Threats of Facial Recognition Technology

Kasvojentunnistusteknologia on automaatiota ja koneoppimista hyödyntävä biometrinen tunnistusteknologia. Sen päätarkoitus on identifioida, paikantaa ja jäljittää kasvoja kuvasta tai suoratoistovideosta. Kyseinen teknologia koostuu kolmesta toiminnallisuudesta: kasvojen havaitsemisesta, tarkistuksest...

Full description

Bibliographic Details
Main Authors: Sinitsyn, Danila, Fräntilä, Jade
Other Authors: Faculty of Information Technology, Informaatioteknologian tiedekunta, Information Technology, Informaatioteknologia, University of Jyväskylä, Jyväskylän yliopisto
Format: Master's thesis
Language:eng
Published: 2024
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/94439
_version_ 1828193029659295744
author Sinitsyn, Danila Fräntilä, Jade
author2 Faculty of Information Technology Informaatioteknologian tiedekunta Information Technology Informaatioteknologia University of Jyväskylä Jyväskylän yliopisto
author_facet Sinitsyn, Danila Fräntilä, Jade Faculty of Information Technology Informaatioteknologian tiedekunta Information Technology Informaatioteknologia University of Jyväskylä Jyväskylän yliopisto Sinitsyn, Danila Fräntilä, Jade Faculty of Information Technology Informaatioteknologian tiedekunta Information Technology Informaatioteknologia University of Jyväskylä Jyväskylän yliopisto
author_sort Sinitsyn, Danila
datasource_str_mv jyx
description Kasvojentunnistusteknologia on automaatiota ja koneoppimista hyödyntävä biometrinen tunnistusteknologia. Sen päätarkoitus on identifioida, paikantaa ja jäljittää kasvoja kuvasta tai suoratoistovideosta. Kyseinen teknologia koostuu kolmesta toiminnallisuudesta: kasvojen havaitsemisesta, tarkistuksesta ja tunnistuksesta, joita voidaan käyttää yhdessä tai erikseen autentikoimiseen, kasvojen piirteiden muuntamiseen ja yksilöiden reaaliaikaiseen seurantaan. Kasvojentunnistusteknologian käyttö on kasvanut jatkuvasti viimeisen vuosikymmenen aikana, mutta tutkimus sen vaikutuksista, etenkin uhista, on edelleen vähäistä. Tämän tutkielman tavoitteena on tutkia ja tunnistaa kyseisen teknologian uhkia sekä luoda pohja mahdolliselle jatkotutkimukselle. Tutkimus toteutettiin laadullisella tutkimusmenetelmällä sekä hyödyntämällä puolistrukturoituja haastatteluja tiedonkeruuprosessissa. Analyysimme sekä aikaisemman kirjallisuuden pohjalta voidaan todeta, kuinka kasvojentunnistusteknologian uhat eroavat luonteeltaan julkisten ja yksityisten organisaatioiden käytön välillä. Löysimme myös uuden, tutkimattoman näkökulman uhkien tarkasteluun: teknologian käyttö yksityisen ja julkisten käyttötapausten välillä. Julkinen käyttö käsittää kasvojentunnistusteknologian käytön julkisissa tiloissa ja julkishallinnon toimesta. Yksityinen käyttö puolestaan viittaa yksityisen tahon tarjoaman teknologian käyttöön niin julkisella paikalla tai täysin yksityisesti, kuten omalla puhelimella. Tuloksistamme selvisi, kuinka yksilöt eivät joko kykene tunnistamaan kasvojentunnistusteknologian monia uhkia, tai kokevat uhkien estämisen olevan mahdotonta. Luottamus paikallisia yrityksiä kohtaan kuitenkin laimensi uhkakuvien kokemista. Yksilöiden yksityisyyden, tietoturvan sekä perusihmisoikeuksien turvaamiseksi keskustelu kasvojentunnistusteknologian uhista on nostettava pöydälle niin tutkimuskirjallisuudessa kuin yleisellä tasolla. Facial Recognition Technology (FRT) is a biometric identification technology utilizing automation and machine learning, and its main intent is to identify, localize, and trace human faces through the captured images or live video feed. The technology consists of three functions: facial detection, verification, and identification, which can either be used separately or in conjunction with each other to authenticate, alter facial features, and track individuals in real time. The usage of Facial Recognition Technology has been constantly increasing over the past decade, but the research on its effects on individuals, especially the threats, is still scarce. The purpose of this thesis is to explore and identify said threats and build a solid foundation for possible further research. The thesis was conducted as qualitative research with semi-structured interviews as a main method of collecting data. Based on the analysis and prior literature, the threats could be divided into two categories: public and private use of FRT. In short, public use comprises the utilization of FRT in public spaces and public entities, while private use encompasses the usage of FRT either by a private organization in a public space, or completely in private, for example, through an individual’s phone. Additionally, our results show how individuals either fail to recognize the numerous threats of FRT altogether or perceive them as impossible be protected against. However, trust in local authorities and organizations diminishes the perception of threats. In order to indemnify an individual’s privacy, information security, and basic human rights, it is crucial to discuss the underlying threats of Facial Recognition Technology, both in scientific literature and generally.
first_indexed 2024-04-24T20:04:07Z
format Pro gradu
fullrecord [{"key": "dc.contributor.advisor", "value": "Koskelainen, Tiina", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Sinitsyn, Danila", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Fr\u00e4ntil\u00e4, Jade", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-04-24T09:43:56Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-04-24T09:43:56Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/94439", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kasvojentunnistusteknologia on automaatiota ja koneoppimista hy\u00f6dynt\u00e4v\u00e4 biometrinen tunnistusteknologia. Sen p\u00e4\u00e4tarkoitus on identifioida, paikantaa ja j\u00e4ljitt\u00e4\u00e4 kasvoja kuvasta tai suoratoistovideosta. Kyseinen teknologia koostuu kolmesta toiminnallisuudesta: kasvojen havaitsemisesta, tarkistuksesta ja tunnistuksesta, joita voidaan k\u00e4ytt\u00e4\u00e4 yhdess\u00e4 tai erikseen autentikoimiseen, kasvojen\npiirteiden muuntamiseen ja yksil\u00f6iden reaaliaikaiseen seurantaan. Kasvojentunnistusteknologian k\u00e4ytt\u00f6 on kasvanut jatkuvasti viimeisen vuosikymmenen aikana, mutta tutkimus sen vaikutuksista, etenkin uhista, on edelleen v\u00e4h\u00e4ist\u00e4. T\u00e4m\u00e4n tutkielman tavoitteena on tutkia ja tunnistaa kyseisen teknologian uhkia\nsek\u00e4 luoda pohja mahdolliselle jatkotutkimukselle. Tutkimus toteutettiin laadullisella tutkimusmenetelm\u00e4ll\u00e4 sek\u00e4 hy\u00f6dynt\u00e4m\u00e4ll\u00e4 puolistrukturoituja haastatteluja tiedonkeruuprosessissa. Analyysimme sek\u00e4 aikaisemman kirjallisuuden\npohjalta voidaan todeta, kuinka kasvojentunnistusteknologian uhat eroavat\nluonteeltaan julkisten ja yksityisten organisaatioiden k\u00e4yt\u00f6n v\u00e4lill\u00e4. L\u00f6ysimme\nmy\u00f6s uuden, tutkimattoman n\u00e4k\u00f6kulman uhkien tarkasteluun: teknologian\nk\u00e4ytt\u00f6 yksityisen ja julkisten k\u00e4ytt\u00f6tapausten v\u00e4lill\u00e4. Julkinen k\u00e4ytt\u00f6 k\u00e4sitt\u00e4\u00e4 kasvojentunnistusteknologian k\u00e4yt\u00f6n julkisissa tiloissa ja julkishallinnon toimesta.\nYksityinen k\u00e4ytt\u00f6 puolestaan viittaa yksityisen tahon tarjoaman teknologian\nk\u00e4ytt\u00f6\u00f6n niin julkisella paikalla tai t\u00e4ysin yksityisesti, kuten omalla puhelimella.\nTuloksistamme selvisi, kuinka yksil\u00f6t eiv\u00e4t joko kykene tunnistamaan kasvojentunnistusteknologian monia uhkia, tai kokevat uhkien est\u00e4misen olevan mahdotonta. Luottamus paikallisia yrityksi\u00e4 kohtaan kuitenkin laimensi uhkakuvien\nkokemista. Yksil\u00f6iden yksityisyyden, tietoturvan sek\u00e4 perusihmisoikeuksien\nturvaamiseksi keskustelu kasvojentunnistusteknologian uhista on nostettava\np\u00f6yd\u00e4lle niin tutkimuskirjallisuudessa kuin yleisell\u00e4 tasolla.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Facial Recognition Technology (FRT) is a biometric identification technology\nutilizing automation and machine learning, and its main intent is to identify,\nlocalize, and trace human faces through the captured images or live video feed.\nThe technology consists of three functions: facial detection, verification, and\nidentification, which can either be used separately or in conjunction with each\nother to authenticate, alter facial features, and track individuals in real time. The\nusage of Facial Recognition Technology has been constantly increasing over the\npast decade, but the research on its effects on individuals, especially the threats,\nis still scarce. The purpose of this thesis is to explore and identify said threats and\nbuild a solid foundation for possible further research. The thesis was conducted\nas qualitative research with semi-structured interviews as a main method of\ncollecting data. Based on the analysis and prior literature, the threats could be\ndivided into two categories: public and private use of FRT. In short, public use\ncomprises the utilization of FRT in public spaces and public entities, while\nprivate use encompasses the usage of FRT either by a private organization in a\npublic space, or completely in private, for example, through an individual\u2019s\nphone. Additionally, our results show how individuals either fail to recognize\nthe numerous threats of FRT altogether or perceive them as impossible be\nprotected against. However, trust in local authorities and organizations\ndiminishes the perception of threats. In order to indemnify an individual\u2019s\nprivacy, information security, and basic human rights, it is crucial to discuss the\nunderlying threats of Facial Recognition Technology, both in scientific literature\nand generally.