Free Essay

Advantages/Disadvantages of Biometrics

In:

Submitted By dteyes
Words 1046
Pages 5
As technology continues to grow, the need for security and protection of private information continues to reach new levels. New approaches to prevent crimes such as identity theft and other cyber crimes are constantly being explored. One of the approaches being explored is biometrics. According to the Merriam-Webster dictionary, biometrics is “the measurement and analysis of unique physical or behavioral characteristics (as fingerprint or voice patterns) especially as a means of verifying personal identity” (2013). Biometrics can play an important role in identifying individuals and protecting information. However, privacy concerns are raised by advocates that argue people’s privacy will be violated as well other concerns regarding privacy and security. Biometric systems have not reached their full potential and new purposes for these systems continue to be explored and implemented. Banks all over the world are installing security systems that require some form of personal identification trait such as voice recognition on ATMs. Not only for security, biometrics is being used for a variety of different reasons that range from banking to gaming. In gaming, the Xbox One that was recently launched included an improved version of their Kinect motion-sensing device that will also be able to recognize facial features and identify individuals. Overall, the future of biometrics in technology appears to be taking great steps in becoming integrated in our everyday lives. One of the most important reasons to explore biometric security is to prevent crimes that affect a large portion of the population. The growth of the Internet and the exponential rise of consumer services like online shopping have created many opportunities for criminals. Crimes such as identity theft have grown significantly, which has caused the government and organizations to take action in trying to protect consumers. Identity theft has grown so much that according to Clay Matthews, some studies estimate “more than 11.6 million adults becoming the victim of identity theft in the United States” (2013). Even though penalties are in place to punish criminals, the crime continues to grow and affect citizens in the United States. Identity fraud is not only affecting consumers but is currently impacting employers when it comes to hiring employees. For example, the law in the country mandates that employers identify individuals “as U.S. citizen based on Social Security card and Permanent Resident ID card” (Edo, G., & Braxton-Lieber, S., 2013, p. 114). However, documents like Social Security cards are easily forged by criminals and make it difficult for employers to identify. Identification methods such as E-Verify, which was developed by the federal government, have been implemented but found to be ineffective due to the dependency of the actual document instead of the actual identity of the individual. Crimes such as identity theft and identity fraud have led people to search for answers by exploring new methods in biometrics.
Biometrics can help solve some of the security and privacy issues affecting the technology world today. There are several ways biometrics can be implemented as security measures to identify individuals. An example of how biometrics is being used is the new iPhone 5s, which has a fingerprint scanner that memorizes and recognizes the user’s fingerprint to unlock the phone. Another examples of where biometric technology is being introduced are social networking sites like Facebook. On Facebook there is a feature that automatically identifies faces of uploaded pictures and allows users to tag people by comparing photos. Lots of users find the progress made through the implementation of these technological advancements to be beneficial and in general appear to be harmless.
However, there are many privacy concerns raised by opponents who view biometric security as an invasion of privacy. One of these concerns is the view that facial recognition technology will not only be used to monitor suspects but every individual in a public place. According to Laas-Mikko, K., & Sutrop, M., ethical concerns are also raised since “this technology is used to survey persons’ behavior in secured areas and detect abnormal behavior and events, as a result huge amounts of personal data are processed and collected into databases” (2012, p. 376). This means that it is possible for a person’s behavior can be analyzed and therefore their information can be used for other purposes without their consent. Laas-Mikko, K., & Sutrop, M. argue that by implementing these measures we may feel more secure from crime and terrorist attacks, but on the other hand, “there is an increased possibility of stigmatization and discrimination on the basis of false interpretation of biometric characteristics” (2012, p. 376). The ethical concern that is raised violates privacy but arguments can be made that is necessary for security and protection.
Another concern that is raised regarding privacy is a trust issue with the public. According to Edo, G., & Braxton-Lieber, S. (2013), people may be willing to share their information if they know how their information will be collected, where it will be stored, and how it will be used (p. 125). There has to be rules and regulations in place that the public will need to be aware of in order to get the full acceptance of biometric systems. There are still quite a few more concerns regarding the implementation of such systems that require further research.
Biometric systems can be beneficial to everyone as long as the proper steps are taken in assuring the public’s privacy is respected. When it comes to services such as banking and identity protection, there is little doubt that biometric systems such as retina scans can greatly assist an individual. Even though biometric systems are not fool proof and concerns still warrant resolutions, the future for biometric systems in technology appears to be promising.

