Abstract

Get full access to this article
View all access options for this article.
References
1.
Ackerman
S
(2011 ) U.S. holds on to biometrics
database of 3 million Iraqis . Wired ,
21
December . Available at: http://www.wired.com/dangerroom/2011/12/iraq-biometrics-database/
(accessed October 2012 ).
2.
Agar
J
(2005 ) Identity cards in Britain:
past experience and policy implications . History and
Policy . Available at: http://www.historyandpolicy.org/papers/policy-paper-33.html
(accessed October 2012 ).
3.
Alterman
A
(2003 ) ‘A piece of yourself’:
ethical issues in biometric identification . Ethics
and Information Technology
5 (3 ):
139 –150 .
4.
Amoore
L
(2006 ) Biometric borders: governing
mobilities in the war on terror . Political
Geography
25 (3 ):
336 –351 .
5.
Ball
K
(2005 ) Organization, surveillance
and the body: towards a politics of resistance .
Organization
12 (1 ):
89 –108 .
6.BBC
News (2008 ) ID card fingerprint errors
fear . BBC, 3
July . Available at: http://news.bbc.co.uk/1/hi/uk_politics/7484853.stm
(accessed October 2012 ).
7.
Clarke
RA
(2001 ) Biometrics and
privacy . Available at: http://www.rogerclarke.com/DV/Biometrics.html
(accessed October 2012 ).
8.
Cole
SA
(2009 ) Forensics without uniqueness,
conclusions without individalization: the new epistemology of forensic
identification . Law, Probability and Risk
8 (3 ):
233 –255 .
9.
Currah
P
Mulqueen
T
(2011 ) Securitizing gender:
identity, biometrics and transgender bodies at the airport .
Social Research
78 (2 ):
557 –582 .
10.
Davies
SG
(1998 ) Biometrics: a civil liberties
and privacy perspective . Information Security
Technical Report
3 (1 ):
90 –94 .
11.Home
Office (2002 ) Entitlement Cards and Identity
Fraud: A Consultation Paper . Cm 5557. Available at: http://webarchive.nationalarchives.gov.uk/+/http://www.homeoffice.gov.uk/documents/entitlement-cards?view=Binary
(accessed October 2012 ).
12.
Jain
A
Ross
A
Prabhakar
S
(2004 ) An introduction to biometric
recognition . IEEE Transactions on Circuits and
Systems for Video Technology
14 (1 ):
4 –20 .
13.
Kabatoff
M
Daugman
J
(2008 ) Pattern recognition:
biometrics, identity and the state – an interview with John
Daugman . BioSocieties
3 (1 ):
81 –86 .
14.
Lyon
D
(2001 ) Under my skin: from
identification papers to body surveillance . In:
Caplan
J
Torpey
J
(eds) Documenting Individual Identity .
Princeton, NJ : Princeton
University Press ,
291 –310 .
15.
Lyon
D
(2008 ) Biometrics, identification
and surveillance . Bioethics
22 (9 ):
499 –508 .
16.
Magnet
SA
(2011 ) When Biometrics Fail: Gender, Race
and the Technology of Identity . Durham,
NC : Duke University
Press .
17.
Martin
A
van Brakel
R
Bernhard
D
(2009 ) Understanding resistance to
digital surveillance: towards a multi-disciplinary, multi-actor
framework . Surveillance & Society
6 (3 ):
213 –232 .
18.NO2ID (2008 ) NIS Options Analysis
Outcome . Available at: http://identityproject.lse.ac.uk/NIS_Options_Analysis_Outcome.pdf
(accessed October 2012 ).
19.Office
of Government Commerce (2003 ) Entitlement
Cards OGC Gateway Review: 0 – Strategic Assessment (23–25 June) .
Available at: http://collections.europarchive.org/tna/20100429164701/http://ips.gov.uk/identity/downloads/Home_Office_ID_cards_programe_Gate_0_Report_June_2003.pdf
(accessed October 2012 ).
20.
Romero
JJ
(2012 ) India’s big bet on
identity . IEEE Spectrum
49 (3 ):
48 –56 .
21.
Ross
A
Shah
J
Jain
AK
(2007 ) From template to image:
reconstructing fingerprints from minutiae points .
IEEE Transactions on Pattern Analysis and Machine
Intelligence
29 (4 ):
544 –560 .
22.
Spiller
S
(2007 ) ID cards will give ‘false’
data . BBC File on 4 , 31
July . Available at: http://news.bbc.co.uk/1/hi/programmes/file_on_4/6922882.stm
(accessed October 2012 ).
23.
Stein
J
(2012 ) CIA’s secret fear: high-tech
border checks will blow spies’ cover . 12
April . Available at: http://gizmodo.com/5901362/ (accessed October
2012 ).
24.UKIPS (2006 ) Strategic Action Plan for the
National Identity Scheme: Safe guarding your identity .
19
December . Available at: http://collections.europarchive.org/tna/20100429164701/http://ips.gov.uk/cps/files/ips/live/assets/documents/Strategic-Action-Plan.pdf
(accessed October 2012 ).
25.UKIPS (2008 ) Delivery Plan 2008 .
6
March . Available at: http://collections.europarchive.org/tna/20100429164701/http://ips.gov.uk/cps/files/ips/live/assets/documents/national-identity-scheme-delivery-2008.pdf
(accessed October 2012 ).
26.UKIPS (2009 ) Statement to address
misconceptions arising from responses to a consultation paper on identity
cards secondary legislation . Available at: http://collections.europarchive.org/tna/20100429164701/http://ips.gov.uk/cps/files/ips/live/assets/documents/09-03-10agenderStatementv4.pdf
(accessed October 2012 ).
27.
Wadham
J
Gallagher
C
Chrolavicius
N
(2006 ) Blackstone’s guide to the Identity
Cards Act 2006 . Oxford :
Oxford University Press .
28.
Wayman
J
(2001 ) Fundamentals of biometric
authentication technologies . International Journal
of Image and Graphics
1 (1 ):
93 –113 .
29.
Whitley
EA
Hosein
G
(2010 ) Global Challenges for Identity
Policies . Basingstoke :
Palgrave Macmillan .
30.
Wickins
J
(2007 ) The ethics of biometrics: the
risk of social exclusion from the widespread use of electronic
identification . Science and Engineering
Ethics
13 (1 ):
45 –54 .
31.
Zorkadis
V
Donos
P
(2004 ) On biometrics-based
authentication and identification from a privacy-protection perspective:
deriving privacy-enhancing requirements . Information
Management & Computer Security
12 (1 ):
125 –137 .
32.
Zureik
E
Hindle
K
(2004 ) Governance, security and
technology: the case of biometrics . Studies in
Political Economy
73 : 113 –137 .
