Friday, December 6, 2019

Trend of Biometric Authentication System in Australia †Free Samples

Question: Discuss about the Trend of Biometric Authentication System in Australia. Answer: Introduction Information technology is the key factor for the present business scenario. In todays world, innovation helps the organizations to stay ahead in the competition. Organizations can promote innovations only with having efficient and effective information technology systems (Nambisan, 2014). It is been seen that, organizations having adopted latest and effective information technologies in their business have stayed ahead in the competition, acquiring more number of market shares. Information technologies help in business growth, customer service and satisfaction, effective human resources management and optimal utilization of resources available with the organizations (Wagner, 2014). However, in the present business scenario, business organizations not only should concentrate on their core business activities, but also give an effort on their security formulations. Security is one of the prime concerns for not only the organizations, but also for the entire society in todays world. In this case, also information technology plays a key role by introducing innovative solutions to address this issue. Biometric authentication system is one such technological solution to address the security concerns (Jain, 2012). According to the Australian Signals Directorate, nine hundred and forty online issues are being responded. Therefore, in Australia, there is an upward rising trend to adopt biometric authentication systems. This report will discuss about the concept and application of biometric authentication system in the business scenario. Security concerns of the organizations will also be discussed here in this report. Literature review will be conducted to gain an idea about the perception of the Australians towards biometric authentication systems. Methodology and limitations to be faced during the research for this report will be stated here. Role of information technology in organizational success Information technology helps in prompt decision making by providing speed and accuracy throughout the organizational structure. Information technology helps in gathering information or data regarding any phenomenon in the market and enables the organizations to implement the marketing strategies according to that. Technologies such as customer relationship management help in providing better services to the customers leading to customer satisfaction and retention (Khodakarami, 2014). It also enables the organizations to determine the current taste and preference patterns of the customers. It is quite a difficult task for the higher management of any large organizations to allocate all the resources manually. Technologies such as ERP can help the organizations to implement an optimal resource management. Data management also is benefitted from the inflow of technologies. Entire data and information of the organizations can be stored and retrieved from a single computer without having to maintain all of these manually. Security issues faced by the organizations Nowadays, organizations not only face physical threats but also threats in the form of software bugs and other online breaches. Gone are the days when all the informations and data were being stored manually in physical written format. Organizations nowadays store their data in the data servers, which is prone to security threats if not properly secured. On the other hand, employees intentionally can inject malware in the data systems for theft (Gonzalez, 2012). Security breaches by the rivals firms are also a major security concerns. In terms of physical security also, it is essential to keep a tab about the incoming and outgoing people in the organizations. It will be a hectic and time-consuming task to commence. Breach in terms of identification is also a concern for the organizations. Most of the organizations constitute different departments having different responsibilities associated with them. However, it is difficult for the organizations to check the responsibilities of individual employees and keep a vigil on their activities. These types of security breaches will have a negative impact on the business organizations (Zafar, 2012). It will lead to the leakage of secret information of the organizations to their competitors, tarnishing the image in the industry, leakage of business policies and strategies and eventually affects the goodwill and revenue turnover of the organizations. Therefore, it is of utmost need to adopt precautionary measures such as biometric authentication systems to avoid these kinds of security threats. Trend of using Bio-metric authentication system in Australia More and more organizations such as banks, financial institutions and other corporate from various sectors are coming up with the biometric authentication systems in Australia. Banks are promoting these technologies to ensure more security in their online transactions. Several organizations are implementing biometrics to monitor their employees and to prevent unwanted trespassing in the organizations. Several computers and mobile manufacturers are also coming up with biometric technologies such as fingerprint scanner and voice scanner (Saevanee, 2012). Therefore, Australians are increasingly adopting biometric authentication systems in their daily life. On the other hand, existing security systems are more time consuming and having less safety features. These all factors are contributing in maintaining the upward trend of using biometric authentication systems in Australia. Concept of Biometric authentication Biometric authentication system is one of the latest technologies adopted by