Fahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard

Size: px
Start display at page:

Download "Fahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard"

Transcription

1 1 Fahad Al Mannai IT 104 C01 7/8/2016 Biometrics Authentication: An Emerging IT Standard "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code onhttp://oai.gmu.edu/the-mason-honor-code-2/ and as stated, I as student member of the George Mason University community pledge not to cheat, plagiarize, steal, or lie in matters related to academic work. In addition, I have received permission from the copyright holder for any copyrighted material that is displayed on my site. This includes quoting extensive amounts of text, any material copied directly from a web page and graphics/pictures that are copyrighted. This project or subject material has not been used in another class by me or any other student. Finally, I certify that this site is not for commercial purposes, which is a violation of the George Mason Responsible Use of Computing (RUC) Policy posted on web site."

2 2 Biometrics Authentication: An Emerging IT Standard Introduction In your favorite science fiction movie from a long time ago, there is very likely a character who approaches some sort of interface and gains access with something like a retinal scan or putting his finger onto a fingerprint reader. Such technologies used to be the domain of science fiction, but advances in technology mean that this type of access control is the reality of today. In this paper we will speak about the future of biometrics authentication and how it has evolved in recent years. It is interesting when you think of it that if this word was thrown around in the past it would mean any form of authentication, like a passport or a driver s license. And now all these new IT terms would not make sense to many people because the world as become simpler yet confusing. This scenario is an example of biometrics authentication. Biometrics authentication is an application of biometrics. Biometrics are metrics that come from physiological aspects of humans, such as the aforementioned retina or fingerprint example, but also inclusive of things like how someone walks or talks, even (Reid, 2003). Biometrics extend beyond these examples to include any physiological aspect of humans that is shared that can be used as a way of identifying, assessing, and measuring persons (2003). Biometrics are increasingly used as a means of authentication in the information technology world in the place of earlier concepts like passwords because of their significantly greater ability to demonstrate security (Boulgouris et al, 2010). Therefore, biometrics authentication is using biometrics as a means of authenticating users. In the previously mentioned example, the biometrics are the fingerprint and retina, and the biometrics authentication is the use of technology to authenticate the user using any one or combination of biometrics.

3 3 Biometrics authentication represents a new stage in information technology security, but it is not without its own collection of benefits and detriments. Its history is mostly one that takes place from the late 20 th century till now, once digital technologies became capable of using biometrics as a means of authentication (Reid, 2003). Biometrics authentication has primarily security benefits due to the unique nature of biometrics, which makes it a boon for information technology, where security is and always has been a major issue. Additional benefits include less user responsibility overall. Yet the highly personal nature of biometrics authentication, coupled with the fact that users defer a lot of authority to information technology systems, mean that biometrics authentication is controversial for privacy and access reasons. Despite this combination of benefits and detriments, biometrics authentication is fast becoming the norm in information technology worldwide. It is therefore important that persons in the field of information technology approach this subject with an attitude of acceptance and enhancement to make sure that this emerging standard lives up to its potential as an improvement over older systems and processes. Development and Significance of Biometrics Authentication Earlier forms of authentication in the world of IT were either knowledge or material (Clark, 2015). For example, a driver s license is a material form of authentication in that the person holding it needs to physically have it to demonstrate that they are who they say they are. Likewise, a password is a knowledge form of authentication in that the person needs to know the password in order to gain access to whatever system in question. These systems were developed per the technologies available at the time and were further developed accordingly. An example of this is how U.S. passports now include microchips as a means of making them more secure (2015). The development of biometrics authentication occurred in tandem with the availability of technologies that could allow it to go from a science fiction concept to reality. Therefore, there are still many material and knowledge based forms of

4 4 authentication that are prevalent in the world of information technology, but they are becoming less and less common as biometrics authentication takes precedence as the premier way of securing what matters to a given group as best as possible. Likewise, biometrics authentication is definitely a phenomenon that is becoming more common in a piecemeal and phased way. For example, many U.S. companies use a combination of biometrics and traditional authentication, such as the use of biometrics authentication for logging in and out of a workplace and knowledge based authentication for computer systems (Heller, 2015). Explanation of Biometrics Authentication: Technologies and Real-World Applications The biometrics authentication in existence today uses physiological and behavioral traits and associated assessment and tracking technologies as a means of reading them in order to approve or deny access to a given situation (Ratha et al, 2001). Therefore, biometrics authentication has a wide range of applications in about every information technology scenario. Overall, however, its primary function is to provide a layer of individualized security. The two main ways that biometrics authentication is used are therefore useragreed ways and surveillance ways. In ways that the user agrees to, an example is a workplace situation that requires a biometrics authentication in order to access a system. An example of this is an employee at a company who has his retina scanned and stored in a database. Then, when he wants to access a vault, for example, he stands before the retina scanner. The retina scanner scans his retina and matches the information received through the scan with the information on the database. If they match, and to whatever degree matching is defined by the system, the user is granted access to the system (Harinda and Ntagwirumugara, 2015). An example of surveillance application of biometrics authentication might be something like quickness of movement. This is a highly behavioral example that relates to how

5 5 someone behaves, as opposed to a physiological fact such as the nature of one s retina. Yet security systems can use things like movement analysis as a biometric for identifying potential security risks in public spaces due to the fact that such individuals often behave in such a way (2015). The reliability of biometrics authentication is tied closely to the reliability of a metric itself. These two examples demonstrate the difference. A retina, like a fingerprint, is something that remains standard over time in an individual. Behavioral aspects are more ambiguous and less reliable because they are not hard facts. Therefore, one overriding goal in biometrics authentication is the use of metrics that do not change over time or space (Reid, 2004). This is why biometrics like fingerprints, which are different for everyone, represent much more reliable means of authentication than ones like the blood pressure characteristics that are used in things like lie detector tests, due to the fact that fingerprints do not change and are indicative of a particular individual, whereas things like blood pressure characteristics are not one way for liars and another way for truth tellers, and different factors can produce many false positives and negatives. Therefore, biometrics authentication hinges significantly on the consistency of a biometric in multiple ways. Biometrics authentication is already an established application within information technology, but it continues to grow and change in terms of usefulness and popularity. For example, Heller (2015) predicts that biometrics authentication will become prevalent and omnipresent worldwide within the next five years in terms of their purported security benefits, amid global security concerns, and the astonishing pace at which biometrics applications and hardware for information technology have become standardized, reliable, and economical (2015). Likewise, the public is becoming more accepting than not of the use of biometrics authentication systems (Lee, 2015). Benefit, Legal, Ethical, and Security Issues Related to Biometrics Authentication

6 6 As the aforementioned facts on the rise in prevalence of biometrics authentication, biometrics authentication demonstrates a boon of benefits for all parties. An overriding element is power. Biometrics authentication necessitate that those in control of the systems have a strong hold on power over access by nature of the exact science of biometrics authentication. For example, someone might be able to enter another person s bank account using the person s account information and personal information as a means of knowledgebased access. Yet someone whose retina must be scanned to access bank data would certainly be protected to a nearly perfect degree, considering the fact that retinas are like fingerprints in their uniqueness. This scenario demonstrates a strong degree of power of the holder of the biometrics authentication means and standards since the system is so secure. In less theoretical and more immediate terms, there are significant benefits of biometrics authentication. Raju (2014) enumerates the benefits of biometrics authentication as providing accurate information and accountability due to the specificity of biometrics themselves, easy marketing and use due to the lower technology costs and standardization of systems, ease and safety of use such as how much time it saves to just walk by a camera as opposed to stopping to physically enter credentials, and versatility in terms of how factors can be manipulated by owners to a large degree. In short, biometrics authentication represents the next generation of authentication and surveillance in terms of the confluence of recently blossoming technologies. In these terms, it represents a preferred choice over traditional means such as knowledge or material means of authentication. However, ethically and legally speaking, material and knowledge based means of authentication may persist. Ethically speaking, although there is an overriding goal in biometric authentication to move to more certain biometrics and applied measures, this also presents a situation that many perceive as unethical. This is particularly true for surveillance (Chinchilla, 2010). For example, if there were a biometric that reliably and accurately always

7 7 positively identified persons who were not telling the truth, there are major ethical implications at stake, particularly in terms of privacy, but also in terms of safety (2010). Biometrics authentication therefore is strongly associated with the ethics of personal freedoms and security due to the highly personal and exact nature in which they engage with individuals and their lives. But these ethical concerns do not seem to be represented legally in the business world. For example, the use of biometrics authentication by private organizations such as businesses themselves have not been widely challenged around the world, yet this is not true for governments, particularly those in the West that are rooted in traditions of personal freedom (Boulgouris et al., 2010, pp ). For example, a major factor in the lack of use of biometrics in the U.S. is due to the legality of such use by government per U.S. laws (2010). Yet at the same time, biometrics authentication demonstrates, overall, and in reflection to the aforementioned discussion of power, a strong positive in terms of security. These previously discussed benefits, particularly power, and reliability, mean that biometrics authentication are more secure in the work that they do. One vulnerability is hacking, but such a vulnerability may be the only means to override a system (Chinchilla, 2010). Therefore, the security issues of biometric authentication are fewer than traditional means but at the same time more serious. Conclusion Biometrics authentication is the next technological and social stage of authentication. In terms of social and technological change, it seems to be here to stay due to the growing consensus that it is a wise next step and the growing benefits of associated technologies. However, as with all new and useful technologies, it is important for society to regulate them in a way that is in according with social principles about things like security, privacy, and power. Not doing so could be dangerous due to the fact that biometrics authentication

8 8 represents an unforeseen degree of power for the user. Furthermore, biometrics authentication must be controlled in itself in order to develop a preference for more reliable means of authentication as opposed to generalized ones due the fact that success rates drop significantly in accordance to increased uncertainty. Biometrics authentication therefore has a strong role to play today and in the future. However, it must be addressed with regulatory balance in order to facilitate its benefits and reduce its risks. Annotated Bibliography Boulgouris, N. V., Plataniotis, K. N., & Micheli-Tzanakou, E. (Eds.). (2010). Biometrics: Theory, Methods, and Applications. Hoboken, NJ: Wiley. This source is reliable because it is a collection of peer-reviewed papers that were edited by reputable writers in the field. It provides a wide range of information on the subject. It is therefore more of an anthology on biometrics. It was useful as an overview of the subject and its applications. It was specifically useful for its discussion on ethical issues. Chinchilla, R. (2010). Ethical Issues in the Use of Biometric Technology. Retrieved from Eastern Illinois University website: bcs.org/upload/pdf/ashaikh.pdf This is a reputable source because it was published by a reputable institution. Furthermore, the author s credentials demonstrate that he has many published, peerreviewed articles on this subject. This source was useful as an overview of the topic. Specifically, I used it to understand and explain the overriding ethical issues of biometrics and their solutions. Clark, B. (2015, March 4). The history of biometric security, and how it's being used today. Make Us Of. Retrieved on 7/1/2016 from

