Information Technology Reference
In-Depth Information
4.
I think that this device would be physically
invasive.
I think I would use this device.
vignette 4:
5.
Jane goes to the bank to get cash out of the ATM
machine. In lieu of a passcode and ATM card, the
transaction is authorized and her identity authen-
ticated by the use of a fingerprint scanner. She
has to press her thumb on a biometric device and
the device scans her thumbprint instantaneously
to access the records pertaining to her.
vignette 2:
Birsel goes to the airport to visit Turkey. A facial
scanner is used upon entering the airport, where
the image is compared against a database of
known criminal offenders, to prevent the entry
of undesirable persons to the sterile area of the
airport. She has to step on a marked spot and look
at a camera for a few seconds in order to have her
face scanned to compare it with this database.
1.
2.
3.
I think this biometric device is useful.
I think this biometric device is easy to use.
I think one of the reasons this device is useful
is because of its ease of use.
I think that this device would be physically
invasive.
I think I would use this device.
4.
1.
2.
3.
I think this biometric device is useful.
I think this biometric device is easy to use.
I think one of the reasons this device is useful
is because of its ease of use.
I think that this device would be physically
invasive.
I think I would use this device.
5.
vignette 5:
4.
Peter works for a data center that contains highly
sensitive information and expensive equipment.
The data center tracks the times that the individual
enters and exits the data center. Peter enters the
data center by using a hand geometry scanner and
to exit the data center he has to also use a hand
geometry scanner. To use the device, Peter has
to place his hand on the hand geometry scanner
for a few seconds upon entry and exit to the data
center.
5.
vignette 3:
Ken works at a bio-chemical company where
sensitive research on cloning practices is taking
place. This area of the company contains com-
puters and sensitive research information that is
restricted to certain employees. He needs to be
authorized to enter the area every time access is
needed by using a retinal scanner at the door. He
has to place his face in a frame, with his chin in
a chin slot. He has to look in a scanning device
for a few seconds without blinking.
1.
2.
3.
I think this biometric device is useful.
I think this biometric device is easy to use.
I think one of the reasons this device is useful
is because of its ease of use.
I think that this device would be physically
invasive.
I think I would use this device.
4.
1.
2.
3.
I think this biometric device is useful.
I think this biometric device is easy to use.
I think one of the reasons this device is useful
is because of its ease of use.
I think that this device would be physically
invasive.
I think I would use this device.
5.
4.
5.
Search WWH ::




Custom Search