Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/98898
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Applied Social Sciencesen_US
dc.creatorGreiffenhagen, Cen_US
dc.creatorXu, Xen_US
dc.creatorReeves, Sen_US
dc.date.accessioned2023-06-02T07:38:58Z-
dc.date.available2023-06-02T07:38:58Z-
dc.identifier.urihttp://hdl.handle.net/10397/98898-
dc.language.isoenen_US
dc.publisherAssociation for Computing Machineryen_US
dc.rights© 2023 Association for Computing Machinery. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in Proceedings of the ACM on Human-Computer Interaction, http://dx.doi.org/10.1145/3579531.en_US
dc.subjectBiometricen_US
dc.subjectEthnomethodologyen_US
dc.subjectFace recognitionen_US
dc.subjectFacial recognition technologiesen_US
dc.subjectIdentificationen_US
dc.subjectVerificationen_US
dc.titleThe work to make facial recognition worken_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.volume7en_US
dc.identifier.issueCSCW1en_US
dc.identifier.doi10.1145/3579531en_US
dcterms.abstractFacial recognition technology (FRT) has become a significant topic in CSCW owing to widespread adoption and related criticisms: the use of FRT is often considered an assault on privacy or a kind of neo-phrenology. This discussion has revolved around uses of FRT for identification, which are often non-voluntary, in particular for surveillance wherein people are (by and large) unwittingly recognized by FRT systems. At the same time, we have also seen a rise of forms of FRT for verification (e.g., passport control or Apple's Face ID), which typically are overt and interactive. In this paper we study an interactive FRT system used for guest check-in at a hotel in China. We show how guests and bystanders engage in 'self-disciplining work' by controlling their facial (and bodily) comportment both to get recognized and at times to avoid recognition. From our analysis we discuss the role of preparatory and remedial work, as well as dehumanization, and the importance of CSCW paying closer attention to the significance of interactional compliance for people using and bystanding facial recognition technologies.en_US
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationACM proceedings on human-computer interaction, Apr. 2023, v. 7, no. CSCW1, 98en_US
dcterms.isPartOfACM proceedings on human-computer interactionen_US
dcterms.issued2023-04-
dc.identifier.scopus2-s2.0-85153932298-
dc.identifier.eissn2573-0142en_US
dc.identifier.artn98en_US
dc.description.validate202306 bckwen_US
dc.description.oaAuthor’s Originalen_US
dc.identifier.FolderNumbera2064-
dc.identifier.SubFormID46454-
dc.description.fundingSourceOthersen_US
dc.description.fundingTextEngineering and Physical Sciences Research Council; Royal Society Kan Tong Po International Fellowshipen_US
dc.description.pubStatusPublisheden_US
dc.description.oaCategoryGreen (AO)en_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Greiffenhagen_Facial_Recognition_Work.pdfPreprint version2.16 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Author’s Original
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

80
Citations as of Apr 14, 2025

Downloads

439
Citations as of Apr 14, 2025

SCOPUSTM   
Citations

5
Citations as of Dec 19, 2025

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.