Sunday, March 28, 2010

Potential Replacements



Most of us protects our applications, usage of emails, confidential files and many more through the use of passwords, cards, personal identification numbers, and keys to access restricted information, but has anyone thought about that these passwords, cards, personal identification numbers, and keys can be forgotten, stolen, forged, lost, or given away. “Moreover, these devices serve primarily to identify the person. They cannot verify or authenticate that the person really is who he or she claims to be.” All these is being replaced by biometric devices.

There are many different biometric devices that exist these days to help organizations keep their confidential information away from theft or their competitors. There are the fingerprint, palm/ hand scanners, face recognition, iris scan, retinal Scan, vascular Patterns, DNA and many more. Below, we’ll analyze few of these devices and discuss how they replaced some of the devices.

Fingerprint recognition is a tool that analyzes the fingertip patterns. This is one of the most commonly used biometric devices. “To prevent fake fingers from being used, many biometrics fingerprint systems also measure blood flow, or check for correctly arrayed ridges at the edges of the fingers.” This shows that no matter what or how you try to fake it, it is really hard to surpass it. Finger print reader is a very good and secure way to protect confidential belongings. Organizations such as banks and other financial organizations started to use these devices for building door locks and computer network access to prevent frauds.

Another example would be facial recognition where it analyzes the characteristics of an individual's face images. It is captured through a digital camera and records the overall facial structure where it includes the distances between eyes, nose, mouth, and jaw edges. All these measurements are stored in a database and used as a comparison when an individual stands in front of the device. This device is already in use in many law enforcement areas, but it can also be used in an organization for verification purposes.

Last not least, Iris scanning analyzes the features that exist in the tissues that surround the pupil. It can be done from further way and produces a very accurate measurement for identification purposes. Even though the use of this device is more frequent in the law enforcement agencies, it could be used in any medium sized organization also. The uniqueness of eyes makes the device a very powerful tool to be used. It is a very good idea to use it with financial institutions because as we know it holds many valuable and confidential information of many people.





Řĕfếrểnĉệş

Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model
Tabitha James, Taner Pirim, Katherine Boswell, Brian Reithel, Reza Barkhi. Journal of Organizational and End User Computing. Hershey:Jul-Sep 2006. Vol. 18, Iss. 3, p. 1-24 (24 pp.) http://proquest.umi.com/pqdweb?did=1060110241&Fmt=3&clientId=10306&RQT=309&VName=PQD

Body language, security and e-commerce
Norman Desmarais. Library Hi Tech. Bradford:2000. Vol. 18, Iss. 1, p. 61-74. http://proquest.umi.com/pqdweb?did=116355888&Fmt=3&clientId=10306&RQT=309&VName=PQD



No comments:

Post a Comment