SlideShare a Scribd company logo
C H E N G W I N G L A M 
1 4 2 2 2 8 2 5 
2 4 O C T O B E R 2 0 1 4
Introduction of Security Innovation 
Objective 
Video 
Application 
Advantages 
Disadvantages 
Survey Results 
Mind map 
Conclusion
INTRODUCTION 
Using individual specific biological characteristic to verify 
identity for security
OBJECTIVE 
Compare familiarity and acceptance between teenagers and 
elder people when using biometrics innovation 
technology
HOW BIOMETRICS WORKS IN OUR LIFE
APPLICATIONS
ADVANTAGES 
- Safer and easier life 
- User-friendly 
- High levels of accuracy
DISADVANTAGES 
- High cost 
- Many variables during recognition
DATA ANALYSIS 
0 2 4 6 8 10 12 
10-20 
21-30 
31-40 
41-50 
51 or above 
Number of people 
Age group 
What is your age? 
10-20 
21-30 
31-40 
41-50 
51 or above
DATA ANALYSIS 
25 
20 
15 
10 
5 
0 
People's Recognition on Security Innovation 
Face perception Fingerprint recognition Automatic Speech 
Recognition 
Retinal scanning 
Face perception 
Fingerprint recognition 
Automatic Speech Recognition 
Retinal scanning
DATA ANALYSIS 
12 
10 
8 
6 
4 
2 
0 
People's opinion on security innovation 
reliable user-friendly 
Number of People 
Opinions 
Strongly disagree 
Disagree 
Neither disagree nor agree 
Agree 
Strongly agree
DATA ANALYSIS 
0 2 4 6 8 10 12 14 16 18 
Password 
Biometrics 
Number of People 
Choices 
People's Choice on Accessing Their Secure Properties 
Password 
Biometrics
MIND MAP
JOB DIVISION 
Content & Data Analysis: Yeung Pui Ling 
Frame Animation: Cheng Wing Lam 
Video sourcing: Luo Yi Lin

More Related Content

Viewers also liked

Coöperatieve spelen 2: Doorgeven
Coöperatieve spelen 2: DoorgevenCoöperatieve spelen 2: Doorgeven
Coöperatieve spelen 2: DoorgevenBert van der Neut
 
Registros de los Microprocesadores
Registros de los MicroprocesadoresRegistros de los Microprocesadores
Registros de los Microprocesadores
josep urdaneta
 
My home town sustainability
My home town sustainabilityMy home town sustainability
My home town sustainability
Ali Alshock
 
Ppt0000002
Ppt0000002Ppt0000002
Ppt0000002
cip3028
 
I like how it feels
I like how it feelsI like how it feels
I like how it feels
RoyB
 
Interaktív oktatás - rajz mobileszközön
Interaktív oktatás - rajz mobileszközönInteraktív oktatás - rajz mobileszközön
Interaktív oktatás - rajz mobileszközön
andreabedo
 
Az erdő a turista szemével
Az erdő a turista szemévelAz erdő a turista szemével
Az erdő a turista szemével
andreabedo
 

Viewers also liked (9)

Coöperatieve spelen 2: Doorgeven
Coöperatieve spelen 2: DoorgevenCoöperatieve spelen 2: Doorgeven
Coöperatieve spelen 2: Doorgeven
 
Registros de los Microprocesadores
Registros de los MicroprocesadoresRegistros de los Microprocesadores
Registros de los Microprocesadores
 
Semantik
SemantikSemantik
Semantik
 
My home town sustainability
My home town sustainabilityMy home town sustainability
My home town sustainability
 
Ppt0000002
Ppt0000002Ppt0000002
Ppt0000002
 
I like how it feels
I like how it feelsI like how it feels
I like how it feels
 
Tanarseged
TanarsegedTanarseged
Tanarseged
 
Interaktív oktatás - rajz mobileszközön
Interaktív oktatás - rajz mobileszközönInteraktív oktatás - rajz mobileszközön
Interaktív oktatás - rajz mobileszközön
 
Az erdő a turista szemével
Az erdő a turista szemévelAz erdő a turista szemével
Az erdő a turista szemével
 

Similar to 14222825 pss7

Consumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite GroupConsumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite Group
TransUnion
 
Codesafe Voucher Report Final Feb
Codesafe Voucher Report Final FebCodesafe Voucher Report Final Feb
Codesafe Voucher Report Final Feb
David Broadhurst
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in Education
Bloxx
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for Education
Bloxx
 
Application-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdfApplication-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdf
Anil
 
Application-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdfApplication-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdf
Anil
 
The Case for Voice + Face Recognition
The Case for Voice + Face RecognitionThe Case for Voice + Face Recognition
The Case for Voice + Face Recognition
derektop
 
Three trends in cybersecurity
Three trends in cybersecurityThree trends in cybersecurity
Three trends in cybersecurity
Alexander Deucalion
 
Implementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile IdentityImplementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile Identity
Jeff Green
 
Usabiltyvs Security Case study of SmartPhone OS
Usabiltyvs Security Case study of SmartPhone OSUsabiltyvs Security Case study of SmartPhone OS
Usabiltyvs Security Case study of SmartPhone OS
Rajiv Ranjan Singh
 
