1,136 research outputs found
Airport Security: Examining The Current State Of Acceptance Of Biometrics And The Propensity Of Adopting Biometric Technology Fo
The terrorist attacks of September 11, 2001 propelled the issue of aviation security to the forefront of the U.S. domestic agenda. Although hundreds of individual airports exist in the U.S., the travel activities at each of these airports combine to holistically comprise an aviation system that represents a significant portion of the U.S. social and economic infrastructure. Disruption at one airport resulting from a criminal act, such as terrorism, could exert detrimental effects upon the aviation system and U.S national security (9/11 Commission, 2004). Each U.S. airport is individually responsible for various aspects of security including the control of physical access to sensitive and secure areas and facilities (9/11 Commission, 2004). Biometric technology has been examined as one method of enhancing airport access control to mitigate the possibility of criminal acts against airports. However, successful implementation of biometric technology depends largely on how individual security directors at each airport perceive, understand, and accept that technology. Backgrounds, attitudes, and personal characteristics influence individual decisions about technology implementation (Rogers, 1995; Tornatzky and Fleischer, 1990). This study examines the problem of airport access control, as well as, the current trends in biometric technology. Utilizing a survey of airport security directors and security managers, this study draws upon innovation diffusion theory and organizational theories to determine what personal, organizational, and technical variables contribute to the propensity of airport security directors and managers to adopt biometric technology for airport access control
Medical Identity Theft and Palm Vein Authentication: The Healthcare Manager\u27s Perspective
The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers\u27 and doctors\u27 perceptions of the effectiveness of palm vein authentication technology. The research questions were designed to investigate the relationship between intention to adopt palm vein authentication technology and perceived usefulness, complexity, security, peer influence, and relative advantage. The unified theory of acceptance and use of technology was the theoretical basis for this quantitative study. Data were gathered through an anonymous online survey of 109 healthcare managers and doctors, and analyzed using principal axis factoring, Pearson\u27s product moment correlation, multiple linear regression, and 1-way analysis of variance. The results of the study showed a statistically significant positive correlation between perceived usefulness, security, peer influence, relative advantage, and intention to adopt palm vein authentication. No statistically significant correlation existed between complexity and intention to adopt palm vein authentication. These findings indicate that by effectively using palm vein authentication, organizations can mitigate the risk of medical fraud and its associated costs, and positive social change can be realized
An Investigation of Factors that Influence Passengersâ Intentions to Use Biometric Technologies at Airports
Biometric technologies use the characteristics and measurements from humans to establish or verify their identity. Within an airport setting, biometric technologies can be used to hasten passenger processes such as airport check-in, baggage drop-off or pick-up, and aircraft boarding, thus enhancing the overall passenger experience.
This research investigated the factors that influence passengersâ intentions to choose the use of biometrics over other methods of identification. The current study utilized a quantitative research method via an online survey of 689 persons from Amazon Âź Mechanical Turk Âź (MTurk) and employed structural equation modeling (SEM) techniques for data analysis. The study utilized the theory of planned behavior (TPB) as the grounded theory, while perceived usefulness and perceived ease of use were included as additional factors that could influence individualsâ intentions to use new technology.
The study further assessed the impact of passengersâ privacy concerns on the intentions to use biometrics and investigated how the privacy concerns moderate the influencing factors of passengersâ behavioral intentions. Because of the coronavirus (COVID-19) pandemic that became prevalent at the time of the study, a COVID-19 variable was introduced as a control variable to examine if there were any effects of COVID-19 on passengers\u27 behavioral intentions while controlling for the other variables.
Results showed that for the TPB factors, attitudes and subjective norms significantly influenced passengersâ behavioral intentions to use biometrics, while the effect of perceived behavioral control (PBC) on passengersâ intentions was not significant. The additional factors of perceived usefulness and perceived ease of use did not significantly influence passengersâ intentions. In addition, the hypothesized relationships between privacy concerns and four factors, behavioral intentions, attitudes, PBC, and perceived ease of use were supported, while the relationships between privacy concerns and perceived usefulness and between privacy concerns and subjective norms were not supported.
The examination of the moderating effects found that privacy concerns moderated the relationships between passengersâ intentions and three factors: attitudes, subjective norms, and perceived usefulness. However, because the interaction plots showed that the moderating effects were weak, the effects were not considered to be of much value and were therefore not added to the final model. Results also showed that the control variable (COVID-19) did not significantly influence passengersâ behavioral intentions and passengersâ privacy concerns while controlling for the other variables.
Practically, the study contributed a research model and specified factors that were postulated to influence passengersâ behavioral intentions to use biometrics at airports. Further research would be required to determine additional factors that influence behavioral intentions. Finally, although the moderating effects were not used in the final model, the findings suggest that stakeholders can customize biometric systems and solutions appropriately to cater to passengersâ concerns
Envisioning technology through discourse: a case study of biometrics in the National Identity Scheme in the United Kingdom
Around the globe, governments are pursuing policies that depend on
information technology (IT). The United Kingdomâs National Identity Scheme
was a government proposal for a national identity system, based on
biometrics. These proposals for biometrics provide us with an opportunity to
explore the diverse and shifting discourses that accompany the attempted
diffusion of a controversial IT innovation. This thesis offers a longitudinal case
study of these visionary discourses.
