Got a tricky question? Receive an answer from students like you! Try us!

Biometrics Fingerprint Indexing at International Borders: is it effective? - Research Paper Example

Only on StudentShare
Undergraduate
Research Paper
Design & Technology
Pages 10 (2510 words)

Summary

Name: Title: Course: Tutor: Date: Fingerprint Biometrics at International Borders Abstract Border security has been a major concern to most countries globally since the terrorist attacks in the United States of America. Countries have been more vigilant to ensure that only authenticated persons cross into their territories…

Extract of sample
Biometrics Fingerprint Indexing at International Borders: is it effective?

The use of biometrics which identifies one based on physiological or behavioral traits have found mass application. There are various traits that could be used for identification but this paper focuses on fingerprint biometrics as a widely used technology to ensure border security. The aim would be to determine from secondary sources whether the system could be considered effective in attaining its intended purpose. The paper will also seek to analyze the costs involved in acquisition and operation of such systems and whether the current economy would sustain such technologies. Despite the cost involved, the benefits of acquiring and implementing such technology should guide on whether to employ such technology or not. Introduction Since September 9 bombing of the US, countries have been increasingly adopting effective mechanisms to ensure that only verified and authenticated individuals cross their borders, access computer services and other service areas such as banking and commerce. Border crossing presents a myriad of challenges because it involves physical introduction of persons capable of causing harm into a country. As such, transportation, particularly the aviation industry, becomes a paramount target for effective installation of security since it supports emergency response, commerce, law enforcement, economic development, leisure and personal travel. ...
Download paper
Not exactly what you need?

Related Essays

Technology Improves Transportations
The researcher states that transportation today is one of the most crucial and basic ingredient of all the field of human life, especially of international trade e.g. shipping, agriculture, food industry, construction, traveling, tourism, and number of other business fields, that simply cannot go ahead even a single step without the support of transportation. The safe and secure carrying of passengers, speedy deliverance of products, and preservation of quality of different commodities are most important issues for the success of transportation companies. Due to this reason, users consult…
8 pages (2008 words)
An Analysis of the Significance of Guns as a Technology
Some of these groups had competed against each other for food and survival; those who lasted a bit longer managed to do so with the introduction of new technologies, the use of “advanced weaponry” through the use of javelins, spears, knives and arrows for big-game hunting. It may be right to say the first arms race among humans occurred between cavemen using wood clubs.1 Human societies progress and change over long periods of time through either of the two change processes: evolutionary and revolutionary change. The first is gradual while in the latter, it is a drastic change which…
4 pages (1004 words)
Biometrics
As Jain, Bolle and Pankanti (n.d) point out, biometrics will gradually become a prime appurtenance in identification technology especially for the following reasons: repeatedly falling prices of biometric sensors, advancement in the underlying technology, increasing awareness among the public regarding the merits and demerits of the technology as such. But a strong voice had been rising against the implementation of biometrics especially regarding the threat posed by it to privacy of persons. Biometric scanners which were in use in some airports in the U.S. were greatly criticized for the…
2 pages (502 words)
Emergency Technologies
Additionally, the discussion delves on the disadvantages of the same technologies in abetting crimes such as hacking and phising. There are various advantages of computers and the use of computer technology in investigations. For instance, in the determination of crimes, it is essential to conduct forensic investigations. This is to identify their authenticity in order to unearth the evidence. However, despite the numerous benefits of forensics, it also has its disadvantages. On that note, the prevention of crimes such as corporate fraud, intellectual property disputes, phising and…
2 pages (502 words)
Practical Interaction Design
18). HCI is a tool-rich methodological system that provides practicality to most of the established paradigms of artistic and aesthetic studies involving interaction design in its purest sense. Physical interaction design is based on PID. It focuses more on the PID elements such as ideation and familiarity, encompassing the techniques of voice based and/or tools based conversations. Physical interaction design studies are aimed to address the issues which call for usage of some physical form and material contour. These are explicit, objective gadgets which can facilitate or mediate an…
4 pages (1004 words)
The influence and effect of business and the economy on design
As Holston (2011) notes, the reason for this life long trend is perhaps due to the unique qualities of design, wrapped in the common philosophy of creativity. For example through creativity, designers are able to bring into fore, a piece of art work that was otherwise nothing else than the imagination of the artist. In the same vein, entrepreneurs create business ideas and basing on contemporary principles of design such as complexity, collaboration and accountability (Christmann and Taylor, 2001) try to turn their plans into tangible corporate businesses. In modern era however, there…
2 pages (502 words)
Biometrics
But a strong voice had been rising against the implementation of biometrics especially regarding the threat posed by it to privacy of persons.…
3 pages (753 words)