Saturday, February 23, 2019

Most Violated School Policies Essay

The radiation patternation of character is one of the almost important features of the educational presidential term at the University of Baguio. For this reason, the imposed discipline, while attentive to the rights and feelings of others, is firm, especi eachy when the reputation of the student body and institution is at stake. Students be expected to manifest both inside and bring outside the University, the respect for roll, morality, psyche-to-person honor, and rights of others, which is required of God-fearing men and women. (UB student make itbook, Article XIV 2010 Edition)Schools project policies that argon being implemented for the general welf atomic number 18 of its constituents. These policies provide a set of rules that the students, teachers, etc.tera should fol firster-ranking. These rules atomic number 18 necessary for the frame and uniformity of the students inside the prep ar premises. Even with the presence of these rules, virtu in all(a)y o f the students molest them disregarding the sanctions that go along with it. The word policy originated from the Latin word politia or polity. defined as a definite prey of action adopted for the stake of expediency, facility, etc. an action or procedure conforming to or considered with lumber to prudence or expediency. (http//dictionary.reference.com/browse/policy)Educational policies are scratchifi endt beca physical exertion these are rules that are utilise in trains to discipline students. These rules set up how effective and economic the take aim is in managing students and personnel. The policies have great influence in the quality of education in an area. Educational policies are important because effective policies stooge facilitate students in trail on their daylight to day action mechanism.For a policy to be make do effective, it must(prenominal) have a well-pronounced out hump, assumptions should be figure out and explicit, linkage to organizational ho rrendousction must be present, receivable dish in the development has to be observed, the priority should be on the humanity interest, expectations have to be made, the policy must be both streamlined and effective, results should be stated in measur qualified terms, evaluation of results should be cap equal, backing and allocation of resources must be appropriate, accountability should non be vague, it should be lawful and administered, it must be based from hi myth, ideas have to be corroborate before implementation, and the policy results should be well stated. (http//manuals.ucdavis.edu/resources/coordinators.htm)One of the factors wherefore students violate drill policies cease be explained with their different behaviours. Behaviour is the air of behaving or conducting oneself the aggregate of all the responses made by an organism in any situation. (http//dictionary.reference.com/browse/behavior) base on Operant Conditioning of B.F. skinner All behaviour cause by external stimuli and all behaviour preserve be explained without the quest to consider internal mental states or consciousness. It pith that the actions done by students are responses to its environment. (http//www.learning-theories.com/behaviorism)A nonher type of behaviourism is stand Behaviourism which is the connection to role of emotions and the major differences in the acceptance of mediating structures and etc. In orderliness to resolve this problem the group found out that the surmount solution is the use of Biometric naming carcasss which gage be separate based on the primary(prenominal) physical characteristic that lends itself to biometric identification. in that respect are different courses of biometric form in which the reproduce biometry is the comm lone(prenominal) utilize one. There are resemblingly other biometric identification outlines much(prenominal) as the hand geometry, manage nervure authentication, retina s atomic number 50, iris s send awayister, count recognition, pinch, and voice epitome. There are biometric governances that are composed of more than dickens physical characteristics to be identified.Statement of the Problem1) What are the reasons why these students violate such(prenominal) policies? 2) What are the most common policies that are violated by the violators? 3) How coffin nail the proposed biometric ID organisation work students from violating the tiring of ID? S make out and DelimitationThis proposal was limited only to the students of the University of Baguio including the administrative staff, teachers, faculty and utilities.Signifi hindquartersce of the StudyWith the help of this proposal, the University of Baguio would be able to control for all(prenominal) entrance and exit of the school. The act of non wearing IDs for the students would no all-night be come-at-able because they go forth not be able to enter the school without their IDs. The biometric ID body would streng then the auspices of the academia for the safety of the students. The metre when the students would enter and leave their classes would be superintended. The clay would be able to determine if the students give skip their classes. Also, the entry of thieves and clunk-pocketers within the school premises would no longer be possible due(p) to this proposal. With this modernised trunk to be established in the University, all of the students and personnel of the school pass on benefit from it.FRAMEWORKThe leniency of the marshals in checking the IDs and comme il faut wearing of uniforms, students not following the rules and regulation of the school and to monitor the entrance and exit of the students of University of Baguio within the schools vicinity are the reasons why the researchers proposed an ID Biometric arrangement.The students violated the above mentioned rules due to leniency, habitual actions of students, laziness, and unwanted behaviours of students. around stu dents equitable wanted to violate such policies because they thought that it was a entertainment and interesting thing to do.If the proposed project will be fully implemented, there will be organization in the school campus and an effective monitor of the passage ways in entering and going out of the school. Based on these factors that we have retrieved on the entropy that we have collected, the theory that would best support our proposal is the belief theory. We chose this theory because we, the researchers, believe that the proposed biometric ID system will work and we will therefore translate these beliefs into action. The researchers fore capture that this would be able to control the re findring problems that are being done by the University of Baguio students and that is the reason why we have made this very proposal.DEFINITION OF TERMS* Biometric pertaining to, noting, or apply a persons unique physical and other marks for the inclination of identification and tribu te measure. * Coincide to occupy exactly corresponding or homogeneous positions on a scale or in a serial publication * Identification psychological orientation of the self in regard to well-nighthing (as a person or group) with a resulting feeling of close emotional association. * execution of instrument the act of implementing, or putting into effect. * Policy a definite course of manner of action selected from among alternatives and in light of given conditions to guide and determine present and future decisions. * Proposal An act of putting forward or stating something for consideration. * Scanner a device sensing a enter info.* System a group of devices or artificial objects or an organization forming a ne twork especially for distri unlessing something or serving common purpose. * Units a set up or complex apparatus serving to perform one occurrence functionASSUMPTIONThe group assumed that if the proposal is to be approve by the placard of Directors, it would be implemented immediately. The ordered units will be put up to the designated areas and the Biometric system will start functioning. With the new system of the school, there will be an organization in school activities. The school then will be a safe and humane jell to study.CHAPTER IIREVIEW OF RELATED LITERARTUREI. EXECUTIVE SUMMARYIn the millennial years rapidly advancing technological world, the release of security is fair a more and more pressing matter. electronic computer crimes and identity thieving tie in crimes are be culmination more rampant and apparent, requiring demote solutions to cope with them. One of the proposed methods for solution for future amply- engine room security step ups lies in the content of biometrics. biometrics defined simply in its regard to security matters is any method or applied science which uses biological bars to further authentication for verification or identification of a particular user.Although gloss over in major phases of development, biometrics is seen as a bluely valuable initiative to one day deputise present day security authentication practices due to its nonpareil concept of being virtually risk free and non- away. This paper will analyze all aspects concerning biometrics including its boilersuit concept, how a biometrical authentication system works, controversial rationalises concerning its implementation, its current uses in engineering science, business, and governmental agencies and its future developments.II. CONCEPT OF biometry IN SECURITYA. TWO CATEGORIES biometrics can be subdivided into two main categories. These accommodate physiologic and behavioral categories of specific measurings. Physiological measurements include biological characteristics inherent to various(prenominal) human beings. Some of these would include facial nerve structure, fingerprints, hand structure, iris and desoxyribonucleic acid structure of a particular person. behavioral measurements measure k inetics in singular behaviors. Some of these would include keystroke behavior, ghost and voice recognition.B. VARIOUS METHODS FOR COLLECTING MEASUREMENTSFACE Facial recognition involves engineering which scans the face and interprets the entropy as recognizable characteristics of a particular user, including the size and shape of the face and their relationship to each other. Facial recognition is