How do you feel about having your fingerprints

Assignment Help Management Theories
Reference no: EM131376763

Eyes Everywhere The movie Minority Report chronicled a futuristic world where people are uniquely identifiable by their eyes. A scan of each person's eyes gives or denies them access to rooms, computers, and anything else with restrictions. The movie portrayed a black market in new eyeballs to help people hide from the authorities. (Why did they not just change the database entry instead? That would have been much easier, but a lot less dramatic.)

The idea of using a biological signature is entirely plausible because biometrics is currently being used and is expected to gain wider acceptance in the near future because forging documents has become much easier with the advances in computer graphics programs and color printers. The next time you get a new passport, it may incorporate a chip that has your biometric information encoded on it. Office of Special Investigations agents with fake documents found that it was relatively easy to enter the United States from Canada, Mexico, and Jamaica, by land, sea, and air. The task of policing the borders is daunting.

Some 500 million foreigners enter the country every year and go through identity checkpoints. More than 13 million permanent-resident and border-crossing cards have been issued by the U.S. government.

Also, citizens of 27 countries do not need visas to enter this country. They are expected to have passports that comply with U.S. specifications that will also be readable at the border. In the post-9/11 atmosphere of tightened security, unrestricted border crossing is not acceptable. The Department of Homeland Security is charged with securing the nation's borders, and as part of this plan, new entry/exit procedures were instituted at the beginning of 2003. An integrated system, using biometrics, will be used to identify foreign visitors to the United States and reduce the likelihood of terrorists entering the country.

Early in 2003, after 6 million biometric border-crossing cards had been issued, a pilot test conducted at the Canadian border detected more than 250 imposters. The testing started with two biometric identifiers: photographs for facial recognition and fingerprint scans. As people enter and leave the country, their actual fingerprints and facial features are compared to the data on the biometric chip in the passport. In a group, discuss the following:

a. How do you feel about having your fingerprints, facial features, and perhaps more of your biometric features encoded in documents such as your passport? Explain your answer.

b. Would you feel the same way about having biometric information on your driver's license as on your passport? Why or why not?

c. Is it reasonable to have different biometric identification requirements for visitors from different nations? Explain your answer. What would you recommend as criteria for deciding which countries fall into what categories?

d. The checkpoints U.S. citizens pass through upon returning to the country vary greatly in the depth of the checks and the time spent. The simplest involves simply walking past the border guards who may or may not ask you your citizenship. The other end of the spectrum requires that you put up with long waits in airports where you have to line up with hundreds of other passengers while each person is questioned and must produce a passport to be scanned. Would you welcome biometric information on passports if it would speed the process, or do you think that the disadvantages of the reduction in privacy, caused by biometric information, outweigh the advantages of better security and faster border processing? Explain your answer.

Reference no: EM131376763

Questions Cloud

What security concerns are associated with the thumb drive : What security concerns are associated with the thumb drive? How could information security policies or an information security plan help your business with this type of situation?
Who are the victim in that type of situation : Bullying and cyber-bullying have serious negative effects on those who are the victim in that type of situation. What are the negative effects that could happen to the victim and how difficult is it for them to move on from it
Information security policy and an information security plan : Develop a document discussing the importance of creating information security polices and an information security plan.
Which fields in the tcp protocol provide reliability : 1. Which fields in the TCP protocol provide reliability? 2. Why do you think that the version field is in the very first field on the header? Notice that is located in the same place in the IPV6 IP header as well.
How do you feel about having your fingerprints : How do you feel about having your fingerprints, facial features, and perhaps more of your biometric features encoded in documents such as your passport? Explain your answer.
Analyze the information presented on microexpressions : Discuss how body language and facial expressions can be critical in determining someone's actions and inner states. Analyze the information presented on microexpressions and lying, and explain how understanding these concepts can influence your pe..
What alerts you to the presence of an ethical dilemma : What alerts you to the presence of an ethical dilemma? How do you feel when confronted with difficult ethical decisions? To what degree do you think nurses should become involved in making decisions such as the one described in the situation present..
What is the purpose of a bank reconciliation : What is the purpose of a bank reconciliation? What are the reasons for differences between the cash reported in the accounting records, and the cash balance in the bank statements?
Fundamental characteristics and components : Select an organization you are familiar with. Write a 1-page paper that includes the following based on your chosen Local Organization: Explain the network's fundamental characteristics and components.

Reviews

Write a Review

Management Theories Questions & Answers

  Learning in action

Learning contract proposal that will form the basis of your learning contract report.

  Change is the only constant

"Change is the only constant " Evaluate the different types of change that have occurred in Sony.

  How do advertisers try to use group influence

How do advertisers try to use group influence?  Will you find any specific examples and explain the relevant theory of group behavior and influence?

  Case study:saving sony

You have been appointed by Sony as a consultant on change management. Advise Sony on how they could implement the change by using the various theories of change you have learnt.

  How the stock market works

The purpose of this project is to help you to gain an understanding of how the stock market works and of the relationship between theory and practice.

  Find the optimal production quantities

Find not only the optimal production quantities, but also the optimal total cost.

  Describe the management process

Describe the management process and identify the skills required to manage business organizations.

  Case study : bert''s bonsai and aquatic sport museum

Case Study : Bert's Bonsai and Aquatic Sport Museum Prepare a knowledge management system.

  Knowledge management techniques

Demonstrate understanding of the many-sided nature of knowledge management

  Theory of transtheoretical model

Demonstrate understanding of the many-sided nature of knowledge management

  Write a paper on historical trends of management

Write a paper on Historical Trends of Management.

  Theory of reasoned action

Theory of Planned Behavior and Integrated Behaviors Model

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd