Search results

1 – 10 of over 1000
Article
Publication date: 26 September 2023

Gajendra Liyanaarachchi, Giampaolo Viglia and Fidan Kurtaliqi

This study aims to investigate the implications, risks and challenges of data privacy due to the use of immersive technology in the hospitality industry.

Abstract

Purpose

This study aims to investigate the implications, risks and challenges of data privacy due to the use of immersive technology in the hospitality industry.

Design/methodology/approach

The authors adopt a mixed-method approach. Study 1 is a focus group. The authors then provide external and ecological validity with a field experiment conducted with 139 hotel clients at a three-star continental European hotel.

Findings

Collecting biometric data results in unbalanced privacy compared to biographic data, as it diminishes individuals’ control over their data and grants organizations absolute power. This unbalanced privacy directly influences consumers’ willingness to disclose information, affecting their choice of hotels and access to services.

Practical implications

Hotels should redesign their strategies to accommodate heightened privacy risks with biometric data. This can be obtained by introducing systems that foster customer confidence in data usage and facilitate customers’ willingness to disclose biometrics through immersive technology or biographic data.

Originality/value

This study introduces unbalanced privacy as a unique state due to sharing biometric data. The authors propose a novel doctrine, the uncontrollable privacy paradox, which is a shift from the privacy paradox. The uncontrollable privacy paradox addresses the unbalanced privacy envisaged through consumer powerlessness in data management. This research addresses the literature gap on the privacy paradox by offering a broader perspective, including business, industry and mixed reality considerations.

Details

International Journal of Contemporary Hospitality Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 1 February 2004

V. Zorkadis and P. Donos

Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements…

3057

Abstract

Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements of authentication and identification systems. However, any human physiological or behavioural traits serving as biometric characteristics are personal data protected by privacy protection legislation. To address related issues, this paper examines these classes of biometrics according to data protection principles, purpose, proportionality and security, provided in international legislation. This analysis leads to the desired properties of biometric systems in the form of functional and non‐functional requirements, in order to support developers minimising the risk of being non‐compliant to privacy protection legislation, and to increase user acceptance.

Details

Information Management & Computer Security, vol. 12 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 21 August 2007

Ong Thian Song, Andrew Teoh Beng Jin and Tee Connie

This paper aims to address some of the practical and security problems when using fingerhash to secure biometric key for protecting digital contents.

2017

Abstract

Purpose

This paper aims to address some of the practical and security problems when using fingerhash to secure biometric key for protecting digital contents.

Design/methodology/approach

Study the two existing directions of biometric‐based key generation approach based on the usability, security and accuracy aspects. Discuss the requisite unresolved issues related to this approach.

Findings

The proposed Fingerhashing approach transforms fingerprint into a binary discretized representation called Fingerhash. The Reed Solomon error correction method is used to stabilize the fluctuation in Fingerhash. The stabilized Fingerhash is then XORed with a biometric key. The key can only be released upon the XOR process with another Fingerhash derived from an authentic fingerprint. The proposed method could regenerate an error‐free biometric key based on an authentic fingerprint with up to 99.83 percent success rate, leading to promising result of FAR = 0 percent and FRR = 0.17 percent. Besides, the proposed method can produce biometric keys (1,150 bit length) which are longer in size than the other prevailing biometric key generation schemes to offer higher security protection to safeguard digital contents.

Originality/value

Outlines a novel solution to address the issues of usability, security and accuracy of biometric based key generation scheme.

Details

Information Management & Computer Security, vol. 15 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 11 May 2012

Olli I. Heimo, Antti Hakkala and Kai K. Kimppa

The purpose of this paper is to show that most, if not all RFID/biometric passports have clear technical and social problems in their intended use and that there are clear…

929

Abstract

Purpose

The purpose of this paper is to show that most, if not all RFID/biometric passports have clear technical and social problems in their intended use and that there are clear problems with the databases into which biometric data are being collected, due to use of this data for other (publicly), non‐intended uses.

Design/methodology/approach

The approach of this paper is both a meta‐study of the flaws in the technological specifications as well as the social implementation of RFID/biometric passports. Finland is used as a case, but the results extend beyond Finland in most, if not all the topics presented – not necessarily all results to all implementations, but all to some others.

Findings

The current implementations of RFID/biometric passports are lacking in both technical and social implementations and pose clear risks to their use, both due to lax implementation of the technology itself but specifically due to the social changes brought about. These problems cause both erosion of privacy and trust.

Research limitations/implications

Further research into other potential social implications on a national level is required. The authors fear that the cases presented do not necessarily reflect all the potential problems, but just the most evident ones.

Practical implications

The problems with the technological implications can be averted by using the best technological solutions, and thus the best technological solutions should be used instead of the ones proven to be lacking.

Social implications

The social implications should at least be brought forth for public discourse and acknowledged, which currently does not seem to happen.

Originality/value

The paper contributes to the understanding of problems with current RFID/biometric passport implementations as well as inherent social problems that are hard, if not impossible to avoid. The problems belong under the category of critical eGovernment applications, and similar issues are visible in other eGovernment applications.

