Security 2.0Biometric personhoodServiceWave 201015 December 2010J. Peter Burgess <br />Peace Research Institute Oslo<br />
Outline<br />Identity and security<br />Socialethicsofthebiometric person<br />Security 2.0<br />
Identity and security<br />- Identity is traditionallybasedon a stable ’self’<br />- Securtiyand identity have beenregarde...
Social ethics of the biometric person<br />- Biometrics drives the shift toward identity 2.0<br />- The personhood is fiel...
Security 2.0<br />- Insecurity will shift toward identity threats<br />- Prophylactic models are entirely exhausted<br />-...
J. Peter Burgess<br />jpb@jpeterburgess.com<br />
Upcoming SlideShare
Loading in...5
×

J. Peter Burgess: Security 2.0 Biometric personhood

446

Published on

J. Peter Burgess: Security 2.0 Biometric personhood

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
446
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "J. Peter Burgess: Security 2.0 Biometric personhood"

  1. 1. Security 2.0Biometric personhoodServiceWave 201015 December 2010J. Peter Burgess <br />Peace Research Institute Oslo<br />
  2. 2. Outline<br />Identity and security<br />Socialethicsofthebiometric person<br />Security 2.0<br />
  3. 3. Identity and security<br />- Identity is traditionallybasedon a stable ’self’<br />- Securtiyand identity have beenregarded as inseparable<br />- Identity structuresthe moral, political, socialsubject<br />- Identity 2.0 is a logicofverification and certification<br />- Security in identity 2.0 involvesmeta-knowledge<br />- Security in identity 2.0 reconfigurestrust<br />
  4. 4. Social ethics of the biometric person<br />- Biometrics drives the shift toward identity 2.0<br />- The personhood is field of verfication and certification<br />- Biometric identity disrupts moral identity<br />
  5. 5. Security 2.0<br />- Insecurity will shift toward identity threats<br />- Prophylactic models are entirely exhausted<br />- Security provisions are detachable from the person <br />
  6. 6. J. Peter Burgess<br />jpb@jpeterburgess.com<br />

×