2017
DOI: 10.1038/543034a
|View full text |Cite
|
Sign up to set email alerts
|

Protect rights at automated borders

Abstract: Body scanners are used at airport border crossings as an extra security-screening process. Protect rights at automated borders Gemma Galdon Clavell calls for checks and balances to avoid the indiscriminate sharing of personal data.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(14 citation statements)
references
References 2 publications
0
14
0
Order By: Relevance
“…Trust contributes to synthetic data acceptance, while risk contributes to its rejection. For example, to operate effectively on the human's behalf, embodied intelligent assistants might need confidential or sensitive information of the users such as financial details and personal contact information [9]. Acceptance of synthetic data in modeling is determined by the combination of both R&T factors [14], [47], [56].…”
Section: Motivation and Problem Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…Trust contributes to synthetic data acceptance, while risk contributes to its rejection. For example, to operate effectively on the human's behalf, embodied intelligent assistants might need confidential or sensitive information of the users such as financial details and personal contact information [9]. Acceptance of synthetic data in modeling is determined by the combination of both R&T factors [14], [47], [56].…”
Section: Motivation and Problem Formulationmentioning
confidence: 99%
“…These cognitive elements are distributed in the form of a multi-state perception-action cycle semi-automated model [52]. In addition, a cognitive checkpoint is a privacy-sensitive model [9]. Note that a cognitive checkpoint is the most advanced form of the biometric-enable systems.…”
Section: Introductionmentioning
confidence: 99%
“…These cognitive elements are distributed in the form of a multi-state multi-perception-cycle semi-automated model [62]. In addition, a cognitive checkpoint is a privacy-sensitive model [11], [14].…”
Section: Basic Definitions Statements and Propertiesmentioning
confidence: 99%
“…Such AI tools performing actions on behalf of an operator could make errors that are difficult to "undo", for example, mis-identification of a person-of-interest. Moreover, for AI to operate effectively on the human's behalf, they might need confidential or sensitive information of the users such as financial details and personal contact information [11]. Trust becomes very important if an AI actions can cause their user physical, financial, or psychological harm.…”
Section: Introductionmentioning
confidence: 99%
“…Misidentification remains a common occurrence due to shortcomings in current watchlist technologies and provides the principal motivation for this paper. Contemporary checkpoint is a cyber-physical computational platform that includes traveler authentication [23], [29], [48] using e-passport/ID [5], watchlist screening [9], [51], [86], concealed object detection [32], [60], interviewing [1], [4], [61], and risk assessment [49], [74], [76], [78], [91] under umbrella of justice and privacy issues [10], [15], [19]. In the International Air Transport Association (IATA) roadmap [36], four pillars of the checkpoint of the future are identified: computation intelligence, operations, infrastructure, and economic measures.…”
Section: Introductionmentioning
confidence: 99%