Through the theoretical adaptation of biometric technologies to people of variable abilities


Cooperative vs. Non-Cooperative User



Download 2.12 Mb.
Page5/17
Date28.05.2018
Size2.12 Mb.
#50553
1   2   3   4   5   6   7   8   9   ...   17

Cooperative vs. Non-Cooperative User

  • Overt vs. Covert Biometric System

  • Habituated vs. Non-Habituated User

  • Supervised vs. Unsupervised User

  • Standard Environment vs. Non Standard Environment


    Biometric Technology: A classification of a biometric system by the type of biometric.

    Booking: The process of capturing inked finger images on paper, for subsequent processing by an AFIS.

    Capacitance: Finger images capture technique that senses an electrical charge, from the contact of ridges, when a finger is placed on the surface of a sensor.

    Capture: The method of taking a biometric sample from the end user.

    Central processing unit (CPU): The brains of the computer.

    Certificate authority (CA): The third party that issues digital certificates and vouches for the identity of parties involved in an online transaction.

    Certification: The process of testing a biometric system to ensure that it meets certain performance criteria. Systems that meet the testing criteria are said to have passed and are certified by the testing organization.

    Comparison: The process of comparing a biometric sample with a previously stored reference template or templates. See also 'One-To-Many' and 'One-To-One'.

    Claim of Identity: When a biometric sample is submitted to a biometric system to verify a claimed identity.

    Claimant: A person submitting a biometric sample for verification or identification whilst claiming a legitimate or false identity.

    Clock speed: The speed at which the CPU or microprocessor executes instructions.

    Closed-Set Identification: When an unidentified end-user is known to be enrolled in the biometric system. Opposite of 'Open-Set Identification'.

    CMOS (Complementary Metal Oxide Semiconductor): A type of integrated circuit used by some biometric systems because of its low power consumption.

    Combinatorial: The branch of mathematics concerned with analyzing combinations of events and their associated probabilities.

    Commensurability: The universal format and length of Codes.

    Concrete Interactor: An interactor that describes the selection, input, or output for a user interaction, and includes information on the visual or non-visual realization of that interaction, for example a list box or a particular speech grammar.

    Control Phase: The control phase is the time period in the URC-target communication exchange when the URC controls the target via AAIML.

    Crossover Rate: Synonym for 'Equal Error Rate'.

    D Prime: A statistical measure of how well a biometric system can discriminate between different individuals. The larger the D Prime value, the better a biometric system is at discriminating between individuals.

    Deep Web: Refers to a massive trove of information stored in databases, multimedia files and other formats that don't turn up on standard search engine services.

    Degrees of Freedom: The number of statistically independent features in biometric data.

    Denial of service attack: Occurs when hackers send thousands or hundreds of thousands of requests to a server at the same time with the intention of knocking it out of service.

    Discovery Phase: The discovery phase initializes the URC to locate and identify all available targets.

    Discriminate Training: A means of refining the extraction algorithm so that biometric data from different individuals are as distinct as possible.

    DNA: DEOXYRIBONUCLEIC ACID organic chemical of complex molecular structure that is found in all prokaryotic and eukaryotic cells and in many viruses. DNA codes genetic information for the transmission of inherited traits.

    DPI (Dots Per Inch): A measurement of resolution for finger image biometrics.

    DSV (Dynamic Signature Verification): Synonym for 'Signature Verification'.

    Eigenface: A method of representing a human face as a linear deviation from a mean or average face.

    Eigenhead: The three dimensional version of Eigenface that also analyses the shape of the head.

    Encryption: The act of converting biometric data into a code so that people will be unable to read it. A key or a password is used to decrypt (decode) the encrypted biometric data.

    End User: A person who interacts with a biometric system to enroll or have his/her identity checked.

    End User Adaptation: The process of adjustment whereby a participant in a test becomes familiar with what is required and alters their responses accordingly.

    Enrollee: A person who has a biometric reference template on file.

    Enrollment: The process of collecting biometric samples from a person and the subsequent preparation and storage of biometric reference templates representing that person's identity.

    Enrollment Time: The time period a person must spend to have his/her biometric reference template successfully created.

    Equal Error Rate: When the decision threshold of a system is set so that the proportion of false rejections will be approximately equal to the proportion of false acceptances. A synonym is 'Crossover Rate'.

    Ergodicity: The representative ness of sub samples.

    Ethernet: Technology standard used to link computers in local area networks.

    Extraction: The process of converting a captured biometric sample into biometric data so that it can be compared to a reference template.

    Extranet: A network linking different computer networks over the Internet.

    Failure to Acquire: Failure of a biometric system to capture and extract biometric data.

    Failure to Acquire Rate: The frequency of a failure to acquire.

    False Acceptance: When a biometric system incorrectly identifies an individual or incorrectly verifies an impostor against a claimed identity. Also known as a Type II error.

    False Acceptance Rate/FAR: The probability that a biometric system will incorrectly identify an individual or will fail to reject an impostor. Also known as the Type II error rate.

    False Match Rate/FMR: Alternative to 'False Acceptance Rate'. Used to avoid confusion in applications that reject the claimant if their biometric data matches that of an enrollee. In such applications, the concepts of acceptance and rejection are reversed, thus reversing the meaning of 'False Acceptance' and 'False Rejection'. See also 'False Non-Match Rate'.

    False Non-Match Rate/FNMR: Alternative to 'False Rejection Rate'. Used to avoid confusion in applications that reject the claimant if their biometric data matches that of an enrollee. In such applications, the concepts of acceptance and rejection are reversed, thus reversing the meaning of 'False Acceptance' and 'False Rejection'. See also 'False Match Rate'.

    False Rejection: When a biometric system fails to identify an enrollee or fails to verify the legitimate claimed identity of an enrollee. Also known as a Type I error.

    False Rejection Rate/FRR: The probability that a biometric system will fail to identify an enrollee, or verify the legitimate claimed identity of an enrollee. Also known as a Type I error rate.

    Failure to Acquire/FTA: Represents the probability that the user biometric characteristic is either damage, flawed, and/or not presented in the correct manner.

    Failure to Enroll/FTE: Represents the probability that a user failed to enroll into the biometric system.

    FAS: Fused Accessible Solution.

    Field Test: A trial of a biometric application in 'real world' as opposed to laboratory conditions.

    Filtering: A specialized technique used by some AFIS vendors. Filtering is the process of classifying finger images according to data that is unrelated to the finger image itself. This may involve filtering by sex, age, hair color or other distinguishing factors.

    Fixed-Text System: The preferred term is 'Text-Dependent System'.

    Goats: Biometric system end users whose pattern of activity when interfacing with the system varies beyond the specified range allowed by the system, and who consequently may be falsely rejected by the system.

    Genetic Penetrance: The degree to which characteristics are passed from generation to generation.

    Hamming Distance: The number of disagreeing bits between two binary vectors. Used as measure of dissimilarity.

    Identification/Identify: The one-to-many process of comparing a submitted biometric sample against all of the biometric reference templates on file to determine whether it matches any of the templates and, if so, the identity of the enrollee whose template was matched. The biometric system using the one-to-many approach is seeking to find an identity amongst a database rather than verify a claimed identity. Contrast with 'Verification'.

    Impostor: A person who submits a biometric samples in either an intentional or inadvertent attempt to pass him/herself off as another person who is an enrollee.

    In-House Test: A test carried out entirely within the environs of the biometric developer, which may or may not involve external user participation.

    Instant Messaging: A system in which words typed on a computer appear almost simultaneously on the computer screens of other people.

    Interactor: An abstract or concrete user interface element that describes a choice for the user to make, some input to obtain from the user, or some output to convey to the user.

    Invisible Web: see DEEP WEB.

    Iris Features: A number of features can be found in the iris. These are named corona, crypts, filaments, freckles, pits, radial furrows and striations.

    Linux: An operating system developed by volunteer programmers around the world as an alternative to Microsoft Corp.'s Windows. In addition to not being a Microsoft product, the other big selling point of Linux is that it is open-source software.

    Live Capture: The process of capturing a biometric sample by an interaction between an end user and a biometric system.

    Live Scan: The term live scan is typically used in conjunction with finger image technology. Synonym for 'Live Capture'.

    Local area network (LAN): A computer network with a reach limited to an office, a building or a campus.

    Managed service provider (MSP): Any company that offers outsourced hosting and management of Web-based services, applications and equipment.

    Match/Matching: The process of comparing a biometric sample against a previously stored template and scoring the level of similarity. A accept or reject decision is then based upon whether this score exceeds the given threshold.

    Media Access Control (MAC) Address: On a local area network (LAN) or other network, the MAC (Media Access Control) address is your computer's unique hardware number. (On an Ethernet LAN, it's the same as your Ethernet address.) When you're connected to the Internet from your computer (or host as the Internet protocol thinks of it), a correspondence table relates your IP address to your computer's physical (MAC) address on the LAN. The MAC address is used by the Media Access Control sub layer of the Data-Link Layer (DLC) layer of telecommunication protocol. There is a different MAC sub layer for each physical device type. The other sub layer level in the DLC layer is the Logical Link Control sub layer.

