Australian view of facial recognition technology for social media split: study
- 08 June, 2012 17:49
Surveillance systems are getting more sophisticated and facial recognition technology is increasingly being incorporated.
However, Australian support for the use of facial recognition technology varies depending upon the circumstances in which it is used, according to the latest Unisys Security Index.
The Unisys Security Index is a bi-annual global study that provides insights into the attitudes of consumers on a wide range of security related issues.
The national survey of 1206 adults found that 50 per cent of Australians surveyed do not support the use of facial recognition technology to make it easier for Facebook users to identity or tag friends in photos.
According to Unisys security program director, John Kendall, the research findings show that the Australian public’s support for facial recognition technology is determined by the context within which it is used.
“There is very strong support for facial recognition technology but only in circumstances that Australians deem to be appropriate, such as policing or protecting borders. There is far less support for the technology used in social media or by employers in the workplace,” he said.
The survey showed 95 per cent of respondents were in favour of using the same technology for policing or border security purposes, supporting airport customs or immigration staff using facial recognition to identify passengers on police watch-lists.
66 per cent of them agreed to employers using it to track what parts of a building staff had accessed and with whom. Further, 92 per cent of respondents said they agreed with the use of facial recognition technology to help police identify people from security camera footage or video obtained from the public. “It suggests that Australians are happy for new security technology to be used, but only when they can perceive a clear and substantive benefit for themselves and the broader community. When that benefit is less clear, the level of support starts to decline,” Kendall said.
- Smart Cloud: Move Beyond monitoring to Holistic Management of Application Performance
- New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection (Sponsored by McAfee)
- Cloud and Co-Location Solutions
- Choice and Control: Considerations for Developing Enterprise Cloud Strategies
- McAfee Whitepaper: Building the Business Case for Privacy
- CITRIX SYNERGY ’13: Look beyond Cloud infrastructure, says Liang
- CITRIX SYNERGY ’13: Christiancen highlights the need for collaboration
- CITRIX SYNERGY ’13: Devices will change how people work, says Duursma
- Are we ready for a mobile-first world?
- Smartphone chips could replace server processors in HPC, researchers say
Attack on Telenor was part of large cyberespionage operation with Indian origins: report
Box buys iOS app to improve its own
Growing mobile malware threat swirls (mostly) around Android
Barracuda Networks raises free capacity of Copy.com to 15GB
Coke gives peace a chance ( +16 photos)