Advocating the Implementation of Biometrics
Advocating the Implementation of Biometrics
Biometric is among the latest and highest performing security technology used in the world today. Biometric technology is accepted in most countries, including the United States. Biometrics conducts data collection from the physical body of human beings, for instance, iris recognition, facial recognition, and voice recognition. Adoption of biometrics experiences various challenges where the paper explains the challenges of implementing Iris recognition biometrics in airports with the new infrastructure.
Iris recognition is highly used in developed countries, for instance, Heath row airport in London and the emirates in Arab (Bowyer, and Burge, 2016). The application of iris recognition is according to the security gap created in the organization. For example, identifications of persons in airports instead of queuing for security checks.
Before implementing iris recognition systems,various considerations are put in place. The use of multiple security technologies instead of one is advisable as well as compatibility with existing models, for instance, face recognition and iris recognition can be used together (Bowyer, and Burge, 2016). Before implementing a biometric rate of return are considered on investment, including client’s and employees’ perceptions towards the new technology. A secure network system is needed as well as dedication from the user.
Iris recognition system works the same way human beings recognize each other, which is authentication. Physical characteristics determine the identity of an individual; for instance, iris recognition provides individual identity by capturing human iris, evaluation, calculation of similarity with the available main iris image, and lastly, deciding status. Authentication involves identification together with verification where license includes matching the individual applications with data stored online while audit consists of a real comparison of a specific person. An image of the iris is captures pinned to a wall and processed by various software differentiating between the main iris patterns from the internal and external boundary of iris represented in the image captured.
People identified are allowed access, primarily through the iris recognition or iris scanners, both are applicable in airports (Daugman, 2015). Information is updated in a database for access and control of safeguarded areas requiring specific security levels, for instance, the use of iris recognition in accessing various rooms in airports, for example, flight attendants at work.
When implementing iris recognition, time, and resources are the primary requirements to accomplish the desired objectives. Planning creates awareness on the cost, time used, and avoid work interruptions in an organization. Training on the use of iris recognition is essential, especially to airport workers and customers(Daugman, 2015). Taking risks into account prepares the organization in case of contingencies — for instance, network issues, cyber-attacks, or a power outage. For example, instruments used for scanning are challenging to handle as well as iris recognition captures poor quality images compared to other types of biometrics.
Implementing iris recognition in airports comes with various limitations, for instance, financial constraints, especially with the upgrade and maintenance cost of iris recognition systems (Hayes, and Townsend, 2019).In most cases, maintenance cost is higher compared to the purchasing price some companies may not be prepared for these types of expenses — lack of a risk management plan and alternative security systems in place, in case of technical issues. Before implementing iris recognition systems, training is offered on IT experts, especially on how to handle technical problems as well as cooperating with customers, especially when using an iris scanner.
The need for iris recognition is identified by conducting a gap analysis concerning the new current infrastructure in airport . The investigation is done by identifying the resources and money invested in the latest technology. Technological analysis is essential as well as involving other departments such as the marketing team and airport management. Other gaps include potential gaps where the implementation of the technology requires a resource that is not available in organization or might be used in future. Bridging the difference involves a process of analyzing, identifying, planning, and initiating the requirements.
The needed changes are in network management as well as cyber risk management, where identification has led to a breach of information as well as cybersecurity issues in the organization. Planning for requirements and bridging the gap between the iris recognition and current infrastructure is essential in planning wisely, especially for maintenance and upgrade costs. Iris recognition systems have poor images compared to other biometrics, such as face recognition. Therefore modification of camera lenses is essential for efficiency.
Biometrics are part of the new technology embraced by most organizations, especially in government organizations such as airports and financial institutions. The adoption of iris recognition comes with various challenges. For instance, the implementation of iris recognition technology requires attention from users as well as active network service. Before implementing new technology, analysis is done in correspondence to the current infrastructure, needs identified, and planning takes place, leading to proper investments. Iris recognition systems are expensive to acquire; therefore, not all airports use this biometric. Proper management is essential, especially with the high risk of information insecurity.
Bowyer, K. W., & Burge, M. J. (2016). Introduction to the handbook of iris recognition. In Handbook of Iris Recognition (pp. 1-22). Springer, London.
Daugman, J. (2015). Iris recognition at airports and border crossings. Encyclopedia of Biometrics, 998-1004.
Hayes, P., & Townsend, M. (2019, June). Implementing New Technology to Revitalize Central North Sea Seismic Via Evolutionary Processing. In 81st EAGE Conference and Exhibition 2019.