Search results

21 – 30 of 501
Article
Publication date: 31 July 2019

Cristian Morosan

Facial recognition systems represent a viable solution to today’s hotels’ security and service challenges. The purpose of this study was to build and empirically validate a…

1384

Abstract

Purpose

Facial recognition systems represent a viable solution to today’s hotels’ security and service challenges. The purpose of this study was to build and empirically validate a conceptual model that examined consumers’ willingness to create a profile based on biometric information disclosed via facial recognition systems.

Design/methodology/approach

Data were collected from 421 US general population consumers who stayed in hotels. The study used a confirmatory factor analysis to test the measurement model and a structural equation modeling approach to empirically validate the structural model.

Findings

It was found that the benefit of information disclosure was the strongest predictor of value of disclosure and that value of disclosure and privacy concerns influenced consumers’ willingness to disclose biometric information. In turn, consumers’ willingness to disclose biometric information and their desire to be loyal to hotels influenced consumers’ willingness to create a profile.

Originality/value

To the best of the author’s knowledge, this is the first study to examine profile creation and biometric information disclosure via facial recognition systems in hotels, a technology that is likely to disrupt the current authentication and service quality models in hotels. This study also advances the literature by expanding the scope of the privacy calculus by adding social rewards, and by elucidating the role of desires in service contexts.

Details

International Journal of Contemporary Hospitality Management, vol. 31 no. 8
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 1 March 1992

Paul MacGregor and Robert Welford

Veincheck is a biometric system which uses back‐of‐hand vein patterns to verify an individual's identity. A biometric system can be loosely defined as a means of verifying an…

Abstract

Veincheck is a biometric system which uses back‐of‐hand vein patterns to verify an individual's identity. A biometric system can be loosely defined as a means of verifying an individual's identity by analysis of a physiological feature or a characteristic action. There are a wide variety of biometric systems under development ranging from signature to fingerprint to voice. Biometric systems are often compared on the basis of their False Accept Rates (FAR) and False Reject Rates (FRR). These rates are also referred to as Type 1 and Type 2 errors respectively. The acceptable values and the relative importance for these error rates varies from application to application. It is generally agreed that error rates of much less than 1 per cent are needed before deploying a biometric system for use by the general public.

Details

Sensor Review, vol. 12 no. 3
Type: Research Article
ISSN: 0260-2288

Article
Publication date: 11 September 2019

Valerie Tang, K.L. Choy, G.T.S. Ho, H.Y. Lam and Y.P. Tsang

The purpose of this paper is to develop an Internet of medical things (IoMT)-based geriatric care management system (I-GCMS), integrating IoMT and case-based reasoning (CBR) in…

1193

Abstract

Purpose

The purpose of this paper is to develop an Internet of medical things (IoMT)-based geriatric care management system (I-GCMS), integrating IoMT and case-based reasoning (CBR) in order to deal with the global concerns of the increasing demand for elderly care service in nursing homes.

Design/methodology/approach

The I-GCMS is developed under the IoMT environment to collect real-time biometric data for total health monitoring. When the health of an elderly deteriorates, the CBR is used to revise and generate the customized care plan, and hence support and improve the geriatric care management (GCM) service in nursing homes.

Findings

A case study is conducted in a nursing home in Taiwan to evaluate the performance of the I-GCMS. Under the IoMT environment, the time saving in executing total health monitoring helps improve the daily operation effectiveness and efficiency. In addition, the proposed system helps leverage a proactive approach in modifying the content of a care plan in response to the change of health status of elderly.

Originality/value

Considering the needs for demanding and accurate healthcare services, this is the first time that IoMT and CBR technologies have been integrated in the field of GCM. This paper illustrates how to seamlessly connect various sensors to capture real-time biometric data to the I-GCMS platform for responsively supporting decision making in the care plan modification processes. With the aid of I-GCMS, the efficiency in executing the daily routine processes and the quality of healthcare services can be improved.

Details

Industrial Management & Data Systems, vol. 119 no. 8
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 1 December 2001

P.K. Janbandhu and M.Y. Siyal

Personal identification numbers, passwords, smart cards and digital certificates are some of the means employed for user authentication in various electronic commerce…

1971

Abstract

Personal identification numbers, passwords, smart cards and digital certificates are some of the means employed for user authentication in various electronic commerce applications. However, these means do not really identify a person, but only knowledge of some data or belonging of some determined object. This paper introduces the notion of biometric signature – a new approach to integrate biometrics with public key infrastructure, using biometric based digital signature generation which is secure, efficacious, fast, convenient, non‐invasive and correctly identifies the maker of a transaction. It also suggests two schemes for biometric signature using two existing and widely used digital signature algorithms, RSA and DSA, and discusses the problems associated with them individually. Speed of both schemes (based on iris recognition) is measured and compared with the help of JAVA implementation for both approaches.

Details

Information Management & Computer Security, vol. 9 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 4 March 2014

Maren Behrensen

– The paper is a conceptual investigation of the metaphysics of personal identity and the ethics of biometric passports. The paper aims to discuss these issues.

Abstract

Purpose

The paper is a conceptual investigation of the metaphysics of personal identity and the ethics of biometric passports. The paper aims to discuss these issues.