References
Edo, G., & Braxton-Lieber, S. (2013). Perceptions of biometric experts on whether or not biometric modalities will combat identity fraud. Research In Business & Economics Journal, 7110-135.

Laas-Mikko, K., & Sutrop, M. (2012). How do violations of privacy and moral autonomy threaten the basis of our democracy?. Trames: A Journal Of The Humanities &
Social Sciences, 16(4), 369-381. doi:10.3176/tr.2012.4.05

Mathews, R. (2013). International identity theft: how the internet revolutionized identity theft and the approaches the world’s nations are taking to combat it. Florida Journal Of International Law, 25(2), 311-329.

Similar Documents

Premium Essay

Advantages And Disadvantages Of Biometrics

...Metrics To Human Characteristics: Biometrics Degree (950 Words) From law enforcement to financial services to gaming and security, biometrics is an area that has seen a lot of use in recent years. If you want to be part of this exciting industry, then a degree in Biometrics can be an important first step. Whether you are interested in making life more convenient for people through biometric systems, enhancing security or improving privacy, it is a challenging, but rewarding industry to work in. There are also numerous specialties within the field of Biometrics, which makes it easy to focus on your particular areas of interest. As people become more dependent on technology in areas such as banking and healthcare, there is a need for...

Words: 939 - Pages: 4

Free Essay

Biometric Authentication System

...Biometric Authentication System for Information Security Objective To explain about biometric system that can be used by the organization. By understand the biometric differences; organization can decide which technique is the most suitable for the business. Methodology The method used to know about biometric is scientific literature which will develop quantitative identification as the measurement for the authentication. Outcome To give better understanding about biometric system, biometric techniques as well as the advantages and disadvantages of biometric use in organization. Conclusion Organization can understand better value of biometric system and what is needed to implement the biometric system into the company. Keywords Biometrics CHAPTER I INTRODUCTION 1.1 Background Since January 2008, the technology had developed rapidly causing the world advancing towards a new era. A survey on 2008 had estimated about 541.7 million computers are connected in more than 250 countries on every continent even Antarctica. The internet is not a single network but it is a worldwide network that connected every individual computer hosts to network connection, in a variety ways. Thus, individuals and organizations can reach the internet without regard to national or geographic boundaries or time of day. However, along with the advantages and easy access to get information, there are also many risks such as the valuable information will be lost, stolen, changed or misused...

Words: 5215 - Pages: 21

Premium Essay

Biometric Identification Advantages

...Biometric identification Advantages Numerous advantages for the biometrics make the technology for identification much easier than the traditional methods. The simplest theory starts with the knowledge that each person has unique features, which belong to him or her, even when passed from generation to generation. The most advanced technology for identifying criminal suspects are biometric identification systems. Biometric identification defined as the process for identifying a person by human physical characteristics. Because each human unique, various parts of the human body are analyzed for comparison, and identification. Some forms of biometric identification are hand geometry, palm vein authentication, retina scan, iris scan, and facial scan recognition. The advantages of biometric technology are the extreme accuracy, and secured access to information. Retinal scan technology offers the proof that this technology has a near zero failure rate, which means that fooling this technology almost impossibility. Identification is fast as well, providing a system that is almost foolproof. The main pro of iris reading technology accuracy and alternation near impossible. Iris patterns do not require direct contact, and some scanners can focus on the eye finding the streaking patterns. The advances made in this area of expertise makes the iris reader scanner an excellent choice for law enforcement, and military applications (Blumenthal, 2010). Biometric Identification Methods ...

Words: 2287 - Pages: 10

Free Essay

Criminal Identification Procedures in the 21st Century

...identifications are Deoxyribonucleic Acid (DNA) analysis, biometric identification, Intra-agency databases for DNA, fingerprinting and palm printing, and camera and wiretap surveillance. Each aspect serves a specific purpose in making certain that the right person is properly identified for the crimes that they commit. Each technological aspect makes certain that the criminal justice system can prove without a doubt that the person under arrest is the person responsible for committing the crime. Criminal Identification Procedures Deoxyribonucleic Acid (DNA) analysis is an examination method that allows any organism to be identified, by its genetic sequences. DNA analysis is highly accurate, important, and used all across the world for important reasons. The main purpose for DNA analysis is identifying individuals who are suspects in criminal cases, identifying victims or their remains when other means of identity is not possible. The advantages of DNA analysis are reliable, accurate results, and helps solving old and new cases. The disadvantage of DNA analysis is it reveals information on physical state, this information is sensitive and must be guarded. Biometric Identification is a system based around the main physical characteristics of the human body such as finger print identification, hand geometry, palm vein authentication, retina scan, iris scan, face recognition, signature, and voice analysis. The advantage is unique the information for each individual can be identified...