9 9 Biometric Update. Retrieved on 7/10/2016 from This resource was not as reliable as others due to the fact that it is an online magazine article. However, the author is published in the field. His article is also more explanatory and not contentious, so there is not as much concern for the information. Overall, it is useful as an overview of the subject. It was useful in demonstrating the history of biometrics authentication. Harinda, E., & Ntagwirumugara, E. (2015). Security & Privacy Implications in the Placement of Biometric-Based ID Card for Rwanda Universities. Journal of Information Security,06(02), doi: /jis This source is reliable because it is published in a peer reviewed journal. It was useful in exploring a particular application of biometrics authentication. Furthermore, it provided a review of the benefits and detriments of that application. I used it as a way of understanding ways around potential concerns in the application of biometrics authentication. Heller, M. (2015, January 22). Report: Popularity of biometric authentication set to spike. SearchSecurity. Retrieved on 7/10/2016 from This article was not as reliable as some other sources because it was published in a popular online magazine. However, the author is well published in the area of science writing. Furthermore, it is reporting the facts of a report rather than making a contentious claim. This article was useful in understanding the trends of biometric authentication. I used it to demonstrate the growing importance of the topic. Lee, J. (2015, July 15). Report shows growing public acceptance of biometric authentication.

10 10 of-biometric-authentication Likewise, this article was not as reliable as some other sources because it was published in a popular online magazine. However, the author is well published in the area of science writing. Again, it is reporting the facts of research. This resource was useful in understanding the current trends of biometric authentication. I used it to demonstrate the growing acceptance of biometrics authentication. Raju, R. (2014, April 7). The advantages of a biometric identification management system [Web log post]. Retrieved from on July Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3), doi: /sj This source was not as reliable as others because it was a web log post. However, the author is published in the topic. Also, the claims were logically and factually sound, with evidence provided in the writing. This resource was useful in identifying the advantages of biometric identification. I used it to enumerate them in the essay. Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3), doi: /sj This resource was reliable because it was published in a peer-reviewed paper. It provided a strong critique of the application of biometrics technologies such as authentication. It gave insights into future questions and concerns that need to be addressed in order to make biometrics authentication more user friendly and acceptable. I used it to demonstrate that constructive changes can be made.

11 11 Reid, P. (2004). Biometrics for network security. Upper Saddle River, NJ: Prentice Hall PTR. This book was reliable because it was published by a reputable publisher and written by a published author in the field of biometrics. It is older, but I used it to understand the basic ideologies and background of biometrics for network security, which have not really changed. It was useful in my research for understanding the history and underlying principles and goals of biometrics technologies.

3D Bio printing. Nazrawit Mekonnen IT /29/15. "By placing this statement on my webpage, I certify that I have read and understand the GMU

3D Bio printing. Nazrawit Mekonnen IT /29/15. By placing this statement on my webpage, I certify that I have read and understand the GMU 3-D Bio printing 1 3D Bio printing Nazrawit Mekonnen IT-104-006 Professor Jayasree Jayaram 9/29/15 "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code

More information

Mark Anthony Kassab. IT 103, Section 005. March 2, Biometric Scanners in Airports

Mark Anthony Kassab. IT 103, Section 005. March 2, Biometric Scanners in Airports Mark Anthony Kassab IT 103, Section 005 March 2, 2011 Biometric Scanners in Airports By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://academicintegrity.gmu.edu/honorcode/.

More information

AIMICT.ORG AIMICT Newsletter

AIMICT.ORG AIMICT Newsletter SEPTEMBER 2018 AIMICT.ORG 1 IN THIS ISSUE AIMICT Conducts ISO 9001 Lead Auditor Course AIMICT Conducts ILM s Training of Trainers Program in Irbid AIMICT Organizes Professional Quality Manager Program

More information

Aakriti Endlaw IT /23/16. Artificial Intelligence Research Paper

Aakriti Endlaw IT /23/16. Artificial Intelligence Research Paper 1 Aakriti Endlaw IT 104-003 2/23/16 Artificial Intelligence Research Paper "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://oai.gmu.edu/the-mason-honor-code-2/

More information

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT Abstract This report brings together the final papers presented by the students in the Frontiers in Information

More information

RUNNING HEAD: Drones and the War on Terror 1. Drones and the War on Terror. Ibraheem Bashshiti. George Mason University

RUNNING HEAD: Drones and the War on Terror 1. Drones and the War on Terror. Ibraheem Bashshiti. George Mason University RUNNING HEAD: Drones and the War on Terror 1 Drones and the War on Terror Ibraheem Bashshiti George Mason University "By placing this statement on my webpage, I certify that I have read and understand

