Skip to main content
Top

2020 | OriginalPaper | Chapter

Border Control and Use of Biometrics: Reasons Why the Right to Privacy Can Not Be Absolute

Authors : Mohamed Abomhara, Sule Yildirim Yayilgan, Marina Shalaginova, Zoltán Székely

Published in: Privacy and Identity Management. Data for Better Living: AI and Privacy

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper discusses concerns pertaining to the absoluteness of the right to privacy regarding the use of biometric data for border control. The discussion explains why privacy cannot be absolute from different points of view, including privacy versus national security, privacy properties conflicting with border risk analysis, and Privacy by Design (PbD) and engineering design challenges.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
2
European Union Agency for Network and Information Security (www.​enisa.​europa.​eu).
 
Literature
3.
go back to reference Regulation (EU) 2017/2226 of the European Parliament and of the Council of 30 November 2017 establishing an Entry/Exit System (EES) to register entry and exit data and refusal of entry data of third-country nationals crossing the external borders of the Member States and determining the conditions for access to the EES for law enforcement purposes, and amending the Convention implementing the Schengen Agreement and Regulations (EC) No 767/2008 and (EU) No 1077/2011. Official Journal of the European Union, L 327/20 (2017). https://eur-lex.europa.eu/eli/reg/2017/2226/oj Regulation (EU) 2017/2226 of the European Parliament and of the Council of 30 November 2017 establishing an Entry/Exit System (EES) to register entry and exit data and refusal of entry data of third-country nationals crossing the external borders of the Member States and determining the conditions for access to the EES for law enforcement purposes, and amending the Convention implementing the Schengen Agreement and Regulations (EC) No 767/2008 and (EU) No 1077/2011. Official Journal of the European Union, L 327/20 (2017). https://​eur-lex.​europa.​eu/​eli/​reg/​2017/​2226/​oj
4.
5.
go back to reference Court of Justice of the European Union: C-112/00, Eugen Schmidberger, Internationale Transporte und Planzüge v Republik Österreich (2003) Court of Justice of the European Union: C-112/00, Eugen Schmidberger, Internationale Transporte und Planzüge v Republik Österreich (2003)
6.
go back to reference Court of Justice of the European Union: Joined Cases C-92/09 and C-93/09, Volker und Markus Schecke GbR and Hartmut Eifert v Land Hessen (2010) Court of Justice of the European Union: Joined Cases C-92/09 and C-93/09, Volker und Markus Schecke GbR and Hartmut Eifert v Land Hessen (2010)
7.
go back to reference Court of Justice of the European Union: Case C-131/12, Google Spain SL and Google Inc. v Agencia Española de Protección de Datos (AEPD) and Mario Costeja González (2014) Court of Justice of the European Union: Case C-131/12, Google Spain SL and Google Inc. v Agencia Española de Protección de Datos (AEPD) and Mario Costeja González (2014)
8.
go back to reference Abdelwhab, A., Viriri, S.: A survey on soft biometrics for human identification. Mach. Learn. Biom., 37 (2018) Abdelwhab, A., Viriri, S.: A survey on soft biometrics for human identification. Mach. Learn. Biom., 37 (2018)
10.
go back to reference Abrahamsson, P., Salo, O., Ronkainen, J., Warsta, J.: Agile software development methods: review and analysis. VTT Technical Research Centre of Finland, VTT Publications 478 (2017) Abrahamsson, P., Salo, O., Ronkainen, J., Warsta, J.: Agile software development methods: review and analysis. VTT Technical Research Centre of Finland, VTT Publications 478 (2017)
11.
go back to reference Bhatia, R.: Biometrics and face recognition techniques. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5) (2013) Bhatia, R.: Biometrics and face recognition techniques. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5) (2013)
13.
go back to reference Bonnici, J.P.M.: Exploring the non-absolute nature of the right to data protection. Int. Rev. Law Comput. Technol. 28(2), 131–143 (2014)CrossRef Bonnici, J.P.M.: Exploring the non-absolute nature of the right to data protection. Int. Rev. Law Comput. Technol. 28(2), 131–143 (2014)CrossRef
15.
go back to reference Çinar, Ö.H.: The right to privacy in international human rights law. J. Inf. Syst. Oper. Manag. 13(1), 33–44 (2019) Çinar, Ö.H.: The right to privacy in international human rights law. J. Inf. Syst. Oper. Manag. 13(1), 33–44 (2019)
