2 pages/≈1100 words
Research and Describe E-Banking Security Issues (Thesis Sample)
THIS WAS AN ANNOTATED BIBLIOGRAPHY FOR A MASTERS THESIS PAPER ON THE TOPIC BIOMETRIC SECURITY. THE PAPER EXPLORED 10 SOURCES ON THE SAME TOPIC DESCRIBING WHAT THE AUTHORS SAID.source..
Fatima, A. (2015). E-Banking Security Issues? Is There A Solution in Biometrics?The Journal of Internet Banking and Commerce, 2011.
According to Fatima most developing countries have not fully adopted biometric technology and therefore they are not able to provide universal security. However, most of these countries acknowledge that business growth and economic growth has been realized because of the biometric security technology. Fatima further notes that the biometric application that has been most significant in the business world is the finger scanning technology. The author takes a specifically focuses on the banking industry or the e-banking and explores how biometric security has helped to reduce cases of theft and fraud in the banks that have adopted the technology. Biometric technology is recommended as the only solution to e-banking security problems.
Ivanovas, E., &Navakauskas, D. (2015). Development of Biometric Systems for Person Recognition: Biometric Feature Systems, Traits and Acquisition. ElektronikairElektrotechnika.
Ivanovas & Navakauskas describes what biometric system is all about including how its features, how it is acquired and how it helps to recognize individuals. They argue that biometrics are those metrics related to human characteristics. It helps in the identification of individuals or groups of people under surveillance control. Furthermore, it involves identification of important and distinctive features for describing and labeling these individuals. The two authors point out that the technology has been applied in the DNA, hand geometry, fingerprint, retina, palm veins and even iris for the purpose of identification. They therefore recommend the technology as a form of beefing up security in various places.
Lazaridis, G. (2016). Security, insecurity and migration in Europe. Routledge
Lazaridis describes the state of security in Europe, migration as a result of insecurity as well as measures that have been put in place to solve the insecurity challenges in the continent. One of the instrumental technologies is biometric security. For example, the technology has had a lot of positive impacts through provision of security services thus stimulating growth and development in the business sector. He argues that in areas where it has been adopted the technology has beefed up security in both small and large business organizations. Through this technology, a firm can easily create good relationship and trust with customers by building a good security relationship.
Pirbhulal, S., Zhang, H., Mukhopadhyay, S. C., Li, C., Wang, Y., Li, G., & Zhang, Y. T. (2015). An efficient biometric-based algorithm using heart rate variability for securing body sensor networks. Sensors.
Pirbhulal et al. argues that heart rate variability can be used to develop an efficient biometric-based algorithm that works as a body sensor. They argue that such a system would enable use of organization’s data without location limitations. It actually changes how people do business. It allows firm employees to work effectively as a team in a more efficient and creative manner thus establishing good customer service. With such a technology, the companies can create connectivity with business vendors, customers and employees with a lot of ease. The workers can then develop applications that can navigate web-based applications with efficient personal communication capabilities. The real-time communications helps in delivering products to customers as soon as possible.
Chen, H. (2007). National security. Amsterdam: Elsevier.
Chen defines national security as a way in which the national government in conjunction with the parliament to protect the state as well as citizens living therein from an kind of national crisis through diplomacy, military, economic, political and technological might. He argues that if the security apparatus in the country does not have the necessary technological solutions it becomes difficult to protect the state even if there is a political goodwill. Biometric security is one of the technologies that Chen recommends arguing that with freedom of information there is need for such technologies to deal with the complex security challenges.
Ignatenko, T., & Willems, F. M. (2012). Biometric security from an information-theoretical perspective. Hanover, MA: Now Publishers.
Ignatenko & Willems studied the biometric systems from the theoretical view. They first dwelt on the biometric authentication systems. These systems aim at authentication sequences, correlated enrolment to generate large secret keys through interchange of public messages and ensure that the privacy is maintained. They argue that a good biometric security system must prevent privacy leakage. Therefore, they recommend development of such systems to help identify as many individuals as possible with the information of concern while at the same time maintaining people’s personal privacy. In addition, being a system the biometric security is composed of several components that work together interdependently.
In Ling, N. D., In Jin, T. A., & In Hu, J. (2015). Biometric security.
In Ling et al. gives an whole round information about biometric security from its definition, how to adopt and maintain it. The book argues that today many organizations are in the search for secure authentication systems for e-commerce, user access among other security application. However, they acknowledge that there is no single perfect biometric technology that can solve all the problems and that every application needs a varied biometric. The book helps understand how to choose the right kind of biometric that fits the situation at hand. Vendors have come up with different kinds of products so that customers can find the best.
Nelson, L. S. (2011). America identified: Biometric technology and society. Cambridge, MA: MIT Press.
Nelson through this book reveals the societal perceptions about the biometric technology and he reveals the values, aspirations and even beliefs that are beyond the attitudes of the American people concerning the technology. Most advocates termed the public sentiments about the September 11 terrorist but Nelson brings out a well researched and well informed information on the concerns of the social institutions, government and business organizations. The main theme addressed in this book is that nobody should forget the role that information technology plays in solving problems of the users. Biometric security is one of those technologies with the ability of making a difference in security sector.
Vielhauer, C. (2006). Biometric user authentication for IT security: From fundamentals to handwriting...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
- Unmanned Aerial Systems, Both Military and Civilian, Sharing US Civil Airspace: Assessing th. . .Description: This project has assessed various factors contributing to the lagging situation in the implementation of private UAS in the United States civilian airspace...18 pages/≈4950 words| 32 Sources | APA | Technology | Thesis |
- Securing and Protecting Information: Secure Your Validation ProcedureDescription: Securing and Protecting Information: The paper will explain more Security authentication process and how to keep organizational information save....1 page/≈275 words| 4 Sources | APA | Technology | Thesis |
- Implementing thorough Network SecurityDescription: Implementing thorough network security measures in a corporate setting Thesis (Undergraduate level)...10 pages/≈2750 words| APA | Technology | Thesis |