number of organizations to address their security concerns. This system captures and verify based on biological traits of any individuals. Biological identities such as, eyes, face recognition, palm and face are being used for the purpose of surveillance (Li, 2012). It first captures these traits of an individual and afterwards grants access to him by matching his current traits with the pre-recorded ones. It is one of the most reliable and secured authentication methods available with the organizations. Biometric systems are more convenient and less time-consuming process than the existing security systems. The chance of cheating or fraud is also less compared to the existing security systems. Accuracy level is also high than any other conventional security systems. Biometric authentication has various kinds of forms used by different organizations. Finger scan technology: This technology uses the finger impressions of the individuals for verifications. A finger print scanner captures an image of the impression of fingers and verifies this recorded image with the current image for authentication (Hasan, 2013). Finger scan technology is of two types, minutiae-based and correlation based. It is perfect for an internal environment where it can be operated by minimal training. Most of the executive firms rely on this biometrical method having low initial cost and small size. Voice scan technology: Voice recognition technology is another form of biometric authentication where the voices of the individuals are been recognized and used for the verification purpose (Novack, 2017). It is one of the easiest ways to adopt as computers and mobiles are already been equipped with microphone. However, it has some issues such as non-acceptance due to the variations in the surrounding noise. Facial scan technology: It recognizes the facial characteristics such as, eye sockets and side of the mouth for verification. It uses camera to recognize and verify any facial expression of the individuals. It also poses some shortcomings, such as; it cannot detect a face if the pre recorded face is altered due to some external factors. Palm scan technology: It is similar to the finger scanning but in a more broad context. Palm scan technology verifies the texture, wrinkles and ridges of the entire palm (Lee, 2012). It is the most accessible biometric verification technology among all. Finger scanning can have issues like worn out fingers, which can be overcome by palm scan verification. Iris scan technology: It is the most advanced and accurate biometric technology available with the organizations. Iris scan technology analyzes the elements around the pupil of a human eye (Bowyer, 2013). It serves most accurate outcomes when it comes to biometric verification. Signature scan technology: It can be termed as digital signature also. It analyzes the individual signatures static shape along with the pressure and speed possessed by the individual when signing (Pansare, 2012). It is one of the most convenient forms of biometric authentication systems. People will be more comfortable with this verification system as they have to do their traditional way of signature without having to have knowledge about any complex technicalities. Applications of Biometric authentication With the availability of various types of biometric authentication systems, they are been applied for different tasks and in different sectors. The applicability of biometric application is increasing with time. However, the existing applications of biometric systems are already quite diverse in nature (Zhang, 2012). The most popular method of application of biometric systems is to use it for entry access. Most of the organizations use this technology for permitting physical access inside particular premises. Biometric authentication systems are the most effective way for the organizations to keep away any unwanted people from their premises (Norris-Jones, 2012). Present business scenario is entirely depended on internet. More and more opportunities poured in due to internet for the business establishments along with some threats and risks also. Minor security gap in the internet can affect the organizations very badly. Therefore, to avoid these types of risks, more organizations are coming up with biometric authentication systems for their online activities. This will filter out any probable security threats. E-commerce sectors as well as online banking now promote biometric authentication systems for added safety. E-commerce sectors applying biometric systems to verify the identity of the traders (Mahto, 2015). Banks are promoting biometric systems for safe and secured cash transactions. Online banking is more susceptible to fraud. Hence, biometric systems are essential for these sectors (Tassabehji, 2012). Computer manufacturers are coming up with security features such as, retina scanning system and finger print scanner (Meng, 2012). These new types of security features are replacing the age-old system of complex and difficult passwords. Biometric systems are more secure and convenient compared to traditional security systems. Terrorism and illegal immigration are one of prime concerns for the world today. The immigration departments of various countries are facing the heat due to this issue. They are now implementing biometric authentication systems to filter out the illegal immigrants without having harassment of the legitimate travelers (Gold, 2012). Biometric authentication systems are being used for the national identity in several countries (Campisi, 2013). All the details of the individuals are being taken along with the fingerprint and retina scan. This ensures avoidance of any types of fraud during elections. Biometric systems are also being used for monitoring the actions