No Marshmallows, Just Term Papers
This part relates the summary method, findings and conclusion of studies like dissertation, unpublished thesis and other studies viewed. The proponents chose a certain topic that suits the field or coverage of the chosen project title. These resources are considered as one of the important factors before conducting a research or study. The statements comprised in the Related Studies were from both Local and Foreign studies.
Information Security: Challenges in Using Biometrics from U.S. Government Accountability Office (GAO) September 2003 stated that.
“One of the primary functions of any security system is the control of people into or out of protected areas, such as physical buildings, information systems, and our national border. Technologies called biometrics can automate the identification of people by one or more of their distinct physical or behavioral characteristics. The term biometrics covers a wide range of technologies that can be used to verify identity by measuring and analyzing human characteristics -relying on attributes of the individual instead of things the individual may have or know. By 2001, laws have been passed that will require a more extensive use of biometric technologies in the federal government. Last 2002, GAO conducted a technology assessment on the use of biometrics for border security. GAO was asked to testify about the issues that it was raised in the report, the use of biometrics in the federal government, and the current state of the technology.”
“Biometric technologies are available today that can be used in security systems to help protect assets. Biometric technologies vary in complexity, capabilities, and performance and can be used to verify or establish a person's identity. Leading biometric technologies include facial recognition, fingerprint recognition, hand geometry, iris recognition, retina recognition, signature recognition, and speaker recognition. Biometric technologies have been used...