Airport Security and New Technologies

The biometric software application can uniquely identify or verify an individual using a comparison and analysis of features based on the contours of a person’s face and behavior. This software can compare it with information in the database for subsequent identification. The author’s thesis aims to identify the benefits of using these biometrics, such as ensuring the safety of passengers and the functioning of airport structures, as well as public concerns through privacy policies and cybersecurity.

Supporting a Thesis

The author uses four ways to support his arguments in the article: statistics, expert opinion, example, and research evidence. In the beginning, the author cites the technologies used today in many countries, describing the process of check-in and boarding in the airport. The first is the verification of the document, in which the staff checks the 2D barcode of the passenger to determine the validity. The second is scanning passengers and baggage through a metal detector and an X-ray machine (Zhang, 2019). However, information is provided without citing any source, demonstrating that the conventional technologies part is taken from an example of its own experience.

These devices are not enough to maintain the safety of transportation through the aircraft system. Thus, the interest in facial recognition systems is considerably high due to the full range of tasks that it solves. The author provides information about this system’s operation by research evidence, starting with testing the device held in Hartsfield-Jackson Atlanta International Airport (Zhang, 2019). The Custom and Border Protection (CBP) system verify an individual’s identity based on the state database of passport photos and the person himself (Zhang, 2019). Based on this test, the author concludes that the automation of the inspection increases the system’s efficiency, eliminating queues and simplifying maintenance by refusing passports and boarding passes.

The author’s second argument is about the advantage of using technologies associated with imaging and computed tomography (CT). These technologies significantly increase security efficiency, passengers’ convenience, and decrease the time consumption for the whole process. Precisely, millimeter-wave advanced technologies are much more powerful and harmless than metal detectors according to radiation exposure study (Zhang, 2019). Therefore, CT depicts a 3D image of baggage content without pulling some items from the suitcases.

Along with the advantages, the author points out that these technologies still require refinement using statistical data. Behavioral Biometric technology analyzes facial expressions and actions to elaborate on whether a passenger is lying. However, the success rate of using such technology is only 76 percent, which is increased to 85 percent when using algorithms. The method of synthesizing a social model is based on artificial intelligence.

The author’s last way of reinforcing his arguments is the expert’s opinion. The author has already moved from the advantages to the disadvantages of the system. The expert of the Electronic Privacy Information Center stated the danger of using the Recognition for other purposes without the permission of the citizens (Zhang, 2019). Like the privacy problem, there is a chance of hacking all the data from the database. Despite these worries, the author provides information that passenger privacy is preserved since all data is immediately deleted after identification, and hacking will be prevented in advance by more secure software. The author used eleven resources, most of which were within three years, and only two resources of 2012 and 2014. The author used a range of resources: news articles, academic journals, government resources, and thus, sources are recent enough and relevant for this topic.

Strengths and Weaknesses

The strengths of this article are that the author describes outdated, modern, and future technologies, showing the development of a control and security system at the airport. The author provides a detailed description of the techniques that increase passenger comfort and the effectiveness of the test. Besides, the information is supported by another source which shows that the collection of passenger data is more important to improve work efficiency. Identifying passenger behavior, making more profit, tracking passenger gathering places, calculating average passenger waiting times, and other personal passenger behavior can be determined based on intelligent data processing (Rajapaksha, 2020). Passengers expect their convenience during final formalities without any hindrance to travel. Sensors provide information on the shortest line, parking space, and baggage self-test.

Nevertheless, the author of the article is biased in supporting emerging technologies. Even though he explains that the privacy of people will not be violated, about cybersecurity, he gives only an argument about the need to create a more secure system. In conclusion, he leads to the fact that the extensive use of automation entails only minimal problems, although cybersecurity remains the biggest threat to this program. The modern application process, which is open to open data and big data, is open to cyberattacks because these systems work independently (Rajapaksha, 2020). Therefore, Rajapaksha pays excellent attention to exploring the flaws of the system, while the author of the article is silent.

Moreover, privacy remains concerning because a database is at the center of any biometric information; their removal will lead to a gradual loss of data. There are programs such as US-VISIT and CAPPS II that require the personal information of an individual (Haas, 2019). Therefore, deleting data after identification contradicts this system. It shows that there is a possibility of faulty reasoning in the author’s argumentation.

Conclusion

The possibility of significantly improving passenger services, reducing the cost and time of servicing airlines, reducing the risks of flight delays, and improving several other essential indicators of aviation logistics are shown. This task showed the high relevance of creating a new generation of multi-agent systems explained in Zhang’s article. The analysis resulted in the fact that report is current and credible enough, having evidence supporting the main idea about airport security.

References

Haas, E. P. (2019). Back to the future: The use of biometrics, its impact on airport security, and how this technology should be governed. Journal of Air Law and Commerce, 84(4), 459-489. Web.

Rajapaksha, A., & Jayasuriya, N. (2020). Smart airport: A review on future of the airport operation. Global Journal of Management and Business, 20(3). Web.

Zhang, Z. (2019, October). Technologies raise the effectiveness of Airport Security control. 20(3). 2019 IEEE 1st International Conference on Civil Aviation Safety and Information Technology (ICCASIT). 431-434.

Cite this paper

Select style

Reference

StudyCorgi. (2022, April 8). Airport Security and New Technologies. https://studycorgi.com/airport-security-and-new-technologies/

Work Cited

"Airport Security and New Technologies." StudyCorgi, 8 Apr. 2022, studycorgi.com/airport-security-and-new-technologies/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2022) 'Airport Security and New Technologies'. 8 April.

1. StudyCorgi. "Airport Security and New Technologies." April 8, 2022. https://studycorgi.com/airport-security-and-new-technologies/.


Bibliography


StudyCorgi. "Airport Security and New Technologies." April 8, 2022. https://studycorgi.com/airport-security-and-new-technologies/.

References

StudyCorgi. 2022. "Airport Security and New Technologies." April 8, 2022. https://studycorgi.com/airport-security-and-new-technologies/.

This paper, “Airport Security and New Technologies”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.