- Agrawal, S., Banerjee, S. and Sharma, S. Privacy and security of Aadhaar: A computer science perspective. Economic and Political Weekly 52, 37 (2017), 16.Google Scholar
- Banerjee, S. and Sharma, S.V. An offline alternative for Aadhaar-based biometric authentication, 2018; http://bit.ly/330m8jnGoogle Scholar
- Drezé, J. The Aadhaar coup, 2016; http://bit.ly/2IfqQSeGoogle Scholar
- Khaira, R. Rs 500, 10 minutes, and you have access to billion Aadhaar details. Tribune India, 2018; http://bit.ly/2wW5wdYGoogle Scholar
- Khera, R. Dissent on Aadhaar: Big Data Meets Big Brother. Orient Black Swan, 2019.Google Scholar
- PTI. UIDAI suspends Airtel, Airtel Payments Bank's e-KYC license over Aadhaar misuse, 2017; http://bit.ly/2IJnjdRGoogle Scholar
- Puttaswamy, KS and Another v Union of India. Writ petition (Civil) No 494 of 2012. Supreme Court judgment dated Sept.26, 2018; https://indiankanoon.org/doc/127517806/Google Scholar
- Puttaswamy, KS v Union of India. Writ petition (Civil) No 494 of 2012. Supreme Court judgment dated Aug. 24, 2017.Google Scholar
- Sharma, S. (via P.V. Singh). Virtual ID is a good beginning; much more remains to be done, 2018; http://bit.ly/2YxDmp5Google Scholar
- Supreme Court of Judicature of Jamaica. Justice Sykes, B. Justice Batts, D. and Justice Hamilton, L-P. Claim No. 2018HCV01788 between Julian J. Robinson and The Attorney General of Jamaica, 2019; http://bit.ly/31r3XTgGoogle Scholar
- Viswanath, L. Four reasons you should worry about Aadhaar's use of biometrics, 2017; https://thewire.in/featured/real-problem-aadhaar-lies-biometricsGoogle Scholar
Index Terms
- Privacy concerns with Aadhaar
Recommendations
Information revelation and internet privacy concerns on social network sites: a case study of facebook
C&T '09: Proceedings of the fourth international conference on Communities and technologiesDespite concerns raised about the disclosure of personal information on social network sites, research has demonstrated that users continue to disclose personal information. The present study employs surveys and interviews to examine the factors that ...
The Role of Risk Perceptions in Privacy Concerns Evaluation
TRUSTCOM '15: Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 01The collection of information on individual persons for personal data intensive systems and services poses the risk of privacy violations and raises privacy concerns. Individuals' privacy concerns and risk perceptions affect their decision-making on ...
The Role of Risk Perceptions in Privacy Concerns Evaluation
TRUSTCOM '15: Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 01The collection of information on individual persons for personal data intensive systems and services poses the risk of privacy violations and raises privacy concerns. Individuals' privacy concerns and risk perceptions affect their decision-making on ...
Comments