SlideShare a Scribd company logo
1 of 1
Download to read offline
BIOMETRICS: HOW FAR ARE
WE PREPARED TO GO?
A EUROPEAN CONSUMER SURVEY

BIOMETRICS:

AUTHENTICATING PEOPLE BY THEIR PHYSICAL
CHARACTERISTICS INCLUDING FINGERPRINTS,
FACE, IRIS AND VEINS
Growing use of highly innovative technology across Europe
“Biometric technology is increasingly used to support a diverse
range of tasks, but many citizens are still wary of adopting this
technology in their everyday lives due to concerns around privacy”,
says Ole Marius Steinkjer, from Steria’s Biometrics Centre
of Excellence.

HOW CAN BIOMETRICS HELP US?
FRENCH
ARE THE MOST
IN FAVOUR

BY IDENTIFYING CRIMINALS
Supported by the majority of citizens

1.

BRITISH

81%

GERMANS

2.

of citizens are in favour
of the use of biometrics
to identify criminals

89%

80%
1.

BY AUTHENTICATING PEOPLE…

69%

of respondents across
Europe support the
use of biometrics in identity cards
or passports

3.

77%

2.

81%

3.

73%
DANES

of FRENCH citizens
are in favour of this
application

68%
BRITISH

... TO PROTECT YOUR IDENTITY
The most important reason for using biometric ID cards or passports:
80
70
60

54%

1.

SECURITY AGAINST IDENTITY THEFT

2.

REDUCING CRIME

3.

SIMPLIFYING
ADMINISTRATIVE PROCEDURES

50
40

12%

30
20
10

only

4%

0

1.

2.

3.

BY ENTERING SECURE AREAS
FRENCH

1.

DANES

69%

are also in favour
of using biometrics
to enter secure areas

BRITISH

2.

75%

77%

3.

69%

BY SECURING YOUR ASSETS
1.

2.

3.

4.

5.

52%

44%

44%

43%

41%

FRENCH

SWEDISH

BUT ONLY of European citizens

45% are in favour of the
use of biometrics to

replace PIN numbers
for bank cards

BRITISH NORWEGIANS GERMANS

About this research:
Steria surveyed 3,650 citizens from the UK, France, Germany, Denmark, Norway and Sweden. The research was conducted by Toluna on behalf of Steria in June 2013.
Find more information on steria.com
Follow us @Steria

More Related Content

Viewers also liked

2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysisBee_Ware
 
Manufacturing
ManufacturingManufacturing
Manufacturingsudpal88
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security SurveyBee_Ware
 
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพรใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพรMark Mad
 
Kilpailukykysopimuksen vaikutusarvio
Kilpailukykysopimuksen vaikutusarvioKilpailukykysopimuksen vaikutusarvio
Kilpailukykysopimuksen vaikutusarvioOlli Kärkkäinen
 
Growth of electricity_sector_in_india_from_1947-2011
Growth of electricity_sector_in_india_from_1947-2011Growth of electricity_sector_in_india_from_1947-2011
Growth of electricity_sector_in_india_from_1947-2011sudpal88
 
Talking to elderly parents about home care
Talking to elderly parents about home careTalking to elderly parents about home care
Talking to elderly parents about home careTracy Steel
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance reportBee_Ware
 
pengendalian (titipan temen)
pengendalian (titipan temen)pengendalian (titipan temen)
pengendalian (titipan temen)Ahmad Fuadi
 
Top 10 professors of organic geochemistry
Top 10 professors of organic geochemistryTop 10 professors of organic geochemistry
Top 10 professors of organic geochemistryAsmaa Mohammed
 

Viewers also liked (16)

Erreportajea dna
Erreportajea dnaErreportajea dna
Erreportajea dna
 
Vocales ruddy
Vocales ruddyVocales ruddy
Vocales ruddy
 
Video Production Beginner's Guide
Video Production Beginner's GuideVideo Production Beginner's Guide
Video Production Beginner's Guide
 
2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis
 
Manufacturing
ManufacturingManufacturing
Manufacturing
 
Intro
IntroIntro
Intro
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security Survey
 
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพรใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
 
Kilpailukykysopimuksen vaikutusarvio
Kilpailukykysopimuksen vaikutusarvioKilpailukykysopimuksen vaikutusarvio
Kilpailukykysopimuksen vaikutusarvio
 
Growth of electricity_sector_in_india_from_1947-2011
Growth of electricity_sector_in_india_from_1947-2011Growth of electricity_sector_in_india_from_1947-2011
Growth of electricity_sector_in_india_from_1947-2011
 
Trias politika
Trias politikaTrias politika
Trias politika
 
Talking to elderly parents about home care
Talking to elderly parents about home careTalking to elderly parents about home care
Talking to elderly parents about home care
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance report
 
ฟอร มโครงร างโครงงานคอมพ_วเตอร_
ฟอร มโครงร างโครงงานคอมพ_วเตอร_ฟอร มโครงร างโครงงานคอมพ_วเตอร_
ฟอร มโครงร างโครงงานคอมพ_วเตอร_
 
pengendalian (titipan temen)
pengendalian (titipan temen)pengendalian (titipan temen)
pengendalian (titipan temen)
 
Top 10 professors of organic geochemistry
Top 10 professors of organic geochemistryTop 10 professors of organic geochemistry
Top 10 professors of organic geochemistry
 

Similar to Biometrics how far are we prepared to go

Role of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementRole of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementBahaa Abdulhadi
 
ECH Campus Leadership Summit: Ilias Lakovidis
ECH Campus Leadership Summit: Ilias LakovidisECH Campus Leadership Summit: Ilias Lakovidis
ECH Campus Leadership Summit: Ilias Lakovidis3GDR
 
Internet of medical things (IOMT)
Internet of medical things (IOMT)Internet of medical things (IOMT)
Internet of medical things (IOMT)K Raman Sethuraman
 
Innomantra viewpoint vital sign monitors covid 19 v1.0FF July 2020
Innomantra viewpoint vital sign monitors covid 19  v1.0FF July 2020Innomantra viewpoint vital sign monitors covid 19  v1.0FF July 2020
Innomantra viewpoint vital sign monitors covid 19 v1.0FF July 2020Innomantra
 
Health Informatics
Health InformaticsHealth Informatics
Health Informaticssongbird118
 
Health Informatics
Health InformaticsHealth Informatics
Health Informaticssongbird118
 
Errors in eHealth article
Errors in eHealth articleErrors in eHealth article
Errors in eHealth articleTimothy Boyce
 
The Future of mHealth - Jay Srini - March 2011
The Future of mHealth - Jay Srini - March 2011The Future of mHealth - Jay Srini - March 2011
The Future of mHealth - Jay Srini - March 2011LifeWIRE Corp
 
Data, bots and drones – Transforming access to health through technology
Data, bots and drones – Transforming access to health through technologyData, bots and drones – Transforming access to health through technology
Data, bots and drones – Transforming access to health through technologyILC- UK
 
ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS
ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS 	ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS
ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS Arpita Banerjee
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Ketan Sawakare
 
Innoversum 2011: Presentatie Inertia technology
Innoversum 2011: Presentatie Inertia technology Innoversum 2011: Presentatie Inertia technology
Innoversum 2011: Presentatie Inertia technology High Tech Systems Park
 
Digital Health Complete Notes and Elaboration
Digital Health Complete Notes and ElaborationDigital Health Complete Notes and Elaboration
Digital Health Complete Notes and ElaborationCaptainAmerica99
 
Forensic Dental Identification and Blockchain Technology: hypothesis, applic...
 Forensic Dental Identification and Blockchain Technology: hypothesis, applic... Forensic Dental Identification and Blockchain Technology: hypothesis, applic...
Forensic Dental Identification and Blockchain Technology: hypothesis, applic...Università di Torino
 
