New facial recognition apps concern researcher

Feb 04, 2014 by Angie Hunt

Brian Mennecke is not surprised to see developers using facial recognition technology to create new apps for smart phones and tablets. In fact, Mennecke and his colleagues at Iowa State University predicted this would happen through their research on 'mavatars,' or marketing avatars.

Mennecke, an associate professor of information systems, says creates opportunities, but there are also risks. Privacy invasion, identity theft and misuse are among the top concerns, specifically with peer-to-peer applications. And trying to safeguard one's privacy or identity is similar to fighting a war on terror, Mennecke said.

He points to the upcoming release of the Name Tag as a good example. The app allows users to take a picture of a stranger and find information about that individual by scanning pictures on social media sites and other online sources.

"Our research focuses on the perceived risks and the potential for misuse by other users with this kind of technology. The challenge is that when these applications are released for public use, the potential for abuse is great because it will be virtually impossible to opt out," Mennecke said.

That's not to say all facial recognition apps are necessarily bad. It really depends on who's accountable. For example, apps that are connected to a business or organization will ultimately be accountable to their customers, stockholders and regulators. Mennecke says that's not always the case with peer-to-peer applications.

"The challenge with peer-to-peer applications is that there will ultimately be no one entity to hold responsible," Mennecke said. "In many ways, there is an analogy to military operations; when a military force opposes another army, everyone knows who is on each side. When anyone can run rogue facial recognition applications on their own, it is more like a war on terror because any one individual doesn't know whether someone is using for good or bad and, ultimately, there is no one organization that can be held accountable."

Explore further: US seeks China's help after cyberattack

add to favorites email to friend print save as pdf

Related Stories

Privacy, technology face off again

Sep 30, 2012

The tension between new technology and individual privacy is as old as Silicon Valley. Each advance that allows or impels us to share information or seek windows into others' lives is scary at first. Often the fears blow ...

Facial-recognition technology proves its mettle

May 24, 2013

(Phys.org) —In a study that evaluated some of the latest in automatic facial recognition technology, researchers at Michigan State University were able to quickly identify one of the Boston Marathon bombing ...

Want kids to eat healthier? Don't tell them, show them

Jul 19, 2013

If given the choice between eating a salad loaded with veggies or a burger and fries, most kids—and for that matter, most adults—would likely pick the less healthful option. But instead of telling kids to eat more fruits ...

Recommended for you

US seeks China's help after cyberattack

4 hours ago

The United States is asking China for help as it weighs potential responses to a cyberattack against Sony Pictures Entertainment that the U.S. has blamed on North Korea.

Impoverished North Korea falls back on cyber weapons

Dec 19, 2014

As one of the world's most impoverished powers, North Korea would struggle to match America's military or economic might, but appears to have settled on a relatively cheap method to torment its foe.

Five ways to make your email safer in case of a hack attack

Dec 19, 2014

The Sony hack, the latest in a wave of company security breaches, exposed months of employee emails. Other hacks have given attackers access to sensitive information about a company and its customers, such as credit-card ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.