SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
BIOMETRICS: HOW FAR ARE
WE PREPARED TO GO?
A EUROPEAN CONSUMER SURVEY

BIOMETRICS:

AUTHENTICATING PEOPLE BY THEIR PHYSICAL
CHARACTERISTICS INCLUDING FINGERPRINTS,
FACE, IRIS AND VEINS
Growing use of highly innovative technology across Europe
“Biometric technology is increasingly used to support a diverse
range of tasks, but many citizens are still wary of adopting this
technology in their everyday lives due to concerns around privacy”,
says Ole Marius Steinkjer, from Steria’s Biometrics Centre
of Excellence.

HOW CAN BIOMETRICS HELP US?
FRENCH
ARE THE MOST
IN FAVOUR

BY IDENTIFYING CRIMINALS
Supported by the majority of citizens

1.

BRITISH

81%

GERMANS

2.

of citizens are in favour
of the use of biometrics
to identify criminals

89%

80%
1.

BY AUTHENTICATING PEOPLE…

69%

of respondents across
Europe support the
use of biometrics in identity cards
or passports

3.

77%

2.

81%

3.

73%
DANES

of FRENCH citizens
are in favour of this
application

68%
BRITISH

... TO PROTECT YOUR IDENTITY
The most important reason for using biometric ID cards or passports:
80
70
60

54%

1.

SECURITY AGAINST IDENTITY THEFT

2.

REDUCING CRIME

3.

SIMPLIFYING
ADMINISTRATIVE PROCEDURES

50
40

12%

30
20
10

only

4%

0

1.

2.

3.

BY ENTERING SECURE AREAS
FRENCH

1.

DANES

69%

are also in favour
of using biometrics
to enter secure areas

BRITISH

2.

75%

77%

3.

69%

BY SECURING YOUR ASSETS
1.

2.

3.

4.

5.

52%

44%

44%

43%

41%

FRENCH

SWEDISH

BUT ONLY of European citizens

45% are in favour of the
use of biometrics to

replace PIN numbers
for bank cards

BRITISH NORWEGIANS GERMANS

About this research:
Steria surveyed 3,650 citizens from the UK, France, Germany, Denmark, Norway and Sweden. The research was conducted by Toluna on behalf of Steria in June 2013.
Find more information on steria.com
Follow us @Steria

Más contenido relacionado

Destacado

2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysisBee_Ware
 
Manufacturing
ManufacturingManufacturing
Manufacturingsudpal88
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security SurveyBee_Ware
 
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพรใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพรMark Mad
 
Kilpailukykysopimuksen vaikutusarvio
Kilpailukykysopimuksen vaikutusarvioKilpailukykysopimuksen vaikutusarvio
Kilpailukykysopimuksen vaikutusarvioOlli Kärkkäinen
 
Growth of electricity_sector_in_india_from_1947-2011
Growth of electricity_sector_in_india_from_1947-2011Growth of electricity_sector_in_india_from_1947-2011
Growth of electricity_sector_in_india_from_1947-2011sudpal88
 
Talking to elderly parents about home care
Talking to elderly parents about home careTalking to elderly parents about home care
Talking to elderly parents about home careTracy Steel
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance reportBee_Ware
 
pengendalian (titipan temen)
pengendalian (titipan temen)pengendalian (titipan temen)
pengendalian (titipan temen)Ahmad Fuadi
 
Top 10 professors of organic geochemistry
Top 10 professors of organic geochemistryTop 10 professors of organic geochemistry
Top 10 professors of organic geochemistryAsmaa Mohammed
 

Destacado (16)

Erreportajea dna
Erreportajea dnaErreportajea dna
Erreportajea dna
 
Vocales ruddy
Vocales ruddyVocales ruddy
Vocales ruddy
 
Video Production Beginner's Guide
Video Production Beginner's GuideVideo Production Beginner's Guide
Video Production Beginner's Guide
 