    Microprocessor: See Central Processing Unit.

    Minutiae: Small details found in finger images such as ridge endings or bifurcations.

    Minutiae Points: are local ridge characteristics that occur at either a ridge bifurcation or a ridge ending.

    MOC (Match-On-Card): technology offered in certain smart cards with which a biometric template comparison is carried out within the confines of the card.

    Morphogenesis: The process of shape formation: the processes that are responsible for producing the complex shapes of adults from the simple ball of cells that derives from division of the fertilized egg.

    Neural Net/Neural Network: Synonym for 'Artificial Neural Network'.

    OEM (Original Equipment Manufacturer/Module): A biometric organization (Manufacturer), which assembles a complete biometric system from parts; or a biometric Module for integration into a complete biometric system.

    One-To-Many: Synonym for 'Identification'.

    One-To-One: Synonym for 'Verification'.

    Open-Set Identification: Identification, when it is possible that the individual is not enrolled in the biometric system. Opposite of 'Closed-Set Identification'.

    Open source: Technology with an underlying programming code that is free for all to use and alter. A band of programmers, technologists and some companies around the world are advocating open-source technology. The goal is to develop technology that is compatible with other technologies.

    Optical: Finger images capture technique that uses a light source, a prism and a platen to capture finger images.

    Out Of Set: In open-set identification, when the individual is not enrolled in the biometric system.

    Passive Impostor Acceptance: When an impostor submits his/her own biometric sample and claiming the identity of another person (either intentionally or inadvertently) he/she is incorrectly identified or verified by a biometric system. Compare with 'Active Impostor Acceptance'.

    Patch: Software program used to fix a hole or bug in a software application. Companies offer "patches" free to customers when vulnerabilities or problems are discovered in the products they sell.

    Pectinate Ligaments: The network of fibres at the iridocorneal angle between the anterior chamber of the eye and the venous sinus of the sclera; it contains spaces between the fibres that are involved in drainage of the aqueous humor, and is composed of two portions: the corneoscleral part, the part attached to the sclera, and the uveal part, the part attached to the iris.

    Performance Criteria: Pre-determined criteria established to evaluate the performance of the biometric system under test.

    Photonics: Technology used to transmit voice, data and video via light waves over thin strands of glass.

    Physical/Physiological Biometric: A biometric, which is characterized by a physical characteristic rather than a behavioral trait. See Part III Terms Related to Specific Biometric Techniques for 'Body Odor', 'Ear Shape', 'Face Recognition', 'Finger Geometry', 'Finger Image', 'Hand Geometry', 'Iris Recognition', 'Palm', 'Retina', 'Speaker Verification' and 'Vein check'. Contrast with 'Behavioral Biometric'.

    PIN (Personal Identification Number): A security method whereby a (usually) four-digit number is entered by an individual to gain access to a particular system or area.

    Platen: The surface on which a finger is placed during optical finger image capture.

    Plug-in: Software programs that make a Web browser run better, including allowing the downloading of information on the Internet.

    Presentation-Independent Template: A form of UIID. It describes a mapping from a user interface socket to a structured set of abstract interactors. This mapping provides access to all of the commands and readable data points within the user interface socket.

    Privacy: The degree to which an individual can determine which personal information is to be shared with whom and for what purpose. Always a concern is when an authorized users pass confidential information to another vendor or government agency.

    Public key infrastructure (PKI): Refers to the framework, including digital certificates and certificate authorities, used to securely conduct and authenticate online transactions.

    Reasonable Accommodation: Include those structural and technological modifications that do not impose an undue hardship on the employer.

    Receiver Operating Curves: A graph showing how the false rejection rate and false acceptance rate vary according to the threshold.

    Recognition: The preferred term is 'Identification'.

    Response Time: The time period required by a biometric system to return a decision on identification or verification of a biometric sample.

    Ridge: The raised markings found across the fingertip. See also 'Valley'.

    Ridge Ending: The point at which a finger image ridge ends.

    Risk Assessment Methodology (RAM): A three-step method of assessing the risk of whether to endorse or veto the relevance of a proposed solution.

    Routers: Devices that act as traffic cops for computer data on the Internet.

    Security: The protection of data against unauthorized access. Programs and data can be secured by employing a carefully designed and planned authentication method.