17.
go back to reference Dantcheva, A., Elia, P., Ross, A.: What else does your biometric data reveal? A survey on soft biometrics. IEEE Trans. Inf. Forensics Secur. 11(3), 441–467 (2016)CrossRef Dantcheva, A., Elia, P., Ross, A.: What else does your biometric data reveal? A survey on soft biometrics. IEEE Trans. Inf. Forensics Secur. 11(3), 441–467 (2016)CrossRef
18.
go back to reference Dantcheva, A., Velardo, C., D’angelo, A., Dugelay, J.L.: Bag of soft biometrics for person identification. Multimedia Tools Appl. 51(2), 739–777 (2011)CrossRef Dantcheva, A., Velardo, C., D’angelo, A., Dugelay, J.L.: Bag of soft biometrics for person identification. Multimedia Tools Appl. 51(2), 739–777 (2011)CrossRef
19.
go back to reference Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requirements Eng. 16(1), 3–32 (2011)CrossRef Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requirements Eng. 16(1), 3–32 (2011)CrossRef
21.
go back to reference European Commission: Biometrics technologies: a key enabler for future digital services. Digital Transformation Monitor (2018) European Commission: Biometrics technologies: a key enabler for future digital services. Digital Transformation Monitor (2018)
22.
go back to reference Gürses, S., Troncoso, C., Diaz, C.: Engineering privacy by design. Comput. Priv. Data Prot. 14(3), 25 (2011) Gürses, S., Troncoso, C., Diaz, C.: Engineering privacy by design. Comput. Priv. Data Prot. 14(3), 25 (2011)
23.
go back to reference Hadar, I., et al.: Privacy by designers: software developers’ privacy mindset. Empirical Softw. Eng. 23(1), 259–289 (2018)CrossRef Hadar, I., et al.: Privacy by designers: software developers’ privacy mindset. Empirical Softw. Eng. 23(1), 259–289 (2018)CrossRef
25.
go back to reference Howard, M., Lipner, S.: The Security Development Lifecycle, vol. 8. Microsoft Press, Redmond (2006) Howard, M., Lipner, S.: The Security Development Lifecycle, vol. 8. Microsoft Press, Redmond (2006)
28.
go back to reference Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: the PriS method. Requirements Eng. 13(3), 241–255 (2008)CrossRef Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: the PriS method. Requirements Eng. 13(3), 241–255 (2008)CrossRef
29.
go back to reference Khoo, Y.H., Goi, B.M., Chai, T.Y., Lai, Y.L., Jin, Z.: Multimodal biometrics system using feature-level fusion of iris and fingerprint. In: Proceedings of the 2nd International Conference on Advances in Image Processing, pp. 6–10. ACM (2018) Khoo, Y.H., Goi, B.M., Chai, T.Y., Lai, Y.L., Jin, Z.: Multimodal biometrics system using feature-level fusion of iris and fingerprint. In: Proceedings of the 2nd International Conference on Advances in Image Processing, pp. 6–10. ACM (2018)
30.
go back to reference Kizza, J.M., et al.: Ethical and Social Issues in the Information Age, vol. 999. Springer, Heidelberg (2013)CrossRef Kizza, J.M., et al.: Ethical and Social Issues in the Information Age, vol. 999. Springer, Heidelberg (2013)CrossRef
32.
go back to reference Lind, N.S., Rankin, E.T.: Privacy in the Digital Age: 21st-Century Challenges to the Fourth Amendment: 21st-Century Challenges to the Fourth Amendment, vol. 2. ABC-CLIO, Santa Barbara (2015) Lind, N.S., Rankin, E.T.: Privacy in the Digital Age: 21st-Century Challenges to the Fourth Amendment: 21st-Century Challenges to the Fourth Amendment, vol. 2. ABC-CLIO, Santa Barbara (2015)
33.
go back to reference Liu, N.Y.: Bio-Privacy: Privacy Regulations and the Challenge of Biometrics. Routledge, Abingdon (2013)CrossRef Liu, N.Y.: Bio-Privacy: Privacy Regulations and the Challenge of Biometrics. Routledge, Abingdon (2013)CrossRef
34.
go back to reference Lumini, A., Nanni, L.: Overview of the combination of biometric matchers. Inf. Fusion 33, 71–85 (2017)CrossRef Lumini, A., Nanni, L.: Overview of the combination of biometric matchers. Inf. Fusion 33, 71–85 (2017)CrossRef
35.
go back to reference Mironenko, O.: Body scanners versus privacy and data protection. Comput. Law Secur. Rev. 27(3), 232–244 (2011)CrossRef Mironenko, O.: Body scanners versus privacy and data protection. Comput. Law Secur. Rev. 27(3), 232–244 (2011)CrossRef
36.
go back to reference Oetzel, M.C., Spiekermann, S.: A systematic methodology for privacy impact assessments: a design science approach. Eur. J. Inf. Syst. 23(2), 126–150 (2014)CrossRef Oetzel, M.C., Spiekermann, S.: A systematic methodology for privacy impact assessments: a design science approach. Eur. J. Inf. Syst. 23(2), 126–150 (2014)CrossRef
