{"title":"Risk management approach on identity theft in biometric systems context","authors":"Sabine Delaître","doi":"10.1109/ARES.2006.113","DOIUrl":null,"url":null,"abstract":"This paper introduces issues of risk management applied to biometrics. A biometrics study has been recently carried out by the ICT unit team and biometric technologies have been examined from a SELT perspective (social, economic, legal and technological). Different threats have been highlighted, such as identity theft. This paper presents an introduction on the risk \"identity theft\" in the information society and describes the identity theft as a real threat of the wide implementation of biometrics. Based on the results of the biometrics study and aiming at illustrating risk management on biometrics, the last section deals with the application of a risk process model on the identity theft in biometric systems context.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"First International Conference on Availability, Reliability and Security (ARES'06)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2006.113","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
This paper introduces issues of risk management applied to biometrics. A biometrics study has been recently carried out by the ICT unit team and biometric technologies have been examined from a SELT perspective (social, economic, legal and technological). Different threats have been highlighted, such as identity theft. This paper presents an introduction on the risk "identity theft" in the information society and describes the identity theft as a real threat of the wide implementation of biometrics. Based on the results of the biometrics study and aiming at illustrating risk management on biometrics, the last section deals with the application of a risk process model on the identity theft in biometric systems context.