logo

Effectiveness of Face Recognition Technology in iPhone Data Protection

   

Added on  2023-03-23

12 Pages3147 Words84 Views
Running head: EFFECTIVENESS OF FACE RECOGNITION TECHNOLOGY IN IPHONE
DATA PROTECTION
Effectiveness of face recognition technology in iPhone data protection
Name of the Student:
Name of the University:

1
EFFECTIVENESS OF FACE RECOGNITION TECHNOLOGY IN IPHONE DATA
PROTECTION
Table of Contents
1. Introduction..................................................................................................................................2
1.1 Investigating the selected topic..............................................................................................2
1.2 Aim and research limitations.................................................................................................2
1.2.1 Hypothesis......................................................................................................................3
1.3 Process subject specific sources as per conventions of chose discipline...............................3
2. Scope of the research...................................................................................................................3
2.1 Analyze nature of research study...........................................................................................3
2.2 Evaluate relevance of the subject..........................................................................................4
3. Literature Review........................................................................................................................4
3.1 Concept of facial recognition technology..............................................................................4
3.2 Working functions of the face recognition technology in iPhone.........................................5
3.3 Security issues of the face recognition technology on the mobile devices............................6
3.4 Security measures of face recognition system.......................................................................7
4. Conclusion...................................................................................................................................8
References........................................................................................................................................9

2
EFFECTIVENESS OF FACE RECOGNITION TECHNOLOGY IN IPHONE DATA
PROTECTION
1. Introduction
1.1 Investigating the selected topic
The selected research topic is based on the effectiveness of face recognition technology
in iPhone data protection. Pope (2018) stated that as a security system, facial recognition is used
as technology for verifying the person’s features via the digital image which are stored into the
database. The technology is used to observe elements of someone’s faces as well as matched
alongside the images which are stored to recognize the individual. Most popular place where
facial recognition is pop up is in the world of Smartphone and iPhone. The iPhone has built-in
face ID ability to review where things are headed. This feature uses the biometric authentication
to let the users of iPhone unlock the devices by looking at screen. Hung et al. (2016) discussed
that face ID elements lets the users access to the Apple pay store, and other applications by just
looking at the phone screen.
1.2 Aim and research limitations
The aim of this particular research study is to analyze effectiveness of the face
recognition technology for data protection in iPhone. Following are the list of research objectives
based on which the study is carried out:
To determine the working functions of the face recognition technology in iPhone
To analyze the security issues of the face recognition technology on the mobile devices
To determine security measures for the privacy issues related to facial technology in the
iPhone

3
EFFECTIVENESS OF FACE RECOGNITION TECHNOLOGY IN IPHONE DATA
PROTECTION
The limitation of this study is that it is only limited to face recognition technology. As
compared to other biometric recognition technologies such as fingerprint recognition, the facial
recognition is less accurate. It is widely adopted as it is considered as contactless as well as non-
invasive.
1.2.1 Hypothesis
H0: Face recognition technology has not led to increased security and privacy concern
among users.
H1: Facial recognition technology on Smartphone has resulted in increased security and
privacy issues among users.
1.3 Process subject specific sources as per conventions of chose discipline
The data and information related to selected research topic is taken by means of
secondary sources. Peer review journal articles are taken in this case to conduct the study so that
data are obtained. The secondary sources are to be created by someone those are not
experiencing and participating in the events and conditions the researcher has searching. The
secondary sources are the scholarly books as well as articles. The study is acquired as well as
delivered knowledge base on the risks of the data protection of facial recognition system in
systematic ways.
2. Scope of the research
2.1 Analyze nature of research study
The study is focused on face recognition technology which is a successful application for
the image analysis plus understanding. There is a benefit of the facial recognition for the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Face Detection Technology on Smartphones: Usability and Safety Assessment
|2
|743
|61

Advantage of Face Recognition Technique
|8
|1277
|58

Biometrics for authentication: security and privacy implications
|10
|2310
|472

Cyber Security through Facial Biometric System
|10
|887
|52

Biometric Systems | Facial Recognition Devices
|4
|734
|17

Facial Pattern Recognition Devices | Report
|9
|1199
|14