TITLE

Eye Spy

AUTHOR(S)
Dalton, Aaron
PUB. DATE
November 2004
SOURCE
H&HN: Hospitals & Health Networks;Nov2004, Vol. 78 Issue 11, p12
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Features the use of the biometric security system in U.S. hospitals and other health networks. Importance of installing an iris recognition system and fingerprint readers to secure patient information; Advantages and disadvantages of the system; Contribution of radio-frequency cards to the efficiency of the technology; Cost of implementing a biometric security system.
ACCESSION #
15084958

 

Related Articles

  • Protecting Americans From Identity Theft. Rose, Scott M. // U.S. Business Review;Jul2006, Vol. 7 Issue 7, p8 

    The article considers the use of biometrics and other technology in preventing identity theft. The benefits of the use of biometrics-based identification cars to help protect consumer privacy. The application of radio frequency identification tags and sensors to transport security is described....

  • Biometric evidence evaluation: an empirical assessment of the effect of different training data. Ali, Tauseef; Spreeuwers, Luuk; Veldhuis, Raymond; Meuwly, Didier // IET Biometrics;2014, Vol. 3 Issue 4, p335 

    For an automatic comparison of a pair of biometric specimens, a similarity metric called 'score' is computed by the employed biometric recognition system. In forensic evaluation, it is desirable to convert this score into a likelihood ratio. This process is referred to as calibration. A...

  • Predictive biometrics: a review and analysis of predicting personal characteristics from biometric data. Fairhurst, Michael; Cheng Li; Costa-Abreu, M√°rjory Da // IET Biometrics;2017, Vol. 6 Issue 6, p369 

    Interest in the exploitation of soft biometrics information has continued to develop over the last decade or so. In comparison with traditional biometrics, which focuses principally on person identification, the idea of soft biometrics processing is to study the utilisation of more general...

  • GETTING PERSONAL. Moss, Brenda // Health Facilities Management;Sep2002, Vol. 15 Issue 9, p20 

    Focuses on the adoption of biometric security technologies by some hospitals and health care facilities in the U.S. Background on biometrics; Option provided by hand geometry for facilities employing biometrics; Application of data protection for biometrics; Implementation of the Politec...

  • ICU Security System Using Biometric Method. Geetha, S. // Middle East Journal of Scientific Research;2/5/2014, Vol. 20 Issue 3, p359 

    This paper is based on biometrics which provides automatic identification of an individual based on a unique feature or characteristics possessed by an individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. The system has been...

  • Secure to the Touch: Ease Access while Improving Security. McQuaid, Bill // Security: Solutions for Enterprise Security Leaders;Oct2007, Vol. 44 Issue 10, p68 

    The article focuses on the security system employed at the Parkview Adventist Medical Center in Brunswick, Maine. It is reported that a single sign on system has been installed at the center. The system allows physicians and clinicians to sign on to the hospital's database quickly and accurately...

  • Biometric Identification.  // Foundations & Trends in Communications & Information Theory;2010, Vol. 7 Issue 2/3, p207 

    The article focuses on biometric identification systems based on discrete biometric sources. It states the complexity of identification systems to authentication systems. As stated, privacy leakage is an important parameter of biometric identification systems. It further states that biometric...

  • Biometrics FAQs.  // Buildings;Aug2007, Vol. 101 Issue 8, p55 

    The article presents questions and answers related to biometrics. It presents a definition of biometrics which is a general term used to describe a characteristic of a process. It states that the biometrics commonly implemented or studied include the fingerprint, face, iris, voice, signature,...

  • Security is All in Vein. Poor, Alfred // ECN: Electronic Component News;Feb2009, Vol. 53 Issue 2, p38 

    The article offers information on PalmSecure biometric system from Fujitsu Ltd. which is a good alternative for fingerprint systems and retina scanners. It is a USB-powered scanning device that bathes the hand in near-infrared light. The veins in the hand carry blood that has been depleted of...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics