Search results
1 – 10 of over 1000Gajendra Liyanaarachchi, Giampaolo Viglia and Fidan Kurtaliqi
This study aims to investigate the implications, risks and challenges of data privacy due to the use of immersive technology in the hospitality industry.
Abstract
Purpose
This study aims to investigate the implications, risks and challenges of data privacy due to the use of immersive technology in the hospitality industry.
Design/methodology/approach
The authors adopt a mixed-method approach. Study 1 is a focus group. The authors then provide external and ecological validity with a field experiment conducted with 139 hotel clients at a three-star continental European hotel.
Findings
Collecting biometric data results in unbalanced privacy compared to biographic data, as it diminishes individuals’ control over their data and grants organizations absolute power. This unbalanced privacy directly influences consumers’ willingness to disclose information, affecting their choice of hotels and access to services.
Practical implications
Hotels should redesign their strategies to accommodate heightened privacy risks with biometric data. This can be obtained by introducing systems that foster customer confidence in data usage and facilitate customers’ willingness to disclose biometrics through immersive technology or biographic data.
Originality/value
This study introduces unbalanced privacy as a unique state due to sharing biometric data. The authors propose a novel doctrine, the uncontrollable privacy paradox, which is a shift from the privacy paradox. The uncontrollable privacy paradox addresses the unbalanced privacy envisaged through consumer powerlessness in data management. This research addresses the literature gap on the privacy paradox by offering a broader perspective, including business, industry and mixed reality considerations.
Details
Keywords
V. Zorkadis and P. Donos
Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements…
Abstract
Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements of authentication and identification systems. However, any human physiological or behavioural traits serving as biometric characteristics are personal data protected by privacy protection legislation. To address related issues, this paper examines these classes of biometrics according to data protection principles, purpose, proportionality and security, provided in international legislation. This analysis leads to the desired properties of biometric systems in the form of functional and non‐functional requirements, in order to support developers minimising the risk of being non‐compliant to privacy protection legislation, and to increase user acceptance.
Details
Keywords
Ong Thian Song, Andrew Teoh Beng Jin and Tee Connie
This paper aims to address some of the practical and security problems when using fingerhash to secure biometric key for protecting digital contents.
Abstract
Purpose
This paper aims to address some of the practical and security problems when using fingerhash to secure biometric key for protecting digital contents.
Design/methodology/approach
Study the two existing directions of biometric‐based key generation approach based on the usability, security and accuracy aspects. Discuss the requisite unresolved issues related to this approach.
Findings
The proposed Fingerhashing approach transforms fingerprint into a binary discretized representation called Fingerhash. The Reed Solomon error correction method is used to stabilize the fluctuation in Fingerhash. The stabilized Fingerhash is then XORed with a biometric key. The key can only be released upon the XOR process with another Fingerhash derived from an authentic fingerprint. The proposed method could regenerate an error‐free biometric key based on an authentic fingerprint with up to 99.83 percent success rate, leading to promising result of FAR = 0 percent and FRR = 0.17 percent. Besides, the proposed method can produce biometric keys (1,150 bit length) which are longer in size than the other prevailing biometric key generation schemes to offer higher security protection to safeguard digital contents.
Originality/value
Outlines a novel solution to address the issues of usability, security and accuracy of biometric based key generation scheme.
Details
Keywords
Olli I. Heimo, Antti Hakkala and Kai K. Kimppa
The purpose of this paper is to show that most, if not all RFID/biometric passports have clear technical and social problems in their intended use and that there are clear…
Abstract
Purpose
The purpose of this paper is to show that most, if not all RFID/biometric passports have clear technical and social problems in their intended use and that there are clear problems with the databases into which biometric data are being collected, due to use of this data for other (publicly), non‐intended uses.
Design/methodology/approach
The approach of this paper is both a meta‐study of the flaws in the technological specifications as well as the social implementation of RFID/biometric passports. Finland is used as a case, but the results extend beyond Finland in most, if not all the topics presented – not necessarily all results to all implementations, but all to some others.
Findings
The current implementations of RFID/biometric passports are lacking in both technical and social implementations and pose clear risks to their use, both due to lax implementation of the technology itself but specifically due to the social changes brought about. These problems cause both erosion of privacy and trust.
Research limitations/implications
Further research into other potential social implications on a national level is required. The authors fear that the cases presented do not necessarily reflect all the potential problems, but just the most evident ones.
Practical implications
The problems with the technological implications can be averted by using the best technological solutions, and thus the best technological solutions should be used instead of the ones proven to be lacking.
Social implications
The social implications should at least be brought forth for public discourse and acknowledged, which currently does not seem to happen.
Originality/value
The paper contributes to the understanding of problems with current RFID/biometric passport implementations as well as inherent social problems that are hard, if not impossible to avoid. The problems belong under the category of critical eGovernment applications, and similar issues are visible in other eGovernment applications.