2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis
 
Manufacturing
ManufacturingManufacturing
Manufacturing
 
Intro
IntroIntro
Intro
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security Survey
 
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพรใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
 
Kilpailukykysopimuksen vaikutusarvio
Kilpailukykysopimuksen vaikutusarvioKilpailukykysopimuksen vaikutusarvio
Kilpailukykysopimuksen vaikutusarvio
 
Growth of electricity_sector_in_india_from_1947-2011
Growth of electricity_sector_in_india_from_1947-2011Growth of electricity_sector_in_india_from_1947-2011
Growth of electricity_sector_in_india_from_1947-2011
 
Trias politika
Trias politikaTrias politika
Trias politika
 
Talking to elderly parents about home care
Talking to elderly parents about home careTalking to elderly parents about home care
Talking to elderly parents about home care
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance report
 
ฟอร มโครงร างโครงงานคอมพ_วเตอร_
ฟอร มโครงร างโครงงานคอมพ_วเตอร_ฟอร มโครงร างโครงงานคอมพ_วเตอร_
ฟอร มโครงร างโครงงานคอมพ_วเตอร_
 
pengendalian (titipan temen)
pengendalian (titipan temen)pengendalian (titipan temen)
pengendalian (titipan temen)
 
Top 10 professors of organic geochemistry
Top 10 professors of organic geochemistryTop 10 professors of organic geochemistry
Top 10 professors of organic geochemistry
 

Similar a Biometrics how far are we prepared to go

ECH Campus Leadership Summit: Ilias Lakovidis
ECH Campus Leadership Summit: Ilias LakovidisECH Campus Leadership Summit: Ilias Lakovidis
ECH Campus Leadership Summit: Ilias Lakovidis3GDR
 
Internet of medical things (IOMT)
Internet of medical things (IOMT)Internet of medical things (IOMT)
Internet of medical things (IOMT)K Raman Sethuraman
 
Innomantra viewpoint vital sign monitors covid 19 v1.0FF July 2020
Innomantra viewpoint vital sign monitors covid 19  v1.0FF July 2020Innomantra viewpoint vital sign monitors covid 19  v1.0FF July 2020
Innomantra viewpoint vital sign monitors covid 19 v1.0FF July 2020Innomantra
 
Health Informatics
Health InformaticsHealth Informatics
Health Informaticssongbird118
 
Health Informatics
Health InformaticsHealth Informatics
Health Informaticssongbird118
 
Errors in eHealth article
Errors in eHealth articleErrors in eHealth article
Errors in eHealth articleTimothy Boyce
 
The Future of mHealth - Jay Srini - March 2011
The Future of mHealth - Jay Srini - March 2011The Future of mHealth - Jay Srini - March 2011
The Future of mHealth - Jay Srini - March 2011LifeWIRE Corp
 
Data, bots and drones – Transforming access to health through technology
Data, bots and drones – Transforming access to health through technologyData, bots and drones – Transforming access to health through technology
Data, bots and drones – Transforming access to health through technologyILC- UK
 
ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS
ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS 	ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS
ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS Arpita Banerjee
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Ketan Sawakare
 
Innoversum 2011: Presentatie Inertia technology
Innoversum 2011: Presentatie Inertia technology Innoversum 2011: Presentatie Inertia technology
Innoversum 2011: Presentatie Inertia technology High Tech Systems Park
 
Digital Health Complete Notes and Elaboration
Digital Health Complete Notes and ElaborationDigital Health Complete Notes and Elaboration
Digital Health Complete Notes and ElaborationCaptainAmerica99
 
Forensic Dental Identification and Blockchain Technology: hypothesis, applic...
 Forensic Dental Identification and Blockchain Technology: hypothesis, applic... Forensic Dental Identification and Blockchain Technology: hypothesis, applic...
Forensic Dental Identification and Blockchain Technology: hypothesis, applic...Università di Torino
 