I begin with a critical review of the literature on biometrics, drawing attention to
the lack of in-depth studies that explore the discursive and organizational
dynamics accompanying their implementation on a national scale. I then
devise a theoretical framework to study these speculative and future-directed
discourses based on concepts and ideas from organizing visions theory, the
sociology of expectations, and critical approaches to studying the publicâs
understanding of technology. A methodological discussion ensues in which I
explain my research approach and methods for data collection and analysis,
including techniques for critical discourse analysis. After briefly introducing the
case study, I proceed to the two-part analysis. First is an analysis of
government actorsâ discourses on biometrics, revolving around formal policy
communications; second is an analysis of media discourses and
parliamentary debates around certain critical moments for biometrics in the
Scheme.
The analysis reveals how the uncertain concept of biometrics provided a
strategic rhetorical device whereby government spokespeople were able to
offer a flexible yet incomplete vision for the technology. I contend that, despite being distinctive and offering some practical value to the proposals for
national identity cards, the governmentâs discourses on biometrics remained
insufficiently intelligible, uninformative, and implausible.
The concluding discussion explains the unraveling visions for biometrics in the
case, offers a theoretical contribution based on the case analysis, and
provides insights about discourses on the âpublicsâ of new technology such as
biometrics
Recommended from our members
Biometric authentication systems for secured e-transactions in Saudi Arabia. An empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia.
Security is becoming an increasingly important issue for business, and with it comes the need for appropriate authentication; consequently, it is becoming gradually more important to develop secure e-commerce systems. Fraud via the web, identity theft, and phishing are raising concerns for users and financial organisations. In addition, current authentication methods, like passwords, have many problems (e.g. some users write them down, they forget them, or they make them easy to hack). We can overcome these drawbacks by using biometric authentication systems. Biometric systems are being used for personal authentication in response to the rising issue of authentication and security. Biometrics provide much promise, in terms of preserving our identities without the inconvenience of carrying ID cards and/or remembering passwords.
This research is important because the securing of e-commerce transactions is becoming increasingly important. Identity theft, hacking and viruses are growing threats to Internet users. As more people use the Internet, more identity theft cases are being reported. This could harm not only the users, but also the reputation of the organisations whose names are used in these illegal acts. For example, in the UK, online banking fraud doubled in 2008 compared to 2007. More users took to e-shopping and online banking, but failed to take necessary protection. For non-western cultures, the figures for web security, in 2008, illustrated that Saudi Arabia was ranked ninth worldwide for users who had been attacked over the web. The above statistics reflect the significance of information security with e-commerce systems.
As with any new technology, user acceptance of the new technology is often hard to measure. In this thesis, a study of user acceptance of biometric authentication systems in e-transactions, such as online banking, within Saudi society was conducted. It examined whether Saudis are practically willing to accept this technology. This thesis focuses upon Saudi Arabia, which has developing economy. It has achieved a rapid rate of growth, and therefore makes an interesting and unique case study.
From an economistÂżs point of view, Saudi Arabia is the powerhouse of the Middle East. It has the leading regional economy, and, even though it is still relatively young. It has a young and rapid growing population; therefore, this makes Saudi Arabia an attractive potential market for all kinds of e-commerce applications. Having said that, with more than half of population under the age of 30 are more to be expected to take the risk of accepting new technology.
For this work, 306 Saudi participants were involved in the experiments. A laboratory experiment was created that actively tested a biometric authentication system in combination with a survey. The Technology Acceptance Model (TAM) was adopted in the first experimental phase as the theoretical basis on which to develop the
iv
research framework, the model has proven its efficiency as a good predictor for the biometric authentication system.
Furthermore, in a second experimental phase, the Unified Theory of Acceptance and Use of Technology (UTAUT) with moderating variables such as age, gender and education level was examined as a proposed conceptual framework to overcome the limitations of TAM. The aim of the study was to explore factors affecting usersÂż acceptance of biometric authentication systems. The findings from Structural Equation Modelling (SEM) analysis indicate that education level is a significant moderating factor, while gender and age do not record as significant.
This thesis added new knowledge to this field and highlighted the importance of the perceptions of users regarding biometric security technologies. It helps determine the factors affecting the acceptance of biometric technology. To our knowledge, this is the first systematic study of this issue carried out by academic and non-biased researchers in Saudi Arabia.
