Contact us
[email protected] | |
3275638434 | |
Paper Publishing WeChat |
Useful Links
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Article
Author(s)
WANG Geng
ZHANG Chaolin
Full-Text PDF XML 473 Views
DOI:10.17265/1548-6605/2022.06.002
Affiliation(s)
University of International Business and Economics, Beijing, China
Nankai University, Tianjin, China
ABSTRACT
Facial recognition technology is widely used due to its irreplaceable advantages, providing technical support for the intelligent transformation of government social governance. However, in recent years, the complaints about facial recognition technology have been getting louder. In addition to some shortcomings of the technology itself, people are more concerned about the threats and challenges to personal privacy and personal information security brought about by the application of facial recognition technology. In particular, the unrestricted use of facial recognition technology by government agencies will expand public power, breaking the balance between public power and private rights. At the moment, two approaches have been developed to address this challenge: one is the technology restriction approach used by countries represented by the United States, which explicitly states that facial recognition technology should not be used in general and should only be used in a small number of licensed or special cases; the other is the data protection approach used by China and the European Union, which is based on the theory of technology neutrality but requires that technology be used in accordance with personal information and data processing rules. Although the approaches used by different countries differ, they all reflect the same attitude and position, namely, that the exercise of public power is not disorderly, and that the use of facial recognition technology by government agencies must adhere to corresponding norms.
KEYWORDS
facial recognition technology, privacy, personal data protection, technological neutrality
Cite this paper
References