SlideShare a Scribd company logo
1 of 14
Running head: BIOMETRIC MONITORING SYSTEM
1
BIOMETRIC MONITORING SYSTEM
2
Review APA format, Review references, Reread our paper many
sentences with missing words, incomplete thoughts or grammar
errors
Biometric Monitoring System
Term Paper
Tamara Williams
Management of Information Systems
Professor Marco A. Villarreal
Texas A&M University - CT
Introduction
Many companies and businesses need to adopt efficient
employees’ monitoring systems. The management of these
entities should have the ability to check that employees are
within the designated working areas within the stipulated time.
Therefore, the internal staff monitoring system should be
operated in such a way that it ensures that it eliminates the
possibility of an employee lying about their location and what
times they are there. The company’s policy and system should
deny the staff the ability to backtrack time and location, and the
system should not give the employees capacity to perform
relocation editing earlier than it was stated in the system. Firms
in the past have adopted various manual systems as a way of
ascertaining the whereabouts of staff at any given time, for
example, the physical clock-in and clock out the system. In
these systems, the employees should just register their presence
by filling in their names and credentials on an attendance sheet.
Business organizations, schools, and training facilities have
experienced significant challenges as the system allows for
members of an organization to lie about their presence at any
given time. A common problem is when employees form cliques
in which co-workers sign for their colleagues who arrive and
leave their designated areas of work. Whether its later and
earlier than expected, their clock-ins and clock-outs will have
the correct time stamp even if they are not there. The manual
staff monitoring system offers cheaters a creative series of
challenges. An employee who tends to leave their workstations
more frequently, and the other employees that leave their work
areas before their stipulated time, all of which the management
will not detect because of anomalies in the system that will
show the correct time. The overall effect of such weak and
easily-to-manipulate systems in an organization lead to low
staff output and a general decline in the efficiency of the
company.
Going forward, there is a need for business entities, learning
institutions, and premises which requires access from
authorized personnel only to adopt a system which will ensure
that the right person is checking I or out at the right time. The
firms should implement a monitoring system which will seek for
employees’ physical presence whenever one is checking into the
system. Currently, one of the available options for institutions
which need to implement a real-time employee monitoring
system is the adoption of the biometric tracking system. A
biometric system will seek to resolve the problem of voluntary
wrongful reporting over time as the system requires the
presence of the person to sign in or sign out (Nerlikar, 1997). In
this paper, the discussion covers the concept of the
implementation of the biometric monitoring system in
institutions, the objectives of such a step, and the adoption
process. The paper also examines the application process for a
biometric system considering the stakeholders and procedure,
merits that accompany the implementation of a biometric
monitoring system as well as the demerits.
. Biometric technology
The world has been seeking for better ways of managing access
and unique personal identification. Attempts have been made by
scientists towards establishing identification system which will
enhance security and time-correctness. It started with the use of
physically filled charted forms hen the use of key cards and
personal identification cards (Wayman, et al., 2005). Even
though the improvement from the manually filled papers to the
utilization of the personal cards enhanced security, the system
had shortcomings and could still be manipulated for example a
different person using the card no designated to him. In staff
monitoring, it is possible to carry another staff’s card and sign
in or sign out for them though the named cardholder may have
left the premises before them (Wayman, et., 2005). The
shortcomings of the past security and personal identification
systems called for the development of biometric technology and
biometric system.
Biometric technology is the application of biometrics coupled
with technology. Biometrics is a collection of measurable units
about human characteristics. Technologists have applied
scientific knowledge by developing biometric authentication
premised on biometrics as a unique way of managing and
controlling real-time identification and access (Nerlikar, 1997).
Biometric technology offers the requisite scale of uniqueness in
individual identification through measurable entities called the
biometric identifiers. The human identifies connected to
biometrics often have precise and consistent identification
attached to each person. Using the biometric identifiers,
scientists specializing in biometric technology and surveillance
have the ability to build a database that holds the personal
information (Nerlikar, 1997). Currently, the applications of
human biometrics in personal identification and access
restriction have so far categorized the biometric identifiers into
physiological and behavioral identifiers. Whereas the two have
a great potential for application, the physiological biometric
identifiers have received more attention from the biometric
system developers than their behavioral counterparts.
The process of building a biometric system suited for a
customer or an institution will examine the various
requirements before customizing it. Once the user of the
biometric system has been determined, the developers now have
the opportunity to explore appropriate biometric measuring
technique (Wayman, et al., 2005). The choice will be guided by
the customer’s needs, the developer's design, and the total
available finances at the disposal. The biometric measurement
technique application in building surveillance and monitoring
system may include.”
Fingerprint reader
Looking at the magnificence of creation, every individual has a
unique fingerprint. What constitutes a fingerprint? A fingerprint
comprises a set of ridges and furrows unique to a person. The
biometric examine the ridge endings and points of ridge split.
Biometric technology uses various techniques to capture the
formations of the fingers and store them as fingerprints
(Wayman, et al., 2005). Scientist uses ultrasound technologies
and optical scanning to capture and store the finger formations
for identification.
Iris recognition
Science has been able to determine that the human iris has
unique features specific to individuals. Among other
characteristics, the human iris color has been fundamental in
creating uniqueness among people. However, biometric
technology captures and stores close to 200 iris features.
Facial recognition
Biometric technology also uses the face as a unique indenter.
The system takes a photo of an individual and stores it.
However, when it comes to identification, the face is scanned
and cross-referenced in the system. The unique features in the
face examined by the biometric system include the size, shape,
proportion, and the distances between the facial organs, for
example, the nose, eyes, jaw, and mouth. It may also examine
the wrinkle patterns.
Voice recognition
The voice projection by an individual has two entities that can
be applied in the unique identification of people. The biometric
system developers have two voice components the voice track
which examines the physiological component and the voice
accent that establishes the behavioral composition (Nerlikar,
1997). A combination of a speech accent and track creates an
identifier which makes voices unique.
Other biometric measuring technique includes the use of person
DNA and veins patterns.
The implementation of a biometric monitoring system will
