Data body mealplan Here is an example of how the data body is fed by routine day-to-day activities, a data body meal plan: Breakfast: phone calls, drive GPS (global positioning system) equipped car, emerge from surveillance camera equipped subway, go online, send E-mails, complete online registration forms, receive faxes Lunch: pay lunch with credit card, use your customer card when shopping, use mobile phone, pass through biometric access controls, use smart card Afternoon snack: visit doctor, file insurance claim Dinner: respond to TV commercials, complete income tax form, visit chat rooms, use free web mail. Programme phone wake-up call. |
|
Biometrics applications: gate keeping Identity has to do with "place". In less mobile societies, the place where a person finds him/herself tells us something about his/her identity. In pre-industrial times, gatekeepers had the function to control access of people to particular places, i.e. the gatekeepers function was to identify people and then decide whether somebody's identity would allow that person to physically occupy another place - a town, a building, a vehicle, etc. In modern societies, the unambiguous nature of place has been weakened. There is a great amount of physical mobility, and ever since the emergence and spread of electronic communication technologies there has been a "virtualisation" of places in what today we call "virtual space" (unlike place, space has been a virtual reality from the beginning, a mathematical formula) The question as to who one is no longer coupled to the physical abode. Highly mobile and virtualised social contexts require a new generation of gatekeepers which biometric technology aims to provide. |
|
Enforcement: Copyright Management and Control Technologies With the increased ease of the reproduction and transmission of unauthorized copies of digital works over electronic networks concerns among the copyright holder community have arisen. They fear a further growth of copyright piracy and demand adequate protection of their works. A development, which started in the mid 1990s and considers the copyright owner's apprehensions, is the creation of |
|