New facial recognition apps concern researcher

Feb 04, 2014 by Angie Hunt

Brian Mennecke is not surprised to see developers using facial recognition technology to create new apps for smart phones and tablets. In fact, Mennecke and his colleagues at Iowa State University predicted this would happen through their research on 'mavatars,' or marketing avatars.

Mennecke, an associate professor of information systems, says creates opportunities, but there are also risks. Privacy invasion, identity theft and misuse are among the top concerns, specifically with peer-to-peer applications. And trying to safeguard one's privacy or identity is similar to fighting a war on terror, Mennecke said.

He points to the upcoming release of the Name Tag as a good example. The app allows users to take a picture of a stranger and find information about that individual by scanning pictures on social media sites and other online sources.

"Our research focuses on the perceived risks and the potential for misuse by other users with this kind of technology. The challenge is that when these applications are released for public use, the potential for abuse is great because it will be virtually impossible to opt out," Mennecke said.

That's not to say all facial recognition apps are necessarily bad. It really depends on who's accountable. For example, apps that are connected to a business or organization will ultimately be accountable to their customers, stockholders and regulators. Mennecke says that's not always the case with peer-to-peer applications.

"The challenge with peer-to-peer applications is that there will ultimately be no one entity to hold responsible," Mennecke said. "In many ways, there is an analogy to military operations; when a military force opposes another army, everyone knows who is on each side. When anyone can run rogue facial recognition applications on their own, it is more like a war on terror because any one individual doesn't know whether someone is using for good or bad and, ultimately, there is no one organization that can be held accountable."

Explore further: Canada says China hacked its science agency computers

add to favorites email to friend print save as pdf

Related Stories

Privacy, technology face off again

Sep 30, 2012

The tension between new technology and individual privacy is as old as Silicon Valley. Each advance that allows or impels us to share information or seek windows into others' lives is scary at first. Often the fears blow ...

Facial-recognition technology proves its mettle

May 24, 2013

(Phys.org) —In a study that evaluated some of the latest in automatic facial recognition technology, researchers at Michigan State University were able to quickly identify one of the Boston Marathon bombing ...

Want kids to eat healthier? Don't tell them, show them

Jul 19, 2013

If given the choice between eating a salad loaded with veggies or a burger and fries, most kids—and for that matter, most adults—would likely pick the less healthful option. But instead of telling kids to eat more fruits ...

Recommended for you

Taking great ideas from the lab to the fab

7 hours ago

A "valley of death" is well-known to entrepreneurs—the lull between government funding for research and industry support for prototypes and products. To confront this problem, in 2013 the National Science ...

SR Labs research to expose BadUSB next week in Vegas

8 hours ago

A Berlin-based security research and consulting company will reveal how USB devices can do damage that can conduct two-way malice, from computer to USB or from USB to computer, and can survive traditional ...

US warns retailers on data-stealing malware

9 hours ago

US government cybersecurity watchdogs warned retailers Thursday about malware being circulated that allows hackers to get into computer networks and steal customer data.

User comments : 0