scholarly journals MoLaBSS: Server-Specific Add-On Biometric Security Layer Model to Enhance the Usage of Biometrics

Information ◽  
2020 ◽  
Vol 11 (6) ◽  
pp. 308
Author(s):  
Bhanu Singh ◽  
Nirvisha Singh

With high-paced growth in biometrics, and its easy availability to capture various biometric features, it is emerging as one of the most valuable technologies for multifactor authentication to verify a user’s identity, for data security. Organizations encourage their members to use biometrics, but they are hesitant to use them due to perceived security risks. Because of its low usage rate, many medium and small segment organizations find it unfeasible to deploy robust biometric systems. We propose a server-specific add-on biometric security layer model (MoLaBSS) to enhance confidence in the usage of biometrics. We tested this model via a biometric mobile app, and the survey showed a favorable response of 80%. The innovative mobile app was tested for its usability and got a score of more than 71%. For test tool reliability, we examined the equal error rate (EER) of the app and got a reasonably low score of 6%. The results show good potential of this framework to enhance users’ confidence level in the usage of biometrics. Higher usage rates may make deployment of biometrics more cost-effective for many organizations to decrease their information security risk.

2020 ◽  
Author(s):  
Bhanu Pratap Singh ◽  
Nirvisha Singh

With high paced growth in biometrics, and its easy availability to capture various biometric features, it is <a>emerging as one of the most valuable technologies for multifactor authentication to verify a user’s identity, for data security. </a>Organizations encourage their members to use biometrics, but <a>they are hesitant to use due to perceived security risks. Because of its low usage rate, many medium and small segment organizations find it unfeasible to deploy robust biometric systems. </a>We propose a “server-specific add-on biometric security layer model,” to enhance confidence in the usage of biometrics. We tested this model via a biometric mobile app, and the survey showed a favorable response of 80%. The innovative mobile app was tested for its usability and got a score of more than 71%. For test tool reliability, we examined the equal error rate (EER) of the app and got a reasonably low score of 6%. The results show a good potential of this framework to enhance users’ confidence-level in the usage of biometrics. Higher usage rates may make deployment of biometrics more cost-effective for many organizations to decrease their information security risk.


2020 ◽  
Author(s):  
Bhanu Pratap Singh ◽  
Nirvisha Singh

With high paced growth in biometrics, and its easy availability to capture various biometric features, it is <a>emerging as one of the most valuable technologies for multifactor authentication to verify a user’s identity, for data security. </a>Organizations encourage their members to use biometrics, but <a>they are hesitant to use due to perceived security risks. Because of its low usage rate, many medium and small segment organizations find it unfeasible to deploy robust biometric systems. </a>We propose a “server-specific add-on biometric security layer model,” to enhance confidence in the usage of biometrics. We tested this model via a biometric mobile app, and the survey showed a favorable response of 80%. The innovative mobile app was tested for its usability and got a score of more than 71%. For test tool reliability, we examined the equal error rate (EER) of the app and got a reasonably low score of 6%. The results show a good potential of this framework to enhance users’ confidence-level in the usage of biometrics. Higher usage rates may make deployment of biometrics more cost-effective for many organizations to decrease their information security risk.


2020 ◽  
Author(s):  
Bhanu Pratap Singh ◽  
Nirvisha Singh

With high paced growth in biometrics, and its easy availability to capture various biometric features, it is <a>emerging as one of the most valuable technologies for multifactor authentication to verify a user’s identity, for data security. </a>Organizations encourage their members to use biometrics, but <a>they are hesitant to use due to perceived security risks. Because of its low usage rate, many medium and small segment organizations find it unfeasible to deploy robust biometric systems. </a>We propose a “server-specific add-on biometric security layer model,” to enhance confidence in the usage of biometrics. We tested this model via a biometric mobile app, and the survey showed a favorable response of 80%. The innovative mobile app was tested for its usability and got a score of more than 71%. For test tool reliability, we examined the equal error rate (EER) of the app and got a reasonably low score of 6%. The results show a good potential of this framework to enhance users’ confidence-level in the usage of biometrics. Higher usage rates may make deployment of biometrics more cost-effective for many organizations to decrease their information security risk.


2020 ◽  
Author(s):  
Bhanu Pratap Singh ◽  
Nirvisha Singh

With high paced growth in biometrics, its easy availability to capture various biometric features, it is <a>emerging as one of the most valuable technologies for multifactor authentication to verify a user’s identity, for data security. </a>Organizations encourage their members to use biometrics, but <a>they are hesitant to use due to perceived security risks. Because of its low usage rate, many medium and small segment organizations find it unfeasible to deploy robust biometric systems. </a>We propose a solution of an extra layer of security, via a low-cost mobile app framework, “Bio-Guard,” to use biometrics, more securely. We tested the app for its design, functions, usability, and it got a score of more than 71% on the usability scale and a reasonably low equal error rate (EER) of 6%. The survey to evaluate the usefulness of the app showed a favorable response of 80%. The results show a good potential of the app to make access to biometric data more secure. The app may enhance users’ confidence-level in encouraging higher participation of users in the usage of biometrics. Higher usage rates may make deployment of biometrics more cost-effective for many medium and small segment organizations to decrease their information security risk.


Author(s):  
Shambhu Sharan Srivastava

In theDistributed Computing Environment, many processors/nodes remain active in system at any moment, coordinate or operate without interfering. Nodes have certain degree of freedom like own hardware, own code, sometimes ownindependent task, but at the same time there will still be sharing of some common resources and information. One of the main themes of recent research in distributed computing is "locality" (as utilized by decentralized/peer-to-peer systems). Networks grow fast, thus locality and scalability becomes a major issues. Computing security is, at its core, more than a technical issue. It is a fundamental business challenge. Managers have plenty of security alternatives, but have very little real guidance on making intelligent decisions about them. Today's distributed, multi-vendor, Internet-connected environments encompass more insecure systems and networks than ever before. Security in Distributed Computing offers the manager of distributed systems a thorough, common-sense framework for cost-effective computer security. The first step to understand security is to know what the potential risks are, or more specifically, to determine the type and level of security risks for the organizations. Security risks are unique to each organization because they are dependent on the nature of the business and the environment in which the organization operates. Security risk is determined by identifying the assets that need to be protected.


2017 ◽  
Vol 10 (8) ◽  
pp. 129
Author(s):  
Ken Kin-Kiu Fong ◽  
Stanley Kam Sing Wong

The benefit of using WiFi for Internet connection is obvious: cost-effective and powerful. WiFi gives us the flexibility and convenience of not being tied to a fixed location. Nowadays, more and more electronic devices and gadgets, such as mobile phones, cameras, gaming devices, TV and entertainment equipment, are WiFi enabled. WiFi also enables your devices to share files instantly. WiFi broadcasting devices, such as Chromecast, give you extra convenience by allowing you to stream video and audio contents from your mobile phone to your TV using WiFi connection. However, this kind of flexibility and convenience comes with a cost. Sharing files, streaming contents or even accessing the Internet via WiFi means signals are being transmitted and they can be captured by anyone with a computer or mobile phone installed with appropriate software. Therefore, it is important to let WiFi users know their security risks and how to minimize them. Educating WiFi users to reduce the WiFi security risk is one of our on-going missions. Basing on empirically collected data, this paper is report of a comprehensive study on the use of WiFi and WiFi networking and the knowledge of WiFi users of the risks and security issues involved in using WiFi in Hong Kong. Findings of the study highlight the WiFi security knowledge gaps of the users in Hong Kong so that stakeholders can take action to improve Internet security by eliminating the security gaps identified.


2016 ◽  
Vol 28 (3) ◽  
pp. 82-103 ◽  
Author(s):  
Mohd Hisham Mohd Sharif ◽  
Indrit Troshani ◽  
Robyn Davidson

Limited attention has been directed towards understanding the impact of social media in the public sector, particularly in local government organisations. Although social media offer substantial benefits and opportunities to local government, research into the impact of social media remains scant. To address this gap, the authors draw on the technology, organisation, and environment (TOE) framework and propose a model of the determinants of social media impact in local government. The model is tested with data collected via a survey with 173 Australian local government organisations using social media. Data were analysed using the partial least squares-structural equation modelling (PLS-SEM) technique. The results indicate that TOE factors including perceived benefits, perceived security risks, compatibility, and degree of formalisation are important predictors of social media impact in local government.


2015 ◽  
Vol 11 (4) ◽  
pp. 52-69 ◽  
Author(s):  
Janine L. Spears ◽  
Tonia San Nicolas-Rocca

Community-based organizations (CBOs) in the health and human services sector handle very sensitive client information, such as psychiatric, HIV testing, criminal justice, and financial records. With annual revenue often in the range of $1 to $10 million, these organizations typically lack the financial, labor, and technical resources to identify and manage information security risks within their environment. Therefore, information security risk assessments were conducted at CBOs as part of a university service learning course intended to ultimately improve security within participating CBOs. Knowledge transfer between trainees and trainers is essential in order for security improvements to be realized. Therefore, this paper constructs a theoretical model of knowledge transfer that is used as a lens through which to examine initial study results of the CBO interventions as part of an exploratory study.


Molecules ◽  
2020 ◽  
Vol 25 (11) ◽  
pp. 2655 ◽  
Author(s):  
Belal J. Muhialdin ◽  
Nazamid Saari ◽  
Anis Shobirin Meor Hussin

The challenges to fulfill the demand for a safe food supply are dramatically increasing. Mycotoxins produced by certain fungi cause great economic loss and negative impact on the sustainability of food supplies. Moreover, the occurrence of mycotoxins at high levels in foods poses a high health threat for the consumers. Biological detoxification has exhibited a high potential to detoxify foodstuffs on a cost-effective and large scale. Lactic acid bacteria showed a good potential as an alternative strategy for the elimination of mycotoxins. The current review describes the health and economic impacts associated with mycotoxin contamination in foodstuffs. Moreover, this review highlights the biological detoxification of common food mycotoxins by lactic acid bacteria.


Author(s):  
Chand Prakash Saini

The purpose of this article is to identify and study various risks that stop potential online shoppers to shop online. A total of 268 potential online shoppers were personally surveyed with a structured questionnaire. These respondents were from Gurgaon city. Exploratory factor analysis and regression analysis were used to assess the potential consumers' risk perception towards online retailing. It was found that potential online shoppers considered product risk, privacy risk, time risk, social risk, and security risk to be important while thinking of online shopping. Among all these risks security risks were found to be on potential online buyers' minds followed by product risk, social risk, privacy risk, and time risk. Online shopping behavior was the dependent variable in the study.


Sign in / Sign up

Export Citation Format

Share Document