    Semantic Web: A vision or concept articulated by some computing leaders -- including Tim Berners-Lee, recognized as the creator of the World Wide Web -- of how computer programs and technologies can be used to semantically structure, describe, search and interpret documents and data on the Web. This concept envisions the Web evolving from an HTML-based one to the semantic Web.

    Session: A continuous period over which a user is engaged with the target.

    Short message service (SMS): Brief text messages that are transmitted via mobile phones.

    Software agent(s): "Intelligent" software programs that perform tasks, search and retrieve information a user requires from databases and computer networks.

    Supplemental Resources: Interpretation and translation resources that may be used in building a user interface. These resources include text for labeling interface elements, help text, translations into other languages, and icons, graphics or other multi-media elements.

    Target: The target is a device (e.g. VCR) or service (e.g. online phone directory) that the user wishes to use.

    Target-Class Template: A UIID that can be mapped to the user interface socket of any target of a certain class such as microwave ovens or televisions.

    Technology Access Barriers (TAB): A structure or object that impedes free bi-directional in parallel access (movement) to technology.

    Template/Reference Template: Data, which represents the biometric measurement of an enrollee used by a biometric system for comparison against subsequently, submitted biometric samples.

    Thermal: A finger image capture technique that uses a sensor to sense heats from the finger and thus captures a finger image pattern.

    Third-generation networks): Much-hyped technology that promises to enable high-speed downloading of data, including videophone service, and worldwide compatibility.

    Third Party Test: An objective test, independent of a biometric vendor, usually carried out entirely within a test laboratory in controlled environmental conditions.

    Threshold/Decision Threshold: The acceptance or rejection of biometric data is dependent on the match score falling above or below the threshold. The threshold is adjustable so that the biometric system can be more or less strict, depending on the requirements of any given biometric application.

    Throughput Rate: The number of end users that a biometric system can process within a stated time interval.

    Trojan horse: Malicious code that is often hidden in e-mail attachments that once activated can be used to steal or destroy programs and data on a computer.

    UBID: Acronym for Universal Biometric Identification.

    UI: Acronym for User Interface.

    UIID: Acronym for User Interface Implementation Description.

    Ultrasound: A technique for finger image capture that uses acoustic waves to measure the density of a finger image pattern.

    Universal Remote Console (URC): The URC is a device or software through which the user accesses a target. The URC complies with the AIAP-URC specification and is capable of rendering any AAIML specified user interface. It is “universal” in the sense that it can be used to control any AIAP-URC compliant target. It is assumed that users will choose a URC capable of meeting their personal interaction requirements.

    URC: Acronym for Universal Remote Console.
    User: The client to any biometric vendor. The user must be differentiated from the end user and is responsible for managing and implementing the biometric application rather than actually interacting with the biometric system.

    User Interface Instance: A UIID that completely describes a user interface and has been built and made available in advance of the user’s session with the target.

    User Interface Instantiation: A UIID that completely describes a user interface and has been dynamically derived from a presentation-independent template during the user interface construction phase of a user’s session with a target.

    User Interface Socket: A low level description of a specific target. It describes the functionality and state of the target as a set of data points and commands.

    Validation: The process of demonstrating that the system under consideration meets in all respects the specification of that system.

    Valley: The corresponding marks found on either side of a finger image ridge.

    Verification/Verify: The process of comparing a submitted biometric sample against the biometric reference template of a single enrollee whose identity is being claimed, to determine whether it matches the enrollee’s template. Contrast with 'Identification'.

    Web bugs: Invisible files hidden on Web pages to help marketers determine who has seen their ads.

    Webcast: Audio, video or both broadcast on the Web.

    Web clipping: Shortened versions of Web pages designed to fit and be displayed on the small screens of handheld devices.

    Web services: A catch-all term describing a trend in which services are delivered over the Internet, or the Internet is used to automate tasks.

    Wide area networks (WANs): Computer networks, spanning great distances that are connected to each other.

    Wi-fi: A wireless technology standard that was formerly called 802.11b. The technology allows people to connect to networks using simple radio antennas in their laptops or desktop PCs.

    Worm: A computer program that replicates and spreads from computer to computer via e-mail.

    WSQ (Wavelet Transform/Scalar Quantisation): A compression algorithm used to reduce the size of reference templates.

    X Internet: Buzzword coined by Forrester Research Inc., with the X standing for "executable" or "extended" Internet in which non-PC devices and consumer products, including cell phones, televisions, cars and refrigerators, are linked to the Internet.