GetPersonalized! Estonian approach - from biobanking to precision medicine, A...
GetPersonalized! Estonian approach - from biobanking to precision medicine, A...GetPersonalized! Estonian approach - from biobanking to precision medicine, A...
GetPersonalized! Estonian approach - from biobanking to precision medicine, A...Sitra / Hyvinvointi
 
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...RSIS International
 

Similar a Biometrics how far are we prepared to go (20)

ECH Campus Leadership Summit: Ilias Lakovidis
ECH Campus Leadership Summit: Ilias LakovidisECH Campus Leadership Summit: Ilias Lakovidis
ECH Campus Leadership Summit: Ilias Lakovidis
 
Internet of medical things (IOMT)
Internet of medical things (IOMT)Internet of medical things (IOMT)
Internet of medical things (IOMT)
 
Innomantra viewpoint vital sign monitors covid 19 v1.0FF July 2020
Innomantra viewpoint vital sign monitors covid 19  v1.0FF July 2020Innomantra viewpoint vital sign monitors covid 19  v1.0FF July 2020
Innomantra viewpoint vital sign monitors covid 19 v1.0FF July 2020
 
Health Informatics
Health InformaticsHealth Informatics
Health Informatics
 
Health Informatics
Health InformaticsHealth Informatics
Health Informatics
 
Errors in eHealth article
Errors in eHealth articleErrors in eHealth article
Errors in eHealth article
 
The Future of mHealth - Jay Srini - March 2011
The Future of mHealth - Jay Srini - March 2011The Future of mHealth - Jay Srini - March 2011
The Future of mHealth - Jay Srini - March 2011
 
Data, bots and drones – Transforming access to health through technology
Data, bots and drones – Transforming access to health through technologyData, bots and drones – Transforming access to health through technology
Data, bots and drones – Transforming access to health through technology
 
ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS
ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS 	ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS
ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Eskulabs
EskulabsEskulabs
Eskulabs
 
Innoversum 2011: Presentatie Inertia technology
Innoversum 2011: Presentatie Inertia technology Innoversum 2011: Presentatie Inertia technology
Innoversum 2011: Presentatie Inertia technology
 
Digital Health Complete Notes and Elaboration
Digital Health Complete Notes and ElaborationDigital Health Complete Notes and Elaboration
Digital Health Complete Notes and Elaboration
 
Digital health
Digital healthDigital health
Digital health
 
Addressing the first 90: How can HIV testing more efficiently reach those in ...
Addressing the first 90: How can HIV testing more efficiently reach those in ...Addressing the first 90: How can HIV testing more efficiently reach those in ...
Addressing the first 90: How can HIV testing more efficiently reach those in ...
 
Forensic Dental Identification and Blockchain Technology: hypothesis, applic...
 Forensic Dental Identification and Blockchain Technology: hypothesis, applic... Forensic Dental Identification and Blockchain Technology: hypothesis, applic...
Forensic Dental Identification and Blockchain Technology: hypothesis, applic...
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Biometric System
Biometric SystemBiometric System
Biometric System
 
GetPersonalized! Estonian approach - from biobanking to precision medicine, A...
GetPersonalized! Estonian approach - from biobanking to precision medicine, A...GetPersonalized! Estonian approach - from biobanking to precision medicine, A...
GetPersonalized! Estonian approach - from biobanking to precision medicine, A...
 
