Search results

1 – 10 of over 1000
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 February 2004

V. Zorkadis and P. Donos

Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements…

3101

Abstract

Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements of authentication and identification systems. However, any human physiological or behavioural traits serving as biometric characteristics are personal data protected by privacy protection legislation. To address related issues, this paper examines these classes of biometrics according to data protection principles, purpose, proportionality and security, provided in international legislation. This analysis leads to the desired properties of biometric systems in the form of functional and non‐functional requirements, in order to support developers minimising the risk of being non‐compliant to privacy protection legislation, and to increase user acceptance.

Details

Information Management & Computer Security, vol. 12 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 6 March 2009

Hilary C. Murphy and Damien Rottet

This paper aims to review the determinants that influence adoption of biometric technologies, with particular emphasis on both devices and hotel processes.

2454

Abstract

Purpose

This paper aims to review the determinants that influence adoption of biometric technologies, with particular emphasis on both devices and hotel processes.

Design/methodology/approach

The overall objective was to identify the critical hotel processes and devices. This was achieved by a quantitative survey of 300 hotel customers which focused on the key dimensions of technology behaviour, holiday characteristics, hotel processes, biometric technologies and the “willingness” to adopt.

Findings

The findings show that 87.3 per cent of hotel customers may be “willing to use” biometric devices and that there is some correlation between the different processes as well as the different biometric technologies.

Practical implications

Conclusions and recommendations are made as to which specific hotel processes might benefit from biometrics and also how hoteliers might anticipate the rollout of biometric technologies.

Originality/value

This paper provides a first, empirical study into customer adoption of biometrics. It reveals opportunities for hotels to profit from emerging biometric technologies.

Details

International Journal of Contemporary Hospitality Management, vol. 21 no. 2
Type: Research Article
ISSN: 0959-6119

Keywords

Access Restricted. View access options
Article
Publication date: 1 December 1994

Roger Clarke

Many information systems involve data about people. In order reliably toassociate data with particular individuals, it is necessary that aneffective and efficient identification

5428

Abstract

Many information systems involve data about people. In order reliably to associate data with particular individuals, it is necessary that an effective and efficient identification scheme be established and maintained. There is remarkably little in the information technology literature concerning human identification. Seeks to overcome that deficiency by undertaking a survey of human identity and human identification. Discusses techniques including names, codes, knowledge‐based and token‐based identification, and biometrics. Identifies the key challenge to management as being to devise a scheme which is practicable and economic, and of sufficiently high integrity to address the risks the organization confronts in its dealings with people. Proposes that much greater use be made of schemes which are designed to afford people anonymity, or which enable them to use multiple identities or pseudonyms, while at the same time protecting the organization′s own interest. Describes multi‐purpose and inhabitant registration schemes, and notes the recurrence of proposals to implement and extend them. Identifies public policy issues. Of especial concern is the threat to personal privacy that the general‐purpose use of an inhabitant registrant scheme represents. Speculates that, where such schemes are pursued energetically, the reaction may be strong enough to threaten the social fabric.

Details

Information Technology & People, vol. 7 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Access Restricted. View access options
Article
Publication date: 24 April 2007

Paul Beynon‐Davies

The purpose of this paper is to unpack some of the socio‐technical relationships inherent in contemporary notions of personal identity management. For this purpose it considers…

3492

Abstract

Purpose

The purpose of this paper is to unpack some of the socio‐technical relationships inherent in contemporary notions of personal identity management. For this purpose it considers the issue of personal identity management in terms of a framework, which distinguishes between the related processes of authentication, identification and enrolment.

Design/methodology/approach

The conceptual model described in this paper is reflected against an important recent case in which issues of personal identity management are being enacted: the introduction of a UK national identity card. Both this issue and case are particularly examined in the light of the growth of e‐Government in the UK.

Findings

The paper relates issues associated with the technical infrastructure of e‐Government with some of the costs and benefits associated with the social infrastructure of e‐Government. This device offers a useful framing for a whole range of issues surrounding individual‐organisation interaction in the Information Society that rely on elements of personal identity management.

Research limitations/implications

In the paper the issue of personal identity management is under‐represented in the Information Systems and Information Management literature. The conceptual approach adopted in the paper is used to identify areas of further research in terms of issues relevant to the technical infrastructure of e‐Government.

Practical implications

The paper identifies a number of personal identity management issues embedded in the technical infrastructure required for effective e‐Government.

Originality/value

This paper raises the importance of personal identity management to the success of the e‐Government agenda. It also links classic information management issues to the issue of personal identity management and identifies the challenges for e‐Government within this.

Details

Journal of Enterprise Information Management, vol. 20 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

Access Restricted. View access options
Article
Publication date: 20 March 2024

George Okello Candiya Bongomin, Charles Akol Malinga, Alain Manzi Amani and Rebecca Balinda

The main purpose of this study is to test for the interaction effect of digital literacy in the relationship between financial technologies (FinTechs) of biometrics and mobile…

562

Abstract

Purpose

The main purpose of this study is to test for the interaction effect of digital literacy in the relationship between financial technologies (FinTechs) of biometrics and mobile money and digital financial inclusion among the unbanked poor women, youth and persons with disabilities (PWDs) in rural Uganda.

Design/methodology/approach

Covariance-based structural equation modeling was used to construct the interaction effect using data collected from the unbanked poor women, youth and PWDs located in the four regions in Uganda as prescribed by Hair et al. (2022).

Findings

The findings from this study are threefold: first; the results revealed a positive interaction effect of digital literacy between FinTechs of biometrics and mobile money and digital financial inclusion. Second; the results also confirmed that biometrics identification positively promotes digital financial inclusion. Lastly; the results showed that mobile money positively promotes digital financial inclusion. A combination of FinTechs of biometrics and mobile money together with digital literacy explain 29% variation in digital financial inclusion among the unbanked poor women, youth and PWDs in rural Uganda.

Research limitations/implications

The data for this study were collected mainly from the unbanked poor women, youth and PWDs. Further studies may look at data from other sections of the vulnerable population in under developed financial markets. Additionally, the data for this study were collected only from Uganda as a developing country. Thus, more data may be obtained from other developing countries to draw conclusive and generalized empirical evidence. Besides, the current study used cross sectional design to collect the data. Therefore, future studies may adopt longitudinal research design to investigate the impact of FinTechs on digital financial inclusion in the presence of digital literacy across different time range.

Practical implications

The governments in developing countries like Uganda should support women, youth, PWDs and other equally vulnerable groups, especially in the rural communities to understand and use FinTechs. This can be achieved through digital literacy that can help them to embrace digital financial services and competently navigate and perform digital transactions over digital platforms like mobile money without making errors. Besides, governments in developing countries like Uganda can use this finding to advocate for the design of appropriate digital infrastructures to reach remote areas and ensure “last mile connectivity for digital financial services' users.” The use of off-line solutions can complement the absence or loss of on-line network connectivity for biometrics and mobile money to close the huge digital divide gap in rural areas. This can scale-up access to and use of financial services by the unbanked rural population.

Originality/value

This paper sheds more light on the importance of digital literacy in the ever complex and dynamic global FinTech ecosystem in the presence of rampant cyber risks. To the best of the authors' knowledge, limited studies currently exist that integrate digital literacy as a moderator in the relationship between FinTechs and digital financial inclusion, especially among vulnerable groups in under-developed digital financial markets in developing countries. This is the novelty of the paper with data obtained from the unbanked poor women, youth and PWDs in rural Uganda.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Available. Open Access. Open Access
Article
Publication date: 14 February 2023

Friso van Dijk, Joost Gadellaa, Chaïm van Toledo, Marco Spruit, Sjaak Brinkkemper and Matthieu Brinkhuis

This paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors collected…

922

Abstract

Purpose

This paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors collected 119.810 publications and over 3 million references to perform a bibliometric domain analysis as a quantitative approach to uncover the structures within the privacy research field.

Design/methodology/approach

The bibliometric domain analysis consists of a combined directed network and topic model of published privacy research. The network contains 83,159 publications and 462,633 internal references. A Latent Dirichlet allocation (LDA) topic model from the same dataset offers an additional lens on structure by classifying each publication on 36 topics with the network data. The combined outcomes of these methods are used to investigate the structural position and topical make-up of the privacy research communities.

Findings

The authors identified the research communities as well as categorised their structural positioning. Four communities form the core of privacy research: individual privacy and law, cloud computing, location data and privacy-preserving data publishing. The latter is a macro-community of data mining, anonymity metrics and differential privacy. Surrounding the core are applied communities. Further removed are communities with little influence, most notably the medical communities that make up 14.4% of the network. The topic model shows system design as a potentially latent community. Noteworthy is the absence of a centralised body of knowledge on organisational privacy management.

Originality/value

This is the first in-depth, quantitative mapping study of all privacy research.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Access Restricted. View access options
Article
Publication date: 1 June 2004

Anna Kochan

One day seminar held in London by the IEE and the Association for Biometrics presented recent progress in the development and application of biometrics. Speakers told the audience…

1469

Abstract

One day seminar held in London by the IEE and the Association for Biometrics presented recent progress in the development and application of biometrics. Speakers told the audience how the terrorist attacks in the USA in September 2001 have created new opportunities for biometrics due to new initiatives to introduce biometric‐enabled passports. Papers presented at the seminar covered standards development and biometric implementation guidance. New organisations for promoting the application of biometrics both in the UK and Europe were outlined.

Details

Sensor Review, vol. 24 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Access Restricted. View access options
Article
Publication date: 1 April 2006

Zhongfei (Mark) Zhang

This research project focuses on developing techniques and technologies for automatically identifying human faces from images in the situations where face sample collections in…

248

Abstract

Purpose

This research project focuses on developing techniques and technologies for automatically identifying human faces from images in the situations where face sample collections in the database as well as in the input query images are “as is”, i.e. no standard data collection environment is available. The developed method can also be used in other biometric applications.

Design/methodology/approach

The specific method presented in this paper is called scale independent identification (SII). SII allows direct “comparison” between two images in terms of whether the two objects (e.g. faces) in the two images are the same object (i.e. the same individual). SII is developed by extensively using the matrix computation theory and in particular, the singular value decomposition theory.

Findings

It is found that almost all the existing methods in the literature or technologies in the market require that a normalization in scale be done before any identification processing. However, it is also found that normalization in scale not only adds additional processing complexity, but also may reduce the identification accuracy. In addition, it is difficult to anticipate an “optimal” scale in advance. The developed SII complements the existing methods in all these aspects.

Research limitations/implications

The only limitation which is also the limitation for many other biometric identification methods is that each object (e.g. individual in human face identification) must have a sufficient number of training samples collected before the method works well.

Practical implications

SII is particularly suitable in law enforcement and/or intelligence applications in which it is difficult or impossible to collect data in a standard, “clean” environment.

Originality/value

The SII method is new, and the paper should be interesting to researchers or engineers in this area, and should also be interesting to companies developing any biometrics‐based identification technologies as well as government agencies.

Details

Sensor Review, vol. 26 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Available. Content available
Article
Publication date: 1 June 1998

154

Abstract

Details

Sensor Review, vol. 18 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Access Restricted. View access options
Article
Publication date: 20 March 2007

Peter Jones, Peter Williams, David Hillier and Daphne Comfort

The purpose of this paper is to offer a preliminary assessment of the potential role for biometrics within the retail sector of the economy.

3239

Abstract

Purpose

The purpose of this paper is to offer a preliminary assessment of the potential role for biometrics within the retail sector of the economy.

Design/methodology/approach

The paper begins with an outline of the origin and characteristics of biometrics and this is followed by a review of the possible retail applications and an outline of the current barriers to widespread adoption. The paper draws its empirical material from trade sources available on the internet.

Findings

The findings reveal that biometrics has a number of potential applications within retailing including combating identity theft, increasing transaction speed at the point of sale, reducing transaction processing costs for retailers and the development of more individually tailored marketing and customer loyalty systems. However, a number of major barriers need to be overcome if biometrics are to become an integral part of the retail scene. These include acquisition and installation costs, doubts about the accuracy and performance of biometric technologies and public concerns about personal privacy and civil liberties.

Originality/value

The paper offers an accessible review of the potential application of biometrics within retailing, which will interest academics working in retail, business and management and information technology departments in universities and colleges and students studying in these disciplines.

Details

International Journal of Retail & Distribution Management, vol. 35 no. 3
Type: Research Article
ISSN: 0959-0552

Keywords

1 – 10 of over 1000
Per page
102050