“The formation of character is one of the most of import characteristics of the educational system at the University of Baguio. For this ground. the imposed subject. while observant to the rights and feelings of others. is steadfast. particularly when the repute of the pupil organic structure and establishment is at interest. Students are expected to attest both within and outside the University. the regard for order. morality. personal award. and rights of others. which is required of God-fearing work forces and adult females. ” ( UB pupil enchiridion. Article Fourteen: 2010 Edition )

Schools have policies that are being implemented for the general public assistance of its components. These policies provide a set of regulations that the pupils. instructors. etc. should follow. These regulations are necessary for the order and uniformity of the pupils within the school premises. Even with the presence of these regulations. some of the pupils violate them ignoring the countenances that go along with it. The word policy originated from the Latin word politia or civil order.

There's a specialist from your university waiting to help you with that essay.
Tell us what you need to have done now!


order now

Defined as a definite class of action adopted for the interest of expedience. installation. etc. ; an action or process conforming to or considered with mention to prudence or expedience. ( hypertext transfer protocol: //dictionary. mention. com/browse/policy )

Educational policies are important because these are regulations that are used in schools to train pupils. These regulations determine how effectual and efficient the school is in pull offing pupils and forces. The policies have great influence in the quality of instruction in an country. Educational policies are of import because effectual policies can assist pupils in school on their twenty-four hours to twenty-four hours activity.

For a policy to go effectual. it must hold a well-pronounced result. premises should be clear and expressed. linkage to organisational way must be present. due procedure in the development has to be observed. the precedence should be on the public involvement. outlooks have to be made. the policy must be both efficient and effectual. consequences should be stated in mensurable footings. rating of consequences should be capable. support and allotment of resources must be appropriate. answerability should non be obscure. it should be lawful and administered. it must be based from history. thoughts have to be verified before execution. and the policy consequences should be good stated. ( hypertext transfer protocol: //manuals. ucdavis. edu/resources/coordinators. htm )

One of the factors why pupils violate school policies can be explained through their different behaviors. Behaviour is the mode of behaving or carry oning oneself ; the sum of all the responses made by an being in any state of affairs. ( hypertext transfer protocol: //dictionary. mention. com/browse/behavior ) Based on Operant Conditioning of B. F. Skinner “All behaviors caused by external stimulations and all behaviors can be explained without the demand to see internal mental provinces or consciousness. ” It means that the actions done by pupils are responses to its environment. ( hypertext transfer protocol: //www. learning-theories. com/behaviorism )

Another type of behaviorism is Extremist Behaviourism which is the connexion to function of emotions and the major differences in the credence of interceding constructions and etc. In order to decide this job the group found out that the best solution is the usage of Biometric designation systems which can be grouped based on the chief physical feature that lends itself to biometric designation. There are different sorts of biometric system in which the fingerprint biometries is the normally used one. There are besides other biometric designation systems such as the manus geometry. thenar vein hallmark. retina scan. iris scan. face acknowledgment. signature. and voice analysis. There are biometric systems that are composed of more than two physical features to be identified.

Statement of the Problem

1 ) What are the grounds why these pupils violate such policies? 2 ) What are the most common policies that are violated by the lawbreakers? 3 ) How can the proposed biometric ID system control pupils from go againsting the erosion of ID? Scope and Delimitation

This proposal was limited merely to the pupils of the University of Baguio including the administrative staff. instructors. module and public-service corporations.

Significance of the Study

With the aid of this proposal. the University of Baguio would be able to command every entryway and issue of the school. The act of non have oning IDs for the pupils would no longer be possible because they will non be able to come in the school without their IDs. The biometric ID system would beef up the security of the academia for the safety of the pupils. The clip when the pupils would come in and go forth their categories would be monitored. The system would be able to find if the pupils will jump their categories. Besides. the entry of stealers and pick-pocketers within the school premises would no longer be possible due to this proposal. With this modernised system to be established in the University. all of the pupils and forces of the school will profit from it.

Model

The lenience of the United States Marshals Services in look intoing the ID’s and proper erosion of uniforms. pupils non following the regulations and ordinance of the school and to supervise the entryway and issue of the pupils of University of Baguio within the school’s locality are the grounds why the research workers proposed an ID Biometric System.

The pupils violated the above mentioned regulations due to lenience. accustomed actions of pupils. indolence. and unwanted behaviors of pupils. Some pupils merely wanted to go against such policies because they thought that it was a merriment and interesting thing to make.

If the proposed undertaking will be to the full implemented. there will be organisation in the school campus and an effectual monitoring of the transition ways in come ining and traveling out of the school. Based on these factors that we have retrieved on the informations that we have collected. the theory that would outdo support our proposal is the belief theory. We chose this theory because we. the research workers. believe that the proposed biometric ID system will work and we will therefore interpret these beliefs into action. The research workers foresee that this would be able to command the reoccurring jobs that are being done by the University of Baguio pupils and that is the ground why we have made this really proposal.

DEFINITION OF TERMS

* Biometric – refering to. observing. or utilizing a person’s alone physical and other traits for the intent of designation and security. * Coincide –to occupy precisely matching or tantamount places on a graduated table or in a series * Identification – psychological orientation of the ego in respect to something ( as a individual or group ) with a ensuing feeling of close emotional association. * Implementation – the act of implementing. or seting into consequence. * Policy – a definite class of method of action selected from among options and in visible radiation of given conditions to steer and find present and future determinations. * Proposal – An act of seting forward or saying something for consideration. * Scanner – a device feeling a recorded information.

* System –a group of devices or unreal objects or an organisation organizing a web particularly for administering something or functioning common intent. * Units – a piece or complex setup functioning to execute one peculiar map

Premise

The group assumed that if the proposal is to be approved by the Board of Directors. it would be implemented instantly. The ordered units will be put up to the designated countries and the Biometric system will get down working. With the new system of the school. there will be an organisation in school activities. The school so will be a safe and humanist topographic point to analyze.

Chapter II

REVIEW OF RELATED LITERARTURE
I. Executive Summary

In the millennian years’ quickly progressing technological universe. the issue of security is going a more and more urgent affair. Computer offenses and individuality larceny related offenses are going more rampant and evident. necessitating better solutions to get by with them. One of the proposed methods for solution for future high-technology security issues lies in the field of biometries. Biometricss defined merely in its respect to security affairs is any method or engineering which uses biological measurings to ease hallmark for confirmation or designation of a peculiar user.

Although still in major stages of development. biometries is seen as a extremely valuable enterprise to one twenty-four hours replace present twenty-four hours security hallmark patterns due to its ideal construct of being virtually risk free and non-inaccurate. This paper will analyse all facets refering biometries including its overall construct. how a biometrical hallmark system works. controversial issues refering its execution. its current utilizations in engineering. concern. and governmental bureaus and its hereafter developments.

II. CONCEPT OF BIOMETRICS IN SECURITY

A. TWO CATEGORIES

Biometricss can be subdivided into two chief classs. These include physiological and behavioural classs of specific measurings. Physiological measurings include biological features built-in to single human existences. Some of these would include facial construction. fingerprints. manus construction. flag and DNA construction of a peculiar individual. Behavioral measurings step kineticss in single behaviours. Some of these would include keystroke behaviour. signature and voice acknowledgment.

B. VARIOUS METHODS FOR COLLECTING MEASUREMENTS

Face: Facial acknowledgment involves engineering which scans the face and interprets the information as recognizable features of a peculiar user. including the size and form of the face and their relationship to each other. Facial acknowledgment is a natural method that humans use to place people they come into contact with. but it is non an easy method to double for designation on a biometric system. This is due to alterations such as plastic surgery. weight addition or weight loss which can do the consequences to be inaccurate. Another emerging method of roll uping biometric information affecting the face is facial thermograph which detects and measures the heat forms created by the ramification blood vass within the face and emitted through the tegument.

Fingerprint: Fingerprint analysis has been around for centuries as a agency of placing people. It has been evidenced that ancient Chinese used fingerprinting to subscribe legal paperss as long ago as 1000 BCE. Fingerprint analysis involves analyzing the ridges on an single fingerprint in order to fit them to a specific proprietor. HAND: Handss can be analyzed and measured in a few different ways. Aside from fingerprints. another manner to utilize custodies in biometrical analysis is through manus geometry which steps and compares the different physical features of a person’s manus such as form and size. Another method refering custodies is palm vena hallmark which uses an infrared beam to perforate a person’s manus and step the complexness of the vena patterns within that person’s manus. This specific method is more utile than manus geometry measuring because thenar vena forms are internal to the organic structure. and hard to be counterfeited by an illicit user.

Eyess: Eyess can be used in two different ways as a portion of a biometrical examination procedure. Iris scanning involves analysis of the rings. furrows. and lentigos in the student of the oculus of a peculiar homo. Retina scanning involves analysis of the capillary blood vass located in the dorsum of the oculus. Deoxyribonucleic acid: Deoxyribonucleic acid confirmation uses analysis of familial information found within a specific person’s DNA codification ( or familial codification ) as a agency of placing that individual. Deoxyribonucleic acid analysis is frequently used now as a method for placing paternity of a person’s kid or in forensic offense probes as a grounds for convicting persons for offenses such as slaying or colza. ODOR & A ; SCENT: Olfactory property and scent analysis is a reasonably new development in biometrical analysis and is based on a theory entitled “individual olfactory property theory. ”

This theory is premised on the impression that each individual has a peculiar and alone aroma. In forensics. olfactory property analysis has been used to place people by the usage of blood hounds ( Canis familiariss ) . VOICE Analysis: Voice analysis involves analysing of the pitch. tone. meter. and frequence of a peculiar user’s voice to ease hallmark. Voice analysis can technically be seen as both a physiological trait every bit good as a behavioural trait because voice is non merely built-in to a specific individual. but besides the manner that individual speaks is besides a unique and mensurable trait. Signature: Signature analysis analyzes the manner a individual writes his/her signature as a basic agency of designation.

Although handwriting techniques vary for persons throughout their life-times. handwriting designation is seen as a scientifically dependable standard for measuring. KEYSTROKE: Keystroke analysis measures the kineticss of a person’s typing beat to ease hallmark of a peculiar individual. Keystroke analysis may be more utile than other methods of designation because unlike other biometrical hallmark methods. keystroke kineticss can still be measured throughout the computing machine session even after the entree control point has been successfully passed by the user.

Pace: Another new developing biometrical technique is one which measures pace which is a person’s peculiar manner of walking and facilitating gesture. Gait can be used efficaciously to acknowledge people coming in from a distance. Cognitive Biometrics: Cognitive biometries is besides a developing method in biometries which uses measurings of encephalon activity responses when triggered by specific stimulations and matched within a computing machine database as a agency for hallmark of a peculiar user of the system. Presently. systems which utilize this sort of method are being created to trip responses to odor stimulations. In the hereafter. other triggers may be used to make responses.

C. PARAMETERS

Given the assorted methods for roll uping biometrical informations. each of these techniques must go through a set of parametric quantities to a grade in order to be considered as a feasible method for integrating within a biometrical system. These parametric quantities include: Universality: The rule of catholicity stipulates that every user should hold the characteristic. Sometimes. in some instances this may non be true as it the instance of a individual with no custodies who can non utilize a manus analysis machine for confirmation. Singularity: The rule of uniqueness involves the grade of how dissociable the biometric feature is between each single individual. Permanence: The rule of permanency involves how good the technique used for measurement is immune to alterations such as aging. human developmental procedures such as gestation. or things such as plastic surgery.

COLLECTABILITY: The collectability rule is related to how easy the method is to get. Easier methods. every bit good as more healthful methods are more ideal for a feasible biometrical system. Performance: The public presentation rule is concerned with the truth. velocity and the strength of the engineering used to authenticate the user. Acceptability: The acceptableness rule is related to the grade of societal blessing for usage of the engineering as a agency for roll uping biometrical informations. Circumvention: Circumvention involves. the biometrical system’s easiness of version to a replacement should the system need one. 1. COMPARISON OF VARIOUS METHODS WITH PARAMETERS

