659,337 Hits in 7.5 sec

The Effects of Facial Recognition Payment Systems on Intention to Use in China

Lin-Lin Zhang, Doctoral Student, 48513 Graduate School of Information Systems, Pukyong National Univ., 45, Yongso-ro, NamGu, Busan, Korea, Jing Xu, Daim Jeong, Tabe Ekouka, Ha-Kyun Kim, Doctoral Student, 48513 Graduate School of Information Systems, Pukyong National Univ., 45, Yongso-ro, NamGu, Busan, Korea, Doctoral Student, 48513 Graduate School of Information Systems, Pukyong National Univ., 45, Yongso-ro, NamGu, Busan, Korea, Doctoral Student, 48513 Graduate School of Information Systems, Pukyong National Univ., 45, Yongso-ro, NamGu, Busan, Korea, Professor, 48513 Division of Business, Pukyong National Univ., 45 Yongso-ro, NamGu Busan, Korea
2021 Journal of Advanced Researches and Reports  
Today, the financial industry uses face recognition technology to start the era of face recognition payment services.  ...  In particular, the fintech industry where new technologies are applied is undergoing rapid change.  ...  of information technology [12] .  ... 
doi:10.21742/jarr.2021.1.1.05 fatcat:g6d7fgorqbfmbcq6zzuryqywfm

Multi-Faces Image Recognition

Jung-soo Han, Jeong-heon Lee, Gui-Jung Kim
2013 Open Journal of Applied Sciences  
shooting angles with 3D data taken by multi cameras followed by application of the developed hybrid face recognition technology.  ...  The paper suggests a great improvement in the recognition rate and speed by overcoming the disadvantage of 3D image processing taking a long time as well as that of 2D images weak in postures through correcting  ...  Acknowledgements "This work was supported by the Security Engineering Research Center, granted by the Korea Ministry of Knowledge Economy."  ... 
doi:10.4236/ojapps.2013.31b011 fatcat:tsb4jxx6bfdllcppgialesepda

Research on Information Security Interaction Mode of Mobile Devices Based on Ubiquitous Computing

Xianquan Zeng
2015 Open Automation and Control Systems Journal  
This paper proposes the information security interaction design to enhance security when users interact with information via mobile devices based on the ubiquitous computing theory by combining the security  ...  However, the security problems caused by the technology reform are increasing dramatically.  ...  The user identity information recognition is protected via the face recognition technology.  ... 
doi:10.2174/1874444301507010805 fatcat:vyb67c7y4net3jq4sqy2jwj2ty

Optimization of Three-dimensional Face Recognition Algorithms in Financial Identity Authentication

Cong Luo, Xiangbo Fan, Ying Yan, Han Jin, Xuan Wang
2022 International Journal of Computers Communications & Control  
Identity authentication is one of the most basic components in the computer network world. It is the key technology of information security.  ...  On the basis of feature extraction of face information using neural network algorithm, K-L transform is applied to image high-dimensional vector mapping to make face recognition clearer.  ...  Through identity authentication and digital signature technology, the security information system is successfully constructed. Finally, the operation of the security information system is described.  ... 
doi:10.15837/ijccc.2022.3.3744 fatcat:chb5rcwtxfb6rl3nyco4dva6cq

Information Security and Blended Learning System Environment (BLSE)

Walid Qassim Qwaider
2012 International Journal for e-Learning Security  
This paper discusses the information security elements required to be implemented within the BLSE, however, the paper, and define information security countermeasures that can enhance the security of information  ...  In the past few years have witnessed a quantum environment, the quality of education as a result of the rapid growth in technology.  ...  Figure 2 . 2 Defining the BLs  integration of face-to-face online to help promote the experience of the classroom and extend learning through the innovative use of information technology and communications  ... 
doi:10.20533/ijels.2046.4568.2012.0019 fatcat:um3ailhi75cllnayodwegkdtua

Face Detection and Recognition System for Enhancing Security Measures Using Artificial Intelligence System

Muhammad Farhan Siddiqui
2020 Indian Journal of Science and Technology  
Background/objectives: The major changes which come across face recognition are to find the age and gender of the person. This study is centered on face detection with voice and biometric technology.  ...  Findings: It has been presented that face detection with voice and biometric technology can enhance the security measures.  ...  In illumination, the problem face appears different due to light changing so the camera could not find out the enough information.  ... 
doi:10.17485/ijst/2020/v013i09/149298 fatcat:zi24hlm435barmhtau37p4crym

Proposed Enhanced Security on Face Recognition Technology for Mobile Devices

2022 Advances in Machine Learning & Artificial Intelligence  
to the mentioned issues and ensure that the information is more secured.  ...  As mentioned above issues, they are still having a leakage about the security of information stored in the device according to their working algorithm.  ...  and blood pressure of the smart phone user authenticated with face recognition technology.  ... 
doi:10.33140/amlai.03.01.02 fatcat:clf56j5rnjbyflluq3lc72t6am