Details

Journal of Information, Communication and Ethics in Society, vol. 10 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 11 September 2019

Valerie Tang, K.L. Choy, G.T.S. Ho, H.Y. Lam and Y.P. Tsang

The purpose of this paper is to develop an Internet of medical things (IoMT)-based geriatric care management system (I-GCMS), integrating IoMT and case-based reasoning (CBR) in…

1186

Abstract

Purpose

The purpose of this paper is to develop an Internet of medical things (IoMT)-based geriatric care management system (I-GCMS), integrating IoMT and case-based reasoning (CBR) in order to deal with the global concerns of the increasing demand for elderly care service in nursing homes.

Design/methodology/approach

The I-GCMS is developed under the IoMT environment to collect real-time biometric data for total health monitoring. When the health of an elderly deteriorates, the CBR is used to revise and generate the customized care plan, and hence support and improve the geriatric care management (GCM) service in nursing homes.

Findings

A case study is conducted in a nursing home in Taiwan to evaluate the performance of the I-GCMS. Under the IoMT environment, the time saving in executing total health monitoring helps improve the daily operation effectiveness and efficiency. In addition, the proposed system helps leverage a proactive approach in modifying the content of a care plan in response to the change of health status of elderly.

Originality/value

Considering the needs for demanding and accurate healthcare services, this is the first time that IoMT and CBR technologies have been integrated in the field of GCM. This paper illustrates how to seamlessly connect various sensors to capture real-time biometric data to the I-GCMS platform for responsively supporting decision making in the care plan modification processes. With the aid of I-GCMS, the efficiency in executing the daily routine processes and the quality of healthcare services can be improved.

Details

Industrial Management & Data Systems, vol. 119 no. 8
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 7 November 2017

Naveed Riaz, Ayesha Riaz and Sajid Ali Khan

The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the…

Abstract

Purpose

The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the general acceptance of biometrics. The purpose of this paper is to provide an overview of different techniques and processes for securing the biometric templates. Furthermore, the paper explores current research trends in this area.

Design/methodology/approach

In this paper, the authors provide an overview and survey of different features transformation techniques and biometric cryptosystems.

Findings

Feature transformation techniques and biometric cryptosystems provide reliable biometric security at a high level. There are many techniques that provide provable security with practical viable recognition rates. However, there remain several issues and challenges that are being faced during the deployment of these technologies.

Originality/value

This paper provides an overview of currently used techniques for securing biometric templates and also outlines the related issues and challenges.

Details

Sensor Review, vol. 38 no. 1
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 1 March 2002

Austin Jay Harris and David C. Yen

In this paper biometric technology will be defined and then discussed as to how it will help the business world protect its information. Background will be given to show how…

3103

Abstract

In this paper biometric technology will be defined and then discussed as to how it will help the business world protect its information. Background will be given to show how identification and authentication have developed throughout the years and why another form of authorization needs to come to the forefront. There are reasons for higher security and biometric authentication will be shown to be the solution to answer this call. Biometric is a powerful way of deciding who can gain access to our most valuable systems in this volatile world. Factors will be uncovered about what can and will affect an identification system, which will lead us to the feasibility of implementing a biometric system. As one will see, biometric will not be the best choice for everyone. Already, parts of the Department of Defense community rely on this technology in order to maintain the integrity of their own systems. For the business world, it is critical that biometric be grasped now in order to do the same.

Details

Information Management & Computer Security, vol. 10 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 April 2005

Richard A. Riley and Virginia Franke Kleist

This paper aims to assist readers to develop a compelling business case, including quantifiable and non‐quantifiable costs and benefits, for the deployment of biometric

3139

Abstract

Purpose

This paper aims to assist readers to develop a compelling business case, including quantifiable and non‐quantifiable costs and benefits, for the deployment of biometric technologies in information systems to enhance corporate security for access control, identification and verification applications.

Design/methodology/approach

The paper reviews the strengths and weaknesses of leading biometric technologies, while commenting on their practical applicability in real world implementations. In addition, the paper develops a process for ensuring that the best biometric applications are chosen, considering both the technology and related business issues.

Findings

The paper suggests that biometrics must be carefully selected to achieve a good fit to the security problem, giving examples of how a good fit might be evaluated by the user. The one‐time and recurring charges associated with the typical biometric implementation are evaluated, arguing that these costs must be offset by a formal risk evaluation. The paper presents a user's guide for sensible implementation evaluations. Finally, the paper emphasizes that the use of biometrics in systems security implementations is one tool among many, and must thus be viewed as only part of an overall information security management infrastructure.

Originality/value

In order to select biometric technologies, buyers must choose solutions to business problems, solutions that demonstrate that the biometric makes sense from a cost‐benefit and business perspective. This paper, in a step‐by‐step manner, walks readers through the decision‐making process and assists them in making compelling business arguments for biometric applications.

Details

Information Management & Computer Security, vol. 13 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Expert briefing
Publication date: 6 August 2019

Biometric surveillance.

Details

DOI: 10.1108/OXAN-DB245584

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 11 July 2023

Data such as DNA, blood and saliva may also be used, typically in medical and legal settings. While the use of such identification increases, concerns about abuses of the most…

Details

DOI: 10.1108/OXAN-DB280408

ISSN: 2633-304X

Keywords

Geographic
Topical
1 – 10 of over 1000