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2024-04-24T09:43:56Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-04-24T09:43:56Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "76", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "facial recognition technology", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "perceived threat", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "intelligent facial surveillance", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Threats of Facial Recognition Technology", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202404243051", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "yksityisyys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "biotunnistus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tunnistaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "uhat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "identifiointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kasvontunnistus (tietotekniikka)", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "privacy", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "biometric identification", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "safety and security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "recognition", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "threats", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "identification (recognition)", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "facial recognition (computer science)", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/en/workspaces/facilities/facilities#autotoc-item-autotoc-2).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat#autotoc-item-autotoc-2.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
id jyx.123456789_94439
language eng
last_indexed 2025-03-31T20:01:11Z
main_date 2024-01-01T00:00:00Z
main_date_str 2024
publishDate 2024
record_format qdc
source_str_mv jyx
spellingShingle Sinitsyn, Danila Fräntilä, Jade Threats of Facial Recognition Technology facial recognition technology perceived threat intelligent facial surveillance Information Systems Science Tietojärjestelmätiede 601 yksityisyys biotunnistus turvallisuus tunnistaminen uhat identifiointi kasvontunnistus (tietotekniikka) privacy biometric identification safety and security recognition threats identification (recognition) facial recognition (computer science)
title Threats of Facial Recognition Technology
title_full Threats of Facial Recognition Technology
title_fullStr Threats of Facial Recognition Technology Threats of Facial Recognition Technology
title_full_unstemmed Threats of Facial Recognition Technology Threats of Facial Recognition Technology
title_short Threats of Facial Recognition Technology
title_sort threats of facial recognition technology
title_txtP Threats of Facial Recognition Technology
topic facial recognition technology perceived threat intelligent facial surveillance Information Systems Science Tietojärjestelmätiede 601 yksityisyys biotunnistus turvallisuus tunnistaminen uhat identifiointi kasvontunnistus (tietotekniikka) privacy biometric identification safety and security recognition threats identification (recognition) facial recognition (computer science)
topic_facet 601 Information Systems Science Tietojärjestelmätiede biometric identification biotunnistus facial recognition (computer science) facial recognition technology identification (recognition) identifiointi intelligent facial surveillance kasvontunnistus (tietotekniikka) perceived threat privacy recognition safety and security threats tunnistaminen turvallisuus uhat yksityisyys
url https://jyx.jyu.fi/handle/123456789/94439 http://www.urn.fi/URN:NBN:fi:jyu-202404243051
work_keys_str_mv AT sinitsyndanila threatsoffacialrecognitiontechnology