    Zero Effort Forgery: An arbitrary attack on a specific enrollee identity in which the impostor masquerades as the claimed enrollee using his or her own biometric sample.

    Overview of the Study


    This research paper will attempt to show that within the international culture of today’s information age there exist a threefold (interconnected) problem to be addressed with respect to the existence of a secure access methodology to electronic devices and technology for people with variable abilities. Furthermore, this study will analyze the theoretical aspects, concepts, and barriers (logical, physical, cultural, and tangible) related to the adaptation and implementation of biometric technologies to people with of variable abilities. This study must and will embody the characteristics of universal design philosophies.


    Review of Related Literature


    Chapter 2
    From a multi-dimensional perspective there are a multitude of related theories, concepts, practices (strategies), and technologies from both printed and electronic mediums that apply to each individual facet of assistive technologies, biometric technologies, smart card technologies, universal design, neural control, privacy issues, legal issues, security, accessibility, and the ever-present cultural barriers of society. More to the point, the related literature will link the theories, concepts, and practices of the aforementioned facets to the adaptation of biometric technologies to people with disabilities. Thereby, proving that biometric technologies can indeed be adapted to people with disabilities as the supreme assistive technology.

    The paragraphs that follow will only be a synopsis of the dominant philosophies as related to the many facets of implementation and adaptation of biometric technologies to people with disabilities. Hence, the following paragraphs will assist to establish a literary framework of cultural theories, societal concepts, implementation practices, and technology standards.


    Mainstream Biometric Technologies


    The function of a biometric technologies authentication system is to facilitate controlled access to applications, networks, personal computers (PCs), and physical facilities. A biometric authentication system is essentially a method of establishing a person’s identity by comparing the binary code of a uniquely specific biological or physical characteristic to the binary code of an electronically stored characteristic called a biometric. The defining factor for implementing a biometric authentication system is that it cannot fall prey to hackers; it can’t be shared, lost, or guessed. Simply put, a biometric authentication system is an efficient way to replace the traditional password based authentication system (Ashbourn, 2000).

    Emerging Biometric Technologies


    The neural waves emanate from a subject’s brain in the form of brainwaves or bioelectrical impulses. To further iterate this, please refer to an article called “Monkey Brain Operates Machine” published on the BBC News website (http://news.bbc.co.uk/hi/english/sci/tech/ newsid_1025000/1025471.stm). This is not the first article or paper of this type, to promote the attributes of neural control. On the contrary, there have been countless papers and articles released from multiple universities and colleges in an attempt to document their research.

    IBVA Technologies (www.ibva.com) is the first company to commercialize the distribution of a neural control device. Essentially, a neural control device is a system that is designed to sense and analyze a persons’ neural waves and then interfaces with a computer to allow the user to navigate (control) with brainwaves; neural control would be analogous to the use of a human hand. The problem is that the technology must be customized for each user and is therefore not easily adaptive to each individual. The researcher has speculated that brainwaves are unique and could emerge from neural devices as the newest biometric. The title of the paper is "Let Me In!!! (Biometric Access & Neural Control)” and was published (November 2001) at http://www.icdri.org/biometrics/let_me_in.htm by the International Center for Disability Resources on the Internet. Republished (March 2002) at http://www.nextinterface.net/biometricsandsecurity and (June 2002) at http://www.findbiometrics.com/Pages/letmein.html.

    Corporate and university website are of a tremendous source of information on emerging technologies. The corporate website of PosID, Inc. (http://www.posidinc.com) is an excellent source of information on an emerging biometric technique known as "Infrared Imaging And Pattern Recognition" and it should be as they hold the patented (#5,351,303). 

    Radio Frequency Identification (RFID)


    As indicated by the white paper composed by Accenture (2001), a RFID employs radio frequency communications to exchange data between a portable memory device and a host computer. An RFID typically consists of a tag, label, or PCB for storing data, an antenna to communicate, and a controller. RFID’s can either be active (battery) or passive (no battery) and can be produce with read/writer (two-way) or read only (one-way) capabilities. Additionally, an RFID is a suitable method of replacing bar code.

    Clark Richter (1999) of Intermec Technologies Corporation author of a white paper titled “RFID: An Educational Primer” he has in general terms explained basic RFID concepts with respect to RFID technology, markets and applications.

    Editor Chris Corum (2002) of AVISAIN Inc., authored “Why RFID is the right choice for personal ID”. In this newsletter the author declares that an RFID card is the best and most secure method of identification. An RFID card is a bare bones version of a contactless smart card.

