Through the theoretical adaptation of biometric technologies to people of variable abilities


Image 26: Rendering of a Exoskeleton



Download 2.12 Mb.
Page17/17
Date28.05.2018
Size2.12 Mb.
#50553
1   ...   9   10   11   12   13   14   15   16   17

Image 26: Rendering of a Exoskeleton




Source: http://www.metamotion.com/mocap/

Gypsy-motion-capture-system.jpg
Neural waves emanate from the brain in the form of brainwaves or bioelectrical impulses. To further iterate read this article called “Monkey Thoughts Control Computer” published on the BBC News website (http://news.bbc.co.uk/hi/english/sci/tech/newsid_1871000/1871803.stm). This is not the first article or paper of this type, to promote the abilities of a neural control interface. On the contrary there have been countless papers and articles released from multiple universities, colleges, and companies in an attempt to document their research. However, IBVA (www.ibva.com) is on the cutting edge, and the first website to commercialize the distribution of neural control interface devices.

Image 27: Example of Neural Interface



Source: Image is from the IBVA Technologies, Inc website (www.ibva.com)
Per question 2, 4, and 7 of Appendix 4, an average of 75.0075 percent of all those surveyed agreed to a certain extent that this technology was feasible and could be of benefit to people of variable abilities. Additionally, Appendix 4 also demonstrates that 89.78 percent would agree to be a recipient of a neural implant (question 1).

Implementation Strategies


If a biometric authentication system is properly implemented and managed effectively the cost savings benefits, related to the help desk, administration, increased convenience, productivity of users, decreased fraud, reduction of stress, and increased security can far out weigh the cost of implementation (Biocentric Solutions Inc., n.d.).

When implementing a biometric authentication system, the managers of a company must take into account many elements related to the company’s infrastructure. Some of these elements will be easily identifiable, while others may be as illusive as the fountain of youth. The easiest elements of the infrastructure to identify are those that are heavily used and would most likely have been a commercially purchased product, such as the hardware and software of the biometric authentication system itself. Whereas the illusive elements of the company’s infrastructure may be seldom used and may or may not have been commercially purchased. For example, a legacy system may have been purchased commercially, yet seldom used. We must also take into account issues related to the environment in which the system will be deployed (logical, physical or both), system integration, platform, distributed systems, biometric trait, front-end devices, front-end processing, back-end devices, back-end processing, level of security required, user education, remote access users, initial productivity losses, scalability, and exception processing (Ashbourn, 2000).

The BioNetrix Corporation (2001) has composed a paper in which it has cited reports from the Gartner Group, META Group, Network Applications Consortium (NAC), Security Industry Association, Computer Security Institute (CSI), and the Federal Bureau of Investigations (FBI). The report from the Gartner Group proclaims that it will cost from $14 to $25 for a corporate helpdesk to reset an employee’s password, further more an employee is most like to forget his/her password an average of four times in a year. When the cost of resetting a password is applied to thousands of employees it becomes astronomical is combined with notion that on the average, a user spends 12.5 hours a year logging onto just one application a day. When you multiple these by the total number of application access by a user it is easy to see the cost savings. A welcomed side effect is increased user convenience and productivity (BioNetrix Corporation, 2001). The increased security of a biometric authentication system will directly contribute to the reduction of financial losses due to fraud and security breaches. CSI reported in a survey they conducted that 50% of the 186 companies that responded claim to have 10-20 incidents per year, with an average per year cost of $142 thousand per incident (BioNetrix Corporation, 2001).

Risk Assessment Methodology (RAM)

Before implementing a biometric solution the implementer does not just need to know what benefits the solution will bring, but also what potential risks the solution will bring to their organizations. To identify potential risk many integrators (i.e. ComGuard.net, RSASecurity.com) recommend that a risk analyze be conducted. You will notice a trend. The trend is that all of the risk is associated to the acceptance of the solution by the users.

At the top of the list of risk are privacy concerns that an organization maybe inclined to distribute a user’s identity sensitive data or misuse the data for purposes other than the purpose for which it was originally intended. And, there is still the issue of the individual anonymity that is of concern. The common factor here is not necessary one of trust, but one of user control.

When choosing a biometric you must take into account concerns about hygiene, disease (i.e. SARS), and religious taboos (i.e. exposure of face) that may inhibit the use of select biometrics.

The system must be accessible to people of all ability levels as certain groups (i.e. the disabled) many not have the body needed the ability (i.e. the disabled and/or elderly) to present the biometric in order to access the system. If users do not voluntarily accept the solution, then it is doomed to collide with reality of consumer confidence.

Integration Concerns

The integration concerns are fairly simple and intuitive. Implementers should require the solution to be convenient to use, delivered and installed fast, compatible with existing infrastructure and/or network systems, interoperable with other IT security solutions, and to promote a cost savings.

Nevertheless, before biometric products can embark on widespread solution deployment, developers of biometric products must wait for representatives of dozens of companies to work out the details of a generalized biometric application-programming interface (API). This work requires the cooperation of biometric vendors, operating-system vendor, add-on security-hardware vendors, and developers of applications that must recognize the security features. Currently, in the biometric technology industry, at least four efforts are under way to develop biometric APIs (BioAPI Consortium, 2001).

Enrollment/Administration Practices

The largest purchasers of the new technologies are IT managers of medium and large companies. An important consideration of a purchase is easy of enrollment and administration. Although some devices, such as IC fingerprint sensors, may eventually cost less than $5 in quantity, the total cost of installing biometric sensing is several times the sensing unit's cost. Moreover, much of the initial crop of sensing units uses USB interfaces. As a result, biometric sensing on PCs may become cost-effective only when IT managers replace the installed base of computers with USB-compliant PCs.

The essential element to the enrollment/administration process is to establish protocol that can be easily adapted to cover any situation.

Training/Education

Currently, there exist a gap between the number of feasible biometric projects and knowledgeable experts in the field of biometric technologies. The post September 11th, 2002 attack (a.k.a. 9-11) on the World Trade Center has gave rise to the knowledge gap. Post 9-11 many government agencies has recognized the need for increased security and identification protocols of both domestic (U.S.) and international fronts.

This is however, changing as studies and curriculum associated to biometric technologies are starting to be offered at more colleges and universities. One of the most predominant universities to offer biometric curriculum is the University of California, Los Angeles (UCLA) (www.UCLA.edu). A method of closing the biometric knowledge gap is for knowledge seekers of biometric technologies to participate in biometric discussion groups and biometric standards committees.

The solutions only needs the user to possess a minimum of require user knowledge and effort. A biometric solution with minimum user knowledge and effort would be very welcomed to both the purchase and the end user. But, keep in mind that at the end of the day all that the end users care about is that their computer is functioning correctly and that the interface is friendly, for users of all ability levels.



Alternative Authentication Methods

Alternative methods of authenticating a person’s identity are not only a good practice for making biometric systems accessible to people of variable ability level. But it will also serve as a viable alternative method of dealing with authentication and enrollment errors.



Auditing

Auditing processes and procedures on a regular basis during and after installation is an excellent method of ensuring that the solution is functioning within normal parameters.



Accountability

A well-orchestrated biometric authentication solution should not only prevent and detect an impostor in instantaneous, but it should also keep a secure log of the transaction activities for prosecution of impostors. This is especially important, because a great deal of ID theft and fraud involves employees and a secure log of the transaction activities will provide the means for prosecution or quick resolution of altercations.

Above is one meaning of accountability. The other meaning of accountability is to ensure that guidelines are well documented for an oversight committee.

Oversight

Oversight refers to a method of ensuring that all aspects relative to auditing and accountability have been correctly enforced. Those with responsibility of overseeing that accountability guidelines and protocols have not been violated.



Summary, Recommendations and Conclusions


Chapter 5
It is the general conclusion of the researcher that the adaptation of biometric technologies to people of variable abilities would absolutely feasible. The following will aid to reinforce the researchers theory and conclusions. Additionally, the chart of Appendix 5 also demonstrates that 83.95 percent overall would agree to that the adaptation of biometrics is feasible.

Mainstream Biometric Technology Summary


Passwords and PINs can be hacked, shared, or guessed; and secure tokens can be lost (Corcoran, Sims, & Hillhouse, 1999). It is therefore not uncommon for employees of large companies to have numerous, long, and unbelievably complicated passwords to remember. Many times the passwords are so ambiguous that the employees become stressed and the passwords are easily forgotten. To add to the frustration, an employee must then contact the helpdesk or network administrator to have the encrypted password reset or changed (Quintanilla, 2000).

While some biometrics may be technical sound in theory, they may not be sound in application. For instance the use of a footprint biometric is not practical, image having to take of your shoes off in a restaurant to pay for dinner or at an ATM machine to conduct a financial transaction.


Emerging Biometric Technology Summary


Biometrics is an emerging and ever changing field of technology that can be implemented into just about anything that requires a security protocol. While the initial cost of implementation is high the benefits of increased security, peace of mind, lessening of man-hours, and of course the increase of accessibility by people of variable abilities may justify the cost.

Indeed, the reliance on the latest technology may make a company even more vulnerable by creating the illusion of security. This is why governmental agencies and commercial companies must remain eternally vigilant and continually seek out the most up-to-date method of securing the technological assets of an enterprise. But, let us not forget that as we seek to secure, hackers seek to invade.


Summary of Cultural Barriers


In order for employers to capitalize on the ability differences of employees with disabilities in the workforce they have sought out solutions from many sources. Some of the solutions are complex and other are simple, they may require a shift in the workplace paradigm, the use of assistive technologies, the development of management strategies, or a change in work location philosophies. The overwhelming justification is that it is the most beneficial, ethical and humane thing to do Hagner & DiLeo (1993).

The work of authors such as Szymanski and Parker (1996) have alluded to the fact that before people with disabilities could not be fully integrated into the workplace until the culture of the workplace becomes more welcoming. This is because the medical model did not perceive people with disabilities as potential workforce asset. Hence, not much emphasize had been placed on resolving the workplace barriers. The shift of paradigms from that of the medical model to the disability model has fostered a change in the perceptions of society and the workplace culture. Additionally, the National Council on Disability believes that the only way to shift the culture is to establish legislation (NCD, 2001). Still Hagner and DiLeo (1993) advocate a middle ground approach.

Workplace strategies can vary from company to company and can potentially consist of thousands of concepts or notions. The basic objective of workplace strategies as applied to employees of variable abilities is to promote productivity (Hagner & DiLeo, 1993). There are many strategies available to ponder from many sources (Hagner & DiLeo, 1993; Heldrick, 1999; Szymanski & Parker, 1996; United States Department of Labor, Office of Disability Employment Policy [USDOL/ODEP], 2002; USDOL, 2002; NCD, 2001). Hagner and DiLeo (1993) have suggested a few strategies that managers can implement or modified to make the workplace culture more positive, nurturing, and accommodating to people with disabilities or new employees. Managers could reexamine or modify their leadership style to include, but not limited to their tone of interaction, vary gathering (meeting) places, celebrate special events, educate the staff on disability, form a disability support group, keep in touch with employees, create pride by reinforcing the company image, and standardize required task (USDOL/ODEP, 2002). A required task could be as simple as standardizing the location of a stapler for the vision impaired or as complicated as the standardization of a password authentication system (Hagner & DiLeo, 1993).