( Based on the Comparison of Various Biometric Technologies tabular array by A. K. Jain. et. Al. 2004 ) Face: Facial scanning has a high degree of catholicity because it is virtually impossible for any living human-being to possess no signifier of a face. Facial scanning tonss low in its degree of uniqueness due to the fact that it can be hard to separate features from individual to individual at times. This is due to some people holding similar characteristics which may be difficult to separate. In the instance of indistinguishable twins. this may non be a utile agencies for hallmark at all. Facial scanning scores a medium ranking under the permanency factor. This is due to the fact that although a person’s existent facial features ne’er change. they are capable to transmutations such as aging. weight addition or loss. and changes such as plastic surgery or accidents. Equally far as collectability. facial scanning scores a high grade due to the fact that. traveling along with its high degree of catholicity. every populating human-being does hold a face which is easy to turn up on a human organic structure.

Facial scanning is low in public presentation because it can be given to be extremely inaccurate due to the dynamical facet of human faces. Facial scanning besides scores high in acceptableness as a comfy and recognized manner people would desire to roll up their biometrical informations. but it scores low in circumvention because it doesn’t have an easy replacement which can replace it. Facial thermograph tonss high in catholicity. singularity. collectability. acceptableness. and circumvention. It scores low in permanency and medium in public presentation. Fingerprint: Fingerprinting tonss medium in its degree of catholicity. This is due to the fact that although all people inherently possess fingerprints at birth. fingerprints can still be damaged via rare tegument diseases or through loss of fingers. scratchs. etc.

Fingerprinting has a high degree of uniqueness and a high degree of permanency. Fingerprinting has a medium degree of collectability and public presentation due to the fact that although it is easy to get for measuring. there is a 5 % failure to inscribe rate which exists for everyone even with good detectors and analysis package. Fingerprinting has a medium degree of acceptableness by the populace as a agency for roll uping informations. This is because although it is an easy method of measuring. it may be unhygienic. inaccurate every bit good as easy to double unlawfully. Fingerprinting has a high degree of circumvention due to its easiness of version to a replacement if deemed necessary. HAND: Hand geometry tonss medium in its catholicity. singularity. permanency. public presentation. acceptableness. and circumvention. Hand geometry tonss high in its collectability facet. Hand vena analysis besides scores medium in catholicity. singularity. permanency. collectability. public presentation. and acceptableness ; but it scores high in circumvention.

The overall ground why manus analysis carries a medium ranking in virtually all the parametric quantities listed is because of a human-beings ability to populate without them. Eyess: Eye analysis provides for a more accurate analysis attack in a biometric system. Iris scanning tonss high in catholicity. singularity. permanency. public presentation. and circumvention. This is due to the complexness and exclusivity of flag forms which does do them a better pick method of biometric hallmark. Iris scanning received a medium mark in collectability and a low mark in acceptableness due to the complexness of the method and its suitableness to the general multitudes. Retinal scanning besides received similar tonss. hiting high in catholicity. uniqueness. public presentation. and circumvention ; having a medium mark in permanency. and low tonss in both its collectability and acceptableness. Deoxyribonucleic acid: Deoxyribonucleic acid analysis has split consequences. hiting high in catholicity. singularity. permanency. and public presentation. and hiting low in collectability. acceptableness. and circumvention.

Although DNA can be extracted from a legion sum of different ways. a method of pull outing Deoxyribonucleic acid in order to be used in a biometrical hallmark system can non be done without looking invasive or insanitary. Besides. many people may be concerned with privateness affairs refering Deoxyribonucleic acid analysis. ODOR & A ; SCENT: Olfactory property and scent analysis tonss high in catholicity. singularity. and permanency. Although aromas can be masked by deodourants. aromas and lotions. the implicit in biological aroma of a individual can non be concealed. Odor analysis besides scores low in collectability. public presentation. and circumvention. with a medium mark in acceptableness. VOICE ANALYSIS: Voice analysis tonss medium in its catholicity and collectability. It scores low tonss in singularity. permanency. public presentation. and circumvention. doing it non an ideal method for usage in a biometrical system.

