Free Essay

E-Passports and Rfid

In:

Submitted By acad21
Words 1911
Pages 8
I. E-Passport Proposal Following the 9/11 terrorist attacks, the Bush Administration launched the Machine Readable Passport (MRP) program to increase border security. In 2005, the US government issued its first E-passports (see Fig 1) to select government officials and went public with issuance in late 2006, albeit amid numerous privacy concerns. The new passports contain traditional passport information (such as name, date of birth, gender, place of birth, date of issuance and expiration, and passport number) as well as personal biometric information for facial and fingerprint recognition purposes on a 64 kilobyte chip. Figure 2 shows the configuration of data in the E-passport (Yong & Bertino, 2007). The US Department of State and Western Hemisphere Travel Initiative determined electronic passports were necessary in order to facilitate faster immigration inspections and increase border protection and security. E-passports are scanned prior to inspections, providing border patrol agents additional assurances regarding authenticity, originality, and validity of the relationship between the holder and travel documentation. They also permit officials to scan passport information against watch lists and national no-travel databases to more accurately define prospective terrorists and other threats to the nation (US DOS, 2009).
II. Contactless Technology: Radio Frequency Identification (RFID) International standards for passports have been set by the International Civil Aviation Organization (ICAO) for the past 50 years. The ICAO accepted the RFID technology as a leading global standard due to its “global interoperability, reliability, durability, and practicality” (King, Meingast, & Mulligan, 2007). While some countries use other smart-card technology for their versions of E-passports, the 27 countries in the US Visa Waiver Program are required to use the RFID technology. All 189 ICAO member states have agreed to issue E-passports by 2010 (Witteman, 2007). A contactless integrated circuit (IC) is the core of the E-passport. A small inlay is inserted in the rear cover of the electronic passports that uses a secure version of RFID. An antenna coil surrounds the IC that is stimulated by a radio frequency field to activate and communicate with a reader (Wright, 2005). The IC meets the transmission criteria for proximity based identification cards provided by the ISO 14443 standard (US DOS, 2009). Three types of RFID ICs are available: active, semi-active, and passive (RFID, 2004). The E-passport uses a passive RFID, meaning the IC must be activated by a radio frequency field within a certain range determined by the ICAO as standard (903-927 MHz). As the passport enters the appropriate radio frequency, the IC is activated. The initial signal is sent to the IC from the reader (Wright, 2005). This signal is sent to prove authenticity of the passport data, known as passive authentication (PA) using Public Key Infrastructure (PKI) technology (Liersch, 2009) PKI uses a “cryptographic computation to validate the authenticity using the public key of the passport issuing country” evaluated against a separate certificate authority from the reader. If the key is accepted, the reader requests the travel document and biometric data from the IC (Witteman, 2007). Once the reader obtains the data, the traveler’s information can be checked against multiple Homeland Security no-travel databases to minimize terrorist risks.
IV. Security and Privacy Concerns addressed by the US Department of State Initial issuance of E-passports to the public was expected by the end of 2006, but privacy concerns created demand for increased security measures before widespread adoption. In response to public outcry, the US Department of State added personal privacy security measures to the E-passport. Additions included an anti-skimming shield built into the cover of the passport, as well as Basic Access Control (BAC), which encrypts the transmission between the passport and reader. BAC also creates a unique “unlock code from a scan of the machine-readable portion of the passport” (King, Meingast, & Mulligan, 2007). BAC and passive authentication (PA) are mandatory for ICAO member countries. The main security and privacy risks addressed by the Department of State include: Skimming. Skimming is the process of obtaining data from an individual that has not granted permission to access such information. The E-passport includes a metal insert in the cover (a Faraday cage) that blocks RF transmission. When closed, the passport chip will remain passive, even in a matching radio frequency field (King, Meingast, & Mulligan, 2007). Skimming and eavesdropping were the two main privacy concerns among privacy advocates (US DOS, 2009). Eavesdropping. Eavesdropping is the interception of information as it is transferred from the IC to the reader. Preventative measures to reduce eavesdropping primarily involve BAC. The target of BAC is confidentiality, focusing on providing authentication and creating a secure channel of communication. A reader must first optically scan the Machine Readable Zone (MRZ) located at the bottom of the passport, and derive the access key from the scanned information. When a communication channel is developed, the reader authenticates the passport based on an encrypted