Free Essay

Fingerprint Biometric Authentication for Enhancing Staff Attendance System

In:

Submitted By azhari
Words 4926
Pages 20
International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
Foundation of Computer Science FCS, New York, USA
Volume 5– No.3, February 2013 – www.ijais.org

Fingerprint Biometric Authentication for Enhancing Staff
Attendance System
Oloyede Muhtahir O.
Dept. of Info. and Comm. Science
University of Ilorin, Ilorin.

Adedoyin Adeyinka O.
Dept. of Info. and Comm. Science
University of Ilorin, Ilorin.

ABSTRACT
Biometric technology that involves the identification and verification of individuals by analyzing the human body characteristics has been widely used in various aspect of life for different purposes, most importantly as regards this study the issue of staff attendance. Despite the numerous advantages of the biometric system and its impact to various work sectors across the globe, most biometric technology users face the issue of defining the right and accurate biometric technology system that will be cost effective in solving particular problems in specific environment.
In this paper, a study was conducted using a telecommunication company in the South West region of Nigeria, in order to determine the specific biometric identifier that can be used to enhance their traditional staff attendance system which presently affects the productivity of the organization. The study was conducted using a quantitative approach by designing a questionnaire as the data collection instrument based on different biometric technologies. The survey involved 37 employees based on stratified random sampling technique. The results however show that fingerprint biometric identifier was found suitable for the staff attendance management system of the organization. It therefore, implies that attention should be paid to several factors before recommending biometric technology as a means of improving the productivity of an organization business processes.

Adewole Kayode S.
Dept. of Computer Science
University of Ilorin, Ilorin.

stated that staff productivity is greatly affected by the attendance of staffs [9].
According to [10] as stated in Human Resource Magazine
(2011) that, company staffs succeed in stealing the company’s productivity without the management even noticing through absenteeism and buddy punching. The use of the traditional methods for staff attendance, for example staffs signing on attendance sheet on entering the organization also contribute to the poor performance of the company’s productivity, though the impact of staff absentee and staff running late vary differently amongst different market sectors. It was further stated that “employee absence and buddy punching directly cost the UK economy nearly 17 billion pounds which equates to 27 million working days. This demonstrates the negative effect of buddy punching and staff absenteeism on a company’s productivity which can be solved by the introduction of a biometric technology system.

1.1

RESEARCH OBJECTIVES

The main objective of this research is to critically analyze various forms of biometric technology systems and how they have been used in the past till the present time, especially on the issue of staff attendance system in various organizations.
Also, the study highlights various factors that are to be considered when implementing a biometric system for a particular purpose.

General Terms

1.2

Biometrics, Staff Attendance, Authentication.

This research covers the preferences of the respondents on which biometric technology system should be used for the purpose of staff attendance in the company situated at the
South West region of Nigeria. The six biometric technologies included in this study as options are the fingerprint, hand geometry, iris recognition, voice recognition, face recognition and signature verification. The respondents, who participated in the self-administer questionnaire, are employees of the company who use the traditional way of recording staff attendance. Furthermore, the study used the descriptive research method that subsequently uses a survey instrument in form of a questionnaire. Meanwhile, the sampling design used to select the respondents is through the pure random sampling.

Keywords
Biometric, verification, staff attendance, telecommunication, productivity. 1.

INTRODUCTION

Today, many industries are experiencing technological advancement and changes in the mode in which they carry out their business processes. With the rise of globalization, it is becoming essential to find an easier and more effective system to help an organization or company improve their employee’s productivity. In spite of this matter, there are still business establishments that use the old-fashioned way i.e the manual process of recording employee’s attendance [7].
Staff attendance management system is an easy way to keep track of attendance of staffs within an organization. It covers the requirements of the personnel department in terms of day to day monitoring of staffs, calculation of overtime and transfer of relevant information to the payroll system and manpower analysis. Hence, staff attendance is an important issue every kind of organization must take into consideration in order to be productive [8]. Also, a report from the Shropshire council

2.

SCOPE OF THE STUDY

BIOMETRIC TECHNOLOGIES

The various forms of biometric technology have been in existence for several centuries for the purpose of identification.
One of the oldest forms of biometrics is the recognition of the human face because facial characteristics are matched within our memory. Civilization became larger and other methods arose, such was documenting images in portraiture, for example, in 1434 the Arnolfini marriage was painted by Jan
Van Eyke for the purpose of marriage certificate [11].
According to [22], in the mid 1960s, the face recognition

19

International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
Foundation of Computer Science FCS, New York, USA
Volume 5– No.3, February 2013 – www.ijais.org system as a relatively new concept was developed. An administrator was required to point out certain body features like eyes, ears, nose and mouth on photographs before the distance and ratio are calculated to a common reference point which is then compared to a reference data. [22] further stated that the lip thickness and hair were used as specific subjective markers by Goldstein and Lesk in the 1970s to automate recognition. The problem that the solution faced was that measurements and locations were manually computed.
Biometric technologies include fingerprint, iris, hand geometry, handwriting signatory, voice recognition, facial scan, palmprint, keystroke and gait recognition.