Words: 1407 - Pages: 6

Free Essay

Biometrics

...Biometrics: Ethical and Privacy Issues February 28, 2016 Introduction For those curious to know what biometrics is and its purpose in society, allow me to inform you; biometrics can be defined as “the measurement and analysis of unique physical or behavioral characteristics especially as a means of verifying personal identity” (Merriam Webster). Its purpose is to clarify an individual’s identity to employers as well as the government including: their citizenship, race, and physical characteristics; all verifying that the person you claim to be, is really you. Biometrics plays a district role in our society both in reality and online; I will highlight the advantages and disadvantages, its ethical issues, and privacy concerns that arise from the ongoing battle of keeping ones identity private. Advantages and Disadvantages In today’s society there are many aspects of biometrics that contribute to businesses of all kinds leading to a positive outcome as well as preventing a greater threat from occurring. For example, First Bank has a variety of branch locations streaming down the east coast, there use of biometrics in security, allowing branch employees to sign into their workstations with the simple use of their fingerprint. By this course of action all employees signing into their account have “credentials that follow them no matter where they are working in the branch” (First Bank Partners). References Retrieved February 23, 2016, from http://www.merriam-webster...

Words: 269 - Pages: 2

Free Essay

Biometrics

...Biometrics and finger/palm printing Tara Tatum Team C Introduction In many of the FBI’s high profile cases, one form of technology that has become highly effective is biometrics. The definition of biometrics is the science of measuring and statistically analyzing biological data. This scientific measuring tool is mostly used in identifying individuals whether anatomical or physiological. While fingerprinting is probably one of the oldest and most common forms of biometrics, other forms can include but are not limited to iris scans, voice recognition, palm prints, and facial recognition. As of late, the FBI, being a leader in the latest biometric technology, has created with the help of the science and technology branch, the Biometric Center of Excellence or BCOE. Not only has the BCOE strengthened the FBI’s abilities by proving the guilt, as well as the innocence of those convicted of crimes, but it has also been effective in thwarting terrorism that plagues many countries today. Finger/palm printing techniques Since the early 1920’s, fingerprinting techniques have been in existence, assisting in identifying and authenticating a person’s identity. This older form of biometric technology has both advantages and disadvantages. Some of the advantages can be the authentication of one’s identity, as no two person’s have the same prints, the cost effectiveness, the ease of use, the accuracy and the standardization. Some disadvantages are the intrusiveness, as some...

Words: 776 - Pages: 4

Free Essay

Comparison of Various Bio-Metric Methods

...ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST) Vol 2 Issue I (March 2014) COMPARISON OF VARIOUS BIOMETRIC METHODS Rupinder Saini , Narinder Rana Rayat Institute of Engineering and IT errupindersaini27@gmail.com, narinderkrana@gmail.com Abstract This paper presents comparison concerning various biometric systems simply by defining their advantages and disadvantages. A brief introduction is usually offered regarding commonly used biometrics, including, Face, Iris, Fingerprint, Finger Vein, Lips, Voice. The comparison criteria list introduced is restricted to accuracy, size of template, cost, security level, and long term stability. Keywords Biometric systems, technique, face, Iris, finger, lips, voice. 1. Introduction "Biometrics" implies "life measurement" however the term associated with the utilization of unique physiological characteristics to distinguish an individual. It’s a new way to verify authenticity. Biometrics utilizes biological characteristics or behavioral features to recognize an individual. In real a Biometrics system is a pattern identification system that uses various patterns such as iris patterns, retina design and biological characteristics like fingerprints, facial geometry, voice recognition and hand recognition and so forth. Biometric recognition system provides possibility to verify one’s identity simply by determining “who these people are” instead of “what these people possess or may be remembered” [4]...