Effective planning strategies for diverse employees with disabilities may consist of a detailed strategic business plan for the near and distant future. The plan must be accurate, timely, easy to find, identify information sources, communicate with other employees who do similar work, talk to the employee, examine job descriptions, or call the Job Accommodation Network at 800-JAN-7234 (USDOJ, 2002). Plans are frequently threatened with obsolescence of technology changes and economic turbulence before the ink on the paper is even dries. The reality is that even the best-laid business plan may still go astray, especially as managers try to predict a company's technology requirements, staffing needs, and work processes (Szymanski & Parker, 1996).

Nonetheless, a good business plan can effectively communicate the company’s vision, provide direction, establish time management procedures and facilitate methods of control to all employees, whether disabled or not.
For additional examples, the Workforce Investment Act of 1998 refers to strategies, as principles of which there are seven (Heldrick, 1999). From the seven principles, there are only two that apply to diverse employees with disabilities (p. 6):


  • Services must be streamlined, by coordinating multiple employment and training programs, must be accessible to people with disabilities.

  • The system should empower individuals with the information and resources they need to manage their own careers.

Assistive Technology Summary


There are many types of assistive technologies available for many types of disabilities. Flippo, Inge, & Barcus (1995) have authored a book that details the many different types of assistive technologies available to employers and people with disabilities. Unfortunately, as demonstrated by the results of question 2 of Appendix 6 only ten of the thirty-five one-on-one interview participants had knowledge of assistive technologies.

Hence, Flippo, Inge, & Barcus (1995) have outline adaptation strategies for the workplace, such as career planning, education, redesign, mobility assistance, universal design of low-tech and high-tech devices, to name a few. The use or deployment of assistive technologies is not just a feasible resolution strategy. It may be also allow the employer to remain in compliance with rehabilitation and assistive technology legislation of the past century. For example the Vocational Rehabilitation Act of 1918, Americans with Disabilities Act of 1990 (ADA), to include the 2002 amendment of Section 508 to the ADA (USDOJ, 2002). The assistive technologies of today can help people with visual impairments or blindness, hearing impairments or deafness, mobility impairment or paralyze, or a combination of multiple impairments at varying levels of severity (Flippo, Inge, & Barcus, 1995).

It has been recommended via the United States Department of Labor website that managers become familiar with the various type of assistive technologies that are available for people with disabilities. Here is a brief list of possible assistive technologies (USDOL, 2002):


  • Vision (sight) – screen readers, speech synthesizers, Braille systems, scanner systems, TeleBraille, and large format displays.

  • Hearing/speech – visual redundancy systems, telecommunication device for the deaf (TDD), speech amplification device, telephone signaling device, and caption systems.

  • Mobility – keyboard macros, sequential keystroke input, alternative keyboards, infrared pointing device, and a speech recognition system.

Telecommuting, which is sometimes referred to as teleworking, can be a highly effective and extremely flexible solution for employees of all ability levels. For those employees who cannot easily make it into the traditional workplace because of physical disabilities, as telecommuting eliminates the need to commute and may be the only viable alternative (Joice, n.d.). As stated in a report from the United States Department of Labor (2002, July 26), “telecommuting can be useful in solving business problems by decreasing certain overhead costs, satisfying fluctuating demands for additional office and parking space, and increasing employees’ loyalty, productivity, and retention by helping them balance work and family demands” (p. 43).

Universal Design Summary


Universal design of biometric technologies will do for the biometric industry what the Universal Serial Bus (USB) has done for the computer industry. Accordingly, to successful accomplish universal design of biometric technologies developers must also consider factors related to but not limited to economics, engineering capabilities, cultural stigmas, politics, age, gender, market, environmental issues and abilities.

Recommendation for Universal Standards


To foster universal standards the principles and guidelines located on The Center for Universal Design website (http://www.design.ncsu.edu/ cud/univ_design/princ_overview.htm) are excellent and should be adapted to overcome the barriers of logical and physical realms.

To further demonstrate the need for a universal standard, let's say that a government issued universal biometric identification (UBID) contactless smart card is issued to the public. The UBID would ultimately become the standard means of proving your identity, when using an ATM, purchasing goods, buying services, and gaining access to facilities. Furthermore, the CBEFF would comply with legal statues/laws throughout the international communities (i.e. sections 504 & 508 of the ADA). 

If the ALF were not established as a universal international standard, then the adaptation of biometrics as a fused solution to people of variable abilities will not be possible.

Recommendations for Adaptation of Biometrics


Implementing a biometric authentication system is a very efficacious method of galvanizing the technological assets and data against the fanatical onslaught of internal and external threats. When implementing a biometric authentication system enterprises must be ecologically aware that as the required level of authentication increases, so does the cost. In short too much security can be just as hazardous as too little security, choose the right biometric to accomplish the task and avoid overkill.

While many of those in the biometric industry would take exception to the forthcoming statements, the evidence nevertheless supports it.



  • The strategy for deploying a biometric authentication system should almost always be deployed with a one-to-one or one-to-a-few matching methodology in mind.

  • Biometric manufactures should make every attempt to address concerns and/or issues related to cultural diversity, hygiene, privacy, usability, and of course accessibility.

Recommendations for Storage Methodologies


All things considered (evidence), the only storage method (platform) that would even remotely embody the elements of security, accessibility, and privacy would be the smart card. While it is true that biometric templates can be deployed on all storage platforms, the smart card would have the best chance of been accepted by all parties of advocates and opponent.

The only exception to this would be use of centralized criminal database in high treat areas, such as ports-of-entry. However, deploying such a database would meet resistance by the ACLU and other privacy organizations. To counter such resistance the purpose of the database must clearly established and a legal strategy to ensure that database is not misused by official must be established to police the police. Additionally, TTP should never be allowed to store biometric templates of any form. A TTP only need to verify the authenticity of the card to ensure that tampering has not occurred.


Recommendations for Fused Biometric Solutions


Although there are twelve available hexadecimal digits available for use from the Payload Field, it is the assumption of the researcher that only two hexadecimal digits from the Payload Field would be required to identify an individual’s ability limitations and/or access requirements and two hexadecimal digits from the Challenge-Response Field to determine which biometric out of the biometrics available to the individual would have priority. What's more, given that the recommendation calls for the ALF to be incorporated into the CBEFF it would therefore automatically be part of the biometric template.

Additionally, I would recommend that a two-stage interface process be adopted. What is meant by a two-stage interface process? Stage one is that the individual’s access requirements are established by the logical or physical barrier that user is attempting access. Stage two is that the proper biometric authentication challenge or response is presented to the person requesting access.



For example, if a vision impaired individual were attempting to gain access to a public facility. He or she would approach the entrance of the facility where a series of strategically placed proximity sensor would acquire the Accessibility Level Field (ALF). If at this point authentication would not be required, hence the doors would automatically open and the individual may be presented with an audible greeting (i.e. Welcome to the public court house). This would be the completion of stage one. To continue with the scenario, as the individual transverses through the facility he or she may come upon an entry point where authentication of a persons identity is required. At this point stage-one will be repeated whereas the Accessibility Level Field (ALF) would be acquired. In stage-two the Challenge-Response Field will trigger the appropriate biometric application. For this scenario a vision impaired individual could be issued an audible challenge and the user could then reply in the same fashion (voice verification biometric). There are many more scenarios and a multitude of other biometric applications.

Chart 5: Fused Biometric Solution Decision Flow Chart



Conclusions


Presently, policies and/or concepts such as the concept of workplace accommodations, assistive technology concept, organizational concept of culture, and the concept of establishing solid management functions are not well defined within the structure of companies. In fact policies and/or concepts are for the most part dictated to society by federal and state laws or regulations (Barnartt & Altman, 2001; Hagner & DiLeo, 1993; Swanson & Fouad, 1999; Szymanski & Parker, 1996).

The fused solution combines the benefits of biometrics, ALF, other versatile technologies, and implementation strategies will result in a secure, accessible, and privacy promoting solution that can be applied to people of all ability levels. The fused solution is a universal key that can open physical doors, provides logical security to data, and keep others out. It is a key that can be customized to an individual’s access needs or it can be used to invoke a customized profile to aid physically challenged individuals. The fused biometric solution must be implemented whenever and wherever possible.

I would like to close with a quote from Microsoft’s Bill Gates’ in PC WEEK Online October 8, 1997 stated, “Biometric technologies – those that use human characteristics such as fingerprint, voice and face recognition – will be the most important IT innovations of the next several years”.

References



Accenture. (2001, November 16). White paper: Radio Frequency

Identification (RFID). Retrieved December 3, 2002 from http://

www.accenture.com/xdoc/en/services/technology/vision/

RFIDWhitePaperNov01.pdf

American Association of Motor Vehicle Administrators (AAMVA).



(2000, June 30). AAMVA national standard for the driver license/

identification card. Retrieved December 3, 2002 from http://www. aamva.org/Documents/stdAAMVADLIDStandrd000630.pdf

Architectural and Transportation Barriers Compliance Board. (2002,



December 21). Electronic and Information Technology Accessibility

Standards. Retrieved December 20, 2002 from http://www.access-

board.gov/sec508/508standards.htm



Ashbourn, J. (2000). Biometrics: Advanced identity verification.

London: Springer-Verlag London Limited.



Barnartt, S. N., & Altman, B. M. (Eds.). (2001). Exploring theories and

expanding methodologies: Where we are and where we need to go.

London: Elsevier Science Ltd.



BioAPI Consortium. (2001, March 16). BioAPI specification version 1.1.

Retrieved July 19, 2002 from http://www.bioapi.org/bioapi1.1.pdf



Biocentric Solutions Inc. (n.d.). White paper: Why use a biometric and a

card in the same device?. Retrieved July 3, 2002, from http://www.

biocentricsolutions.com/media/whitepaper.pdf



BioControl Systems, http://www.biocontrol.com (October 10, 2001)

Biometrics ID issued to 4 million military. Washington Post

Online, October 29, 2001. http://www.washintonpost.com/wp.srv/

aponline/20011029/aponline173744_000.htm (November 5,2001).

Biometric Consortium. http://biometrics.org



BioNetrix Corporation. (2001, June 18). BioNetrix authentication suite:

Cost justification for implementing an enterprise-wide authentication

management infrastructure. Retrieved July 3, 2002, from http://

www.bionetrix.com

British Broadcasting Corporation (BBC) News. (2000, November 15).

Monkey brain operates machine. Retrieved March 14, 2002 from

http://news.bbc.co.uk/hi/english/sci/tech/newsid_1025000/

1025471.stm

Carreira-Perpinan, M., & Sanchez-Calle, A. (1995): A connectionist approach to using outer ear images for human recognition and Identification. The

University of Sheffield Website: http://www.dcs.shef.ac.uk/~miguel/papers/

ps/ear-abstract.pdf

Center for Applied Special Technology, Inc., http://www.cast.org

Charness, N., Parks, D., & Sabel, B. (Eds.). (2001). Communication,

technology and aging: Opportunities and challenges for the future.

New York: Springer Publishing Company, Inc.



