scholarly journals The Intention of Passengers towards Repeat Use of Biometric Security for Sustainable Airport Management

2020 ◽  
Vol 12 (11) ◽  
pp. 4528
Author(s):  
Cheong Kim ◽  
Kun Chang Lee ◽  
Francis Joseph Costello

More and more these days, airport security is having to adapt to a greater number of passengers while keeping within finer margins of precision when it comes to clearing passengers for security clearance. Therefore, analyzing potential upgrades in the security process and adopting them in a way that does not impact passenger experience has become a key activity for airport managers. One viable technological solution that is not only effective but also efficient is biometric security. This technology allows for passengers to safely clear security based on their unique biometric features. Despite its promise, airports and passengers alike are slow to adopt its use. Additionally, there were few studies that revealed insights into passengers’ intentions toward repeat use of biometric security. Hence, in our novel attempts to uncover the underlying reasons, we implemented a study on passengers’ initial and repeat usage intention based on perceived benefits and risks of biometric security technology. Based on 327 survey responses, we employed the use of SEM to extract first- and second-order constructs before evaluating our hypotheses on a finally accepted model. To be aligned with the novel attempt of this research, the results showed that both the perceived benefits and risks have a significant impact on passenger’s initial and repeat use intention of biometric security. Therefore, for all practitioners engaged in sustainable airport management, strong consideration from this research should help in creating value for passengers while mitigating the risks of adopting biometric security within airport security settings.

Author(s):  
Muzhir Shaban Al-Ani

The terms biometrics and biometry have been used to refer to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences. Recently biometrics refers to technologies and applications applied for personal identification using physical and behavioral parameters. Biometric security systems ensuring that only the authorized persons are permitted to access a certain data, because it is difficult to copy the biometric features pattern for a specific person. Biometrics is playing an important role in applications that are centric on identification, verification and classification. This chapter focuses on biometric security in their types, specifications, technologies and algorithms. Some algorithms of biometric security are also included in this chapter. Finally latest and future aspects of biometric system and merging technologies are also mentioned, including more details of system structures and specifications and what constitution will shape biometric security of in the future.


Author(s):  
Marcos Faundez-Zanuy

The word biometrics comes from the Greek words “bios” (life) and “metrikos” (measure). Strictly speaking, it refers to a science involving the statistical analysis of biological characteristics. Thus, we should refer to biometric recognition of people, as those security applications that analyze human characteristics for identity verification or identification. However, we will use the short term “biometrics” to refer to “biometric recognition of people”. Biometric recognition offers a promising approach for security applications, with some advantages over the classical methods, which depend on something you have (key, card, etc.), or something you know (password, PIN, etc.). A nice property of biometric traits is that they are based on something you are or something you do, so you do not need to remember anything neither to hold any token.


2012 ◽  
Vol 153 (35) ◽  
pp. 1380-1384 ◽  
Author(s):  
Péter Felkai ◽  
István Mártai

The authorities guarantee the safety of passengers during air travel by strict ground security measures. All of these measures are restrictive and can affect the health status of both healthy and ill travelers. Patients who are in critical condition or confined to a stretcher and have to be repatriated by stretcher on a regular flight, must pass the airport security check as well. But the developers of security system should take into account the medical safety of patients during the procedure. The relevant medical principles are painfully missing not only in Hungary, but unfortunately also at most international airports. On the basis of principles reviewed in the present publication, an unambiguous, professionally reconciled regulation is necessary that would serve as a guideline for airport management and authorities, as well as for the involved medical personnel. Although setting principles into practice requires a different solution at each airport, yet, passenger safety and patient safety have to be harmonized as soon as possible. Orv. Hetil., 2012, 153, 1380–1384.


Radiocarbon ◽  
1989 ◽  
Vol 31 (2) ◽  
pp. ii-ii
Author(s):  
Austin Long

A few of our colleagues, upon receiving a radiocarbon date younger than they expected, have wondered if X-rays in airport security devices might have increased their 14C content. Unfortunately for them, our colleagues have been forced to find alternate explanations for the uncooperative dates. Airport X-rays simply cannot produce 14C. However, a new security technology is almost ready for installation at Kennedy Airport for some international flights, and, according to the Wall Street Journal, 100 additional units are planned for other high-risk airports. The new device will detect high concentrations of nitrogen (a component in explosives) by thermal neutron activation (TNA). Since TNA on a global scale is the process by which nature produces virtually all 14C in the atmosphere, some 14C must be produced in high-nitrogen materials, such as bones, as they pass through a neutron activation airport security device. The question important to the radiocarbon dating community is how much effect can the 14C thus produced have on the 14C date?


Author(s):  
Ioan Buciu ◽  
Alexandru Gacsadi

In a nutshell, a biometric security system requires a user to provide some biometric features which are then verified against some stored biometric templates. Nowadays, the traditional password based authentication method tends to be replaced by advanced biometrics technologies. Biometric based authentication is becoming increasingly appealing and common for most of the human-computer interaction devices. To give only one recent example, Microsoft augmented its brand new Windows 10 OS version with the capability of supporting face recognition when the user login in. This chapter does not intend to cover a comprehensive and detailed list of biometric techniques. The chapter rather aims at briefly discussing biometric related items, including principles, definitions, biometric modalities and technologies along with their advantages, disadvantages or limitations, and biometric standards, targeting unfamiliar readers. It also mentions the attributes of a biometric system as well as attacks on biometrics. Important reference sources are pointed out so that the interested reader may gain deeper in-depth knowledge by consulting them.


Human biometric features form the base for many security applications which identify humans uniquely. Human eyes and specifically the Iris based identifications are regarded as highly reliable systems. Iris based systems when combined with cryptography have been able to present higher biometric based security systems. This paper presents an Iris based human identification system called EIOT which can enhance biometric security. It is a set of unique sequential steps followed in Iris recognition and can be implemented in human authentications and identifications.


Author(s):  
Omar Ahmed Hedaia ◽  
Ahmed Shawish ◽  
Essam H Houssein ◽  
Hala Zayed

Cloud computing has gained increased interest in the last few years, where an increasing number of providers are converging to such a promising platform. However, the security issues are still a big concern in the cloud, where authentication is a major one. Much research has been conducted to secure the authentication, where some of them used biometric features (fingerprint, face, and voice, etc.). In general, the biometric authentication techniques have a noticeable advantage compared to the traditional techniques because biometric features are hard to be altered or forged. Nevertheless, a new generation of attacks threatens the biometric security by using brute force approaches. This article proposes a nontraditional authentication technique that was called Bio-CAPTCHA. The proposed technique uses a random voice-based password challenge that dynamically changes every time the user tries to login, which promises to significantly decrease the possibility of unauthorized access. The conducted Experimental and theoretical analysis confirms the high-security level of the proposed technique.


Biometrics ◽  
2017 ◽  
pp. 1399-1418
Author(s):  
Muzhir Shaban Al-Ani

The terms biometrics and biometry have been used to refer to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences. Recently biometrics refers to technologies and applications applied for personal identification using physical and behavioral parameters. Biometric security systems ensuring that only the authorized persons are permitted to access a certain data, because it is difficult to copy the biometric features pattern for a specific person. Biometrics is playing an important role in applications that are centric on identification, verification and classification. This chapter focuses on biometric security in their types, specifications, technologies and algorithms. Some algorithms of biometric security are also included in this chapter. Finally latest and future aspects of biometric system and merging technologies are also mentioned, including more details of system structures and specifications and what constitution will shape biometric security of in the future.


Sign in / Sign up

Export Citation Format

Share Document