We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Biometrics Fingerprint Indexing at International Borders: is it effective - Research Paper Example

Comments (0) Cite this document
Name: Title: Course: Tutor: Date: Fingerprint Biometrics at International Borders Abstract Border security has been a major concern to most countries globally since the terrorist attacks in the United States of America. Countries have been more vigilant to ensure that only authenticated persons cross into their territories…
Download full paper
Biometrics Fingerprint Indexing at International Borders: is it effective
Read TextPreview

Extract of sample
"Biometrics Fingerprint Indexing at International Borders: is it effective"

Download file to see previous pages The use of biometrics which identifies one based on physiological or behavioral traits have found mass application. There are various traits that could be used for identification but this paper focuses on fingerprint biometrics as a widely used technology to ensure border security. The aim would be to determine from secondary sources whether the system could be considered effective in attaining its intended purpose. The paper will also seek to analyze the costs involved in acquisition and operation of such systems and whether the current economy would sustain such technologies. Despite the cost involved, the benefits of acquiring and implementing such technology should guide on whether to employ such technology or not. Introduction Since September 9 bombing of the US, countries have been increasingly adopting effective mechanisms to ensure that only verified and authenticated individuals cross their borders, access computer services and other service areas such as banking and commerce. Border crossing presents a myriad of challenges because it involves physical introduction of persons capable of causing harm into a country. As such, transportation, particularly the aviation industry, becomes a paramount target for effective installation of security since it supports emergency response, commerce, law enforcement, economic development, leisure and personal travel. According to Federal Aviation Administration, FAA (2002), aviation opens up investment to the local communities and presents new domestic and even international supply chains and markets. With all these movements that a country would be exposed to realize development, the need for a reliable user authentication mechanism arises. Bragdon (2008) while considering transportation across borders in general observed that security involved in transportation could cost as much as 6% of the annual GDP globally, hence, an integral aspect of the economy. Therefore, this calls for building capacity and increase in cooperation both domestically and internationally. According to Ratha, Connel and Bolle, “the consequences of an insecure authentication system in a corporate or enterprise environment can be catastrophic” (2001, p. 614). Among these consequences could include wrongful denial of service, loss of confidential data and information and compromising the integrity of data. Literature Review Various methods have been traditionally used to identify individuals in various countries and organizations. Passwords, PINs (personal identification numbers) and IDs (identifiers) have proved to be inefficient. Passwords and PINs could be illegally acquired by an intruder, hence, allowing unauthorized access to one’s resources. Protection of repudiation also becomes difficult as linking usage to a user becomes almost impossible when users share passwords or when a credit card number is used online. In modern world, a combination of user ID and corresponding password would still be considered inadequate. Ashbourn (2000) points out at biometric identity verification as a radical alternative to these traditional forms of identification and verification. Biometrics technology employs behavioral or physiological traits to identify the identity of individuals including fingerprints, retinas, typing styles, teeth, speech recognition and hand geometry. Since the biometrics would be an individual’s intrinsic property, duplication and sharing of user identity becomes difficult. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Biometrics Fingerprint Indexing at International Borders: is it Research Paper”, n.d.)
Retrieved from https://studentshare.org/design-technology/1396984-biometrics-fingerprint-indexing-at-international
(Biometrics Fingerprint Indexing at International Borders: Is It Research Paper)
“Biometrics Fingerprint Indexing at International Borders: Is It Research Paper”, n.d. https://studentshare.org/design-technology/1396984-biometrics-fingerprint-indexing-at-international.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Computer Security and Biometrics
The essay discussed the three concepts proposed by covering formal, informal and technical dimensions of threats affecting information systems. It has also discussed biometric security challenges representing five domains, each having its own challenges. Moreover, the paper also discussed researches and studies addressing fingerprint template databases.
10 Pages(2500 words)Research Paper
Biometrics use in government and corporations
In Greek, “bio” means life and “metrics” means to measure. This basically describes what biometrics entails. The recent past has seen automated biometric systems become popular in the market because of the major advances in computer processing and information technology.
16 Pages(4000 words)Research Paper
Electronic fingerprint scanning for security at airports
The conventional processes of paper based identifications have been replaced by technological identifications that offer a more reliable form of authentication. Recent history of mankind has witnessed extensive forms of destructions, terrorism acts and severe attempts of causing harm to the society.
8 Pages(2000 words)Research Paper
Amazon Versus Borders
The company’s fortunes shone in the 90s beginning with the integration of music and movie sales in 1991, acquisition by Kmart Corporation in 1992 and spin off and IPO in 1995. Borders’ shares traded at an all-time high of $44.88 on February 4, 1997. By the end on that decade, Borders had expanded into 256 superstores that had mean sales per square foot of US $256.
5 Pages(1250 words)Research Paper
Credit card and Biometrics
At the same time misuse of technology resulted in credit card forgery like cyber crimes which created doubts in the minds of the public about the reliability of using credit cards. Biometrics provides the answers to all types of credit card forgery. The individual characteristics, which are unique from person to person has been made use in biometric technology.
7 Pages(1750 words)Research Paper
Automated Fingerprint Identification System
The automated fingerprint identification system can be used for various purposes. The most important use of this system is in the law enforcement departments which use this system to identify criminals or people who are related to any kind of crime. This automated fingerprint identification system is also very useful in access control systems.
21 Pages(5250 words)Research Paper
Securing the Land Borders and the Coastal Waterways from International Terrorism
They have mastered the art of penetrating the land borders without being caught by evading the proper border check points. They have invaded country’s coastal waterways, and they have used the forum to
1 Pages(250 words)Research Paper
The use of Biometrics and Bio-information to Support New Systems Integration
sequently, biometric recognition, or basically biometrics, that is foundational on behavioral and physiological features of a person, is being more and more accept and mapped to quickly for rising person recognition applications. Different from documents based identification,
20 Pages(5000 words)Research Paper
Biometrics in the Private Sector(472)
To illustrate, there is the Patient Secure Identity System developed by Fujitsu Computer Products (Greene, 2008). This involves a hand-scanner which scans and records the vein pattern inside palm. According to researches, vein pattern is
3 Pages(750 words)Research Paper
Systems and applications that require such authentication include computer systems, gaining access to buildings, personal computers, laptops, cellular phones and ATMs. Need for reliability has led to heightened concerns about security increased advancements in
10 Pages(2500 words)Research Paper
Let us find you another Research Paper on topic Biometrics Fingerprint Indexing at International Borders: is it effective for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us