Search results

11 – 20 of 986
Book part
Publication date: 5 August 2015

Tony Kazda and Bob Caves

Abstract

Details

Airport Design and Operation
Type: Book
ISBN: 978-1-78441-869-4

Book part
Publication date: 13 January 2010

Tony Kazda and Bob Caves

Abstract

Details

Airport Design and Operation
Type: Book
ISBN: 978-0-08-054643-8

Article
Publication date: 5 October 2015

Jonathan Clough

The purpose of this paper is to consider potential criminal law responses to the global challenge of “identity crime”. In particular, it focuses on a specific offence of “identity…

2563

Abstract

Purpose

The purpose of this paper is to consider potential criminal law responses to the global challenge of “identity crime”. In particular, it focuses on a specific offence of “identity theft”. It begins with a discussion of the meaning of “identity” in the context of modern transactions, before defining “identity crime” and related terms. Legal responses are then considered before turning to the importance of harmonisation. The transnational nature of modern identity crimes makes it essential that law enforcement agencies not only have suitable offences at their disposal but also the frameworks to facilitate international cooperation.

Design/methodology/approach

Given the increasingly transnational and organized nature of modern identity crime, this paper adopts a comparative approach. It draws upon provisions from Australia, Canada, the UK and the USA. It also looks at responses to identity crime at the regional and international level.

Findings

Although there is currently no international instrument which specifically and comprehensively addresses identity theft, it is argued that there is an urgent need for further international discussion as to the desirability and form of identity theft provisions. While international agreement may not be reached, such discussions are important in assisting countries to develop appropriate legal frameworks and capacity to address the modern fraud environment.

Originality/value

It is hoped that this paper will contribute to, and facilitate, important ongoing discussions as to the most effective ways in which to tackle identity crime at the national and international levels.

Details

Journal of Financial Crime, vol. 22 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 1 April 1998

Marius Dannenberg and Dorothée Kellner

This article presents opportunities for the effective utilization of the Internet with regard to the banking industry. It is shown that the appropriate application of today’s…

3013

Abstract

This article presents opportunities for the effective utilization of the Internet with regard to the banking industry. It is shown that the appropriate application of today’s cutting‐edge technology can lead to a momentous competitive advantage for banks. This is illustrated by a scenario focussing on the potentials of “Advising via Internet”.

Details

International Journal of Bank Marketing, vol. 16 no. 2
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 1 February 2004

V. Zorkadis and P. Donos

Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements…

3057

Abstract

Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements of authentication and identification systems. However, any human physiological or behavioural traits serving as biometric characteristics are personal data protected by privacy protection legislation. To address related issues, this paper examines these classes of biometrics according to data protection principles, purpose, proportionality and security, provided in international legislation. This analysis leads to the desired properties of biometric systems in the form of functional and non‐functional requirements, in order to support developers minimising the risk of being non‐compliant to privacy protection legislation, and to increase user acceptance.

Details

Information Management & Computer Security, vol. 12 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 9 March 2015

Eunhwa Jung and Kyungho Hong

This study aims at a biometric verification based on facial profile images for mobile security. The modern technology of mobile Internet devices and smart phones such as the…

Abstract

Purpose

This study aims at a biometric verification based on facial profile images for mobile security. The modern technology of mobile Internet devices and smart phones such as the iPhone series and Galaxy phone series has revealed the development of information technology of input and output devices as high-definition multimedia interface. The development of information technology requires novel biometric verification for personal identification or authentication in mobile security, especially in Internet banking and mobile Internet access. Our study deals with a biometric verification based on facial profile images for mobile security.

Design/methodology/approach

The product of cellphones with built-in cameras gives us the opportunity of the biometric verification to recognize faces, fingerprints and biological features without any other special devices. Our study focuses on recognizing the left and right facial profile images as well as the front facial images as a biometric verification of personal identification and authentication for mobile security, which can be captured by smart phone devices such as iPhone 4 and Galaxy S2.

Findings

As the recognition technique of the facial profile images for a biometric verification in mobile security is a very simple, relatively easy to use and inexpensive, it can be easily applied to personal mobile phone identification and authentication instead of passwords, keys or other methods. The biometric system can also be used as one of multiple verification techniques for personal recognition in a multimodal biometric system. Our experimental data are taken from persons of all ages, ranging from children to senior citizens.

Originality/value

As the recognition technique of the facial profile images for a biometric verification in mobile security is very simple, relatively easy to use and inexpensive, it can be easily applied to personal mobile phone identification and authentication instead of passwords, keys or other methods. The biometric system can also be used as one of multiple verification techniques for personal recognition in a multimodal biometric system. Our experimental data are taken from persons of all ages, ranging from children to senior citizens.

