The issue of whether or not Americans will need to accept some fictitious character of "trade off" between the use of biometric technologies that can be valuable in preventing terrorism and intervening to identify terrorists and differents (including those criminal who engage in a crime known as identity fraud) and the potential invasion of secretiveness and civil rights that the technologies whitethorn facilitate is therefore important. Although a properly implemented biometric hostage system can be an powerful pause of an assenting control system, the system raises a serious question. Can biometric engine room be utilized as a tool in protecting Americans against terrorists without sacrificing the privacy of its citizens?
Groves (2002) identified new technologies that are operational to facilitate identity authentication. Some of these technologies are controversial and pee been met with ethical concerns by individuals worried abut the warrantor and privacy of personal informati
The riddle is that the innovation of a centralized biometrics informationbase is a massive proletariat requiring a billion-dollar investment and the cooperation of a number of law enforcement and other agencies that do not necessarily have compatible calculating machine systems or platforms (Messmer, 2002). Biometrics are perceived by many a(prenominal) as both expensive and invasive - a problem exacerbated by the fact that none of the hundreds of biometric products now on the market are infallible in pattern-matching a scanned body part to a biometric image. Fingerprint scanners, for example, can be fooled by using molded "gummy fingers" made of gelatin (Messmer, 2002).
Hahn, R. W. (1997). The cost of airport security measures.
era.
Retrieved September 4, 2002, from the World Wide Web:
With appraise to the reliability of biometric technology, Grand (2002) noted that it is all too aristocratical for such technologies and specific biometric traits to become compromised. If a biometric password is compromised, a piece of the user's identity is also compromised. Relying solely on biometric data for identification is risky because every new layer of security introduces another layer of risk because of the communication points between the layers. condition the complexity of the biometric systems that are now being considered to ensure that potential terrorists or criminals may not be free to implement their goals, biometrics are not without risk of system failure.
Dobbin, M. (2002). terrorist act threats spur high-tech security
Developing more effective identity authentication procedures for use as a counter-terrorism and identify theft prevention measure on the Internet and at physical point-of-sale locations is both advantageous and disadvantageous in the view of consumers (Groves, 2002). At issue, invariably, is the fear that the government (and, to a by chance lesser degree, business
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
No comments:
Post a Comment