Tuesday, December 31, 2019
Designing A Inventory System For Nike - 1390 Words
My company, partners with businesses and present systems that contributes to their overall effectiveness. Recently, I had the privilege of attending a Microsoft conference that introduced Nikeââ¬â¢s Chairman, President and CEO, Mark Parker as the guest speaker. Apparently, due to, demand fluctuations and stiff competition, Nike possess an abundance of excess inventory. Upon hearing this startling revelation, I immediately thought about the Adapting Supply Chains to Tough Times, case study I read the other day. However, the problem that I discovered with Nike is that it has multiple locations, that all have different inventory needs. For instance, the Air Jordan X Retro ââ¬Å"OVOâ⬠might sell well on the west coast, but not as well in the east. Therefore, my dilemma was to incorporate components of inventory management that would fit every location. Obviously, I had already begun envisioning an effective inventory system for Nike before being asked to do so. Luckily, after t he conference, Microsoft supplied lunch, which was a Godsend since my stomach was emitting embarrassing sounds. At any rate, since I have an affiliation with Bill Gates, I was assigned a seat at his table. By chance, Mark Parker was also assigned to the table, as a matter of fact, he sat right next to me. Clearly, it would not be proper etiquette for me to start discussing business after introducing myself. Therefore, I took the time to learn a bit more about Mark. First, he joined Nike in 1979 and from that pointShow MoreRelatedDesigning A Inventory System For Nike1407 Words à |à 6 Pages My company, partners with businesses and present management systems that help companies become more efficient. Recently, I had the privilege of attending a Microsoft conference that introduced Nikeââ¬â¢s Chairman, President and CEO, Mark Parker as the guest speaker. Apparently, due to, demand fluctuations and stiff competition, Nike has an abundance of excess inventory. Upon hearing this startling revelation, I immediately thought about the Adapting Supply Chains to Tough Times, case study I read theRead Morescope of technology Essay932 Words à |à 4 Pagesmaterials; third, technological products or artifacts; fourth, end, intention or functions; fifth, background knowledge; and lastly, social context in which the technology is designed, developed, used, and disposed of, and the artifact that I will apply is Nike. In Children of Invention Revisited by Winston, he describes technology in three different ways in reference to the artifact I selected. First, Winston clearly defines technology as ââ¬Å"the organization of knowledge, people, and things to accomplishRead MoreNike Marketing Strategy Review1044 Words à |à 5 PagesMurad Tahirov Marketing Spotlight-Nike The Nike story begins with its founder, running enthusiast Phil Knight. In 1962, Knight started Blue Ribbon Sports, the precursor to Nike. At the time, the athletic shoe industry was dominated by two German companies, Adidas and Puma. Knight recognized a neglected segment of serious athletes whose specialized needs were not being addressed. The concept was simple: Provide high-quality running shoes designed especially for athletes by athletes. KnightRead MoreThe Main Influences On Operation Management1112 Words à |à 5 PagesOperations management is an area of management concerned with overseeing, designing, and controlling the process of production and redesigning business operations in the production of goods or services. The main influences on operation management include; ï ¶ Globalisation ï ¶ Technology ï ¶ Quality expectation ï ¶ Cost-based competition ï ¶ Government policies ï ¶ Legal regulation ï ¶ Environmental sustainability ï ¶ Cooperate social responsibility (CSR) Globalisation Globalisation is the change in a businessRead MoreOperation Management: Chapter 7 ââ¬â Capacity and Facilities Design1516 Words à |à 7 Pagesactivities, processes, departments, workstations, storage areas, aisles, and common areas within an existing or proposed facility. The basic objective of the layout decision is to ensure a smooth flow of work, material, people and information through the system. We can list five goals of facility layout such as the following: 1. Eliminate wasted or redundant movement We can take Wal-mart as an example. Wal-mart is one company who has a great successful by using process layout. They group similar activitiesRead MoreAnnotated Bibliography On Information Systems9488 Words à |à 38 PagesThe Overview of Information Systems Jerry Gonzalez In Chapter 1, it covers up the overview of information systems meaning explaining the differences of computer literacy and information literacy. We know that computer literacy is defined as a person who is very skilled in using microsoft word, excel, powerpoint, outlook, etc. Computers are everywhere among us to use for personal daily lives. They are used for students to do their personal homework, grading for exams, evaluations, and can even canRead MoreWhy Nike Is An International Company2273 Words à |à 10 PagesIntroduction Nike is an international company which specializes in designing, making and selling athletic footwear. The company specializes in designing high-quality products which are used worldwide by many people. Apart from being used in athletic and basketball games, the company s products are used as casual wears. Apart from making and selling footwear, the company also offers a wide range of services to its customers and also sells both equipment and their accessories. The company has well-organizedRead MoreThe Green Supply Chain Management1533 Words à |à 7 Pagestrending in various organisations involved in supply chain business. The green supply chain management is the process of combination of environment protection and day to day supply chain management, including its different parts like material sourcing, designing of product, selection of material, manufacturing process and delivery of the final item to the customers. Green supply chain management relates to manufacturing wide ran ge of products from or recyclable and destroyable products. This is similar toRead MoreNike Erp2332 Words à |à 10 PagesCase Study: Nike ERP Implementation Nike shoe division grew and spread rapidly around the globe from its inception in 1972 through 1998. Yet in 1999, Nike realized that in order to keep up with the growing demands of their products, and specifically their Air Jordan line of basketball shoes, they would have to make changes in the way they forecasted and projected demands and distributed their products. Eventually it was decided that these changes would take place in the form of the implementationRead MoreNike Brand equity2888 Words à |à 12 PagesIntroductionNike Corporation was incorporated in 1968. In their thirty-four year history, Nike has primarily been in the business of designing, developing, and marketing athletic footwear, attire, equipment and accessories, à ° lot of companies go out on a limb when it comes to business decision or management strategies with Nike Corporation. Nike is à ° powerful company. Nike Corporation is a well managed company in à ° striking industry, the company has a strong brand image, and they are effectively
Sunday, December 22, 2019
Parental Responsibility Laws A Burden On Society
Parental Responsibility Laws: A Burden on Society When a person enters the world of parenthood some real responsibilities are to be expected. A parent is responsible for their childrenââ¬â¢s life and wellbeing, as well as their own. Eventually there comes a time in every parentââ¬â¢s life when their little baby is no longer little, or a baby for that matter. That child will grow, learn, influence, and be influenced by many people on their journey from child to adult. Some of the decisions they make may actually break local, state, or in serious cases federal law. Since the 1800ââ¬â¢s there has been a push to establish Parent Responsibility laws, which hold bad parents accountable for the criminal actions for their child. These laws punish parentsâ⬠¦show more contentâ⬠¦Many parents realize the struggle of how impossible it is to know the exact location or activity of their children as they get older and require space and privacy to develop their sense of self. These laws donââ¬â¢t take into consideration that chi ldren need to explore and discover their own path in life, requiring time away from parents. So why are parents being punished for the decisions their child made, if nature is just taking its course? Le Sage continues to argue that, ââ¬Å"It should be determined that the moral development of the youngster is deficient or stagnated. After all, if there is no reason to think that there is any developmental delay or shortcoming, then there is no reason to believe that this youngster lacked moral education.â⬠(Le Sage) If a child does not lack moral education how can we possibly pass the blame onto someone else; and if a child does not have a mental deficiency, then shouldnââ¬â¢t they be held accountable for their own actions. These are important factors to consider before placing the blame of a juveniles own actions on their parents. If a child has no impairments or ailments proper education would go further in teaching these kids a lesson than fining or jailing the parents because, they actually have an opportunity to see the mistakes they made and allow them to correct the negative behavior by offering support Many of these parentShow MoreRelatedEssay on Working Women, the Government, and Politics1613 Words à |à 7 Pagessecond shift. Complete dedication is expected both in the workplace and in the home, and little support is provided by the opposite sex and the government. If the government acquired a larger responsibility for working families, it could implement several policies that have already proven to alleviate the burden on working women and promote gender equality in other industrialized nations. In recent decades, there has been a visible influx of women in the workforce-many of whom are also mothers. InRead MoreShould Parents Leave For Unpaid Leave? Essay1621 Words à |à 7 PagesFirst, it is important to emphasize why parental leave needs not only be available but why it also needs to be paid. An unpaid leave can be very expensive for most people. Providing only unpaid leave would defeat the purpose of having it in the first place because most would not even use it. In a survey by the Boston College Centre for Work and Family, they found that 86% of men would take paternity leave if it paid at least 70% of their wages. (Citation, n. pag.) On the other hand, women withoutRead MoreGender Inequality and Family Structure800 Words à |à 4 Pagesform of categorization among society. The problem is not that gender is a differentiating category, but that the female gender is exploited through both benevolent and hostile sexism that creates unequal conditions. Given the biology of males and females, physically and neurologically, it is not farfetched to assume that it is natural for men and women to have tendencies associated with different social roles. Attitudes and behaviors shape how people define parental roles and family structure. FamilyRead MoreCurrent Housing Policies For Homeless Youth1281 Words à |à 6 Pages According to the 2014 Department of Housing and Urban Development statistics, 34% of the total homeless population of America are under 24 years old (HUD 2014). Although HUD recognizes that this is an alarming number, current housing laws offer little protection for homeless youth. Young people in America face homelessness due to financial issues, lack of family support or insufficient housing. Many of these homeless youth are on their own and are enrolled in college and since theRead MoreChildren Affected by Divorce1661 Words à |à 7 Pages1996, the Family Law Reform Act 1995 came into effect amending certain sections of the Family Law Act 1975, in particular, those relating to the care of children involved in divorce situations. The object of these amendments, according to the new act, was to ensure two things. Firstly, that the children may receive adequate and proper parenting to help them achieve their full potential, and secondly, to ensure that parents fulfil their duties, and meet their responsibilities, concerning the careRead MoreThe Eternal Effects of Cyber Bullying1196 Words à |à 5 PagesStates, since 2010, have developed laws and policies for the prevention of bullying that protect children, however, the government Stop Bullying campaign reports, At present, no federal law directly addresses bullying. In some cases, bullying overlaps with discriminatory harassment, which is covered under federal civil rights laws enforced by the U.S. Department of Education (ED) and the U.S. Department of Justice (DOJ). (Home) It is to question the absence of federal laws for the protection of minorsRead MoreRelationship Between Parents And Parents Spend More Time With Their Children1309 Words à |à 6 PagesSimple causal relationship tells of the varied effects to society when parents spend more time with their children. Again, the report by Gerard Clark from New Zealand puts into words some of these effects. He pointed out how secure attachment formed in the early months, between parent and child, is a ââ¬Å"predictor of resilience in later lifeâ⬠. He also pointed to how many adolescent issues like crime, drug abuse, and mental health have their roots in early childhood. In an article for The WashingtonRead MoreCivic Duties of Teenagers1459 Words à |à 6 Pageswe found it. Every person in our country has rights, and with those rights come responsibilities. That is what civic duty is, your rights and responsibilities that help contribute to society. Every single day we perform these tasks to help better our country as a whole. Teenagers have a huge role in this circle, whether they believe it or not. The civic duties that teenagers perform are a crucial part of our society, because they are the ones who grow up to be the next generation. Rights of a TeenagerRead MoreCase Study : Kathryn Mcneil1173 Words à |à 5 Pagesworkplace regarding the nonperformance of a single mother whose work was suffering because of the tremendous additional burden of raising a child. The case was written in 1994 but in the intervening years significant decisions have been made by the law (in the US) protecting the rights of the single mother. The debate is no longer exclusively about professionalism versus corporate responsibility but the new phenomenon of a third gender in the workplace. History The primary figure in the case is CharlesRead MoreTeen Vandalism...Who Pays? Essay1278 Words à |à 6 Pagesand lack of morals and values, parents who maintain by law, total accountability of their children owe it to their community to pay for all costs incurred. The repercussions of family embarrassment may, in the long run teach not only the children how to obey authority through implemented rules and regulations, but it may also cause the parents to ultimately learn that their parenting skills need to align with acceptable standards of society. When faced with hundreds of dollars in court cost, legal
Saturday, December 14, 2019
Apple Analysis Free Essays
Apple Business Analysis As a mutual fund manager, the decision to invest or not to invest in a company is one that entails thorough research of a companyââ¬â¢s assets, business practices, and their way ahead. As a mutual fund investor, I want to invest in a businesses with high return on investments and businesses that need collateral but will not hinder my business. I will conduct a detailed analysis of their brand, stakeholders, customers, products, business ownership, and a SWOT analysis. We will write a custom essay sample on Apple Analysis or any similar topic only for you Order Now Background Information Apple was founded by Steven Jobs, Stephen Wozniak, and Ronald Wayne in 1976, they launched their first computer in 1977 in which they earned over $100 million by 1980. In 1984, Apple introduced the Macintosh, the first personal computer with a mouse, which was very unsuccessful in the beginning. Steven Jobs left Apple but returned to work there in 1997. Apple created very innovative products such as the iPod, iMac, iPhone, and iTunes. Apple is known for technologically advanced innovative products, which in return allows them to market their products at high dollar value and create a high demand. With the resignation and death of Steven Jobs, the future of Apple is unpredictable. SWOT Analysis (Strengths, Weaknesses, Opportunities, Threats) Strengths Appleââ¬â¢s products are leading the way in design, reliability, longevity, uniqueness, and development. Products such as the iPhone, iPad, Mac, and the iPod have become the forefront in their specific arenas. Apple is known for creating innovative products that attract to people of all ages. Unlike many other companies, Apple is involved with every aspect of their product from the design to the software on the products. With the variety of products offered by Apple, they have very many loyal customers whom can use Apple for all of their IT needs. This is important when branding a product with all of the variety choices of electronics offered. In addition, Apple has capitalized on their products by making them easily accessible to their consumers. The implementation of iTunes, a proprietary digital media player application, used for playing and organizing digital music and video files (Wikipedia), which is also compatible with Windows, has enhanced their level of distribution to adults and children. According to datamonitor, Apple is urrently the largest technology company in terms of market capitalization. Weaknesses One of the most notable weaknesses was Steven Jobs resignation in August and his death in October. Job was considered the backbone of Apple and is hugely responsible for the success of the company over the past decade. Apple products are quite pricey compared to their competitorsââ¬â ¢ products, which may keep them from obtaining or retaining clientele. With the current state of our economy, many customers cannot afford to pay more for a product especially when there is a similar more affordable product available. Considering Apple does all of the designing of the hardware with their products, many apple products are not compatible with Microsoft. A huge example of this is the inability to use Microsoft office on many Apple products. Perhaps if Apple branched out and expanded their research and development, they could have more products that are interchangeably adaptable/compatible. Opportunities Apple has the opportunity to expand their iPhone to other retailers such as Sprint and T-Mobile rather than just limiting it to ATT and Verizon. The iPhone has proven to be a very successful product even with all of the defects they have had to fix over the years, and it can present huge expansion opportunities. Appleââ¬â¢s Mac computers and notebooks have been a huge success and are known for their virus free operating systems. Apple should take advantage of this and expand more into the European and Asian markets which could help capitalize their profits. With the increase emphasis on eco-friendly products, this market is only growing and can open the doors for Apple to expand even more. Threats Apple is in constant competition with PC competitors such as Dell, Microsoft, and HP, and on the mobile side, Motorola, Nokia, and Samsung. Both sides of their competition offer more affordable products and many times pick up the slack where Apple failed at. An example of this is the Google TV and the Android by Motorola. Also, many companies have latched out to businesses and become their primary source of equipment, however because Apple products are not compatible with Microsoft office, it prevents them from successfully entering this market. The companyââ¬â¢s internal and external stakeholders According to the U. S. Department of Interior, a stakeholder is any individual or group that has an interest in a decision or actions of the company. The stakeholders can have authority or decision-making power, affected by the decisions, and is a part of the implementation process. The internal stakeholders are the employees and the companyââ¬â¢s owners. When Steve Jobs resigned, Tim Cook became the new CEO of Apple. As the CEO you are responsible for making sound decisions that do not hurt your company and its employees. In conjunction with the CEO, the managers, researchers, developers, partners, and all other employees are internal stakeholders as well. The employeeââ¬â¢s needs are that they have good working conditions and reasonable benefits package to keep them employed. With the success of Apple over the last few years, it is safe to say that Apple as a company is meeting the needs of their personnel. The external stakeholders are the customers, suppliers, and the government. The customers ultimately make or break the success of a company because they are the ones that have to be impressed enough to buy the products. Customers expect great service, superior products, and reasonable prices. Apple has listened to their customersââ¬â¢ needs and implemented various services to ensure they are satisfied with their products. Apple is a consumer of their suppliers, therefore, the suppliers need to make sure that Apple is happy with their services, and in return Apple will continue to utilize them. Another external stakeholder we sometimes forget about are the government and media outlets. As we all know the media plays a huge role in the success or failure of a company. Apple has experienced both sides of the media, and with the tragic death of Steven Jobs, the media has focused huge amounts of attention on Apple which could turn into a positive outcome. With the economic crisis we are going through, the government expects Apple to create jobs to help strengthen our economy and they also have the ability to raise taxes that Apple pays. In conclusion, Apple has very loyal customers and as long as they keep working to create and perfect their products, they will always remain a stiff competitor. With Appleââ¬â¢s plans to expand and diversity to integrate into other markets shareholders and stakeholders have nothing to worry about. References U. S. Department of Interior. (). What is a Stakeholder. Retrieved from http://mits. doi. gov/cadr/toolkit/stakeholder_index. cfm Apple Inc Company Overview. (2011). Retrieved from http://www. datamonitor. com/store/Product/apple_inc? productid=5B0A0C20-9BB6-4284-A575-AC0F2261F45C Wikipeida. (2011). Apple Inc. . Retrieved from http://en. wikipedia. org/wiki/Apple_Inc. How to cite Apple Analysis, Papers
Friday, December 6, 2019
Trend of Biometric Authentication System in Australia â⬠Free Samples
Question: Discuss about the Trend of Biometric Authentication System in Australia. Answer: Introduction Information technology is the key factor for the present business scenario. In todays world, innovation helps the organizations to stay ahead in the competition. Organizations can promote innovations only with having efficient and effective information technology systems (Nambisan, 2014). It is been seen that, organizations having adopted latest and effective information technologies in their business have stayed ahead in the competition, acquiring more number of market shares. Information technologies help in business growth, customer service and satisfaction, effective human resources management and optimal utilization of resources available with the organizations (Wagner, 2014). However, in the present business scenario, business organizations not only should concentrate on their core business activities, but also give an effort on their security formulations. Security is one of the prime concerns for not only the organizations, but also for the entire society in todays world. In this case, also information technology plays a key role by introducing innovative solutions to address this issue. Biometric authentication system is one such technological solution to address the security concerns (Jain, 2012). According to the Australian Signals Directorate, nine hundred and forty online issues are being responded. Therefore, in Australia, there is an upward rising trend to adopt biometric authentication systems. This report will discuss about the concept and application of biometric authentication system in the business scenario. Security concerns of the organizations will also be discussed here in this report. Literature review will be conducted to gain an idea about the perception of the Australians towards biometric authentication systems. Methodology and limitations to be faced during the research for this report will be stated here. Role of information technology in organizational success Information technology helps in prompt decision making by providing speed and accuracy throughout the organizational structure. Information technology helps in gathering information or data regarding any phenomenon in the market and enables the organizations to implement the marketing strategies according to that. Technologies such as customer relationship management help in providing better services to the customers leading to customer satisfaction and retention (Khodakarami, 2014). It also enables the organizations to determine the current taste and preference patterns of the customers. It is quite a difficult task for the higher management of any large organizations to allocate all the resources manually. Technologies such as ERP can help the organizations to implement an optimal resource management. Data management also is benefitted from the inflow of technologies. Entire data and information of the organizations can be stored and retrieved from a single computer without having to maintain all of these manually. Security issues faced by the organizations Nowadays, organizations not only face physical threats but also threats in the form of software bugs and other online breaches. Gone are the days when all the informations and data were being stored manually in physical written format. Organizations nowadays store their data in the data servers, which is prone to security threats if not properly secured. On the other hand, employees intentionally can inject malware in the data systems for theft (Gonzalez, 2012). Security breaches by the rivals firms are also a major security concerns. In terms of physical security also, it is essential to keep a tab about the incoming and outgoing people in the organizations. It will be a hectic and time-consuming task to commence. Breach in terms of identification is also a concern for the organizations. Most of the organizations constitute different departments having different responsibilities associated with them. However, it is difficult for the organizations to check the responsibilities of individual employees and keep a vigil on their activities. These types of security breaches will have a negative impact on the business organizations (Zafar, 2012). It will lead to the leakage of secret information of the organizations to their competitors, tarnishing the image in the industry, leakage of business policies and strategies and eventually affects the goodwill and revenue turnover of the organizations. Therefore, it is of utmost need to adopt precautionary measures such as biometric authentication systems to avoid these kinds of security threats. Trend of using Bio-metric authentication system in Australia More and more organizations such as banks, financial institutions and other corporate from various sectors are coming up with the biometric authentication systems in Australia. Banks are promoting these technologies to ensure more security in their online transactions. Several organizations are implementing biometrics to monitor their employees and to prevent unwanted trespassing in the organizations. Several computers and mobile manufacturers are also coming up with biometric technologies such as fingerprint scanner and voice scanner (Saevanee, 2012). Therefore, Australians are increasingly adopting biometric authentication systems in their daily life. On the other hand, existing security systems are more time consuming and having less safety features. These all factors are contributing in maintaining the upward trend of using biometric authentication systems in Australia. Concept of Biometric authentication Biometric authentication system is one of the latest technologies adopted by number of organizations to address their security concerns. This system captures and verify based on biological traits of any individuals. Biological identities such as, eyes, face recognition, palm and face are being used for the purpose of surveillance (Li, 2012). It first captures these traits of an individual and afterwards grants access to him by matching his current traits with the pre-recorded ones. It is one of the most reliable and secured authentication methods available with the organizations. Biometric systems are more convenient and less time-consuming process than the existing security systems. The chance of cheating or fraud is also less compared to the existing security systems. Accuracy level is also high than any other conventional security systems. Biometric authentication has various kinds of forms used by different organizations. Finger scan technology: This technology uses the finger impressions of the individuals for verifications. A finger print scanner captures an image of the impression of fingers and verifies this recorded image with the current image for authentication (Hasan, 2013). Finger scan technology is of two types, minutiae-based and correlation based. It is perfect for an internal environment where it can be operated by minimal training. Most of the executive firms rely on this biometrical method having low initial cost and small size. Voice scan technology: Voice recognition technology is another form of biometric authentication where the voices of the individuals are been recognized and used for the verification purpose (Novack, 2017). It is one of the easiest ways to adopt as computers and mobiles are already been equipped with microphone. However, it has some issues such as non-acceptance due to the variations in the surrounding noise. Facial scan technology: It recognizes the facial characteristics such as, eye sockets and side of the mouth for verification. It uses camera to recognize and verify any facial expression of the individuals. It also poses some shortcomings, such as; it cannot detect a face if the pre recorded face is altered due to some external factors. Palm scan technology: It is similar to the finger scanning but in a more broad context. Palm scan technology verifies the texture, wrinkles and ridges of the entire palm (Lee, 2012). It is the most accessible biometric verification technology among all. Finger scanning can have issues like worn out fingers, which can be overcome by palm scan verification. Iris scan technology: It is the most advanced and accurate biometric technology available with the organizations. Iris scan technology analyzes the elements around the pupil of a human eye (Bowyer, 2013). It serves most accurate outcomes when it comes to biometric verification. Signature scan technology: It can be termed as digital signature also. It analyzes the individual signatures static shape along with the pressure and speed possessed by the individual when signing (Pansare, 2012). It is one of the most convenient forms of biometric authentication systems. People will be more comfortable with this verification system as they have to do their traditional way of signature without having to have knowledge about any complex technicalities. Applications of Biometric authentication With the availability of various types of biometric authentication systems, they are been applied for different tasks and in different sectors. The applicability of biometric application is increasing with time. However, the existing applications of biometric systems are already quite diverse in nature (Zhang, 2012). The most popular method of application of biometric systems is to use it for entry access. Most of the organizations use this technology for permitting physical access inside particular premises. Biometric authentication systems are the most effective way for the organizations to keep away any unwanted people from their premises (Norris-Jones, 2012). Present business scenario is entirely depended on internet. More and more opportunities poured in due to internet for the business establishments along with some threats and risks also. Minor security gap in the internet can affect the organizations very badly. Therefore, to avoid these types of risks, more organizations are coming up with biometric authentication systems for their online activities. This will filter out any probable security threats. E-commerce sectors as well as online banking now promote biometric authentication systems for added safety. E-commerce sectors applying biometric systems to verify the identity of the traders (Mahto, 2015). Banks are promoting biometric systems for safe and secured cash transactions. Online banking is more susceptible to fraud. Hence, biometric systems are essential for these sectors (Tassabehji, 2012). Computer manufacturers are coming up with security features such as, retina scanning system and finger print scanner (Meng, 2012). These new types of security features are replacing the age-old system of complex and difficult passwords. Biometric systems are more secure and convenient compared to traditional security systems. Terrorism and illegal immigration are one of prime concerns for the world today. The immigration departments of various countries are facing the heat due to this issue. They are now implementing biometric authentication systems to filter out the illegal immigrants without having harassment of the legitimate travelers (Gold, 2012). Biometric authentication systems are being used for the national identity in several countries (Campisi, 2013). All the details of the individuals are being taken along with the fingerprint and retina scan. This ensures avoidance of any types of fraud during elections. Biometric systems are also being used for monitoring the actions of the employees. The entry and exit of the employees can be noted by using biometric systems. It will also prove convenient for the employees. Any types of cheatings can be avoided and the maintenance cost of the organizations can be reduced. Criticisms of biometric authentication systems Biometrics is being widely used worldwide and is an increasing trend around the world for its benefits. However, it also constitutes a few demerits also (Sayoud, 2013). Biometric systems are more expensive than the traditional security systems. Installation systems are also quite complex with the addition of different hardware. Technologies cannot be 100 percent accurate, so do biometrics. The face detection or the fingerprint scanning performance can fluctuates in different environments. Fear of online bugs and malware is also applicable for biometrics also. The effectiveness of biometrics can be tampered by infecting the systems with bugs and malware. Voice recognition systems may not recognize the voice of a person having cold. Face detection systems can also fail if the facial characteristics of the person have been changed due to the change in his hairstyle or any other reasons (Lu, 2012). These disadvantages of biometric authentication systems are the barrier to implement it in a broad manner. Literature review Research regarding public attitudes for biometric technologies states that, more of the Australians are comfortable with biometric technologies associated with security purpose. They are not positive about adopting biometrics in daily life such as, marketing and transport purposes. Australians consider these technologies as security measures only rather than a concept for daily life. A survey conducted by the Australian Bureau of Statistics for biannual Unisys Security Index found that 75 percent of respondents are willing to adopt biometric systems for the identification in the boarding gate of an airport (Farrell, 2016). However, only 63 percent of the same respondents are reluctant to provide biometric details for any retail offers in the airport. This survey had been conducted from randomly selected 1201 respondents. Another survey conducted by Newspoll, shows the attitude of the Australians towards the face recognition technology. It shows that, 95 percent respondents support these technologies for immigration purposes and for assistance to the police. However, 71 percent of respondents are supporting facial recognition technologies in the workplace. This is a significant reduction in favoring these technologies. Only 38 percent are been positive about using these technologies in the social networking site such as Face book. Therefore, this survey also shows the unwillingness of the Australians in adopting biometrics in their social life. Outcome of Australian Unisys survey shows that Australians are more comfortable in providing the biometrics in the public sectors. Majority of respondents are comfortable with the biometrics in Medicare, Australian Taxation Office, accessing bank records, health records and various welfare payments. However, they are reluctant to accept biometrics in clubs, public transport and any educational organizations. Similar kinds of outcomes are found in nationally representative survey conducted on one thousand and forty six respondents. This survey also shows that nearly 88 percent of respondents are comfortable about providing the details of biometrics for verification of passports. 82 percent supports biometrics for airport check-ins and another 77 percent are supporting these technologies to obtain drivers license. Research methodologies Researches discussed in the literature review had all the respondents above 18 years of age. This report will have the respondents below 18 years also. The main logic behind this concept is to have the idea of the younger generation also, who are more positive towards new technologies. They also represent the future of the country. Therefore, their responses can be considered as the future prospects or attitude of Australia. Several surveys had been done in a particular area or region, which cannot represents the attitude of the whole country. Therefore, an ideal research report on this topic should have the respondents covering all areas. All the existing researches show the percentage of people having positive and negative attitude for biometrics without stating the reasons for the negative attitude. This report will put on effort on finding the reasons or causes for being uncomfortable towards the biometrics. Open-ended questions will be there to broaden the extent of the ideology of the respondents. These reasons will help to identify and overcome the shortcomings associated with the biometrics. Discussion The above review of the literature shows that biometric authentication systems have still more to go. Australians are considering these technologies as a security tool. Hence, they are not willing to adopt these technologies in their daily life due to the fear of sacrificing privacy. Some valid and some misconceptions regarding biometric systems are barring the people from accepting it. This issue can be solved only by determining and analyzing all the probable reasons for non-acceptance of these technologies from the perspective of the people. Therefore, this report will adopt the most effective methodology after analyzing the shortcomings of the existing researches. This report will concentrate more on the open-ended questions rather than the close-ended questions (Lewis, 2015). This will help to determine the mindset of the respondents regarding the acceptance of biometrics over which probable recommendations can be suggested. However, this research may have some kind of limitatio ns. This research report has broadened the topic, the trend of biometrics authentication