|
|
1 | (8) |
|
1.1 The Digitised Image and Face Recognition Technology |
|
|
1 | (1) |
|
1.2 Face Recognition Technology |
|
|
2 | (1) |
|
1.3 Face Recognition Technology and Privacy |
|
|
3 | (2) |
|
1.4 Face Recognition Technology and Surveillance |
|
|
5 | (1) |
|
1.5 Face Recognition Technology and Its Ethical and Legal Implications |
|
|
5 | (1) |
|
1.6 Face Recognition Technology and Personal Autonomy |
|
|
6 | (1) |
|
1.7 Face Recognition Technology and Big Data |
|
|
6 | (1) |
|
|
7 | (2) |
|
2 What Is Face Recognition Technology? |
|
|
9 | (18) |
|
2.1 Introduction: What Is Face Recognition Technology? |
|
|
9 | (1) |
|
2.2 How Does Face Recognition Work? |
|
|
10 | (1) |
|
2.3 Face Recognition Algorithms |
|
|
11 | (3) |
|
|
14 | (1) |
|
2.5 Weaknesses and Failures of FRT |
|
|
15 | (1) |
|
2.6 Face Recognition Vulnerability |
|
|
15 | (1) |
|
2.7 Face Spoofing Counter-Measures |
|
|
16 | (1) |
|
2.8 Current Uses of Face Recognition Technology |
|
|
17 | (6) |
|
2.8.1 Passports and Other Government Uses |
|
|
17 | (2) |
|
|
19 | (1) |
|
|
20 | (2) |
|
2.8.4 Gambling and Banking |
|
|
22 | (1) |
|
|
23 | (4) |
|
3 Some Ethical and Legal Issues of FRT |
|
|
27 | (12) |
|
3.1 Fears and Misconceptions of FRT |
|
|
27 | (4) |
|
|
28 | (1) |
|
|
28 | (2) |
|
3.1.3 New York Domain Awareness System |
|
|
30 | (1) |
|
3.2 Some Deeper Issues: FRT, Data Protection and Civil Liberties |
|
|
31 | (2) |
|
3.3 Face Recognition: Civil Liberty and Public Disclosure |
|
|
33 | (3) |
|
|
34 | (2) |
|
3.3.2 Public Interest Disclosure and FRT |
|
|
36 | (1) |
|
|
36 | (3) |
|
4 Privacy and Surveillance Surveyed |
|
|
39 | (18) |
|
4.1 Introduction: Privacy and Surveillance |
|
|
39 | (2) |
|
4.2 The Data Subject and Surveillance |
|
|
41 | (2) |
|
4.3 Biometric Data and Civil Liberties |
|
|
43 | (3) |
|
4.4 The Data Subject and Privacy |
|
|
46 | (1) |
|
4.5 The Data Subject and Autonomy |
|
|
46 | (3) |
|
4.6 Privacy, Informatisation and Photography |
|
|
49 | (3) |
|
4.7 The Data Subject and Biometric Data |
|
|
52 | (1) |
|
4.8 The Socio-Political Context |
|
|
53 | (2) |
|
|
55 | (2) |
|
5 Autonomy, Liberty and Privacy |
|
|
57 | (18) |
|
5.1 The Concept of Autonomy |
|
|
57 | (2) |
|
|
59 | (1) |
|
5.3 Dworkin's First and Second-Order Autonomy |
|
|
60 | (3) |
|
|
63 | (1) |
|
5.5 Negative and Positive Liberty |
|
|
64 | (1) |
|
5.6 Kafka and Negative Liberty |
|
|
65 | (1) |
|
5.7 Foucault's Police and Bentham's Prisoners |
|
|
66 | (2) |
|
|
68 | (5) |
|
|
73 | (2) |
|
|
75 | (12) |
|
|
75 | (1) |
|
|
76 | (1) |
|
6.3 Compulsory Visibility and Coercion |
|
|
76 | (3) |
|
6.4 Compulsory Visibility and Face Recognition |
|
|
79 | (1) |
|
|
80 | (1) |
|
6.6 Big Data and Face Recognition |
|
|
81 | (1) |
|
6.7 Compulsory Visibility and Autonomy |
|
|
82 | (2) |
|
|
84 | (3) |
|
7 The Law and Data Protection |
|
|
87 | (26) |
|
|
87 | (2) |
|
7.2 Data Protection and Privacy |
