StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Biometrics' Help to Address Crime, Shape Identification, Security - Coursework Example

Cite this document
Summary
This work "Biometrics' Help to Address Crime, Shape Identification, Security and Privacy" describes the development of technologies, beneficial use of biometrics to the society, the influence of security measures. There has been tremendous development in security, identification, privacy, and fight against crime…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
Biometrics Help to Address Crime, Shape Identification, Security
Read Text Preview

Extract of sample "Biometrics' Help to Address Crime, Shape Identification, Security"

HOW BIOMETRICS HAS HELPED ADDRESS CRIME, SHAPE IDENTIFICATION, SECURITY, AND PRIVACY By and University Name City, State Date of Submission Introduction It is no doubt that technology has had a tremendous development in the past few years. In the most recent years, there has been an increasing need to maintain modes of identification, improve on security, privacy, and combat crime. Something notable today is the increased computerization and level of automation in almost every area of societal operations. Since crime is becoming more and more sophisticated, it is required that security is also improved. The increased number of gadgets such as smartphones that are becoming another part of people’s worlds require that the privacy in the gadgets is maintained. To be able to achieve the highest level of privacy, for example, access needs to be limited by the most personal characteristics that make us. The use of biometrics has been very beneficial to the society. It has brought many improvements in areas such as identification, security, privacy, and in combatting crime. A Brief View on Biometrics Simply put, biometrics refer to the metrics that relate to human characteristics. Often known as realistic authentication, it is used in computer science where it acts as a form of identification and access control. Biometrics are also used in surveillance where it helps identify people in groups. In general, biometrics are used to identify distinctive, measurable characteristics that are used to describe individuals. Usually, biometrics are divided into two, those who measure physiological, and those measuring behavioral characteristics. Physiological characteristics measure the ‘physical’ characteristics of the body that relate to its shape. Some of these features include fingerprint, face recognition, palm veins, DNA, hand geometry, iris recognition, odor, and retina (Magnet 2011). Behavioral characteristics, on the other hand, are related to the pattern of behavior of an individual. Some of these include gait, typing rhythm, and voice. Traditionally, means of access control involved the use of identification systems that were token-based, use of passports or driver’s license, knowledge-based identification systems for example passwords or use of personal identification number. Biometrics are more reliable as they are unique to the persons using them. For example, every person on the planet has a unique fingerprint. This means that they can never pass for everyone else. A driver’s license, on the other hand, can be forged. The use of passwords seems to be secure, but they can be hacked. A password can also be shared among a group which means that privacy cannot be guaranteed in its use. More people are supporting the use of biometrics. Still, its use raises a lot of ethical questions as there are those skeptical of where such collected information will ultimately be used. Identification The need for identification of people in the society probably surpasses everything else any government strives to do. Initially, people we identified through the use of passports and so on. Sometime later, governments such as those in Europe and North America started using fingerprints to identify the people. Today, the increased rollout of biometric ID systems holds quite some promise. In any case, there are hundreds of millions of people who lack formal identification and significant obstacle to participation in society. Without proper identification, it is hard to vote, register land or even get a bank account, leave alone accessing loans. Collection of taxes is also very difficult for governments who have no identification for the residents. Some countries such as India, for example, have rolled out some of the most sophisticated identification systems. India’s Universal ID program has scanned irises of over 450 million unregistered citizens winning many plaudits (Gelb & Clark 2013). While most people from the developing world, for example, would want to be identified by the governments due to the benefits associated with it, developed countries have a different story. In the United States and Europe, the worry is not that the government does not know who an individual is, but that it knows too much. Questions about who has the right to collect another person’s data, accesses the data, decides how the data is used, and what would happen in the case where security failed plague the whole biometric issue. Crime It is no doubt that crime is one of the disturbing issues in the society and one that is critical to combat. For police officers and security agents to be able to fight delinquency, they need security systems that would identify everybody that has participated in a crime. Collected biometric information is precious in running forensics and helps nail criminals that had fled a crime scene by the time investigators got to the location. There are several of an individual’s physical attributes that help identify a person who had participated in committing a given felony. In a situation where there were cameras that captured a criminal activity, for example, in the case of bank robbery, the use of the iris as an identification is normally among the most efficient. In such situation, a robber shows up armed in a bank and puts a mask on in that facial recognition would not work. If the person had looked at the camera, then a picture taken of the eyes helps in the identification process, and every person on the planet has unique irises (He et al. 2009). In the case of rape, it is unlikely that there is a camera present in the crime scene. Other collectible evidence includes body hairs, fingerprints and so on which are also very efficient in identifying a criminal. If the criminal were skillful enough to avoid looking at the camera and had gloves on to avoid leaving fingerprints, his/her gait could be used to identify them. This shoes that biometrics have significantly revolutionized combating crime and, therefore, made the society a better place. Security One of the avenues that insurgents and terrorists exploit is anonymity as it protects them giving them operational advantage. If this anonymity could be stripped away, it puts them at a disadvantage whether they operate in the US, Iraq, Somalia or Europe (Baldaccini 2008). Biometric technology is best equipped to give this as it helps provide new types of digital identity data, new and very efficient ways to collect the data, and new opportunities to use it. For example, screening visitors while entering a country helps reduce chances of terrorists entering the country. While biometrics offers the best tools to verify identities of people nationwide and, therefore, enhance the security of a country, they also raise concerns in terms of liberty implication. Biometric technologies help realize security, but they should also be balanced with protection of privacy (Wayman et al. 2005). There are also some other concerns in relation to security offered by biometrics. Initially, people relied on personal identification numbers (PIN numbers) and passwords. They work and are very efficient in securing data. Biometrics, on the other hand, are also as effective. Unlike passwords, people expose their biometrics everywhere they go (Xiao 2005). Photos capturing their irises are everywhere, they leave fingerprints everywhere, and their gait recorded by many cameras even in the streets. This means that for people who would want to use the information maliciously, they can use it. Lifting of fingerprints is common and the greatest threat is if a person has ‘hacked’ a given biometric, then there is no way the owner can change it. In other words, the passwords may be a little better. If a Facebook account was hacked, the owner would only need to change the password. Biometrics, on the other hand, cannot be modified or changed. Privacy Computer science’s use of biometric has seen privacy elevated to a higher level in world’s present time. The fact that one’s metrics can never be otherwise or bleach uniqueness has raised people’s confidence in biometric identifications. People’s confidence and trust they have built upon this identification mode can stand the answer as to why it has been accepted and assimilated by most of the world’s populated countries such as India and USA. Many people, if not all, covet privacy for their personal properties and would die to have it protected. The privacy’s most used biometrics includes; fingerprints, face recognition, iris recognition and hand geometry. Presently, several phone’s manufacturers have assimilated the use of biometric identification. This is evident by the way in which phones are unlocked. The phone’s locking and unlocking system has to identify owner’s fingerprints and some of them facial identity to execute a command (Shi et al. 2011). Apple and Samsung are some of the manufacturers of phones with such ability. This ensures effective privacy to one’s gadget. Hand geometry provides privacy as one cannot have an entry in restricted area such as child day cares, Olympic arenas and so on. However, biometric identification may turn an enemy to a person’s privacy in an incidence where one’s information may be leaked intentionally or accidentally to a crowd of people. For instance, where an individuals information about disordered traits is made public. The case of the government acquiring private information is what bothers people even more (Wayman et al. 2005). Conclusion The above discussion outlines some of the areas that biometrics has helped shape. There has been tremendous development in security, identification, privacy, and fight against crime. In identification, states can know exactly how many people they should be collecting tax from. In fighting crime, bank robbers, for example, are identified through the use of the iris and so on. People who have committed murder could be tracked if they left traces of their DNA at the crime scene. With such improvement in biometrics, more security measures and other important issues such as privacy can be achieved. References Baldaccini, A. (2008). Counter-terrorism and the EU strategy for border security: Framing suspects with biometric documents and databases. European Journal of Migration and Law, 10(1), 31-49. Gelb, A., & Clark, J. (2013). Performance Lessons from India’s Universal Identification Program. Center for Development, Policy Paper, 20. He, Z., Tan, T., Sun, Z., & Qiu, X. (2009). Toward accurate and fast iris segmentation for iris biometrics. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 31(9), 1670-1684. Magnet, S. (2011). When biometrics fail: Gender, race, and the technology of identity. Duke University Press. Shi, W., Yang, J., Jiang, Y., Yang, F., & Xiong, Y. (2011, October). Senguard: Passive user identification on smartphones using multiple sensors. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2011 IEEE 7th International Conference on (pp. 141-148). IEEE. Wayman, J. L., Jain, A. K., Maltoni, D., & Maio, D. (2005). Biometric systems: technology, design and performance evaluation. Springer Science & Business Media. Xiao, Q. (2005, June). Security issues in biometric authentication. In Information Assurance Workshop, 2005. IAW05. Proceedings from the Sixth Annual IEEE SMC (pp. 8-13). IEEE. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Biometrics' Help to Address Crime, Shape Identification, Security Coursework - 1, n.d.)
Biometrics' Help to Address Crime, Shape Identification, Security Coursework - 1. https://studentshare.org/technology/1867513-biometrics
(Biometrics' Help to Address Crime, Shape Identification, Security Coursework - 1)
Biometrics' Help to Address Crime, Shape Identification, Security Coursework - 1. https://studentshare.org/technology/1867513-biometrics.
“Biometrics' Help to Address Crime, Shape Identification, Security Coursework - 1”. https://studentshare.org/technology/1867513-biometrics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Biometrics' Help to Address Crime, Shape Identification, Security