This is because non merely does a person’s voice alteration throughout clip. but people can knowingly alter their voice or usage engineering to alter their voice ( such as a recording ) in order to gull a system. Voice analysis tonss high in acceptableness due to the simpleness of the method. Signature: Signature analysis tonss low in catholicity. singularity. permanency. public presentation. and circumvention. It scores high in collectability. and acceptableness. Signature analysis may non be an ideal method for hallmark because although graphology experts can separate individualities through punctilious handwriting analysis. it may be more hard for a biometrical system to accurately analyze differences in handwriting for each single individual.

This is because a person’s script can alter depend on assorted things such as the temper of the individual. Besides some people may compose likewise or utilize counterfeit to seek to gull the system. KEYSTROKE: Keystroke analysis is another method which may be seen every bit non every bit dependable as some of the other methods for roll uping biometric information. Although it has the advantage of being able to at the same time authenticate a user while he/she is still within the work session. keystroke analysis tonss low for catholicity. singularity. permanency. and public presentation. It besides has medium tonss for collectability. acceptableness. and circumvention. This may be due to the behavioural facet of typing which can be easy changed if a individual learns to type in different ways.

Pace: Gait scores medium in catholicity and circumvention. Gait has low tonss in singularity. permanency. and public presentation. Gait besides has high tonss in collectability and acceptableness. Of all the assorted methods for roll uping biometric informations. some of the most dependable methods ( harmonizing to the tabular array by A. K. Jain et. Al ) are iris scanning. retinal scanning. facial thermograph. fingerprint analysis. and DNA analysis. Some of the least dependable methods are keystroke analysis. signature analysis. and voice analysis. Overall. it appears that physiological information is seen as a more dependable method for roll uping informations than behavioural informations.

III. BIOMETRIC SYSTEM A. BIOMETRIC SYSTEM

A biometrical system although apparently complicated. has merely two chief stairss. regardless of the methodological analysis or the engineering used to ease it. The system begins with a procedure called registration which is when the biometric information from single users is collected and stored within a database and translated into a codification or graph. In some cases informations may be stored on a smart card which can be carried off with the user. The following operation of the biometrical system is called proving. During this part of the system. biometrical information is detected and compared with that which is in the database.

In order for a biometrical system to be robust. it is necessary that the storage and retrieval of informations within the system be extremely secured. ( hypertext transfer protocol: //upload. wikimedia. org/wikipedia/commons/thumb/3/3c/Biometric_system_diagram. png/800px- ) A biometrical system can transport out two chief maps. These include confirmation or designation. In confirmation. the system’s aim is to authenticate the user in concurrence with another method such as a smart card. a username. or a watchword. With designation. the system’s purpose is to authenticate the user merely on the footing of the biometrical information entirely. The end of this map is to place the user harmonizing to the closest lucifer within the allowable bound of the system.

B. Performance Measurement

The public presentation of a biometric system’s engineering can be broken down into a assortment of chance descriptions. These descriptions indicate the degree of truth the system is able to accomplish. FAR- The first measuring is entitled False Accept Rate. This measuring determines the likelihood of a biometric system falsely accepting entree to the system by an un-authorized user. This measuring is calculated by spliting the figure of false credences by the figure of times an designation effort has been made. FRR- The 2nd measuring is called a False Rejection Rate which measures the chance that a biometric system will falsely reject an authorised user from utilizing the system. This figure is calculated by spliting the figure of false rejections by the figure of hallmark efforts. EER- Equal mistake rate bases for the rate at which FAR and FRR are equal.

This measuring can be used to compare two different biometric systems. Whichever biometric system has a lower EER is considered to be a more accurate system than the other. ROC- Receiver operating features trades with the system’s truth within certain environments as it relates to False Rejection and False Acceptance Rate consequences. FTE- FTE stands for failure to inscribe rate. This measuring is calculated as a per centum of the informations which failed to go through through the system due to invalidness. Failure to inscribe typically happens when the sample informations is of hapless quality and does non fit the information which is stored in the database of the system. FTC- FTC is the failure to gaining control rate. This measuring measures the chance that the system will neglect to pick up on a biometric feature when it is presented accurately. High computations of this measuring typically mean that this hallmark method will be hard every bit good as thwarting to utilize.

C. SUSCEPTIBLE AREAS OF ATTACK FOR BIOMETRICS

The three most susceptible countries of exposure for onslaught of a biometric system are: 1 ) Copied-biometric attacks- where the aggressor obtains a replacement for the true biometric sample in order to do proper hallmark to happen via the normal system processs. 2 ) Play back attacks- where culprits obtain valid templets from the original user and so utilize them to straight gull the biometric system. 3 ) Database attacks- where culprits entree a templet database and obtain the ability to replace valid templets with invalid 1s.

IV. ISSUES WITH BIOMETRICS

A. IDENTITY THEFT ISSUE

Although the ideal end of biometrical hallmark is to hold ultimate bar of individuality larceny. the issue of an bastard user holding the ability to perpetrate individuality larceny still exists within biometries and can hold even more desperate fortunes than with non-biometrical hallmark systems. Depending on the method used to roll up the biometrical information. a person’s individuality can be stolen easy. An illustration of this would be in the instance of fingerprints which can be taken from inanimate objects such as glasswork or metal objects and so duplicated in order to be used to gull a biometrical system.

The chief job refering this issue is in the fact that if an individual’s designation is stolen by another. the legitimate user may ne’er be able to undo the harm which has been created because. unlike with non-biometrical hallmark. one time biometrical information has been compromised. it is compromised for the entireness of the legitimate user’s being. One proposed possible solution for work outing the issue of individuality larceny is to merely utilize a part of the biometric information. so that if the information does go compromised. it will non be wholly lost. This manner. if one portion of the information is stolen. another portion of the original user’s biometric informations can be used to replace it.

B. PRIVACY ISSUE

Privacy can besides be a astonishing issue with the execution of a biometrical system from a social point of view. Many people may non care to hold all of their biological features recorded on some medium for a assortment of grounds. One concern is that if information is recorded on systems used at more than one location or by more than one entity. an individual’s motions can be tracked preventing namelessness. Safety of the legitimate users can go compromised. if malevolent persons choose to aim that individual in order to obtain their end.

Another issue sing privateness involves physical injury which can be done to an single utilizing a biometrical system. Physical injury can happen by usage of insanitary instruments used in the engineering to obtain the biometrical information. which may do the system to be considered insecure. Another issue sing privateness lies with the administrative ability to misapply user’s biometrical informations without the consent of those users. Currently. few ordinances exist to protect biometric information of persons.

C. SENSOR OBSTACLES

Different types of engineering ( hardware & A ; package ) used within different biometrical systems can antagonize one another. doing it hard to hold standardized biometrical informations. One of the grounds this job exists is because each seller of biometrical engineering generates their ain encoding methods for the recorded information. Unfortunately. many of these encoding methods do non co-occur with one another doing the usage of biometrical systems more hard and less efficient. The lone manner fusion of the different biometrical systems can happen is by a standardizing procedure which would necessitate exposing of all the concealed information. Unfortunately. this can besides show a serious menace.

D. FAILURE TO MEET PARAMETERS

Another issue refering execution of biometries is in the issue of a system’s failure to run into parametric quantities. In order for biometrical informations to be endless. the biological feature must be alone. universal. acceptable. collectable. dependable in respects to the public presentation and circumvention of the engineering used to roll up the information. but most significantly. the information must be lasting. which is the most delicate issue refering the parametric quantities of biometrical informations. Unfortunately. most if non all biological features are non guaranteed to be lasting. Many of them can be compromised via accidents. wellness jobs or changes such as surgery.

V. CURRENT USES OF BIOMETRICS

Although the field of biometries as a whole is still in demand of major development before widespread execution will of all time happen there are some entities including private industry and governmental bureaus which presently utilize biometrical engineering. Certain illustrations of American organisations which presently use biometric engineering include: 1 ) Walt Disney World: Walt Disney World uses fingerprint analysis engineering to authenticate the fingerprints of invitees in order to guarantee that season tickets are used by the authorised ticket proprietor. This is in order to forestall lost gross revenues through ticket sharing. every bit good as larcenies. 2 ) First Tech Credit Union: First Tech Credit Union is an Oregon based recognition brotherhood which utilizes keystroke acknowledgment engineering for hallmark of users on its on-line web site.

3 ) Casinos: Over 100 American casinos such as the Imperial Palace casino in Las Vegas use facial acknowledgment engineering to place and forestall known deceivers or dishonest frequenters from come ining into their constitutions. 4 ) Missing Children’s Clearinghouse: A West Virginia based organisation entitled Missing Children’s Clearinghouse uses biometric engineering which utilizes scanned digital exposure to seek for losing kids. 5 ) Citibank Singapore: Citibank in Singapore utilizations fingerprint scanning engineering for clients who use their clear Pt card for point-of-sale purchases.

6 ) Coca Cola: Coca Cola uses manus scanning machines to replace clip cards for employees in order to document worker clip keepinsg records. 7 ) Welfare crack-down: New Jersey every bit good as six other provinces use biometric engineering to check down on persons who abuse the public assistance system by claiming benefits in multiple names. 8 ) Notebook: Computer merchandises such as the Compaq Armada E500 are being developed to utilize fingerprint scanning engineering to verify the individuality of the user. 9 ) Prisons: Up to 100 American Prisons usage biometric engineering to modulate methadone dispersement among captives.

VI. FUTURE DEVELOPMENTS IN BIOMETRICS

Since the happening of the September 11. 2001 terrorist onslaughts. a rush in the demand for biometric engineering has begun. Stockss in publicly merchandise biometric companies such as Visionics. Viisage Technology. and Indentix have soared with the overall biometric engineering industry projected to hold grosss nearing $ 10 billion dollars yearly by 2020. Emerging tendencies for future utilizations of biometric engineering seem to tilt more towards jurisprudence enforcement. fatherland security. and security within certain types of private industry such as in airdrome security or finance. Many recognition card companies such as Mastercard and Visa are get downing to implement biometric hallmark methods to verify card users. Besides. the Immigration and Naturalization Service may get down implementing biometric engineerings to place illegal immigrants.

Certain types of biometric engineering which are going more widespread include entree control facial acknowledgment engineering which is used to allow merely authorised persons to come in upon certain installations. facial acknowledgment inactive surveillance engineering which is used to supervise premises in order to place possible terrorists or fishy persons. and watchful direction which includes the usage of real-time engineering in association with biometric engineering to supply security qui vives of possible security breaches. Applications which use biometric engineering will besides hold an consequence on commercialism. peculiarly in e-commerce to supply excess security for online purchases. and installing within certain personal points such as autos and cell phones.

VII. Decision

Although non that long ago. the construct of holding biometric engineering as a portion of our mainstream society may hold been seen as a science-fictional impossibleness. technological invention has grown to the point where it is going more and more of a world. Although we are non rather ready for widespread execution of this engineering. as the demand for better high-tech security additions. research every bit good as investor and consumer assurance and invention within the biometric industry is besides expected to better. Although no individual biometric system method is without defects. combinations of these assorted methods and engineerings may supply the ideal security that we hope to achieve one twenty-four hours.

Chapter III
Methodology

There was trouble in finding the existent pupils of the University of Baguio because of the hard-headed pupils who can non stay with the simple regulations and ordinances which was the reoccurring jobs of the security. Due to this job. the “mandos” and “magnas” can easy come in the school’s premises victimising a batch of pupils. This was one of the grounds why such simple misdemeanors became a immense job for the school.

Sing this affair. the group came up with an thought for a subject for their action research. Before they finalize their subject. the group went to the Office of the Student Affairs and interviewed the dean to cognize which regulations are normally violated by the pupils. After the interview. the group determined that the regulations which are normally violated are: a ) erosion of I. Ds inside the school campus ; and B ) erosion of uniforms on the designated yearss.

The group so convened and finalized their subject that would concentrate on “A proposed Biometric ID system to command the reoccurring misdemeanors by University of Baguio pupils. ” Since there was already a subject to be talked about in the research. the group started to garner informations which were relevant to the research proper like that of related surveies and researches and footings that are important to the survey. After roll uping relevant information for the research. the group prepared communicating letters addressed to the deans of the different schools of the University and respondents similarly with the study questionnaire. Upon blessing of the deans of the different schools. the group administered the questionnaires to the respondents.

The study signifiers were distributed to the 11 schools of the University holding ten ( 10 ) respondents each to see which consequences have the same per centum which were used to cognize the grounds behind these actions. After administering the study questionnaires. the group so retrieve the questionnaires and get down tabling the consequences. The tabulated information showed the grounds why the pupils violate these simple policies of the school.

The consequence of the study supported the proposal that were passed to the Board of Directors. The group so proposed the biometric ID system that will be put up in every entrywaies and issues of the edifices in the University. The biometric ID system will most probably be really dearly-won but ignoring such sum. the disposal will O.K. it and instantly ordered the said system. By the clip the systems that had been ordered arrive. the people designated by the higher Opss will set up such systems on the designated countries to do the University a safe and humanist topographic point to analyze.

Decision

In visible radiation of the findings. the undermentioned decisions are herewith presented: Not have oning of ID has been a wont of the pupils. Sometimes the instructors themselves forget to look into their pupils ID. The security guard besides are non indulgent in look intoing the IDs of these pupils. Because of this attitude most figure of the pupil no longer uses their IDs. The pupils think that it is merely all right non utilize their IDs.

The research workers are found out that the school truly necessitate a biometric ID system. Approximately. one unit of the biometric system will be more or less two hundred 50s thousand pesos. In such instance the University of Baguio can still afford this system since it does non merely assist the pupils but it can besides procure their safety

With the aid of this proposal it will decrease the load of the security forces. This proposal can besides decrease the figure of pupils go againsting the proper usage of IDs. In such state of affairs pupils can no longer utilize any ID because of the presence of finger prints. The pupils whether they like it or non would still be forced to utilize their IDs. Besides. this proposal can assist in the security of the school campus because foreigners can no longer come in because of the presence of finger prints.

Recommendation

Pulling from the decisions that the research workers arrived at. the undermentioned recommendations are forwarded. The research workers would urge the rigorous execution of the regulations and ordinances of the university and the care of the biometric ID system. In add-on. each of the Gatess should be closed. Besides. the indulgent checking on the erosion of IDs should be done. The guards should supervise every pupil come ining the university. In instance the pupils lost their IDs. we recommend that a watchword that would let them to come in would be provided by the OSA during the clip of the ID’s loss.

Bibliography
Book
* Addiction Today. Sept. 27. 2008. “Prisons Use Biometricss to Pull off Methadone. ” * Germain. Jack M. . Sept. 11. 2003. “Beyond Biometricss: New Strategies for Security. * New York Times. Nov. 15. 2008. “Technology and Media. a Rush in the Demand to utilize Biometrics. * Osborn. Alice. Aug. 17. 2005. “Future of Biometrics-Trends and Emerging Uses for Biometric Technology. * Panko. Raymond R. . Corporate Computer and Network Security. New Jersey: Prentice Hall. 2004. * Risk Management. Mar. 15. 2005. “Biometrics: The Future is Now. * Technology and Human Values Senior Seminar. 2008. “Biometrics. * Tilton. Catherine J. . Feb. 2006. “The Role of Biometrics in Enterprise Security. * Wikepedia. Nov. 13. 2008. “Biometrics. ”

ONLINE
* hypertext transfer protocol: //www. addictiontoday. org/addictiontoday/2008/09/prisons-use-bio. hypertext markup language. * hypertext transfer protocol: //www. ecommercetimes. com/story/31547. hypertext markup language? wlc=1226777438 * . hypertext transfer protocol: //query. nytimes. com/gst/fullpage. hypertext markup language? res=9F06E0DB163EF934A25751C1A9679C8B63 & A ; sec= & A ; spon= & A ; pagewanted=1 * hypertext transfer protocol: //www. video-surveillance-guide. com/future-of-biometrics. htm * hypertext transfer protocol: //www. riskmanagementmagazine. com. au/articles/FF/0C02DDFF. asp? Type=124 & A ; Category=1240 * hypertext transfer protocol: //www. dingle. com/downloads/global/power/ps1q06-20050132-Tilton-OE. pdf & gt ; . * hypertext transfer protocol: //en. wikipedia. org/wiki/Biometrics # cite_note-jain_short_article-20 & gt ; .

Leave a Reply

Your email address will not be published. Required fields are marked *