a natural method that humans use to range multitude they come into contact with, but it is not an smooth method to duplicate for identification on a biometric system. This is due to revisions such as plastic surgery, metric cargo unit gain or weight loss which can cause the results to be wide. another(prenominal) emerging method of solicitation biometric learning involving the face is facial thermograph which detects and measures the heat patterns created by the branching blood vessels within the face and emitted finished the skin.FINGERPRINT fingermark summary has been arou nd for centuries as a means of identifying people. It has been evidenced that ancient Chinese used fingerprinting to sign legal documents as long ago as 1000 BCE. Fingerprint summary involves examining the ridges on an individual fingerprint in order to teammate them to a specific owner. HAND Hands can be analyze and measured in a hardly a(prenominal) different ways. Aside from fingerprints, some other way to use hands in biometrical digest is through hand geometry which measures and compares the different physical characteristics of a persons hand such as shape and size. Another method concerning hands is palm vein authentication which uses an infrared beam to penetrate a persons hand and measure the complexity of the vein patterns within that persons hand. This specific method is more useful than hand geometry measurement because palm vein patterns are internal to the body, and thorny to be counterfeited by an outlawed user.EYES Eyes can be used in two different ways as a p art of a biometrical interrogatory process. Iris examine involves analysis of the rings, furrows, and freckles in the pupil of the eye of a particular human. Retina see involves analysis of the capillary blood vessels located in the back of the eye. deoxyribonucleic acid DNA verification uses analysis of genetic learning found within a specific persons DNA code (or genetic code) as a means of identifying that person. DNA analysis is often used now as a method for identifying composition of a persons child or in rhetorical crime investigations as a evidence for convicting individuals for crimes such as take or rape. ODOR & look Odor and scent analysis is a fairly new development in biometrical analysis and is based on a theory entitled individual odor theory.This theory is premised on the notion that each person has a particular and unique scent. In forensics, odor analysis has been used to identify people by the use of blood hounds (dogs). VOICE abridgment Voice analysis i nvolves analyzing of the pitch, tone, cadence, and frequency of a particular users voice to facilitate authentication. Voice analysis can technically be seen as both a physiological trait as well as a behavioral trait because voice is not only inherent to a specific person, but alike the way that person speaks is besides a unique and mensural trait. SIGNATURE Signature analysis analyzes the way a person writes his/her signature as a basic means of identification.Although handwriting techniques vary for individuals throughout their lifetimes, handwriting identification is seen as a scientifically reliable criterion for measurement. KEYSTROKE Keystroke analysis measures the dynamics of a persons typing rhythms to facilitate authentication of a particular person. Keystroke analysis whitethorn be more useful than other methods of identification because unlike other biometrical authentication methods, keystroke dynamics can still be measured throughout the computer seance even after the access control point has been successfully passed by the user.GAIT Another new developing biometrical technique is one which measures pace which is a persons particular way of walking and facilitating motion. step can be used effectively to recognize people coming in from a distance. COGNITIVE biometrics Cognitive biometrics is also a developing method in biometrics which uses measurements of brain activity responses when triggered by specific stimuli and matched within a computer informationbase as a means for authentication of a particular user of the system. Currently, systems which utilize this kind of method are being created to trigger responses to odor stimuli. In the future, other triggers may be used to create responses.C. PARAMETERSGiven the various methods for stash away biometrical data, each of these techniques must pass a set of parameters to a percentage point in order to be considered as a viable method for integration within a biometrical system. These p arameters include UNIVERSALITY The principle of universality stipulates that every user should have the characteristic. Sometimes, in some cases this may not be true as it the case of a person with no hands who cannot use a hand analysis machine for verification. uniqueness The principle of uniqueness involves the degree of how separable the biometric characteristic is between each individual person. PERMANENCE The principle of permanence involves how well the technique used for measuring is resistant to changes such as aging, human developmental processes such as pregnancy, or things such