Search results

1 – 10 of 424
Article
Publication date: 15 March 2013

Cristian Morosan

Today's increasingly interconnected world presents substantial challenges for the security of air travel, which can be attenuated by using registered traveler biometric systems…

1665

Abstract

Purpose

Today's increasingly interconnected world presents substantial challenges for the security of air travel, which can be attenuated by using registered traveler biometric systems (RTBS). While several systems have been deployed (i.e. Global Entry), it is not clear how a mass adoption of registered traveler biometric systems can be predicted. Using data from air travelers, the aim of this study is to examine the link between air travelers' perceptions of several air travel attributes and their intentions to use RTBS.

Design/methodology/approach

This study used an exploratory factor analysis to reduce the dimensionality of 17 perceptions of air travel experience attributes. Further, a discriminant function analysis was used to determine if any of the air travel attribute groups are useful in distinguishing between travelers favorable v. unfavorable toward RTBS.

Findings

This study found that travelers' perceptions of several air travel attributes are linked to their intentions to use RTBS. Specifically, the in‐flight service experience, the efficiency of the pre‐flight processing, and the emphasis on customers' time are useful in discriminating between travelers who are favorable v. unfavorable toward registered traveler biometric systems.

Research limitations/implications

This study shows how certain groups of air travel attributes, which are “visible”, can discriminate between air travelers willing and unwilling to use RTBS. Also, by focusing on general air travel attributes, this study provides a broader understanding of how travelers form criteria to evaluate air travel service performance. Finally, this study offers distinctive insight into the voluntary use of biometric technology in airports.

Social implications

This study has important implications for improving the security of air travel and understanding better a technology that is associated with strong consumer sentiments.

Originality/value

Being among the first studies to examine air travel attribute perceptions and travelers' intentions to approach or reject RTBS, this study makes an important step in the general understanding of biometric system adoption in air travel. By finding the links between air travel attributes and intentions to use RTBS, this study provides a unique approach to understanding the potential use of RTBS in travel, with important implications for an improved management and marketing of RTBS. Also, the study establishes a link between air travel attributes and technologies designed to enhance the air service experience.

Details

Journal of Hospitality and Tourism Technology, vol. 4 no. 1
Type: Research Article
ISSN: 1757-9880

Keywords

Article
Publication date: 20 June 2019

Verena Zimmermann, Nina Gerber, Peter Mayer, Marius Kleboth, Alexandra von Preuschen and Konstantin Schmidt

Six years ago, Bonneau et al. (2012) proposed a framework to compare authentication schemes to the ubiquitous text password. Even though their work did not reveal an alternative…

Abstract

Purpose

Six years ago, Bonneau et al. (2012) proposed a framework to compare authentication schemes to the ubiquitous text password. Even though their work did not reveal an alternative outperforming the text password on every criterion, the framework can support decision makers in finding suitable solutions for specific authentication contexts. The purpose of this paper is to extend and update the database, thereby discussing benefits, limitations and suggestions for continuing the development of the framework.

Design/methodology/approach

This paper revisits the rating process and describes the application of an extended version of the original framework to an additional 40 authentication schemes identified in a literature review. All schemes were rated in terms of 25 objective features assigned to the three main criteria: usability, deployability and security.

Findings

The rating process and results are presented along with a discussion of the benefits and pitfalls of the rating process.

Research limitations/implications

While the extended framework, in general, proves suitable for rating and comparing authentication schemes, ambiguities in the rating could be solved by providing clearer definitions and cut-off values. Further, the extension of the framework with subjective user perceptions that sometimes differ from objective ratings could be beneficial.

Originality/value

The results of the rating are made publicly available in an authentication choice support system named ACCESS to support decision makers and researchers and to foster the further extension of the knowledge base and future development of the extended rating framework.

Details

Information & Computer Security, vol. 27 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 August 2022

Anil Kumar Gona and Subramoniam M.

Biometric scans using fingerprints are widely used for security purposes. Eventually, for authentication purposes, fingerprint scans are not very reliable because they can be…

Abstract

Purpose

Biometric scans using fingerprints are widely used for security purposes. Eventually, for authentication purposes, fingerprint scans are not very reliable because they can be faked by obtaining a sample of the fingerprint of the person. There are a few spoof detection techniques available to reduce the incidence of spoofing of the biometric system. Among them, the most commonly used is the binary classification technique that detects real or fake fingerprints based on the fingerprint samples provided during training. However, this technique fails when it is provided with samples formed using other spoofing techniques that are different from the spoofing techniques covered in the training samples. This paper aims to improve the liveness detection accuracy by fusing electrocardiogram (ECG) and fingerprint.

Design/methodology/approach

In this paper, to avoid this limitation, an efficient liveness detection algorithm is developed using the fusion of ECG signals captured from the fingertips and fingerprint data in Internet of Things (IoT) environment. The ECG signal will ensure the detection of real fingerprint samples from fake ones.

Findings

Single model fingerprint methods have some disadvantages, such as noisy data and position of the fingerprint. To overcome this, fusion of both ECG and fingerprint is done so that the combined data improves the detection accuracy.

Originality/value

System security is improved in this approach, and the fingerprint recognition rate is also improved. IoT-based approach is used in this work to reduce the computation burden of data processing systems.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 9 March 2015

Eunhwa Jung and Kyungho Hong

This study aims at a biometric verification based on facial profile images for mobile security. The modern technology of mobile Internet devices and smart phones such as the…

Abstract

Purpose

This study aims at a biometric verification based on facial profile images for mobile security. The modern technology of mobile Internet devices and smart phones such as the iPhone series and Galaxy phone series has revealed the development of information technology of input and output devices as high-definition multimedia interface. The development of information technology requires novel biometric verification for personal identification or authentication in mobile security, especially in Internet banking and mobile Internet access. Our study deals with a biometric verification based on facial profile images for mobile security.

Design/methodology/approach

The product of cellphones with built-in cameras gives us the opportunity of the biometric verification to recognize faces, fingerprints and biological features without any other special devices. Our study focuses on recognizing the left and right facial profile images as well as the front facial images as a biometric verification of personal identification and authentication for mobile security, which can be captured by smart phone devices such as iPhone 4 and Galaxy S2.

Findings

As the recognition technique of the facial profile images for a biometric verification in mobile security is a very simple, relatively easy to use and inexpensive, it can be easily applied to personal mobile phone identification and authentication instead of passwords, keys or other methods. The biometric system can also be used as one of multiple verification techniques for personal recognition in a multimodal biometric system. Our experimental data are taken from persons of all ages, ranging from children to senior citizens.

Originality/value

As the recognition technique of the facial profile images for a biometric verification in mobile security is very simple, relatively easy to use and inexpensive, it can be easily applied to personal mobile phone identification and authentication instead of passwords, keys or other methods. The biometric system can also be used as one of multiple verification techniques for personal recognition in a multimodal biometric system. Our experimental data are taken from persons of all ages, ranging from children to senior citizens.

Details

Journal of Systems and Information Technology, vol. 17 no. 1
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 19 August 2021

Sajaad Ahmed Lone and Ajaz Hussain Mir

Because of the continued use of mobile, cloud and the internet of things, the possibility of data breaches is on the increase. A secure authentication and authorization strategy…

Abstract

Purpose

Because of the continued use of mobile, cloud and the internet of things, the possibility of data breaches is on the increase. A secure authentication and authorization strategy is a must for many of today’s applications. Authentication schemes based on knowledge and tokens, although widely used, lead to most security breaches. While providing various advantages, biometrics are also subject to security threats. Using multiple factors together for authentication provides more certainty about a user’s identity; thus, leading to a more reliable, effective and more difficult for an adversary to intrude. This study aims to propose a novel, secure and highly stable multi-factor one-time password (OTP) authentication solution for mobile environments, which uses all three authentication factors for user authentication.

Design/methodology/approach

The proposed authentication scheme is implemented as a challenge-response authentication where three factors (username, device number and fingerprint) are used as a secret key between the client and the server. The current scheme adopts application-based authentication and guarantees data confidentiality and improved security because of the integration of biometrics with other factors and each time new challenge value by the server to client for OTP generation.

Findings

The proposed authentication scheme is implemented on real android-based mobile devices, tested on real users; experimental results show that the proposed authentication scheme attains improved performance. Furthermore, usability evaluation proves that proposed authentication is effective, efficient and convenient for users in mobile environments.

Originality/value

The proposed authentication scheme can be adapted as an effective authentication scheme to accessing critical information using android smartphones.

Details

International Journal of Pervasive Computing and Communications, vol. 18 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 6 March 2020

Katherine Celia Greder, Jie Pei and Jooyoung Shin

The purpose of this study was to create a corset—understructure as well as fabric covering—using only computational, 3D approaches to fashion design. The process incorporated 3D…

Abstract

Purpose

The purpose of this study was to create a corset—understructure as well as fabric covering—using only computational, 3D approaches to fashion design. The process incorporated 3D body scan data, parametric methods for the 3D-printed design, and algorithmic methods for the automated, custom-fit fabric pattern.

Design/methodology/approach

The methods or protocol-based framework that nucleated this design project (see Figure 1) enabled more concentrated research into the iterative step-by-step procedure and the computational techniques used herein.

Findings

The 3D computational methods in this study demonstrated a new way of rendering the body-to-pattern relationship through the use of multiple software platforms. Using body scan data and computer coding, the computational construction methods in this study showed a pliant and sustainable method of clothing design where designers were able to manipulate the X, Y, and Z coordinates of the points on the scan surface.