    Smart Card Technologies


    The most common standardized encryption method used to secure a company’s infrastructure is the Public Key Infrastructure (PKI) approach. This method consists of two keys with a binary string ranging in size from 1024-bits to 2048-bits, the first key is a public key (widely known) and the second key is a private key (only known by the owner). However, the PKI must also be stored, and inherently, it too can fall prey to the same authentication limitation of a password, PIN, or token. It too can be guessed, lost, stolen, shared, hacked, or circumvented; this is even further justification for a biometric authentication system (Corcoran et al.).

    Per Walder (1997), the best overall way to secure an enterprise infrastructure, whether it be small or large is use a smart card. A smart card is a portable device with an embedded central processing unit (CPU). The smart card can either be fashioned to resemble a credit card, identification card, radio frequency identification (RFID), or a Personal Computer Memory Card International Association (PCMCIA) card (Biocentric Solutions Inc., n.d.). The smart card can be used to store data of all types, but it is commonly used to store encrypted data, human resources data, medical data, and biometric data (template). The smart card can be access via a card reader, PCMCIA slot, or contactless proximity reader; it is therefore in compliance with section 508 of the Americans with Disabilities Act (ADA) (Walder, 1997).

    A smart card is the best storage medium to use when implementing a biometric authentication system; only by the using a smart card can an organization satisfy all security and legal requirements (Biocentric Solutions Inc., n.d.). Corcoran et al. (1999) stated, “This process irrefutably authenticates the person presenting the card as the same person to whom the cryptographic keys belong and provides the necessary tight binding between cryptographic key storage and the authorized user of the cryptographic keys.” (p. 5).

    Smart Card Alliance (http://www.smartcardalliance.org) is a not-for-profit organization that is known among the smart card industry as the premiere source of smart card research data and reports. The mission of the Smart Card Alliance is to promote the acceptance of smart card technologies. The mission of the Smart Card Alliance would be analogous to the mission of the Biometrics Consortium, which is to promote acceptance of biometrics.

    The premiere expert on the use of RFIDs and smart cards as assistive technology to aid people with disabilities is Dr. John Gill, OBE FIEE of the Royal National Institute for the Blind. Dr. Gill has participated in numerous studies and published multiple papers that are of great significance to this study. Other than the historical documentation that has been contributed by Dr. Gill, the research has also been participating in a one-on-one conversation with Dr. Gill via email exchange.

    Assistive Technologies


    Assistive technologies play a major role in school, work, and the society at large. With respect to authors of assistive technology books, the quantity of material is scarce; on the other hand the quality of the available material is supreme. “Assistive technology: A resource for school, work, and community”, was composed by Flippo, Inge, & Barcus (1995) and is one such artistic production.

    The fundamental development and foundation of assistive technologies are dictated by legislation and federal policy. The legislation and policies have also set the stage for standards associated to the application of communication technologies, sensory impairment technologies, mobility, and strategies for schools, the workplace, and society (Flippo, Inge, & Barcus, 1995).

    While published books are scarce, there are many more source of literature related to assistive technologies from government and nonprofit organizations, both domestic to the United States and international. The accessible future was authored by the National Council on Disability [NCD] (2001, June 21) and is a publication that attempts to establish that an assistive technology framework is a civil rights concept.

    As implied by Heldrick (1999), the employment of assistive technologies within companies has also created a multitude of developmental staffing and creative financing issues.

    Cultural Barrier (Disabled & Elderly)


    The post World War I theory or concept of disability was perceived as a medical condition (mental, physical, or emotional) that lead to the inability of a person to conduct work, which is commonly referred to as the medical model (Heldrick, 1999). The medical model concept was perceived and widely accepted as the most accurate definition of a person with a disability up until the 1990’s.

    In the 1990’s, the medical model concept (old paradigm) started to shift ever so slightly to what is nowadays known as the disability paradigm (new paradigm). This shift in paradigm has lead to the rethinking of many related theories, concepts, and practices from those that viewed disabilities under the medical model paradigm to what is now considered to be that of a social model (the disability paradigm) (Barnartt & Altman, 2001). Some of the most popular are the theory of work adjustment, organizational career theory, Super’s theory, and the role theory (Szymanski & Parker, 1996).

    As stated in the proclamation of problem of this research paper, the critical shortage of qualified personnel in the workplace, is partly related to the change of societies from that of an industrial based workforce to a knowledge based workforce, partly because the baby boomers have only had about half as many children as their parents. As a result the number of 20 to 24 year olds entering the workforce continues to fall (NCD, 2001). And partly because, medical advances has contributed to the rapid growth of an aging society, as such the aging seniors are having to working longer in order to prepare for retirement (Schaie & Schooler, 1998).

    The elderly paradigm is not so dissimilar from that of the old disability paradigm. For as people age, their vision, hearing, cognitive, and mobility abilities start to diminish. Charness, Parks & Sabel (2001) have stated that, “If technology is not equipped to deal with these natural human changes, it is poorly designed, and further disenfranchises segments of the society” (p. 47). The societies that Charness, Parks & Sabel (2001) are referring to are those people of variable abilities.


    Universal Design


    Why is universal design important? A white paper titled “Business Benefits of Access-for-All Design”, which was penned by Steve Jacobs (2002, November 22) puts forward the concept that, universal design is not only a good idea, it is an absolute must for companies. Publications from many other authors, university researchers (TRACE Center), companies (Microsoft; AT&T; and EDS), non-profit organizations (International Center for Disability Resources on the Internet [ICDRI]; Center for Applied Special Technology [CAST]; The Biometric Foundation, and BioAPI Consortium), and international government agencies all agree with conclusions of Steve Jacobs, that in order to remain competitive in the dynamic environment of today, companies must endorse universal design standards.

    Adaptation to People of Variable Abilities


    The International Center for Disability Resources on the Internet (ICDRI) has within the grasp of it’s website and experts a theoretical account of numerous theories, concepts, and practices with respect to people with disabilities. By no means is this complete list of dedicated and prestigious organizations; it is only a few. But, the same can be said of the following nonprofit and governmental organizations; the National Organization on Disability, the United States Department of Justice, Civil Rights Division, and the United States Department of Labor.

    Dr. John Gill, the Chief Scientist for the Royal National Institute for the Blind has addressed numerous issues surrounding the adaptation of assistive technologies to the elderly and people with disabilities. Dr. Gill is well respected and he has published many papers (Design of smart card systems to meet the needs of disabled and elderly persons) and conducted studies (SATURN Project).


    Privacy/Legal Issues


    The Americans Civil Liberties Union (ACLU) is only one of many local, state, federal, and international organizations with legitimate concerns about the security (privacy) or misuse of the biometric data collected by the government and private companies (Winter, 2000). The aforementioned concerns are of such importance that two organizations were formed to address the concerns, the first is the International Biometric Industry Association (www.ibia.org), which is sponsored by the National Institute of Standards and Technology (NIST) and the second is the Bioprivacy Organization (www.bioprivacy.org), which is sponsored by the International Biometric Group (www.biometricgroup.com) (Woodlands Online, n.d.).

    Attorney Susan Gindin of the San Diego Law Review has authored an extraordinary paper that details numerous informational privacy and legal issues of the Internet age. Even though her paper “Lost and found in cyberspace: Informational privacy in the age of the Internet” was published in 1997 much of the content is still applicable today.


    Security Issues


    Security has always been a major concern for all information technology professionals. To that end, many countries have conducted studies; the Information Assurance Technical Framework (IATF) is one such study that was sponsored by the National Security Agency (NSA).

    However, it is important to note that there exist a commonality in security guidelines between all countries and private institutions. Identification and Authentication (I&A) methods consist of three common category types, a password (something you know), a physical token (something you have), and a biometric (something you are). The most recommended I&A method involves combining two of the three I&A category types (i.e. physical token and a biometric). The most common standardized encryption method used to secure a company’s infrastructure is the Public Key Infrastructure (PKI) approach (NSA, 2000).

    The PKI approach consists of two keys with a binary string ranging in size from 1024-bits to 2048-bits, the first key is a public key (widely known) and the second key is a private key (only known by the owner). However, the PKI must also be stored and inherently it too can fall prey to the same authentication limitation of a password, PIN, or token. It too can be guessed, lost, stolen, shared, hacked, or circumvented; this is even further justification for a biometric authentication system (Corcoran et al.).

    Controlling access to logical and physical assets of both the virtual and tangible worlds are not the only concerns that must be addressed. Security managers must also take into account security of the biometric data (template) (Walder, 1997).

    The biometric data can be stored in a number of ways, either in a centralized database or in a distributed system. Examples of a distributed system would be an optical card, memory card, proximity card, token, or a smart card. No matter what storage method is used, the biometric data must be encrypted to ensure that security requirements are met (Biocentric Solutions Inc., n.d.).

    A biometric authentication system that is correctly implemented can provide unparalleled security, enhanced convenience, heightened accountability, superior fraud detection, and is extremely effective in discouraging fraud (Nanavati, S., Thieme, & Nanavati, R., 2002).


    Disability Demographics


    William P. LaPlant Jr. has and continues to aid people with disabilities by volunteering his expertise to those organizations in need of assistance. As such, he has served in multiple positions to include serving as the Chairman of the International Center for Information Technology Standards, Information Technology Access Interfaces Technical Committee (INCITS/V2). It is, however, Mr. LaPlant’s income producing position as a computer scientist for the U.S. Census Bureau that has aid to establish current disability demographics. Mr. LaPlant has researched and composed an excellent and detailed reference paper titled, “Disability Statistics & Policy in the United States of America and the World” that clearly brings together all disability demographics. The research paper has been published by the International Center for Disability Resources on the Internet (ICDRI).

    Additional sources of literature relating to demographics can be found via Individuals with Disabilities: Enabling Advocacy Link (IDEAL) and the National Organization on Disability (NOD) to name a few.


    Electronic News Sources


    Electronic news sources provide timely notification of trends and have aided to spread the word of biometric technologies that have been successful and/or unsuccessful implemented within various international market sectors of law enforcement, government, travel and immigration, corporate, financial, and healthcare. Here is a small indefinite quantity of those sources, New York Times (http://www.nytimes.com), Washington Post (http://www.washingtonpost.com), Macon Wire Service (http://www.macon. com), The Register (http://www.theregister.co.uk), Business Week (http://www.businessweek.com), Newsweek/MSNBC (http://www.msnbc.com/ news), British Broadcasting Corporation (http://www.bbc.co.uk.com), Los Angeles Times (http://www.latimes.com), American for Civil Liberties Union (http://www.aclu.org/news), Find Articles (http://www.findarticles.com), Contactless News (http://www.contactlessnews. com), and Government Computer News (http://www.gcn.com).

    Study Associated Standards


    The Architectural and Transportation Barriers Compliance Board (2002); have published the Electronic and Information Technology Accessibility Standards in the Federal Register on December 21, 2000. This document was crafted as a directed study in response to the technology barriers and accessibility guidelines contained within section 508 of the Rehabilitation Act Amendments of 1998. The sections of the Rehabilitation Act Amendments of 1998 are to all intents and purposes amendments to the Americans with Disabilities Act of 1990. Additionally, standards committees like the International Committee for Information Technology and Standards (INCITS) and other non-profit organizations have aid in addressing the concept of universal design as relative to assistive technologies.

    Summarization of Related Literature


    The work of authors such as Szymanski and Parker (1996) have alluded to the fact that before people with disabilities could not be fully integrated into the workplace until the culture of the workplace becomes more welcoming. This is because the medical model did not perceive people with disabilities as potential workforce assets. Hence, not much emphasize had been placed on resolving the workplace barriers. The shift of paradigms from that of the medical model to the disability model has fostered a change in the perceptions of society and the workplace culture. Additionally, the National Council on Disability believes that the only way to shift the culture is to establish legislation (NCD, 2001). Still, Hagner and DiLeo (1993) advocate a middle ground approach of legislation and accessibility standards.

    The related literature will add credence to the threefold problem and will demonstrate that there exist a theoretical resolution that could feasible be adapted to the environments of schools, businesses and society at large.


    Applied Research Methodologies


    Chapter 3
    The purpose of this chapter is to present the research methods used to address the elements of previously described threefold problem of establishing a secure access methodology of electronic devices and technology for people with variable abilities. The general research methodologies employed in this chapter are to a greater extent conducive to the exploration and grouping of qualitative commonalities. Commonalities will be the key.

    A mixed-method research strategy of integrating different elements is likely to produce better results in terms of quality and scope. This is a practical and an ideally more monolithic way to conceptualize and instigate the evaluation process. The mixed-method puts forth a genuine effort to be reflexive and offers a more critical evaluation of case studies. It is a practical and ideally more useful means of ensuring accountability to broader audiences (Yin, 1994). The researcher has combined both quantitative and qualitative research methods.



    Figure 1 is a graphical representation of the aforementioned research approach that has been employed in this paper by the researcher:

    Figure 1: Graphical Representation of Employed Research Approach




    Download 2.12 Mb.

    Share with your friends:
  • 1   2   3   4   5   6   7   8   9   ...   17




    The database is protected by copyright ©ininet.org 2024
    send message

        Main page