Biometrics use in government and corporations

This paper seeks to address security agencies from both the government and corporate organizations on concerns on errors in fingerprint biometrics with illustration using relevant examples.... In this paper, use of biometrics in corporate and border security would be analyzed as has been applied in various countries globally.... In spite of these drawbacks, application of biometrics by governments and corporations enhance border security and data protection....
16 Pages (4000 words) Research Paper

Biometric Security and Privacy

This essay "Biometric security and Privacy" is being undertaken to analyze how predominant the role of technology happens to be in handling the security issue in general and how biometric technology has helped the security system in dealing with difficult circumstances.... hellip; Biometrics can help during elections, authorized entry into an office, firming up security, preparing a database of the citizens, etc.... While on the one hand we have advanced security gadgets, on the other the acts of sabotage too are being carried out in the most sophisticated manner....
18 Pages (4500 words) Essay

Biometric Security

The paper "Biometric security" tells us about security measures.... These days the world community is experiencing a fierce security scare from several sources.... hellip; While on the one hand, the terror attacks are resulting in loss of human lives, the heightened security measures are also causing a lot of inconvenience to the people whenever, they have to cross over a boundary, check-in at the airport, attend a ceremony, start a train journey, etc....
15 Pages (3750 words) Essay

Biometric identification

Biometric identification refers to identification procedures by means of biological characteristics like facial patterns, speech or finger prints.... Today biometric identification has been implemented in to some extent in Brazil and Canada.... In the United States too, it has received mandate with the government trying to implement it. … In the United Kingdom, the House of Commons passed a bill that biometric identification cards are to be made compulsory for every citizen by the year 2010....
1 Pages (250 words) Essay

Banking on Biometrics

In criminal justice, fingerprint biometrics will be very it will… A fingerprint bank would allow for security officials to have a check on fingerprints gathered at a crime scene, for example. In the real world, fingerprinting can assist in verification purposes.... A fingerprint bank would allow for security officials to have a check on fingerprints gathered at a crime scene, for example.... 2000) In the real world, voice recognition has been used by both individuals and corporations for security and verification....
1 Pages (250 words) Research Paper

Biometric Identification and Privacy Implications

One of the most effective biometric scans that work best to avoid/prevent security threats is that of the palm sensor.... Although such an approach is not immune to security threats, the overall level and complexity of the information that a hacker or leaker could pose would be somewhat minimal; as the measurements of a person's hand or fingers alone are not sufficient to represent a clear breach of privacy.... Other tactics, such as fingerprinting and/or retinal scanning can easily be seen as a more “unique” identifier of an individual and as such represent a higher security threat in the case that the information is compromised, hacked, or unwillingly released....
1 Pages (250 words) Essay

Biometric Technology in Singapore

This coursework called "Biometric Technology in Singapore" describes the relevance of using Biometric technologies in Singapore to collect, store and use this biometric information and personal particulars of its local residents and foreigners for security and other purposes.... This paper outlines its advantages and disadvantages and its use in different fields of life: economics, politics, security.... Consequently most governments have had to re-think their security strategies and allocate budgets to counter this potential threat of terrorism....
8 Pages (2000 words) Coursework

Cross-Cultural Aspects of Global Biometric Deployment

These include the reduction of the rate of fraud while at the same time improving on the public and state security (4).... Questions have however been raised concerning the efficiency of biometric steam in the maintenance of security.... n developed nations such as China, Japan, The US, and countries in the European Union the need for personal and national security has often characterized the use of biometric systems in different applications (5)....
17 Pages (4250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us