Research limitations/implications

A study of algorithmic methods is inherently a study of limitation. The iterative process of design was defined and refined through the particularity of an algorithm, which required thoughtful manipulation to inform the outcome of this research.

Practical implications

This study sought to illustrate the use and limitations of algorithm-driven computer programming to advance creative design practices.

Social implications

As body scan data and biometric information become increasingly common components of computational fashion design practices, the need for more research on the use of these techniques is pressing. Moreover, computational techniques serve as a catalyst for discussions about the use of biometric information in design and data modeling.

Originality/value

The process of designing in 3D allowed for the dynamic capability to manipulate proportion and form using parametric design techniques.

Details

International Journal of Clothing Science and Technology, vol. 32 no. 4
Type: Research Article
ISSN: 0955-6222

Keywords

Article
Publication date: 17 September 2008

B.H. Rudall and C.J.H. Mann

This paper aims to review current developments that have been initiated by the advent of the new technologies.

527

Abstract

Purpose

This paper aims to review current developments that have been initiated by the advent of the new technologies.

Design/methodology/approach

A general review and survey of selected research and development topics.

Findings

Illustrates the multi‐ and trans‐disciplinary nature of cybernetics, systems and management sciences.

Practical implications

The choice of reviews provides an awareness of the current trends in these areas of endeavour.

Originality/value

The reviews are selected from a global database and give a studied assessment of present‐day research and development initiatives.

Details

Kybernetes, vol. 37 no. 7
Type: Research Article
ISSN: 0368-492X

Keywords

Book part
Publication date: 14 October 2019

Katerina Berezina, Olena Ciftci and Cihan Cobanoglu

Purpose: The purpose of this chapter is to review and critically evaluate robots, artificial intelligence and service automation (RAISA) applications in the restaurant industry to…

Abstract

Purpose: The purpose of this chapter is to review and critically evaluate robots, artificial intelligence and service automation (RAISA) applications in the restaurant industry to educate professors, graduate students, and industry professionals.

Design/methodology/approach: This chapter is a survey of applications of RAISA in restaurants. The chapter is based on the review of professional and peer-reviewed academic literature, and the industry insight section was prepared based on a 50-minute interview with Mr. Juan Higueros, Chief Operations Officer of Bear Robotics.

Findings: Various case studies presented in this chapter illustrate numerous possibilities for automation: from automating a specific function to complete automation of the front of the house (e.g., Eatsa) or back of the house (e.g., Spyce robotic kitchen). The restaurant industry has already adopted chatbots; voice-activated and biometric technologies; robots as hosts, food runners, chefs, and bartenders; tableside ordering; conveyors; and robotic food delivery.

Practical implications: The chapter presents professors and students with a detailed overview of RAISA in the restaurant industry that will be useful for educational and research purposes. Restaurant owners and managers may also benefit from reading this chapter as they will learn about the current state of technology and opportunities for RAISA implementation.

Originality/value: To the best of the authors’ knowledge, this chapter presents the first systematic and in-depth review of RAISA technologies in the restaurant industry.

Details

Robots, Artificial Intelligence, and Service Automation in Travel, Tourism and Hospitality
Type: Book
ISBN: 978-1-78756-688-0

Keywords

Abstract

Details

Sensor Review, vol. 23 no. 4
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 24 April 2007

Paul Beynon‐Davies

The purpose of this paper is to unpack some of the socio‐technical relationships inherent in contemporary notions of personal identity management. For this purpose it considers…

3434

Abstract

Purpose

The purpose of this paper is to unpack some of the socio‐technical relationships inherent in contemporary notions of personal identity management. For this purpose it considers the issue of personal identity management in terms of a framework, which distinguishes between the related processes of authentication, identification and enrolment.

Design/methodology/approach

The conceptual model described in this paper is reflected against an important recent case in which issues of personal identity management are being enacted: the introduction of a UK national identity card. Both this issue and case are particularly examined in the light of the growth of e‐Government in the UK.

Findings

The paper relates issues associated with the technical infrastructure of e‐Government with some of the costs and benefits associated with the social infrastructure of e‐Government. This device offers a useful framing for a whole range of issues surrounding individual‐organisation interaction in the Information Society that rely on elements of personal identity management.

Research limitations/implications

In the paper the issue of personal identity management is under‐represented in the Information Systems and Information Management literature. The conceptual approach adopted in the paper is used to identify areas of further research in terms of issues relevant to the technical infrastructure of e‐Government.

Practical implications

The paper identifies a number of personal identity management issues embedded in the technical infrastructure required for effective e‐Government.

Originality/value

This paper raises the importance of personal identity management to the success of the e‐Government agenda. It also links classic information management issues to the issue of personal identity management and identifies the challenges for e‐Government within this.

Details

Journal of Enterprise Information Management, vol. 20 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

1 – 10 of 424