require a set of software and hardware. When choosing the
hardware, the customer should examine the size of the business
entity in which the system will be installed, the level of
sophistication required, and the financial capability. Software
needs will greatly depend on the developers and customers
design of the monitoring system (Weaver, 2006). One the
system developer and the client agree and acquire the necessary
software and hardware. The building process will move to the
next phase of system design. The market currently operates two
main biometric monitoring system designs dependent on the
number of biometric identifiers employed in the system process.
The system design can be unimodal or multimodal.
One the client and the developer make a choice of the
monitoring system design, the availability of the required
software and hardware leads to the next stage of system
establishment. The developer will lay down the hardware
components for example scanners, computer systems, and
cabling. Subsequently, there will be the installation of system
software. On completion, the developer will sample a set of data
and carry out a system testing which if successful; the system is
commissioned to the client (Weaver, 2006). A section of the
developer’s system administrators and the client’s IT team then
move on to capture and store the relevant biometrics. It will
involve capturing employees’ facial images, fingerprints, voices
and any other necessary biometric identifier depending on the
design and decision. The team should ensure that all the
biometric of all the people who should have been monitored or
have access are captured (Weaver, 2006). Completed, the
biometric monitoring system will be ready for use.
The users of the system, who is this case are the business
employees, will use the monitoring system for the first time in a
process dubbed as enrollment. The system captures the user's
required biometrics and creates their template in the system
database (Rattani, 2010). The system database user biometric
templates will form the basis of operation of the entire system.
Biometric monitoring system works through two primary cycles
called the system operational modes. The two ways include the
verification and identification which works sequentially to
ensure system success (Weaver, 2006). In the authentication
process, there is a parallel comparison between the biometric
captured and the biometric data stored in the system database. It
begins with the creation of reference models from the entire
user database which are subsequently stored in the model
database. The reference models form a basis for comparing
selected samples (Rattani, 2010). The results of the matching
process are a set of genuine and imposter scores which are
tested using a code or a pin that has been assigned to the person
identified in the system.
The biometric monitoring system may also operate in the
identification mode in which the system runs a one-to-many
comparison analysis of the biometrics of the individual seeking
aces against the database. The acceptability and rejection of the
captured biometric data depend on the predetermined rejection
and acceptance level in the system (Weaver, 2006). The two
operational modes seek to ensure that only designated personnel
use the system. The difference in the working of the two modes
emanates from the idea that identification is independent of user
additional input, unlike verification in which the system asks
the user to confirm his or her identification through other data.
Due to the high dependence of the system on the quality of the
initially captured biometrics, the enrolling process should be
managed carefully and if necessary should be checked for
errors. The system administrator should ensure the Hamming
distance is appropriate for voice recognition, clean fingers
devoid of distractors for fingerprint recognition. It is also
important for the organization to entrust the system
administration and database security to ethical employees to
curb the possibility of sneaking in wrong identification into the
system and identity theft (Weaver, 2006). The management of
the organization through the IT personnel should communicate
the working procedures of the system, its shortcomings, and the
readily available solution. The team should acknowledge the
challenges that are likely to arise during the initial stages of the
system deployment. The communication strategy can include
staff training and publishing of user manuals to help the
employees adapt as quickly as possible to the new system.
Relevance of the Biometric monitoring system
There are various organizational, legal, social, and moral
concerns which the management need to be wary about when
implementing a biometric tracking system. However, a
biometric monitoring system has sufficient features to address
the concerns. Using biometric data as a way of monitoring
employees’ serves to the management concerns of
identification. The system requires the physical presence of an
employee when signing and signing out (Nanavati, Thieme, &
Nanavati, 2002). Therefore, it eliminates the instances
witnessed when using the manual system in which friends have
the chances to record attendance for friends and proxies. The
uniqueness of biometric data used in a biometric monitoring
system, for example, an employee’s voice cannot be shared
among friends. The system has been proven as foolproof and
hence enhances the management’s ability to monitor the
movement of their employees.
Employers have been grappling with ways to credibly and
accurately measure the working hours of their employees.
Complaints and conflicts have been reported arising from
inaccurately recorded hours worked due to the organization
inability to record working hours real-time. Now, the adoption
of the biometric monitoring system gifts the management and
worker’s better ways of maintains employees’ data (Nanavati,
Thieme, & Nanavati, 2002). The biometric tracking system can
be linked automatically to the human resource department to
assist in the preparation of employee records. The printout from
the biometric monitoring system can be presented in court in the
case of an employee-employer conflicts which lead to litigation.
There are concerns regarding the applicability of the system to
all employees given the possibilities of various physical
impairments. Among the staff, there may be problems with
fingers or facial images; however, the biometric monitoring
system offers more than one biometric identifiers (Nanavati,
Thieme, & Nanavati, 2002). The system, therefore, will have
other options for staff with certain impairments. The system
developers will create a complete database for all the employees
to enhance the monitoring process. Its adoption will address the
possible concerns for example discrimination and bias. The use
of a biometric tracking system will reduce the use of paper in
human resource management. Unlike when the office must
prepare and collect employees’’ attendance sheet, the use of
automated system replaces paperwork with technology. The
organization will be relieved of the task of purchasing large
caches of papers for the daily attendance usage.
When an enterprise access points are fitted with biometric
monitoring systems, the management will have an increased
ease of tracking employees’ movement as the employees will
have to punch in the system to exit and enter the premises.
Therefore, when the human resource department sets out to
carry out an assessment of staff concentration and dedication to
designated work, they will have ready data for analysis and
recommendation (Feng, et al., 2010). The management will also
have the ability to profile the workers regarding their
movements and work commitment. With such information at
their disposal, the management has the chance to address
employees’ problems and shortcomings before it weighs down
on the overall work of his/her team and eventually the entire
organization.
Impacts of Biometric monitoring system to the functionality of
the organization
Employees need a certain level of management to devote their
