If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service information about how to choose which publication to write for and submission guidelines are available for all. Please visit www.emeraldinsight.com/authors for more information.
About Emerald www.emeraldinsight.comEmerald is a global publisher linking research and practice to the benefit of society. The company manages a portfolio of more than 290 journals and over 2,350 books and book series volumes, as well as providing an extensive range of online products and additional customer resources and services.Emerald is both COUNTER 4 and TRANSFER compliant. The organization is a partner of the Committee on Publication Ethics (COPE) and also works with Portico and the LOCKSS initiative for digital archive preservation.
AbstractPurpose -This paper aims to assist readers to develop a compelling business case, including quantifiable and non-quantifiable costs and benefits, for the deployment of biometric technologies in information systems to enhance corporate security for access control, identification and verification applications. Design/methodology/approach -The paper reviews the strengths and weaknesses of leading biometric technologies, while commenting on their practical applicability in real world implementations. In addition, the paper develops a process for ensuring that the best biometric applications are chosen, considering both the technology and related business issues. Findings -The paper suggests that biometrics must be carefully selected to achieve a good fit to the security problem, giving examples of how a good fit might be evaluated by the user. The one-time and recurring charges associated with the typical biometric implementation are evaluated, arguing that these costs must be offset by a formal risk evaluation. The paper presents a user's guide for sensible implementation evaluations. Finally, the paper emphasizes that the use of biometrics in systems security implementations is one tool among many, and must thus be viewed as only part of an overall information security management infrastructure. Originality/value -In order to select biometric technologies, buyers must choose solutions to business problems, solutions that demonstrate that the biometric makes sense from a cost-benefit and business perspective. This paper, in a step-by-step manner, walks readers through the decision-making process and assists them in making compelling business arguments for biometric applications.
There are instances where multiple organizations hold data that when considered individually are inconclusive, but collectively are useful to solve complex problems. Yet, frequently there is a hesitation for organizations to share data due to strategic, legal, and policy concerns. To address this hesitation, an electronic market for secure information sharing is described, in which data are contributed to the market by members, and made available from the market to members or preapproved information buyers. In this Secure Information Market (SIM), shared data are secure, and available in granular or aggregate form based on specific requirements of the information providers and consumers. The model is designed to protect member organizations and their shared data, while maximizing member value and incentives to share. The Secure Information Market model is presented, and then its applicability is demonstrated using a variety of examples.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.