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
 

Más de Bee_Ware

Les francais et la protection des données personnelles
Les francais et la protection des données personnellesLes francais et la protection des données personnelles
Les francais et la protection des données personnellesBee_Ware
 
DDoS threat landscape report
DDoS threat landscape reportDDoS threat landscape report
DDoS threat landscape reportBee_Ware
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challengesBee_Ware
 
2013 global encryption trends study
2013 global encryption trends study2013 global encryption trends study
2013 global encryption trends studyBee_Ware
 
Numergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudNumergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudBee_Ware
 
Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Bee_Ware
 
Bonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBee_Ware
 
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Bee_Ware
 
Maitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsMaitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsBee_Ware
 
Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Bee_Ware
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAMBee_Ware
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014Bee_Ware
 
Les principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesLes principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesBee_Ware
 
La sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéLa sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéBee_Ware
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesBee_Ware
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013Bee_Ware
 
Guide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsGuide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsBee_Ware
 
Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Bee_Ware
 
2013 cost of data breach study - France
2013 cost of data breach study - France2013 cost of data breach study - France
2013 cost of data breach study - FranceBee_Ware
 
X force report 2013
X force report 2013X force report 2013
X force report 2013Bee_Ware
 

Más de Bee_Ware (20)

Les francais et la protection des données personnelles
Les francais et la protection des données personnellesLes francais et la protection des données personnelles
Les francais et la protection des données personnelles
 
DDoS threat landscape report
DDoS threat landscape reportDDoS threat landscape report
DDoS threat landscape report
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challenges
 
2013 global encryption trends study
2013 global encryption trends study2013 global encryption trends study
2013 global encryption trends study
 
Numergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudNumergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloud
 
Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration
 
Bonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - Kaspersky
 
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
 
Maitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsMaitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industriels
 
Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAM
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014
 
Les principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesLes principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuelles
 
La sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéLa sécurité des Si en établissement de santé
La sécurité des Si en établissement de santé
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
 
Guide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsGuide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cps
 
Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013
 
2013 cost of data breach study - France
2013 cost of data breach study - France2013 cost of data breach study - France
2013 cost of data breach study - France
 
X force report 2013
X force report 2013X force report 2013
X force report 2013
 

Último

Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 

Último (20)

Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 

Biometrics how far are we prepared to go

  • 1. BIOMETRICS: HOW FAR ARE WE PREPARED TO GO? A EUROPEAN CONSUMER SURVEY BIOMETRICS: AUTHENTICATING PEOPLE BY THEIR PHYSICAL CHARACTERISTICS INCLUDING FINGERPRINTS, FACE, IRIS AND VEINS Growing use of highly innovative technology across Europe “Biometric technology is increasingly used to support a diverse range of tasks, but many citizens are still wary of adopting this technology in their everyday lives due to concerns around privacy”, says Ole Marius Steinkjer, from Steria’s Biometrics Centre of Excellence. HOW CAN BIOMETRICS HELP US? FRENCH ARE THE MOST IN FAVOUR BY IDENTIFYING CRIMINALS Supported by the majority of citizens 1. BRITISH 81% GERMANS 2. of citizens are in favour of the use of biometrics to identify criminals 89% 80% 1. BY AUTHENTICATING PEOPLE… 69% of respondents across Europe support the use of biometrics in identity cards or passports 3. 77% 2. 81% 3. 73% DANES of FRENCH citizens are in favour of this application 68% BRITISH ... TO PROTECT YOUR IDENTITY The most important reason for using biometric ID cards or passports: 80 70 60 54% 1. SECURITY AGAINST IDENTITY THEFT 2. REDUCING CRIME 3. SIMPLIFYING ADMINISTRATIVE PROCEDURES 50 40 12% 30 20 10 only 4% 0 1. 2. 3. BY ENTERING SECURE AREAS FRENCH 1. DANES 69% are also in favour of using biometrics to enter secure areas BRITISH 2. 75% 77% 3. 69% BY SECURING YOUR ASSETS 1. 2. 3. 4. 5. 52% 44% 44% 43% 41% FRENCH SWEDISH BUT ONLY of European citizens 45% are in favour of the use of biometrics to replace PIN numbers for bank cards BRITISH NORWEGIANS GERMANS About this research: Steria surveyed 3,650 citizens from the UK, France, Germany, Denmark, Norway and Sweden. The research was conducted by Toluna on behalf of Steria in June 2013. Find more information on steria.com Follow us @Steria