Corcoran, D., Sims, D., & Hillhouse, B. (1999, March 1). Smart cards

and biometrics: Your key to PKI. Linux Journal. Retrieved July 3,

2002 from http://www.linuxjournal.com/article.php?sid=3013



Corum, C. (2002, December 1). Why RFID is the right choice for

personal ID. ContactlessNews. Retrieved December 3, 2002, from

http://www.contactlessnews.com

Daugman, J. (n.d.). Iris Recognition. The International Center for Disability

Resources on the Internet (ICDRI). Retrieved December 12, 2002, from

http://www.icdri.org/biometrics/iris_biometrics.htm

EEG Spectrum, http://www.eegspectrum.com (November 21, 2001)



Everett, D. (n.d.). Smart card technology: Introduction to smart cards.

Smart Card News Ltd. Retrieved January 1, 2003 from http://www.

smartcard.co.uk/resources/articles/intro2sc.html

Flippo, K. F., Inge, K. J., & Barcus, M. (1995). Assistive technology: A

resource for school, work, and community. Baltimore: Paul H.

Brooks Publishing Co.

Georgia Tech Research Institute (GTRI). http://www.gtri.gatech.edu

Gill, J.M. (2003). eEurope smart card Trailblazer 8 on user

requirements: User requirements for cardholder identification,

authentication and digital signatures. Retrieved February 3, 2003

from Royal National Institute for the Blind. http://www.tiresias.org/

reports/user_requirementsv2-2.htm

Gill, J.M. (2002). Design of smart card systems to meet the needs of

disabled and elderly persons. Retrieved January 3, 2003 from Royal

National Institute for the Blind. http://www.tiresias.org/reports/

ecart.htm

Gill, J.M. (1994) (Ed.). Proceedings of the COST 219 seminar on smart

cards and disabilities. Retrieved January 3, 2003 from Royal

National Institute for the Blind. http://www.stakes.fi/cost219/

smartc94.doc

Gill, J.M. (2002). Smart cards: Interfaces for people with disabilities.

Retrieved January 3, 2003 from Royal National Institute for the

Blind. http://www.tiresias.org/reports/urcai.htm

Gindin, S. E. (1997). Lost and found in cyberspace: Informational

privacy in the age of the Internet. Retrieved August 28, 2002 from

http://www.info-law.com/lost.html



Greene, J., & Caracelli, V. (1997). (Eds.). Advances in mixed-method

evaluation: The challenges and benefits of integrating diverse

paradigms. New Directions for Program Evaluation, No. 74, San

Francisco: Jossey-Bass.

Greene, J., Caracelli, V., & Graham, W. (1989). Toward a conceptual

framework for mixed-method evaluation design. Educational

Evaluation and Policy Analysis, 11(3), pp. 255-74.

Hagner, D. C., & DiLeo, D. (1993). Working together: Workplace

culture, supported employment, and persons with disabilities.

Cambridge, MA: Brookline Books.



Heldrick, J. J. (1999). The Workforce Investment Act of 1998: A primer

for people with disabilities. Retrieved September 12, 2002, from

University of Iowa Website: http://www.its.uiowa.edu/law/lhpdc/

rrtc/workforce.html

Huff, C. (n.d.). An escort memory system case study: RFID in the textile

industry. Retrieved January 12, 2003, from The Association for Automatic

Identification and Data Capture Technologies (AIM) Global website:

http://www.aimglobal.org/technologies/rfid/casestudy/MaldenMillsEMS.pdf

IBVA Technologies, Inc. http://www.ibva.com. (April 21, 2002)

INCLUsion of Disabled and Elderly people in telematics (INCLUDE).



(n.d.). SATURN Case Study. Retrieved January 3, 2003 from

http://www.stakes.fi/include/cases.html

Individuals with Disabilities: Enabling Advocacy Link (IDEAL). (n.d.).

Statistics on disabilities. Retrieved February 5, 2003 from

http://www.attideal.org/Statistics.asp

International Biometric Group LLC: BioPrivacy Initiative.

http://www.bioprivacy.org

International Center for Disability Resources on the Internet (ICDRI).

http://www.icdri.org

International Journal of Biometrics. http://www.optel.com.pl/avanti/avanti.htm

Jacobs, S. (2002, November 22). Business benefits of access-for-all



design. Retrieved November 27, 2002, from http://www.

biometricgroup.com/a_press/office/office.htm



Joice, W. (n.d.). Federal telework topics. United States General Services

Administration. Retrieved September 14, 2002, from

http://www.gsa.gov/attachments/GSA_PUBLICATIONS/extpub/

DOL_Paper_Final.doc

JUSTNET. Justice Technology Information Network.

http://www.nlectc.org/justnet.html



LaPlant, W.P. (n.d.). Disability Statistics & Policy in the United States of

America and the World. Retrieved January 3, 2003 from

http://www.icdri.org/Statistics/mainstats.htm



Nanavati, S., Thieme, M., & Nanavati, R. (2002). Biometrics: Identity

verification in a networked world. New York: John Wiley & Sons,

Inc.


National Council on Disability. (2001, June 21). The accessible future.

Retrieved September 12, 2002, from http://www.ncd.gov/

newsroom/publications/accessiblefuture.html

National Institute of Standards and Technology, Information Technology

Laboratory (NIST-ITL). http://www.itl.nist.gov/div895/biometrics/

standards.html

National Institute of Standards and Technology (NIST). (n.d.). Common

Biometric Exchange File Format (CBEFF) Website. Retrieved July 23,

2002, from http://www.itl.nist.gov/div895/isis/bc/cbeff

National Organization on Disability (NOD). http://www.nod.org

(November 20, 2001)



National Security Agency (NSA). (2002, September). Information

Assurance Technical Framework (IATF). Retrieved December 15,

2002 from http://www.iatf.net



O’Brien, D. (2003, May 5). Scanning for security: Biometrics: Fraud, terror

attacks and privacy laws have many seeking more foolproof ways to

identify people. The Baltimore Sun. Retrieved May 5, 2003 from

http://www.sunspot.net/news/printedition/bal-te.biometrics05may05,0,

7980825.story?coll=bal%2Dpe%2Dasection

Office of Homeland Security. (2002, July). National strategy for

homeland security. Retrieved July 17, 2002 from http://www.

whitehouse.gov/homeland/book/nat_strat_hls.pdf

O’Hanlon, M., Orszag, P., Daalder, I., Destler, I., Gunter, D., Litan, R.,

& Steinberg, J. (2002). Protecting the American homeland: A

preliminary analysis. Washington, D.C.: Brookings Institution Press.

Retrieved May 5, 2002 from http://www.brook.edu/dybdocroot/fp/

projects/homeland/fullhomeland.pdf

PosID, Inc., http://www.posidinc.com.



Quintanilla, F. (2000, July 5). Fingerprint as password: Your fingerprint

could be your one password for life. Retrieved July 3, 2002 from

http://www.biometricgroup.com/a_press/office/office.htm

Radio Frequency Identification (RFID) Journal.

http://www.rfidjournal.com



Richter, C. (1999, September 13). RFID: An educational primer.

Retrieved December 12, 2002, from Intermec Technologies

Corporation website: http://epsfiles.intermec.com/eps_files/eps_wp/

rfid_wp.pdf



Schaie, K., & Schooler, C. (Eds.). (1998). Impact of work on older

adults. New York: Springer Publishing Company, Inc.

Smart Card Alliance. http://www.smartcardalliance.org.



Stapleton, J. (2001). Biometrics. PKI Forum. Retrieved January 6,

2003, from http://www.pkiforum.org/pdfs/biometricsweb.pdf



Swanson, J. L., & Fouad, N. A. (1999). Career theory and practice:

Learning Through case studies. Thousand Oaks, CA: Sage

Publications.



Szymanski, E. M., & Parker, R. M. (Eds.). (1996). Work and disability:

Issues and strategies in career development and job placement.

Austin, TX: Pro-Ed, Inc.



The Biometric Foundation. (n.d.). Why Biometrics? Retrieved January

10, 2003 from http://www.biometricfoundation.org/

whybiometrics.htm

Thieme, M. (n.d.). Biometric usage on a privacy continuum. International

Biometric Group LLC. Retrieved January 10, 2003 from

http://www.bioprivacy.org/continuum.htm

Thieme, M. (n.d.). Privacy concerns and biometric technologies.

International Biometric Group LLC. Retrieved January 10, 2003 from

http://www.bioprivacy.org/privacy_fears.htm

Toren, P. J. (2003, March 20). From the mind of a hacker. New York Law

Journal. Retrieved March 20, 2003 from http://www.law.com/jsp/article.jsp?

id=1046833592378

TRACE Center. http://www.trace.wisc.edu. (December 6, 2002)

United States Department of Justice, Civil Rights Division, Disability



Rights Section. http://www.usdoj.gov/crt/ada/adahom1.htm.

United States Department of Justice, Civil Rights Division. (1998).

Workforce Investment Act of 1998 (WIA). Retrieved September 24,

2002 from http://www.usdoj.gov/crt/508/508law.html

United States Department of Labor. (2002, July 26). People with

disabilities: Strengthening the 21st Century workforce. Retrieved

September 23, 2002 from http://www.dol.gov/sec/programs/

ptfead/2002rpt/ 2002_PTFEAD_Report.pdf

United States Department of Labor, Office of Disability Employment



Policy. (2002). New freedom initiative 2002: Independence through

employment. Retrieved September 24, 2002, from http://www.dol.

gov/odep/pubs/nfi02/finalnfi_71802.pdf



Van Impe, M. (2002, September 5). New Voice Biometric Security for mobile

phones. Mobile CommerceNet. Retrieved January 10, 2003, from

http://www.mobile.commerce.net/print.php?story_id=2129

Voice Security Systems. http://www.voice-security.com/flash/index.html.

(November 3, 2002)



Walder, B. (1997). Smart cards: The use of “intelligent plastic” for

access control. Bedford, England: NSS Group Network House.

Westin, A. (2002). Public attitudes toward the uses of biometric

Identification technologies by government and the private sector:

Summary of survey findings. Opinion Research Corporation (ORC)

International. Retrieved January 9, 2003 from http://www.search.

org/policy/bio_conf/Biometricsurveyfindings.pdf

Wilkie, D. (2003, May 17). White House may put less value on seniors,

disabled. Copley News Service: Union-Tribune Publishing Co. Retrieved

May 17, 2003, from http://www.signonsandiego.com/news/uniontrib/sat/



news/news_1n17value.html
Winter, C. (2000, October 29).
Biometrics: Safeguard or invasion of

privacy. Sun-Sentinel. Retrieved July 3, 2002, from http://www.

biometricgroup.com/a_press/SunSentinelarticle_Oct2000.htm



Woodlands Online. (n.d.). Biometric emerges as a solution for security.

Retrieved July 3, 2002, from http://www.biometricgroup.com/

a_press/woodland.htm

Woodward, J., Orlans, N., & Higgins, P. (2003). Biometrics: Identity

assurance in the information age. Berkeley, CA: McGraw-

Hill/Osborne



Yin, R. K. (1994). Case study research: Design and methods (Applied

social research methods (Vol. 5, 2nd ed.). Beverly Hills, CA: SAGE

Publications, Inc.

Zunkel, R. (1998). Hand geometry based authentication in biometrics:

Personal identification in networked society. New York: Kluwer Academic

Publishers.




APPENDICIES


Appendix 1

To Be Or Not To Be? (Survey Introduction)



Introduction

On November 26th, 2001 my wife and I had our paper “Let Me In!!!” published on the to ICDRI website. The paper drew much interest and is due to be republished at www.nextinterface.net. It also promoted many questions and inquires, about feasibility and mostly about the security of personal data.
Feasibility

Let us first address the issue of feasibility, which is the easiest to address. Refer to an article called “Monkey Thoughts Control Computer” published by the BBC News (http://news.bbc.co.uk/hi/english/sci/tech/newsid_1871000/1871803.stm). This is not the first article of this type, but I believe it to be the most significant. Because, this prototype demonstrates the potential to be universal and useable by the majority of the disabled people. Why? Well it stands to reason that if a monkey can be trained to use the device, then training a human would imply orders of magnitude with respect to ease. Yes, we can use biology’s logic of self-preservation to merge the electronic and biological worlds. In the opinion of Dr. Lawson the neural-interface evolution of man and machine will come in a three-phases. The first will be oriented towards control of appliances (i.e. primarily the Internet), the second will be mobility (i.e. automobiles, exoskeleton, etc.), and the third will be bionic systems (i.e. cyborg).


However, we would like to point out that there are primarily two schools of thought about how to deploy a neural interface device. One is that it must be directly implanted in the brain and the other is that brain waves can be sensed via an external device worn on the head much like headset can be worn. There are real factors to consider and many thresholds to cross.

Appendix 1 (Continued)

To Be Or Not To Be? (Survey Introduction)

Privacy

The questions and concerns on this issue were fierce. As with any new technology issue privacy or misuse of information comes to the forefront. Well the questions and concerns are justified; in fact the people of the world are vulnerable. Yes, vulnerable to many forms of misuse, such as the snooping eyes of Big Brother or identity theft. Which leads to a host of many of crimes; for example, financial fraud, passport theft, and more than we can conceive.


However, Biometrics itself was designed as a method to ensure that sensitive information is protected. It is my belief that only biometric that is feasible for use with a neural control interface and that is a Neural (EEG) Fingerprint. But the question is does it exist? I believe it does.
Why a biometric? Keep in mind that a neural control interface is wireless and it allow an individual to control remote devices. So access is not an issue when that ability is limited to one are two individuals. But, keep in mind that technology transfer is real and this technology can also work for people whom are not disabled. Therefore, security is needed… How do you address such a security issue? I’ll say it again a Neural Fingerprint, before accessing a device remote or otherwise your Neural Fingerprint is compared those whom do have access.
Let’s use and everyday task as an example, you have and neural implant and you want to call for an elevator. You approach the elevator and user your neural implant to call for the elevator, the elevator comes down and you get on. O.K. you’re rich and so you live in the penthouse, once again you use your neural implant to select the penthouse, then you unlock your door.
Appendix 1 (Continued)

To Be Or Not To Be? (Survey Introduction)

Great, home sweet home, where is that butler? Now a criminal with a neural implant calls for the elevator, goes to the penthouse, and unlocks your door.


If we used a biometric his access would have been restricted, for example he could have never even called for the elevator, been restricted from the penthouse, and security could have been notified.
We are not saying that biometrics is the answer, just one tool. It is not the supreme Maginot Line.
Survey

We are Americans and in many cases we find ourselves forgetting that the issue of privacy is global, not just something in America. In many cases Americans refer to the Bill of Rights or the Constitution, well if you are not an American you may have no idea what they are. Therefore, I respectfully ask that members of the international community take a moment to complete a survey and please feel free to send additional comments to icdri@icdri.org.


Link to Survey:

http://www.icdri.org/biometrics/survey_biometric.htm
Ultimately whether technology is to be or not be, is up to the people of the world.

Copyright © William J. Lawson 2002

Copyright © 1998, 1999, 2000, 2001, 2002 International Center for Disability Resources on the Internet


Appendix 2

Online Survey:

Use of Biometrics and Neural Implants

Below is a survey on Neural Implants. There are no cookies on this site and ICDRI does not in any way track individual users. If you wish to fill this survey out, it would be greatly appreciated. Please feel free to send any comments to icdri@icdri.org. We thank you in advance for filling out the survey and helping us to understand these issues better.



Please use the below guide to rank your responses.

They appear in the field of the drop down box as listed below:


1 = Strongly Disagree
2 = Somewhat Disagree
3 = Don't Care
4 = Somewhat Agree
5 = Strongly Agree
6 = It Depends on the Circumstances (Unsure)
Please select the answer that most nearly expresses your response to the question.  Each question has a combo box from which you can select one of the six choices above.  
Please note, choice number six has been added to account for circumstances that you might feel would warrant a neural implant when you might not normally agree to this. 

1. If you were physically disabled, would you agree to be a recipient of a neural implant?


2. It is our opinion that a Biometric Access and Neural Control solution can benefit everyone, disabled or otherwise. Do you agree?



Appendix 2 (Continued)

Online Survey:

Use of Biometrics and Neural Implants




3. Would you be concern that the information provided to the hospital, doctors, insurance companies, or government might be misused?


4. Do you agree with the paper?  


5. Do you agree with the theory that an EEG or Neural Fingerprint exists? 


6. If such a solution was available, do you think insurance companies should pay for the procedure? 


7. Based on the two schools of thought from the survey paper. Would you still agree to have neural interface directly implanted in your brain? 









Copyright © William J. Lawson 2002



Copyright © 1998, 1999, 2000, 2001, 2002 International Center for Disability Resources on the Internet


Appendix 3

Sampling of Typical One-on-One Interview Questions





  1. Do you manage challenged employees?

  2. Do you know what assistive technologies are?

  3. Do you know what biometric technologies are?

  4. As a manager, what would you consider to be the greatest barrier for employees of variable abilities?

  5. Do you feel that challenged employees are as capable as non-challenged employees?

  6. In your opinion do challenged employees miss more or less work, then their non-challenged counterparts?

  7. Have you heard of the Americans with Disability Act?

  8. Are you familiar with Section 504 and/or 508 of the ADA?

  9. Do you feel that the interfaces used by your company are accessible to everyone?

10. Do you feel that biometric technologies could assist to breakdown barriers?

Appendix 4


Final Result Matrix:

Online Survey - Per Question Breakdown
Legend:

TNS = Total Number Surveyed

SD = Strongly Disagree
SWD = Somewhat Disagree
DC = Don't Care
SWA = Somewhat Agree
SA = Strongly Agree
UNK = It Depends on the Circumstances




Question # 1

Answer:

#

%

If you were physically disabled, would you agree to be a recipient of a neural implant?

SD

1

0.73

SWD

2

1.46

DC

1

0.73

SWA

20

14.60

SA

103

75.18

UNK

10

7.30

TNS

137

100




Question # 2

Answer:

#

%

It is our opinion that a Biometric Access and Neural Control solution can benefit everyone, disabled or otherwise. Do you agree?

SD

2

1.46

SWD

11

8.03

DC

3

2.19

SWA

33

24.09

SA

85

62.04

UNK

3

2.19

TNS

137

100




Question # 3

Answer:

#

%

Would you be concern that the information provided to the hospital, doctors, insurance companies, or government might be misused?

SD

2

1.46

SWD

7

5.11

DC

6

4.38

SWA

97

70.80

SA

22

16.06

UNK

3

2.19

TNS

137

100



Appendix 4 (Continued)

Final Result Matrix:

Online Survey - Per Question Breakdown


Question # 4

Answer:

#

%

Do you agree with the paper?

SD

1

0.73

SWD

1

0.73

DC

5

3.65

SWA

73

53.28

SA

52

37.96

UNK

5

3.65

TNS

137

100




Question # 5

Answer:

#

%

Do you agree with the theory that an EEG or Neural Fingerprint exists?

SD

3

2.19

SWD

2

1.46

DC

5

3.65

SWA

43

31.39

SA

69

50.36

UNK

15

10.95

TNS

137

100




Question # 6

Answer:

#

%

If such a solution was available, do you think insurance companies should pay for the procedure?

SD

1

0.73

SWD

2

1.46

DC

1

0.73

SWA

23

16.79

SA

99

72.26

UNK

11

8.03

TNS

137

100




Question # 7

Answer:

#

%

Based on the two schools of thought from the survey paper. Would you still agree to have neural interface directly implanted in your brain?

SD

13

9.49

SWD

8

5.84

DC

2

1.46

SWA

35

25.55

SA

51

37.23

UNK

28

20.44

TNS

137

100.01




Appendix 5

Fused Results:

Online Survey – by Agreement Levels

The follow chart was produced by totaling the responses of all (137) online survey participants via their agreement levels.


SD = Strongly Disagree
SWD = Somewhat Disagree
DC = Don't Care
SWA = Somewhat Agree
SA = Strongly Agree
UNK = It Depends on the Circumstances







Appendix 6

Aggregated Results of

One-on-One Interview Questions


The data was derived by aggregating the open-ended responses of all (35) interviewees.



  1. Do you manage challenged employees?

Results: 24 out of 35 have managed challenged employees at some point during their career. 10 out of 35 have never managed challenged employees, but had received instruction on managing challenged employees. 1 out of 35 has done neither.

  1. Do you know what assistive technologies are?

Results: 10 out of the 35 have knowledge of assistive technologies. 25 out of 35 had no practical knowledge of assistive technologies.

  1. Do you know what biometric technologies are?

Results: 6 out of 35 were familiar with biometrics. The other 29 confused biometrics with biotechnology.

  1. As a manager, what would you consider to be the greatest barrier for employees of variable abilities?

Results: 20 out of the 35 believe that cultural stereotyping by co-workers was the greatest barrier. 5 out of the 35 believed that accessible interfaces were the greatest barrier. 9 out of the 35 named transportation as the greatest barrier. 1 out of 35 had no opinion.

  1. Do you feel that challenged employees are as capable as non-challenged employees?


Appendix 6 (continued)

Aggregated Results of

One-on-One Interview Questions


Results: 32 out of 35 felt that challenged employees were just as capable. 2 out of 35 felt that challenged employees were not as capable. 1 out of 35 felt as if challenged employees should not be in the workforce.

  1. In your opinion do challenged employees miss more or less work, then their non-challenged counterparts?

Results: 23 out of the 35 believed that challenged and non-challenged employees were equal. 9 stated that challenged employees did miss 1-4 days more work per year than their non-challenged counterpart. 3 have not noticed.

  1. Have you heard of the Americans with Disability Act?

Results: 17 out of 35 stated that they have heard of the ADA, but only 12 were able to define the purpose of the ADA.

  1. Are you familiar with Section 504 and/or 508 of the ADA?

Results: 10 out of 35 were familiar with Section 508. Only 2 out of 35 were familiar with both Section 504 and 508.

  1. Do you feel that the interfaces used by your company are accessible to everyone?

Results: 31 out of 35 answered, yes. 3 out of 35 answered, no. 1 out of 35 had no idea.

  1. Do you feel that biometric technologies could assist to breakdown barriers?


Results: 5 out of 35 believed the answer to be, yes. 1 out of 35 stated, no. 29 out of the 35 did not know.





Download 2.12 Mb.

Share with your friends:
1   ...   9   10   11   12   13   14   15   16   17




The database is protected by copyright ©ininet.org 2024
send message

    Main page