Professional Documents
Culture Documents
Big Brother
physically connected to the individual. Biometric data, in 12 Op. cit., I/O Soft
ware; Op. cit.,Java Card Special Interest
contrast, are an intrinsic part of the human body. Therefore, a Group; White, R.
; Face vs. Fingerprint Identification,
number of organisations and individuals find such methods of 1999, www.zdnet.co.
za/pccomp/stories/reviews/
identification repulsive and invasive.19 0,5672,396764,00.html
13 Fight the Fingerprint, www.networkusa.org/fingerprint.shtml
14 Op. cit., I/O Software; Op. cit.,Java Card Special Interest
Conclusion
Group; Op. cit., White
Obviously, the use of biometric systems for identification
15 Op. cit., Kim
and access control purposes is a contentious issue. It is one
Ibid.
that requires clear and ethical consideration before adoption by 16
Op. cit., I/O Software
any organisation or agency. Furthermore, governments need to 17
develop strict guidelines that restrict the dissemination of 18
Op. cit., Kim
Schneier, B.; The Uses and Abuses of Biometrics,
biometric data and the information linked to such data to 19
Communications of the ACM, Association for Computing
prevent misuse and erosion of individuals rights. Information
Machinery, August 1999, vol. 42, no. 8, p. 136
system auditors and security personnel require knowledge of
these biometric techniques, as they may be asked to either
Rodger Jamieson, Ph.D., CA
audit or evaluate them for their clients or organisations.
is an associate professor at the School of Information Systems,
Technology and Management at the University of New South
Useful Web Resources
Wales (Australia), the director of SEAR (Security, E-business
www.onin.com/fp/afis/html
and Assurance Research) group, and director of the SAFE
www.duke.edu/web/mms190/team3/defining.html
(Security, Assurance and Fraud-prevention for E-business)
www.biometritech.com/features/smallback2.htm
research program for the Securities Industry Research Centre
www.onclickcorp.com/onclicksite/onclick.html
of Asia-Pacific (SIRCA). He serves on international journal
www.networkusa.org/fingerprint.shtml
editorial boards and is engaged in teaching, research and
consulting in the areas of IS assurance and security, risk
Endnotes
management, e-crime and identity fraud, computer forensics
1 Lebihan, R.; New Passport to Store Facial Biological
and electronic commerce. His prior experience includes
Information, The Australian Financial Review, 12 February
working as an IS audit manager with Touche Ross & Co. and
2003, p. 52
as a chartered accountant for Coopers & Lybrand. He also has
2 Kim, H.J.; Biometrics, Is It a Viable Proposition for
commercial experience with the AMP Society and Honeywell.
Identity Authentication and Access Control? Computers &
Security,vol. 14, 1995, p. 205-214
Greg Stephens
3 Java Card Special Interest Group (JC Sig),
is a lecturer in the School of Information Systems, Technology
www.javacard.org/others/biometrics_intro.htm
and Management at the University of New South Wales. His
4 Ibid.
research interests include audit and security concerns,
5 Biometrics Explained, I/O Software,
computer-mediated communication and its impact on social
www.iosoftware.com/pages/Products/Technologies/
networks within organisations, and knowledge-based/expert
Biometrics/index.asp#Fingerprint
systems. He has previously worked as an information systems
6 Op. cit., Kim