Words: 2857 - Pages: 12

Premium Essay

Appropriate Biometric Identification

...iris and retina are two of the most unique biometric traits exploited in two of the most accurate biometric verification and identification methods currently in use today. Retina recognition offers an astounding one in 10,000,000 comparative accuracy ratio while iris imaging offers a slightly lesser comparative accuracy ratio at one in 131,000. This puts the two at the top of the list in comparative accuracy when it comes to the common biometric methods. Although both have their clear advantages they also have key disadvantages that must be brought to light. (Newton, Robert, 2010) The iris can be easily identified as the colored portion of the eye; it is a muscle within the eye that regulates the size of the pupil, thus controlling...

Words: 897 - Pages: 4

Premium Essay

A Key Concept in Information Systems

...Computer and network security has become very important to businesses, government, military, and individuals. Many companies have been compromised and personal information obtained and used without authorization. It is very important to have computer and network security to keep hackers and malware from collecting data and destroying a computer system and network. Computer security protects all of the data that is stored on your computer. Every component should be protected that includes hardware, software, and data. The history of Network security started when hacking crimes started in the 1980’s. Robert Morris was a computer hacker that released a worm that affected 6,000 computer systems. It created a large monetary financial lost because of a computer worm. The Computer Emergency Response Team (CERT) was said to be form after the attack to inform users they had security problems. ”The Department of Homeland Security's United States Computer Emergency Readiness Team (US-CERT) leads efforts to improve the Nation's cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the Nation while protecting the constitutional rights of Americans (US-CERT).” Hospitals have major concern in protecting computer and network security. The information in hospitals have very valuable information such as patient records, social security...

Words: 1025 - Pages: 5

Free Essay

Retinal Biometricss

...Retinal Biometric Security University of Maryland University College Abstract Retinal biometric security is a newer technology that is becoming increasingly popular, and with its advances in technology and increase in product suppliers, it’s undeniable that this is a growing methodology with surefire longevity. This method of biometric security is based on a retinal scan that involves the use of a low-intensity coherent light source projected onto the retina to illuminate the blood vessels, which are photographed and analyzed. Due to the intricacies, a retina scan cannot be replicated, as it is impossible to forge a human retina. Because of this fact, a retinal scan has an error rate of 1 in 10 million; compared to fingerprint identification error rates sometimes as high as 1 in 500 (Biometric Newsportal, n.d.). In all its greatness, as with any technology, it comes with both advantages and disadvantages throughout the various phases of implementation. With the pros vastly outweighing the cons, retinal biometrics has still created its own namespace and presence in the world of technology. With current retinal biometric applications and technologies being implemented in the financial, government, medical, and mobile sectors, it’s safe to bet that there is a great future laying ahead for this area of biometrics. Although there maybe anticipated competition, retinal scanning is currently leading the pack of biometrics methodologies and the trends prove that this will...

Words: 2616 - Pages: 11

Premium Essay

Biometerrice Identification

...Biometric Identification Biometric identification systems use a physical characteristic that help with identification. These characteristics could be fingerprints, hand geometry, retina scans, iris scans, face recognition, voice analysis, palm vein authentication, DNA, and even signatures. There are certain factors that are needed to make sure that biometric identification is successful. The physical characteristic should not change over time, the characteristic should be unique from person to person, and the method should be easy to scan and read while working in the field. The systems should be easy to use and train to professionals, and it must be understood that the system should be set up so that willing participation is not necessary. Currently biometrics can be used to help be mobile handicapped individuals, by reading facial movements. It is currently used on PDAs and iPaq, newer higher end vehicles use biometrics to identify the driver. In this case it will move seats, control temperature, and adjust mirrors. Biometrics is also use by many countries to scan faces in hopes to catch criminals and known terrorist. While these advantages to society seem to out weigh the disadvantages, there are some concerns. Voice recognition can be outsmarted by simply recording someone while they are unaware. Facial recognitions can be affected by simple lighting changes, as well as a haircut, glasses, and...

