Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Computing Project Proposal Version 15 - January 2015 The application must be submitted using the following form and should not exceed six pages in length.

Computing Project Proposal Version 15 - January 2015 The application must be submitted using the following form and should not exceed six pages in length. The file format to be used for submission is Microsoft WORD. Please do not submit a PDF file as it does not lend itself to easy insertions of comment, if needed. Please do not change the format of this form. Use it as it is! All fields are a must and should be filled in. Student's Name: TAREK ABDELNABY Student's Number: H00020711 Student's Email Address: tarek.abdelnaby@online.liverpool.ac.uk Project Title: Biometrics Authenticate System Proposal Submission Date: 08/19/2016 Version Number of the Proposal: V1.0 DA Class ID: H00020711 Name of DA: Ward Ulmer RMT Class ID: LAUR-906,160811,1,Comp Research Methods Training.201682-3 Name of GDI: Lalit Garg Ethical Checklist Completed: (Yes)? Name of SSM: The Programme: MSc in Information Systems Management Domain: CKIT-521-415 Managing Software Enterprise CKIT-552-115 Managing Organisational Resources CKIT-514-1C15 Info Tech Project Management Proposal approved by: (To be filled in by the DA) Date of the approval: (To be filled in by the DA) Approval confirmed in MiTSA by the Lead Faculty (Dissertation):: (To be completed by the Lead Faculty) Sponsor's Details: (N/A) Sponsor's Background: (Who the sponsor is. Contact name(s). Location.) Sponsor's Agreement: (Has the person you have requested agreed to sponsor the project? Please note that quoting the agreement will suffice at this stage. When the proposal is approved and there is an external sponsor, a document signed by the sponsor agreeing to the project must be sent to the Dissertation Advisor prior to the start of the project. It will be posted in the student's Group File Exchange. The form is found in the Forms section in the RMT class.). The Project Aims and Objectives: The aim and objectives of the research is to discuss the impacts of the use of secondary biometric identification. Note that the biometric technology is becoming a part of our everyday lives. It has recently been used in airport security, building accessing, cars, schools and also the blood banks. However, the use of biometric will require a lot of education and thus it may be difficult. Therefore, the key component in the performance of the biometric system will require enhanced characteristics based on their capabilities and their levels and abilities, which will have an impact on the biometric system. The objectives therefore need to consider, aspects which will bring out the performance of the system which will involve the user acceptance, privacy concerns and the usability. In order to draw the conclusions, a statistical investigation needs to be carried out on the acceptance of the users for the biometric identification. Note that the registration of voters should not be imposed. The identity of the population should also be carried out through the statistical investigation. In the table below, please state your hypothesis or hypotheses; the research methods you will use to guide the development of your IT artefact; the kind of IT artefact you will produce; and the means by which you will evaluate the IT artefact in the light of the hypothesis. Step Hypothesis Research Methods IT Artefact Evaluation Short Description Will be on tThe biometric system will authenticate the voting population located in the remote areas. The research methodology will be based on understanding what the users has to comment about the biometric systems and their acceptance on the use of the biometric identification systems. Therefore, there is the need to conduct a survey for the data collection. The best methodology to use on the primary data will be on the use of interviews within the small group of individuals. The other method which can be used will be on the use of questionnaire which is useful in helping to identify the specific areas of concerns. This will also include on investigating the users' opinions and attitudes towards the biometric expectations. It will also involve collecting demographic and experimental levels which create an impact to the participants' use of biometric systems. It is therefore wise to have significant knowledge and also note the differences on the important factors and the acceptance of the biometric systems. To develop a framework for using biometric systems authenticate the voting population located in the remote areas. The IT artefact will be based on conducting a free data mining in order to explain the research methods carried out and answer the questions. The free data mining will therefore consider the reasons that really influenced the