2.1

Review of Existing Biometric
Technology and Its Usefulness in
Various Sectors

The origin of biometrics has been in the public sector; however biometrics is used for the identification and verification of criminals [18]. Other sectors where biometrics has also thrived are the Banking, Education and Health sectors. For example, emerging application markets include biometrically enabled transactional payment solutions and biometrically enables wireless for business use. Some European banks use the 3D facial recognition of employees into bank buildings, thereby eliminating the issue of keys been lost, stolen or misused [19].
Furthermore, biometric application has been useful in various other sectors which include the Government using it for the purpose of stopping terrorist attacks and fighting crimes. After the 9/11 incident, the Yeager Airport in Charleston introduced the biometrics system, which is used to secure access to its control tower [20]. Also, the biometrics system has been very useful in the Education sector where it has assisted students in the borrowing and returning of books out and into the library respectively. The positive impact of biometrics to the health sector cannot be left out has it has helped in stopping fraud where some healthcare bill for services they never performed.
A palm scanner which reads a patient’s unique vein pattern was implemented in Sharp Healthcare in San Diego for the purpose of stopping patient identity theft, the system was known to be very secure and performed efficiently well for its purpose [23].
Furthermore, biometrics can be integrated with other systems for it to carry out its purpose of identification. Various homeland security databases require the use a card access system integrated with a biometric technology to gain access
[24].

2.2

Biometric and Staff Attendance

Biometrics is the detailed measurements of the human body.
Biometrics deals with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioural characteristics [12]. Fingerprints are graphical flow-like ridges present on human fingers; their formations depend on the initial conditions of the embryonic mesoderm from which they develop [13].
With fingerprint authentication technology, it is easier to track employee's time and attendance with the touch of a finger.
Biometric fingerprint authentication is the most accurate way to collect employee's time and attendance information. It verifies an employee’s identity based on the characteristics of their fingerprint [14].
The American Payroll Association (APA) estimates that time theft, tardy arrivals, buddy punching, lollygagging (wasting time getting to the work area), extended breaks and early

departures costs businesses 1.5 to 5 percent of gross payroll, amounting to hundreds of billions of dollars every year.
Industry studies support these estimates and in recent APA surveys, employees were reported to be stealing an average of
4.5 hours each week, equivalent to a six-week paid vacation per year. According to a Nucleus Research study, buddy punching is experienced by 74 percent of organizations [15].
However, technological advances in biometrics have now made this surprisingly affordable and popular. The Biometric
Fingerprint reading sensor scans any fingerprint in under 1 second; this in turn will make clocking in and out much faster for your employees and at the same time saving your company time and money by paying your employees for the exact time they work. Your company will also reduce costly payroll and data entry errors caused by the old time card system [14].

3.

RESEARCH METHODOLOGY

3.1

Research Design

Research design is the plan on how the researcher goes about finding an accurate answer to the research question. The research design plan contain clear objectives, derived from research question(s), specify the sources from which data are to be collected, and consider the constraints that may arise, such as access to data, time, location and money as well as discussing ethical issues [16]. This study employed the use of quantitative research method as the study involves data being obtained to be analyzed and processed before it can be of meaning. However, quantitative techniques such as graphs, charts and statistics allows for this, making data obtained by the researcher to be useful and turn them to information [17].

3.2

Research Questions

Many organisations have dwell into the implementation of biometric technology systems to solve the issue of staff attendance. In most cases, the biometric systems chosen do not serve its purpose effectively because biometric technology characteristics such as cost effectiveness, reliability, and the need for the technology itself are not taking into consideration
[5]. Hence, the following research questions were considered:
i.

What type of biometric technology system are you familiar with?

ii.

Does your company need to enhance the recording of attendance of employees?

iii.

Do you prefer your company should use a biometric system to enhance staff attendance?

iv.

What type of biometric technology do you preferred your company to use?

3.3

Sample Population and Sample Size

The amount of data needed to be collected by acquiring data from only a subgroup rather than an entire population is made possible by the use of sampling techniques that provides a range of methods to achieve this [16]. The sample population of this study involves the total number of staffs in the company in which there is a total number of about 250 staffs and 6 departments, each department in the company has its own supervisor and divisional heads. Though, this study involves all the staffs of the company where the proposed biometric technology system is to be implemented to solve the problem of staff attendance, however the time involved in sampling the whole population may affect the completion of this research.

20

International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
Foundation of Computer Science FCS, New York, USA
Volume 5– No.3, February 2013 – www.ijais.org
Hence, a sample of the staff population shown in table 1 has been targeted for the success of this study.
Table 1: Sample size
STATUS

GENDER

FREQUENCY

4.

RESULTS AND DISCUSSION

The analysis of the results obtained based on the questionnaire filled by the respondents who are the employees of the organization which a biometric system is to be proposed, that will sustainably solve the present issue of staff attendance within the company is therefore presented in this section.

