scholarly journals Public Increasing Trust of Biometric Technology

Publically agree to technology of biometric is compound based at extreme believe. The bounded function at believe to biometrics usually record in various types of biometrics with correlative samples associated with familiarity and confidential. To develop a complete understand trust of people recognition about biometrics, we employed current theory to develop a regular calculation of trust in biometrics from user’s theory. We increased confidence of first concern in terms of mutual interaction, technology, information systems and adoption of automated technology. Identified common belief components in these circumstances. Modified objects with reference to biometric technology. Managed an Examine study to determine the reliability of this new scale for sub-factors and trust. Our statistics give rise to seventh recently elements companion with user believe to technology of biometric. We will know work process with recommend conclusion also.

Author(s):  
G. Golovko ◽  
M. Borozdin ◽  
Y. Tokar

This article highlights the need and importance of using an information system in the modern restaurant business. The nature of information systems and the tasks they can perform are presented. The direction of introduction of information and communication technologies and automation in management activity of restaurants is considered. The dependence of the efficiency of the food establishment on the correctly automated work process is determined. It has been proven that the use of information systems is a necessary condition for modern restaurants and contributes to the adoption of strategic management decisions to increase competitiveness and create an appropriate and efficient infrastructure.


2021 ◽  
Vol 2 (1) ◽  
pp. 28-42
Author(s):  
Kholifah Kholifah ◽  
Reza Ade Putra ◽  
Fathiyah Nopriani

The development of technology in meeting information needs has been implemented at the Muhammadiyah University of Palembang where there are various information systems used in managing information as a basis for creating quality services and supporting optimization in the work process. However, apart from the perceived benefits, the increasing dependence on information systems is in line with the risks that can arise, one of which is the risk of information security where information is an important asset for an organization that needs to be protected and secured. As an effort to maintain and protect information security, it is necessary to carry out risk evaluation in order to identify and anticipate risks that can interfere with information security. This study aims to conduct a risk assessment analysis of the use of Academic Information Systems as a very crucial information system in a university. This risk assessment analysis uses the Octave Allegro method with the main focus on information assets which consists of 8 steps and is organized into 4 stages starting with determining drivers, developing information asset profiles, identifying threats, and identifying and mitigating risks. The results of this study are 10 (ten) areas of concern with a mitigation approach of 7 (seven) risks that must be reduced (mittigate), 2 (two) risks that can be deferred (defer), and 1 (one) risk. that can be accepted (accept). From the risk assessment carried out, recommendations are given to prevent / minimize the identified risks as an effort to maintain and improve information security.


1984 ◽  
Vol 1 (1) ◽  
pp. 175-185
Author(s):  
Michael E. D. Koenig

2020 ◽  
Vol 64 (1) ◽  
pp. 6-16 ◽  
Author(s):  
Sarah M. Meeßen ◽  
Meinald T. Thielsch ◽  
Guido Hertel

Abstract. Digitalization, enhanced storage capacities, and the Internet of Things increase the volume of data in modern organizations. To process and make use of these data and to avoid information overload, management information systems (MIS) are introduced that collect, process, and analyze relevant data. However, a precondition for the application of MIS is that users trust them. Extending accounts of trust in automation and trust in technology, we introduce a new model of trust in MIS that addresses the conceptual ambiguities of existing conceptualizations of trust and integrates initial empirical work in this field. In doing so, we differentiate between perceived trustworthiness of an MIS, experienced trust in an MIS, intentions to use an MIS, and actual use of an MIS. Moreover, we consider users’ perceived risks and contextual factors (e. g., autonomy at work) as moderators. The introduced model offers guidelines for future research and initial suggestions to foster trust-based MIS use.


1995 ◽  
Vol 40 (12) ◽  
pp. 1142-1145
Author(s):  
Mary Roznowski
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document