participants on the use of biometric systems. The need to consider a biometric framework is crucial and therefore adopting it in voter registration systems will help accommodate the illiterate population in the remote areas. The best way to carry out evaluation is through interviews. Online sources and literature reviews should also be considered from different individuals. The evaluation should have survey questions which targets on the usability of the biometrics systems. The testing therefore will be on prototype developed and the outcomes against the user acceptance. The results will cover different opinions, attitudes, beliefs, acceptability, challenges faced while using the biometrics and the privacy concerns. This will include people who lack the required identity cards or documents for their identification. Biometric recognition can be described as automated methods to accurately recognize individuals based on distinguishing physiological and/or behavioural traits. It is a subset of the broader field of the science of human identification. Technologies used in biometrics include recognition of fingerprints, faces, vein patterns, irises, voices and keystroke patterns. In verification mode, the system validates a person's identity by comparing the captured biometric characteristic with the individual's biometric template, which is restored in the system database. In such a system, an individual who desires to be recognized. Security and Privacy Concerns Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. But how secure is biometrics? And what are the privacy implications? Biometrics claims an identityusually via a personal identification number (PIN), login name, smart card, or the likeand the system conducts a one-to-one comparison to determine whether the claim is true. The question being answered is, \"Is this person Bob?\" Identity verification is typically used for positive recognition, where the aim is to prevent multiple people from using the same identity. In identification mode, the system recognizes an individual by searching the entire template database for a match. The system conducts a one-to-many comparison to establish an individual's identity (or fails if the subject is not enrolled in the system database). The question being answered is, \"Who is this person?\" Identification is a critical component of negative recognition applications, in which the system establishes whether the person is who she (implicitly or explicitly) denies being. The purpose of negative recognition is to prevent a single person from using multiple identities. Identify- cation can also be used in positive recognition for convenience (because the user is not required to claim an identity). While the traditional methods of personal recognition such as passwords, PINs, keys, and tokens work for positive recognition, only biometrics can be used for negative recognition. Figure 1 contains block diagrams of a verification system and an identification system, both performing the task of user enrolment. The enrolment module registers individuals into the biometric system database. During the enrolment phase, a biometric reader (such as a fingerprint sensor or CCD camera) first scans the individual's biometric characteristic to produce its digital representation. The system generally performs a quality check to ensure that successive stages can reliably process the acquired sample. To facilitate matching, a feature extractor processes the input sample to generate a compact but expressive representation, called a template. Depending on the application, the biometric system might store the template in its central database or record it on a smart card issued to the individual Project Outline When we consider management of the business or the society at large, we basically note on the case of the illiterate and homeless people found in the remote areas. Both the illiterate and homeless people face the challenge when it comes to identity and also when it comes to voting during elections. This research therefore aims at developing a system for the investigation of secondary biometric identification methods for the illiterate voters living in remote areas and also on the identity of the population. Literature Survey / Resources' List: Wayman, J., Jain, A., Maltoni, D., & Maio, D. (2005). An introduction to biometric authentication systems (pp. 1-20). Springer London. Banerjee, S. P., & Woodard, D. L. (2012). Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern Recognition Research, 7(1), 116-139. Jain, A. K., & Nandakumar, K. (2012). Biometric Authentication: System Security and User Privacy. IEEE Computer, 45(11), 87-92. Biometric Advisory System to Analyze a User's Post-Disaster Stress Management,[Online]. Available from:\" http://eds.b.ebscohost.com.liverpool.idm.oclc.org/eds/detail/detail ?sid=0be15b45-34dc-412a-912435112088c4a1%40sessionmgr101&vid=0&hid=104&bdata=JnNpdG U9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d %3d#AN=S221256711401017X&db=edselp\". UoL Library, [Accessed 23 of August 2016]. Practical Biometrics [electronic book] : From Aspiration to Implementation / by Julian Ashbourn. UoL Library,[Online]. Available from:\" http://eds.b.ebscohost.com.liverpool.idm.oclc.org/eds/detail/detail ?sid=1f88bb28-5fca-49fa-80a3872160640538%40sessionmgr104&vid=0&hid=104&bdata=JnNpdG U9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d %3d#AN=lvp.b3855880&db=cat00003a\" [Accessed 23 of August 2016]. Assessment of geometric features for individual identification and verification in biometric hand systems. UoL Library.[Online]. Available from:\" http://eds.b.ebscohost.com.liverpool.idm.oclc.org/eds/detail/detail ?sid=8653ff6e-c336-4947-9809-633079f35bbf %40sessionmgr102&vid=0&hid=104&bdata=JnNpdGU9ZWRzLWx pdmUmc2NvcGU9c2l0ZQ%3d %3d#AN=S0957417412013061&db=edselp\". [Accessed 22 of August 2016]. Biometric Systems [electronic book] : Technology, Design and Performance Evaluation / edited by James Wayman, Anil Jain, Davide Maltoni, Dario Maio.[Online]. Available from:\" http://eds.b.ebscohost.com.liverpool.idm.oclc.org/eds/detail/detail ?sid=d6a6d9b0-5d8f-49b9-9c3d1f39ea366ca4%40sessionmgr103&vid=0&hid=104&bdata=JnNpdG U9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d %3d#AN=lvp.b2147413&db=cat00003a\" . [Accessed 22 of August 2016]. Biometric Recognition: Security and Privacy Concerns. [Online]. Available from: \"http://biometrics.cse.msu.edu/Publications/GeneralBiometrics/Pr abhakarPankantiJain_BiometricSecurityPrivacy_SPM03.pdf\". [Accessed 31 of August 2016]. Scholarly Contributions of the Project (Specify what you consider to be the original aspects of your project in relation to scholarly contributions in Computing/ Information Technology. What does it add to human knowledge? Cite academic papers that discuss this topic, thus showing it has scholarly credibility. Indicate what gap in our knowledge you are trying to fill. This requirement is to demonstrate academic rigour. It will not be enough to show that your project is of interest to a single organisation. It has to be of general interest to scholars and other organisations) Description of the Deliverables: (A deliverable is a product - an outcome in the evolution of a fully implemented project e.g. a programme design or survey design; a completed computer programme, a framework, or set of survey results; test results, a statistical analysis, or the results of an evaluation. Provide a description of expected deliverables. What will be the content delivered upon completion and in what form?) Evaluation Criteria: (Evaluation takes place at the end of the project and must include an evaluation of your artefact in the light of your original hypothesis. It will tell you whether your hypothesis confirmed or rejected. This may include the statistical analysis of evaluation reports or some other form of testing. Identify key objectives that are essential to the success of the project, and describe how you will assess the extent to which they have been achieved. What are the criteria used to measure the success of artefacts in testing your hypothesis? How will you assess whether these criteria have been met?) Resource Plan: (The equipment, software, people and other materials necessary to complete the project, how they are to be provided, and what the financial costs, such as for travel, will be) Project Plan and Timing (Anticipated milestones and interim deliverables. A detailed timetable (schedule) of the stages, including the estimated finishing date, is a must. Stages will be reviewed with the sponsor and DA. Include the major University milestones, such as DS Proposal approval, Project Specification and Design, Implementation, Evaluation, and Write Up) Risk Assessment: (A description of what obstacles may arise and contingency plans to meet them. One aspect that should be considered here is the availability of the software, hardware and people you intend to use and, if you need to interface several pieces of software, whether this is known to be possible. Identify what could go wrong) Quality Assurance: (How progress on your project will be monitored and how success at each stage will be assessed. This may include, but should not be limited to, the formal project assessments. Name people whose feedback will be sought)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Management A Practical Introduction

Authors: Angelo Kinicki, Brian Williams

2nd Edition

1743769849, 978-1743769843

More Books

Students also viewed these General Management questions

Question

=+3. What is sexual harassment? Discuss its two forms.

Answered: 1 week ago

Question

Is there a clear hierarchy of points in my outline?

Answered: 1 week ago