MALE

FEMALE

SUPERVISORS

3

1

4

4.1

STAFF

22

18

40

TOTAL

25

19

44

The findings of the survey with reference to the demographic profile of the respondents in terms of age and status/position in the company are tabulated as shown in tables 2 and 3 respectively. Table 2 shows that 12 employees or 32.43 % of the total participants composed the largest size of the respondents who belong to the age bracket of 30 to 39 at the time they participated in the survey. By a mere difference of 1 employee or 2.7 %, the largest percentage is followed by 11 employees or 29.73% who belong to the age bracket of 18 to
29. It is then followed by 9 employees or 24.32% who belong to the age bracket of 40 to 49; and lastly, 5 employees or
13.51% who belong to the age bracket of 50 and above. The researcher deemed it necessary to know the age of the respondents who are the employees of the company in which a biometric technology system is to be proposed to sustainably solve the issue of staff attendance, this is because age that reflects on biometric technology systems such as fingerprint technology and voice recognition changes. Several factors that might affect this biological identification to change are as follows: occupation, age, skin dryness, trauma, illness, injury, or trauma to hand [3]. [3] further stated that "when a biological identification of a person degrades, re-enrolments of such biometric features are necessary".

According to [16], there are different situations where sampling is necessary, such as: when it is impracticable for a researcher to survey the whole population; when time constraints prevent the researcher to survey the whole population and also budget which can prevent the researcher to survey the whole population. The population eventually targeted as a sample population for this study is the staffs of the Human Resource department of the company, i.e.1 out of the 6 departments of the company.
The department consists of a head of department, 3 divisional heads and 40 staffs.

3.4
Sampling Procedure and Sampling
Selection
Due to the limited time involved in carrying out this research, it was not possible to carry out the survey on the total population of staffs in the company. However, a sample out of the total population was used. Sampling which is mostly used by researchers using the quantitative research method is a process where a representative sample or a small collection of population from a larger population is drawn, such that the sample information enables the researcher to study the smaller group and produce accurate generalization about the larger group [21]. Furthermore, [21] stated that researchers have two motivations for using the random sampling; the first motivation being that it saves time and cost i.e. instead of gathering data from 250 employees of the company, the researcher will draw a sample of 44 employees. However, the data from the 44 employees will be equal to the data from all the 250 employees of the company. Secondly, the purpose for using the random sampling is accuracy i.e. a well designed and executed sampling can produce accurate results than trying to acquire data from all employees within the company. Hence, the respondents of this survey are the employees of the company that remains using the traditional system of monitoring the attendance records of the employees. The researcher has predetermined the total population of 250 and arrived to having the sample population size of 44 employees as respondents for the survey. Thus, 37 respondents eventually participated in the survey. In order to confirm the participation of the sample size, the researcher liaised with the Head of Human Resources
Department of the company who made sure the questionnaire gets to the right number of staffs. Following the pure random sampling, which was the actual conduct of the survey, the respondents were sent the link to the survey via the Head of
Human Resources Department by the researcher.

Demographic profile of the employees

Table 2: Distribution of Respondents by Age
Age

Frequency Distribution Percentage
%

18 to 29

11

29.73

30 to 39

12

32.43

40 to 49

9

24.32

50 and above

5

13.51

Total

37

100

In addition, table 3 shows the distribution of respondents according to position/status in the company. 33 employees or
89.19% hold the staff status, while the remaining 4 employees or 10.81% hold the supervisory status. This demography was deemed essential for inclusion in this research by the researchers. It is believed that the number of respondents who hold the staff status is very significant for they are the main people who use the traditional way of attendance recording and monitoring. Since all of the respondents are the “users” of the traditional method, it is necessary that this research employ their views on which biometric system is useful to them.
Furthermore, the inclusion of respondents who hold the supervisory status is also important has their views will help the researchers to know if a biometric technology system is needed in the company. However, this research paper recognizes that the decision making power on whether to

21

International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
Foundation of Computer Science FCS, New York, USA
Volume 5– No.3, February 2013 – www.ijais.org incorporate a biometric system in monitoring staff attendance in the company and which biometric technology system best fits the company budget lies in the management of the organization. Table 3: Distribution of Respondents by Position/Status
Position/Status Frequency Distribution Percentage

the option strongly disagree, Disagree, nor Undecided. This is supported with a research conducted by InfoTronics, Inc., which suggests that an advantage of a biometric system in an industry is that it prevents attempts of time fraud [4]. Another advantage of using a biometric system, which is actually related to the first one, is that it helps the company management in recording the working hours of the employees and automated report and time sheet generation [1].

%
Staff

33

89.19

Supervisory

4

10.81

Total

37

100

4.2
Biometric technology employees are familiar with

system

the

Figure 1 represents the responses to the research question (i).
Most of the respondents are familiar with the fingerprint biometric technology system with 17 or 45.95%. The second biometric system the respondents are familiar with is the hand geometry technology where 6 respondents or 16.22% had chosen it. The third system the respondents are familiar with is the iris recognition biometric technology system with 5 respondents or 13.51%. Comes next according to their ranking are voice recognition biometric technology system, chosen by 4 employees or 10.81%; face recognition biometric technology system, chosen by 3 or 8.11%; and signature verification biometric technology system with 2 respondents or 5.41%.
None of the respondents chose that they are not familiar with any of the options.

Figure 2: Showing respondents' views on the issue of staff attendance enhancement

4.4
The need for a biometric system to enhance staff attendance in the company
Since most of the respondents chose strongly agree that the company where they work needs to enhance the recording and monitoring of staff attendance as shown in figure 3. Hence, all the 37 respondents or 100% chose the “yes” to the research question (iii).

Figure 3: Preference of the respondents to whether their company should use a biometric system or not

4.5
The preferred biometric technology for staff attendance system in the company

Figure 1: Showing the biometric technology system respondents are familiar with
This research paper recognizes that indeed most individuals are more familiar with the fingerprint biometric technology since it is among the oldest biometric technologies and as popular as face recognition [2],[6].

4.3
The need for enhancing traditional staff attendance system

the

With reference to research question (ii), the respondents were requested to scale their responses from the options Strongly
Disagree, Disagree, Undecided, Agree, and Strongly Agree.
Figure 2 presents the responses according to the scaling. It indicates that most of the respondents, 29 or 78% chose the option strongly agree while the remaining 8 respondents or
22% chose the Agree option. None of the respondents chose

After the respondents were asked whether the company where they work needs a biometric system for enhancing staff attendance, they were then requested as stated in the research question (iv) to select from the options, fingerprint biometric, hand geometry, iris recognition, voice recognition and signature verification, their preferred biometric system for their organization. Figure 4 shows that fingerprint biometric system is the most preferred by the respondents having 15 employees or 41%. The second most preferred biometric system is the iris recognition having 8 respondents or 22%. The third most preferred system are the hand geometry biometric system and face recognition having equally selected by 5 respondents or
14%. The least preferred is the voice recognition biometric technology system being selected by 4 respondents or 11%.

22

International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
Foundation of Computer Science FCS, New York, USA
Volume 5– No.3, February 2013 – www.ijais.org

Figure 4: Showing the most preferred biometric technology system to be used by the company
Furthermore, the following discussion and analyses represented by figure 5 to 8 are focused on the findings of the survey as to the preferred biometric technology system based on qualities or features such as affordability, sustainability and acceptability.
Using the likert scale (1 to 3, where 1 indicates agree, 2 indicates disagree and 3 indicates respondents who are neutral).
Hence, the respondents were requested to scale each quality per type of biometric technology system.

4.6

Affordability

Figure 6: Most preferred biometric system in terms of sustainability 4.8

Figure 7 presents the preferences of the respondents on the biometric systems based on the acceptability feature. The most preferred system is the fingerprint selected by 22 respondents or 59.46%. These respondents chose that the fingerprint biometric system has the acceptability feature among others. It is followed by four systems namely hand geometry, voice recognition, face recognition, and signature verification as the second most preferred. Each of these is selected by 20 respondents or 54.05%. The least preferred is the iris recognition selected only by 18 respondents or 48.65%.

Figure 5 with reference to the affordability quality shows that fingerprint biometric system is the most preferred system. 21 respondents or 56.76% chose that they agree that the fingerprint biometric system is the most affordable among other biometric systems. Hand geometry is the second most preferred system selected by 20 respondents or 54.05%. Placed as the third most preferred is the voice recognition selected by
19 respondents or 51.35%. The second to the least preferred are the iris recognition and face recognition equally selected by 18 respondents or 48.65%. The least preferred is the signature verification, which is selected by only 15 respondents or
40.54%.

Figure 7: Most preferred biometric system in terms of acceptability feature.

5.

Figure 5: Most preferred biometric system in terms of affordability 4.7

Sustainability

The preferences of the respondents according to sustainability quality as shown in figure 6 indicate that all of the biometric systems are most likely sustainable. There is a small difference between the numbers of respondents who selected each biometric system. However, the fingerprint biometric system remains the most preferred. 20 respondents or 54.05% chose that they “agree” that it is the most sustainable. Hand geometry, iris recognition, and signature verification are each selected by
19 respondents or 51.35% as the second most preferred system.
The least preferred systems are the voice recognition and face recognition each selected by 18 respondents or 48.65%.

Acceptability

CONCLUSION AND
RECOMMENDATION

Since biometric technology will involve the employees of the proposed company using the behavioural or physiological part of their body for identification and verification, this however satisfies the fact that the system will be sustainable. Hence, biometric technology is surely a global ICT strategy that can be use to enhance staff attendance.
Therefore, this study has come to a conclusion that fingerprint is the best biometric technology system that can sustainably solve the lingering problem of staff attendance in the proposed organization. This will eliminate buddy punching and increase staff productivity. It is therefore, recommended that attention should be paid to several factors before recommending biometric technology as a means of improving the productivity of an organization business processes.

6.

