emilio mordini m d director of the centre for science
play

EMILIO MORDINI, M.D. DIRECTOR OF THE CENTRE FOR SCIENCE, SOCIETY AND - PowerPoint PPT Presentation

HONG KONG HONG KONG 4.5 JANUARY 2010 JANUARY EMILIO MORDINI, M.D. DIRECTOR OF THE CENTRE FOR SCIENCE, SOCIETY AND CITIZENSHIP ROME (IT) ROME (IT) RISING PAN EUROPEAN AND INTERNATIONAL AWARENESS OF AWARENESS OF BIOMETRICS AND SECURITY ETHICS


  1. HONG KONG HONG KONG 4.5 JANUARY 2010 JANUARY EMILIO MORDINI, M.D. DIRECTOR OF THE CENTRE FOR SCIENCE, SOCIETY AND CITIZENSHIP ‐ ROME (IT) ROME (IT)

  2. RISING PAN ‐ EUROPEAN AND INTERNATIONAL AWARENESS OF AWARENESS OF BIOMETRICS AND SECURITY ETHICS www.riseproject.eu 1 March 2009 ‐ 28 Feb 2012 M h 8 F b A RESEARCH PROJECT FUNDED BY THE EUROPEAN COMMISSION ETHICS AND GOVERNANCE UNIT IN THE SCOPE COMMISSION ETHICS AND GOVERNANCE UNIT IN THE SCOPE OF THE FP7

  3. Centre for Science, Society and Citizenship (Italy) 1. Aristotle University of Thessaloniki (Greece) y 2. The Hong Kong Polytechnic University Biometric 3. Research Center (China) C Centre for Policy on Emerging Technologies (United f P li E i T h l i (U i d 4. States) Lancaster University (United Kingdom) Lancaster University (United Kingdom) 5 5. European Biometric Forum (Ireland) 6. Global Security Intelligence LLC (United States) y g 7. Data Security Council of India (India) 8. University of Tartu (Estonia) 9.

  4. 12/March/2009 RISE ‐ KOM 12 ‐ 13 march 2009, Rome 4

  5. http://www.riseproject.eu

  6. RISE 2009 ‐ 2012 9 BITE 2004 ‐ 2007 BITE 2004 2007 HIDE 2008 ‐ 2011 HIDE 2008 2011

  7. From 01/10/2004 to February 2007

  8.  Brussels 15 ‐ 16 Dec 2005 B l 6 D  Convened by DG Research  Art 29 WP chair  Art.29 WP chair  Director and delegates from US DHS Privacy Office US DHS Privacy Office  50 experts mainly from EU, USA

  9.  Convened by DHS and US Visit Program  EU delegates from DG R Research, BEPA, h BEPA Art.29 WP  80 partipants from 9  80 partipants from 9 different countries November, 28 – 29 2006 Washington DC g

  10.  Jerusalem 2 ‐ 4 September 2006: IDENTITY SECURITY 2006: IDENTITY. SECURITY AND DEMOCRACY 30 participants from 14 f countries, Israel, France, Belg ium, Italy, Slovenia, Bulgaria, ium, Italy, Slovenia, Bulgaria, Netherlands, Denmark, USA, Latvia, UK, Germany, Poland, P l Palestinian Authorities. ti i A th iti

  11.  HOMELAND SECURITY, BIOMETRIC IDENTIFICATION & IDENTIFICATION & PERSONAL DETECTION ETHICS ETHICS www.hideproject.eu 1 Feb 2008 ‐ 31 Jan 2011 F b 8 J

  12. HIDE + Technology Oriented PERMANENT INTERNATIONAL BITE INITIATIVE ON INITIATIVE ON EXPLORATORY ETHICS AND POLICY OF RISE RISE BIOMETRICS + Policy O i Oriented t d

