618 research outputs found

    Initial development of a learners’ ratified acceptance of multibiometrics intentions model (RAMIM)

    Get PDF
    Authenticating users is a continuous tradeoff between the level of invasiveness and the degree of system security. Password protection has been the most widely authentication approach used, however, it is easily compromised. Biometric authentication devices have been implemented as a more robust approach. This paper reports on initial results of student perceptions about their acceptance of a multibiometrics authentication approach in the context of e-learning systems. Specifically, this paper reports on the initial empirical development of a learners’ Ratified Acceptance of Multibiometrics Intentions Model (RAMIM). The model proposed investigates the impact of students’ code of conduct awareness, perceived ease-of-use, perceived usefulness, and ethical decision making on learners’ intention to use multibiometrics for authentication during elearning exams. The study’s participants included 97 non-information technology (IT) students who attended e-learning courses. Additionally, results of a path analysis using Partial Least Square (PLS) indicate that perceived usefulness has the most significant impact on learners’ intention to use multibiometrics during e-learning exams. Students’ ethical decision making and perceived usefulness demonstrated significant impact on their intention to use multibiometrics. Additionally, students’ code of conduct awareness appears to have a positive impact on their ethical decision making. Conclusions are discussed including recommendations for future research on extending this initial research into applied experiments to address e-learning security issues

    The Method of Automatic Knuckle Image Acquisition for Continuous Verification Systems

    Get PDF
    The paper proposes a method of automatic knuckle image acquisition for continuous verification systems. The developed acquisition method is dedicated for verification systems in which the person being verified uses a computer keyboard. This manner of acquisition enables registration of the knuckle image without interrupting the user’s work for the time of acquisition. This is an important advantage, unprecedented in the currently known methods. The process of the automatic location of the finger knuckle can be considered as a pattern recognition approach and is based on the analysis of symmetry and similarity between the reference knuckle patterns and live camera image. The effectiveness of the aforesaid approach has been tested experimentally. The test results confirmed its high effectiveness. The effectiveness of the proposed method was also determined in a case where it is a part of a multi-biometric method

    Handbook of Vascular Biometrics

    Get PDF

    Electronic Security Systems (ESSs) in Academic Libraries

    Get PDF
    The present paper studies the variety of Electronic Security Systems available for the library environment, including its technological components. The study also includes the positive influence of a security system to secure the library’s day-to-day activities. The opportunities and challenges have also been discussed that influence the implementation of Electronic Security Systems to improve the library facilitates

    Handbook of Vascular Biometrics

    Get PDF
    This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers

    Identity theft: do definitions still matter?

    Get PDF
    Despite a statutory definition of identity theft, there is a continuing debate on whether differences among the financial frauds associated with identity theft warrant further distinction and treatment, not only by lenders and financial institutions but also by consumers and regulatory and law enforcement agencies. In this Discussion Paper, Julia S. Cheney examines four types of financial fraud – fictitious identity fraud, payment card fraud, account takeover fraud, and true name fraud – that fall under the legal term identity theft to better understand how criminal behavior patterns, risks for consumers and lenders, and mitigation strategies vary depending upon the sort of data stolen, the type of account compromised, and the opportunity for financial gain. Three areas key to developing effective solutions that, in the view of the author, would benefit from further definitional delineations are identified: measuring the success (or failure) of efforts to fight this crime, educating consumers about the risks and responses to this crime, and coordinating mitigation strategies across stakeholders and geographies.Identity theft ; Fraud ; Credit cards

    LegitimID: A federative digital identity system for strong authentication

    Get PDF
    The growing use of online services advocated the emergence of digital identity as a mechanism of data security and personal information protection that can increase the trust among online users and applications. This paper introduces a new security system developed around the digital identity concept, implemented using a federative multifactor strong authentication framework and tested in an authentic online educational setting to accomplish the complete life cycle of business privacy. System performance evaluated on a sample of 108 students revealed an excellent acceptance and confidence among the users

    Development of a secure multi-factor authentication algorithm for mobile money applications

    Get PDF
    A Thesis Submitted in Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Information and Communication Science and Engineering of the Nelson Mandela African Institution of Science and TechnologyWith the evolution of industry 4.0, financial technologies have become paramount and mobile money as one of the financial technologies has immensely contributed to improving financial inclusion among the unbanked population. Several mobile money schemes were developed but, they suffered severe authentication security challenges since they implemented two-factor authentication. This study focused on developing a secure multi-factor authentication (MFA) algorithm for mobile money applications. It uses personal identification numbers, one-time passwords, biometric fingerprints, and quick response codes to authenticate and authorize mobile money subscribers. Secure hash algorithm-256, Rivest-Shamir-Adleman encryption, and Fernet encryption were used to secure the authentication factors, confidential financial information and data before transmission to the remote databases. A literature review, survey, evolutionary prototyping model, and heuristic evaluation and usability testing methods were used to identify authentication issues, develop prototypes of native genuine mobile money (G-MoMo) applications, and identify usability issues with the interface designs and ascertain their usability, respectively. The results of the review grouped the threat models into attacks against privacy, authentication, confidentiality, integrity, and availability. The survey identified authentication attacks, identity theft, phishing attacks, and PIN sharing as the key mobile money systems’ security issues. The researcher designed a secure MFA algorithm for mobile money applications and developed three native G-MoMo applications to implement the designed algorithm to prove the feasibility of the algorithm and that it provided robust security. The algorithm was resilient to non-repudiation, ensured strong authentication security, data confidentiality, integrity, privacy, and user anonymity, was highly effective against several attacks but had high communication overhead and computational costs. Nevertheless, the heuristic evaluation results showed that the G-MoMo applications’ interface designs lacked forward navigation buttons, uniformity in the applications’ menu titles, search fields, actions needed for recovery, and help and documentation. Similarly, the usability testing revealed that they were easy to learn, effective, efficient, memorable, with few errors, subscriber satisfaction, easy to use, aesthetic, easy to integrate, and understandable. Implementing a secure mobile money authentication and authorisation by combining multiple factors which are securely stored helps mobile money subscribers and other stakeholders to have trust in the developed native G-MoMo applications

    Retina Recognition Using Crossings and Bifurcations

    Get PDF
    Recognition of people on the basis of biometric characteristics has been known for many centuries. One of the most used biometric features is fingerprint. Recently, we have also come across the iris pattern more often. Retinal recognition offers similarly reliable mechanisms, but they are not yet well explored. Our procedure for obtaining a biometric pattern is partly based on fingerprints. In comparison with fingerprints, retinal recognition identifies bifurcations or optical crossings, i.e., instead of papillary lines, the vessels are used. The procedure is more complicated due to the multiple layers in which the blood vessels intersect. Our work deals with determining the probabilities for various areas of the retina in which bifurcation and crossing occur. It also describes how recognition can be affected by various diseases

    Airport Security: Examining The Current State Of Acceptance Of Biometrics And The Propensity Of Adopting Biometric Technology Fo

    Get PDF
    The terrorist attacks of September 11, 2001 propelled the issue of aviation security to the forefront of the U.S. domestic agenda. Although hundreds of individual airports exist in the U.S., the travel activities at each of these airports combine to holistically comprise an aviation system that represents a significant portion of the U.S. social and economic infrastructure. Disruption at one airport resulting from a criminal act, such as terrorism, could exert detrimental effects upon the aviation system and U.S national security (9/11 Commission, 2004). Each U.S. airport is individually responsible for various aspects of security including the control of physical access to sensitive and secure areas and facilities (9/11 Commission, 2004). Biometric technology has been examined as one method of enhancing airport access control to mitigate the possibility of criminal acts against airports. However, successful implementation of biometric technology depends largely on how individual security directors at each airport perceive, understand, and accept that technology. Backgrounds, attitudes, and personal characteristics influence individual decisions about technology implementation (Rogers, 1995; Tornatzky and Fleischer, 1990). This study examines the problem of airport access control, as well as, the current trends in biometric technology. Utilizing a survey of airport security directors and security managers, this study draws upon innovation diffusion theory and organizational theories to determine what personal, organizational, and technical variables contribute to the propensity of airport security directors and managers to adopt biometric technology for airport access control
    • …
    corecore