REFERENCES

[1] BioLink 2006. Time and attendance, Retrieved 11th
December,
2011 from http://www.m3biometrics.co.uk/Portals/2/downloads/BioT ime_Time_and_Attendance.pdf. 23

International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
Foundation of Computer Science FCS, New York, USA
Volume 5– No.3, February 2013 – www.ijais.org
[2] Graevenitz, G. A. 2003. Introduction to fingerprint technology. Retrieved 10th December, 2011 from http://info.bioenabletech.com/training/fingerprint/Introduc tion%20to%20Fingerprint.pdf.
[3] Hashim, A. Y. 2011. An enduring relationship between biometric traits and security systems, International Journal of Research and Reviews in Information Security and
Privacy, 1(1), pp. 1-6.
[4] InfoTronics, Inc. 2008. Biometrics: Advantages for employee attendance verification, Michigan: Farmington
Hills.
Retrieved
11th November,
2011
from www.mwtime.com/biometrics.pdf. [5] Lease, D. R. 2005. Factors Influencing the Adoption of
Biometric
Security
Technologies.
Information
Technologies and Security Managers. Retrieved 15th
August,
2011 from http://drdavidlease.com/uploads/David_Lease_Dissertatio
n.pdf.
[6] Sandhu, P. S, Kaur, I., Verma, A., Samriti, J. and Singh, S.
2009. Biometric methods and implementation of algorithms. International Journal of Electrical and
Electronics Engineering, 3(8).
[7] Yuihotakaishi, 2011. Attendance Monitoring System
Using Biometrics for Security Staff, studymode Inspiring.
Retrieved
9th
June,
2012 from http://www.studymode.com/essays/AttendanceMonitoring-System-Using-Biometrics-For-732262.html.
[8] Kadry, S. and Smaili, M. 2010. Wireless Attendance
Management System Based on Iris Recognition. Scientific research essay. Retrieved 15th October, 2012 from http://academicjournals.org/sre/PDF/pdf2010/18Jun/Kadr y%20and%20Smaili.pdf.
[9] Mycroft, R. 2011. Performance and Strategy Scrutiny
Committee. Staff productivity. Retrieved 16th November,
2012
from http://www.shropshire.gov.uk/committee.nsf/0/5994B308 D8ECC9B48025788C004A5A54/$file/Item%207%20%20Staff%20Productivity.pdf.
[10] Clavereau, M. (2011). Absence: time to tackle the root causes. Retrieved
9th December,
2012
from
[18] Jiexun L., Wang .A. and Chen H (2011). ‘Identity matching using personal and social identity features’; 13:
101 – 113
[19] Capoor
S.
(2006).
‘Biometrics
as a Convenience Security’, Business story December 1, 48,
50. Retrieved
16th
October,
2012
from http://proquest.umi.com/pqdweb?index=0&did=1182578 721&SrchMode=1&sid=7&Fmt=6&VInst=PROD&VTy pe=PQD&RQT=309&VName=PQD&TS=1304031215& clientId=13314.
[20] Dubin, C. (2011). ‘Biometrics: Hands Down’, ID management. Security, February 1, 52, 54. Retrieved
13th
November
2011from
http://proquest.umi.com/pqdweb?index=0&did=2277161
341&SrchMode=1&sid=2&Fmt=6&VInst=PROD&VTy
pe=PQD&RQT=309&VName=PQD&TS=1304030671& clientId=13314 .

http://www.hrmagazine.co.uk/hro/news/1018998/absencetackle-root-causes.
[11] Tuller, M., Dhawan, A., Simon, B., Lee, K., and Ward, D.
2006. Biometrics: Strategic Technology Analysis
Technology Foresight Dynamics Group 4 White Paper.
[12] Bistarelli, S., Boffi, G., Rossi, F., 2003. Computer Algebra for Fingerprint Matching. Retrieved 11th July, 2012 from http://dl.acm.org/citation.cfm?id=1764265. [13] Jain, A., Hong, L., Pankanti, S., Bolle, R., 1997. An
Identity Authentication System Using Fingerprints.
Retrieved
10th
June,
2012 from http://biometrics.cse.msu.edu/Publications/Fingerprint/Jai nEtAlIdentityAuthUsingFp_ProcIEEE97.pdf. [14] BioElectronix, Inc. 2012. Powerful & easy to use Time &
Attendance Software. Retrieved 11th July, 2012 from http://www.bioelectronix.com/ec_50.html. [15] Liz, P. 2012. Biometric Benefits; Fingerprint readers reduce inventory shrink and eliminate payroll fraud.
Retrieved
12th
December,
2012 from http://www.stores.org/STORES%20Magazine%20April%
202012/biometric-benefits#.UMpT1pG31d8.
[16] Saunders, M., Lewis, P., Thornhill, A. 2007. Research
Methods for Business Students (4th ed.), Pitman publishing, ISBN: 978–0–273–7168670.
[17] Stake, R. E. 2010. Qualitative Research, Studying how things work. Retrieved 24th July, 2012 from http://books.google.co.uk/books?hl=en&lr=&id=wwwVp KNFoxEC&oi=fnd&pg=PR1&dq=Qualitative+Research+
Studying+How+Things+Work+Robert+E.+Stake&ots=M
aeZGsfzTp&sig=CPnqbO2ns.
[21] Neuman, W. L. 2007. Basics of social Research,
Qualitative and Quantitative Approaches, Publisher’s
Design and Production Services, Pearson Education Inc.
ISBN: 0-205-48-13.
[22] NSTCS, 2006. Biometrics Technologies. National Science and Technology Council Subcommittee on Biometrics.
Retrieved
2nd
July,
2012 from http://techbiometric.com/downloads/view-documentdetails/biometrics-foundation documents [23] Kreimer .S. (2010). ‘Matching the Right Patient to the
Right
Record’. Hospitals
&
Health
Networks,November 1, 12. Retrieved 17th December
2011
from http://proquest.umi.com/pqdweb?index=0&did=2212480 041&SrchMode=1&sid=1&Fmt=6&VInst=PROD&VTy pe=PQD&RQT=309&VName=PQD&TS=1304102414& clientId=13314.
[24] Zalud, B. (2010). ‘Poor Sister No More: Access Enters
Spotlight
Again’.
Journal
of
Access
management Security, August 1, 42,44-45. Retrieved 28th
April
2011 from http://proquest.umi.com/pqdweb?index=0&did=2114680
931&SrchMode=1&sid=18&Fmt=6&VInst=PROD&VT
ype=PQD&RQT=309&VName=PQD&TS=1304034968
&clientId=13314

