Part 1
Article 1: Biometric Technology Today
The article’s approach is clear and precise, which revolves around the idea of how “Biometric system” has emerged to be the “next thing” in almost every sector. The idea behind the technology is to gather precise and unique identity features and feed or integrate them in to the database, which would then be functional for multiple individuals and purposes from across the globe [16].
Since this particular article focuses extensively over how the biometric system works and can be beneficial for gathering and using data across the world. The method this particular article is emphasizing upon is the process that organizations incorporate in order for gathering such data. The typical method that organizations use to gather is by using biometric data gathering device for detecting.
The article concludes that “Biometric Technology” on current times is being treated as a “Newsletter” that facilitates as access to the updated information from across the world [8]. The list of information that this technology provides includes the following:
- Fingerprint Technology
- Smart cards
- Hand geometry
- Biometric solutions within banking
- Law & Order and biometric
- Legislation
- E commerce
- Iris scanning
- Face and voice recognition
Problem identification
The problem that this article highlights is the problem that is being faced by every organization and industry that has introduced the “Biometric Technology”, which is security of the information [10]. The major problem with this particular technology is one cannot make secure the information despite of numerous attempts. Hackers always tend to develop key or codes to any level of security that is being developed for securing a precise set of information or data.
Problem formulation
Formulating problem refers to the idea of preparing for dealing with the problem. Since, there is no permanent solution to the problem of hacking or information stealing; developers can try securing the information with multiple layers of security. What multiple layers of security might do is, it would it would create substantial obstacle for the hacker to steal the information [1].
Solution
Thus, the solution to this particular problem is to develop a multi-layered security system that wouldn’t let the stealing process a smooth one [4]. Developers might also consider developing security codes using the unique biometric features of the individual. For example: a laptop that can only be opened with “Iris scanning” can be the most secured pattern of security.
Whether: Analytical or empirical or qualitative or quantitative
The claims that the article is making is clearly analytical. For example: it is not possible for an author to make suggestion without analyzing the aspects and facts. The biometric system or technology along with its features is being analyzed by the author of this article. Besides, it comparatively is easy for to analyze on the basis of secondary information and is also easy gather information from various secondary sources.
Article 1: Biometric Technology Today
Justification of findings
The article identifies the potential benefits of the “Biometric Technology”, which can provide in terms of identification purposes. However, one justification in favor of the article would be the benefit that “biometric technology” provides. This probably is the reason that the technology is gaining significant amount of popularity across the world [3].
This particular article continuously emphasizes over the impact that digital identity cause over the commercial transactions [18]. The article also emphasizes over the sort of misuse that can be done with individual digital identity by a different individual. The article also declares Australia and United States of America are the two that are incorporating this notion as one of their legal concepts. The entire approach of this article is towards how America and Australia introduced the system within their completely digitalized federal transactions [2].
Considering the method that America and Australia has adopted for incorporating the technology can be witnessed within their governmental operations. For example: they have been incorporated through slight, without displaying and with gradual change. Such schemes are important, since it establishes single identity, primarily for governmental transactional use, however with lasting consequence of extending such transactions with private sector as well [6].
The result of such transformation along with the function and nature of the information composing individual transactional identity are thoroughly scrutinized. The analysis also reveals that digital identity for this particular context involves two different groups of information. The primary identity being the most important includes, information that is needed for conducting transactions such as, name, unique number, DOB (date of birth), gender and others [12].
Problem identification
The article also highlights the certain interesting outcomes associated with contract along with mistaken identity. Since, the governments of these two nations are entirely digitalized; they need highest possible security system that would secure their information in the most effective manner [17].
Problem formulation
The problem that originates in this regard is the problem with security concerns. The similarities among all the previous and this article are quite identical and concerned with security issues. It might be a little lengthy for the hackers to develop a crack code for any security system they wish to crack, but they eventually will. This is a serious concern [14].
Solution
The solution that fits the problem that has been highlighted in this scenario is entirely associated with using biometric features and characteristics of the associated entity or individual for securing transactions.
Article 2: Digital identity and mistake
Whether: Analytical or empirical or qualitative or quantitative
Considering the article and claims that have been made in the article clearly justify that, the researcher of this article considered undertaking analytics method. The process would require the researcher to go through the material he identified to be useful and effective and they analyze the outcomes.
Justification of findings
The article converses regarding the impact for the Australia and America, since both of these countries have quite identical strategy and scheme for legal and implementation system. Typically, the digital identity notion has impacts for countries having official nationalized identity policies [11].
The approach of this particular article is associated with the security purpose of every system that is using biometric information [9]. According to the article, it is not possible to ensure security of any system; all a developer can do is developing the security system more effectively without any possible loophole that would compromise the security of the entire mechanism.
Method
The article clearly emphasizes over how an individual identity characteristics can be utilized for developing the most secured system. For example: the Australian government has fully digitalized their transactional system, which would need a security system that is tough as much as possible. With the emergence of numerous information technology, using the unique identity features have become more essential for securing vital information such as financial and personal identical data for example: passwords to bank accounts and others.
Result
As a result of such urge to develop the most effective and efficient security system, different biometric characteristics of individuals are being used for securing information [15]. For example: in case of distinguishing twins, identifying iris structure, or the characteristics of retina, or facial structure and others can extract dramatic outcomes.
Problem identification
The problem that can worry individuals with their biometric information is that, with age human skin, body structure and others tend to transform. This to some extent can be regarded as a problem.
Problem formulation
While dealing with the process of biometric identification, the problem that can worry individuals is that, biometric identification procedure demands precise information of the particular individual. For example: if a deceased person’s son/daughter seeks to visit bank account of their father, they would have to present the accurate identity features of their father. This can be a major problem in absence of their father.
Solution
The solution to this problem would certainly be presenting the biometric and unique identity characteristics. This would certainly be the solution to the needs and requirements of further proceedings [19].
Identification of Novelty
Whether: Analytical or empirical or qualitative or quantitative
These particular patterns of article outcomes can as well be obtained using empirical research method. The researcher can conduct the research on the basis of certain hypotheses that would certainly be beneficial to obtain such outcomes. Although, this may seem that it is possible for a researcher to approach such family with identical condition, but similar outcomes can be obtained with an experimental research as well.
Justification of findings
Every individual has their unique physical features that can be used for develop security systems that would keep their information secured [5]. However, the article clearly justifies the world has moved into the era of information technology, which has also made the information vulnerable to cyber-attacks. Although, unique biometric information or features can always be used for securing information that would further be helpful in dealing with other aspects.
Project Title
“Comparative Study of Different Biometric Features”
The article “Comparative Study of Different Biometric Features” is an extensive study of various features that the biometric system has. This is an era of information technology that involves speedy communication, rapid developments of software, which can help in attaining any job and task with almost zero physical efforts. These information technologies are being used across the globe and in almost every nation for different purposes. However, with positive comes the negative; these technological developments has put the information security at the state of being vulnerable [20].
The problem statement of this particular article revolves around the idea that, despite of being rigged with the latest technologies, they are still vulnerable and can be used in a misleading manner.
Hackers across the globe can develop crack codes for any top of the line security system they come across. Thus, since the security of information is compromised, what developers can do is, they can triple or quadruple the security system. Multiple layers of security would slow down the speed of information being stolen easily and the time window might actually be helpful to buzz the security alarm. This is the problem statement.
Objectives of the article as portrayed are highlighting the features of biometric system and how such features can be useful in terms of developing the right kind of safekeeping mechanism. For example: DNA of an individual, Iris structure, retina structure, faces features, fingertip structure and others. These are the unique biometric features of an individual that define the identity of that particular person. Such information can be used for ensuring that the security system that is being implemented is prominent and updated. It takes few months for hackers to develop crack codes, thus updating the security system on the time interval would certainly be beneficial in terms of ensuring a secured mechanism [13].
Validation of results and Claims
There are various tools and equipment available for conducting biometric identification process. The list of such tools and equipment includes:
- Fingerprint identification machine
- Iris scanner
- Voice recorder
- Face recognition machine
- Signature scanner
- Computer
Once the above mentioned data is processed through their respective machines and recorded in the computers, they are ready for being used in different purposes. Since, these are digitalized information; they can be used for developing smart cards, maintaining medical records, accessing criminal records, applying tax rates, maintaining financial accounts and information and numerous other activities. However, as discussed before this is an era of information technology, where there is security but with major chances of vulnerability. This reduces the degree of security of the information; financial information contains maximum importance for every individual, similarly criminal record is another important aspect, medical report is nonetheless than these two different types of information [7]. With the technologies, database is accessible to anyone that is seeking information. This helps in maintaining security to the maximum potential and thus biometric technologies are one of the most important discoveries in this particular era.
References
[1]N. Chaki and A. Cortesi, Computer information systems–analysis and technologies, 1st ed. Berlin: Springer, 2011.
[2]K. Gates, Our biometric future, 1st ed. New York: New York University Press, 2011.
[3]T. Chou, Information assurance and security technologies for risk assessment and threat management, 1st ed. Hershey, Pa.: IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), 2011.
[4]N. Chaki and A. Cortesi, Computer Information Systems {u2013} Analysis and Technologies, 1st ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.
[5]C. Soutar, “Biometric technologies in support of identity and privacy assurance”, Biometric Technology Today, vol. 2011, no. 10, pp. 5-9, 2011.
[6]”International standards bodies address biometric security”, Biometric Technology Today, vol. 2011, no. 8, p. 2, 2011.
[7]”West Virginia becomes a hub for biometric development”, Biometric Technology Today, vol. 2011, no. 2, p. 1, 2011.
[8]”African countries embrace biometric e-id”, Biometric Technology Today, vol. 2011, no. 2, pp. 1-2, 2011.
[9]A. Rocha, Advances in information systems and technologies, 1st ed. Berlin: Springer, 2013.
[10]R. Benlamri, Networked digital technologies, 1st ed. Berlin: Springer, 2012.
[11]H. Nemati, Optimizing information security and advancing privacy assurance, 1st ed. Hershey, PA: Information Science Reference, 2012.
[12]ISBAST 2012, 1st ed. Piscataway, NJ: IEEE, 2012.
[13]”A healthy prognosis for biometric technologies”, Biometric Technology Today, vol. 10, no. 3, pp. 9-11, 2002.
[14]T. Kim, Computer applications for database, education, and ubiquitous computing, 1st ed. Berlin: Springer, 2012.
[15]A. Rocha, Advances in information systems and technologies, 1st ed. Berlin: Springer, 2013.
[16]2014 International Symposium on Biometrics and Security Technologies (ISBAST): proceedings: 26th-27th August 2014, Kuala Lumpur, Malaysia, 1st ed.
[17]A. Kaklauskas, Biometric and Intelligent Decision Making Support, 1st ed. Cham: Springer International Publishing, 2014.
[18]”European banks forge ahead with biometric tech”, Biometric Technology Today, vol. 2014, no. 7, p. 3, 2014.
[19]”SayPay Technologies and VoiceVault partner to deliver online and mobile payment”, Biometric Technology Today, vol. 2015, no. 6, p. 2, 2015.
[20]P. Waggett, Experiences from large scale testing of systems using biometric technologies, 1st ed. Luxembourg: Publications Office, 2015.