Details

Journal of Systems and Information Technology, vol. 17 no. 1
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 1 December 2001

P.K. Janbandhu and M.Y. Siyal

Personal identification numbers, passwords, smart cards and digital certificates are some of the means employed for user authentication in various electronic commerce…

1971

Abstract

Personal identification numbers, passwords, smart cards and digital certificates are some of the means employed for user authentication in various electronic commerce applications. However, these means do not really identify a person, but only knowledge of some data or belonging of some determined object. This paper introduces the notion of biometric signature – a new approach to integrate biometrics with public key infrastructure, using biometric based digital signature generation which is secure, efficacious, fast, convenient, non‐invasive and correctly identifies the maker of a transaction. It also suggests two schemes for biometric signature using two existing and widely used digital signature algorithms, RSA and DSA, and discusses the problems associated with them individually. Speed of both schemes (based on iris recognition) is measured and compared with the help of JAVA implementation for both approaches.

Details

Information Management & Computer Security, vol. 9 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 2 October 2009

Leonard A. Jackson

The purpose of the paper is to provoke thought and perhaps response to a new form of identity assurance and security in the lodging industry. For a fact, biometric technology is…

2767

Abstract

Purpose

The purpose of the paper is to provoke thought and perhaps response to a new form of identity assurance and security in the lodging industry. For a fact, biometric technology is quickly becoming a principal method of identification in today's fast‐paced networked and security‐conscious society. Increasingly, more and more organizations are adopting this form of technology to enhance security, improve business processes and increase productivity. The paper highlights the fundamentals of biometric technology, and its application in the lodging industry. The paper also addresses factors that should be considered to ensure successful deployment in the lodging industry.

Design/methodology/approach

This paper reviews the fundamentals of biometric technology at the discursive level and provides insights on its practical applications in the lodging industry.

Findings

Biometric technology offers the lodging industry new possibilities in the areas of identity assurance and authentication. These relatively new technologies hold promise for practical implementation for both employee‐ and guest‐related processes. The major advantage to using this form of technology over other forms is that users do not have to carry anything around such as magnetic keycards, which can be lost, compromised or stolen. However, there are several legal, social and cost‐related challenges that must be overcome before the technology can be universally accepted and implemented in the industry.

Practical implications

The paper suggests that the use of biometric technology will continue to increase, and prudent hospitality executives should pay close attention to this trend so that they can adopt the technology into their operations and enjoy the benefits it offers. The paper provides insights about the technology and offers implementation guidelines for lodging technology officers. In addition, it is hoped that this paper will generate future research in the areas of adoption strategies and appropriate types of biometric technologies that are appropriate for lodging operations.

Originality/value

Both practitioners and educators will benefit from the information presented in this paper, as it provides insights about a relatively new form of technology. Further, the paper reviews the fundamentals of biometric technologies at the discursive level with the intent of generating future research on their application in the lodging industry.

Details

International Journal of Contemporary Hospitality Management, vol. 21 no. 7
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 4 March 2014

Maren Behrensen

– The paper is a conceptual investigation of the metaphysics of personal identity and the ethics of biometric passports. The paper aims to discuss these issues.

Abstract

Purpose

The paper is a conceptual investigation of the metaphysics of personal identity and the ethics of biometric passports. The paper aims to discuss these issues.

Design/methodology/approach

Philosophical argument, discussing both the metaphysical and the social ethics/computer ethics literature on personal identity and biometry.

Findings

The author argues for three central claims in this paper: passport are not simply representations of personal identity, they help constitute personal identity. Personal identity is not a metaphysical fact, but a set of practices, among them identity management practices (e.g. population registries) employed by governments. The use of biometry as part of these identity management practices is not an ethical problem as such, nor is it something fundamentally new and different compared to older ways of establishing personal identity. It is worrisome, however, since in the current political climate, it is systematically used to deny persons access to specific territories, rights, and benefits.

Originality/value

The paper ties together strands of philosophical inquiry that do not usually converse with one another, namely the metaphysics of personal identity, and the topic of identity in social philosophy and computer ethics.

Details

Journal of Information, Communication and Ethics in Society, vol. 12 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 December 1994

Simon G. Davies

The evolution of information technology is likely to result in intimateinterdependence between humans and technology. This fusion has beencharacterized in popular science fiction…

1898

Abstract

The evolution of information technology is likely to result in intimate interdependence between humans and technology. This fusion has been characterized in popular science fiction as chip implantation. It is, however, more likely to take the form of biometric identification using such technologies as fingerprints, hand geometry and retina scanning. Some applications of biometric identification technology are now cost‐effective, reliable and highly accurate. As a result, biometric systems are being developed in many countries for such purposes as social security entitlement, payments, immigration control and election management. Whether or not biometry delivers on its promise of high‐quality identification, it will imperil individual autonomy. Widespread application of the technologies would conflict with contemporary values, and result in a class of outcasts.

Details

Information Technology & People, vol. 7 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

11 – 20 of 986