24

Similar Documents

Free Essay

Project

...Automated Biometric Attendance Management System with Dual Authentication Mechanism Based on Bluetooth and NFC Technologies Samuel King Opoku Computer Science Department, Kumasi Polytechnic, Ghana samuel.k.opoku@gmail.com Abstract— Attendance Management System (AMS) is the easiest way to keep track of attendance for community organisations for day-to-day monitoring of attendance and manpower analysis. AMS comes in four types. These are Manual, Biometric, Card-based or E-Commerce systems. This paper presents the implementation of an AMS that is based on Bluetooth and NFC technologies in a multi-user environment. It uses fingerprint and the Bluetooth address of the NFC-enabled phone of the user to authenticate the identity of the user. A Java based desktop application receives the NFC tag IDs, other information associated with the mobile phone and the user and submits them to an analyser for the interpretation of the user’s behaviour. Key Terms: - Attendance Management System, Authentication, Biometric, Bluetooth, Mobile Phone, NFC. I. INTRODUCTION Attendance Management System (AMS) is the easiest way to keep track of attendance for community organizations such as school clubs, scouting units, church groups, business organisations and volunteer groups. AMS is useful in terms of manpower analysis, day-to-day monitoring of attendance, maintaining statutory registers, monitoring leave records, calculation of overtime and transferring information to the payroll system [1]. AMS...

Words: 3797 - Pages: 16

Premium Essay

Security

... . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made Explicit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Systems Owners Have Security Responsibilities Outside Their Own Organizations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Computer Security Requires a Comprehensive and Integrated Approach. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Computer Security Should Be...

Words: 93588 - Pages: 375

Premium Essay

The Handbook

.... . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made Explicit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Systems Owners Have Security Responsibilities Outside Their Own Organizations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Computer Security Requires a Comprehensive and Integrated Approach. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 93564 - Pages: 375

Premium Essay

Management Information System

...Chapter 3 Q1. How does organizational strategy determine information systems structure?` Ultimately, competitive strategy determines the structure, features, and functions of every information system. * Porter’s Five Forces Model of Industry Structure * Bargaining power of customers * Threat of substitutions * Bargaining power of suppliers * Threat of new entrants * Rivalry Q2. What five forces determine industry structure? * The intensity of each of the five forces determines the characteristics of the industry, how profitable it is, and how sustainable that profitability will be. * Organizations examine five forces and determine how they intend to respond to them. That examination leads to competitive strategy. Q3. How does analysis of industry structure determine competitive strategy? * Porter’s Four Competitive Strategies | Cost | Differentiation | Industry-wide | Lowest cost across the industry | BetterProduct/serviceacross theindustry | Focus | Lowest costwithin anindustry segment | Betterproduct/servicewithin anindustry segment | To be effective, the organization’s goals, objectives, culture, and activities must be consistent with the organization’s strategy. Q4. How does competitive strategy determine value chain structure? * Value: The amount of money that a customer is willing to pay for a resource, product, or service. * Margin: The difference between the value that an activity generates and the cost...

Words: 7172 - Pages: 29

Premium Essay

Impotent Music

...INFORMATION RESOURCE GUIDE Computer, Internet and Network Systems Security An Introduction to Security i Security Manual Compiled By: S.K.PARMAR, Cst N.Cowichan Duncan RCMP Det 6060 Canada Ave., Duncan, BC 250-748-5522 sunny@seaside.net This publication is for informational purposes only. In no way should this publication by interpreted as offering legal or accounting advice. If legal or other professional advice is needed it is encouraged that you seek it from the appropriate source. All product & company names mentioned in this manual are the [registered] trademarks of their respective owners. The mention of a product or company does not in itself constitute an endorsement. The articles, documents, publications, presentations, and white papers referenced and used to compile this manual are copyright protected by the original authors. Please give credit where it is due and obtain permission to use these. All material contained has been used with permission from the original author(s) or representing agent/organization. ii T eofContent abl 1.0 INTRODUCTION........................................................................................................................................................... 2 1.1 BASIC INTERNET TECHNICAL DETAILS ........................................................................................................................ 2 1.1.1 TCP/IP : Transmission Control Protocol/Internet Protocol .........................................

Words: 134858 - Pages: 540

Premium Essay

Paper

...Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Professional Group Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or...

Words: 229697 - Pages: 919

Premium Essay

Ways to

...Technology in Banking Insight and Foresight Institute for Development and Research in Banking Technology (Established by Reserve Bank of India) Foreword The Indian banking industry, almost in keeping with the deep entrepreneurial approach of the country s business, has come a long way. This report is an effort to capture some exemplary initiatives and developments so far as well as discuss the emerging trends. The insights and understanding of the technology trends and ground-level work being done by the banks has been culled from the nominations received from banks for the IDRBT Banking Technology Excellence Awards 2010. The transformation of Indian banks in the last decade has been phenomenal from local branch banking to global presence and anywhere-anytime banking. Most of the regular banking transactions can today be carried out from mobile phones. Sustained reforms and information technology (IT) have played a pivotal role since the initiation of the second phase of reforms post 1998. The benefits of technology such as scale, speed and low error rate are also reflecting in the performance, productivity and profitability of banks, which have improved tremendously in the past decade. Regulatory initiatives from the Central Bank have also played a large role in the banking sector. Robust technology-enabled organizations have now become the mainstay of the industry. Initiatives such as electronic clearing service (ECS), national electronic funds transfer (NEFT), real-time...

Words: 24716 - Pages: 99

Premium Essay

Business Management

...SECOND 21ST CENTURY ACADEMIC FORUM CONFERENCE AT HARVARD MARCH 8 - 10, 2015 MARTIN CONFERENCE CENTER HARVARD UNIVERSITY BOSTON, MA USA Teaching, Learning, and Research in the “Just Google It” Age CONFERENCE PROCEEDING VOL. 5, NO.1 ISSN: 2330-1236 Table of Contents Authors Paper Title Page Maryam Abdu Investigating Capital Structure Decisions and Its Effect on the Nigerian Capital Market 1 Norsuhaily Abu Bakar Rahimah Embong Ibrahim Mamat Ruzilawati Abu Bakar Idris Abd. Hamid Holistically Integraded Curriculum: Implications for Personality Development 16 Sandra Ajaps Geography Education in the Google age: A Case Study of Nsukka Local Government Area of Nigeria 30 Helen Afang Andow Impact of Banking Reforms on Service Delivery in the Nigerian Banking Sector 45 Billy Batlegang Green IT Curriculum: A Mechanism For Sustainable Development 59 Rozeta Biçaku-Çekrezi Student Perception of Classroom Management and Productive Techniques in Teaching 74 Thomas J.P.Brady Developing Digital Literacy in Teachers and Students 91 Lorenzo Cherubini Ontario (Canada) Education Provincial Policy: Aboriginal Student Learning 101 Jennifer Dahmen Natascha Compes Just Google It?! But at What Price? Teaching Pro-Environmental Behaviour for Smart and Energy-Efficient Use of Information and Communication Technologies 119 Marion Engin Senem Donanci Using iPads in a dialogic classroom: Mutually exclusive or naturally compatible? 132 Nahed Ghazzoul Teaching and Learning in...

Words: 236613 - Pages: 947

Premium Essay

Management Information Systems

...Technology’s Management Information Systems Instructor and Student Resources Introduction to IS/MIS Principles of Information Systems, Eighth Edition • Stair, Reynolds Fundamentals of Information Systems, Fourth Edition • Stair, Reynolds Management Information Systems, Sixth Edition • Oz Information Technology in Theory • Aksoy, DeNardis Office Applications in Business Problem-Solving Cases in Microsoft Access & Excel, Sixth Annual Edition • Brady, Monk Succeeding in Business Applications with Microsoft Office 2007 • Bast, Gross, Akaiwa, Flynn, et.al Succeeding in Business with Microsoft Office Excel 2007 • Gross, Akaiwa, Nordquist Succeeding in Business with Microsoft Office Access 2007 • Bast, Cygman, Flynn, Tidwell Databases Database Systems, Eighth Edition • Rob, Coronel Concepts of Database Management, Sixth Edition • Pratt, Adamski Data Modeling and Database Design • Umanath, Scamell A Guide to SQL, Seventh Edition • Pratt A Guide to MySQL • Pratt, Last Guide to Oracle 10g • Morrison, Morrison, Conrad Oracle 10g Titles Oracle9i Titles Enterprise Resource Planning Concepts in Enterprise Resource Planning, Third Edition • Monk, Wagner Data Communications Data Communications and Computer Networks: A Business User’s Approach, Fourth Edition • White Systems Analysis and Design Systems Analysis and Design in a Changing World, Fifth Edition • Satzinger, Jackson, Burd Object-Oriented Analysis and Design with the Unified Process • Satzinger, Jackson, Burd Systems Analysis and Design for the...

Words: 223685 - Pages: 895

Premium Essay

Kscnkslv

...Economic Outlook, Prospects, and Policy Challenges 01 CHAPTER This year’s Economic Survey comes at a time of unusual volatility in the international economic environment. Markets have begun to swing on fears that the global recovery may be faltering, while risks of extreme events are rising. Amidst this gloomy landscape, India stands out as a haven of stability and an outpost of opportunity. Its macro-economy is stable, founded on the government’s commitment to fiscal consolidation and low inflation. Its economic growth is amongst the highest in the world, helped by a reorientation of government spending toward needed public infrastructure. These achievements are remarkable not least because they have been accomplished in the face of global headwinds and a second successive season of poor rainfall. The task now is to sustain them in an even more difficult global environment. This will require careful economic management. As regards monetary and liquidity policy, the benign outlook for inflation, widening output gaps, the uncertainty about the growth outlook and the over-indebtedness of the corporate sector all imply that there is room for easing. Fiscal consolidation continues to be vital, and will need to maintain credibility and reduce debt, in an uncertain global environment, while sustaining growth. On the government’s “reformto-transform” agenda, a series of measures, each incremental but collectively meaningful have been enacted. There have also...

Words: 64752 - Pages: 260

Free Essay

As, Ca, Pdf

...ISSUES FOR IIM INTERVIEW  PROCESS © EssaysforIIM.com 2014-15 Issues for IIM PI Process http://www.essaysforIIM.com   Contents  US‐CHINA ENVIRONMENT DEAL  8  OIL PRICE  9  PAYMENT BANKS  11  SHADOW BANKING  13  NBFCs  14  NEW DEFINITION OF FDI  16  REFORMS IN POWER DISTRIBUTION  16  SECURITIES LAWS (AMENDMENT) BILL 2014  18  JUVENILE JUSTICE BILL, 2014  18  HUMAN DEVELOPMENT: INTERNATIONAL COMPARISON  19  INEQUALITY  20  SOCIO‐ECONOMIC PROFILE OF STATES AND INTER‐STATE COMPARISONS  21  ASER 2013: Main Findings  23  SKILL DEVELOPMENT  24  HOW INDIA NEEDS TO FACE CLIMATE CHANGE  24  AGENDA FOR ECONOMIC REFORMS  28  INFRASTRUCTURE  30  WHY LONG‐RUN MATTERS  30  FIVE PRONGED STRATEGY TO CONTROL INFLATION  31  URJIT PATEL COMMITTEE  32  Some Major Issues in India's Merchandise Trade Sector  32  MAKE IN INDIA OPPORTUNITY  34  Make for India or Make in India – The debate begins!  37  VULNERABILITY COMPARISON OF INDIAN ECONOMY  38  PM JAN DHAN YOJANA  39  COOPERATIVE FEDERALISM  40  ZERO DEFECT, ZERO EFFECT  41  DIGITAL INDIA  42  TWO FACTOR IDENTIFICATION ISSUE  43  MINSK AGREEMENT  44  WILFUL DEFAULT  44  © EssaysforIIM.com 2014‐15   Page 1 Issues for IIM PI Process http://www.essaysforIIM.com   ‘MAKE IN INDIA’  ...

Words: 128478 - Pages: 514

Premium Essay

Marketing Real People, Real Choices

...c MARKETING 7E People real Choices This page intentionally left blank MARKETING 7E People real Choices Michael R. SAINT JOSEPH S SOLOMON ’ U OLLINS NIVERSITY Greg W. MARSHALL R C STUART OLLEGE Elnora W. THE UNIVERSITY OF SOUTH CAROLINA UPSTATE Prentice Hall Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Editorial Director: Sally Yagan Editor in Chief: Eric Svendsen Acquisitions Editor: Melissa Sabella Director of Editorial Services: Ashley Santora Editorial Project Manager: Kierra Bloom Editorial Assistant: Elisabeth Scarpa Director of Marketing: Patrice Lumumba Jones Senior Marketing Manager: Anne Fahlgren Marketing Assistant: Melinda Jensen Senior Managing Editor: Judy Leale Project Manager: Becca Richter Senior Operations Supervisor: Arnold Vila Creative Director: Jon Christiana Senior Art Director: Blair Brown Text and Cover Designer: Blair Brown Media Project Manager, Production: Lisa Rinaldi Media Project Manager, Editorial: Denise Vaughn Full-Service Project Management: S4Carlisle Publishing Services Composition: S4Carlisle Publishing Services Printer/Bindery: Courier/Kendalville Cover Printer: Courier/Kendalville Text Font: Palatino Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook...

Words: 227255 - Pages: 910