More information

Running Head: UP AND COMING AI TECHNOLOGY 1. AI Technology. Ben Holmes. IT-104 Section

Running Head: UP AND COMING AI TECHNOLOGY 1. AI Technology. Ben Holmes. IT-104 Section Running Head: UP AND COMING AI TECHNOLOGY 1 AI Technology Ben Holmes IT-104 Section 009 10-6-2016 "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code

More information

Introduction to Biometrics 1

Introduction to Biometrics 1 Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living

More information

User Awareness of Biometrics

User Awareness of Biometrics Advances in Networks, Computing and Communications 4 User Awareness of Biometrics B.J.Edmonds and S.M.Furnell Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org

More information

Ethical Analysis of 3D Printing. John MacDonald IT February 10, 2017

Ethical Analysis of 3D Printing. John MacDonald IT February 10, 2017 Ethical Analysis of 3D Printing 1 Ethical Analysis of 3D Printing John MacDonald IT 104-001 February 10, 2017 By placing this statement on my webpage, I certify that I have read and understand the GMU

More information

Trenton Public Schools. Fifth Grade Technological Literacy 2013

Trenton Public Schools. Fifth Grade Technological Literacy 2013 Goals By the end of fifth grade students will be able to: Select appropriate software to create a variety of documents Use database software define fields & input data Create a database, define fields,

More information

Automated License Plate Recognition Technology: Social and Security Implications Jordan Nichols IT October,

Automated License Plate Recognition Technology: Social and Security Implications Jordan Nichols IT October, Jordan Nichols IT 103-001 October, 6 2013 By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://oai.gmu.edu/honor-code/. I am fully aware of the

More information

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Computer Ethics Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Outline What are ethics? Professional ethics Engineering ethics

More information

Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies

Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies Aakash Taneja University of Texas at Arlington Department of Information Systems & Operations

More information

Human RFID Implants: The Good And Bad ECE Engineering Ethics and Professionalism Robert Billette February 12, 2019

Human RFID Implants: The Good And Bad ECE Engineering Ethics and Professionalism Robert Billette February 12, 2019 Human RFID Implants: The Good And Bad ECE 390 - Engineering Ethics and Professionalism Robert Billette February 12, 2019 BACKGROUND We live in a complex technological universe where it seems a new device

More information

BIOMETRICS BY- VARTIKA PAUL 4IT55

BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics

More information

Computer and Information Ethics

Computer and Information Ethics Computer and Information Ethics Instructor: Viola Schiaffonati May,4 th 2015 Ethics (dictionary definition) 2 Moral principles that govern a person's behavior or the conducting of an activity The branch

More information

Shades of Simon Gray ABOUT THIS GUIDE. About the Novels of Joyce McDonald

Shades of Simon Gray ABOUT THIS GUIDE. About the Novels of Joyce McDonald Shades of Simon Gray Written by Joyce McDonald Juvenile Fiction - Historical - United States - 20th Century Laurel Leaf Paperback January 2003 $5.99 978-0-440-22804-2 (0-440- 22804-2) ABOUT THIS GUIDE

More information

Learning Progression for Narrative Writing

Learning Progression for Narrative Writing Learning Progression for Narrative Writing STRUCTURE Overall The writer told a story with pictures and some writing. The writer told, drew, and wrote a whole story. The writer wrote about when she did

More information

Biometrics - A Tool in Fraud Prevention

Biometrics - A Tool in Fraud Prevention Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts

More information

Annotated Bibliography: Prominence of Social Media Affecting Our Privacy

Annotated Bibliography: Prominence of Social Media Affecting Our Privacy Cheung 1 Matt Cheung Mary Hays RHET 105 12 October 2015 Annotated Bibliography: Prominence of Social Media Affecting Our Privacy Part I For the next major paper, I intend to do research on the intersection

More information

Where does architecture end and technology begin? Rami Razouk The Aerospace Corporation

Where does architecture end and technology begin? Rami Razouk The Aerospace Corporation Introduction Where does architecture end and technology begin? Rami Razouk The Aerospace Corporation Over the last several years, the software architecture community has reached significant consensus about

More information

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical

More information

ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP

ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2007 Proceedings Midwest (MWAIS) December 2007 ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION

More information

Security System Using Biometric Technology: Design and Implementation of Voice Recognition System (VRS)

Security System Using Biometric Technology: Design and Implementation of Voice Recognition System (VRS) Proceedings of the International Conference on Computer and Communication Engineering 2008 May 13-15, 2008 Kuala Lumpur, Malaysia Security System Using Biometric Technology: Design and Implementation of

More information

Required Course Numbers. Test Content Categories. Computer Science 8 12 Curriculum Crosswalk Page 2 of 14

Required Course Numbers. Test Content Categories. Computer Science 8 12 Curriculum Crosswalk Page 2 of 14 TExES Computer Science 8 12 Curriculum Crosswalk Test Content Categories Domain I Technology Applications Core Competency 001: The computer science teacher knows technology terminology and concepts; the

More information

Non-Contact Vein Recognition Biometrics

Non-Contact Vein Recognition Biometrics Non-Contact Vein Recognition Biometrics www.nearinfraredimaging.com 508-384-3800 info@nearinfraredimaging.com NII s technology is multiple modality non-contact vein-recognition biometrics, the visualization

More information

2009 New Jersey Core Curriculum Content Standards - Technology

2009 New Jersey Core Curriculum Content Standards - Technology P 2009 New Jersey Core Curriculum Content s - 8.1 Educational : All students will use digital tools to access, manage, evaluate, and synthesize information in order to solve problems individually and collaboratively

More information

The Ethics of Information Technology and Business

The Ethics of Information Technology and Business The Ethics of Information Technology and Business Foundations of Business Ethics Series editors: W. Michael Hoffman and Robert E. Frederick Written by an assembly of the most distinguished figures in business

More information

SECTION 2. Computer Applications Technology

SECTION 2. Computer Applications Technology SECTION 2 Computer Applications Technology 2.1 What is Computer Applications Technology? Computer Applications Technology is the study of the integrated components of a computer system (such as hardware,

More information

To promote a stronger sense of mutual responsibility, respect, trust, and fairness among

To promote a stronger sense of mutual responsibility, respect, trust, and fairness among To promote a stronger sense of mutual responsibility, respect, trust, and fairness among all members of the George Mason University Community and with the desire for greater academic and personal achievement,

More information

2. CHAPTER 2: THE SOCIAL NATURE OF INFORMATION TECHNOLOGY

2. CHAPTER 2: THE SOCIAL NATURE OF INFORMATION TECHNOLOGY 2. CHAPTER 2: THE SOCIAL NATURE OF INFORMATION TECHNOLOGY The discovery of truth is prevented more effectively not by the false appearance of things present and which mislead into error, not directly by

More information

Strengths Insight Report

Strengths Insight Report Anita Career Strengths Insight Report SURVEY COMPLETION DATE: 08-22-2014 DON CLIFTON Father of Strengths Psychology and Inventor of CliftonStrengths (Anita Career) 1 Anita Career SURVEY COMPLETION DATE:

More information

This research is supported by the TechPlan program funded by the ITS Institute at the University of Minnesota

This research is supported by the TechPlan program funded by the ITS Institute at the University of Minnesota Frank Douma, Assistant Director,! Sarah Aue, Research Assistant! State and Local Policy Program! Humphrey Institute of Public Affairs! University of Minnesota! This research is supported by the TechPlan

More information

The Role of Biometrics in Virtual Communities. and Digital Governments

The Role of Biometrics in Virtual Communities. and Digital Governments The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024

More information

Biometrics in Law Enforcement and Corrections. Presenters: Orlando Martinez & Lt. Pat McCosh

Biometrics in Law Enforcement and Corrections. Presenters: Orlando Martinez & Lt. Pat McCosh Biometrics in Law Enforcement and Corrections Presenters: Orlando Martinez & Lt. Pat McCosh Presentation Overview Introduction Orlando Martinez VP Global Sales, L1 Identity Solutions Biometrics Division

More information

Why behavioural economics is essential for the success of the implementation of a wearable or health app. Behavioural Research Unit

Why behavioural economics is essential for the success of the implementation of a wearable or health app. Behavioural Research Unit Why behavioural economics is essential for the success of the implementation of a wearable or health app Behavioural Research Unit Speakers: Dr Lizzy Lubczanski Research Manager at Swiss Re s Behavioural

More information

Human Identifier Tag

Human Identifier Tag Human Identifier Tag Device to identify and rescue humans Teena J 1 Information Science & Engineering City Engineering College Bangalore, India teenprasad110@gmail.com Abstract If every human becomes an

More information

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Biometric Authentication for secure e-transactions: Research Opportunities and Trends Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa

More information

Iowa Core Technology Literacy: A Closer Look

Iowa Core Technology Literacy: A Closer Look Iowa Core Technology Literacy: A Closer Look Creativity and Innovation (Make It) Use technology resources to create original Demonstrate creative thinking in the design products, identify patterns and

More information

CSTA K- 12 Computer Science Standards: Mapped to STEM, Common Core, and Partnership for the 21 st Century Standards

CSTA K- 12 Computer Science Standards: Mapped to STEM, Common Core, and Partnership for the 21 st Century Standards CSTA K- 12 Computer Science s: Mapped to STEM, Common Core, and Partnership for the 21 st Century s STEM Cluster Topics Common Core State s CT.L2-01 CT: Computational Use the basic steps in algorithmic

More information

Technology forecasting used in European Commission's policy designs is enhanced with Scopus and LexisNexis datasets

Technology forecasting used in European Commission's policy designs is enhanced with Scopus and LexisNexis datasets CASE STUDY Technology forecasting used in European Commission's policy designs is enhanced with Scopus and LexisNexis datasets EXECUTIVE SUMMARY The Joint Research Centre (JRC) is the European Commission's

More information

Alabama Course of Study Digital Literacy and Computer Science Grade 8

Alabama Course of Study Digital Literacy and Computer Science Grade 8 A Correlation of Computer Programming Fundamental Concepts Using Java 2017 To the Alabama Course of Study Digital Literacy and Computer Science Grade 8 Recurring Standards for Digital Literacy and Computer

More information

Technology Needs Assessment

Technology Needs Assessment Technology Needs Assessment CII Research Summary 173-1 Executive Summary The Technology Needs Assessment Research Team was initiated to take a snapshot of current industry technology needs. As a result,

More information

Bibb County School District Technology Scope and Sequence Kindergarten - 12 th Grade

Bibb County School District Technology Scope and Sequence Kindergarten - 12 th Grade Bibb County School District Technology Scope and Sequence indergarten - 12 th Grade Students will 1 2 3 5 Technology Operations and Concepts 1 Use accurate terminology related to technology. Use appropriate

More information

Supporting medical technology development with the analytic hierarchy process Hummel, Janna Marchien

Supporting medical technology development with the analytic hierarchy process Hummel, Janna Marchien University of Groningen Supporting medical technology development with the analytic hierarchy process Hummel, Janna Marchien IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's

More information

Additional Arduino Control & Ethics

Additional Arduino Control & Ethics Additional Arduino Control & Ethics 1 Objectives Outline engineering ethics Emphasize importance of project documentation Discuss Servo Function calls and uses Questions Ethics & Practicing Engineering

More information

Winthrop Primary School

Winthrop Primary School Winthrop Primary School Information Communication Technology Plan & Scope and Sequence (DRAFT) 2015 2016 Aim: To integrate across all Australian Curriculum learning areas. Classroom teachers delivering

More information

Privacy and Security in Europe Technology development and increasing pressure on the private sphere

Privacy and Security in Europe Technology development and increasing pressure on the private sphere Interview Meeting 2 nd CIPAST Training Workshop 17 21 June 2007 Procida, Italy Support Materials by Åse Kari Haugeto, The Norwegian Board of Technology Privacy and Security in Europe Technology development

More information

Minority Report Assignment

Minority Report Assignment Minority Report Assignment Minority Report: Predictive Technology The movie Minority Report was released in 2002 and is adaption of a short story by the same name. It is set in the future. It stars Tom

More information

New Age Vital Statistics Services: What They Do and Don t Do

New Age Vital Statistics Services: What They Do and Don t Do New Age Vital Statistics Services: What They Do and Don t Do Author: Guy Huntington, President, Huntington Ventures Ltd. Date: June 2018 Table of Contents Executive Summary...3 What is a New Age Digital

More information

Webs of Belief and Chains of Trust

Webs of Belief and Chains of Trust Webs of Belief and Chains of Trust Semantics and Agency in a World of Connected Things Pete Rai Cisco-SPVSS There is a common conviction that, in order to facilitate the future world of connected things,

More information

Identity Management and its impact on the Digital Economy

Identity Management and its impact on the Digital Economy Identity Management and its impact on the Digital Economy Alejandro Barros 1, Alejandro Pareja 2 October 2016 Contents Introduction... 2 Identity Management... 3 Enrolment in the National Identity System...

More information

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique TECHNICAL REPORT ISO/IEC TR 24741 First edition 2007-09-15 Information technology Biometrics tutorial Technologies de l'information Tutoriel biométrique Reference number ISO/IEC 2007 Contents Page Foreword...

More information

UNIT 2 TOPICS IN COMPUTER SCIENCE. Emerging Technologies and Society

UNIT 2 TOPICS IN COMPUTER SCIENCE. Emerging Technologies and Society UNIT 2 TOPICS IN COMPUTER SCIENCE Emerging Technologies and Society EMERGING TECHNOLOGIES Technology has become perhaps the greatest agent of change in the modern world. While never without risk, positive

More information

GUIDE TO SPEAKING POINTS:

GUIDE TO SPEAKING POINTS: GUIDE TO SPEAKING POINTS: The following presentation includes a set of speaking points that directly follow the text in the slide. The deck and speaking points can be used in two ways. As a learning tool

More information

Executive Summary. The process. Intended use

Executive Summary. The process. Intended use ASIS Scouting the Future Summary: Terror attacks, data breaches, ransomware there is constant need for security, but the form it takes is evolving in the face of new technological capabilities and social

More information

2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework

2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework 2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework June 2016 Massachusetts Department of Elementary and Secondary Education 75 Pleasant Street, Malden, MA 02148-4906 Phone

More information

A Writing Workshop Introductory Handout

A Writing Workshop Introductory Handout A Writing Workshop Introductory Handout During the course of the semester, you will be required to turn in four separate, polished pieces that show your developing skills as a writer. Each piece must be

More information

1. You have the skills, talent and personal qualities to accomplish those things that are important to an employer.

1. You have the skills, talent and personal qualities to accomplish those things that are important to an employer. C A N D I D A T E R E S O U R C E S FOR TODAY'S LEADERS Writing Your Resume Putting it Together Developing a resume is the first step in any successful job search. The average resume is written out of

More information

OVERVIEW OF ARTIFICIAL INTELLIGENCE (AI) TECHNOLOGIES. Presented by: WTI

OVERVIEW OF ARTIFICIAL INTELLIGENCE (AI) TECHNOLOGIES. Presented by: WTI OVERVIEW OF ARTIFICIAL INTELLIGENCE (AI) TECHNOLOGIES Presented by: WTI www.wti-solutions.com 703.286.2416 LEGAL DISCLAIMER The entire contents of this informational publication is protected by the copyright

More information

Event Industry Global Market Research

Event Industry Global Market Research Event Industry Global Market Research January 2013 Survey commissioned by IML Worldwide and conducted during November and December 2012. Survey questionnaire distributed to database of existing IML Worldwide

More information

Trenton Public Schools. Eighth Grade Technological Literacy 2013

Trenton Public Schools. Eighth Grade Technological Literacy 2013 Goals By the end of eighth grade students should be able to: Use a word processing program to create professional documents with advanced text-formatting and graphics. Plan and create a database from a

More information

Northfleet Technology College Course Outline: Information Technology in a Global Society

Northfleet Technology College Course Outline: Information Technology in a Global Society Northfleet Technology College Course Outline: Information Technology in a Global Society Equivalent to ½ A level Introduction: What is ITGS Information Technology in a Global Society International refers

More information

Higher School of Economics, Vienna

Higher School of Economics, Vienna Open innovation and global networks - Symposium on Transatlantic EU-U.S. Cooperation on Innovation and Technology Transfer 22nd of March 2011 - Dr. Dirk Meissner Deputy Head and Research Professor Research

More information

LIS 688 DigiLib Amanda Goodman Fall 2010

LIS 688 DigiLib Amanda Goodman Fall 2010 1 Where Do We Go From Here? The Next Decade for Digital Libraries By Clifford Lynch 2010-08-31 Digital libraries' roots can be traced back to 1965 when Libraries of the Future by J. C. R. Licklider was

More information

2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework

2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework 2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework June 2016 Massachusetts Department of Elementary and Secondary Education 75 Pleasant Street, Malden, MA 02148-4906 Phone

More information

JOU4308: Magazine & Feature Writing

JOU4308: Magazine & Feature Writing JOU4308: Magazine & Feature Writing The six golden rules of writing: read, read, read, and write, write, write. -Ernest Gaines Contact information Prof. Renee Martin-Kratzer (you can call me Prof. MK to

More information

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used

More information

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Face Biometric Capture & Applications Terry Hartmann Director and Global Solution Lead Secure Identification & Biometrics UNISYS

More information

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase Term Paper Sample Topics Your topic does not have to come from this list. These are suggestions.

More information

Technology and Normativity

Technology and Normativity van de Poel and Kroes, Technology and Normativity.../1 Technology and Normativity Ibo van de Poel Peter Kroes This collection of papers, presented at the biennual SPT meeting at Delft (2005), is devoted

More information

Handling station. Ruggeveldlaan Deurne tel

Handling station. Ruggeveldlaan Deurne tel Handling station Introduction and didactic background In the age of knowledge, automation technology is gaining increasing importance as a key division of engineering sciences. As a technical/scientific

More information

Authenticated Document Management System

Authenticated Document Management System Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College

More information

Anti cheating guidelines for Arbiters

Anti cheating guidelines for Arbiters Annex 19B Anti cheating guidelines for Arbiters (These guidelines shall be included in the subjects and will be taught in all Workshops, FIDE Arbiters Seminars and Courses for International and FIDE Arbiters).

More information

1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer.

1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer. Disclaimer: As a condition to the use of this document and the information contained herein, the SWGIT requests notification by e-mail before or contemporaneously to the introduction of this document,

More information

Intellectual Property Rights in the Academic and Research Environment

Intellectual Property Rights in the Academic and Research Environment Intellectual Property Rights in the Academic and Research Environment Roger Elliott * Introduction The concept of intellectual property rights, which in the academic and research context are mainly concerned

More information

CS 305: Social, Ethical and Legal Implications of Computing

CS 305: Social, Ethical and Legal Implications of Computing CS 305: Social, Ethical and Legal Implications of Computing Prof. Andrew P. Black black@cs.pdx.edu 1 We will be right back, after these messages Do you know about PCEP? PCEP is the PSU/PDX Cooperative

More information

Data and the Construction of Reality

Data and the Construction of Reality PNC 2016 Annual Conference and Joint Meetings Data and the Construction of Reality Michael K. Buckland Aug 16, 2016 PNC 2016, Getty Center 1 Our conference theme is: Does data construct reality? Answer:

More information

A comprehensive guide to digital badges.

A comprehensive guide to digital badges. A comprehensive guide to digital badges. This is your in-depth guide to what digital badges are and how they are used. A FREE RESOURCE FROM ACCREDIBLE.COM A Comprehensive Guide to Digital Badges 2 Introduction

More information

Spectrum Detector for Cognitive Radios. Andrew Tolboe

Spectrum Detector for Cognitive Radios. Andrew Tolboe Spectrum Detector for Cognitive Radios Andrew Tolboe Motivation Currently in the United States the entire radio spectrum has already been reserved for various applications by the FCC. Therefore, if someone

More information

Surveillance and Privacy in the Information Age. Image courtesy of Josh Bancroft on flickr. License CC-BY-NC.

