Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Threshold

Encyclopedia of Information Science and Technology, Second Edition
It is the variable that defines the level of tolerance of an algorithm. It can be set to a more demanding value, raising the false-rejection rate and lowering the false-acceptance rate, or it can be set to a less demanding value, lowering the false-rejection rate and raising the false-acceptance rate.
Published in Chapter:
Keystroke Dynamics and Graphical Authentication Systems
Sérgio Tenreiro de Magalhães (University of Minho, Portugal), Henrique M.D. Santos (University of Minho, Portugal), Leonel Duarte dos Santos (University of Minho, Portugal), and Kenneth Revett (University of Westminster, UK)
DOI: 10.4018/978-1-60566-026-4.ch366
Abstract
In information systems, authentication involves, traditionally, sharing a secret with the authenticating entity and presenting it whenever a confirmation of the user’s identity is needed. In the digital era, that secret is commonly a user name and password pair and/or, sometimes, a biometric feature. Both present difficulties of different kinds once the traditional user name and password are no longer enough to protect these infrastructures, the privacy of those who use it, and the con- fidentiality of the information, having known vulnerabilities, and the second has many issues related to ethical and social implications of its use (Magalhães & Santos, 2005). Password vulnerabilities come from their misuse that, in turn, results from the fact that they need to be both easy to remember, therefore simple, and secure, therefore complex. Consequently, it is virtually impossible to come up with a good password (Wiedenbeck, Waters, Birget, Brodskiy, & Memon, 2005). On the other hand, once users realize the need for securing their authentication secrets, even fairly good passwords become a threat when the security policies (if at all existing) fail to be implemented. The results of an inquiry made by the authors in 2004 to 60 IT professionals show that, even among those that have technical knowledge, the need for password security is underestimated (Magalhães, Revett, & Santos, 2006). This is probably one of the reasons why the governments increased their investment in biometric technologies after the terrorist attack of 9/11 (International Biometric Group [IBG], 2003). The use of biometric technologies to increase the security of a system has become a widely discussed subject, but while governments and corporations are pressing for a wider integration of these technologies with common security systems (like passports or identity cards), human rights associations are concerned with the ethical and social implications of their use. This situation creates a challenge to find biometric algorithms that are less intrusive, easier to use, and more accurate. The precision of a biometric technology is measured by its false-acceptance rate (FAR), which measures the permeability of the algorithm to attacks; its false-rejection rate (FRR), which measures the resistance of the algorithm to accept a legitimate user; and its crossover error rate (CER), the point of intersection of the FAR curve with the FRR curve that indicates the level of usability of the technology (Figure 1). For a biometric technology to be usable on a stand-alone base, its CER must be under 1%. As an algorithm becomes more demanding, its FAR is lower and its FRR is higher. Usually the administrator of the system can define a threshold and decide what the average FAR and FRR of the applied algorithm will be according to the need for security, which depends on the risk evaluation and the value of what is protected; also, the threshold can be, in theory, defined by an intrusion detection system (software designed to identify situations of attack to the system).
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Theoretical Foundations of Deep Resonance Interference Network: Towards Intuitive Learning as a Wave Field Phenomenon
Full Text Chapter Download: US $37.50 Add to Cart
Using Technology to Overcome the Password's Contradiction
It’s the variable that defines the level of tolerance of an algorithm. It can be set on a more demanding value, raising the False Rejection Rate and lowering the False Acceptance Rate, or it can be set on a less demanding error, lowering the False Rejection Rate and raising the False Acceptance Rate.
Full Text Chapter Download: US $37.50 Add to Cart
Behavioral Based Technologies for Enhancement of Login/Password Systems
The variable that defines the level of tolerance of an algorithm. It can be set on a more demanding value, raising the False Rejection Rate and lowering the False Acceptance Rate, or it can be set on a less demanding error, lowering the False Rejection Rate and raising the False Acceptance Rate.
Full Text Chapter Download: US $37.50 Add to Cart
Design Elements for the Implementation of Threshold Crossing In and Out of Mixed Reality
Element of discontinuity in the space that allows to perceive the access from one area to another.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Normalizing an Off-Campus Course with Video-Conferencing
The threshold of a learning technology is the sum of obstacles slowing the adoption of a new technology. These may include a fear of the unknown, limited access to training on essential tools and follow-up support, the cost associated with the introduction of specialized technology, limited access to technological resources, the time needed to become confident and competent with the technology and its application in the classroom, and the classroom time required to introduce the technology to the students and train them to use the tools. When a technology has a low threshold the total of all of these obstacles is easily overcome.
Full Text Chapter Download: US $37.50 Add to Cart
Early Warning Tools for Financial System Distress: Current Drawbacks and Future Challenges
Critical, predefined benchmark introduced in the EWS model that delineates between issuing or non-issuing a warning signal.
Full Text Chapter Download: US $37.50 Add to Cart
Approaching the Invisible: Beyond Materialism
This negative reality is now being approached materialistically (i.e., positivised ) by the hard sciences, asking, for example, “where” does quantum reality become cosmological reality, or existential phenomenology which is now asking how something comes to be in the first place. The term is also a way of approaching the 20 th century problematic of language and reality. We can experience the threshold in the hypnogogic state, for example, when we are awake yet subject to the negative reality of dream phenomena.
Full Text Chapter Download: US $37.50 Add to Cart
Graph Based Segmentation of Digital Images
A small limiting value with in which the difference can be ignored such that the final analysis is not affected.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR