Verified Document

Biometric Entry And Ignition System Term Paper

However, a very determined criminal, as mentioned above, might go as far as cutting off fingers in order to circumvent this problem. Nonetheless, fingerprinting appears to make car theft somewhat more challenging than the ordinary immobilizing device. Main Conclusions

Because of its groundbreaking technology and the fact that it makes car theft more difficult than ordinary immobilizing devices, biometric fingerprinting devices for immobilizing and car door locking holds particular advantages over other anti-theft devices. The main advantage is that thieves who steal the car keys cannot either unlock or start vehicles with such devices. This is also useful for other vehicles such as trucks that hold valuable cargo. Of course there is the possibility of cutting off fingers, but the availability of easier targets of car theft can make this fairly unlikely.

Generally, the use of fingerprinting in developing anti-theft devices for cars appears to have a very bright future. As the technology develops, the use of car keys could be entirely eliminated in the future. This could make things much easier for the car owner who is constantly searching for misplaced keys. The reliability of the device in terms of scanning fingerprints accurately each time is an issue that will become clearer with time. As the technology develops, it can only improve matters for motorists who are concerned with keeping their possessions out of harm's way.

Recommendations

Because the technology is so new, it is recommended...

As testing and improvements continue, research surveys should also be conducted among existing users. Any problems identified in this way can then be addressed and eliminated in future models.
The problem of possible violent crime should also be investigated; police reports relating to car thefts should be monitored on a continual basis. In the case of violent crime such as removing fingers or hands for the purpose of stealing a vehicle, research should be conducted to eliminate this possibility as well.

In general, car security devices are seeing many improvements, and will continue to improve in the future. With thorough research, fingerprinting devices for cars and other vehicles can join the existing pool of available devices in order to maintain the car owner's peace of mind and general security.

Sources

Australian Academy of Science. (2001). Putting a finger on it - the loops and whorls of biometrics. http://www.science.org.au/nova/064/064print.htm

McBride, Simon. (2007). Biometric Immobiliser: A finger on security. Auto Express News, August 21. http://www.autoexpress.co.uk/news/autoexpressnews/209962/biometric_immobiliser.html

Oxborn, Alice. (2005). Biometrics History. Video Surveillance Guide, August 17. http://www.video-surveillance-guide.com/biometrics-history.htm

Swedberg, Claire. (2005). Triple RFID Protection for Cars. RFID Journal, Jan 3. http://www.rfidjournal.com/article/articleview/1304/1/1

Sources used in this document:
Sources

Australian Academy of Science. (2001). Putting a finger on it - the loops and whorls of biometrics. http://www.science.org.au/nova/064/064print.htm

McBride, Simon. (2007). Biometric Immobiliser: A finger on security. Auto Express News, August 21. http://www.autoexpress.co.uk/news/autoexpressnews/209962/biometric_immobiliser.html

Oxborn, Alice. (2005). Biometrics History. Video Surveillance Guide, August 17. http://www.video-surveillance-guide.com/biometrics-history.htm

Swedberg, Claire. (2005). Triple RFID Protection for Cars. RFID Journal, Jan 3. http://www.rfidjournal.com/article/articleview/1304/1/1
Cite this Document:
Copy Bibliography Citation

Related Documents

Protection of Information Systems and Data
Words: 2006 Length: 6 Document Type: Other

Security Cryptography In order to maintain information secrecy one would use cryptography. This is intentionally making information unintelligible. This method is mainly employed during the transmission of information. Cryptography ensures that only the intended person would be able to decipher the information (Whitman & Mattord, 2011, p. 339). The process of deciphering encrypted text is referred to as cryptanalysis. Cryptology is the mathematics branch covering cryptography and cryptanalysis. Cryptology has been

Attack of 911 Has Posed a Serious
Words: 4017 Length: 10 Document Type: Term Paper

attack of 911 has posed a serious threat to the aviation industry. For the first the world could realize that airplanes are not only the mode of transportation but can also be utilized as potential bombs. Many passengers are apprehensive of air travel. This led Governments, Policy Makers, aviation industries and regulatory authorities to think a while about aviation security. The aviation security is being revolutionized since then to

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now