Face Recognition in Law Enforcement: A Comparative Analysis of China and the United States

Lulu Wang
2021 Open Journal of Social Sciences  
The macro interaction between technology, the state and business shapes the social construction, and at a micro level everyone in society needs to be informed and aware of the costs and risks of using  ...  Through comparison, we can understand the influence of face recognition in a different environment and the different effects of different application forms.  ...  How to store and use the face photos of residents after collection and whether there will be information security problems deserve our attention.  ... 
doi:10.4236/jss.2021.910036 fatcat:hxdko5o2vvfwvpbgyjjwguvqhq

Public faces? A critical exploration of the diffusion of face recognition technologies in online social networks

Aletta Norval, Elpida Prasopoulou
2017 New Media & Society  
In recent years, we have witnessed a rapid spread of biometric technologies from the security domain to commercial and social media applications.  ...  We use Nissenbaum's framework of contextual integrity to show how the informational norms associated with biometrics in security and policing -their contexts of emergence -are grafted on-line social networks  ...  Funding The author(s) disclosed receipt of the following financial support for the research, authorship and/ or publication of this article: Support for this research was provided by the Engineering and  ... 
doi:10.1177/1461444816688896 fatcat:3grnrfbbwrgtjhq2jpmftmpzka

Wireless sensor data mining for e-commerce applications

T. Sridevi, P. Mallikarjuna Rao, P.V Ramaraju
2018 Indonesian Journal of Electrical Engineering and Computer Science  
Information hiding is the most important criteria today in several sectors, due to security issues.  ...  Mostly for the security applications used in Finance & banking sectors, hiding the information about users and their transactions are necessary at present from the hackers in all high security zones  ...  Biometric information is very important and Facing Problem of security in todays.  ... 
doi:10.11591/ijeecs.v14.i1.pp462-470 fatcat:2mhtsux655ca7gpxled6ce2htu

The National Security Strategy in the Current Environment: from DIME to a DIME-T Approach

Maria Constantinescu
2021 International conference KNOWLEDGE-BASED ORGANIZATION  
security strategies to the changes demands of the environment.  ...  The paper proposes a DIME-T approach to national instruments of power, by analysing the complex implications of technology on all the areas of security.  ...  changes modern society faces.  ... 
doi:10.2478/kbo-2021-0004 fatcat:trgtq5jkr5efbmu6max35uamza

Facial Recognition Technology and Ethical Issues

Jason Chan
2022 Proceedings of the Wellington Faculty of Engineering Ethics and Sustainability Symposium  
The issues of data privacy, security controls, and accuracy are discussed in this paper. To address the issues, a code of ethics is created and applied to Apple's Face ID.  ...  Facial recognition technology (FRT) is being adopted across the world with little thought given to the ethical and sustainability issues it faces.  ...  This necessitates overcoming technological obstacles such as recognising faces at different angles, changes in expression, ageing and identifying faces with accessories.  ... 
doi:10.26686/ fatcat:ab4mnhrafbgblgejcc47g643ry

Research on the Security of Accounting Information System in the Big Data Era

2021 Academic Journal of Computing & Information Science  
Accounting information security and the construction and maintenance of accounting information systems are also facing huge opportunities and challenges.  ...  This article analyzes the development of accounting information system security with the theme of strengthening information security.  ...  Accounting information security is one of the main sources of moral hazard faced by accounting practitioners.  ... 
doi:10.25236/ajcis.2021.040411 fatcat:f7sndsdjnjakhi5zpo3kkfn7hy


2010 Issues in Information Systems  
The importance of information security cannot be overemphasized in today's networked corporate world.  ...  A major component of reducing the risk of security breach in information assets is by implementing an effective security awareness program in organizations.  ...  The success of the program depends on the change in peoples" behavior. But often people do not change their behavior.  ... 
doi:10.48009/1_iis_2010_402-409 fatcat:adiiu65fnvbevc24khwu4buafu

Two-Factor Authentication Methodology using Hybrid Face Recognition

Junghun Park, Bowon Jung, Okkyung Choi
2016 International Journal of Control and Automation  
The core elements of the authentication technology are using the hybrid face recognition method employing dual-stage holistic and local feature-based recognition algorithms.  ...  With the rapid development of mobile devices and IT technologies, protecting personal information is becoming an important issue, and safety must be seriously considered.  ...  To overcome this issue, biometrics technology is commonly used in protecting personal information. Biometrics technology is a recognition technology using the body state information of a person.  ... 
doi:10.14257/ijca.2016.9.1.37 fatcat:k3kba627fjgzbheuwqnxota3pi
« Previous Showing results 1 — 15 out of 659,337 results