Analysis of Face Recognition Technology in iPhone Data Protection
VerifiedAdded on 2022/12/15
|3
|1043
|52
Homework Assignment
AI Summary
This assignment analyzes the effectiveness of face recognition technology, specifically in the context of iPhone data protection. The student selected three sources: an internet article, a journal article, and a book chapter, each exploring different facets of the technology. The student provides detailed grids for each source, outlining the source title and references, the research questions addressed, the reading techniques employed (skimming, active reading, metacognitive methods), key points extracted from the sources, and an evaluation of implicit meanings within the text. The sources cover topics like law enforcement use of facial recognition, forensic applications, and biometric security. The assignment highlights the student's ability to synthesize information, critically analyze sources, and understand the implications of face recognition technology in various contexts, including privacy concerns and security applications.

Assignment Brief and Feedback form
(L3 study skills unit with single assignment)
Description of Assignment:
Select three sources, one internet, one book and one journal/newspaper, relevant to any unit of the
Access course, and complete a grid such as the example below:
Source title with references
The new way police are surveilling you: Calculating your threat ‘score’
Jouvenal, J., 2016. The new way police are surveilling you: Calculating your
threat ‘score.' The Washington Post, 10.
www.washingtonpost.com/local/public-safety/the-new-way-police-are-surveilling-you-
calculating-your-threat-score/2016/01/10/e42bccac-8e15-11e5-baf4-
bdf37355da0c_story.html?noredirect=on&utm_term=.b1da3ac1ec72
The question(s) to which you were seeking answers
How Law Enforcement utilise Face Recognition Technology.
Explain which reading techniques you used, explaining why they were used
Once I located my source, I was skimming through the article to gather overall
information about the topic that was discussed and to locate the parts which might be
relevant to my subject. Once I finished I started actively reading the parts that I found
relevant to my question and gathering more detailed information.
Itemise the key points in the source, relevant to your question/s
Could help to find terrorists and criminals
Troubling intrusion on privacy
Little public oversight
potential for abuse or error
Explain any examples of implicit meaning in the source, evaluating the effect
and purpose of implied meaning within it
“Few departments will discuss how — or sometimes if — they are using these tools”
the article implies that there is some sort of secrecy amongst departments about
using those tools. As it was already mentioned before that there is a potential for
abuse or error, this implication might lead straight to the conclusion that there must
be something bad that those departments are hiding.
You should produce one of these grids for each of the three sources required for this
assignment.
Source title with references
“Face matching and retrieval in forensics applications”
1
(L3 study skills unit with single assignment)
Description of Assignment:
Select three sources, one internet, one book and one journal/newspaper, relevant to any unit of the
Access course, and complete a grid such as the example below:
Source title with references
The new way police are surveilling you: Calculating your threat ‘score’
Jouvenal, J., 2016. The new way police are surveilling you: Calculating your
threat ‘score.' The Washington Post, 10.
www.washingtonpost.com/local/public-safety/the-new-way-police-are-surveilling-you-
calculating-your-threat-score/2016/01/10/e42bccac-8e15-11e5-baf4-
bdf37355da0c_story.html?noredirect=on&utm_term=.b1da3ac1ec72
The question(s) to which you were seeking answers
How Law Enforcement utilise Face Recognition Technology.
Explain which reading techniques you used, explaining why they were used
Once I located my source, I was skimming through the article to gather overall
information about the topic that was discussed and to locate the parts which might be
relevant to my subject. Once I finished I started actively reading the parts that I found
relevant to my question and gathering more detailed information.
Itemise the key points in the source, relevant to your question/s
Could help to find terrorists and criminals
Troubling intrusion on privacy
Little public oversight
potential for abuse or error
Explain any examples of implicit meaning in the source, evaluating the effect
and purpose of implied meaning within it
“Few departments will discuss how — or sometimes if — they are using these tools”
the article implies that there is some sort of secrecy amongst departments about
using those tools. As it was already mentioned before that there is a potential for
abuse or error, this implication might lead straight to the conclusion that there must
be something bad that those departments are hiding.
You should produce one of these grids for each of the three sources required for this
assignment.
Source title with references
“Face matching and retrieval in forensics applications”
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Assignment Brief and Feedback form
(L3 study skills unit with single assignment)
Jain, A.K., Klare, B., and Park, U., 2012. Face matching and retrieval in forensics
applications. IEEE Multimedia, 19(1), p.20.
http://citeseerx.ist.psu.edu/viewdoc/download?
doi=10.1.1.478.5747&rep=rep1&type=pdf
The question(s) to which you were seeking answers
Why forensic face recognition differs from typical portrait face recognition and why a
human examiner is often needed to carefully interpret and verify the matching
results?
Explain which reading techniques you used, explaining why they were used
As I am a good reader, I have used the meta cognitive methodology for thinking
about as well as I have control over the reading. Before read the journal I have
clarified first the purpose of reading the paper as well previewed the texts. At the
time of reading, I have monitored the understanding of mine, also I have adjusted the
speed of reading for better understanding of the texts. After completing the reading
of the whole paper, I have checked the understanding of what I have read.
Itemise the key points in the source, relevant to your question/s
Facial-Mark-Based Matching and Retrieval
Forensic-Sketch Recognition
Facial Aging
Paradigm for Forensic Face Recognition
Special-Purpose of facial recognition system
Pre-processing Approach to Forensic FR
Explain any examples of implicit meaning in the source, evaluating the effect
and purpose of implied meaning within it
“Automated identification of a subject based on a composite sketch query expands
face recognition capabilities to situations where a suspect’s face image is not
available from the crime scene.” It is implied by the article that, in these situation,
only one of the verbal description that is about the subject, that is provided by the
victims or the witnesses. It is available for utilizing by a composite software tool or a
forensic artist for generating a description of the facial appearance of the subject.