as plastic surgery.COLLECTABILITY The collectability principle is related to how easy the method is to acquire. Easier methods, as well as more salubrious methods are more exemplar for a viable biometrical system. PERFORMANCE The exploit principle is concerned with the accuracy, speed and the strength of the applied science used to evidence the user. ACCEPTABILITY The acceptableness princ iple is related to the degree of social acclamation for use of the applied science as a means for collecting biometrical data. CIRCUMVENTION Circumvention involves, the biometrical systems ease of adaptation to a rest should the system withdraw one. 1. COMPARISON OF VARIOUS METHODS WITH PARAMETERS(Based on the Comparison of Various Biometric technologies table by A.K. Jain, et. al. 2004) FACE Facial scanning has a juicy train of universality because it is virtually impossible for any living human-being to possess no form of a face. Facial scanning make headway low in its level of uniqueness due to the fact that it can be knotty to distinguish characteristics from person to person at times. This is due to some people having similar features which may be hard to distinguish. In the case of identical twins, this may not be a useful means for authentication at all. Facial scanning rack up a specialty ranking to a lower stern the permanence factor. This is due to the fact th at although a persons substantial facial characteristics never change, they are subject to transformations such as aging, weight gain or loss, and alterations such as plastic surgery or accidents. As far as collectability, facial scanning gobs a high mark due to the fact that, going along with its high level of universality, every living human-being does have a face which is easy to locate on a human body.Facial scanning is low in surgical operation because it can tend to be highly inaccurate due to the dynamical aspect of human faces. Facial scanning also hit high in acceptability as a satisfactory and accepted way people would want to collect their biometrical data, but it pull ahead low in circumvention because it doesnt have an easy substitute which can replace it. Facial thermograph score high in universality, uniqueness, collectability, acceptability, and circumvention. It scores low in permanence and sensitive in performance. FINGERPRINT fingerprint scores medium in i ts level of universality. This is due to the fact that although all people inherently possess fingerprints at birth, fingerprints can still be injuryd via rare skin diseases or through loss of fingers, abrasions, etc.Fingerprinting has a high level of uniqueness and a high level of permanence. Fingerprinting has a medium level of collectability and performance due to the fact that although it is easy to acquire for measurement, there is a 5% disaster to enroll rate which exists for everyone even with good sensors and analysis software. Fingerprinting has a medium level of acceptability by the public as a means for collecting data. This is because although it is an easy method of measurement, it may be unhygienic, inaccurate as well as easy to duplicate unlawfully. Fingerprinting has a high level of circumvention due to its ease of adaptation to a substitute if deemed necessary. HAND Hand geometry scores medium in its universality, uniqueness, permanence, performance, acceptability , and circumvention. Hand geometry scores high in its collectability aspect. Hand vein analysis also scores medium in universality, uniqueness, permanence, collectability, performance, and acceptability but it scores high in circumvention.The overall reason why hand analysis carries a medium ranking in virtually all the parameters listed is because of a human-beings ability to anticipate without them. EYES Eye analysis provides for a more accurate analysis approach in a biometric system. Iris scanning scores high in universality, uniqueness, permanence, performance, and circumvention. This is due to the complexity and exclusivity of iris patterns which does make them a violate choice method of biometric authentication. Iris scanning received a medium score in collectability and a low score in acceptability due to the complexity of the method and its suitability to the general masses. Retinal scanning also received similar scores, scoring high in universality, uniqueness, performan ce, and circumvention receiving a medium score in permanence, and low scores in both its collectability and acceptability. DNA DNA analysis has split results, scoring high in universality, uniqueness, permanence, and performance, and scoring low in collectability, acceptability, and circumvention.Although DNA can be extracted from a numerous amount of different ways, a method of extracting DNA in order to be used in a biometrical authentication system cannot be done without seeming invasive or unsanitary. Also, many people may be concerned with privacy matters concerning DNA analysis. ODOR & SCENT Odor and scent analysis scores high in universality, uniqueness, and permanence. Although scents can be masked by deodorants, fragrances and takeions, the underlying biological scent of a person cannot be concealed. Odor analysis also scores low in collectability, performance, and circumvention, with a medium score in acceptability. VOICE ANALYSIS Voice analysis scores medium in its unive rsality and collectability. It scores low scores in uniqueness, permanence, performance, and circumvention, making it not an ideal method for use in a biometrical system.This is because not only does a persons voice change throughout time, but people can admitingly change their voice or use engineering to change their voice (such as a recording) in order to dupe a system. Voice analysis scores high in acceptability due to the simplicity of the method. SIGNATURE Signature analysis scores low in universality, uniqueness, permanence, performance, and circumvention. It scores high in collectability, and acceptability. Signature analysis may not be an ideal method for authentication because although graphology experts can distinguish identities through meticulous handwriting analysis, it may be more difficult for a biometrical system to accurately analyze differences in handwriting for each individual person.This is because a persons handwriting can change await on various things such as the mood of the person. Also some people may write similarly or use forgery to try to dupe the system. KEYSTROKE Keystroke analysis is another method which may be seen as not as reliable as some of the other methods for collecting biometric information. Although it has the advantage of being able to simultaneously manifest a user while he/she is still within the work session, keystroke analysis scores low for universality, uniqueness, permanence, and performance. It also has medium scores for collectability, acceptability, and circumvention. This may be due to the behavioral aspect of typing which can be intimately changed if a person learns to type in different ways.GAIT tread scores medium in universality and circumvention. Gait has low scores in uniqueness, permanence, and performance. Gait also has high scores in collectability and acceptability. Of all the various methods for collecting biometric data, some of the most reliable methods (according to the table by A.K. Jain et. Al) are iris scanning, retinal scanning, facial thermograph, fingerprint analysis, and DNA analysis. Some of the least reliable methods are keystroke analysis, signature analysis, and voice analysis. Overall, it appears that physiological data is seen as a more reliable method for collecting data than behavioral data.III. BIOMETRIC SYSTEM A. BIOMETRIC SYSTEMA biometrical system although plainly complicated, has only two main steps, regardless of the methodology or the applied science used to facilitate it. The system begins with a process called enrollment which is when the biometric information from individual users is collected and stored within a database and translated into a code or graph. In some instances data may be stored on a smart badger which can be carried away with the user. The next operation of the biometrical system is called testing. During this portion of the system, biometrical data is detected and compared with that which is in the database.In order for a biometrical system to be robust, it is necessary that the storage and retrieval of data within the system be highly secured. (http//upload.wikimedia.org/wikipedia/commons/thumb/3/3c/Biometric_system_diagram.png/800px-) A biometrical system can carry out two main functions. These include verification or identification. In verification, the systems heading is to authenticate the user in conjunction with another method such as a smart card, a username, or a password. With identification, the systems intention is to authenticate the user only on the groundwork of the biometrical data alone. The goal of this function is to identify the user according to the close match within the allowable limit of the system.B. PERFORMANCE MEASUREMENTSThe performance of a biometric systems technology can be broken eat up into a variety of probability descriptions. These descriptions indicate the level of accuracy the system is able to achieve. FAR- The first measurement is entitled False Accept Ra te. This measurement determines the likeliness of a biometric system incorrectly accepting access to the system by an un- definitive user. This measurement is calculated by dividing the number of false acceptances by the number of times an identification attempt has been made. FRR- The second measurement is called a False Rejection Rate which measures the probability that a biometric system will incorrectly reject an authorized user from using the system. This number is calculated by dividing the number of false rejections by the number of authentication attempts. EER- Equal fault rate stands for the rate at which FAR and FRR are equal.This measurement can be used to compare two different biometric systems. Whichever biometric system has a lower EER is considered to be a more accurate system than the other. ROC- pass receiver operating characteristics deals with the systems accuracy within certain environments as it relates to