StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Application of Biometric Technology and the Convenience - Essay Example

Cite this document
Summary
This essay "The Application of Biometric Technology and the Convenience" analyzes public applications as well as commercial applications of biometric technology. Biometric technology faces many challenges especially due to the slow development and issues…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful
The Application of Biometric Technology and the Convenience
Read Text Preview

Extract of sample "The Application of Biometric Technology and the Convenience"

Biometric systems Lecturer: Biometric systems incorporate automated technology for recognizing an individual based on one or morebiometrics propelled by matching algorithms in computers. Owing to the accuracy and convenience as well as ease of use associated with biometric systems, they are often used in immigration and border security authentication and even in recreational venue access (Morosan, 2011, p.661-663). The 9/11 tragic events created a new desire toward biometrics in the US and other nations because of the potential of the computer-powered biometric technology in scaling security to a high level of effectiveness (Boukhonine, Krotov & Rupert, 2005, p.938). the main reason propelling the use of biometric technology for tighter border control is that the conventional security approaches never offer adequate level of security. The main aim of the study is to evaluate biometric technology as an emerging security approach as opposed to the traditional approaches in controlling and preventing crime. The prevailing publicity regarding biometric is largely attributed to its application in the public sector; nevertheless, biometric security technologies evolved owing to the proliferation of computer security threats. Apart from the traditional security approaches that rely on what an individual knows or has, biometrics authenticate an individual based on the identity of the individual as opposed to what he knows or has (Boukhonine, Krotov & Rupert, 2005, p.941). Biometrics involve various technologies used in verifying an individual’s identity through analyzing the individual’s characteristics derived from fingers, hands, face, and eye retina and iris. Using biometrics in identifying individuals for border security purposes seems appealing because the technology helps link a traveler to his identity using physiological characteristics. Compared to the traditional method of enforcing security like owning identification cards or having passwords, biometrics cannot be easily stolen, lost, or even guessed. Although biometrics similar to the traditional systems of security retrieve information from databases in verifying an individual, biometric technology differs from the traditional systems in distinct ways. For instance, unlike the conventional security systems that give people PIN (Personal Identification Number) and username/password that are easily forgettable, people cannot forget their biometrics making biometric technology a viable security method since biometrics are unique to every person (Boukhonine, Krotov & Rupert, 2005, p.942). The traditional security technologies are often passive because they tend to protect against an acknowledged danger like hackers accessing a system. The often used traditional proactive approach to security heavily relies on the use of manpower like police patrols and CCTV all of which are costly and not widely used in commercial environments. Moreover, data mining numerous electronic databases in trying to detect suspicious activities is often troubling because a suspect may use many identities, which is a huge weakness in authentication systems within the conventional security approaches (Boukhonine, Krotov & Rupert, 2005, p.939). Biometric technologies allow for both passive and active identification and its implementation through identification algorithms connected to databases making it is possible to determine if the individual poses potential public threat (Boukhonine, Krotov & Rupert, 2005, p.943). Therefore, conventional methods of authentication like the use of passwords and cards are no longer sufficient because biometric technologies offer a way forward because of the unique features of individuals captured by the technology. Biometric systems are believed to be the most accurate systems in authentication because of the unique characteristics in humans. Unlike the traditional system of authentication that used details of individual like names and address that can easily be confusing, biometric authentication makes it hard to confuse an individual when non-biometric features are similar. Moreover, apart from the slight changes that take place because of growing old or having certain medical conditions, biometrics never change making biometric systems a promising security alternative for the long-term (Morosan, 2011, p.664). Apart from the great opportunities offered by the biometrics technology, various technologies associated with this system are evolving at a rather slow pace (Baldwin, 2012, p.30). For instance, although fingerprinting is cheap compared to other forms of obtaining biometric data that can be used in any environment, this method faces the challenges of not being able to enroll some people because some people find this method uncomfortable since it is associated with criminals. Moreover, the system faces the challenge of short-term changes in fingerprints especially in individuals who engage in manual labor, which may decrease the readability of the fingerprints (Boukhonine, Krotov & Rupert, 2005, p.945). Face recognition use in biometrics offer various strengths like the ability operate without contact or user complicity, the ability to use static images and the ability to leverage the existing equipment and imaging processes. However, this technology has various challenges because it is sensitive to the environment, privacy abuse since the technology can capture face image without the individual being aware. As well, this technology in biometrics is sensitive to changes in physiology like changes in hairstyle that affect the accuracy of the system significantly (Boukhonine, Krotov & Rupert, 2005, p.948). Systems that require personal data raise security concerns due to the risks associated with compromised data, which is also a concern for biometric technology. The various technologies used in biometrics have their flaws; however, compared to the traditional security systems they are superior methods of identifying people, which makes biometric a viable alternative to security. Civilian application of biometrics offers a more reliable way of identifying people since it prevents duplication of identities and promotes faster processing of transactions that require identification. Therefore, through biometric applications it would be difficult for people to commit various forms of fraud like credit card fraud, which strengthens the reliability of biometric technology as a viable security method. Commercial applications of biometric technologies are useful in complementing or even replacing the traditional username/password combinations used in accessing computers and networks. The use of biometrics in commercial applications relies on their convenience compared to the traditional security approaches because it alleviates the need to remember username/password combinations in assessing intangible assets (Boukhonine, Krotov & Rupert, 2005, p.957). Since the approach is secure compared to traditional approach to security coupled with the fact that providing biometric data is convenient than inputting a username accompanied by a password is a clear indication that biometric technology is a viable security alternative. Biometric technology has been used in offering better security and convenience when controlling access to facilities as well as other tangible resources. Moreover, the application of biometrics in “time and attendance” applications offer convenience to employees and provide a better way of protecting the employer from fraud. As well, ATM security is strengthened through biometrics because banks and other financial institutions use several forms of biometric in accessing ATM even though biometric use in this sector faces many challenges (Boukhonine, Krotov & Rupert, 2005, p.957). The application of biometric technology has a broad base since it can be used in transaction security, surveillance, and background checks among others (Boukhonine, Krotov & Rupert, 2005, p.959). All these applications of biometric technologies and the convenience and the associated ease of use of the technology offer a clear indication that biometric technology is a viable alternative for security. In conclusion, public applications as well as commercial applications of biometric technology enhance and in many cases replace the traditional security approaches because biometric technology is more accurate and convenient to use. Although biometric technology faces many challenges especially due to the slow development and issues associated with its application, it remains a viable security approach. The traditional username/password approach to security has many challenges; for instance, it is possible to assume a person’s identity once one obtains the person’s username/password. However, with the biometric technology it is impossible to assume a different personality because the technology keeps record of data for the real individual as opposed to username and password making biometric technology a viable approach to security. References Morosan, C 2011, Customers Adoption of Biometric Systems in Restaurants: An Extension of the Technology Acceptance Model, Journal Of Hospitality Marketing & Management, 20, 6, pp. 661-690, Hospitality & Tourism Complete, EBSCOhost, viewed 5 May 2014. Boukhonine, S, Krotov, V, & Rupert, B 2005, Future Security Approaches and Biometrics, Communications Of The Association For Information Systems, 16, pp. 937-966, Business Source Complete, EBSCOhost, viewed 5 May 2014. Baldwin, H 2012, WHY PASSWORDS STILL FAIL US, Computerworld, 46, 20, pp. 28-30, Academic Search Premier, EBSCOhost, viewed 5 May 2014. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Application of Biometric Technology and the Convenience Essay Example | Topics and Well Written Essays - 1250 words, n.d.)
The Application of Biometric Technology and the Convenience Essay Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/information-technology/1826212-biobetrec-technology
(The Application of Biometric Technology and the Convenience Essay Example | Topics and Well Written Essays - 1250 Words)
The Application of Biometric Technology and the Convenience Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1826212-biobetrec-technology.
“The Application of Biometric Technology and the Convenience Essay Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/information-technology/1826212-biobetrec-technology.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Application of Biometric Technology and the Convenience

The Enemy of My Enemy May Still Be My Enemy

the convenience of a quick tactical advantage gained by using your enemy's enemy for your own ends is absurd.... These "friends" are as weak as weak as water and are only a temporary convenience.... My grandfather's favorite football team was the Dallas Cowboys and anybody that was playing the Washington Redskins....
2 Pages (500 words) Admission/Application Essay

The Competitive Position of Kellogg

Opportunities: Kellogg is an old company firmly placed in the business of food products – ready to eat cereals, cookies and snacks known as convenience foods worldwide, and is rooted well in North America.... The opportunities for Kellogg are in abundance, as it has been making… It has a stronghold in cereals and convenience foods market.... It faces competition from such companies that are international brands like General Mills' Cheerios in read- to-eat cereals and PepsiCo's Frito-Lay, and Kraft Foods Nabisco Foods in convenience foods....
4 Pages (1000 words) Admission/Application Essay

Why I Decided to Enter the Very College

The paper "Why I Decided to Enter the Very College" highlights that the college that he/she would like to enter is the first stage in his/her plans to become a prominent scientist.... nbsp; However, without this initial stage, the author will not be able to achieve anything in his/her life.... nbsp;… The love for physics has not always been with me – it started in middle school when I was 13 years old....
2 Pages (500 words) Admission/Application Essay

Ecology - From Individuals to Ecosystems

  This paper "Ecology - From Individuals to Ecosystems" gives the information about the sun heating the entire Earth, and because there is an uneven distribution of heat across the Earth's surface, the equatorial and tropical regions receive more energy from the sun than the mid-latitudes and Polar Regions....
2 Pages (500 words) Admission/Application Essay

Assignment 4

These two are causing the power plant to lose its competitive edge in the market and possibly incurring great losses. The technical problems faced… The personnel difficulties being faced by the plant are causing it to be sluggish in keeping up to date with new techniques therefore causing it to For the BAC plant in Gordon town to reduce its production cost, the technical and personnel problems that it is facing will need to be resolved....
3 Pages (750 words) Admission/Application Essay

Investgative Report

This convenience is what has ensured its sustainability and continued expansion from a small to the large store it currently is.... Bi-mart is a very busy retail store in this area as they have no competition from large super stores like Walmart and hence it is the store all the residents go to....
2 Pages (500 words) Admission/Application Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us