time adequately to work. Mostly, a section of the human
resource continuously examines the vulnerabilities of the
monitoring systems which it exploits. Without proper control
and tracking, employees tend to walk in and out of the work
premises. It results in the workers dedicated very less time to
perform their designated work (Jain, Bolle, & Pankanti, 2006).
Away from the time lost due to the movements, the staffs who
frequently leave their place of work encounter a lot of
distractions which eventually reflects in their work in the form
of low quality work and reduced output. When an organization
installs a biometric monitoring system, the management will
deter irresponsible and unnecessary movement of employees
during working hours. It results in increased workforce
dedicated to working and minimizes the level of distractions
among the workforce (Nerlikar, 1997). The organization is
henceforth able to channel employees’ energy in productive
work amidst reduced disturbances which will lead to increased
output. The output will also be of high quality and promptly.
The daily and timely employees’ entry and exit data generated
from the biometric monitoring system forms a sound basis for
the management to enforce accountability concerns. The
organization with have sufficient data to ensure that workers are
only paid for the time-of-service rendered. The readily available
data on employee work attendance will minimize causes and
cases of employer-employee conflicts. The organization will,
therefore, cultivate the principles of accountability and justice
(Nerlikar, 1997). In addition to managing the employee
movement, the biometric monitoring system will create a
favorable environment for the organization to track their
employees closely. Such allows the human resource managers to
address personal employee problems early in the stage of
development.
Biometric monitoring system enhances the accurate
identification of employees seeking access to organization
premises. Given the specifications of the biometric systems,
there will be reduced chances of unauthorized access that would
otherwise compromise the security of the firm and its resources.
The biometric systems also use unique personal identifiers
embedded in or on people who reduce the possibility of
impersonation and theft of the access credentials (Weaver,
2006). The idea that login and access credentials are no longer
carried separately is of great convenience. It eliminates the need
to carry along badges and identification cards. The biometric
monitoring system has a high versatility as the organization will
have many options of biometric scanning devices depending on
the area and target of application.
Challenges faced in having to apply the Biometric Monitoring
System
The decision to deploy a biometric monitoring system
encounters different problems some general to the adoption of
the technology while some are unique to business. The
organization faces legal, social, and economic challenges
(Mordini, & Tzovaras, 2012). The deployment of the biometric
system in an organization is subject to government regulation.
The client implementation the system must adhere to and uphold
a series of the rules and laws. The government agencies often
than carry out sporadic checks to ascertain compliance. The
rules seek to ensure that the deploying organization has
complied with all relevant rules and sort certification. One area
of concern is the susceptibility of the system to bias and
information theft (Mordini, & Tzovaras, 2012). Therefore, the
institution's implementation process may be halted or delayed
by the government. Companies implementing a monitoring
system with biometrics as the unique identify usually face the
challenge of poor finances to install the best possible system
(Weaver, 2006). In such cases, the company misses out on
specific benefits and efficiency which would have otherwise
accompanied the superior designs. A company may which to
establish a biometric system which uses three or four biometric
identifiers. However, it settles only on a two bio-identifiers due
to less funding. The implementation of a biometric monitoring
system also puts users at risks of information leakage.
The personal information gathered in the course of designing
the system may reveal serious health problems which should not
be shared without authorization. Concerns have arose
questioning the security of network premises and structures
protected by the biometric monitoring system. Security experts
have cautioned managers to be wary of possibilities staff
abduction and subsequently being forced to access the business
premises against will. Another concern which has been raised
about biometric monitoring system is the inability to cancel and
replace access authorization (Mordini, & Tzovaras, 2012).
Unlike cards and pins which can easily be changed and reissued,
biometrics remains constant with no allowance for modification.
The initial stages of system deployment in the organization will
result in delays, interferences, and uneasiness among the
employees. The thought of being constantly monitored by the
management may irk some of the employees hence create
unnecessary fear. In general, the deployment of a biometric
system will face some challenges both internally and externally.
Whereas the problems may have adverse effects on the
operation of an organization If not addressed in time, the
management can tackle them with little effort and personnel
deployment.
Conclusion
Organization management has the role of managing the human
resource to ensure proper labor output. The organization should
be able to check on the employees’ arrival time to work and
departure time from work. Just checking on the time in and
time-out of the employees is not enough; the management needs
to establish the actual time their staffs spend on the designated
work. The use of manual monitoring systems has been marred
by some challenges which informed the transition to the
biometric monitoring systems currently employed in many
organizations. Biometric monitoring system, unlike manual
systems, uses biometric identifiers in establishing and tracking
the performance of employees. The system monitors employees’
time at work keeping track of arrival and departure times. The
automated system improves human resource management
through enhanced accountability and responsibility. The staff
will tend to dedicate more time to work and avoid disruptions
which result in increased output both in quality and quantity.
The adoption of the biometric monitoring system is relevant and
timely for organizations as it solves the challenges
organizations face regarding human resources management
especially regarding tracking. However, the implementation of
the biometric system faces the challenges of cost, reliability,
security concerns, and effective in attaining better employee
output. Despite the challenges enumerated, careful planning,
deployment, and use of biometric monitoring systems will soft
enhance efficiency within the organization.
References
Feng, Y. C., Yuen, P. C., & Jain, A. K. (2010). A hybrid
approach for generating secure and discriminating face
template. IEEE transactions on information forensics and
security, 5(1), 103-117.
Jain, A., Bolle, R., & Pankanti, S. (Eds.). (2006). Biometrics:
personal identification in networked society (Vol. 479).
Springer Science & Business Media.
Mordini, E., & Tzovaras, D. (Eds.). (2012). Second generation
biometrics: The ethical, legal and social context (Vol. 11).
Springer Science & Business Media.
Nanavati, S., Thieme, M., & Nanavati, R. (2002). Biometrics:
identity verification in a networked world (Vol. 20). John Wiley
& Sons.
Nerlikar, V. M. (1997). U.S. Patent No. 5,629,981. Washington,
DC: U.S. Patent and Trademark Office.
Rattani, A. (2010). Adaptive biometric system based on
template update procedures. Ph. D. dissertation.
Wayman, J., Jain, A., Maltoni, D., & Maio, D. (2005). An
introduction to biometric authentication systems. Biometric
Systems, 1-20.
Weaver, A. C. (2006). Biometric authentication. Computer,
39(2), 96-97.

