End Notes


1. Robert Lemos, "VeriSign Inks Deal for Smart Cards," ZDNet News (October, 10, 2001).

2. In her influential paper, "Belated Feudalism," UCLA political scientist Karen Orren argues that the American workplace was actually a feudal institution well into the twentieth century. As journalist Corey Robin recently argued, the modern workplace—from its insistence on distinctive uniforms to its near-obsessive surveillance of employee activities—retains many of the trappings of feudal society. "Lavatory and Liberty," The Boston Globe (September 29, 2002) p. D1.

3. Groves has since moved on to become a special ventures manager for Pankhurst Design & Developments, Ltd., an engineering design firm in London, England.

4. John Solomon, "Operation Tarmac nabs 94 workers at Washington-area airports," Boston Globe (April 23, 2002). Downloaded from the Web on April 23, 2002, from www.boston.com/news/daily/23/airport_arrests.htm.

5. Eric Nadler, "Fake ID cards make airport infiltration too easy," Detroit Free Press (November 10, 2001). Downloaded from the Web on June 15, 2002, from www.freep.com/news/nw/terror2001/wid10_20011110.htm.

6. A "memory" chip is simply used for storing information; a "microprocessing" chip has the ability, albeit limited, to perform calculations on and manipulate the data stored on it.

7. Associated Press, "Tech company to sell ID-only computer chip implant," Burlington Free Press (April 5, 2002) p. 7A.

8. Julia Scheeres, "ID Chip's Controversial Approval," Wired.com (October 23, 2002).

9. Julia Sheeres, "Implantable Chip, On Sale Now," Wired.com (October 25, 2002).

10. According to estimates, in Sao Paulo alone, a person is kidnapped every thirty-five hours.

11. Julia Scheeres, "Brits Mull Chipping Sex Offenders," Wired.com (November 19, 2002).

12. A not insignificant fact is that the RFID can be implanted and used without any external indication of its presence. That alone makes it a more attractive solution than tattooing bar codes on people so that they can pay by being scanned. Remarkably enough, a patent has been issued for such a system. See United States Patent No. 5,878,155, issued to Thomas W. Heeter of Houston, Texas, on March 2, 1999. The historical, sociological, and psychological barriers to the implementation of such a system begs description.

13. A successful biometric identifier requires that an employer have the ability to compare some physical characteristic of the employee against a previously recorded example (or "template") of that characteristic. For instance, a photo ID allows a security guard to compare the employee's existing facial features against the template, i.e., the photo on the employee's ID. One of the great conveniences of the photo ID is that there's no need for a central database; each employee carries her template with her. It's only recently that computers have become powerful and flexible enough to create and maintain central libraries of templates for other types of physical characteristics, such as fingerprints, irises, and so forth.

14. The SpeakerKey system, which has gone through a couple of changes of corpo- rate ownership, is now marketed under the trade name VoiceVault by a Dublin, Ireland-based company of the same name.

15. David Braun, "Behind the Search for the Afghan Girl," National Geographic News, updated March 21, 2002; accessed on the Web on June 28, 2002, at news.nationalgeographic.com/news/2002/03/0311_020312_sharbat.html. The Web page contains side-by-side copies of the two photographs, along with links to additional information about the search for Gula.

16. "Iris Recognition: The Technology," n.p., n.d. Downloaded from the World Wide Web on June 27, 2002, from www.iris-scan.com/iris_technology.htm.

17. In 2000, IriScan merged with one of its largest licensees, Sensar Corp. (a specialist in developing iris recognition components for automated teller machines and similar electronic delivery channels), and changed its name to Iridian Technologies.

18. E-mail to author, June 29, 2002.

19. E-mail to author, June 29, 2002.

20. The web page for John Daugman, Ph.D., O.B.E., is located at www.cl.cam.ac.uk/users/jgd1000/

21. E-mail to author, June 29, 2002.

22. The term is derived from the German prefix "eigen," meaning "own" or "individual."

23. Lev Grossman, "Welcome to the Snooper Bowl," Time, Vol. 157, No. 6 (February 12, 2001). Downloaded from the Web on June 15, 2002, from www.time.com/time/magazine/printout/0.8816,980003,00.html.




The Naked Employee. How Technology Is Compromising Workplace Privacy
Naked Employee, The: How Technology Is Compromising Workplace Privacy
ISBN: 0814471498
EAN: 2147483647
Year: 2003
Pages: 93

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net