Furthermore, the thesis presents security technology companies and developers of information security products with information to help in the determination of what is significant to their user base when taking into account the introduction of new secure systems and products
Security Enhanced Applications for Information Systems
Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the usersâ trust as well as the reputation of the systemâs stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled âSecurity Enhanced Applications for Information Systemsâ and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments
HANDLING WORK FROM HOME SECURITY ISSUES IN SALESFORCE
Security is a vital component when it is identified with an endeavor record or our genuine materials. To protect our home or valuable things like gold, cash we use bank storage administrations or underground secret storage spaces at home. Similarly, IT enterprises put tremendous measure of capital in expanding security to its business and the archives. Associations use cryptography procedures to get their information utilizing progressed encryption calculations like SHA-256, SHA-512, RSA-1024, RSA-2048 piecesâ key encryption and Elliptic Curve Cryptography (ECC) calculations. These industry standard calculations are difficult to break. For instance, to break RSA-2048-piece encryption key, an old-style PC needs around 300 trillion years. As indicated by the continuous examination, a quantum PC can break it in 10seconds, yet such a quantum PC doesn\u27t yet exist. Despite the fact that these cryptographic calculations guarantee an awesome degree of safety, there will be dependably a space for breaking the security. Programmers will attempt new techniques to break the security. Thus, the association likewise should continue to utilize new strategies to build the level and nature of the security. Now it is time to check how the security aspect is taken care of when the IT employees are at work from home. The 2020 year has made many professionals work from home because of the Covid-19 pandemic. The Covid-19 has transformed almost all organizations to work from home, this has become standard advice, and technology plays an important role during work from home to monitor the employee works and provide security when the work is being carried away from their respective organization. Employees\u27 information security awareness will become one of the most important parts of safeguarding against nefarious information security practices during this work from home. Most of the workers like the expediency of work from home and the flexibility provided for the employees. But in this situation, workers need guarantees that their privacy is secured when using company laptops and phones. Cyber security plays an important role in maintaining a secured environment when working from home. This work focusses on managing the security break attack in the course of work from home. The focus of the study is on dealing with security breaches that occur when salespeople operate from home. The problem of security isn\u27t new. Security issues existed prior to the lockdown or pandemic, but because the staff was working from the office at the time, the system administrator was available to address them. However, how can an employee\u27s laptop and account be secured when working from home? MFH\u27s salesforce has leveraged a variety of innovative technologies to address security concerns during their tenure. Because the IT behemoth Salesforce has made it possible for all employees, including freshly hired ones, to seek WFH on a permanent basis. To address the security breach difficulties faced by employees, the organization used a number of new approaches, including tracking working hours, raising password difficulty, employing VPN (virtual private network), mandating video during meetings, continuously checking right to use control, and MFA (multi-factor authentication). Improvement of existing multi-factor authentication (MFA) is the focused topic discussed in the thesis. To add an additional step of protection to the login process Blockchain technology is proposed and to identify the employee identification a hybrid recognition model is proposed using face and fingerprint recognition. This leads to the employee going through multiple processes to authenticate his or her identity in numerous ways in order to access the business laptop. This procedure entails connecting his or her laptop to his or her mobile phone or email account.
Keywords: MFA, WFH, Cyber Security, Encryption, Decryption
The Proceedings of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia
Conference Foreword
The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference. Now in its fifteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers. The area of information security and management continues to be varied, as is reflected by the wide variety of subject matter covered by the papers this year. The papers cover topics from vulnerabilities in âInternet of Thingsâ protocols through to improvements in biometric identification algorithms and surveillance camera weaknesses. The conference has drawn interest and papers from within Australia and internationally. All submitted papers were subject to a double blind peer review process. Twenty two papers were submitted from Australia and overseas, of which eighteen were accepted for final presentation and publication. We wish to thank the reviewers for kindly volunteering their time and expertise in support of this event. We would also like to thank the conference committee who have organised yet another successful congress. Events such as this are impossible without the tireless efforts of such people in reviewing and editing the conference papers, and assisting with the planning, organisation and execution of the conference. To our sponsors, also a vote of thanks for both the financial and moral support provided to the conference. Finally, thank you to the administrative and technical staff, and students of the ECU Security Research Institute for their contributions to the running of the conference
THE ETHICAL USE OF FACIAL RECOGNITION TECHNOLOGY: A CASE STUDY OF U.S. CUSTOMS AND BORDER PROTECTION
After the events of 9/11, facial recognition technology (FRT) emerged as a security solution for identifying and verifying individuals in a homeland security setting. Although FRT demonstrates security benefits, the public has not widely accepted the governmentâs use of the technology. FRT critics raise ethical and societal concerns regarding the negative impact of the technology on the public, including privacy concerns, constitutional rights violations, biased and inaccurate technology, and data management. How can FRT be implemented in a way that is both efficient and ethical? This thesis analyzes FRT through a three-pronged approach. First, the thesis applies the âHow to Do It Rightâ ethical framework to a government agencyâs decision-making process. The second step identifies ethical operating principles through a crosswalk of the varied and often inconsistent operating principles published by the security industry, government audit agencies, and watchdog groups. Finally, the thesis utilizes a real-world case study to explore an operational FRT program and illustrate best practices. It recommends that following an ethical framework during decision-making and incorporating ethical principles and best practices into FRT programs during development and implementation mitigates the publicâs ethical and societal concerns.Civilian, Department of Homeland SecurityApproved for public release. Distribution is unlimited
- âŠ