DigiSight Technologies
DigiSight TechnologiesDigiSight Technologies
DigiSight Technologies
Healthegy
 
Fingerprint technology in our lives
Fingerprint technology in our livesFingerprint technology in our lives
Fingerprint technology in our lives
codykong
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
ijtsrd
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
Adesh Singh
 
Digital Assurance - Today & Tomorrow
Digital Assurance - Today & TomorrowDigital Assurance - Today & Tomorrow
Digital Assurance - Today & Tomorrow
Agile Testing Alliance
 
Transparency and Contracts: Continuous Integration and Delivery in the Automo...
Transparency and Contracts: Continuous Integration and Delivery in the Automo...Transparency and Contracts: Continuous Integration and Delivery in the Automo...
Transparency and Contracts: Continuous Integration and Delivery in the Automo...
Eric Knauss
 
Top Biometric Scan Solution Providers | Trusted Experts
Top Biometric Scan Solution Providers | Trusted ExpertsTop Biometric Scan Solution Providers | Trusted Experts
Top Biometric Scan Solution Providers | Trusted Experts
Vensysco Infra
 
merged_document
merged_documentmerged_document
merged_document
Nikhil D'souza
 
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET Journal
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
Veridium
 

Similar to 14222825 pss7 (20)

Consumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite GroupConsumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite Group
 
Codesafe Voucher Report Final Feb
Codesafe Voucher Report Final FebCodesafe Voucher Report Final Feb
Codesafe Voucher Report Final Feb
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in Education
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for Education
 
Application-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdfApplication-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdf
 
Application-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdfApplication-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdf
 
The Case for Voice + Face Recognition
The Case for Voice + Face RecognitionThe Case for Voice + Face Recognition
The Case for Voice + Face Recognition
 
Three trends in cybersecurity
Three trends in cybersecurityThree trends in cybersecurity
Three trends in cybersecurity
 
Implementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile IdentityImplementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile Identity
 
Usabiltyvs Security Case study of SmartPhone OS
Usabiltyvs Security Case study of SmartPhone OSUsabiltyvs Security Case study of SmartPhone OS
Usabiltyvs Security Case study of SmartPhone OS
 
DigiSight Technologies
DigiSight TechnologiesDigiSight Technologies
DigiSight Technologies
 
Fingerprint technology in our lives
Fingerprint technology in our livesFingerprint technology in our lives
Fingerprint technology in our lives
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
Digital Assurance - Today & Tomorrow
Digital Assurance - Today & TomorrowDigital Assurance - Today & Tomorrow
Digital Assurance - Today & Tomorrow
 
Transparency and Contracts: Continuous Integration and Delivery in the Automo...
Transparency and Contracts: Continuous Integration and Delivery in the Automo...Transparency and Contracts: Continuous Integration and Delivery in the Automo...
Transparency and Contracts: Continuous Integration and Delivery in the Automo...
 
Top Biometric Scan Solution Providers | Trusted Experts
Top Biometric Scan Solution Providers | Trusted ExpertsTop Biometric Scan Solution Providers | Trusted Experts
Top Biometric Scan Solution Providers | Trusted Experts
 
merged_document
merged_documentmerged_document
merged_document
 
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 

14222825 pss7

  • 1. C H E N G W I N G L A M 1 4 2 2 2 8 2 5 2 4 O C T O B E R 2 0 1 4
  • 2. Introduction of Security Innovation Objective Video Application Advantages Disadvantages Survey Results Mind map Conclusion
  • 3. INTRODUCTION Using individual specific biological characteristic to verify identity for security
  • 4. OBJECTIVE Compare familiarity and acceptance between teenagers and elder people when using biometrics innovation technology
  • 5. HOW BIOMETRICS WORKS IN OUR LIFE
  • 7. ADVANTAGES - Safer and easier life - User-friendly - High levels of accuracy
  • 8. DISADVANTAGES - High cost - Many variables during recognition
  • 9. DATA ANALYSIS 0 2 4 6 8 10 12 10-20 21-30 31-40 41-50 51 or above Number of people Age group What is your age? 10-20 21-30 31-40 41-50 51 or above
  • 10. DATA ANALYSIS 25 20 15 10 5 0 People's Recognition on Security Innovation Face perception Fingerprint recognition Automatic Speech Recognition Retinal scanning Face perception Fingerprint recognition Automatic Speech Recognition Retinal scanning
  • 11. DATA ANALYSIS 12 10 8 6 4 2 0 People's opinion on security innovation reliable user-friendly Number of People Opinions Strongly disagree Disagree Neither disagree nor agree Agree Strongly agree
  • 12. DATA ANALYSIS 0 2 4 6 8 10 12 14 16 18 Password Biometrics Number of People Choices People's Choice on Accessing Their Secure Properties Password Biometrics
  • 14. JOB DIVISION Content & Data Analysis: Yeung Pui Ling Frame Animation: Cheng Wing Lam Video sourcing: Luo Yi Lin