Abstract
After reading this chapter, the reader should be able to: 1. Understand biometric science. 2. Learn to use biometric data in access control. 3. Understand how biometric data are used to fight crimes. 4. Learn where and when biometric data can be used. 5. Acquire the techniques required in biometric data acquisition. 6. Recognize the difficulties encountered in handling some biometric data in access control.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Panko, Raymond. R. Corporate Computer and Network Security. Upper Saddle River, NJ: Prentice-Hall, 2004.
Wikipedia - http://www.wikipedia.org/
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2010 Springer-Verlag London Limited
About this chapter
Cite this chapter
Kizza, J.M. (2010). Biometrics. In: Ethical and Social Issues in the Information Age. Texts in Computer Science. Springer, London. https://doi.org/10.1007/978-1-84996-038-0_14
Download citation
DOI: https://doi.org/10.1007/978-1-84996-038-0_14
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-84996-037-3
Online ISBN: 978-1-84996-038-0
eBook Packages: Computer ScienceComputer Science (R0)