GetPersonalized! Estonian approach - from biobanking to precision medicine, A...
GetPersonalized! Estonian approach - from biobanking to precision medicine, A...GetPersonalized! Estonian approach - from biobanking to precision medicine, A...
GetPersonalized! Estonian approach - from biobanking to precision medicine, A...Sitra / Hyvinvointi
 

Similar to Biometrics how far are we prepared to go (20)

Role of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementRole of Biometrics in Law Enforcement
Role of Biometrics in Law Enforcement
 
ECH Campus Leadership Summit: Ilias Lakovidis
ECH Campus Leadership Summit: Ilias LakovidisECH Campus Leadership Summit: Ilias Lakovidis
ECH Campus Leadership Summit: Ilias Lakovidis
 
Internet of medical things (IOMT)
Internet of medical things (IOMT)Internet of medical things (IOMT)
Internet of medical things (IOMT)
 
Innomantra viewpoint vital sign monitors covid 19 v1.0FF July 2020
Innomantra viewpoint vital sign monitors covid 19  v1.0FF July 2020Innomantra viewpoint vital sign monitors covid 19  v1.0FF July 2020
Innomantra viewpoint vital sign monitors covid 19 v1.0FF July 2020
 
Health Informatics
Health InformaticsHealth Informatics
Health Informatics
 
Health Informatics
Health InformaticsHealth Informatics
Health Informatics
 
Errors in eHealth article
Errors in eHealth articleErrors in eHealth article
Errors in eHealth article
 
The Future of mHealth - Jay Srini - March 2011
The Future of mHealth - Jay Srini - March 2011The Future of mHealth - Jay Srini - March 2011
The Future of mHealth - Jay Srini - March 2011
 
Data, bots and drones – Transforming access to health through technology
Data, bots and drones – Transforming access to health through technologyData, bots and drones – Transforming access to health through technology
Data, bots and drones – Transforming access to health through technology
 
ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS
ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS 	ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS
ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Eskulabs
EskulabsEskulabs
Eskulabs
 
Innoversum 2011: Presentatie Inertia technology
Innoversum 2011: Presentatie Inertia technology Innoversum 2011: Presentatie Inertia technology
Innoversum 2011: Presentatie Inertia technology
 
Digital health
Digital healthDigital health
Digital health
 
Digital Health Complete Notes and Elaboration
Digital Health Complete Notes and ElaborationDigital Health Complete Notes and Elaboration
Digital Health Complete Notes and Elaboration
 
Addressing the first 90: How can HIV testing more efficiently reach those in ...
Addressing the first 90: How can HIV testing more efficiently reach those in ...Addressing the first 90: How can HIV testing more efficiently reach those in ...
Addressing the first 90: How can HIV testing more efficiently reach those in ...
 
Forensic Dental Identification and Blockchain Technology: hypothesis, applic...
 Forensic Dental Identification and Blockchain Technology: hypothesis, applic... Forensic Dental Identification and Blockchain Technology: hypothesis, applic...
Forensic Dental Identification and Blockchain Technology: hypothesis, applic...
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Biometric System
Biometric SystemBiometric System
Biometric System
 
GetPersonalized! Estonian approach - from biobanking to precision medicine, A...
GetPersonalized! Estonian approach - from biobanking to precision medicine, A...GetPersonalized! Estonian approach - from biobanking to precision medicine, A...
GetPersonalized! Estonian approach - from biobanking to precision medicine, A...
 

More from Bee_Ware

Les francais et la protection des données personnelles
Les francais et la protection des données personnellesLes francais et la protection des données personnelles
Les francais et la protection des données personnellesBee_Ware
 
DDoS threat landscape report
DDoS threat landscape reportDDoS threat landscape report
DDoS threat landscape reportBee_Ware
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challengesBee_Ware
 
2013 global encryption trends study
2013 global encryption trends study2013 global encryption trends study
2013 global encryption trends studyBee_Ware
 
Numergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudNumergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudBee_Ware
 
Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Bee_Ware
 
Bonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBee_Ware
 
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Bee_Ware
 
Maitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsMaitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsBee_Ware
 
Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Bee_Ware
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAMBee_Ware
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014Bee_Ware
 
Les principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesLes principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesBee_Ware
 
La sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéLa sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéBee_Ware
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesBee_Ware
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013Bee_Ware
 
Guide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsGuide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsBee_Ware
 
Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Bee_Ware
 
2013 cost of data breach study - France
2013 cost of data breach study - France2013 cost of data breach study - France
2013 cost of data breach study - FranceBee_Ware
 
X force report 2013
X force report 2013X force report 2013
X force report 2013Bee_Ware
 

More from Bee_Ware (20)

Les francais et la protection des données personnelles
Les francais et la protection des données personnellesLes francais et la protection des données personnelles
Les francais et la protection des données personnelles
 
DDoS threat landscape report
DDoS threat landscape reportDDoS threat landscape report
DDoS threat landscape report
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challenges
 
2013 global encryption trends study
2013 global encryption trends study2013 global encryption trends study
2013 global encryption trends study
 
Numergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudNumergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloud
 
Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration
 
Bonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - Kaspersky
 
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
 
Maitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsMaitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industriels
 
Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAM
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014
 
Les principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesLes principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuelles
 
La sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéLa sécurité des Si en établissement de santé
La sécurité des Si en établissement de santé
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
 
Guide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsGuide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cps
 
Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013
 
2013 cost of data breach study - France
2013 cost of data breach study - France2013 cost of data breach study - France
2013 cost of data breach study - France
 
X force report 2013
X force report 2013X force report 2013
X force report 2013
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

Biometrics how far are we prepared to go

  • 1. BIOMETRICS: HOW FAR ARE WE PREPARED TO GO? A EUROPEAN CONSUMER SURVEY BIOMETRICS: AUTHENTICATING PEOPLE BY THEIR PHYSICAL CHARACTERISTICS INCLUDING FINGERPRINTS, FACE, IRIS AND VEINS Growing use of highly innovative technology across Europe “Biometric technology is increasingly used to support a diverse range of tasks, but many citizens are still wary of adopting this technology in their everyday lives due to concerns around privacy”, says Ole Marius Steinkjer, from Steria’s Biometrics Centre of Excellence. HOW CAN BIOMETRICS HELP US? FRENCH ARE THE MOST IN FAVOUR BY IDENTIFYING CRIMINALS Supported by the majority of citizens 1. BRITISH 81% GERMANS 2. of citizens are in favour of the use of biometrics to identify criminals 89% 80% 1. BY AUTHENTICATING PEOPLE… 69% of respondents across Europe support the use of biometrics in identity cards or passports 3. 77% 2. 81% 3. 73% DANES of FRENCH citizens are in favour of this application 68% BRITISH ... TO PROTECT YOUR IDENTITY The most important reason for using biometric ID cards or passports: 80 70 60 54% 1. SECURITY AGAINST IDENTITY THEFT 2. REDUCING CRIME 3. SIMPLIFYING ADMINISTRATIVE PROCEDURES 50 40 12% 30 20 10 only 4% 0 1. 2. 3. BY ENTERING SECURE AREAS FRENCH 1. DANES 69% are also in favour of using biometrics to enter secure areas BRITISH 2. 75% 77% 3. 69% BY SECURING YOUR ASSETS 1. 2. 3. 4. 5. 52% 44% 44% 43% 41% FRENCH SWEDISH BUT ONLY of European citizens 45% are in favour of the use of biometrics to replace PIN numbers for bank cards BRITISH NORWEGIANS GERMANS About this research: Steria surveyed 3,650 citizens from the UK, France, Germany, Denmark, Norway and Sweden. The research was conducted by Toluna on behalf of Steria in June 2013. Find more information on steria.com Follow us @Steria