key embedded in the MRZ. If authentication is successful, the chip releases the encrypted data to the reader, which is decrypted securely on the reader. BAC provides security against both skimming and eavesdropping as it limits access to readers by using access keys (King, Meingast, & Mulligan, 2007). Cloning. Cloning is the process of creating a duplicate passport by adding data on a passport to a fake chip (King, Meingast, & Mulligan, 2007). If a hacker gained access to a blank passport, he/she could potentially duplicate an unassuming traveler’s passport without them knowing. In this circumstance, the traveler would not report the passport lost or stolen because they still physically have it. This issue has been the most difficult to address (Witteman, 2007). Currently, the Department of State is relying on PA and BAC to thwart potential clones (US DOS, 2009). As described later, active authentication (only used in a few countries due to high costs) and RFID fingerprinting are potential security mechanisms to minimize cloning risks. Tracking. Tracking is the process of obtaining information related to the movement of a person or object (King, Meingast, & Mulligan, 2007). When the reader initially communicates with the chip, the unique ID (UID) of the chip is transferred in order to begin passive authentication. If the ID were to remain static, a hacker would need to intercept the communication channel only once to track a passport holder. To deal with this, each chip has a built in random number generator that changes the UID before each session to prevent the use of the UID for tracking purposes (Bundesamt fur Sicherheit, 2009).
V. Additional security mechanisms not implemented in current E-passports Active authentication (AA). The cloning concern can be addressed with active authentication. While passive authentication addresses the authenticity of passport data, active authentication addresses the authenticity of the passport chip. AA uses an IC-individual key pair to induce a challenge-response protocol that compares a public key stored in the reader with a private key in the chip. The chip can prove the key pair before allowing a reader to access data. The private key is stored in secure memory that cannot be read out, making it unique to the chip and secure (Bundesamt fur Sicherheit, 2009 & Liersch, 2009). The use of this technology is limited in RFID due to the size requirements for computations, although several European countries that use other forms of smart-card technology have already implemented AA (Liersch, 2009). Extended access control (EAC). EAC allows the E-passport to authenticate the reader attempting to gain access in order to limit access to personal information. The system is based on “certificate validation, issued by the E-passport issuing country” (Liersch, 2009). The IC uses PKI based on individual asymmetric key pairs. The use of the asymmetric key pairs provides a strong, secure communication channel (Witteman, 2007). The US only includes facial image biometric information in E-passports. The new passports do not include biometric information beyond a facial image such as fingerprints, so sensitive data that should only be accessed by authorized readers was not fully protected. As the E-passport technology develops and biometric information is used for processes such as automated inspections, the use of EAC will be necessary to secure more sensitive data (Bundesamt fur Sicherheit, 2009). See Figure 3 for all security mechanisms recommended, although not mandated, by the ICAO (Liersch, 2009). RFID fingerprinting. As recent as mid-November 2009, Thompson and Di, researchers from the University of Arkansas, have discovered unique ‘electronic fingerprints’ derived from several physical characteristics in each RFID chip. The passive RFID tag modulates a signal after being charged which is unique to each individual chip. Radio frequencies range from 903 to 927 megahertz and increased by increments of 2.4 megahertz. These measurements revealed that each tag had a unique minimum power response at multiple radio frequencies. Same-model tags also varied significantly in power responses (Thompson, D & McGowan, 2009). An added feature of this ‘fingerprinting’ is that the unique characteristics are separate from the computation capabilities of RFID ICs. Thus, minimal costs would be associated with implementing this added security that would limit the possibility for cloning (Thompson, D & McGowan, 2009).
VI. Conclusion E-passports provide a means for increased border security, although the contactless nature of the RFID technology creates significant privacy concerns. The Department of State has taken measures to reduce the threat of some of these concerns, such as skimming and eavesdropping, though there are still several opportunities for hackers to gain access to an individuals travel documents. While there are proven concepts to increase the authenticity, validity, and originality of E-passports, policies and procedures need to be implemented in order to use them. Understanding that RFID technology is limited to a cost-benefit relationship, additional research will be necessary to reduce the investment necessary in precautionary measures such as EAC and AA. The current measures addressing privacy concerns offer limited privacy protection at the cost of complex technology and procedures.