|
|
89 | (2) |
|
7.3 Informational Privacy |
|
|
91 | (2) |
|
7.4 Data Protection and Privacy: The United States Sectoral Approach |
|
|
93 | (3) |
|
7.5 Reconciling US and EU Provisions |
|
|
96 | (1) |
|
7.6 Data Protection and Face Recognition |
|
|
97 | (4) |
|
7.7 Biometric Data and the Development of the General Data Protection Regulation |
|
|
101 | (4) |
|
7.8 Human Rights: Civil Liberty, Privacy and the Law |
|
|
105 | (4) |
|
|
109 | (4) |
|
8 The Law and Surveillance |
|
|
113 | (12) |
|
8.1 Surveillance, Regulatory Power and Rights |
|
|
113 | (5) |
|
8.2 Human Rights, Mass Surveillance and UK Case Law |
|
|
118 | (4) |
|
8.2.1 Human Rights: Interference |
|
|
120 | (2) |
|
8.3 Face Recognition: Accountability and Trust |
|
|
122 | (1) |
|
8.4 Face Recognition: Privacy and Image Ownership |
|
|
122 | (1) |
|
|
123 | (2) |
|
9 State Paternalism and Autonomy |
|
|
125 | (22) |
|
9.1 State Paternalism: Active and Passive |
|
|
125 | (2) |
|
9.2 Ethics and State Power |
|
|
127 | (4) |
|
9.2.1 Liberty and State Power |
|
|
128 | (2) |
|
9.2.2 Ethical State Power |
|
|
130 | (1) |
|
|
131 | (1) |
|
9.4 Control, Paternalism and Autonomy |
|
|
132 | (2) |
|
|
134 | (3) |
|
9.6 Face Recognition and Second-Order Preferences |
|
|
137 | (1) |
|
9.7 Preventing Harm and the Effect on Second-Order Preferences |
|
|
138 | (4) |
|
|
142 | (3) |
|
|
145 | (2) |
|
10 State Paternalism and Data |
|
|
147 | (16) |
|
10.1 Protecting Privacy: Data Protection and the Political Dimension |
|
|
147 | (4) |
|
10.2 Protecting Privacy: UK Data Protection and the Face Recognition Paradigm |
|
|
151 | (3) |
|
10.3 Data Processing and Second-Order Preferences |
|
|
154 | (2) |
|
10.4 The Data Subject and Face Recognition Systems [ State Data-Mining Power] |
|
|
156 | (4) |
|
|
160 | (3) |
|
11 The Future of Face Recognition Technology and Ethico: Legal Issues |
|
|
163 | (22) |
|
11.1 Face Recognition: The Future and Its Implications |
|
|
163 | (1) |
|
11.2 Threat Recognition and Securitising Identity |
|
|
163 | (3) |
|
|
166 | (2) |
|
11.4 Face Recognition and the Human Interface |
|
|
168 | (4) |
|
11.4.1 Data and the Human Interface |
|
|
170 | (2) |
|
11.5 Predicting Social Concerns and Reactions |
|
|
172 | (2) |
|
11.6 Constitutional Safeguards and Rights |
|
|
174 | (2) |
|
11.7 Legal and Regulatory Safeguards |
|
|
176 | (4) |
|
11.8 Regulating the Commoditisation of Data |
|
|
180 | (1) |
|
|
181 | (4) |
|
|
185 | (10) |
|
12.1 Face Recognition Technology and the Right to Personal Image Ownership |
|
|
185 | (1) |
|
12.2 Data Ownership: A New Legal and Moral Rights Framework |
|
|
186 | (3) |
|
12.3 Democratisation of Technology Development |
|
|
189 | (1) |
|
12.4 Personal Identifiable Images and Street Photography |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
192 | (3) |
Bibliography and Further Reading |
|
195 | (4) |
Index |
|
199 | |