Search results

1 – 10 of over 1000
Article
Publication date: 1 March 1992

Chris Jennings

From the earliest time, guards have been used to control access to certain areas. Guards are people and, however conscientious, they are forgetful, bribable, coercible or just…

Abstract

From the earliest time, guards have been used to control access to certain areas. Guards are people and, however conscientious, they are forgetful, bribable, coercible or just plain inefficient. The introduction of the key and lock provided the first automated assistance to control access and, despite the ingenuity of locksmiths, keys can be stolen, duplicated or lost and locks can be picked.

Details

Sensor Review, vol. 12 no. 3
Type: Research Article
ISSN: 0260-2288

Article
Publication date: 17 September 2008

B.H. Rudall and C.J.H. Mann

This paper aims to review current developments that have been initiated by the advent of the new technologies.

527

Abstract

Purpose

This paper aims to review current developments that have been initiated by the advent of the new technologies.

Design/methodology/approach

A general review and survey of selected research and development topics.

Findings

Illustrates the multi‐ and trans‐disciplinary nature of cybernetics, systems and management sciences.

Practical implications

The choice of reviews provides an awareness of the current trends in these areas of endeavour.

Originality/value

The reviews are selected from a global database and give a studied assessment of present‐day research and development initiatives.

Details

Kybernetes, vol. 37 no. 7
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 8 February 2022

Van Chien Duong, Emma Regolini, Billy Sung, Min Teah and Siobhan Hatton-Jones

The purpose of this study is to understand whether increasing the number of sensory modalities being stimulated impacts consumers’ in-store emotional responses (i.e. in-store…

1247

Abstract

Purpose

The purpose of this study is to understand whether increasing the number of sensory modalities being stimulated impacts consumers’ in-store emotional responses (i.e. in-store enjoyment and arousal), store image perception and brand attitude.

Design/methodology/approach

The study used a between-subjects experimental design to examine 551 individuals’ perceptions and emotional responses in four sensory modalities stimulation conditions (i.e. visual, visual-smell, visual-taste and visual-smell-taste). The study used virtual reality visualisation technology and psychophysiological measurements (i.e. skin conductance and facial expression) to improve the ecological validity of the study design.

Findings

The current study supports the importance of multisensory in-store atmospheric design. When increasing the number of sensory modalities being stimulated, more positive emotional responses and perceptions were recorded. Additionally, increasing the number of sensory modalities also increased perceived intensity, and perceived intensity mediate the relationship between the stimulation of multisensory modalities and perception.

Research limitations/implications

The study is without its limitations. For instance, the scope of the study was limited by the exclusion of auditory and haptic stimulation, the lack of manipulation of sensory intensity and the absence of sensory congruency examination.

Practical implications

This study contributes to retail and marketing practices by providing evidence to assist the retail design of in-store sensory cues and customer experiences.

Originality/value

This research uses both self-reported measures and biometric measures to test the sole effect of sensory modalities being stimulated on consumer evaluation. To the best of the authors’ knowledge, this study is the first to examine store atmospheric designs with psychophysiological methodologies and an immersive, two-story-high, 180-degree-visual-field and dome-shaped display.

Details

Journal of Consumer Marketing, vol. 39 no. 2
Type: Research Article
ISSN: 0736-3761

Keywords

Article
Publication date: 29 June 2010

Louis Yen, Alyssa B. Schultz, Cindy Schaefer, Susan Bloomberg and Dee W. Edington

The purpose of this paper is to document the total return on investment (ROI) of a comprehensive worksite health program from 1999 to 2007 through two different analytic…

Abstract

Purpose

The purpose of this paper is to document the total return on investment (ROI) of a comprehensive worksite health program from 1999 to 2007 through two different analytic approaches.

Design/methodology/approach

Two analytical techniques were used: time period analysis and historical trend analysis of the entire study period. The time‐period analysis of ROI was performed among employees in four time periods: 1999‐2001; 2002‐2003, 2004‐2005; and 2006‐2007. The historical trend analysis on participation‐related savings was used to compare the financial trend differences between participants and non‐participants as well as the three different participation levels of continuous, sporadic, and non‐participants since the year 2000 among 2,753 employees who worked for and were covered by the company‐sponsored health plans for the entire study period.

Findings

The ROI from health care costs and time away from work ranged from 1.29 to 2.07 for the four time periods with a cumulative ROI of 1.66 over nine years. The historical trend analysis of 2,753 long‐term employees resulted in a 1.57 ROI for 2,036 program participants (t‐test: p<0.005) with statistically significant annual saving of $180 per participant per year.

Originality/value

The returns on comprehensive worksite health program were greater than the program investment as documented by both time‐period and historical trend analyses. Organizations seeking ways to manage the increases in health care and absenteeism costs of employees will be encouraged to see that positive returns can be generated by investments in employee health and wellness and steady or consistent participation is one key to generating success.

Details

International Journal of Workplace Health Management, vol. 3 no. 2
Type: Research Article
ISSN: 1753-8351

Keywords

Article
Publication date: 1 October 2003

N.L. Clarke, S.M. Furnell, B.M. Lines and P.L. Reynolds

The ability of third generation telephones to store sensitive information, such as financial records, digital certificates and company records, makes them desirable targets for…

1530

Abstract

The ability of third generation telephones to store sensitive information, such as financial records, digital certificates and company records, makes them desirable targets for impostors. This paper details the feasibility of a non‐intrusive subscriber authentication technique – the use of keystroke dynamics. This feasibility study comprises a number of investigations into the ability of neural networks to authenticate users successfully based on their interactions with a mobile phone keypad. The initial results are promising with network classification performing well, achieving a 9.8 per cent false rejection rate and an 11.0 per cent false acceptance rate.

Details

Information Management & Computer Security, vol. 11 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 February 2004

V. Zorkadis and P. Donos

Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements…

3057

Abstract

Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements of authentication and identification systems. However, any human physiological or behavioural traits serving as biometric characteristics are personal data protected by privacy protection legislation. To address related issues, this paper examines these classes of biometrics according to data protection principles, purpose, proportionality and security, provided in international legislation. This analysis leads to the desired properties of biometric systems in the form of functional and non‐functional requirements, in order to support developers minimising the risk of being non‐compliant to privacy protection legislation, and to increase user acceptance.

Details

Information Management & Computer Security, vol. 12 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 April 2005

Richard A. Riley and Virginia Franke Kleist

This paper aims to assist readers to develop a compelling business case, including quantifiable and non‐quantifiable costs and benefits, for the deployment of biometric

3139

Abstract

Purpose

This paper aims to assist readers to develop a compelling business case, including quantifiable and non‐quantifiable costs and benefits, for the deployment of biometric technologies in information systems to enhance corporate security for access control, identification and verification applications.

Design/methodology/approach

The paper reviews the strengths and weaknesses of leading biometric technologies, while commenting on their practical applicability in real world implementations. In addition, the paper develops a process for ensuring that the best biometric applications are chosen, considering both the technology and related business issues.

Findings

The paper suggests that biometrics must be carefully selected to achieve a good fit to the security problem, giving examples of how a good fit might be evaluated by the user. The one‐time and recurring charges associated with the typical biometric implementation are evaluated, arguing that these costs must be offset by a formal risk evaluation. The paper presents a user's guide for sensible implementation evaluations. Finally, the paper emphasizes that the use of biometrics in systems security implementations is one tool among many, and must thus be viewed as only part of an overall information security management infrastructure.

Originality/value

In order to select biometric technologies, buyers must choose solutions to business problems, solutions that demonstrate that the biometric makes sense from a cost‐benefit and business perspective. This paper, in a step‐by‐step manner, walks readers through the decision‐making process and assists them in making compelling business arguments for biometric applications.

Details

Information Management & Computer Security, vol. 13 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 11 May 2012

Olli I. Heimo, Antti Hakkala and Kai K. Kimppa

The purpose of this paper is to show that most, if not all RFID/biometric passports have clear technical and social problems in their intended use and that there are clear…

929

Abstract

Purpose

The purpose of this paper is to show that most, if not all RFID/biometric passports have clear technical and social problems in their intended use and that there are clear problems with the databases into which biometric data are being collected, due to use of this data for other (publicly), non‐intended uses.

Design/methodology/approach

The approach of this paper is both a meta‐study of the flaws in the technological specifications as well as the social implementation of RFID/biometric passports. Finland is used as a case, but the results extend beyond Finland in most, if not all the topics presented – not necessarily all results to all implementations, but all to some others.

Findings

The current implementations of RFID/biometric passports are lacking in both technical and social implementations and pose clear risks to their use, both due to lax implementation of the technology itself but specifically due to the social changes brought about. These problems cause both erosion of privacy and trust.

Research limitations/implications

Further research into other potential social implications on a national level is required. The authors fear that the cases presented do not necessarily reflect all the potential problems, but just the most evident ones.

Practical implications

The problems with the technological implications can be averted by using the best technological solutions, and thus the best technological solutions should be used instead of the ones proven to be lacking.

Social implications

The social implications should at least be brought forth for public discourse and acknowledged, which currently does not seem to happen.

Originality/value

The paper contributes to the understanding of problems with current RFID/biometric passport implementations as well as inherent social problems that are hard, if not impossible to avoid. The problems belong under the category of critical eGovernment applications, and similar issues are visible in other eGovernment applications.

Details

Journal of Information, Communication and Ethics in Society, vol. 10 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 2 February 2010

Kelly Warren

The purpose of this paper is to provide a practitioner perspective on the growing influence and impact of biometric technology on the hospitality industry.

1437

Abstract

Purpose

The purpose of this paper is to provide a practitioner perspective on the growing influence and impact of biometric technology on the hospitality industry.

Design/methodology/approach

The paper outlines the different types of biometric authentication and its uses in hospitality operations and explores current and future applications in providing secure and safe guest services.

Findings

The paper cites examples of technological innovation and discusses the implications of biometric authentication for hospitality operations, organization, and management.

Practical implications

The paper aligns technological advances with the experiences of a senior professional's personal experience in operating and managing restaurants.

Originality/value

The paper offers a strategic viewpoint on the potential range of applications for biometric verification and explores some of the complexities arising from its adoption and application to hospitality operations.

Details

Worldwide Hospitality and Tourism Themes, vol. 2 no. 1
Type: Research Article
ISSN: 1755-4217

Keywords

Article
Publication date: 1 August 2019

Ziaul Haque Choudhury and M. Munir Ahamed Rabbani

Nowadays, the use of forged e-passport is increasing, which is threatening national security. It is important to improve the national security against international crime or…

Abstract

Purpose

Nowadays, the use of forged e-passport is increasing, which is threatening national security. It is important to improve the national security against international crime or terrorism. There is a weak verification process caused by lack of identification processes such as a physical check, biometric check and electronic check. The e-passport can prevent the passport cloning or forging resulting from the illegal immigration. The paper aims to discuss these issues.

Design/methodology/approach

This paper focuses on face recognition to improve the biometric authentication for an e-passport, and it also introduces facial permanent mark detection from the makeup or cosmetic-applied faces, twins and similar faces. An algorithm is proposed to detect the cosmetic-applied facial permanent marks such as mole, freckle, birthmark and pockmark. Active Shape Model into Active Appearance Model using Principal Component Analysis is applied to detect the facial landmarks. Facial permanent marks are detected by applying the Canny edge detector and Gradient Field Histogram of Oriented Gradient.

Findings

This paper demonstrated an algorithm and proposed facial marks detection from cosmetic or makeup-applied faces for a secure biometric passport in the field of personal identification for national security. It also presented to detect and identify identical twins and similar faces. This paper presented facial marks detection from the cosmetic-applied face, which can be mixed with traditional methods. However, the use of the proposed technique faced some challenges due to the use of cosmetic. The combinations of the algorithm for facial mark recognition matching with classical methods were able to attain lower errors in this proposed experiment.

Originality/value

The proposed method will enhance the national security and it will improve the biometric authentication for the e-passport. The proposed algorithm is capable of identifying facial marks from cosmetic-applied faces accurately, with less false positives. The proposed technique shows the best results.

Details

International Journal of Intelligent Unmanned Systems, vol. 8 no. 1
Type: Research Article
ISSN: 2049-6427

Keywords

1 – 10 of over 1000