Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/98898
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Department of Applied Social Sciences | en_US |
| dc.creator | Greiffenhagen, C | en_US |
| dc.creator | Xu, X | en_US |
| dc.creator | Reeves, S | en_US |
| dc.date.accessioned | 2023-06-02T07:38:58Z | - |
| dc.date.available | 2023-06-02T07:38:58Z | - |
| dc.identifier.uri | http://hdl.handle.net/10397/98898 | - |
| dc.language.iso | en | en_US |
| dc.publisher | Association for Computing Machinery | en_US |
| dc.rights | © 2023 Association for Computing Machinery. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in Proceedings of the ACM on Human-Computer Interaction, http://dx.doi.org/10.1145/3579531. | en_US |
| dc.subject | Biometric | en_US |
| dc.subject | Ethnomethodology | en_US |
| dc.subject | Face recognition | en_US |
| dc.subject | Facial recognition technologies | en_US |
| dc.subject | Identification | en_US |
| dc.subject | Verification | en_US |
| dc.title | The work to make facial recognition work | en_US |
| dc.type | Journal/Magazine Article | en_US |
| dc.identifier.volume | 7 | en_US |
| dc.identifier.issue | CSCW1 | en_US |
| dc.identifier.doi | 10.1145/3579531 | en_US |
| dcterms.abstract | Facial recognition technology (FRT) has become a significant topic in CSCW owing to widespread adoption and related criticisms: the use of FRT is often considered an assault on privacy or a kind of neo-phrenology. This discussion has revolved around uses of FRT for identification, which are often non-voluntary, in particular for surveillance wherein people are (by and large) unwittingly recognized by FRT systems. At the same time, we have also seen a rise of forms of FRT for verification (e.g., passport control or Apple's Face ID), which typically are overt and interactive. In this paper we study an interactive FRT system used for guest check-in at a hotel in China. We show how guests and bystanders engage in 'self-disciplining work' by controlling their facial (and bodily) comportment both to get recognized and at times to avoid recognition. From our analysis we discuss the role of preparatory and remedial work, as well as dehumanization, and the importance of CSCW paying closer attention to the significance of interactional compliance for people using and bystanding facial recognition technologies. | en_US |
| dcterms.accessRights | open access | en_US |
| dcterms.bibliographicCitation | ACM proceedings on human-computer interaction, Apr. 2023, v. 7, no. CSCW1, 98 | en_US |
| dcterms.isPartOf | ACM proceedings on human-computer interaction | en_US |
| dcterms.issued | 2023-04 | - |
| dc.identifier.scopus | 2-s2.0-85153932298 | - |
| dc.identifier.eissn | 2573-0142 | en_US |
| dc.identifier.artn | 98 | en_US |
| dc.description.validate | 202306 bckw | en_US |
| dc.description.oa | Author’s Original | en_US |
| dc.identifier.FolderNumber | a2064 | - |
| dc.identifier.SubFormID | 46454 | - |
| dc.description.fundingSource | Others | en_US |
| dc.description.fundingText | Engineering and Physical Sciences Research Council; Royal Society Kan Tong Po International Fellowship | en_US |
| dc.description.pubStatus | Published | en_US |
| dc.description.oaCategory | Green (AO) | en_US |
| Appears in Collections: | Journal/Magazine Article | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Greiffenhagen_Facial_Recognition_Work.pdf | Preprint version | 2.16 MB | Adobe PDF | View/Open |
Page views
80
Citations as of Apr 14, 2025
Downloads
439
Citations as of Apr 14, 2025
SCOPUSTM
Citations
5
Citations as of Dec 19, 2025
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