False Rejection and False Acceptance Rate results. FT E- FTE stands for mischance to enroll rate. This measurement is calculated as a percentage of the data which failed to pass through the system due to invalidity. Failure to enroll typically happens when the sample data is of poor quality and does not match the data which is stored in the database of the system. FTC- FTC is the failure to capture rate. This measurement measures the probability that the system will fail to pick up on a biometric characteristic when it is presented accurately. High calculations of this measurement typically mean that this authentication method will be difficult as well as frustrating to use.C. SUSCEPTIBLE AREAS OF ATTACK FOR BIOMETRICSThe threesome most susceptible areas of vulnerability for attack of a biometric system are 1) Copied-biometric attacks- where the attacker obtains a substitute for the true biometric sample in order to cause proper authentication to occur via the normal system procedures. 2) play back attacks- where perpetrators obtain valid templates from the original user and then use them to immediately dupe the biometric system. 3) Database attacks- where perpetrators access a template database and obtain the ability to replace valid templates with invalid ones.IV. ISSUES WITH BIOMETRICSA. IDENTITY THEFT ISSUEAlthough the ideal goal of biometrical authentication is to have ultimate prevention of identity thievery, the issue of an il original user having the ability to commit identity theft still exists within biometrics and can have even more dire circumstances than with non-biometrical authentication systems. Depending on the method used to collect the biometrical data, a persons identity can be stolen easily. An example of this would be in the case of fingerprints which can be taken from inanimate objects such as glassware or metal objects and then duplicated in order to be used to dupe a biometrical system.The main problem concerning this issue is in the fact that if an individuals identification is stole n by another, the legitimate user may never be able to undo the damage which has been created because, unlike with non-biometrical authentication, once biometrical data has been compromised, it is compromised for the entirety of the legitimate users existence. One proposed possible solution for solving the issue of identity theft is to only use a portion of the biometric data, so that if the data does deform compromised, it will not be entirely lost. This way, if one part of the data is stolen, another part of the original users biometric data can be used to replace it.B. PRIVACY ISSUEPrivacy can also be a staggering issue with the implementation of a biometrical system from a societal standpoint. Many people may not care to have all of their biological characteristics recorded on some medium for a variety of reasons. One concern is that if information is recorded on systems used at more than one location or by more than one entity, an individuals movements can be tracked preventin g anonymity. Safety of the legitimate users can become compromised, if malevolent individuals contain to target that person in order to obtain their goal.Another issue regarding privacy involves physical harm which can be done to an individual using a biometrical system. Physical harm can occur by use of unsanitary instruments used in the technology to obtain the biometrical information, which may cause the system to be considered unsafe. Another issue regarding privacy lies with the administrative ability to misuse users biometrical data without the consent of those users. Currently, few regulations exist to protect biometric information of individuals.C. SENSOR OBSTACLESDifferent types of technology (hardware & software) used within different biometrical systems can counteract one another, making it difficult to have standardized biometrical data. One of the reasons this problem exists is because each vendor of biometrical technology generates their own encryption methods for the recorded information. Unfortunately, many of these encryption methods do not coincide with one another making the use of biometrical systems more difficult and less efficient. The only way unification of the different biometrical systems can occur is by a standardizing process which would require exposing of all the concealed data. Unfortunately, this can also present a serious threat.D. FAILURE TO MEET PARAMETERSAnother issue concerning implementation of biometrics is in the issue of a systems failure to meet parameters. In order for biometrical data to be interminable, the biological characteristic must be unique, universal, acceptable, collectible, reliable in regards to the performance and circumvention of the technology used to collect the data, but most importantly, the data must be permanent, which is the most fragile issue concerning the parameters of biometrical data. Unfortunately, most if not all biological characteristics are not guaranteed to be permanent. Many of them can be compromised via accidents, health problems or alterations such as surgery.V. CURRENT USES OF BIOMETRICSAlthough the field of biometrics as a whole is still in need of major development before widespread implementation will ever occur there are some entities including closed-door industry and governmental agencies which currently utilize biometrical technology. Certain examples of American organizations which currently use biometric technology include 1) Walt Disney World Walt Disney World uses fingerprint analysis technology to authenticate the fingerprints of guests in order to ensure that season tickets are used by the authorized ticket owner. This is in order to prevent lost sales through ticket sharing, as well as thefts. 2) First Tech Credit Union First Tech Credit Union is an surgery based credit union which utilizes keystroke recognition technology for authentication of users on its online website.3) Casinos Over 100 American casinos such as the Imperial rook casi no in Las Vegas use facial recognition technology to identify and prevent known cheaters or dishonest patrons from entering into their establishments. 4) Missing Childrens Clearinghouse A West Virginia based organization entitled Missing Childrens Clearinghouse uses biometric technology which utilizes scanned digital photographs to search for missing children. 5) Citibank capital of Singapore Citibank in Singapore uses fingerprint scanning technology for customers who use their clear platinum card for point-of-sale purchases.6) Coca Cola Coca Cola uses hand scanning machines to replace time cards for employees in order to document actor time keepinsg records. 7) Welfare crack-down rising Jersey as well as six other states use biometric technology to crack down on individuals who abuse the welfare system by claiming benefits in multiple names. 8) nonebooks Computer products such as the Compaq Armada E500 are being developed to use fingerprint scanning technology to verify the ident ity of the user. 9) Prisons Up to 100 American Prisons use biometric technology to regulate methadone dispersement among prisoners.VI. FUTURE DEVELOPMENTS IN BIOMETRICSSince the occurrence of the September 11, 2001 terrorist attacks, a surge in the demand for biometric technology has begun. Stocks in publically trade biometric companies such as Visionics, Viisage Technology, and Indentix have soared with the overall biometric technology industry projected to have revenues approaching $10 one million million million dollars annually by 2020. Emerging trends for future uses of biometric technology seem to tip more towards law enforcement, homeland security, and security within certain types of private industry such as in airport security or finance. Many credit card companies such as Mastercard and Visa are beginning to implement biometric authentication methods to verify card users. Also, the Immigration and naturalisation Service may begin implementing biometric technologies to i dentify illegal immigrants.Certain types of biometric technology which are becoming more widespread include access control facial recognition technology which is used to permit only authorized individuals to enter upon certain facilities, facial recognition passive surveillance technology which is used to monitor premises in order to identify possible terrorists or suspect individuals, and alert management which includes the use of real-time technology in association with biometric technology to provide security alerts of potential security breaches. Applications which use biometric technology will also have an effect on commerce, particularly in e-commerce to provide extra security for online purchases, and installation within certain personal items such as cars and cell phones.VII. CONCLUSIONAlthough not that long ago, the concept of having biometric technology as a part of our mainstream gild may have been seen as a science-fictional impossibility, technological innovation has expectant to the point where it is becoming more and more of a reality. Although we are not quite ready for widespread implementation of this technology, as the need for better hi-tech security increases, research as well as investor and consumer federal agency and innovation within the biometric industry is also expected to improve. Although no integrity biometric system method is without flaws, combinations of these various methods and technologies may provide the ideal security that we hope to attain one day.CHAPTER IIIMETHODOLOGYThere was difficulty in determining the real students of the University of Baguio because of the hard-headed students who cannot abide with the simple rules and regulations which was the reoccurring problems of the security. Due to this problem, the mandos and magnas can easily enter the schools premises victimizing a lot of students. This was one of the reasons why such simple violations became a huge problem for the school.Regarding this matter, the group came up with an idea for a topic for their action research. in the lead they finalize their topic, the group went to the Office of the Student Affairs and interviewed the dean to know which rules are commonly violated by the students. aft(prenominal) the interview, the group set that the rules which are commonly violated are a) wearing of I.Ds inside the school campus and b) wearing of uniforms on the designated days.The group then convened and finalized their topic that would focus on A proposed Biometric ID system to control the reoccurring violations by University of Baguio students. Since there was already a topic to be talked about in the research, the group started to gather data which were relevant to the research proper like that of related studies and researches and terms that are significant to the study. After collecting relevant information for the research, the group fain communication letters addressed to the deans of the different schools of the University a nd respondents likewise with the survey questionnaire. Upon eulogy of the deans of the different schools, the group administered the questionnaires to the respondents.The survey forms were distributed to the eleven schools of the University having ten (10) respondents each to see which results have the same percentage which were used to know the reasons behind these actions. After distributing the survey questionnaires, the group then retrieve the questionnaires and start tabulating the results. The tabulated data showed the reasons why the students violate these simple policies of the school.The result of the survey supported the proposal that were passed to the Board of Directors. The group then proposed the biometric ID system that will be put up in every entrances and exits of the buildings in the University. The biometric ID system will most believably be very costly but disregarding such amount, the administration will approve it and immediately ordered the said system. By t he time the systems that had been ordered arrive, the people designated by the higher ops will put up such systems on the designated areas to make the University a safe and humane place to study.CONCLUSIONIn light of the findings, the following conclusions are hereby presented Not wearing of ID has been a habit of the students. Sometimes the teachers themselves forget to check their students ID. The security guard also are not lenient in checking the IDs of these students. Because of this military posture most number of the student no longer uses their IDs. The students think that it is just fine not use their IDs.The researchers are found out that the school really need a biometric ID system. Approximately, one unit of the biometric system will cost more or less two hundred litre thousand pesos. In such case the University of Baguio can still present this system since it does not only help the students but it can also secure their safetyWith the help of this proposal it will less en the incumbrance of the security personnel. This proposal can also lessen the number of students violating the proper use of IDs. In such situation students can no longer use any ID because of the presence of finger prints. The students whether they like it or not would still be forced to use their IDs. Also, this proposal can help in the security of the school campus because outsiders can no longer come in because of the presence of finger prints.RECOMMENDATIONDrawing from the conclusions that the researchers arrived at, the following recommendations are forwarded. The researchers would recommend the strict implementation of the rules and regulations of the university and the maintenance of the biometric ID system. In addition, each of the gate should be closed. Also, the lenient checking on the wearing of IDs should be done. The guards should monitor every student entering the university. In case the students lost their IDs, we recommend that a password that would allow them to enter would be provided by the OSA during the time of the IDs loss.BIBLIOGRAPHYBOOKS* Addiction Today, Sept. 27, 2008. Prisons Use Biometrics to Manage Methadone. * Germain, Jack M., Sept. 11, 2003. Beyond Biometrics New Strategies for Security. * New York Times, Nov. 15, 2008. Technology and Media, a Surge in the involve to use Biometrics. * Osborn, Alice, Aug. 17, 2005. Future of Biometrics-Trends and Emerging Uses for Biometric Technology. * Panko, Raymond R., Corporate Computer and Network Security. New Jersey Prentice Hall, 2004. * Risk Management, Mar. 15, 2005. Biometrics The Future is Now. * Technology and military man Values Senior Seminar, 2008. Biometrics. * Tilton, Catherine J., Feb. 2006. The Role of Biometrics in Enterprise Security. * Wikepedia, Nov. 13, 2008. Biometrics.ONLINE* http//www.addictiontoday.org/addictiontoday/2008/09/prisons-use-bio.html. * http//www.ecommercetimes.com/story/31547.html?wlc=1226777438 * .http//query.nytimes.com/gst/fullpage.html?res=9F0 6E0DB163EF934A25751C1A9679C8B63&sec=&spon=&pagewanted=1 * http//www.video-surveillance-guide.com/future-of-biometrics.htm * http//www.riskmanagementmagazine.com.au/articles/FF/0C02DDFF.asp?Type=124&Category=1240 * http//www.dell.com/downloads/global/ top executive/ps1q06-20050132-Tilton-OE.pdf . * http//en.wikipedia.org/wiki/Biometricscite_note-jain_short_article-20 .

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.