More Related Content

Similar to Running head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docx

Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance System
ijtsrd
 
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEM
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEMIMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEM
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEM
AM Publications,India
 
Security Audits of Electronic Health I.docx
Security Audits of Electronic Health I.docxSecurity Audits of Electronic Health I.docx
Security Audits of Electronic Health I.docx
kenjordan97598
 
Security Audits of Electronic Health I.docx
Security Audits of Electronic Health I.docxSecurity Audits of Electronic Health I.docx
Security Audits of Electronic Health I.docx
bagotjesusa
 

Similar to Running head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docx (20)

User Identity Verification Using Mouse Signature
User Identity Verification Using Mouse SignatureUser Identity Verification Using Mouse Signature
User Identity Verification Using Mouse Signature
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognition
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
 
An Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsAn Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse Movements
 
Best biometric system in market with AI.pdf
Best biometric system in market with AI.pdfBest biometric system in market with AI.pdf
Best biometric system in market with AI.pdf
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
Enhancing Security and Efficiency The Power of Biometric Access Control Systems
Enhancing Security and Efficiency The Power of Biometric Access Control SystemsEnhancing Security and Efficiency The Power of Biometric Access Control Systems
Enhancing Security and Efficiency The Power of Biometric Access Control Systems
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
 
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance System
 
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEM
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEMIMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEM
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEM
 
Implement fingerprint authentication for employee automation system
Implement fingerprint authentication for employee automation systemImplement fingerprint authentication for employee automation system
Implement fingerprint authentication for employee automation system
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
Security Audits of Electronic Health I.docx
Security Audits of Electronic Health I.docxSecurity Audits of Electronic Health I.docx
Security Audits of Electronic Health I.docx
 
Security Audits of Electronic Health I.docx
Security Audits of Electronic Health I.docxSecurity Audits of Electronic Health I.docx
Security Audits of Electronic Health I.docx
 

More from susanschei

Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docxSrc TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
susanschei
 
SPT 208 Final Project Guidelines and Rubric Overview .docx
SPT 208 Final Project Guidelines and Rubric  Overview .docxSPT 208 Final Project Guidelines and Rubric  Overview .docx
SPT 208 Final Project Guidelines and Rubric Overview .docx
susanschei
 
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docxSsalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
susanschei
 
Spring 2020Professor Tim SmithE mail [email protected]Teach.docx
Spring 2020Professor Tim SmithE mail [email protected]Teach.docxSpring 2020Professor Tim SmithE mail [email protected]Teach.docx
Spring 2020Professor Tim SmithE mail [email protected]Teach.docx
susanschei
 
Spring 2020Carlow University Department of Psychology & Co.docx
Spring 2020Carlow University Department of Psychology & Co.docxSpring 2020Carlow University Department of Psychology & Co.docx
Spring 2020Carlow University Department of Psychology & Co.docx
susanschei
 
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docx
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docxSPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docx
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docx
susanschei
 
Sport Ticket sales staff trainingChapter 4Sales .docx
Sport Ticket sales staff trainingChapter 4Sales .docxSport Ticket sales staff trainingChapter 4Sales .docx
Sport Ticket sales staff trainingChapter 4Sales .docx
susanschei
 
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docx
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docxSPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docx
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docx
susanschei
 
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docxSponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
susanschei
 
SPM 4723 Annotated Bibliography You second major proje.docx
SPM 4723 Annotated Bibliography You second major proje.docxSPM 4723 Annotated Bibliography You second major proje.docx
SPM 4723 Annotated Bibliography You second major proje.docx
susanschei
 
Speech Environment and Recording Requirements• You must have a.docx
Speech Environment and Recording Requirements• You must have a.docxSpeech Environment and Recording Requirements• You must have a.docx
Speech Environment and Recording Requirements• You must have a.docx
susanschei
 
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docxSped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
susanschei
 
Speech Recognition in the Electronic Health Record (2013 u.docx
Speech Recognition in the Electronic Health Record (2013 u.docxSpeech Recognition in the Electronic Health Record (2013 u.docx
Speech Recognition in the Electronic Health Record (2013 u.docx
susanschei
 
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docx
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docxSped Focus Group.m4aJodee [000001] This is a focus group wi.docx
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docx
susanschei
 
Specialized Terms 20.0 Definitions and examples of specialized.docx
Specialized Terms 20.0 Definitions and examples of specialized.docxSpecialized Terms 20.0 Definitions and examples of specialized.docx
Specialized Terms 20.0 Definitions and examples of specialized.docx
susanschei
 
Special notes Media and the media are plural and take plural verb.docx
Special notes Media and the media are plural and take plural verb.docxSpecial notes Media and the media are plural and take plural verb.docx
Special notes Media and the media are plural and take plural verb.docx
susanschei
 
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docxSPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
susanschei
 
SPECIAL ISSUE CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
SPECIAL ISSUE  CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docxSPECIAL ISSUE  CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
SPECIAL ISSUE CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
susanschei
 

More from susanschei (20)

Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docxSrc TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
 
SPT 208 Final Project Guidelines and Rubric Overview .docx
SPT 208 Final Project Guidelines and Rubric  Overview .docxSPT 208 Final Project Guidelines and Rubric  Overview .docx
SPT 208 Final Project Guidelines and Rubric Overview .docx
 
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docxSsalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
 
Spring 2020Professor Tim SmithE mail [email protected]Teach.docx
Spring 2020Professor Tim SmithE mail [email protected]Teach.docxSpring 2020Professor Tim SmithE mail [email protected]Teach.docx
Spring 2020Professor Tim SmithE mail [email protected]Teach.docx
 
Spring 2020 – Business Continuity & Disaster R.docx
Spring 2020 – Business Continuity & Disaster R.docxSpring 2020 – Business Continuity & Disaster R.docx
Spring 2020 – Business Continuity & Disaster R.docx
 
Sports Business Landscape Graphic OrganizerContent.docx
Sports Business Landscape Graphic OrganizerContent.docxSports Business Landscape Graphic OrganizerContent.docx
Sports Business Landscape Graphic OrganizerContent.docx
 
Spring 2020Carlow University Department of Psychology & Co.docx
Spring 2020Carlow University Department of Psychology & Co.docxSpring 2020Carlow University Department of Psychology & Co.docx
Spring 2020Carlow University Department of Psychology & Co.docx
 
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docx
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docxSPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docx
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docx
 
Sport Ticket sales staff trainingChapter 4Sales .docx
Sport Ticket sales staff trainingChapter 4Sales .docxSport Ticket sales staff trainingChapter 4Sales .docx
Sport Ticket sales staff trainingChapter 4Sales .docx
 
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docx
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docxSPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docx
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docx
 
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docxSponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
 
SPM 4723 Annotated Bibliography You second major proje.docx
SPM 4723 Annotated Bibliography You second major proje.docxSPM 4723 Annotated Bibliography You second major proje.docx
SPM 4723 Annotated Bibliography You second major proje.docx
 
Speech Environment and Recording Requirements• You must have a.docx
Speech Environment and Recording Requirements• You must have a.docxSpeech Environment and Recording Requirements• You must have a.docx
Speech Environment and Recording Requirements• You must have a.docx
 
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docxSped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
 
Speech Recognition in the Electronic Health Record (2013 u.docx
Speech Recognition in the Electronic Health Record (2013 u.docxSpeech Recognition in the Electronic Health Record (2013 u.docx
Speech Recognition in the Electronic Health Record (2013 u.docx
 
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docx
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docxSped Focus Group.m4aJodee [000001] This is a focus group wi.docx
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docx
 
Specialized Terms 20.0 Definitions and examples of specialized.docx
Specialized Terms 20.0 Definitions and examples of specialized.docxSpecialized Terms 20.0 Definitions and examples of specialized.docx
Specialized Terms 20.0 Definitions and examples of specialized.docx
 
Special notes Media and the media are plural and take plural verb.docx
Special notes Media and the media are plural and take plural verb.docxSpecial notes Media and the media are plural and take plural verb.docx
Special notes Media and the media are plural and take plural verb.docx
 
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docxSPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
 
SPECIAL ISSUE CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
SPECIAL ISSUE  CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docxSPECIAL ISSUE  CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
SPECIAL ISSUE CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
 

Recently uploaded

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 

Recently uploaded (20)

OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 

Running head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docx

  • 1. Running head: BIOMETRIC MONITORING SYSTEM 1 BIOMETRIC MONITORING SYSTEM 2 Review APA format, Review references, Reread our paper many sentences with missing words, incomplete thoughts or grammar errors Biometric Monitoring System Term Paper Tamara Williams Management of Information Systems Professor Marco A. Villarreal Texas A&M University - CT Introduction Many companies and businesses need to adopt efficient employees’ monitoring systems. The management of these entities should have the ability to check that employees are within the designated working areas within the stipulated time. Therefore, the internal staff monitoring system should be operated in such a way that it ensures that it eliminates the possibility of an employee lying about their location and what times they are there. The company’s policy and system should deny the staff the ability to backtrack time and location, and the
  • 2. system should not give the employees capacity to perform relocation editing earlier than it was stated in the system. Firms in the past have adopted various manual systems as a way of ascertaining the whereabouts of staff at any given time, for example, the physical clock-in and clock out the system. In these systems, the employees should just register their presence by filling in their names and credentials on an attendance sheet. Business organizations, schools, and training facilities have experienced significant challenges as the system allows for members of an organization to lie about their presence at any given time. A common problem is when employees form cliques in which co-workers sign for their colleagues who arrive and leave their designated areas of work. Whether its later and earlier than expected, their clock-ins and clock-outs will have the correct time stamp even if they are not there. The manual staff monitoring system offers cheaters a creative series of challenges. An employee who tends to leave their workstations more frequently, and the other employees that leave their work areas before their stipulated time, all of which the management will not detect because of anomalies in the system that will show the correct time. The overall effect of such weak and easily-to-manipulate systems in an organization lead to low staff output and a general decline in the efficiency of the company. Going forward, there is a need for business entities, learning institutions, and premises which requires access from authorized personnel only to adopt a system which will ensure that the right person is checking I or out at the right time. The firms should implement a monitoring system which will seek for employees’ physical presence whenever one is checking into the system. Currently, one of the available options for institutions which need to implement a real-time employee monitoring system is the adoption of the biometric tracking system. A biometric system will seek to resolve the problem of voluntary wrongful reporting over time as the system requires the
  • 3. presence of the person to sign in or sign out (Nerlikar, 1997). In this paper, the discussion covers the concept of the implementation of the biometric monitoring system in institutions, the objectives of such a step, and the adoption process. The paper also examines the application process for a biometric system considering the stakeholders and procedure, merits that accompany the implementation of a biometric monitoring system as well as the demerits. . Biometric technology The world has been seeking for better ways of managing access and unique personal identification. Attempts have been made by scientists towards establishing identification system which will enhance security and time-correctness. It started with the use of physically filled charted forms hen the use of key cards and personal identification cards (Wayman, et al., 2005). Even though the improvement from the manually filled papers to the utilization of the personal cards enhanced security, the system had shortcomings and could still be manipulated for example a different person using the card no designated to him. In staff monitoring, it is possible to carry another staff’s card and sign in or sign out for them though the named cardholder may have left the premises before them (Wayman, et., 2005). The shortcomings of the past security and personal identification systems called for the development of biometric technology and biometric system. Biometric technology is the application of biometrics coupled with technology. Biometrics is a collection of measurable units about human characteristics. Technologists have applied scientific knowledge by developing biometric authentication premised on biometrics as a unique way of managing and controlling real-time identification and access (Nerlikar, 1997). Biometric technology offers the requisite scale of uniqueness in individual identification through measurable entities called the biometric identifiers. The human identifies connected to
  • 4. biometrics often have precise and consistent identification attached to each person. Using the biometric identifiers, scientists specializing in biometric technology and surveillance have the ability to build a database that holds the personal information (Nerlikar, 1997). Currently, the applications of human biometrics in personal identification and access restriction have so far categorized the biometric identifiers into physiological and behavioral identifiers. Whereas the two have a great potential for application, the physiological biometric identifiers have received more attention from the biometric system developers than their behavioral counterparts. The process of building a biometric system suited for a customer or an institution will examine the various requirements before customizing it. Once the user of the biometric system has been determined, the developers now have the opportunity to explore appropriate biometric measuring technique (Wayman, et al., 2005). The choice will be guided by the customer’s needs, the developer's design, and the total available finances at the disposal. The biometric measurement technique application in building surveillance and monitoring system may include.” Fingerprint reader Looking at the magnificence of creation, every individual has a unique fingerprint. What constitutes a fingerprint? A fingerprint comprises a set of ridges and furrows unique to a person. The biometric examine the ridge endings and points of ridge split. Biometric technology uses various techniques to capture the formations of the fingers and store them as fingerprints (Wayman, et al., 2005). Scientist uses ultrasound technologies and optical scanning to capture and store the finger formations for identification. Iris recognition Science has been able to determine that the human iris has
  • 5. unique features specific to individuals. Among other characteristics, the human iris color has been fundamental in creating uniqueness among people. However, biometric technology captures and stores close to 200 iris features. Facial recognition Biometric technology also uses the face as a unique indenter. The system takes a photo of an individual and stores it. However, when it comes to identification, the face is scanned and cross-referenced in the system. The unique features in the face examined by the biometric system include the size, shape, proportion, and the distances between the facial organs, for example, the nose, eyes, jaw, and mouth. It may also examine the wrinkle patterns. Voice recognition The voice projection by an individual has two entities that can be applied in the unique identification of people. The biometric system developers have two voice components the voice track which examines the physiological component and the voice accent that establishes the behavioral composition (Nerlikar, 1997). A combination of a speech accent and track creates an identifier which makes voices unique. Other biometric measuring technique includes the use of person DNA and veins patterns. The implementation of a biometric monitoring system will require a set of software and hardware. When choosing the hardware, the customer should examine the size of the business entity in which the system will be installed, the level of sophistication required, and the financial capability. Software needs will greatly depend on the developers and customers design of the monitoring system (Weaver, 2006). One the system developer and the client agree and acquire the necessary software and hardware. The building process will move to the
  • 6. next phase of system design. The market currently operates two main biometric monitoring system designs dependent on the number of biometric identifiers employed in the system process. The system design can be unimodal or multimodal. One the client and the developer make a choice of the monitoring system design, the availability of the required software and hardware leads to the next stage of system establishment. The developer will lay down the hardware components for example scanners, computer systems, and cabling. Subsequently, there will be the installation of system software. On completion, the developer will sample a set of data and carry out a system testing which if successful; the system is commissioned to the client (Weaver, 2006). A section of the developer’s system administrators and the client’s IT team then move on to capture and store the relevant biometrics. It will involve capturing employees’ facial images, fingerprints, voices and any other necessary biometric identifier depending on the design and decision. The team should ensure that all the biometric of all the people who should have been monitored or have access are captured (Weaver, 2006). Completed, the biometric monitoring system will be ready for use. The users of the system, who is this case are the business employees, will use the monitoring system for the first time in a process dubbed as enrollment. The system captures the user's required biometrics and creates their template in the system database (Rattani, 2010). The system database user biometric templates will form the basis of operation of the entire system. Biometric monitoring system works through two primary cycles called the system operational modes. The two ways include the verification and identification which works sequentially to ensure system success (Weaver, 2006). In the authentication process, there is a parallel comparison between the biometric captured and the biometric data stored in the system database. It begins with the creation of reference models from the entire
  • 7. user database which are subsequently stored in the model database. The reference models form a basis for comparing selected samples (Rattani, 2010). The results of the matching process are a set of genuine and imposter scores which are tested using a code or a pin that has been assigned to the person identified in the system. The biometric monitoring system may also operate in the identification mode in which the system runs a one-to-many comparison analysis of the biometrics of the individual seeking aces against the database. The acceptability and rejection of the captured biometric data depend on the predetermined rejection and acceptance level in the system (Weaver, 2006). The two operational modes seek to ensure that only designated personnel use the system. The difference in the working of the two modes emanates from the idea that identification is independent of user additional input, unlike verification in which the system asks the user to confirm his or her identification through other data. Due to the high dependence of the system on the quality of the initially captured biometrics, the enrolling process should be managed carefully and if necessary should be checked for errors. The system administrator should ensure the Hamming distance is appropriate for voice recognition, clean fingers devoid of distractors for fingerprint recognition. It is also important for the organization to entrust the system administration and database security to ethical employees to curb the possibility of sneaking in wrong identification into the system and identity theft (Weaver, 2006). The management of the organization through the IT personnel should communicate the working procedures of the system, its shortcomings, and the readily available solution. The team should acknowledge the challenges that are likely to arise during the initial stages of the system deployment. The communication strategy can include staff training and publishing of user manuals to help the employees adapt as quickly as possible to the new system.
  • 8. Relevance of the Biometric monitoring system There are various organizational, legal, social, and moral concerns which the management need to be wary about when implementing a biometric tracking system. However, a biometric monitoring system has sufficient features to address the concerns. Using biometric data as a way of monitoring employees’ serves to the management concerns of identification. The system requires the physical presence of an employee when signing and signing out (Nanavati, Thieme, & Nanavati, 2002). Therefore, it eliminates the instances witnessed when using the manual system in which friends have the chances to record attendance for friends and proxies. The uniqueness of biometric data used in a biometric monitoring system, for example, an employee’s voice cannot be shared among friends. The system has been proven as foolproof and hence enhances the management’s ability to monitor the movement of their employees. Employers have been grappling with ways to credibly and accurately measure the working hours of their employees. Complaints and conflicts have been reported arising from inaccurately recorded hours worked due to the organization inability to record working hours real-time. Now, the adoption of the biometric monitoring system gifts the management and worker’s better ways of maintains employees’ data (Nanavati, Thieme, & Nanavati, 2002). The biometric tracking system can be linked automatically to the human resource department to assist in the preparation of employee records. The printout from the biometric monitoring system can be presented in court in the case of an employee-employer conflicts which lead to litigation. There are concerns regarding the applicability of the system to all employees given the possibilities of various physical impairments. Among the staff, there may be problems with
  • 9. fingers or facial images; however, the biometric monitoring system offers more than one biometric identifiers (Nanavati, Thieme, & Nanavati, 2002). The system, therefore, will have other options for staff with certain impairments. The system developers will create a complete database for all the employees to enhance the monitoring process. Its adoption will address the possible concerns for example discrimination and bias. The use of a biometric tracking system will reduce the use of paper in human resource management. Unlike when the office must prepare and collect employees’’ attendance sheet, the use of automated system replaces paperwork with technology. The organization will be relieved of the task of purchasing large caches of papers for the daily attendance usage. When an enterprise access points are fitted with biometric monitoring systems, the management will have an increased ease of tracking employees’ movement as the employees will have to punch in the system to exit and enter the premises. Therefore, when the human resource department sets out to carry out an assessment of staff concentration and dedication to designated work, they will have ready data for analysis and recommendation (Feng, et al., 2010). The management will also have the ability to profile the workers regarding their movements and work commitment. With such information at their disposal, the management has the chance to address employees’ problems and shortcomings before it weighs down on the overall work of his/her team and eventually the entire organization. Impacts of Biometric monitoring system to the functionality of the organization Employees need a certain level of management to devote their time adequately to work. Mostly, a section of the human resource continuously examines the vulnerabilities of the monitoring systems which it exploits. Without proper control