37.
go back to reference Parkavi, R., Babu, K.C., Kumar, J.A.: Multimodal biometrics for user authentication. In: 2017 11th International Conference on Intelligent Systems and Control (ISCO), pp. 501–505. IEEE (2017) Parkavi, R., Babu, K.C., Kumar, J.A.: Multimodal biometrics for user authentication. In: 2017 11th International Conference on Intelligent Systems and Control (ISCO), pp. 501–505. IEEE (2017)
38.
go back to reference Rao, P.R.M., Krishna, S.M., Kumar, A.S.: Privacy preservation techniques in big data analytics: a survey. J. Big Data 5(1), 33 (2018)CrossRef Rao, P.R.M., Krishna, S.M., Kumar, A.S.: Privacy preservation techniques in big data analytics: a survey. J. Big Data 5(1), 33 (2018)CrossRef
39.
go back to reference Robinson, N., Gaspers, J.: Information security and data protection legal and policy frameworks applicable to European Union institutions and agencies (2014) Robinson, N., Gaspers, J.: Information security and data protection legal and policy frameworks applicable to European Union institutions and agencies (2014)
40.
go back to reference Rung, S., van Lieshout, M., Friedewald, M., Ooms, M., van den Broek, T.: Privacy and security: citizens’ desires for an equal footing. In: Surveillance, Privacy and Security, pp. 15–35. Routledge (2017) Rung, S., van Lieshout, M., Friedewald, M., Ooms, M., van den Broek, T.: Privacy and security: citizens’ desires for an equal footing. In: Surveillance, Privacy and Security, pp. 15–35. Routledge (2017)
41.
go back to reference Saranya, K., Premalatha, K., Rajasekar, S.: A survey on privacy preserving data mining. In: 2015 2nd International Conference on Electronics and Communication Systems (ICECS), pp. 1740–1744. IEEE (2015) Saranya, K., Premalatha, K., Rajasekar, S.: A survey on privacy preserving data mining. In: 2015 2nd International Conference on Electronics and Communication Systems (ICECS), pp. 1740–1744. IEEE (2015)
42.
43.
go back to reference Senarath, A., Arachchilage, N.A.: Why developers cannot embed privacy into software systems?: An empirical investigation. In: Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering 2018, pp. 211–216. ACM (2018) Senarath, A., Arachchilage, N.A.: Why developers cannot embed privacy into software systems?: An empirical investigation. In: Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering 2018, pp. 211–216. ACM (2018)
44.
go back to reference Sheth, S., Kaiser, G., Maalej, W.: Us and them: a study of privacy requirements across North America, Asia, and Europe. In: Proceedings of the 36th International Conference on Software Engineering, pp. 859–870. ACM (2014) Sheth, S., Kaiser, G., Maalej, W.: Us and them: a study of privacy requirements across North America, Asia, and Europe. In: Proceedings of the 36th International Conference on Software Engineering, pp. 859–870. ACM (2014)
45.
go back to reference Shostack, A.: Threat Modeling: Designing for Security. Wiley, Hoboken (2014) Shostack, A.: Threat Modeling: Designing for Security. Wiley, Hoboken (2014)
46.
go back to reference Spiekermann, S., Cranor, L.F.: Engineering privacy. IEEE Trans. Softw. Eng. 35(1), 67–82 (2008)CrossRef Spiekermann, S., Cranor, L.F.: Engineering privacy. IEEE Trans. Softw. Eng. 35(1), 67–82 (2008)CrossRef
47.
go back to reference Spiekermann-Hoff, S.: The challenges of privacy by design. Commun. ACM (CACM) 55(7), 34–37 (2012)CrossRef Spiekermann-Hoff, S.: The challenges of privacy by design. Commun. ACM (CACM) 55(7), 34–37 (2012)CrossRef
50.
go back to reference Warren, S., Brandeis, L.: The Right to Privacy. Litres (2019) Warren, S., Brandeis, L.: The Right to Privacy. Litres (2019)
52.
go back to reference Zewail, R., Elsafi, A., Saeb, M., Hamdy, N.: Soft and hard biometrics fusion for improved identity verification. In: The 2004 47th Midwest Symposium on Circuits and Systems, 2004. MWSCAS 2004, vol. 1, pp. I-225. IEEE (2004) Zewail, R., Elsafi, A., Saeb, M., Hamdy, N.: Soft and hard biometrics fusion for improved identity verification. In: The 2004 47th Midwest Symposium on Circuits and Systems, 2004. MWSCAS 2004, vol. 1, pp. I-225. IEEE (2004)
Metadata
Title
Border Control and Use of Biometrics: Reasons Why the Right to Privacy Can Not Be Absolute
Authors
Mohamed Abomhara
Sule Yildirim Yayilgan
Marina Shalaginova
Zoltán Székely
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-42504-3_17

Premium Partner