Biometric Technology Solutions to Countering Today's Terrorism

2019 ◽  
pp. 399-412
Author(s):  
Israel Fianyi ◽  
Tanveer A Zia

The purpose of this paper is to examine the relevance of biometric technologies in increasing the fight against terrorism and other related border security challenges such as identity dominance. Since the 11th September, 2001 catastrophe in USA the need for biometrics technology for identification purpose has become important. Consequently, the many ripostes that were renewed on identity management included enhanced use of biometrics to verify and authenticate travellers at various airports as well as the use of video surveillance equipped with facial recognition sensors. The growth in data and storage devices have also become a critical phenomenon in biometrics deployment, the swiftness and accuracy with which these biometrics details can be processed is a prevailing challenge. This paper provides an extensive review of literatures on prospects of biometric technologies and other interrelated technologies in the fight against terrorism. To date, there is relatively meagre academic research examining how biometric technologies enhance border security as well as individual security.

2016 ◽  
Vol 6 (4) ◽  
pp. 28-40 ◽  
Author(s):  
Israel Fianyi ◽  
Tanveer Zia

The purpose of this paper is to examine the relevance of biometric technologies in increasing the fight against terrorism and other related border security challenges such as identity dominance. Since the 11th September, 2001 catastrophe in USA the need for biometrics technology for identification purpose has become important. Consequently, the many ripostes that were renewed on identity management included enhanced use of biometrics to verify and authenticate travellers at various airports as well as the use of video surveillance equipped with facial recognition sensors. The growth in data and storage devices have also become a critical phenomenon in biometrics deployment, the swiftness and accuracy with which these biometrics details can be processed is a prevailing challenge. This paper provides an extensive review of literatures on prospects of biometric technologies and other interrelated technologies in the fight against terrorism. To date, there is relatively meagre academic research examining how biometric technologies enhance border security as well as individual security.


Author(s):  
Ian Parkman ◽  
Samuel Holloway

While most academic research has considered authenticity from the consumers perspective, this paper proposes and tests a new empirical operationalization of Beverlands (2005) widely cited proposition that firm-side authenticity is…partly true and partly rhetorical (p.1008). Our study presents a model based on the Competitive Advantage (CA) that results from congruence between the partly true aspects of the firms internal culture, resources, and capabilities measured as Innovation Capacity (IC), alongside Corporate Identity Management (CIM) as the organizations partly rhetorical outwardly-directed corporate branding and marketing promotions activities. Our findings are interpreted through a four-quadrant Rosetta Stone framework for evaluating firm-side authenticity across organizational contexts and environments describing how high-IC/high-CIM (i.e., Authentic) firms create differentiation from low-IC/low-CIM Inauthentic organizations and low-IC/high-CIM Faux Imitators competitors who attempt to compensate for their lack of IC through increased investments in CIM.


2021 ◽  
Vol 13 (2) ◽  
pp. 24
Author(s):  
Mohammed Amine Bouras ◽  
Qinghua Lu ◽  
Sahraoui Dhelim ◽  
Huansheng Ning

Identity management is a fundamental feature of Internet of Things (IoT) ecosystem, particularly for IoT data access control. However, most of the actual works adopt centralized approaches, which could lead to a single point of failure and privacy issues that are tied to the use of a trusted third parties. A consortium blockchain is an emerging technology that provides a neutral and trustable computation and storage platform that is suitable for building identity management solutions for IoT. This paper proposes a lightweight architecture and the associated protocols for consortium blockchain-based identity management to address privacy, security, and scalability issues in a centralized system for IoT. Besides, we implement a proof-of-concept prototype and evaluate our approach. We evaluate our work by measuring the latency and throughput of the transactions while using different query actions and payload sizes, and we compared it to other similar works. The results show that the approach is suitable for business adoption.


Science ◽  
2015 ◽  
Vol 347 (6217) ◽  
pp. 1246501 ◽  
Author(s):  
Francesco Bonaccorso ◽  
Luigi Colombo ◽  
Guihua Yu ◽  
Meryl Stoller ◽  
Valentina Tozzini ◽  
...  

Graphene and related two-dimensional crystals and hybrid systems showcase several key properties that can address emerging energy needs, in particular for the ever growing market of portable and wearable energy conversion and storage devices. Graphene’s flexibility, large surface area, and chemical stability, combined with its excellent electrical and thermal conductivity, make it promising as a catalyst in fuel and dye-sensitized solar cells. Chemically functionalized graphene can also improve storage and diffusion of ionic species and electric charge in batteries and supercapacitors. Two-dimensional crystals provide optoelectronic and photocatalytic properties complementing those of graphene, enabling the realization of ultrathin-film photovoltaic devices or systems for hydrogen production. Here, we review the use of graphene and related materials for energy conversion and storage, outlining the roadmap for future applications.


Sign in / Sign up

Export Citation Format

Share Document