of the employees. The entry and exit of the employees can be noted by using biometric systems. It will also prove convenient for the employees. Any types of cheatings can be avoided and the maintenance cost of the organizations can be reduced. Criticisms of biometric authentication systems Biometrics is being widely used worldwide and is an increasing trend around the world for its benefits. However, it also constitutes a few demerits also (Sayoud, 2013). Biometric systems are more expensive than the traditional security systems. Installation systems are also quite complex with the addition of different hardware. Technologies cannot be 100 percent accurate, so do biometrics. The face detection or the fingerprint scanning performance can fluctuates in different environments. Fear of online bugs and malware is also applicable for biometrics also. The effectiveness of biometrics can be tampered by infecting the systems with bugs and malware. Voice recognition systems may not recognize the voice of a person having cold. Face detection systems can also fail if the facial characteristics of the person have been changed due to the change in his hairstyle or any other reasons (Lu, 2012). These disadvantages of biometric authentication systems are the barrier to implement it in a broad manner. Literature review Research regarding public attitudes for biometric technologies states that, more of the Australians are comfortable with biometric technologies associated with security purpose. They are not positive about adopting biometrics in daily life such as, marketing and transport purposes. Australians consider these technologies as security measures only rather than a concept for daily life. A survey conducted by the Australian Bureau of Statistics for biannual Unisys Security Index found that 75 percent of respondents are willing to adopt biometric systems for the identification in the boarding gate of an airport (Farrell, 2016). However, only 63 percent of the same respondents are reluctant to provide biometric details for any retail offers in the airport. This survey had been conducted from randomly selected 1201 respondents. Another survey conducted by Newspoll, shows the attitude of the Australians towards the face recognition technology. It shows that, 95 percent respondents support these technologies for immigration purposes and for assistance to the police. However, 71 percent of respondents are supporting facial recognition technologies in the workplace. This is a significant reduction in favoring these technologies. Only 38 percent are been positive about using these technologies in the social networking site such as Face book. Therefore, this survey also shows the unwillingness of the Australians in adopting biometrics in their social life. Outcome of Australian Unisys survey shows that Australians are more comfortable in providing the biometrics in the public sectors. Majority of respondents are comfortable with the biometrics in Medicare, Australian Taxation Office, accessing bank records, health records and various welfare payments. However, they are reluctant to accept biometrics in clubs, public transport and any educational organizations. Similar kinds of outcomes are found in nationally representative survey conducted on one thousand and forty six respondents. This survey also shows that nearly 88 percent of respondents are comfortable about providing the details of biometrics for verification of passports. 82 percent supports biometrics for airport check-ins and another 77 percent are supporting these technologies to obtain drivers license. Research methodologies Researches discussed in the literature review had all the respondents above 18 years of age. This report will have the respondents below 18 years also. The main logic behind this concept is to have the idea of the younger generation also, who are more positive towards new technologies. They also represent the future of the country. Therefore, their responses can be considered as the future prospects or attitude of Australia. Several surveys had been done in a particular area or region, which cannot represents the attitude of the whole country. Therefore, an ideal research report on this topic should have the respondents covering all areas. All the existing researches show the percentage of people having positive and negative attitude for biometrics without stating the reasons for the negative attitude. This report will put on effort on finding the reasons or causes for being uncomfortable towards the biometrics. Open-ended questions will be there to broaden the extent of the ideology of the respondents. These reasons will help to identify and overcome the shortcomings associated with the biometrics. Discussion The above review of the literature shows that biometric authentication systems have still more to go. Australians are considering these technologies as a security tool. Hence, they are not willing to adopt these technologies in their daily life due to the fear of sacrificing privacy. Some valid and some misconceptions regarding biometric systems are barring the people from accepting it. This issue can be solved only by determining and analyzing all the probable reasons for non-acceptance of these technologies from the perspective of the people. Therefore, this report will adopt the most effective methodology after analyzing the shortcomings of the existing researches. This report will concentrate more on the open-ended questions rather than the close-ended questions (Lewis, 2015). This will help to determine the mindset of the respondents regarding the acceptance of biometrics over which probable recommendations can be suggested. However, this research may have some kind of limitatio ns. This research report has broadened the topic, the trend of biometrics authentication in Australia by including open-ended questions. This will lead to heterogeneous response from the respondents, which may be difficult or will pose a challenge during analysis. Research reports will be more accurate and effective with the increase in the size of the sample. However, this report will have a preset sample size, which may affects in its outcome. Scope of discussion is also limited in this report due to lack of previous experience in conducting research analysis. However, the findings from this report can lead to further research in the future. This research report will help to determine the reasons behind accepting and not accepting the concept of biometrics by the Australians. Further researches can be conducted on the probable recommendations to reduce the non-acceptance of biometrics. Consecutive researches can address the issues associated with these technologies and can suggest an optimal solution. Conclusion Technologies are the key part for any organizations in the present business scenario. There is no way of rejecting technologies from the perspective of the organizations for having a few demerits. Biometric authentication system is an emerging technology with having the potential to change the whole scenario of the security systems of the organizations. This report analyzed all the probable aspects of biometric authentication systems. It concludes that biometric systems is a huge leap from the existing security systems but it need to address all the drawbacks before being holistically implemented. This report analyzed various literatures related to this issue to gain an understanding about the perception of the Australians towards biometric systems. Literature review shows that major numbers of people are still uncomfortable with the concept of biometric systems. They are still not confident about the accuracy and security of these technologies. Therefore, this report proposed an ideal research structure to determine the reasons behind the non-acceptance of biometric systems. It also shows that Australians are willing to have the biometric systems only for the security purposes rather in the daily life. It is being recommended that overcoming the drawbacks and making people realized about the advantages of biometric system will help to gain positivity. If the biometric systems can be made accurate and full proof, then it has the potential to be the new face of security systems of the organizations around the world. References Bowyer, K. W. (2013). A survey of iris biometrics research: 2008-2010. Handbook of iris recognition , 15-54. Campisi, P. (2013). Security and privacy in biometrics: towards a holistic approach. Security and Privacy in Biometrics , 1-23. Farrell, S. (2016). How airports can fly to self-service biometrics. Biometric Technology Today , 5-7. Gold, S. (2012). Border control biometrics and surveillance. Biometric Technology Today , 9-11. Gonzalez, N. M. (2012). A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications , 11. Hasan, H. .-K. (2013). Fingerprint image enhancement and recognition algorithms: a survey. Neural Computing and Applications , 1605-1610. Jain, A. K. (2012). Biometric recognition: an overview. In In Second Generation Biometrics: The Ethical, Legal and Social Context (pp. 49-79). Springer Netherlands. Khodakarami, F. . (2014). Exploring the role of customer relationship management (CRM)systems in customer knowledge creation. Information Management , 27-42. Lee, J. C. (2012). A novel biometric system based on palm vein image. Pattern Recognition Letters , 1520-1528. Lewis, S. (2015). Qualitative inquiry and research design: Choosing among five approaches. Health promotion practice . Li, Y. L. (2012). Context aware biometric authentication. Washington. Lu, Y. Z. (2012). A survey of face detection, extraction and recognition. Computing and informatics , 163-195. Mahto, D. . (2015). Enhancing security of one-time password using elliptic curve crypotography with biometrics for e-commerce applications. Computer, Communication, Control and Information Technology (C3IT) , 1-6. Meng, Y. W. (2012). Touch gestures based biometric authentication scheme for touchscreen mobile phones. International Conferance on Information Security and Cryptology , 331-350. Nambisan, S. L. (2014). Information Technology and Innovation. IT and Innovation . Norris-Jones, L. (2012). Biometric access control in the workplace: benefit or bind? International Journal of Information Technology and Management , 61-71. Novack, B. M. (2017). Voice over IP based biometric authentication. Washington: U. S. Patent and Trademark Office. Pansare, A. . (2012). Handwritten signature verification using neural network. International Journal of Applied Information Systems , 44-49. Saevanee, H. C. (2012). Multi-modal behavioural biometric authentication for mobile devices. In IFIP International Information Security Conference , 465-474. Sayoud, H. (2013). Biometrics: An Overview on New Technologies. Moral, Ethical, and Social Dilemmas in the age of Technology: Theories and Practice , 80. Tassabehji, R. . (2012). Evaluating biometrics for online banking: The case for usability. International Journal of Information Management , 489-494. Wagner, H. T. (2014). How social capital among information technology and business units drives operational alignment and IT business value. Journal of Management Information Systems , 241-272. Zafar, H. K.-B. (2012). Financial impact of information security breaches on breached firms and their non-breached competitors. Information Resources Management Journal (IRMJ) , 21-37. Zhang, D. D. (2012). Biometric solutions: For authentication in an e-world (Vol. 697). Springer Science Business Media.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.