Sign In
Not register? Register Now!
Essay Available:
Pages:
8 pages/≈2200 words
Sources:
4 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Research Proposal
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 39.95
Topic:

Technology IT & Computer Science Research Proposal (Research Proposal Sample)

Instructions:

The task involved the evaluation of biometric systems and their various applications in the technology world. the attached document is a sample of the document that resulted from my writing on the topic

source..
Content:


Biometrics
Name
Institution
Biometrics
The How of Biometrics
In the 21st century, one of the things that has made strides to keep up with the rapidly evolving technology is security and privacy. People have embraced modern technology with a large percentile of people having access to the internet. Even so, many people have no education on all the breeches of privacy that could arise from the use of this technology. Regardless of a large population of people not knowing about privacy issues, tech companies have continuously made efforts to improve security and user-data privacy (De Luca, et al., 2015). As such, there has been a thread of ways that people could protect their data. Some of the early methods used included using a pattern of keys to lock the screen. This was mainly to keep off children from interfering with the phone (De Luca, et al., 2015). However, as technology has evolved, these gadgets have become a spare to who we are like a lock has two keys.
Security tools evolved from pressing the menu key followed by the (*) key to using of patterns and passwords in the era of smartphones. Today, biometric security systems are on the rise after especially in smartphone security (De Luca, et al., 2015). Biometrics simply covers all measurements and calculations that determine an individual’s unique physical and behavioral traits. This technology has been used in identification of individuals and to manage access. Other than access control and identification, security forces and research teams use biometrics to denote individuals who are under their surveillance.

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Research Proposal: Gender Gap in Computer Science Research Proposal
    Description: The ACM (Association for Computing Machinery) has identified computer science as the field with the most evident problem of gender gap, specifically the under representation of women. Computer Science is affected by a long history of male dominance. Computer Science and technologies...
    4 pages/≈1100 words| 5 Sources | APA | IT & Computer Science | Research Proposal |
  • Law Firm Case Management and Allocation System IT Research Proposal
    Description: The main aim of the project is to create a system where by a head of a law firm (that has numerous advocates) can add, edit information suspend and delete advocates. The system will also have capabilities to add edit and delete law cases they are being handled by that particular firm. The system...
    4 pages/≈1100 words| No Sources | APA | IT & Computer Science | Research Proposal |
  • Research and Describe TCP-IP Security and Cover Channels
    Description: The communication entity is organized into four necessary layers classified by the related functionality in a connection case. ...
    3 pages/≈825 words| 4 Sources | APA | IT & Computer Science | Research Proposal |
Need a Custom Essay Written?
First time 15% Discount!