Home > Free Essays > Tech & Engineering > Computer Security > Biometrics and Computer Security

Biometrics and Computer Security Annotated Bibliography

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Nov 2nd, 2021

The article describes that modern organizations and government bodies should pay a special attention to threats and vulnerability related to sensitive data. In this case, it is possible to distinguish two types of threats: internal and external.

Internal threats include damage of laptops and disclosure of personal information by employees. External threats are hackers and data thieves. Because the biometrics data does hold must be accurate, it is worth thinking from the outset about how managers are going to keep it that way. The article describes history of biometrics, its pros and cons. The author pays a special attention to biometric technology, fingerprinting, hand geometry, Iris and Retina Scanning and face recognition. The article is objective and is based on substantial literature review. The author supports ideas and suppositions with detailed facts and arguments related to the topic.

Bielski, L. Striving to Create a Safe Haven Online: ID Theft, Worms, Bugs, and Virtual Eavesdropping Banks Cope with Escalating Threat. ABA Banking Journal, 95 (2003), 54.

The article discusses the problems of safety and technological risks associated with data protection and hacker attacks. This starts with deciding what information to collect and how to get it. Good design of data capture forms can help; so can choosing reliable and up to date sources if an organization is not acquiring the data directly from the Data Subject. This means that government agencies must hold enough data but, importantly, not too much.

The biggest risk to security is almost always the company’s own staff. The damage they do can be deliberate—stealing information about people, such as business contacts they want to use for their own purposes, for example, or trashing the database out of frustration on being demoted. The arguments in the article are well-supported by facts and research studies conducted on this topic. A special attention is given to banking sector and possible tools used to protect privacy issues.

Casella, R. The False Allure of Security Technologies. Social Justice, 30 (2003), 82.

The article states that biometrics and other elated fields of research require huge investments and financial support in order to protect data and electric information. More often it is un-thinking or inadvertent—giving information over the telephone to someone who should not have it, leaving confidential files at home for a neighbor to see when they are working at home, or chatting in the canteen about a user’s borrowing habits where other people can overhear.

The role of the government is to control data protection and develop innovative technologies against attacks and intrusion of the third parties. “The use of security technology in public places in the form of biometrics, detectors, surveillance equipment, and advanced forms of access control are relatively recent developments” (92). The article is based on current literature review and state documents related to the problem of biometrics.

Lineberry, S. The Human Element: The Weakest Link in Information Security Journal of Accountancy 204 (2007), 44.

The article pays a special attention to such problem as “human elements” which can be a risk factor in security. Security must be seen in the context of wider organizational policies. Many aspects of security will be taken care of by, for example, the IT department or its equivalent.

However, high level security provision on its own is not enough; the systems have to work in practice. Facial recognition is an important area of concern for many state agencies. Also, the state agonies should maintain a perimeter security system. This system consists of firewalls, intrusion detection systems and anti virus measures installed on each laptop. Specific issues may arise where a Data Controller feels the need to monitor the behavior of staff or members of the public. The organization must be careful only to provide the information to the right person. This article proposes readers a unique approach to data and information security connected and depended upon human motivation and fairness.

Orr, B. Time to Start Planning for Biometric. ABA Banking Journal, 92 (2000), 54.

This article is devoted to importance of biometrics as a science and opportunities proposed by further development of face recognition technologies. This means that the state institutions should ask for information to verify their identity. State institutions may also ask for information to help GCI locate their records. State institutions might, for example, want to ask what part of organization they originally dealt with, or the approximate date they were last in contact.

A data access request is not valid until employees have received any of this information needs, but can only ask for ‘reasonable’ information. The first line of defense is therefore to ensure that staff are aware of the possibilities and operate within a culture where information, and especially personal data, is handled carefully and responsibly. This article is objective and is based on a detailed analysis and data collection methods.

Papacharissi, Z., Fernback, J., Online Privacy and Consumer Protection: An Analysis of Portal Privacy Statements. Journal of Broadcasting & Electronic Media, 49 (2005), 259.

The article proposes analysis of online privacy issues related to consumer marketing and biometrics. Principle is that precautions must be taken against ‘unauthorized’ processing. The staff must therefore not use data in any way that they are not permitted to, and they must not disclose it to anyone else who is not permitted to have it. But in order for this to make sense, someone has to do the authorizing. Unless there are clear guidelines on what is permitted, staff cannot be expected to comply.

The second Protection Principle says that all processing must be compatible’ with the purposes it was obtained for. Therefore in deciding who is authorized to see any particular type of data, it is important to think about what type of access is compatible with the purpose. The article is based on well-thought analysis and up to date information related to the filed of face recognition and biometrics. As a minimum it is usually best to get from the requesting agency in writing the legal basis on which they are asking for the information.

This annotated bibliography on Biometrics and Computer Security was written and submitted by your fellow student. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly.
Removal Request
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda.
Request the removal

Need a custom Annotated Bibliography sample written from scratch by
professional specifically for you?

801 certified writers online

Cite This paper
Select a referencing style:


IvyPanda. (2021, November 2). Biometrics and Computer Security. https://ivypanda.com/essays/biometrics-and-computer-security/


IvyPanda. (2021, November 2). Biometrics and Computer Security. Retrieved from https://ivypanda.com/essays/biometrics-and-computer-security/

Work Cited

"Biometrics and Computer Security." IvyPanda, 2 Nov. 2021, ivypanda.com/essays/biometrics-and-computer-security/.

1. IvyPanda. "Biometrics and Computer Security." November 2, 2021. https://ivypanda.com/essays/biometrics-and-computer-security/.


IvyPanda. "Biometrics and Computer Security." November 2, 2021. https://ivypanda.com/essays/biometrics-and-computer-security/.


IvyPanda. 2021. "Biometrics and Computer Security." November 2, 2021. https://ivypanda.com/essays/biometrics-and-computer-security/.


IvyPanda. (2021) 'Biometrics and Computer Security'. 2 November.

Powered by CiteTotal, free essay citation maker
More related papers