2.2 Ethical State Power|151
2|9.3 Paternalism and FRT|152
2|9.4 Control, Paternalism and Autonomy|153
2|9.5 Citizen and State|155
2|9.6 Face Recognition and Second-Order Preferences|158
2|9.7 Preventing Harm and the Effect on Second-Order Preferences|159
2|9.8 Threats to Privacy|163
2|References|166
1|Chapter 10: State Paternalism and Data|168
2|10.1 Protecting Privacy: Data Protection and the Political Dimension|168
2|10.2 Protecting Privacy: UK Data Protection and the Face Recognition Paradigm|172
2|10.3 Data Processing and Second-Order Preferences|175
2|10.4 The Data Subject and Face Recognition Systems [State Data-Mining Power]|177
2|References|181
1|Chapter 11: The Future of Face Recognition Technology and Ethico: Legal Issues|184
2|11.1 Face Recognition: The Future and Its Implications|184
2|11.2 Threat Recognition and Securitising Identity|184
2|11.3 Identity Management|187
2|11.4 Face Recognition and the Human Interface|189
3|11.4.1 Data and the Human Interface|191
2|11.5 Predicting Social Concerns and Reactions|193
2|11.6 Constitutional Safeguards and Rights|195
2|11.7 Legal and Regulatory Safeguards|197
2|11.8 Regulating the Commoditisation of Data|201
2|References|202
1|Chapter 12: Conclusion|206
2|12.1 Face Recognition Technology and the Right to Personal Image Ownership|206
2|12.2 Data Ownership: A New Legal and Moral Rights Framework|207
2|12.3 Democratisation of Technology Development|210
2|12.4 Personal Identifiable Images and Street Photography|211
2|12.5 Recommendations|212
2|References|213
1|Bibliography and Further Reading|215
1|Index|218