Sunday, March 28, 2010

Organizations Using Blogs

There are many advantages and disadvantages of using blogs by an organization. One of the advantages would be that they can get real time feedback from everyone; customer, employee, and even their followers. It’s an efficient and cost effective way to know if implementing new device or improving the older ones is good idea or not. Having a blog allows to have many different opinions from many different people. It also allows interaction between people and increases the awareness of the organization’s doings. One of the disadvantages would be that the main goal might not be achieved or it could be a flop if it is not updated regularly. If it is not updated regularly with interesting information, it might decrease the value of following the blog and create negative impression about the organization.



Řĕfếrểnĉệş



Network Security Issues
Fitzgerald, Kevin J.. International Journal of Information Resource Management. Bradford:1992. Vol. 3, Iss. 4, p. 21 (6 pp.) http://proquest.umi.com/pqdweb?did=1138885&Fmt=2&clientId=10306&RQT=309&VName=PQD

Disadvantages of Biometric Devices


Major
disadvantages of implementing the biometric devices are that it is very expensive and can affect the ability depending on the usage and the surrounding. For example, if we take the fingerprint as the password would be that fingerprints of a person keep changing from time to time, therefore the device have problem identifying it.
The fingerprints of people working in Chemical industries are often affected and should no use it a mode of authentication. Iris scanner has difficulty capturing the iris of some individuals, which is the major disadvantage. It can be easily covered with “eyelashes, contact lenses, eyelids or even reflections from the cornea”. It is not that widely used but scanning your eyes with a light source can also be dangerous. Face detection is also a popular biometric device for security purposes. The most important disadvantage of the device is that the face can easily be disguised or even obstructed by hair, glasses, hats etc. It is very sensitive and reduces the reliability of the security level.




Řĕfếrểnĉệş




Advantages of Biometric Devices


There are many advantages of using biometric devices in an many organizations. From law agencies to small-medium sized enterprise to financial institutions. For example, it increases the security level and reduces the fraud level by the employees in the organizations. It eliminates troubles caused by lost ID cards or forgotten passwords which sometimes are shared by people causing harm to organizations. It increases the safety and practicability level of to know “WHO did WHAT, WHERE and WHEN”! Biometric devices offers significant cost savings or increasing ROI in areas such as Loss Prevention or Time & Attendance”, which is a great advantages in many organizations.


Řĕfếrểnĉệş



Potential Replacements



Most of us protects our applications, usage of emails, confidential files and many more through the use of passwords, cards, personal identification numbers, and keys to access restricted information, but has anyone thought about that these passwords, cards, personal identification numbers, and keys can be forgotten, stolen, forged, lost, or given away. “Moreover, these devices serve primarily to identify the person. They cannot verify or authenticate that the person really is who he or she claims to be.” All these is being replaced by biometric devices.

There are many different biometric devices that exist these days to help organizations keep their confidential information away from theft or their competitors. There are the fingerprint, palm/ hand scanners, face recognition, iris scan, retinal Scan, vascular Patterns, DNA and many more. Below, we’ll analyze few of these devices and discuss how they replaced some of the devices.

Fingerprint recognition is a tool that analyzes the fingertip patterns. This is one of the most commonly used biometric devices. “To prevent fake fingers from being used, many biometrics fingerprint systems also measure blood flow, or check for correctly arrayed ridges at the edges of the fingers.” This shows that no matter what or how you try to fake it, it is really hard to surpass it. Finger print reader is a very good and secure way to protect confidential belongings. Organizations such as banks and other financial organizations started to use these devices for building door locks and computer network access to prevent frauds.

Another example would be facial recognition where it analyzes the characteristics of an individual's face images. It is captured through a digital camera and records the overall facial structure where it includes the distances between eyes, nose, mouth, and jaw edges. All these measurements are stored in a database and used as a comparison when an individual stands in front of the device. This device is already in use in many law enforcement areas, but it can also be used in an organization for verification purposes.

Last not least, Iris scanning analyzes the features that exist in the tissues that surround the pupil. It can be done from further way and produces a very accurate measurement for identification purposes. Even though the use of this device is more frequent in the law enforcement agencies, it could be used in any medium sized organization also. The uniqueness of eyes makes the device a very powerful tool to be used. It is a very good idea to use it with financial institutions because as we know it holds many valuable and confidential information of many people.





Řĕfếrểnĉệş

Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model
Tabitha James, Taner Pirim, Katherine Boswell, Brian Reithel, Reza Barkhi. Journal of Organizational and End User Computing. Hershey:Jul-Sep 2006. Vol. 18, Iss. 3, p. 1-24 (24 pp.) http://proquest.umi.com/pqdweb?did=1060110241&Fmt=3&clientId=10306&RQT=309&VName=PQD

Body language, security and e-commerce
Norman Desmarais. Library Hi Tech. Bradford:2000. Vol. 18, Iss. 1, p. 61-74. http://proquest.umi.com/pqdweb?did=116355888&Fmt=3&clientId=10306&RQT=309&VName=PQD



Biometric Devices - What it is and what it does?




In 1999, Hopkins defined biometrics as "the application of computational methods to biological
features,especially with regard to the study of unique biological characteristics of humans."

When we talk about a biometric system, it can be referred to as "a pattern recognition system that makes a personal identification by establishing the authenticity of a specific physiological or behavioral characteristic possessed by the user" (Jain et al., 2000). In simple words, it means that because everyone has unique physical attributes, devices can be programmed to recognize those attributes. A biometrics device uses those unique physical characteristics to identify an individual or to verify their identity for a specific device.

Biometric device is a way to protect, individuals or corporations, from the increasing number of vulnerability that exist in the earlier established methods of security. The unique traits of each individual provide methods of identification that are more secure, indestructible and less easily identifiable. Now days, virtual access includes biometric protection and soon credit card, online banking, online trading, ATMs, and online purchasing are hoping to apply biometric in one way or the other.

The awareness of using biometrics is rising very quickly, and implementation of these technologies is penetrating corporations, governments and most importantly financial institutions. The “International Biometric Group predicts the market for biometrics to rise from $815 million in 2004 to $2.08 billion by 2006 (BTT, 2005)”.As we can see, it clearly shows that the biometric devices will come out as an important security tool over the next several years.

Řĕfếrểnĉệş

http://www.netapp.com/us/solutions/industry/federal-government/?REF_SOURCE=ntpggl9700000105646s