Search results
1 – 10 of over 1000From the earliest time, guards have been used to control access to certain areas. Guards are people and, however conscientious, they are forgetful, bribable, coercible or just…
Abstract
From the earliest time, guards have been used to control access to certain areas. Guards are people and, however conscientious, they are forgetful, bribable, coercible or just plain inefficient. The introduction of the key and lock provided the first automated assistance to control access and, despite the ingenuity of locksmiths, keys can be stolen, duplicated or lost and locks can be picked.
This paper aims to review current developments that have been initiated by the advent of the new technologies.
Abstract
Purpose
This paper aims to review current developments that have been initiated by the advent of the new technologies.
Design/methodology/approach
A general review and survey of selected research and development topics.
Findings
Illustrates the multi‐ and trans‐disciplinary nature of cybernetics, systems and management sciences.
Practical implications
The choice of reviews provides an awareness of the current trends in these areas of endeavour.
Originality/value
The reviews are selected from a global database and give a studied assessment of present‐day research and development initiatives.
Details
Keywords
Van Chien Duong, Emma Regolini, Billy Sung, Min Teah and Siobhan Hatton-Jones
The purpose of this study is to understand whether increasing the number of sensory modalities being stimulated impacts consumers’ in-store emotional responses (i.e. in-store…
Abstract
Purpose
The purpose of this study is to understand whether increasing the number of sensory modalities being stimulated impacts consumers’ in-store emotional responses (i.e. in-store enjoyment and arousal), store image perception and brand attitude.
Design/methodology/approach
The study used a between-subjects experimental design to examine 551 individuals’ perceptions and emotional responses in four sensory modalities stimulation conditions (i.e. visual, visual-smell, visual-taste and visual-smell-taste). The study used virtual reality visualisation technology and psychophysiological measurements (i.e. skin conductance and facial expression) to improve the ecological validity of the study design.
Findings
The current study supports the importance of multisensory in-store atmospheric design. When increasing the number of sensory modalities being stimulated, more positive emotional responses and perceptions were recorded. Additionally, increasing the number of sensory modalities also increased perceived intensity, and perceived intensity mediate the relationship between the stimulation of multisensory modalities and perception.
Research limitations/implications
The study is without its limitations. For instance, the scope of the study was limited by the exclusion of auditory and haptic stimulation, the lack of manipulation of sensory intensity and the absence of sensory congruency examination.
Practical implications
This study contributes to retail and marketing practices by providing evidence to assist the retail design of in-store sensory cues and customer experiences.
Originality/value
This research uses both self-reported measures and biometric measures to test the sole effect of sensory modalities being stimulated on consumer evaluation. To the best of the authors’ knowledge, this study is the first to examine store atmospheric designs with psychophysiological methodologies and an immersive, two-story-high, 180-degree-visual-field and dome-shaped display.
Details
Keywords
Louis Yen, Alyssa B. Schultz, Cindy Schaefer, Susan Bloomberg and Dee W. Edington
The purpose of this paper is to document the total return on investment (ROI) of a comprehensive worksite health program from 1999 to 2007 through two different analytic…
Abstract
Purpose
The purpose of this paper is to document the total return on investment (ROI) of a comprehensive worksite health program from 1999 to 2007 through two different analytic approaches.
Design/methodology/approach
Two analytical techniques were used: time period analysis and historical trend analysis of the entire study period. The time‐period analysis of ROI was performed among employees in four time periods: 1999‐2001; 2002‐2003, 2004‐2005; and 2006‐2007. The historical trend analysis on participation‐related savings was used to compare the financial trend differences between participants and non‐participants as well as the three different participation levels of continuous, sporadic, and non‐participants since the year 2000 among 2,753 employees who worked for and were covered by the company‐sponsored health plans for the entire study period.
Findings
The ROI from health care costs and time away from work ranged from 1.29 to 2.07 for the four time periods with a cumulative ROI of 1.66 over nine years. The historical trend analysis of 2,753 long‐term employees resulted in a 1.57 ROI for 2,036 program participants (t‐test: p<0.005) with statistically significant annual saving of $180 per participant per year.
Originality/value
The returns on comprehensive worksite health program were greater than the program investment as documented by both time‐period and historical trend analyses. Organizations seeking ways to manage the increases in health care and absenteeism costs of employees will be encouraged to see that positive returns can be generated by investments in employee health and wellness and steady or consistent participation is one key to generating success.
Details
Keywords
N.L. Clarke, S.M. Furnell, B.M. Lines and P.L. Reynolds
The ability of third generation telephones to store sensitive information, such as financial records, digital certificates and company records, makes them desirable targets for…
Abstract
The ability of third generation telephones to store sensitive information, such as financial records, digital certificates and company records, makes them desirable targets for impostors. This paper details the feasibility of a non‐intrusive subscriber authentication technique – the use of keystroke dynamics. This feasibility study comprises a number of investigations into the ability of neural networks to authenticate users successfully based on their interactions with a mobile phone keypad. The initial results are promising with network classification performing well, achieving a 9.8 per cent false rejection rate and an 11.0 per cent false acceptance rate.
Details
Keywords
V. Zorkadis and P. Donos
Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements…
Abstract
Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements of authentication and identification systems. However, any human physiological or behavioural traits serving as biometric characteristics are personal data protected by privacy protection legislation. To address related issues, this paper examines these classes of biometrics according to data protection principles, purpose, proportionality and security, provided in international legislation. This analysis leads to the desired properties of biometric systems in the form of functional and non‐functional requirements, in order to support developers minimising the risk of being non‐compliant to privacy protection legislation, and to increase user acceptance.
Details
Keywords
Richard A. Riley and Virginia Franke Kleist
This paper aims to assist readers to develop a compelling business case, including quantifiable and non‐quantifiable costs and benefits, for the deployment of biometric…
Abstract
Purpose
This paper aims to assist readers to develop a compelling business case, including quantifiable and non‐quantifiable costs and benefits, for the deployment of biometric technologies in information systems to enhance corporate security for access control, identification and verification applications.
Design/methodology/approach
The paper reviews the strengths and weaknesses of leading biometric technologies, while commenting on their practical applicability in real world implementations. In addition, the paper develops a process for ensuring that the best biometric applications are chosen, considering both the technology and related business issues.
Findings
The paper suggests that biometrics must be carefully selected to achieve a good fit to the security problem, giving examples of how a good fit might be evaluated by the user. The one‐time and recurring charges associated with the typical biometric implementation are evaluated, arguing that these costs must be offset by a formal risk evaluation. The paper presents a user's guide for sensible implementation evaluations. Finally, the paper emphasizes that the use of biometrics in systems security implementations is one tool among many, and must thus be viewed as only part of an overall information security management infrastructure.
Originality/value
In order to select biometric technologies, buyers must choose solutions to business problems, solutions that demonstrate that the biometric makes sense from a cost‐benefit and business perspective. This paper, in a step‐by‐step manner, walks readers through the decision‐making process and assists them in making compelling business arguments for biometric applications.
Details
Keywords
Olli I. Heimo, Antti Hakkala and Kai K. Kimppa
The purpose of this paper is to show that most, if not all RFID/biometric passports have clear technical and social problems in their intended use and that there are clear…
Abstract
Purpose
The purpose of this paper is to show that most, if not all RFID/biometric passports have clear technical and social problems in their intended use and that there are clear problems with the databases into which biometric data are being collected, due to use of this data for other (publicly), non‐intended uses.
Design/methodology/approach
The approach of this paper is both a meta‐study of the flaws in the technological specifications as well as the social implementation of RFID/biometric passports. Finland is used as a case, but the results extend beyond Finland in most, if not all the topics presented – not necessarily all results to all implementations, but all to some others.
Findings
The current implementations of RFID/biometric passports are lacking in both technical and social implementations and pose clear risks to their use, both due to lax implementation of the technology itself but specifically due to the social changes brought about. These problems cause both erosion of privacy and trust.
Research limitations/implications
Further research into other potential social implications on a national level is required. The authors fear that the cases presented do not necessarily reflect all the potential problems, but just the most evident ones.
Practical implications
The problems with the technological implications can be averted by using the best technological solutions, and thus the best technological solutions should be used instead of the ones proven to be lacking.
Social implications
The social implications should at least be brought forth for public discourse and acknowledged, which currently does not seem to happen.
Originality/value
The paper contributes to the understanding of problems with current RFID/biometric passport implementations as well as inherent social problems that are hard, if not impossible to avoid. The problems belong under the category of critical eGovernment applications, and similar issues are visible in other eGovernment applications.
Details
Keywords
The purpose of this paper is to provide a practitioner perspective on the growing influence and impact of biometric technology on the hospitality industry.
Abstract
Purpose
The purpose of this paper is to provide a practitioner perspective on the growing influence and impact of biometric technology on the hospitality industry.
Design/methodology/approach
The paper outlines the different types of biometric authentication and its uses in hospitality operations and explores current and future applications in providing secure and safe guest services.
Findings
The paper cites examples of technological innovation and discusses the implications of biometric authentication for hospitality operations, organization, and management.
Practical implications
The paper aligns technological advances with the experiences of a senior professional's personal experience in operating and managing restaurants.
Originality/value
The paper offers a strategic viewpoint on the potential range of applications for biometric verification and explores some of the complexities arising from its adoption and application to hospitality operations.
Details
Keywords
Ziaul Haque Choudhury and M. Munir Ahamed Rabbani
Nowadays, the use of forged e-passport is increasing, which is threatening national security. It is important to improve the national security against international crime or…
Abstract
Purpose
Nowadays, the use of forged e-passport is increasing, which is threatening national security. It is important to improve the national security against international crime or terrorism. There is a weak verification process caused by lack of identification processes such as a physical check, biometric check and electronic check. The e-passport can prevent the passport cloning or forging resulting from the illegal immigration. The paper aims to discuss these issues.
Design/methodology/approach
This paper focuses on face recognition to improve the biometric authentication for an e-passport, and it also introduces facial permanent mark detection from the makeup or cosmetic-applied faces, twins and similar faces. An algorithm is proposed to detect the cosmetic-applied facial permanent marks such as mole, freckle, birthmark and pockmark. Active Shape Model into Active Appearance Model using Principal Component Analysis is applied to detect the facial landmarks. Facial permanent marks are detected by applying the Canny edge detector and Gradient Field Histogram of Oriented Gradient.
Findings
This paper demonstrated an algorithm and proposed facial marks detection from cosmetic or makeup-applied faces for a secure biometric passport in the field of personal identification for national security. It also presented to detect and identify identical twins and similar faces. This paper presented facial marks detection from the cosmetic-applied face, which can be mixed with traditional methods. However, the use of the proposed technique faced some challenges due to the use of cosmetic. The combinations of the algorithm for facial mark recognition matching with classical methods were able to attain lower errors in this proposed experiment.
Originality/value
The proposed method will enhance the national security and it will improve the biometric authentication for the e-passport. The proposed algorithm is capable of identifying facial marks from cosmetic-applied faces accurately, with less false positives. The proposed technique shows the best results.
Details