Design/methodology/approach

Philosophical argument, discussing both the metaphysical and the social ethics/computer ethics literature on personal identity and biometry.

Findings

The author argues for three central claims in this paper: passport are not simply representations of personal identity, they help constitute personal identity. Personal identity is not a metaphysical fact, but a set of practices, among them identity management practices (e.g. population registries) employed by governments. The use of biometry as part of these identity management practices is not an ethical problem as such, nor is it something fundamentally new and different compared to older ways of establishing personal identity. It is worrisome, however, since in the current political climate, it is systematically used to deny persons access to specific territories, rights, and benefits.

Originality/value

The paper ties together strands of philosophical inquiry that do not usually converse with one another, namely the metaphysics of personal identity, and the topic of identity in social philosophy and computer ethics.

Details

Journal of Information, Communication and Ethics in Society, vol. 12 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 26 November 2020

N.V. Brindha and V.S. Meenakshi

Any node in a mobile ad hoc network (MANET) can act as a host or router at any time and so, the nodes in the MANET are vulnerable to many types of attacks. Sybil attack is one of…

Abstract

Purpose

Any node in a mobile ad hoc network (MANET) can act as a host or router at any time and so, the nodes in the MANET are vulnerable to many types of attacks. Sybil attack is one of the harmful attacks in the MANET, which produces fake identities similar to legitimate nodes in the network. It is a serious threat to the MANET when a malicious node uses the fake identities to enter the network illegally.

Design/methodology/approach

A MANET is an independent collection of mobile nodes that form a temporary or arbitrary network without any fixed infrastructure. The nodes in the MANET lack centralized administration to manage the network and change their links to other devices frequently.

Findings

So for securing a MANET, an approach based on biometric authentication can be used. The multimodal biometric technology has been providing some more potential solutions for the user to be able to devise an authentication in MANETs of high security.

Research limitations/implications

The Sybil detection approach, which is based on the received signal strength indicator (RSSI) variations, permits the node to be able to verify the authenticity of communicating nodes in accordance with their localizations.

Practical implications

As the MANET node suffers from a low level of memory and power of computation, there is a novel technique of feature extraction that is proposed for the multimodal biometrics that makes use of palm prints that are based on a charge-coupled device and fingerprints, along with the features that are fused.

Social implications

This paper proposes an RSSI-based multimodal biometric solution to detect Sybil attack in MANETs.

Originality/value

The results of the experiment have indicated that this method has achieved a performance which is better compared to that of the other methods.

Details

International Journal of Intelligent Unmanned Systems, vol. 10 no. 1
Type: Research Article
ISSN: 2049-6427

Keywords

Book part
Publication date: 1 November 2007

Irina Farquhar and Alan Sorkin

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative…

Abstract

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative information technology open architecture design and integrating Radio Frequency Identification Device data technologies and real-time optimization and control mechanisms as the critical technology components of the solution. The innovative information technology, which pursues the focused logistics, will be deployed in 36 months at the estimated cost of $568 million in constant dollars. We estimate that the Systems, Applications, Products (SAP)-based enterprise integration solution that the Army currently pursues will cost another $1.5 billion through the year 2014; however, it is unlikely to deliver the intended technical capabilities.

Details

The Value of Innovation: Impact on Health, Life Quality, Safety, and Regulatory Research
Type: Book
ISBN: 978-1-84950-551-2

Article
Publication date: 1 December 1994

Simon G. Davies

The evolution of information technology is likely to result in intimateinterdependence between humans and technology. This fusion has beencharacterized in popular science fiction…

1899

Abstract

The evolution of information technology is likely to result in intimate interdependence between humans and technology. This fusion has been characterized in popular science fiction as chip implantation. It is, however, more likely to take the form of biometric identification using such technologies as fingerprints, hand geometry and retina scanning. Some applications of biometric identification technology are now cost‐effective, reliable and highly accurate. As a result, biometric systems are being developed in many countries for such purposes as social security entitlement, payments, immigration control and election management. Whether or not biometry delivers on its promise of high‐quality identification, it will imperil individual autonomy. Widespread application of the technologies would conflict with contemporary values, and result in a class of outcasts.

Details

Information Technology & People, vol. 7 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 17 September 2008

B.H. Rudall and C.J.H. Mann

This paper aims to review current developments that have been initiated by the advent of the new technologies.

527

Abstract

Purpose

This paper aims to review current developments that have been initiated by the advent of the new technologies.

Design/methodology/approach

A general review and survey of selected research and development topics.

Findings

Illustrates the multi‐ and trans‐disciplinary nature of cybernetics, systems and management sciences.

Practical implications

The choice of reviews provides an awareness of the current trends in these areas of endeavour.

Originality/value

The reviews are selected from a global database and give a studied assessment of present‐day research and development initiatives.

Details

Kybernetes, vol. 37 no. 7
Type: Research Article
ISSN: 0368-492X

Keywords

Expert briefing
Publication date: 11 July 2023

Data such as DNA, blood and saliva may also be used, typically in medical and legal settings. While the use of such identification increases, concerns about abuses of the most…

Details

DOI: 10.1108/OXAN-DB280408

ISSN: 2633-304X

Keywords

Geographic
Topical
21 – 30 of 501