in Australia by including open-ended questions. This will lead to heterogeneous response from the respondents, which may be difficult or will pose a challenge during analysis. Research reports will be more accurate and effective with the increase in the size of the sample. However, this report will have a preset sample size, which may affects in its outcome. Scope of discussion is also limited in this report due to lack of previous experience in conducting research analysis. However, the findings from this report can lead to further research in the future. This research report will help to determine the reasons behind accepting and not accepting the concept of biometrics by the Australians. Further researches can be conducted on the probable recommendations to reduce the non-acceptance of biometrics. Consecutive researches can address the issues associated with these technologies and can suggest an optimal solution. Conclusion Technologies are the key part for any organizations in the present business scenario. There is no way of rejecting technologies from the perspective of the organizations for having a few demerits. Biometric authentication system is an emerging technology with having the potential to change the whole scenario of the security systems of the organizations. This report analyzed all the probable aspects of biometric authentication systems. It concludes that biometric systems is a huge leap from the existing security systems but it need to address all the drawbacks before being holistically implemented. This report analyzed various literatures related to this issue to gain an understanding about the perception of the Australians towards biometric systems. Literature review shows that major numbers of people are still uncomfortable with the concept of biometric systems. They are still not confident about the accuracy and security of these technologies. Therefore, this report proposed an ideal research structure to determine the reasons behind the non-acceptance of biometric systems. It also shows that Australians are willing to have the biometric systems only for the security purposes rather in the daily life. It is being recommended that overcoming the drawbacks and making people realized about the advantages of biometric system will help to gain positivity. If the biometric systems can be made accurate and full proof, then it has the potential to be the new face of security systems of the organizations around the world. References Bowyer, K. W. (2013). A survey of iris biometrics research: 2008-2010. Handbook of iris recognition , 15-54. Campisi, P. (2013). Security and privacy in biometrics: towards a holistic approach. Security and Privacy in Biometrics , 1-23. Farrell, S. (2016). How airports can fly to self-service biometrics. Biometric Technology Today , 5-7. Gold, S. (2012). Border control biometrics and surveillance. Biometric Technology Today , 9-11. Gonzalez, N. M. (2012). A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications , 11. Hasan, H. .-K. (2013). Fingerprint image enhancement and recognition algorithms: a survey. Neural Computing and Applications , 1605-1610. Jain, A. K. (2012). Biometric recognition: an overview. In In Second Generation Biometrics: The Ethical, Legal and Social Context (pp. 49-79). Springer Netherlands. Khodakarami, F. . (2014). Exploring the role of customer relationship management (CRM)systems in customer knowledge creation. Information Management , 27-42. Lee, J. C. (2012). A novel biometric system based on palm vein image. Pattern Recognition Letters , 1520-1528. Lewis, S. (2015). Qualitative inquiry and research design: Choosing among five approaches. Health promotion practice . Li, Y. L. (2012). Context aware biometric authentication. Washington. Lu, Y. Z. (2012). A survey of face detection, extraction and recognition. Computing and informatics , 163-195. Mahto, D. . (2015). Enhancing security of one-time password using elliptic curve crypotography with biometrics for e-commerce applications. Computer, Communication, Control and Information Technology (C3IT) , 1-6. Meng, Y. W. (2012). Touch gestures based biometric authentication scheme for touchscreen mobile phones. International Conferance on Information Security and Cryptology , 331-350. Nambisan, S. L. (2014). Information Technology and Innovation. IT and Innovation . Norris-Jones, L. (2012). Biometric access control in the workplace: benefit or bind? International Journal of Information Technology and Management , 61-71. Novack, B. M. (2017). Voice over IP based biometric authentication. Washington: U. S. Patent and Trademark Office. Pansare, A. . (2012). Handwritten signature verification using neural network. International Journal of Applied Information Systems , 44-49. Saevanee, H. C. (2012). Multi-modal behavioural biometric authentication for mobile devices. In IFIP International Information Security Conference , 465-474. Sayoud, H. (2013). Biometrics: An Overview on New Technologies. Moral, Ethical, and Social Dilemmas in the age of Technology: Theories and Practice , 80. Tassabehji, R. . (2012). Evaluating biometrics for online banking: The case for usability. International Journal of Information Management , 489-494. Wagner, H. T. (2014). How social capital among information technology and business units drives operational alignment and IT business value. Journal of Management Information Systems , 241-272. Zafar, H. K.-B. (2012). Financial impact of information security breaches on breached firms and their non-breached competitors. Information Resources Management Journal (IRMJ) , 21-37. Zhang, D. D. (2012). Biometric solutions: For authentication in an e-world (Vol. 697). Springer Science Business Media.
Subscribe to:
Posts (Atom)