Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Biometric Identification

Disruptive and Emerging Technology Trends Across Education and the Workplace
Utilizing human behavioral and physical features for establishing identity.
Published in Chapter:
Creepy Technologies and the Privacy Issues of Invasive Technologies
Rochell R. McWhorter (The University of Texas at Tyler, USA) and Elisabeth E. Bennett (Northeastern University, USA)
DOI: 10.4018/978-1-7998-2914-0.ch010
Abstract
Technology has become increasingly invasive and corporate networks are expanding into public and private spaces to collect unprecedented data and provide new services such as artificial intelligence and through unsettling human-like personas. The term “creepy technology” is appearing in the literature along with concerns for privacy, ethical boundaries, cybersecurity, and mistaken identity but is also in news articles to inform the public about technology advances that affect consumer privacy. Invasive technology provides the impetus for external adaptation for many organizations and current trends require rapid adaption to potential threats to security. Also, usability addresses how users respond and adapt to new technology. This chapter includes the presentation of an exploratory study of how the public responded to various technology announcements (N=689 responses) and results indicated a significant response to invasive technologies and some sense of freedom to opine. This chapter also provides discussion of interventions that are critical to both public and private sectors.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Artificial Intelligence: Its Use for Creation of Value in Airports
The use of biometric signature for different purposes, such as the self check-in process or the control over staff-only entry points; an example of this type of signature system is the fingerprint scanning or face recognition.
Full Text Chapter Download: US $37.50 Add to Cart
Future Challenges of Marketing Online-to-Offline (O2O)
are body measurements and calculations related to human characteristics.
Full Text Chapter Download: US $37.50 Add to Cart
Biometric Security
Biometric features that are used to verify the identity of the individual trying to access a computer system, network, credit card account, ATM, etc.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR