Search results

21 – 30 of 986
Article
Publication date: 10 October 2008

Sitalakshmi Venkatraman and Indika Delpachitra

To identify and discuss the issues and success factors surrounding biometrics, especially in the context of user authentication and controls in the banking sector, using a case…

6656

Abstract

Purpose

To identify and discuss the issues and success factors surrounding biometrics, especially in the context of user authentication and controls in the banking sector, using a case study.

Design/methodology/approach

The literature survey and analysis of the security models of the present information systems and biometric technologies in the banking sector provide the theoretical and practical background for this work. The impact of adopting biometric solutions in banks was analysed by considering the various issues and challenges from technological, managerial, social and ethical angles. These explorations led to identifying the success factors that serve as possible guidelines for a viable implementation of a biometric‐enabled authentication system in banking organisations, in particular for a major bank in New Zealand.

Findings

As the level of security breaches and transaction frauds increase day by day, the need for highly secure identification and personal verification information systems is becoming extremely important especially in the banking and finance sector. Biometric technology appeals to many banking organisations as a near perfect solution to such security threats. Though biometric technology has gained traction in areas like healthcare and criminology, its application in banking security is still in its infancy. Due to the close association of biometrics to human, physical and behavioural aspects, such technologies pose a multitude of social, ethical and managerial challenges. The key success factors proposed through the case study served as a guideline for a biometric‐enabled security project called Bio‐Sec, which is envisaged in a large banking organisation in New Zealand. This pilot study reveals that more than coping with the technology issues of gelling biometrics into the existing information systems, formulating a viable security plan that addresses user privacy fears, human tolerance levels, organisational change and legal issues is of prime importance.

Originality/value

Though biometric systems are successfully adopted in areas such as immigration control and criminology, there is a paucity of their implementation and research pertaining to banking environments. Not all banks venture into biometric solutions to enhance their security systems due to their socio‐technological issues. This paper fulfils the need for a guideline to identify the various issues and success factors for a viable biometric implementation in a bank's access control system. This work is only a starting point for academics to conduct more research in the application of biometrics in the various facets of banking businesses.

Details

Information Management & Computer Security, vol. 16 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Book part
Publication date: 19 September 2022

Christian Fuchs

This chapters asks: What do the Artificial Intelligence (AI) strategies of the EU, the United States under Donald Trump and China look like? It conducts a critical policy…

Abstract

This chapters asks: What do the Artificial Intelligence (AI) strategies of the EU, the United States under Donald Trump and China look like? It conducts a critical policy discourse analysis from a Radical Humanist Perspective. It analyses what kind of ideologies we can find in the AI strategies of the European Union, the United States under Donald Trump and China.

The analysis shows that AI and robotics are situated in a digital technology race that is indicative of an international political-economic race for the accumulation of political-economic power.

Article
Publication date: 8 October 2010

Juline E. Mills, Matthew Meyers and Sookeun Byun

The purpose of this paper is to review viable biometric technologies and examine their applicability in the hospitality and tourism businesses.

1637

Abstract

Purpose

The purpose of this paper is to review viable biometric technologies and examine their applicability in the hospitality and tourism businesses.

Design/methodology/approach

First, the different types of biometrics in the market with their advantages and disadvantages are reviewed, followed by a discussion of current applications within the hospitality and tourism sector.

Findings

Potential business impacts of biometrics are identified such as increased consumer convenience, operational efficiency, and security. Meanwhile, despite its great benefits, consumers' privacy concerns that are raised during biometric data collection and management processes may keep the technology from realizing its full potential.

Research limitations/implications

The paper only presents a glimpse of what may be done with the technology, as the potential extent of its usage is bound only by management's imagination while the possibilities that the technology brings to industry may be numerous.

Practical implications

Hospitality and tourism companies must have clear goals and logical approaches for usage and implementation of biometric technologies. They also need to be acutely aware of any privacy, guest perceptions, attitude towards, and trust factors that may surround the usage of biometric technologies. Moreover, corporate responsibility and ethical usage of the information obtained from biometrics may influence guest willingness to use the technology.

Originality/value

The paper has value in that there has been a lack of research on the impact of biometrics on the service industry, as well as user concerns towards the technology, rather than system development.

Details

Journal of Hospitality and Tourism Technology, vol. 1 no. 3
Type: Research Article
ISSN: 1757-9880

Keywords

Article
Publication date: 6 December 2017

Fabio Bacchini and Ludovica Lorusso

This study aims to explore the ethical and social issues of tattoo recognition technology (TRT) and tattoo similarity detection technology (TSDT), which are expected to be…

Abstract

Purpose

This study aims to explore the ethical and social issues of tattoo recognition technology (TRT) and tattoo similarity detection technology (TSDT), which are expected to be increasingly used by state and local police departments and law enforcement agencies.

Design/methodology/approach

The paper investigates the new ethical concerns raised by tattoo-based biometrics on a comparative basis with face-recognition biometrics.

Findings

TRT raises much more ethically sensitive issues than face recognition, because tattoos are meaningful biometric traits, and tattoo identification is tantamount to the identification of many more personal features that normally would have remained invisible. TSDT’s assumption that classifying people in virtue of their visible features is useful to foretell their attitudes and behaviours is dangerously similar to racist thought.

Practical implications

The findings hope to promote an active debate on the ethical and social aspects of tattoo-based biometrics before it is intensely implemented by law enforcement agencies.

Social implications

Tattooed individuals – inasmuch as they are more controlled and monitored – are negatively discriminated in comparison to un-tattooed individuals. As tattooing is not uniformly distributed among population, many demographic groups like African–Americans will be overrepresented in tattoos databases used by TRT and TSDT, thus being affected by disproportionately higher risk to be found as a match for a given suspect.

Originality/value

TRT and TSDT represent one of the new frontiers of biometrics. The ethical and social issues raised by TRT and TSDT are currently unexplored.

Details

Journal of Information, Communication and Ethics in Society, vol. 16 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 February 2000

Philip Bennett

Considers the use of biometric systems, and in particular audio‐visual recognition systems, and their applicability to access control, authentication and security applications…

908

Abstract

Considers the use of biometric systems, and in particular audio‐visual recognition systems, and their applicability to access control, authentication and security applications. The potential application of commercial multimodal biometric systems is considered along with issues of performance, deployment and standardization.

Details

Work Study, vol. 49 no. 1
Type: Research Article
ISSN: 0043-8022

Keywords

Article
Publication date: 19 August 2021

Siti Nurdiyana Atikah Sulaiman and Mohammad Nabil Almunawar

The purpose of this paper is to investigate factors that influence customers’ adoption of biometric-based point-of-sale in Brunei.

Abstract

Purpose

The purpose of this paper is to investigate factors that influence customers’ adoption of biometric-based point-of-sale in Brunei.

Design/methodology/approach

This paper extends technology acceptance model constructs with trust and some other variables as the framework to investigate their influence on the attitude toward the usage of a biometric point-of-sale terminal for payments in Brunei. Nine variables may influence user’s perception toward usage. The nine variables are needed, perceived ease of use, perceived usefulness, experience, innovativeness, privacy, security, trust and attitude toward usage. Multiple regression analysis was conducted to test hypotheses related to these nine variables.

Findings

It is found that the innovativeness of an individual and similar experience corresponds toward trust, which is positively related to attitude toward usage. Perceived usefulness and trust have significantly influenced the intention of individuals to use biometrics as an authentication method for payment.

Research limitations/implications

The nature of this research is to gather the public’s opinion and perception as much as it is deemed possible to get a bigger and clearer picture of the study. As the target respondence is citizens and residents of Brunei without any specification or exclusion, a large response would be needed to have a more reliable and accurate result. However, only 205 respondents can be gathered in this study. Had there been a longer time frame, it would be best to gather a lot more responses.

Originality/value

This paper explores the adoption of biometric authentication in large-scale point-of-terminals. It identifies factors that influence adoption. The results of this study could assist future researchers in which direction to take to further explore biometric as an authentication method for payment. In addition to this, it could also provide banks and financial technology in Brunei a clearer picture of the Brunei market and Bruneians perspective on the biometric system.

Details

Journal of Science and Technology Policy Management, vol. 13 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 24 April 2007

Paul Beynon‐Davies

The purpose of this paper is to unpack some of the socio‐technical relationships inherent in contemporary notions of personal identity management. For this purpose it considers…

3434

Abstract

Purpose

The purpose of this paper is to unpack some of the socio‐technical relationships inherent in contemporary notions of personal identity management. For this purpose it considers the issue of personal identity management in terms of a framework, which distinguishes between the related processes of authentication, identification and enrolment.

Design/methodology/approach

The conceptual model described in this paper is reflected against an important recent case in which issues of personal identity management are being enacted: the introduction of a UK national identity card. Both this issue and case are particularly examined in the light of the growth of e‐Government in the UK.

Findings

The paper relates issues associated with the technical infrastructure of e‐Government with some of the costs and benefits associated with the social infrastructure of e‐Government. This device offers a useful framing for a whole range of issues surrounding individual‐organisation interaction in the Information Society that rely on elements of personal identity management.

Research limitations/implications

In the paper the issue of personal identity management is under‐represented in the Information Systems and Information Management literature. The conceptual approach adopted in the paper is used to identify areas of further research in terms of issues relevant to the technical infrastructure of e‐Government.

Practical implications

The paper identifies a number of personal identity management issues embedded in the technical infrastructure required for effective e‐Government.

Originality/value

This paper raises the importance of personal identity management to the success of the e‐Government agenda. It also links classic information management issues to the issue of personal identity management and identifies the challenges for e‐Government within this.

Details

Journal of Enterprise Information Management, vol. 20 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 8 January 2020

Silvia Masiero and Amit Prakash

While the potential of information and communication technology (ICT) for poverty reduction is widely recognised, limited knowledge exists on its use in the social protection…

Abstract

Purpose

While the potential of information and communication technology (ICT) for poverty reduction is widely recognised, limited knowledge exists on its use in the social protection schemes devised for the world’s poor. Drawing on the institutionalist vision of IS development and organisational change put forward by Avgerou (2000), the authors propose that computerisation of these schemes entails two processes, namely, the progressive affirmation of ICT innovation and a shift in the programmes' organisational structure, which moves from a subsidy-based model to one grounded on direct cash transfers. The purpose of this paper is to illustrate how the role of ICT in anti-poverty schemes results from concomitance of such processes.

Design/methodology/approach

The paper draws on a study of the public distribution system (PDS), the main food security scheme in India, as it is being computerised in the state of Karnataka. Following an interpretive case study methodology, it investigates the ongoing computerisation of the Karnataka PDS through a combination of back-end and front-end technologies, based on biometric recognition of the programme’s users.

Findings

The data reveal that transformation of the PDS results from the simultaneous processes of institutionalisation of ICT innovation and deinstitutionalisation of the extant state-led subsidy scheme, in favour of a leaner social protection system centred on cash transfers to beneficiaries. This illustrates the point that ICT innovation is intertwined with the decline of an extant social welfare structure and the rise of a new one, based on the direct transfer of benefits.

Originality/value

The paper offers a new theoretical perspective to illuminate the computerisation of anti-poverty programmes, a phenomenon that affects the entitlements of millions of poor people on a global scale. In parallel, it draws practical implications for countries embarking on the digitalisation of their social protection schemes.

Details

Information Technology & People, vol. 33 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 25 February 2020

Rafiu King Raji, Michael Adjeisah, Xuhong Miao and Ailan Wan

The purpose of this paper is to introduce a novel respiration pattern-based biometric prediction system (BPS) by using artificial neural network (ANN).

Abstract

Purpose

The purpose of this paper is to introduce a novel respiration pattern-based biometric prediction system (BPS) by using artificial neural network (ANN).

Design/methodology/approach

Respiration patterns were obtained using a knitted piezoresistive smart chest band. The ANN model was implemented by using four hidden layers to help achieve the best complexity to produce an adequate fit for the data. Not only did this study give a detailed distribution of an ANN model construction including the scheme of parameters and network layers, ablation of the architecture and the derivation of back-propagation during the iterations but also engaged a step-based decay to systematically drop the learning rate after specific epochs during training to minimize the loss and increase the model’s accuracy as well as to limit the risk of overfitting.

Findings

Findings establish the feasibility of using respiratory patterns for biometric identification. Experimental results show that, with a learning rate drop factor = 0.5, the network is able to continue to learn past epoch 40 until stagnation occurs which yielded a classification accuracy of 98 per cent. Out of 51,338 test set, the model achieved 51,557 correctly classified instances and 169 misclassified instances.

Practical implications

The findings provide an impetus for possible studies into the application of chest breathing sensors for human machine interfaces in the area of entertainment.

Originality/value

This is the first time respiratory patterns have been applied in biometric prediction system design.

Article
Publication date: 1 June 2004

Anna Kochan

One day seminar held in London by the IEE and the Association for Biometrics presented recent progress in the development and application of biometrics. Speakers told the audience…

1469

Abstract

One day seminar held in London by the IEE and the Association for Biometrics presented recent progress in the development and application of biometrics. Speakers told the audience how the terrorist attacks in the USA in September 2001 have created new opportunities for biometrics due to new initiatives to introduce biometric‐enabled passports. Papers presented at the seminar covered standards development and biometric implementation guidance. New organisations for promoting the application of biometrics both in the UK and Europe were outlined.

Details

Sensor Review, vol. 24 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

21 – 30 of 986