Details
Keywords
Valerie Tang, K.L. Choy, G.T.S. Ho, H.Y. Lam and Y.P. Tsang
The purpose of this paper is to develop an Internet of medical things (IoMT)-based geriatric care management system (I-GCMS), integrating IoMT and case-based reasoning (CBR) in…
Abstract
Purpose
The purpose of this paper is to develop an Internet of medical things (IoMT)-based geriatric care management system (I-GCMS), integrating IoMT and case-based reasoning (CBR) in order to deal with the global concerns of the increasing demand for elderly care service in nursing homes.
Design/methodology/approach
The I-GCMS is developed under the IoMT environment to collect real-time biometric data for total health monitoring. When the health of an elderly deteriorates, the CBR is used to revise and generate the customized care plan, and hence support and improve the geriatric care management (GCM) service in nursing homes.
Findings
A case study is conducted in a nursing home in Taiwan to evaluate the performance of the I-GCMS. Under the IoMT environment, the time saving in executing total health monitoring helps improve the daily operation effectiveness and efficiency. In addition, the proposed system helps leverage a proactive approach in modifying the content of a care plan in response to the change of health status of elderly.
Originality/value
Considering the needs for demanding and accurate healthcare services, this is the first time that IoMT and CBR technologies have been integrated in the field of GCM. This paper illustrates how to seamlessly connect various sensors to capture real-time biometric data to the I-GCMS platform for responsively supporting decision making in the care plan modification processes. With the aid of I-GCMS, the efficiency in executing the daily routine processes and the quality of healthcare services can be improved.
Details
Keywords
Naveed Riaz, Ayesha Riaz and Sajid Ali Khan
The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the…
Abstract
Purpose
The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the general acceptance of biometrics. The purpose of this paper is to provide an overview of different techniques and processes for securing the biometric templates. Furthermore, the paper explores current research trends in this area.
Design/methodology/approach
In this paper, the authors provide an overview and survey of different features transformation techniques and biometric cryptosystems.
Findings
Feature transformation techniques and biometric cryptosystems provide reliable biometric security at a high level. There are many techniques that provide provable security with practical viable recognition rates. However, there remain several issues and challenges that are being faced during the deployment of these technologies.
Originality/value
This paper provides an overview of currently used techniques for securing biometric templates and also outlines the related issues and challenges.
Details
Keywords
Austin Jay Harris and David C. Yen
In this paper biometric technology will be defined and then discussed as to how it will help the business world protect its information. Background will be given to show how…
Abstract
In this paper biometric technology will be defined and then discussed as to how it will help the business world protect its information. Background will be given to show how identification and authentication have developed throughout the years and why another form of authorization needs to come to the forefront. There are reasons for higher security and biometric authentication will be shown to be the solution to answer this call. Biometric is a powerful way of deciding who can gain access to our most valuable systems in this volatile world. Factors will be uncovered about what can and will affect an identification system, which will lead us to the feasibility of implementing a biometric system. As one will see, biometric will not be the best choice for everyone. Already, parts of the Department of Defense community rely on this technology in order to maintain the integrity of their own systems. For the business world, it is critical that biometric be grasped now in order to do the same.
Details
Keywords
Richard A. Riley and Virginia Franke Kleist
This paper aims to assist readers to develop a compelling business case, including quantifiable and non‐quantifiable costs and benefits, for the deployment of biometric…
Abstract
Purpose
This paper aims to assist readers to develop a compelling business case, including quantifiable and non‐quantifiable costs and benefits, for the deployment of biometric technologies in information systems to enhance corporate security for access control, identification and verification applications.
Design/methodology/approach
The paper reviews the strengths and weaknesses of leading biometric technologies, while commenting on their practical applicability in real world implementations. In addition, the paper develops a process for ensuring that the best biometric applications are chosen, considering both the technology and related business issues.
Findings
The paper suggests that biometrics must be carefully selected to achieve a good fit to the security problem, giving examples of how a good fit might be evaluated by the user. The one‐time and recurring charges associated with the typical biometric implementation are evaluated, arguing that these costs must be offset by a formal risk evaluation. The paper presents a user's guide for sensible implementation evaluations. Finally, the paper emphasizes that the use of biometrics in systems security implementations is one tool among many, and must thus be viewed as only part of an overall information security management infrastructure.
Originality/value
In order to select biometric technologies, buyers must choose solutions to business problems, solutions that demonstrate that the biometric makes sense from a cost‐benefit and business perspective. This paper, in a step‐by‐step manner, walks readers through the decision‐making process and assists them in making compelling business arguments for biometric applications.
Details
Keywords
Biometric surveillance.
Details
DOI: 10.1108/OXAN-DB245584
ISSN: 2633-304X
Keywords
Geographic
Topical
Data such as DNA, blood and saliva may also be used, typically in medical and legal settings. While the use of such identification increases, concerns about abuses of the most…