  • 10. and tracking, employees tend to walk in and out of the work premises. It results in the workers dedicated very less time to perform their designated work (Jain, Bolle, & Pankanti, 2006). Away from the time lost due to the movements, the staffs who frequently leave their place of work encounter a lot of distractions which eventually reflects in their work in the form of low quality work and reduced output. When an organization installs a biometric monitoring system, the management will deter irresponsible and unnecessary movement of employees during working hours. It results in increased workforce dedicated to working and minimizes the level of distractions among the workforce (Nerlikar, 1997). The organization is henceforth able to channel employees’ energy in productive work amidst reduced disturbances which will lead to increased output. The output will also be of high quality and promptly. The daily and timely employees’ entry and exit data generated from the biometric monitoring system forms a sound basis for the management to enforce accountability concerns. The organization with have sufficient data to ensure that workers are only paid for the time-of-service rendered. The readily available data on employee work attendance will minimize causes and cases of employer-employee conflicts. The organization will, therefore, cultivate the principles of accountability and justice (Nerlikar, 1997). In addition to managing the employee movement, the biometric monitoring system will create a favorable environment for the organization to track their employees closely. Such allows the human resource managers to address personal employee problems early in the stage of development. Biometric monitoring system enhances the accurate identification of employees seeking access to organization premises. Given the specifications of the biometric systems, there will be reduced chances of unauthorized access that would otherwise compromise the security of the firm and its resources.
  • 11. The biometric systems also use unique personal identifiers embedded in or on people who reduce the possibility of impersonation and theft of the access credentials (Weaver, 2006). The idea that login and access credentials are no longer carried separately is of great convenience. It eliminates the need to carry along badges and identification cards. The biometric monitoring system has a high versatility as the organization will have many options of biometric scanning devices depending on the area and target of application. Challenges faced in having to apply the Biometric Monitoring System The decision to deploy a biometric monitoring system encounters different problems some general to the adoption of the technology while some are unique to business. The organization faces legal, social, and economic challenges (Mordini, & Tzovaras, 2012). The deployment of the biometric system in an organization is subject to government regulation. The client implementation the system must adhere to and uphold a series of the rules and laws. The government agencies often than carry out sporadic checks to ascertain compliance. The rules seek to ensure that the deploying organization has complied with all relevant rules and sort certification. One area of concern is the susceptibility of the system to bias and information theft (Mordini, & Tzovaras, 2012). Therefore, the institution's implementation process may be halted or delayed by the government. Companies implementing a monitoring system with biometrics as the unique identify usually face the challenge of poor finances to install the best possible system (Weaver, 2006). In such cases, the company misses out on specific benefits and efficiency which would have otherwise accompanied the superior designs. A company may which to establish a biometric system which uses three or four biometric identifiers. However, it settles only on a two bio-identifiers due to less funding. The implementation of a biometric monitoring
  • 12. system also puts users at risks of information leakage. The personal information gathered in the course of designing the system may reveal serious health problems which should not be shared without authorization. Concerns have arose questioning the security of network premises and structures protected by the biometric monitoring system. Security experts have cautioned managers to be wary of possibilities staff abduction and subsequently being forced to access the business premises against will. Another concern which has been raised about biometric monitoring system is the inability to cancel and replace access authorization (Mordini, & Tzovaras, 2012). Unlike cards and pins which can easily be changed and reissued, biometrics remains constant with no allowance for modification. The initial stages of system deployment in the organization will result in delays, interferences, and uneasiness among the employees. The thought of being constantly monitored by the management may irk some of the employees hence create unnecessary fear. In general, the deployment of a biometric system will face some challenges both internally and externally. Whereas the problems may have adverse effects on the operation of an organization If not addressed in time, the management can tackle them with little effort and personnel deployment. Conclusion Organization management has the role of managing the human resource to ensure proper labor output. The organization should be able to check on the employees’ arrival time to work and departure time from work. Just checking on the time in and time-out of the employees is not enough; the management needs to establish the actual time their staffs spend on the designated work. The use of manual monitoring systems has been marred
  • 13. by some challenges which informed the transition to the biometric monitoring systems currently employed in many organizations. Biometric monitoring system, unlike manual systems, uses biometric identifiers in establishing and tracking the performance of employees. The system monitors employees’ time at work keeping track of arrival and departure times. The automated system improves human resource management through enhanced accountability and responsibility. The staff will tend to dedicate more time to work and avoid disruptions which result in increased output both in quality and quantity. The adoption of the biometric monitoring system is relevant and timely for organizations as it solves the challenges organizations face regarding human resources management especially regarding tracking. However, the implementation of the biometric system faces the challenges of cost, reliability, security concerns, and effective in attaining better employee output. Despite the challenges enumerated, careful planning, deployment, and use of biometric monitoring systems will soft enhance efficiency within the organization. References Feng, Y. C., Yuen, P. C., & Jain, A. K. (2010). A hybrid approach for generating secure and discriminating face template. IEEE transactions on information forensics and security, 5(1), 103-117. Jain, A., Bolle, R., & Pankanti, S. (Eds.). (2006). Biometrics: personal identification in networked society (Vol. 479). Springer Science & Business Media. Mordini, E., & Tzovaras, D. (Eds.). (2012). Second generation biometrics: The ethical, legal and social context (Vol. 11). Springer Science & Business Media. Nanavati, S., Thieme, M., & Nanavati, R. (2002). Biometrics: identity verification in a networked world (Vol. 20). John Wiley
  • 14. & Sons. Nerlikar, V. M. (1997). U.S. Patent No. 5,629,981. Washington, DC: U.S. Patent and Trademark Office. Rattani, A. (2010). Adaptive biometric system based on template update procedures. Ph. D. dissertation. Wayman, J., Jain, A., Maltoni, D., & Maio, D. (2005). An introduction to biometric authentication systems. Biometric Systems, 1-20. Weaver, A. C. (2006). Biometric authentication. Computer, 39(2), 96-97.