TITLE

EYE OF THE BEHOLDER

AUTHOR(S)
Buechner, Maryanne Murray
PUB. DATE
November 2000
SOURCE
Time International (South Pacific Edition);11/27/2000, Issue 47, p88
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Focuses on the development of the technology of biometrics as of November, 2000. How it develops security systems based on physical characteristic, such as an iris of an eye, or behaviors to authenticate a person's identity; Use of the technology by companies and government agencies; Possibility that biometrics could be used in health care to ensure patient confidentiality. INSET: THE TWIN TEST, by Lev Grossman.
ACCESSION #
3804838

 

Related Articles

  • Playing it safe. Christopher, Sandy // Automatic I.D. News;Apr96, Vol. 12 Issue 5, p54 

    Focuses on the use of biometric identification in providing added security in financial and data networks. Prevention of fraud in welfare and social benefits departments; Verification of identity of individual.

  • When what you don't say says as much as what you do. Grimes, Rob // Nation's Restaurant News;06/29/98, Vol. 32 Issue 26, p40 

    Focuses on the use of biometrics for identification purposes. Division of biometrics applications in physiological and behavioral methodologies; Use of biometric technology for identification and verification; Accuracy of finger and retina identification over other identification methods.

  • Privacy issue prompts make-over for biometrics ID. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Feb98, Vol. 35 Issue 2, p57 

    Focuses on privacy issues that prompted changes in biometric identification in the United States. Benefits of biometrics to consumers; Efforts of several states to revise their workers' compensation programs to encourage more employers to drug test.

  • Identity Management. Thompson, Craig W.; Thompson, Dale R. // IEEE Internet Computing;May/Jun2007, Vol. 11 Issue 3, p82 

    The article focuses on a seminar concerning identity management, which was held in Jonesboro, Arkansas, in February 2007. The article discusses the multiple types of personal identifiers that individuals have, such as: Social Security numbers, dates of birth, drivers licenses, passports and...

  • Who Goes There? Villano, Matt // Tech & Learning;Feb2006, Vol. 26 Issue 7, p8 

    The article discusses the use of biometrics by school districts in the U.S. Biometrics is a technology that grants or denies access to individuals based on their biological characteristics. The technology has been used by the government for years, and is now being introduced in schools....

  • Multimodal Classification using Feature Level Fusion and SVM. Sharma, Priyanka; Kaur, Manvjeet // International Journal of Computer Applications;Aug2013, Vol. 76 Issue 1-16, p26 

    The use of biometrics in the field of enhancing security and authentication in sensitive systems is a rapidly evolving technology. The increasing attacks and decreasing security in unimodal systems have resulted in designing multimodal systems combining different biometric traits. A lot of...

  • BIOMETRICS ARE TOO HOT TO HANDLE. Bruno, Maria // Bank Technology News;Sep2001, Vol. 14 Issue 9 

    Highlights advances in biometrics. Financial services' firms' cautious interest in the technology; Limited scale of majority of biometrics initiatives by banks as of 2001; Prohibitive prices of the technology; Different types of biometrics technologies. INSET: THE DARK SIDE OF BIOMETRICS.

  • Your body is your ID. Schlesinger, Hank // Popular Science;Jan99, Vol. 254 Issue 1, p56 

    Reports on the development of biometric techniques, which use unique characteristics of the body for identification purposes. Main principle behind the technique; Accuracy and efficiency; Examples.

  • The Conflicts from Legislation. Erickson, Don // Security: Solutions for Enterprise Security Leaders;May2008, Vol. 45 Issue 5, p80 

    The article discusses the impact of state and local policies regarding the use of technologies needed to secure hospitals, schools, mass transit systems, ports and the nation's critical infrastructure in the U.S. The author claims that when state legislation restricts the use of biometrics and...

Share

Read the Article

Other Topics