Verified Document

Biometrics In Everyday Life Biometrics Research Paper

Some schools use portable scanners to collect digital images of the students' fingerprints, which need to be updated regularly as the students grow and their fingers change. Biometrics is used for everything from the authentication of new transfer students, to providing the ability to buy lunch in the cafeteria without cash, to checking out books from the library to recording student attendance (Graziano 1). As this trend continues to grow, there is some concern about privacy issues, which are especially sensitive when minors are involved. For example, Claudia Graziano reports in the article Learning to Live with Biometrics, Chris Hoofnagle, associate director of the Electronic Privacy Information Center in Washington, D.C. believes that fingerprint scanning schools "sets a dark precedent, conditioning students at a young age to embrace the idea of Big Brother-style biometric tracking...If ever there was a generation that would not oppose a government system for universal ID, it's this one" (1)

It is certainly understandable that biometrics would conjure up images of futuristic Orwellian disaster scenarios. However according Graziano the main complaint of using fingerprint scanning schools is not about privacy but about a lack of efficiency and convenience. Graziano reports that Bob Engen, president of Educational Biometric Technology, suggests that "speed, not security or privacy, seems to be students' biggest concern with the system. The fingerprint-recognition systems tend to run slowly - slower than manually punching in a number, for instance - if a school is using a computer that is more than a few years old. Additionally, large student populations can slow the system since it has to run through every stored image before identifying the best match" (1).

Clearly there are still adjustments to be made for biometrics technology is used pervasively in businesses,...

However, modern biometrics are machine readable and recordable. Biometric information recorded by machine, and the data linked to biometric observations, can be copied easily, shared quickly and widely, combined, and stored for long periods of time without degrading. Biometrically authenticating identification by machine is highly accurate and, more important, it is highly usable personal information. It allows institutions to collect data and index it to precise and highly accurate human identifiers, making it useful in countless ways (Vacca 13-14).
Currently, businesses are the most prevalent users of biometric technology as compared to homes and schools. However the popularity of this technology in all realms is continuing to escalate. Does this mean we are headed for a "Big Brother" type of society? Or are we merely looking forward to a more secure, more convenient and more efficient society? Only time will tell, however if the present is any indication of the future, modern technology will soon advance to the point where virtually no human function or interaction will be technology-free.

Works Cited

"Biometric Access Control, A Good Choice for Homeowners?" Homesecurityinformation.com. 2006. Web. 19 April 2010.

Clarke, Nathan, L. And Furnell, Steven. "Authenticating Mobile Phone Users Using Keystroke Analysis." International Journal of Information Security, (2007) 6.1: 1-14. Print.

Graziano, Claudia. "Learning to Live With Biometrics." Wired. (September 2003). Web. 20 April 2010.

Turner, Allan. "Biometrics: Applying an Emerging Technology to Jails," Corrections Today, (2000) 62.6: 26-27.

Vacca, John R. Biometric Technologies and Verification Systems. Butterworth-Heinemann. 2007. Print.

Wilson, Tracy V. "How Biometrics Works" Howstuffworks.com. Web.…

Sources used in this document:
Works Cited

"Biometric Access Control, A Good Choice for Homeowners?" Homesecurityinformation.com. 2006. Web. 19 April 2010.

Clarke, Nathan, L. And Furnell, Steven. "Authenticating Mobile Phone Users Using Keystroke Analysis." International Journal of Information Security, (2007) 6.1: 1-14. Print.

Graziano, Claudia. "Learning to Live With Biometrics." Wired. (September 2003). Web. 20 April 2010.

Turner, Allan. "Biometrics: Applying an Emerging Technology to Jails," Corrections Today, (2000) 62.6: 26-27.
Cite this Document:
Copy Bibliography Citation

Related Documents

Intervention Plan for Carlos
Words: 3420 Length: 10 Document Type: Essay

The following multimodal evaluation procedure is recommended for Carlos: Semi-Structured Clinical Interview The foremost component of an informal evaluation of traumatized individuals entails semi-structured interviewing, in which the following details of the patient ought to be garnered: • Demographic facts • Employment history • Medical history • Educational history • Social history and • Several specific facts. Such an interview must be closely founded on minor and major trauma disorder facets (James, 2008). Particular questions to be posed

Security Issues of M. Commerce
Words: 5074 Length: 20 Document Type: Term Paper

wireless Web is truly' the next major wave of Internet computing A its potential for bringing people together and expanding commerce is even greater than that of the wired Internet." Edward Kozel, board member and former CTO of Cisco systems (AlterEgo, 2000, p. 12) The integration of the Internet into our modern culture as a driving force behind business, convenience, services and merchandise acquisition has created a new set of desires for

Homeland Security and Information Technology Security and
Words: 2061 Length: 8 Document Type: Term Paper

Homeland Security and Information Technology Security and Technology Biometrics Cyberterrorism Geospatial Information System The 9/11 bombing of the World Trade Center raised the awareness of the American public relative to the need for increased national security. The agency that is in the forefront of providing this security is the Department of Homeland Security. This agency is responsible for a broad range of security issues and, as a result, is confronted with a wide range of

Single Case Study of an Individual
Words: 2750 Length: 8 Document Type: Case Study

Client Description. The client is a 19-year-old single male who was referred for treatment by his parents who are concerned that his use of alcohol is interfering with his grades in college. The client reportedly had all A grades in high school and had been placed in a program for gifted students. However, he has reportedly flunked out of college in his first year. Following this he was also recently arrested

Security Crisis That Is Plaguing E-Commerce As
Words: 1381 Length: 5 Document Type: Term Paper

security crisis that is plaguing e-commerce as it transforms into the epitome of global business. It attempts to analyze the possible repercussions of this problem and then put forward various possible solutions to rectify the biggest obstacle limiting the path of e-commerce progress. The ideas and references used in this proposal have been cited from five different sources. E-commerce has changed the way the world do business, plain and simple.

Elimination of Debit Cards
Words: 8384 Length: 30 Document Type: Term Paper

Cell Phone as an Electronic Wallet Rapid advances in technology in recent decades have brought about a dramatic change in the way people work, transact and communicate. Yet, it is widely believed that there is still ample scope for technology to make life even more convenient and efficient. For instance, the cell phone is already showing the promise of functioning as an electronic wallet. It is the purpose of this

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now