Biometrics in Regards to Computer and Internet Security

Introduction

Biometrics is a security technology that is programmed in accordance of individuals’ body characteristics such as finger prints or eye retina to mention but a few. Its relevance is becoming an interesting topic in regards to computer and internet security. According to Bolle and Ratha (2004, p.6) the first form of biometrics was done by Chinese merchants who stamped childrens palm prints and footprints on paper with ink so as to distinguish younger children from one another.

Later on it was advanced by Alphonse Bertillion who wanted to fix the problem of identifying inmates in prisons and in the process turned biometrics into a unique field of study. It was discovered that there were those repeating the same mistakes. He argued that to solve this, some body elements remained fixed like the size of skull and length of the fingers and could be used. The system was later on abandoned since some people shared the same measurements and was prone to unfairness.

Becker and Wetzell (2003, p.4) argue that technology has advanced and turned it into a viable field. It is argued that biometrics has gained more interest due to increased emphasis on identifying and quantifying the natural world that has been gaining pace. Biometrics has also developed after it was discovered that behavioral and psychological characteristics could be identified on an individual basis. According to Leps (1992, p.8) there has also been the capability to express human characteristics into digital formats. Modern biometrics centers on electronic data transmission, analysis and acquisition which has been rapidly advancing.

Discussion

In biometric, facial authentication used to relate the spatial geometry of an individual’s features of the face according to the programmed features. Though there are different approaches, they all focus on key features of the face. Though there are different approaches, they all focus on key features of the face. Facial recognition has been successful in many areas. In most cases, facial recognition has been utilized to counter terrorist and other criminal activities in urban areas. Facial recognition has been able to provide surveillance capability with a desire to locate specific individuals (Torpey, 2000, p.17). Though more of biometric it is making human recognition a more automated and computerized process.

According to Caplan and Torpey (2001, p.9) the only difference it has from other forms of biometrics is its ability to be used for surveillance purposes. It has been efficient because it uses faces which are public and mostly involves a non intrusive contact free process. It has been widely acceptable because it uses legacy databases. Facial recognition has also been able to integrate with other surveillance systems more easily hence its wide use. Biometrics is often used to safeguard privacy through integrity and identity (Warm, 1984, p.15).

Lack of security and privacy has made individuals to loose anonymity in any system or digital environment that uses any biometric authentication. Since biometrics has been used in many places, individuals have expected it to be privateier. Biometrics has not been effective because most of the information that has been stored about individuals has been linked to other persons and in the end exposed people’s privacy. Wayman (1999, p.13) argues that because information has been availed everywhere what was thought to be private has been dispersed to everybody who can access it. The internet is being blamed for the current lose of anonymity in biometrics because it has made it easy for individuals to access other people’s information. As biometrics has continued losing the interest it had generated before, people have always had a doubt in their mind whether to trust other systems that use this technology worldwide. Due to the many problems that exist in relation to privacy it has corrupted the relationship that individuals had with biometrics.

There is also an emerging threat from religious leaders who argue that people who use biometrics have been giving up themselves to an authority that has no significance to them. This is because every time they use the systems they have to undergo authentication. Woodward (2001, p.4) adds that there is need to restore peoples interest in biometrics. These will be achieved through minimal intrusion into people’s personal data.

There needs to be self regulation within the players in the industry so that they can be accountable and manage personal information well. It is important for system developers to conduct an audit on information utilization and disclosure. This seems to be the main bone of contention as far as privacy is concerned which has been linked to anonymity (Woodward, 2001, p.23). Engineers should also device effective and efficient ways through which parties utilizing these systems can have control of personal information. According to Blackbum (2001, p.21) to succeed, there is need for partnership between the various people involved in biometrics. We need to have prohibitions against the selling and exchange of personal identification information to other parties. Developers are supposed to ensure confidentiality in the way they handle information so that it is not used by unwanted people to the disadvantage of the general population and users.

The use of individuals’ biometric characteristics in the process of identification without their consent is supposed to be limited as these will also help in more advancement. We are not supposed to use biometric information for discrimination as these will hurt the relationship between the users and the systems. This therefore calls for an overview of the biometric authentication systems that will end up promoting more privacy enhancing technology.

Conclusion

Biometrics, especially facial recognition has faced many problems more so the legal right of privacy. There is increased probability of biometric facial recognition being of great benefit to the society. However, the rampant innovation in technology presents a threat since individual privacy rights are increasingly being interfered with. Though, considered as an emerging technology, facial recognition is being questioned on how it has enhanced safety. This field has been considered as a tool and not a quick fix. As technology is getting better and better it is revolutionizing biometrics facial recognition positively, though with challenges.

There is still time to determine how this new technology will be used. We need to implement reasonable safeguards so that we can nurture technology towards more individual privacy. Facial recognition developments are not supposed to contravene the regulations put in place to guide them. Biometrics can in the long run support privacy enhancing technology that won’t bring about anonymity. Biometrics needs to identify and deal with law and policy concerns in advance to advance more efficiently.

Reference list

Becker, P., & Wetzell, R. (2003).The Criminal and His Scientists: Essays on the History of Criminality. Cambridge: Cambridge University Press 2003.

Blackburn, D. M. (2001).Evaluating Technology Properly: Three Easy Steps to Success. Corrections Today.

Bolle, R., & Ratha, N. (2004). Automatic finger print recognition systems. New York: Springer.

Caplan, J., & Torpey, J. (2001).Documenting Individual Identity: The Development of State Practices since the French Revolution. Princeton: Princeton University Press.

Leps’, C.M. (1992). Apprehending the Criminal: The Production of Deviance in Nineteenth-Century Discourse. Durham: Duke University Press 1992.

Torpey, J. (2000). The Invention of the Passport: Surveillance, Citizenship & the State. Cambridge: Cambridge University Press.

Warm, J. S. (1984). Sustained Attention in Human Performance. Chichester: Wiley.

Wayman, J. L. (1999).Technical Testing and Evaluation of Biometric Identification Devices. Boston: Kluwer Academic Press.

Woodward, J. D. (2001). Biometrics: Facing up to Terrorism. Santa Monica, CA: Rand.

Woodward, J. D. (2001). Super Bowl Surveillance: Facing Up to Biometrics. Santa Monica, CA: Rand.

Cite this paper

Select style

Reference

StudyCorgi. (2022, February 28). Biometrics in Regards to Computer and Internet Security. https://studycorgi.com/biometrics-in-regards-to-computer-and-internet-security/

Work Cited

"Biometrics in Regards to Computer and Internet Security." StudyCorgi, 28 Feb. 2022, studycorgi.com/biometrics-in-regards-to-computer-and-internet-security/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2022) 'Biometrics in Regards to Computer and Internet Security'. 28 February.

1. StudyCorgi. "Biometrics in Regards to Computer and Internet Security." February 28, 2022. https://studycorgi.com/biometrics-in-regards-to-computer-and-internet-security/.


Bibliography


StudyCorgi. "Biometrics in Regards to Computer and Internet Security." February 28, 2022. https://studycorgi.com/biometrics-in-regards-to-computer-and-internet-security/.

References

StudyCorgi. 2022. "Biometrics in Regards to Computer and Internet Security." February 28, 2022. https://studycorgi.com/biometrics-in-regards-to-computer-and-internet-security/.

This paper, “Biometrics in Regards to Computer and Internet Security”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.