References
Bundesamt fur Sicherheit (2009). Advanced security mechanisms for machine readable travel documents. Retrieved November 25, 2009 from https://www.bsi.bund.de/cae/servlet/contentblob/532066/publicationFile/44792/TR-03110_v202_pdf
King, J., Meingast, M. & Mulligan, D. (2007). Embedded RFID and everyday things. IEEE International Conference on RFID. March 26-28. Grapevine, TX.
Liersch, I. (2009). Electronic passports – from secure specifications to secure implementations. Information Security Technical Report. 14, 96-100. Retrieved from Elsevier ScienceDirect.
O’Connor M.C. (2007 Aug 16). One year later, US E-passports architect says system is a success. RFID Journal. Retrieved November 23, 2009 from http://www.rfidjournal.com/article/articleview/3567/1/1/
Swedberg, C. (2004 Nov 2). US tests E-passports. RFID Journal. Retrieved November 23, 2009 from http://www.rfidjournal.com/article/articleview/1218/1/1/
Thompson, D. & McGowan M. (2009 Nov 19). Fingerprinting RFID tags: Researchers develop anti-counterfeiting technology. University of Arkansas. Retrieved November 23, 2009 from http://dailyheadlines.uark.edu/16260.htm
Witteman, M. (2007 Dec 3). On the security of E-passports. Help Net Security. Retrieved November 23, 2009 from http://www.net-security.org/article.php?id=1100&p=7.
Wright, M. (2005 July 5). Contactless traveling. Electronics Design, Strategy, & News, 50(14), 42. Retrieved from Academic Search Premier.
US Department of State (2009). The US electronic passport. Bureau of Consular Affairs. Retrieved from http://travel.state.gov/passport/eppt/eppt_2498.html
Yong, J. & Bertino, E. (2007 October). Replacing lost or stolen E-passports. Computer, 40(10). Retrieved from IEEE Xplore.

Similar Documents

Premium Essay

Rfid

...Brief History of RFID: RFID technology was invented in 1948, but it was not mainstreamed for commercial applications until the 1980s. One of its first known applications was during World War II, when it was used by the British radar system to differeniate between German aircraft and their own aircraft with attached radio transponders. Only recently, due to technology advances, have the price points dropped to where RFID is now feasible for companies to adopt. Wal-Mart was among the first commercial enterprises to select RFID technology to achieve improvements in the inventory supply process and theft control. Wal-Mart started the process of implementing RFID throughout its retail distribution chain by requiring its top 100 suppliers to use RFID tags by year-end 2004 on the pallets and cases they shipped to Wal-Mart. However, in 2004 due to the status of standards and limited tag production capabilities, manufacturers of RFID tags were unable to meet the volume of demand within Wal-Mart's desired time frame. As the standards further evolved, production capabilites expanded and price points kept dropping, Wal-Mart's implementation is now in full swing with most of their top suppliers delivering RFID tagged pallets and crates to all of Wal-Mart's distributions centers. RFID use has started to penetrate other corporate supply chains, but in many cases these implementions are closed loop systems. In other words, the RIFD is deployed within a particular corporation's supply...

Words: 1562 - Pages: 7

Free Essay

Birometric

...advances have allowed many governments to increase their defenses against threats to national security. One of these new measures is the biometric passport, which has grown out of the necessity to overcome the misuse of paper travel documents. Some of the problems that have been encountered with the use of paper passports are copying and manipulation, selling of valid passports to a third party, and counterfeit or forged passports. Due to the difficulty of discerning a real passport from a fake, agents must undergo extensive training that still does not adequately protect against these threats. One of the initial attempts to increase border security by more accurately verifying identity and preventing counterfeit passports was the introduction of e-passports, or electronic passports. E-passports are identical to paper passports with the addition of an embedded, contactless smart-card containing the same information as the visual passport, including a digital version of the photograph. The contactless smart card is a tiny microprocessor that transmits information wirelessly utilizing RFID technology over distances of less than four inches. These smart-cards utilize advanced security mechanisms to prevent alterations to the embedded data. Unfortunately, these attempts did not prevent passport abuse. In response to persistent passport fraud, biometric technologies have been employed as an additional security measure. Biometric technology is an automated mechanism that verifies...

Words: 1617 - Pages: 7

Premium Essay

Rfid

...International Journal of Scientific & Engineering Research Volume 4, Issue 2, February-2013 ISSN 2229-5518 1 RFID-Based Students Attendance Management System Arulogun O. T., Olatunbosun, A., Fakolujo O. A., and Olaniyi, O. M. Abstract In recent years, there have been rise in the number of applications based on Radio Frequency Identification (RFID) systems and have been successfully applied to different areas as diverse as transportation, health-care, agriculture, and hospitality industry to name a few. RFID technology facilitates automatic wireless identification using electronic passive and active tags with suitable readers. In this paper, an attempt is made to solve recurrent lecture attendance monitoring problem in developing countries using RFID technology. The application of RFID to student attendance monitoring as developed and deployed in this study is capable of eliminating time wasted during manual collection of attendance and an opportunity for the educational administrators to capture face-to-face classroom statistics for allocation of appropriate attendance scores and for further managerial decisions. Keywords: RFID, Lecture, Attendance, Passive tag, Reader INTRODUCTION T he emergence of electronic paradigm for learning compared to traditional method and availability of almost all information on the information superhighway(Internet), nowadays have caused students to be less motivated to come to the lecture rooms than ever before. Laziness on the...

Words: 3596 - Pages: 15

Premium Essay

Biometric Attendance System

...See discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/269327743 Biometric-based attendance system with remote real-time monitoring for tertiary institutions in developing countries CONFERENCE PAPER · NOVEMBER 2013 DOI: 10.1109/NIGERCON.2013.6715633 DOWNLOADS VIEWS 86 111 4 AUTHORS, INCLUDING: U. Eze Peter Federal University of Technology Owerri 3 PUBLICATIONS 0 CITATIONS SEE PROFILE Available from: U. Eze Peter Retrieved on: 19 August 2015 Biometric-based Attendance System with Remote Realtime Monitoring for Tertiary Institutions in Developing Countries Eze Peter U., Joe-Uzuegbu C. K. A, Laz Uzoechi, Opara F.K Department Of Electrical/Electronic Engineering Federal University Of Technology, Owerri, Imo State, Nigeria peter.eze@futo.edu.ng, joskie23@yahoo.co.uk, laz_okey@yahoo.com class album. The system will easily produce required reports for both lectures and examinations. For the staff, check-in by proxy needs to be eliminated and there should be a way of monitoring and automatically appraising the staff based on check-in/out time for each working day. Remote monitoring is allowed for managers because they may have travelled out of the four walls of the institution but still needs to know what is happening in real time. Remote check-in/out is NOT allowed. One has to be within the campus in order to check-in/out of the system. However, remote monitoring is allowed...

Words: 3263 - Pages: 14

Premium Essay

Rfid Critics

...CURRENT TOPICS IN COMPUTING (CSC 812) A RESEARCH ON RADIO FREQUENCY IDENTIFICATION (RFID) (PRESENT, FUTURE APPLICATION, SECURITY IMPLICATION AND CRITICS) SUBMITTED BY AKINSOWON, TOSIN BLESSING (060805018) IN PARTIAL FULFILMENT OF MASTER DEGREE TO DEPARTMENT OF COMPUTER SCIENCES, FACULTY OF SCIENCES, UNIVERSITY OF LAGOS, AKOKA, YABA, LAGOS. SESSION 2012/2013 SUPERVISED BY Prof H.O.D LONGE Abstract Radio Frequency Identification (RFID) technology has been available for more than fifty years. However it has only been recently that the prices of RFID devices have fallen to the point where these devices can be used as a "throwaway" inventory. This presents numerous opportunities along with innumerable risks. A lot of research is being done to suggest methods which will ensure secure communications in RFID systems. The objective of this paper is to present RFID technology, its current, future applications, study various potential threats to security, and Critics of RFID. 1 Introduction RFID 1.0 BACKGROUND STUDY Radio Frequency Identification (RFID) is an automatic identification system. It make use of Radio Frequency (RF) to identify “tagged” items .Data collected were transmitted to a host system using a Radio Frequency Reader. RFID is one of the numerous technologies grouped under the term Automatic Identification (Auto ID), such as bar code, magnetic inks, optical character recognition (OCR), voice recognition, touch memory, smart cards, biometrics etc. Auto ID technologies...

Words: 5867 - Pages: 24

Premium Essay

Rfid

...| ByMr Shireesh | RFID | | | | Words Count: 2,180 Tables of Content Page Tables of Content 1 Introduction 2 What is Radio Frequency Identification (RFID)? 2 - 3 Purpose of RFID 3 - 6 Benefits of RFID 6 Disadvantages of RFID 6 Points of View 7 Conclusion 8 References 9 Introduction Imagine a technology that could slice the time it takes a retailer to measure inventory, one that could provide accurate information about a single tem as it moves from manufacturing through a store and then on to post-sales support. Imagine one that could finally fully automate checkout, freeing store personnel to provide increased levels of customer support. RFID - Radio Frequency Identification...

Words: 2473 - Pages: 10

Premium Essay

Internet Challenges to Security and Privacy

...ASSIGNMENT ON TERM PAPPER INTERNET CHALLENGES TO SECURITY AND PRIVACY SUBMITTED BY : GIFTY KARUVELIL SAM ID NUMBER: 0160011 SUBMITTED TO : PROFESSOR . JOYCE JAMES MG. 650: MANAGING INFORMATION TECHNOLOGY ACROSS THE ENTERPRISE TABLE OF CONTENT : * INTRODUCTION * ANALYSIS OF SECURITY AND PRIVACY * CATEGORIZATION AND SESITIVITY * STATE OF RESEARCH * MAJOR PLAYERS I THE INTERNET * GLOBAL SENSOR NETWORK MIDDLEWEAR * RFID * PHYSICAL MECHANISM * CRYPTOGRAPHIC PROTOCOLS * RESEARCH FROM OTHER DOMAINS * INFORMATION ACCOUNTABIILITY * CRYPTOGRAPHIC IDENTIFIERS * KEY EXTRACTION FROM WIRELES CHANNL CHARACTERISTECS * CONCLUSION 1 1 Introduction The Internet has undergone severe changes since its first launch in the late 1960s as an outcome of the ARPANET. The initial four-node network has quickly grown into a highly interconnected and self-organized network that builds the daily basis for business, research, and economy. The number of people using this worldwide network has exponentially grown up to about 1.5 bn and hereby makes up about 20% of the world population. This sheer number of end...

Words: 4680 - Pages: 19

Premium Essay

Library System of Nsu

...NSU Library System MIS 205.10 Group Number: D Md.Tanjil Islam 121 0690 030 Soumik Saha 122 0191030 Rafid Habib 122 0318 030 Md. Ali Noman 122 0385 030 Md. Fakrul Alam 122 0185 030 Table Of Content Serial Number | Content Name | Page Number | 1 | Introduction | 1 | 2 | Resources | 1-2 | 3 | System Architecture | 2-3 | 4 | RFID technologies for libraries | 4-5 | 5 | Advantages of RFID system | 6-7 | 6 | How North South Library System works | 8-10 | 7 | New innovation through RFID system | 10-11 | 8 | Proposed system | 12-14 | 9 | System design | 15-19 | 10 | Software testing | 20-21 | 11 | Conclusion | 22 | 12 | References | 23 |  Introduction North South University (NSU) Library grew over the years since 1992 and now has become one of the best university libraries in the country. This is the first fully automated university library in the country using Bi-lingual Library Management Software, developed by NSU Library, which supports MARC-21, web-based online lending and receiving, browse databases of books, CDs, journals...

Words: 4047 - Pages: 17

Premium Essay

Managing Business Strategy

...Table of Contents Page 1) Executive Summary 2 2) Introduction 3 History & Background 3 3) Situational Analysis 3 Vision Statement 3 Mission Statement 4 4) Environment Analysis 5 PESTEL Analysis 5 Porter’s Five Forces Analysis 9 SWOT Analysis 11 5) Focus Strategy 13 6) Grand Strategy 13 Expansion 13 Related Diversification 13 7) Conclusion 13 8) References 14 1.0 Executive Summary Business Strategy is the direction and future goal set for a business to achieve the competitive advantages which unique tailored with the available resources within an organization to the rapidly changing environment to achieved their objective. (Johnson & Scholes, 2002) More precisely the strategy involved in the following finding: * Identify the external environmental that give impact to an industry * Identify the internal environment that gives impact on competition and profitability * Evaluate the new opportunity from current and new market * Assess the industry life cycle and forecast future changes in industry * Identify Critical Success Factors This paper report transcript the introduction of the company Atlantic Zeiser (the numbering machine company in the old days) and its subsidiary operation...

Words: 3956 - Pages: 16

Free Essay

Networking Basics

...1 INTRODUCTION Each of the past three centuries was dominated by a single new technology. The 18th century was the era of the great mechanical systems accompanying the Industrial Revolution. The 19th century was the age of the steam engine. During the 20th century, the key technology was information gathering, processing, and distribution. Among other developments, we saw the installation of worldwide telephone networks, the invention of radio and television, the birth and unprecedented growth of the computer industry, the launching of communication satellites, and, of course, the Internet. As a result of rapid technological progress, these areas are rapidly converging in the 21st century and the differences between collecting, transporting, storing, and processing information are quickly disappearing. Organizations with hundreds of offices spread over a wide geographical area routinely expect to be able to examine the current status of even their most remote outpost at the push of a button. As our ability to gather, process, and distribute information grows, the demand for ever more sophisticated information processing grows even faster. Although the computer industry is still young compared to other industries (e.g., automobiles and air transportation), computers have made spectacular progress in a short time. During the first two decades of their existence, computer systems were highly centralized, usually within a single large room. Not infrequently, this room had...

Words: 6497 - Pages: 26

Premium Essay

Business

...Definitions: * Human resource management= the management function focused on maximizing the effectiveness of the workforce by recruiting world-class talent, promoting career development and determining workforce strategies to boost organizational effectiveness * Job analysis the examination of specific task that are assigned to each position independent of who might be holding the job at any specific time. * Job description= an explanation of the responsibilities for a specific position * Job specifications: the specific qualifications necessary to hold a particular position * Hr plan= recruitment, selection, training, evaluation,compensation,benefits,separation * Internal recruitment= the process of seeking employess who are currently witshin the firm to fill open positions * Internal advantages=lowers cost of recruitment and training/ reduces risk for the firm, since current employees have a proven track record/boost employee morale by reinforcing the value of experience within the firm * External recruitment= seeking new employees from outside the firm * Structured interviews= involves developing a list of questions beforehand and asking the same questions in the same order to each candidate * Probationary period: specific time frame 3-6 months which a nire hire can prove his or her worth on the job before he or she becomes permanent * Contingent worker: employess who do not expect regular, full time, temporary,indepentdent contrators...

Words: 6094 - Pages: 25

Premium Essay

Managerial Applications of Information Technology

...Anne Lehman Managerial Applications of Information Technology – IS535 Beacom DeVry University, Keller Graduate School of Management February 17, 2013 Table of Contents 1. Abstract…………………………………………………….3 2. Brief Company background………………………………...3 3. Discussion of business problem…………………………….3, 4 4. High level solution…………………………………………..5 5. Benefits of solving the problem……………………………..5, 6 6. Business/technical approach……………………………….6, 7 7. Interim’s Systems…………………………………………..7, 8 8. Technology /solution……………………………………….8, 9 9. High-level implementation plan…………………………..10 10. Conclusions ………………………………………………10, 11 11. Summary of project…………………………………………11 References…………………………………………………………..12 Abstract The business problem to be solved is how to improve operational efficiencies, reduce employee time management issues, and improve insight into the patient’s care and health for improved strategic planning, performance monitoring, and client satisfaction. Company Background Interim HealthCare was founded in 1966. It is the nation's leading home care, hospice and medical staffing company. Interim has more than 300 independently owned and operated franchise locations provide a variety of home health, senior care, hospice, palliative care, pediatric care and healthcare staffing services. The independent franchisees employ more than 40,000 health care workers providing nurses, therapists, aides and other health care personnel to approximately 50,000...

Words: 2644 - Pages: 11

Premium Essay

Bsat

...Roman G. Fall 2012 bsat 303: Final Exam Study Guide Note: The study guide should be used along with the classroom lectures I posted to Moodle, your personal notes from my lectures, and the information found within the chapters.  HTML (Basic knowledge and example code) o Tags, Hyperlinks, Emails, Images o o Hyperlink Visit MTV o  HTML – the language you use to create a Web site To insert an image Steps in Decision Support Systems o Decision support system (DSS) – a highly flexible and interactive system that is designed to support decision making when the problem is not structured o Decision support systems help you analyze, but you must know how to solve the problem, and how to use the results of the analysis o o   Model management component – consists of both the DSS models and the model management system o Data management component – stores and maintains the information that you want your DSS to use o User interface management component – allows you to communicate with the DSS Types of Decisions (Structured, Nonstructured, Recurring, Nonrecurring) o Structured decision – processing a certain information in a specified way so that you will always get the right answer o Nonstructured decision – one for which there may be several “right” answers, without a sure way to get the right answer o Recurring decision – happens repeatedly o Nonrecurring (ad hoc) decision – one you make infrequently Artificial Intelligence, Geographic...

Words: 4354 - Pages: 18

Premium Essay

Kose Nanat Madar Jendeye Khar Koseye Kos Nane

...Prospects for Thought Communication Kevin Warwick and Daniela Cerqui Department of Cybernetics, University of Reading, Whiteknights, Reading, RG6 6AY, UK Abstract In this paper we take a look at the realistic future possibility of thought communication. Technical details are presented on experimentation carried out thus far using implant technology and the route ahead involving brain-computer interfaces is described. Of importance in the paper is however the ethical issues raised by such a novel technological development. Discussion is centred on how this relates to previous technological innovations and their early acceptance, e.g. the telephone. 1. Introduction Technology is now becoming available which is opening up the realistic possibility of thought communication between individuals being achieved in the forthcoming decade, through the use of brain-computer implants. Indeed the first trials along these lines are even now occurring in several research labs [Kennedy et. al., 2000; Warwick et. al., 2004]. New technical methods presently being looked into (e.g. nanotechnology) are only likely to further enhance the results obtained thus far and speed up the rate of progress in this area. Witnessing the dawning of a completely new and revolutionary technical capability for humans raises a multitude of questions in terms of the effects on all aspects of society. It is interesting to consider what we can learn by looking back to relevant new directions when they have occurred...

Words: 4487 - Pages: 18

Premium Essay

Personal Statement

...Medical Smart Card System for Patient Record Management Changrui Xiao and Arthur Yu Bears Breaking Boundaries 2009 Science, Technology, and Energy Policy White Paper Competition Executive Summary (Abstract) Rising healthcare spending has led to an increase in calls for ways to reduce the cost of healthcare. Amid the debate on the best approach on cut costs in the healthcare system, one of the few bipartisan provisions is the need to integrate modern technology into the storage and transfer of medical records. Current attempts to establish such electronic medical records are challenged by concerns about patient privacy, issues with the incorporation of old records, and budget limitations. We propose the development of personal portable healthcare record smart cards and a corresponding framework to simplify maintenance and transfer of patient records as an incremental step towards a nationalized electronic records system. Our proposal is a feasible and cost-effective system that applies existing technology to address inefficiencies of the current paper based medical records system; simultaneously, it also serves as a transition system to facilitate the adoption of completely electronic medical records. Author Affiliations: Xiao and Yu are both undergraduates at UC Berkeley. Contact Information: ayu.yua@gmail.com or crx687@berkeley.edu 1 1. Introduction During the second half of the 20th century, the national expenditure on healthcare increased dramatically. As of...

Words: 4983 - Pages: 20