...BIOMETRICS (IN TERM TO ETHIC AND PRIVACY ISSUES) IFSM201 Section 4035 Semester 1302 DUE DATE 02/03/2013 Introduction Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyzes human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes. Authentication by biometric verification is becoming increasingly common in public security systems, cooperate, consumer electronic and point of sale application. In addition to security, the driving force behind biometric verification has been convenience. (Rouse, 2008) In the recent years, civil liberty organization has argued that the collection of biometric data undermines the human rights for privacy and anonymity. (Shaikh, 2005) One of the most oldest and accurate type of biometric systems is fingerprint recognition; it is an extremely useful biometrics technology. Fingerprints have long been recognized as a primary and accurate identification method. It has been used for commercial, government and forensic purposes. Iris recognition system is highly nature technology and provides the most secure methods of authentication and identification thanks to the unique characteristics of the iris. This made the technology very useful in areas such as information security, access security, ATMs and airport security...
Words: 657 - Pages: 3
...Investigation into Biometric Technologies and the Development of a Fingerprint Recognition Application . . . . . . . . . . Note: Incomplete, this document is currently in draft Abstract This preliminary document covers the presentation phase of a final year BSc (Hons) computing science project aiming to investigate biometric technologies and develop a fingerprint recognition application to allow logging of student attendance at lectures. The introduction offers some background to the project and establishes the aims and objectives of the project overall. Following on from the introduction, the literature review presents a critique of research material that provides the basis for the project. This material includes a number of texts, journals and research papers as well as additional information sourced from the Web. As drawn from the literature, the subject areas covered include; history and background to modern biometrics; technological, social, organisational and environmental influences; key technologies in the market today; design issues, including security, performance and testing. In chapter 3, attention turns to requirements analysis for the development of a fingerprint recognition system. The process follows a requirements engineering approach to development by formally establishing user requirements and allowing continuous requirements assessment throughout the project life-cycle. The design approach and methodology used to model the...
Words: 11664 - Pages: 47
...Investigation into Biometric Technologies and the Development of a Fingerprint Recognition Application Student Name: Robert Heaney ST No: 10550804. Supervisor: Jonathan G. Wallace . . . . . . . . . . Note: Incomplete, this document is currently in draft Abstract This preliminary document covers the presentation phase of a final year BSc (Hons) computing science project aiming to investigate biometric technologies and develop a fingerprint recognition application to allow logging of student attendance at lectures. The introduction offers some background to the project and establishes the aims and objectives of the project overall. Following on from the introduction, the literature review presents a critique of research material that provides the basis for the project. This material includes a number of texts, journals and research papers as well as additional information sourced from the Web. As drawn from the literature, the subject areas covered include; history and background to modern biometrics; technological, social, organisational and environmental influences; key technologies in the market today; design issues, including security, performance and testing. In chapter 3, attention turns to requirements analysis for the development of a fingerprint recognition system. The process follows a requirements engineering approach to development by formally establishing user requirements and allowing continuous requirements assessment...
Words: 5371 - Pages: 22
...and receive emails, dictation, filming, photographing, and image sharing available to most smart phone users. All of these features drastically increase the chance that a patient’s privacy could be breached. If a physician’s mobile device is lost or stolen there is a substantially higher risk of disclosure of a large volume of detailed, identifiable treatment and personal contact information for a wide range of the physician’s patients. Ethical and legal issues Mobile devices are particularly vulnerable to loss and theft because of their small size and portability. The most common form of security breach is the theft of a cell phone. In addition, clinicians are far more likely to use their own personal mobile devices, rather than employer-issued mobile devices, to access and exchange electronic protected health information (ePHI) (Barrett, 2011). Unfortunately, with the advancement of technology the computer and internet hackers have become more advanced as well. These types of individuals do not hold themselves up to the same ethical morals and values as your average person. Disclosure of potentially very...
Words: 1103 - Pages: 5
...2013 – www.ijais.org Fingerprint Biometric Authentication for Enhancing Staff Attendance System Oloyede Muhtahir O. Dept. of Info. and Comm. Science University of Ilorin, Ilorin. Adedoyin Adeyinka O. Dept. of Info. and Comm. Science University of Ilorin, Ilorin. ABSTRACT Biometric technology that involves the identification and verification of individuals by analyzing the human body characteristics has been widely used in various aspect of life for different purposes, most importantly as regards this study the issue of staff attendance. Despite the numerous advantages of the biometric system and its impact to various work sectors across the globe, most biometric technology users face the issue of defining the right and accurate biometric technology system that will be cost effective in solving particular problems in specific environment. In this paper, a study was conducted using a telecommunication company in the South West region of Nigeria, in order to determine the specific biometric identifier that can be used to enhance their traditional staff attendance system which presently affects the productivity of the organization. The study was conducted using a quantitative approach by designing a questionnaire as the data collection instrument based on different biometric technologies. The survey involved 37 employees based on stratified random sampling technique. The results however show that fingerprint biometric identifier was found suitable for...
Words: 4926 - Pages: 20
...offer each customer a delightful and pleasing shopping outing.” The rapid growth and working to always improve efficiency in its operations founder, Kathy Kudler, looking to always improve the customers shopping experience decided to add a marketing awards program. A marketing awards program helps organizations track customer behavior by giving various incentives to shoppers increasing annual purchasing of customers (JPS, 2009). This will help Kudler Fine Foods analyze shopping habits, change product mix at an individual store level, and fine – tune their marketing programs. To maintain their market share and implement an efficient frequent awards program the organization will need to evaluate the following issues: • Legal Aspects • Ethical and Social Responsibility • Security Issues • Financial Analysis Legal Aspects Frequent awards programs gather information based on consumers buying behavior. In the process of implementing a rewards program Kudler Fine Foods will need to address issues to protect the company and public interest. Customers will need to have complete confidence in the ability of the company to maintain the privacy of the information collected. Conducting training classes will inform employees of personal and company legal rights. This will give employees the capability to answer questions that may arise from shoppers within individual stores instilling consumer confidence. Eligibility is another legal issue the company will have to address. The...
Words: 913 - Pages: 4
...Securing and Protecting Information Jane Doe CGMT/400 March 9, 2015 John Doe Securing and Protecting Information As the most important asset within the organization it is necessary to provide measures that can effectively protect data from loss and unauthorized intrusions. Information security involves authenticating users with a high level of protocol and promoting accountability within the information infrastructure. This approach may involve use of the organization assets, identification, authentication, authorization and the use of third party security systems or devices to protect data from unauthorized access. Security Authentication Process The security authentication process is the first step in information security and assurance. This process involves “binding a specific ID to a specific computer connection” (University of Phoenix, 2011) in order to authenticate access to the information system. During this process the user provides a user ID and password to the computer system or remote server to verify his or her identity. Authentication is accomplished when the system or server matches the user ID to a specific password and grants the user remote access to system resources. Identification The identification process is an access control element designed to match a user to a specific process. The identification process is performed the first time a user ID is issued to a specific user. User IDs have unique values and can...
Words: 1903 - Pages: 8
...Having recently acquired the rights to the Broadway Café, we, Gem Global Consulting Group, have developed a new, successful business plan designed to revitalize the Broadway Café. Our strategy will take into account the several factors that make up the current business situation. These factors include the opportunity to implement Information Technology systems and supply chain improvements, the broad range of products offered by the Broadway Café, the competitive environment, and the fact that the café has been a hotspot for several years before the decline in sales over the past 5 years. Our plan will also focus on positioning the Broadway Café to regain market share from competitors, and improving Electronic business procedures, employee ethics, and customer security. In conducting our thorough analysis, we at Gem Global have concluded that the Broadway Café is poised to spring ahead and has the opportunity to become a once more valuable enterprise. We envision the Broadway Café as becoming the market leader via technology implementation, business collaboration, and strategic planning. With regards to the competitive environment, the city of East Lansing has many competitors in the coffee market, including traditional coffee shops, such as Starbucks, Bigbys, Espresso Royal, as well as the residence hall cafeterias and Spartys. Other competitors include sandwich shops, such as Cosi and Panera, which, although not coffee shops, are in competion with the Broadway Café’s...
Words: 3349 - Pages: 14
...The New Broadway Café Business Plan Designed by Gem Global Consulting Group Group 3, Section 3 Gabriel Kwakyi Zachary Katikos Corey McHenry Mira Bajrami Shivam Patel Having recently acquired the rights to the Broadway Café, we, Gem Global Consulting Group, have developed a new, successful business plan designed to revitalize the Broadway Café. Our strategy will take into account the several factors that make up the current business situation. These factors include the opportunity to implement Information Technology systems and supply chain improvements, the broad range of products offered by the Broadway Café, the competitive environment, and the fact that the café has been a hotspot for several years before the decline in sales over the past 5 years. Our plan will also focus on positioning the Broadway Café to regain market share from competitors, and improving Electronic business procedures, employee ethics, and customer security. In conducting our thorough analysis, we at Gem Global have concluded that the Broadway Café is poised to spring ahead and has the opportunity to become a once more valuable enterprise. We envision the Broadway Café as becoming the market leader via technology implementation, business collaboration, and strategic planning. With regards to the competitive environment, the city of East Lansing has many competitors in the coffee market, including traditional coffee shops, such as Starbucks, Bigbys, Espresso Royal, as well as the residence hall...
Words: 3393 - Pages: 14
...In the past few years, businesses have been using modern technology to make processes more innovative and to help compete with other businesses in parallel industries. Our grandfather owned the Broadway Café, a local coffee shop, since the early 1950s. Having just inherited this coffee shop, we realized how out of date the café was in terms of information technology. To help us determine our café’s position and what changes must be made, we first implemented Porter’s Five Forces model to our café and then chose to use the differentiation strategy to rebuild our café for the 21st century. The first force, buyer power, we recognized to be fairly strong. Buyer power is strong because there are a number of coffee shops located in the East Lansing area as well as ours. In order to overcome competitive challenges, we came up with ways to set ourselves apart from our competitors. We plan to create a unique, tech-savvy atmosphere compared to other coffee shops in downtown East Lansing, giving the Broadway Café the competitive advantage. We will set ourselves apart from these competitors by establishing and maintaining customer relationships through a customer loyalty program that will be rewarded to frequent customers. These strategies will be used, as well as others, to minimize the overwhelming buyer power of our customers. Next, supplier power, another one of Porter’s Five Forces, we have recognized as weak compared to other forces. Our suppliers of coffee beans have a low bargaining...
Words: 4177 - Pages: 17
...rating and an Annualized Loss Expectancy rating with monetary values for both. How much control the company has over specific and general attacks is important also. This data will reveal how safe the system truly is. Conducting interviews with each department staff leader will also be a key step in assessing risk. This would give a general idea of how day-to-day operations are run, how many employees have access to the system, and how many remote locations they have. Since the servers used for data storage are connected to the same network as the servers used for software and Internet programs, there is a serious risk when using web components. For example, all of the employees in the accounting department use a payment posting web application. If an attacker or even a disgruntled employee wants to write company checks to a fraudulent account, they could simply sign in and fill out the information for writing a check and have the funds within 24 hours. To counter this, a simple solution would be to have active employees change their passwords every six months, and revoke all employee...
Words: 2340 - Pages: 10
...Ethics and Privacy of Communications in the E-Polis Gordana Dodig-Crnkovic and Virginia Horniak Department of Computer Science and Electronics Mälardalen University Västerås, Sweden I N T R O D U C T I O N The electronic networking of physical space promises wide-ranging advances in science, medicine, delivery of services, environmental monitoring and remediation, industrial production, and the monitoring of persons and machines. It can also lead to new forms of social interaction [..]. However, without appropriate architecture and regulatory controls it can also subvert democratic values. Information technology is not in fact neutral in its values; we must be intentional about design for democracy. (Pottie, 2004) Information and communication technology, ICT, has led to the emergence of global web societies. The subject of this article is privacy and its protection in the process of urbanization and socialization of the global digital web society referred to as the e-polis. Privacy is a fundamental human right recognized in all major international agreements regarding human rights such as Article 12 of the Universal Declaration of Human Rights (United Nations, 1948), and it will be discussed in the chapter under the heading Different Views of Privacy. Today’s computer network technologies are sociologically founded on huntergatherer principles. As a result, common users may be possible subjects of surveillance and sophisticated Internet-based attacks. A user may be completely...
Words: 3586 - Pages: 15
...Strengthening Patient Registration and Fraud Prevention using Cloud Computing Technology at George Hopesman-Wubarte Hospital By XXX Managerial Applications of Information Technology – MIS535 Professor XXX DeVry University, Keller Graduate School of Management August 17, 2013 Table of Contents 1.0 ABSTRACT3 2.0 BRIEF COMPANY BACKGROUND4 3.0 BUSINESS PROBLEM4 4.0 HIGH LEVEL SOLUTION5 5.0 GENERAL BENEFITS6 6.0 BUSINESS/TECHNICAL APPROACH AND IMPLEMENTATION PLAN 8 7.0 BUSINESS PROCESS CHANGES13 8.0 HISTORICAL RESEARCH15 9.0 TECHNOLOGY/BUSINESS PRACTICE19 10.0 CONCLUSION AND OVERALL RECOMMENDATIONS25 11.0 REFERENCE27 1.0 ABSTRACT George Hopesman-Wubarte Hospital (GHW) has been a nationally recognized leader in the healthcare industry for several years. However, in order to remain the innovative leader of its kind, the Greinly and Associates Consulting Group (GACG) has been asked to give some recommendations on how Information Technology can bring some improvements. The results of a conducted study of the patient information and medical records system indicted that a biometric known as Electronic Health Records (EHR) would drastically improve the timeliness and security of this process. A complete comprehensive study of the current antiquated system has been done. This study has allowed for the recommendations of how to implement the business and technical changes of the old system into the new EHR system to be brought forth. A theoretical analysis, backed...
Words: 4719 - Pages: 19
...Networks, Telecommunications, and Wireless Computing | | | Telecommunication systems enable the transmission of data over public or private networks. A network is a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together. Telecommunication systems and networks are traditionally complicated and historically ineffi cient. However, businesses can benefi t from today’s modern network infrastructures that provide reliable global reach to employees and customers. Businesses around the world are moving to network infrastructure solutions that allow greater choice in how they go to market—solutions with global reach. These alternatives include wireless, voice-over internet protocol (VoIP), and radio-frequency identification (RFID). | | | | | Knowledge Areas | Business Dilemma | | | Business Dilemma Personal sensing devices are becoming more commonplace in everyday life. Unfortunately, radio transmissions from these devices can create unexpected privacy concerns if not carefully designed. We demonstrate these issues with a widely-available commercial product, the Nike+iPod Sport Kit, which contains a sensor that users put in one of their shoes and a receiver that users attach to their iPod Nanos. Students and researchers from the University of Washington found out that the transmitter in a sneaker can be read up to 60 feet away. Through the use of a prototype...
Words: 2881 - Pages: 12
...ACCT – CIS500 MID TERM EXAM Question 1 Business-to-consumer applies to any business that sells its products or services to consumers over the Internet. Answer True False 2 points Question 2 According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules. Answer | | Informed, collaborate | | | Consent, informed | | | Informed, consent | | | None of the above | 2 points Question 3 What are web services? Answer | | Contains a repertoire of web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services | | | The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers | | | A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them | | | A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service | 2 points Question 4 An entry barrier is typically used to influence the rivalry among existing competitors. Answer True False 2 points Question 5 What addresses when systems can be accessed by employees, customers, and...
Words: 1504 - Pages: 7