Surveillance and Privacy in the Information Age. Image courtesy of Josh Bancroft on flickr. License CC-BY-NC. Surveillance and Privacy in the Information Age Image courtesy of Josh Bancroft on flickr. License CC-BY-NC. 1 Basic attributes (Kitchin, 2014) High-volume High-velocity High-variety Exhaustivity (n=all)

More information

A Balanced Introduction to Computer Science, 3/E

A Balanced Introduction to Computer Science, 3/E A Balanced Introduction to Computer Science, 3/E David Reed, Creighton University 2011 Pearson Prentice Hall ISBN 978-0-13-216675-1 Chapter 10 Computer Science as a Discipline 1 Computer Science some people

More information

Little Fingers. Big Challenges.

Little Fingers. Big Challenges. Little Fingers. Big Challenges. How Image Quality and Sensor Technology Are Key for Fast, Accurate Mobile Fingerprint Recognition for Children The Challenge of Children s Identity While automated fingerprint

More information

7th Grade - Unit 1 - Technology, Financial Literacy

7th Grade - Unit 1 - Technology, Financial Literacy 7th Grade - Unit 1 - Technology, Financial Literacy Content Area: Technology Course(s): Technology Time Period: September Length: 10 weeks Status: Published Enduring Understanding Basic financial literacy

More information

Freelance content writer jobs in india >>>CLICK HERE<<<

Freelance content writer jobs in india >>>CLICK HERE<<< Freelance content writer jobs in india >>>CLICK HERE

More information

The global leader in trusted identities for an increasingly digital world. Press kit September, 28 th 2017

The global leader in trusted identities for an increasingly digital world. Press kit September, 28 th 2017 The global leader in trusted identities for an increasingly digital world Press kit September, 28 th 2017 2 FOREWORD Foreword by Didier Lamouche, Chief Executive Officer I am pleased and proud to present

More information

CHAPTER I INTRODUCTION

CHAPTER I INTRODUCTION CHAPTER I INTRODUCTION A. Background of the Study Homicide is one of the crimes by taking one s life. Homicide has similar meaning with murder. It is usual crime in anywhere but when murder unrevealed

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions What is Ethically Aligned Design? Ethically Aligned Design: A Vision for Prioritizing Human Well-being with Autonomous and Intelligent Systems (A/IS) is a work that encourages

More information

NEGOTIATING A NEW ARTISTS MANAGER BASIC AGREEMENT Separating Fact from Fiction. Deadline

NEGOTIATING A NEW ARTISTS MANAGER BASIC AGREEMENT Separating Fact from Fiction. Deadline NEGOTIATING A NEW ARTISTS MANAGER BASIC AGREEMENT Separating Fact from Fiction Forty-three years ago, the Writers Guild of America (WGA) and the Association of Talent Agents (ATA) renewed the Artists Manager

More information

From here, you can create or edit your profile and schedule, reschedule or cancel your exam. This is also where you will go to start your exam.

From here, you can create or edit your profile and schedule, reschedule or cancel your exam. This is also where you will go to start your exam. Student Quick Guide Accessing Examity You can easily access Examity through Brightspace/D2L. First, select the name of your course. Next, click on the Examity link within Content. This will bring you to

More information

Introduction to Systems Engineering

Introduction to Systems Engineering p. 1/2 ENES 489P Hands-On Systems Engineering Projects Introduction to Systems Engineering Mark Austin E-mail: austin@isr.umd.edu Institute for Systems Research, University of Maryland, College Park Career

More information

Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.

Notes from a seminar on Tackling Public Sector Fraud presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Tackling Public Sector Fraud Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Glenis Bevan audit Manager, Audit

More information

George Orwell s 1984 WRITING

George Orwell s 1984 WRITING George Orwell s 1984 WRITING Content Big Brother is watching. What is the discussion of surveillance in George Orwell's 1984 and how was privacy breached? Because of certain actions discovered through

More information

Introduction. amy e. earhart and andrew jewell

Introduction. amy e. earhart and andrew jewell Introduction amy e. earhart and andrew jewell Observing the title and concerns of this collection, many may wonder why we have chosen to focus on the American literature scholar; certainly the concerns

More information

Biometric Recognition: How Do I Know Who You Are?

Biometric Recognition: How Do I Know Who You Are? Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu

More information

Learning Goals and Related Course Outcomes Applied To 14 Core Requirements

Learning Goals and Related Course Outcomes Applied To 14 Core Requirements Learning Goals and Related Course Outcomes Applied To 14 Core Requirements Fundamentals (Normally to be taken during the first year of college study) 1. Towson Seminar (3 credit hours) Applicable Learning

More information

Information Communication Technology

Information Communication Technology # 115 COMMUNICATION IN THE DIGITAL AGE. (3) Communication for the Digital Age focuses on improving students oral, written, and visual communication skills so they can effectively form and translate technical

More information

Resource Review. In press 2018, the Journal of the Medical Library Association

Resource Review. In press 2018, the Journal of the Medical Library Association 1 Resource Review. In press 2018, the Journal of the Medical Library Association Cabell's Scholarly Analytics, Cabell Publishing, Inc., Beaumont, Texas, http://cabells.com/, institutional licensing only,

More information

DIMACS/PORTIA Workshop on Privacy Preserving

DIMACS/PORTIA Workshop on Privacy Preserving DIMACS/PORTIA Workshop on Privacy Preserving Data Mining Data Mining & Information Privacy: New Problems and the Search for Solutions March 15 th, 2004 Tal Zarsky The Information Society Project, Yale

More information