Source title with references
Biometrics: Facing up to terrorism
Woodard Jr, J.D., 2001. Biometrics: Facing up to terrorism. RAND ARROYO
CENTER SANTA MONICA CA.
https://apps.dtic.mil/dtic/tr/fulltext/u2/a406181.pdf
The question(s) to which you were seeking answers
Why we should examine the use of emerging biometric technologies that can help
improve public safety?
Explain which reading techniques you used, explaining why they were used
2
(L3 study skills unit with single assignment)
Jain, A.K., Klare, B., and Park, U., 2012. Face matching and retrieval in forensics
applications. IEEE Multimedia, 19(1), p.20.
http://citeseerx.ist.psu.edu/viewdoc/download?
doi=10.1.1.478.5747&rep=rep1&type=pdf
The question(s) to which you were seeking answers
Why forensic face recognition differs from typical portrait face recognition and why a
human examiner is often needed to carefully interpret and verify the matching
results?
Explain which reading techniques you used, explaining why they were used
As I am a good reader, I have used the meta cognitive methodology for thinking
about as well as I have control over the reading. Before read the journal I have
clarified first the purpose of reading the paper as well previewed the texts. At the
time of reading, I have monitored the understanding of mine, also I have adjusted the
speed of reading for better understanding of the texts. After completing the reading
of the whole paper, I have checked the understanding of what I have read.
Itemise the key points in the source, relevant to your question/s
Facial-Mark-Based Matching and Retrieval
Forensic-Sketch Recognition
Facial Aging
Paradigm for Forensic Face Recognition
Special-Purpose of facial recognition system
Pre-processing Approach to Forensic FR
Explain any examples of implicit meaning in the source, evaluating the effect
and purpose of implied meaning within it
“Automated identification of a subject based on a composite sketch query expands
face recognition capabilities to situations where a suspect’s face image is not
available from the crime scene.” It is implied by the article that, in these situation,
only one of the verbal description that is about the subject, that is provided by the
victims or the witnesses. It is available for utilizing by a composite software tool or a
forensic artist for generating a description of the facial appearance of the subject.
Source title with references
Biometrics: Facing up to terrorism
Woodard Jr, J.D., 2001. Biometrics: Facing up to terrorism. RAND ARROYO
CENTER SANTA MONICA CA.
https://apps.dtic.mil/dtic/tr/fulltext/u2/a406181.pdf
The question(s) to which you were seeking answers
Why we should examine the use of emerging biometric technologies that can help
improve public safety?
Explain which reading techniques you used, explaining why they were used
2

Assignment Brief and Feedback form
(L3 study skills unit with single assignment)
For reading the book firstly, I have recognised the structure of the story of the book.
Have also summarised the books for determining the most important things in the
book. After that I have eliminated the information that are not necessary, then I
remembered also what I have read. I have also find some questions and then tried to
get the answers from the book.
Itemise the key points in the source, relevant to your question/s
Controlling access to sensitive facilities at airports,
Preventing identity theft and fraud in the use of travel documents, and
Identifying known or suspected terrorists
Operational framework
Policy issues.
Explain any examples of implicit meaning in the source, evaluating the effect
and purpose of implied meaning within it
“Controlling access to sensitive facilities, as well as preventing immigration fraud
and identity theft, can be accomplished with a variety of biometric systems. Such
systems can accommodate users and are relatively easy to incorporate into current
security systems (i.e., adding a digitally signed, encrypted biometric bar code to
existing travel documents or badges)”. To identifying the suspected or the known
terrorists keeps up one of the greater challenges. At that time finger print, facial
recognition as well as some of the other biometric systems might be utilized for the
identification of the government authorities, individuals could find this tuff for
collecting the iris scans, facial recognition or finger prints of the suspected terrorists
for building the database against that for comparing an individual who is unknown.
You should produce one of these grids for each of the three sources required for this
assignment.
3
(L3 study skills unit with single assignment)
For reading the book firstly, I have recognised the structure of the story of the book.
Have also summarised the books for determining the most important things in the
book. After that I have eliminated the information that are not necessary, then I
remembered also what I have read. I have also find some questions and then tried to
get the answers from the book.
Itemise the key points in the source, relevant to your question/s
Controlling access to sensitive facilities at airports,
Preventing identity theft and fraud in the use of travel documents, and
Identifying known or suspected terrorists
Operational framework
Policy issues.
Explain any examples of implicit meaning in the source, evaluating the effect
and purpose of implied meaning within it
“Controlling access to sensitive facilities, as well as preventing immigration fraud
and identity theft, can be accomplished with a variety of biometric systems. Such
systems can accommodate users and are relatively easy to incorporate into current
security systems (i.e., adding a digitally signed, encrypted biometric bar code to
existing travel documents or badges)”. To identifying the suspected or the known
terrorists keeps up one of the greater challenges. At that time finger print, facial
recognition as well as some of the other biometric systems might be utilized for the
identification of the government authorities, individuals could find this tuff for
collecting the iris scans, facial recognition or finger prints of the suspected terrorists
for building the database against that for comparing an individual who is unknown.
You should produce one of these grids for each of the three sources required for this
assignment.
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 3
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.



