Research Proposal
Increased connectivity and communication that has resulted from the development of Internet technology is a factor that has led to an increase in concerns for security. Internet use and application for online shopping, banking, e-commerce and other transactions have to be secure amidst an ever rising cyber-crime rate in the global spectrum (Fatima, 2015). However, the ordinary person cannot be restricted in their use of the advanced technologies that enable transactions and communication much easier than in earlier years. Cyber security is, therefore, an important aspect of the daily activities of most people. Most banks, financial companies, and retailers have switched to biometric technology as the primary means by which they can protect their consumers from cyber-crimes. Biometric technology is one that uses the fingerprints of an individual to authenticate their transactions thereby safeguarding them from possible cyber-attacks that may occur. The markets are also using biometrics with applications available in the market that use facial recognition, fingerprint recognition or even iris recognition.
Cyber security mainly entails authentication, authorization, and identification which are the main ways in which the role of the applications and systems that safeguard individuals. Vacca (2013) suggests that biometric systems are important in verification where the companies can ascertain the users of their applications in transactions. While the identification process would involve a complicated process that compares the fingerprint to a database of many other print identities, the verification process is one in which the biometric applications already store an identity that is compared with what the user keys in (Kour, Hamandlu & Asari, 2016). This research, therefore, hypothesizes that biometric application is a solution to cyber security which entails the use of distinct personal characteristics to enable identification, authorization of the user or verification through a technology that can store memory of the distinguishing differences between individuals that access certain technologies.
Delegate your assignment to our experts and they will do the rest.
Method of inquiry
In this research, we require data from digital security companies, technology industries as well as financial corporations which entail some of the largest consumers of the cyber security products. Most of the enterprises that rely on cyber security technology such as biometrics usually keep their customer information confidential. In this research, however, the primary concern is the application of the biometrics technology in their activities and the role of the technology in enabling a safer working environment within these industries. Therefore, we will use a mixed approach where we will gather quantitative as well as qualitative data to inform the research.
Owing to the history of fingerprint recognition, our research will be a survey of the digital industry related with ecommerce, data security and corporations directly dealing with cyber security. Some of the main concerns of the study will be;
Who are the main types of consumers who need and use biometric technology?
What numbers of companies or entities have purchased the technology?
How are the quality assurance requirements met by the companies involved with the production of this technology?
Why is the biometric system better than other technological options for cyber security regarding authorization, identification, and authentication?
Conclusions
Within these constructs, the paper will explore the biometric system technology with the aim of acquiring more information concerning cyber security. Furthermore, the research will focus on the possible quality controls and regulations as well as the opportunities for improvement that may exist in the cyber security industry.
References
Kour, J., Hanmandlu, M., & Ansari, A. Q. (2016). Biometrics in cyber Security. Defense Science Journal , 66 (6), 600-604.
Fatima, A. (2015). E-Banking Security Issues? Is There A Solution in Biometrics?. The Journal of Internet Banking and Commerce , 2011 .
Vacca, J. R. (2013). Cyber security and IT infrastructure protection . Amsterdam: Syngress.