  13. ARISTOTLE UNIVERSITY OF IBMG UNIVERSITY OF ROTTERDAM 1. 1. THESSALONIKI (GREECE) (NETHERLANDS) CENTRE FOR POLICY ON EMERGING INTERNATIONAL BIOMETRICS GROUP 2. 2. TECHNOLOGIES (UNITED STATES) ( ) (USA) ( ) CENTRE FOR SCIENCE, SOCIETY AND INTERNATIONAL ORGANISATION OF 3. 3. CITZENSHIP (ITALY) – COORDINATOR MIGRATION (UNITED NATIONS) UNIVERSITY OF ROME LA SAPIENZA LANCASTER UNIVERSITY (UNITED 4. 4. (ITALY) KINGDOM) DATA SECURITY COUNCIL OF INDIA DATA SECURITY COUNCIL OF INDIA NATIONAL UNIVERSITY OF SINGAPORE NATIONAL UNIVERSITY OF SINGAPORE 5. 5 5 5. (INDIA) (SINGAPORE) ESA COMMUNICATION (ITALY) OPTEL (POLAND) 6. 6. EUROPEAN BIOMETRIC FORUM SAGEM SECURITE’ (FRANCE) 7. 7. (IRELAND) THE HASTING CENTER (USA) 8. EUTELIS (ITALY) EUTELIS (ITALY) THE HONG KONG POLYTECHNIC THE HONG KONG POLYTECHNIC 8. 8 9. FRAUNHOFER INSTITUTE (GERMANY) UNIVERSITY (CHINA) 9. GLOBAL SECURITY INTELLIGENCE LLC UNIVERSITY OF LIJBLJANA (SLOVENIA) 10. 10. (UNITED STATES) UNIVERSITY OF TARTU (ESTONIA) 11. HUMANSCAN (SWITZERLAND ‐ ZUYD UNIVERSITY(THE NETHERLANDS) 11. 12. GERMANY)

  14. Ukraine Turkey Switzerland Spain p Slovenia Singapore Portugal N New Zealand Z l d Malta Latvia Series1 Italy Ireland Greece France European Commission p Czech Republic Canada Brazil Austria A i Argentina 0 5 10 15 20 25 30 35 40 16

  15. 17

  16. 1) Global Human 1) Global l b l l b l Human Mobility Mobility bili bili Mass of People in transit too huge to be Mass of People in transit too huge to be handled in traditional ways 2) Unreliable Identity Documents ) U li bl Id i D Too many people without reliable documents. Too Too many people without reliable documents. Too many unreliable States 3) Global Identity Management 3) y g Digital Identities, dispersed and globalised g p g

  17. Advances in transport and communications are determining factors in the Advances in transport and communications are determining factors in the globalization process, and wider access to these technologies has increased the mobility of people, goods and services

  18. 1960 1960 - -75 75 Source: Population Action International 1994 20

  19. Current Current Mobility Mobility ……. ……. Source: Population Action International 1994 21

  20. Estimated Global Mobile Populations > 800 million

  21. 21st Century’s Migration……. 21st Century’s Migration……. Source: Population Action International 1994 23

  22. I In a world system where nearly all States in developing countries ld t h l ll St t i d l i t i are not able to provide their citizens with reliable identity documents, biometrics is likely to be the sole hope for most third documents, biometrics is likely to be the sole hope for most third world inhabitants to have trustworthy identity documents

  23. 29

  24. Around 51 million children born in 2006 have not had their births registered. Forty ‐ four per cent of these children live in South Asia. One in three developing countries has birth registration rates of less than 50 per cent . Two out of three African children under age five are not registered .

  25. UNREGISTERED CHILDREN

  26. An increasing number of online applications require a b f l l reliable means of identification of users, the whole web architecture is increasingly based on certain b h l b d digital identities

  27. Internet banking, online  trading, remote management of confidential databases and of confidential databases and access to personal information require certain digital identities. The conventional means of  identification (e g passwords personal (e.g.passwords, personal identification numbers) can be easily compromised, observed or forgotten. e.mordini@bioethics.it

  28. Identity management is going to become a more critical factor in grid and cloud computing in grid and cloud computing given the need to manage interactions between hubs and periphery clients. Biometrics – i h li Bi i including voice recognition, human ‐ machine g , interactions, touch user ‐ interfaces with the Internet – will be more prevalent in order be o e p e a e t o de to create trusted digital identities

  29. If one focuses only on privacy risks, it is unlikely that he finds sol tions solutions. Enlarged conversation should foster both respect for privacy foster both respect for privacy and technology innovation. The concept of privacy aware technology can be misleading: all technology must become privacy aware.

  30. The idea that privacy is only an issue of western countries is misleading and should be i l di d h ld b abandoned. In a globalized, borderless world India and China are not world, India and China are not “ fast ‐ moving, unregulated competitors ” but are policy actors competitors but are policy actors which can offer interesting solutions to governance g problems in this area.

  31. The development and deployment of biometric technologies systems and technologies, systems, and applications show that privacy and biometrics policies are inextricably p y interdependent. Biometrics and Privacy involve politics and public policy as much as it does law and li h it d l d technology. By involving different stakeholders By involving different stakeholders and perspectives it is possible to overcome dead ends and to find win ‐ win solutions. l

  32. RISE RISE It was not those who used brute force who would prevail but those who’ll use schemes but those who ll use schemes and plots Aeschylus “Prometheus Bound”

  33. And thank to the Polytechnic of HK Prof Polytechnic of HK, Prof Zhang, and all his staff for the great efforts ! for the great efforts !

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend