Posted: November 14th, 2022

Biometric Identification in Everyday life

Biometric Identification in Everyday life

Biometric Identification
Biometric technology stores fingerprints or other bio-identities to enable one to access a variety of devices. Biometric identification systems are used to identify authorized personnel by the use of their unique physical traits like retina, fingerprints, voice recognition, face, and signatures among others (Jacobsen, 2012). This technology is basically a solution to most security issues in the financial and businesses and is used to protect these sectors from fraud and dangers due to identity forgery. The use of biometric identification was introduced after the 9/11 tragedy in the U.S when there were terror attacks by unidentified terrorists. The physical biometrics cannot be duplicated, making it more accurate for identification purposes.
Despite the security rendered by the biometric identifications, there are several issues it has, especially, with regards to its influence on the human cultures. Biometrics identification, unlike other forms of recognition, has physical ties to a person’s physical body. The main social issue in this technique is because of the permanent link between the records about a person and the biometric traits. For convenience, the improved fraud reduction, security, and other benefits of biometrics identification must also consider the effects on the society at large in terms of privacy and health protection. The efficacy of biometric technology highly depends on the culture, legal considerations and the community at large which would define how people would interact with the system (National Research Council, 2010). For instance, some people may refuse to use the biometrics for fear of contracting diseases, some due to fear of how their images may be used, and some due to customary adornment. In all these cases, the system’s performance is likely to be compromised. Today, no discussions on biometric technology end without someone raising privacy concerns. The system exaggeratingly collects vast amount of personal information that is prone to hacking, thereby, would threaten an individual’s life.
Biometric technology was meant to protect the business, institutions, and financial sectors against credit cards hacking, ATMs fraudsters, login issues, bank accounts frauds, et cetera. It was basically meant to deal with many issues in big and small institutions. Nevertheless, the introduction of biometric technology has harmed some institutions, for instance, the Apple, whose biometric data was a leeway of the privacy threats of its users. In 2013, the German hackers were able to access and use the duplicate fingerprints to access the Apple iPhone (Emspak, 2017). While the latest smartphones introduce sophisticated 3D cameras to capture facial images, the swindlers also employ high tech methods to cope up with the new dynamics to by-pass the set security. For instance, the hackers were able to bypass the facial recognition scanner of the Samsung Galaxy S8.
Databases that handle biometric data are themselves a threat to privacy due to the introduction of the biometric identification technology. It is a challenge to ensure that the transmission is secure, and also making sure that the access to the database is under control. The fraudsters have even found a technique of duplicating fingerprints. Also, the life of those who can authorize access to a system can be in danger when perpetrators of crimes use force to use their biometrics. Also, the raw biometric data may cause health risks, and in such cases, the banks, and insurance companies may be forced to access the personal information of users. Sometimes, the problems that lead to privacy invasion may be due to social profiling, where biometric data can be mistakenly linked due to close relationships.
Culture and religion are very crucial in deploying biometrics and must be assessed and considered (Hannah, 2014). The females in the Middle East, and those who are the Muslims; for instance, put on head garments and, therefore, the system may compromise their belief in case it must be deployed. Politically, the biometric technology is attributed to the west, particularly, the U.S.A. This means that the application of this technology in the rest of the world attribute an economic and political power to the west. According to the article on bio-political Tattooing by Agamben (2004), every form of technology initiated by the west often finds their way in the rest of the world in the form of civilization. However, sometimes, the technology is insensitive to the people it is supposed to serve. For instance, it would be humiliating to ask a female Muslim or Middle Eastern to remove the headscarf to be biometrically identified. Control techniques by use of technology should be constrained not to cross certain thresholds because that would lead to a bio-political era and what Michael Foucault called progressive animalization (Agamben, 2004). The process should not be mandatory but should be informed by free and active participation.
The local governments in most nations are planning to take a picture of children and append their details to help in checking signs of child abuse, neglect, and identify health-related issues. Today, nations, including the U.S, are planning to share biometric data with other countries (Zuccarini, 2013). However, most people are worried by the initiative and how their information may be used. This technique compromises people’s privacy even though the initiators have the plan to uphold the nations’ security.

References
Agamben, G. (2004). “No to bio-political tattooing” Le Monde 10 January. English translation at http://www.ratical.org/ratville/CAH/totalControl.html.
Emspak, J. (2017). Should Apple iPhone X Trust Facial Recognition for Security? Retrieved from https://www.scientificamerican.com/article/should-apple-iphone-x-trust-facial-recognition-for-security/
Hannah, M. G. (2014). Biometrics: Bodies, Technologies, Biopolitics.
Jacobsen, K. L. (2012). Biometrics as security technology: Expansion amidst fallibility (No. 2012: 07). DIIS Reports/Danish Institute for International Studies.
National Research Council, & Whither Biometrics Committee. (2010). Biometric recognition: challenges and opportunities. National Academies Press.
Zuccarini, M. (2013). Our Biometric Future: Facial Recognition Technology and the Culture of Surveillance.

Biometric Identification
Biometric technology stores fingerprints or other bio-identities to enable one to access a variety of devices. Biometric identification systems are used to identify authorized personnel by the use of their unique physical traits like retina, fingerprints, voice recognition, face, and signatures among others (Jacobsen, 2012). This technology is basically a solution to most security issues in the financial and businesses and is used to protect these sectors from fraud and dangers due to identity forgery. The use of biometric identification was introduced after the 9/11 tragedy in the U.S when there were terror attacks by unidentified terrorists. The physical biometrics cannot be duplicated, making it more accurate for identification purposes.
Despite the security rendered by the biometric identifications, there are several issues it has, especially, with regards to its influence on the human cultures. Biometrics identification, unlike other forms of recognition, has physical ties to a person’s physical body. The main social issue in this technique is because of the permanent link between the records about a person and the biometric traits. For convenience, the improved fraud reduction, security, and other benefits of biometrics identification must also consider the effects on the society at large in terms of privacy and health protection. The efficacy of biometric technology highly depends on the culture, legal considerations and the community at large which would define how people would interact with the system (National Research Council, 2010). For instance, some people may refuse to use the biometrics for fear of contracting diseases, some due to fear of how their images may be used, and some due to customary adornment. In all these cases, the system’s performance is likely to be compromised. Today, no discussions on biometric technology end without someone raising privacy concerns. The system exaggeratingly collects vast amount of personal information that is prone to hacking, thereby, would threaten an individual’s life.
Biometric technology was meant to protect the business, institutions, and financial sectors against credit cards hacking, ATMs fraudsters, login issues, bank accounts frauds, et cetera. It was basically meant to deal with many issues in big and small institutions. Nevertheless, the introduction of biometric technology has harmed some institutions, for instance, the Apple, whose biometric data was a leeway of the privacy threats of its users. In 2013, the German hackers were able to access and use the duplicate fingerprints to access the Apple iPhone (Emspak, 2017). While the latest smartphones introduce sophisticated 3D cameras to capture facial images, the swindlers also employ high tech methods to cope up with the new dynamics to by-pass the set security. For instance, the hackers were able to bypass the facial recognition scanner of the Samsung Galaxy S8.
Databases that handle biometric data are themselves a threat to privacy due to the introduction of the biometric identification technology. It is a challenge to ensure that the transmission is secure, and also making sure that the access to the database is under control. The fraudsters have even found a technique of duplicating fingerprints. Also, the life of those who can authorize access to a system can be in danger when perpetrators of crimes use force to use their biometrics. Also, the raw biometric data may cause health risks, and in such cases, the banks, and insurance companies may be forced to access the personal information of users. Sometimes, the problems that lead to privacy invasion may be due to social profiling, where biometric data can be mistakenly linked due to close relationships.
Culture and religion are very crucial in deploying biometrics and must be assessed and considered (Hannah, 2014). The females in the Middle East, and those who are the Muslims; for instance, put on head garments and, therefore, the system may compromise their belief in case it must be deployed. Politically, the biometric technology is attributed to the west, particularly, the U.S.A. This means that the application of this technology in the rest of the world attribute an economic and political power to the west. According to the article on bio-political Tattooing by Agamben (2004), every form of technology initiated by the west often finds their way in the rest of the world in the form of civilization. However, sometimes, the technology is insensitive to the people it is supposed to serve. For instance, it would be humiliating to ask a female Muslim or Middle Eastern to remove the headscarf to be biometrically identified. Control techniques by use of technology should be constrained not to cross certain thresholds because that would lead to a bio-political era and what Michael Foucault called progressive animalization (Agamben, 2004). The process should not be mandatory but should be informed by free and active participation.
The local governments in most nations are planning to take a picture of children and append their details to help in checking signs of child abuse, neglect, and identify health-related issues. Today, nations, including the U.S, are planning to share biometric data with other countries (Zuccarini, 2013). However, most people are worried by the initiative and how their information may be used. This technique compromises people’s privacy even though the initiators have the plan to uphold the nations’ security.

References
Agamben, G. (2004). “No to bio-political tattooing” Le Monde 10 January. English translation at http://www.ratical.org/ratville/CAH/totalControl.html.
Emspak, J. (2017). Should Apple iPhone X Trust Facial Recognition for Security? Retrieved from https://www.scientificamerican.com/article/should-apple-iphone-x-trust-facial-recognition-for-security/
Hannah, M. G. (2014). Biometrics: Bodies, Technologies, Biopolitics.
Jacobsen, K. L. (2012). Biometrics as security technology: Expansion amidst fallibility (No. 2012: 07). DIIS Reports/Danish Institute for International Studies.
National Research Council, & Whither Biometrics Committee. (2010). Biometric recognition: challenges and opportunities. National Academies Press.
Zuccarini, M. (2013). Our Biometric Future: Facial Recognition Technology and the Culture of Surveillance.

Order for this Paper or Similar Assignment Writing Help

Fill a form in 3 easy steps - less than 5 mins.

Why choose us

You Want Best Quality and That’s our Focus

Top Essay Writers

We carefully choose the most exceptional writers to become part of our team, each with specialized knowledge in particular subject areas and a background in academic writing.

Affordable Prices

Our priority is to provide you with the most talented writers at an affordable cost. We are proud to offer the lowest possible pricing without compromising the quality of our services. Our costs are fair and competitive in comparison to other writing services in the industry.

100% Plagiarism-Free

The service guarantees that all our products are 100% original and plagiarism-free. To ensure this, we thoroughly scan every final draft using advanced plagiarism detection software before releasing it to be delivered to our valued customers. You can trust us to provide you with authentic and high-quality content.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.