Words: 471 - Pages: 2

Free Essay

Biometric

...Title (2) Biometric scanning system types and which one is more effectiveness in a workplace Biometric recognition, or biometrics, refers to the automatic authentication of a person based on his or her physiological or behavioural characteristics (Jain, Bolle, and Pankanti 1999a; Maltoni, Maio, Jain, and Prabhakar 2003). One of the most important technologies which acts as a human being identify required purpose. Nowadays there were great progresses in technology of access for companies which it using human being body to identify the identity of the person. In the past Human beings used fingerprint to identity for signature. Biometric technology looks like a revolution for modern society for example, Iris and AFIS (Automatic Finger Print Identification System). Although fingerprint has a good feature to identify people but I will argue that iris system has shown the best performance to do the required purpose of scanning and identification more accurately than fingerprint. Reliability Fingerprint is a biometric device by which the people been identified through scanning fingerprint of the person and save the data to store the fingerprint image. Furthermore fingerprint identification scanning is reliability because fingerprint identification and authentication is the mature biometric technology (Komarinski, 2005). Firstly, the fingerprint is reliable because it includes quite huge information and will keep for all life of human being, In spite of the fingerprint just...

Words: 1161 - Pages: 5

Premium Essay

Minicase

...written permission. Biometric Scanning Technologies: Finger, Facial and Retinal Scanning This paper discusses several Biometric scan technologies: finger-scan, facialscan and retinal-scan. We discuss the recent history of Biometrics and how it has been influenced by such pseudo-sciences as Phrenology, the study of human skull characteristics and Anthropometry, the study of human body measurement. We discuss how finger-scan technology was influenced by French and British police advancements in the nineteenth century and still remain the most widely used Biometric technology today. Facial-scan technology is ... AD Copyright SANS Institute Author Retains Full Rights fu ll r igh ts Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SA NS In sti tu te 20 03 ,A ut ho rr eta ins Edmund Spinella SANS GSEC Original Submission San Francisco, CA Dec 2002 28 May 2003 Biometric Scanning Technologies: Finger, Facial and Retinal Scanning Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SANS Institute 2003, As part of the Information Security Reading Room. Author retains full rights. Abstract © SA NS In sti tu te 20 03 ,A ut ho rr eta ins fu ll r igh ts This paper discusses several Biometric scan technologies: finger-scan, facialscan and retinal-scan. We discuss the recent history of Biometrics and how it has been...

Words: 5748 - Pages: 23

Free Essay

Biometrics Report

...Communication and Information Technologies Tutor Marked Assignment Dynamic Holiday Limited Biometric Authentication Report Introduction This report aims to give a brief overview of the alternatives to the current authentication system being used at Dynamic Holidays Limited. Specifically it will detail the technologies behind both fingerprint and iris scanning, doing a comparison of each in turn, and then ultimately leading to a recommendation as to which would suit the company better. Biometric Overview Biometrics, or the singular biometric, is the measurement of living things and in most contexts details the measurement of human beings for security and authentication purposes. This stems from the Greek bios (life) and metron (measure). In a security environment, biometrics are utilised to ensure that the correct people have access to the products and services to which they are entitled. The field of biometrics covers a wide scope of technologies, including but not limited to facial, iris, fingerprint and DNA recognition. Within the field of biometrics, there are generally two sources of identification classifications: physiological and behavioural. Physiological characteristics are those that we are born with and do not usually change (iris and fingerprints), especially once we have reached adulthood. This excludes the nature of physical injury or various other medical or traumatic...

Words: 3039 - Pages: 13

Premium Essay

Biometrics

...Biometrics 125 years ago, winter 1879, Paris First agency police prefecture clerk Alphonse Bertillion was sitting in dark cold corner of huge file-cabinet room, where there were stored files on all Parisian criminals. A.Bertillion was entering the criminals’ description. He found out that there is no classification system, since: a) Criminals could easily change their names, and attempts to try different systems (by age, criminal method) end up in failure. Bertillion, son of Lui Bertillion – president of the Anthropological society, came up with an idea to utilize anthropological parameters (height, length and volume of the head, length of the hands, fingers, etc.) to identify personality. This was a break-through in criminalistics. With the development of electronics, Bertillioon’s theory was recalled and scientists realized that human beings have numerous unique characteristics beginning from the iris of the eye to the fingerprints and all these characteristics can be used in personality identification. With the rapid development of computer technologies, the concept of information security is becoming more and more important. Crime scene investigators have been using behavioral and physical characteristics for centuries in order to identify the criminals, nowadays; we have a great need for identification and authorization in information security. Information Security is being understood as a protection of the information and informational infrastructure...

Words: 1934 - Pages: 8