University Research: Biometric Technology and Network Security
VerifiedAdded on 2020/05/28
|91
|23282
|230
Report
AI Summary
This comprehensive research report investigates the application of biometric technology to bolster network security. It begins by outlining the current network security issues, such as password vulnerabilities and the need for robust authentication methods. The study then delves into the various types of biometric technologies, including fingerprint, iris scan, voice recognition, and face recognition, analyzing their effectiveness in user identification and access control. The report compares the advantages and disadvantages of different biometric methods, considering factors such as accuracy, cost, and user acceptance. Furthermore, it addresses the challenges associated with implementing biometric systems, such as data privacy and security concerns, and proposes potential solutions to overcome these obstacles. The methodology includes a literature review, data analysis, and findings from the research. The report concludes with recommendations for improving network security using biometric technology, along with suggestions for future research and limitations of the study. This report provides a thorough overview of the subject, exploring the potential of biometric technology to create more secure and reliable networks.

Running head: INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGY
Increasing the network security using biometric technology
Name of the Student:
Name of the University:
Author note:
Increasing the network security using biometric technology
Name of the Student:
Name of the University:
Author note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGY
Abstract
Over last few of the years, new areas into the engineering science are established whose products
would create a large market in the future. Biometrics technology is considered as a solution to
user identification along with security problems in today’s network. Abuse of password and
misuse of confidential information are network security issues in the organization. This type of
issues is raised due to human error, carelessness of the human and cases of maliciousness.
Biometrics technology removes the human errors from the security. This research study
examines technological as well as feasibility aspects along with the practical applications. In
order to identify the users, various types of biometrics technologies are discussed in this study.
The system is pattern recognition system that recognizes users by determination of authenticity
of behavioral and physical characteristics by the user. Based on the research context, the system
is able to operate with verification as well as identification mode. This identification system
consists of advantages and challenges which are analyzed in this research study. Based on the
challenges, solutions are also provided to improve the biometrics challenges. In this paper, an
overview is provided in field of biometrics and summarizes its different types and security
concerns.
Abstract
Over last few of the years, new areas into the engineering science are established whose products
would create a large market in the future. Biometrics technology is considered as a solution to
user identification along with security problems in today’s network. Abuse of password and
misuse of confidential information are network security issues in the organization. This type of
issues is raised due to human error, carelessness of the human and cases of maliciousness.
Biometrics technology removes the human errors from the security. This research study
examines technological as well as feasibility aspects along with the practical applications. In
order to identify the users, various types of biometrics technologies are discussed in this study.
The system is pattern recognition system that recognizes users by determination of authenticity
of behavioral and physical characteristics by the user. Based on the research context, the system
is able to operate with verification as well as identification mode. This identification system
consists of advantages and challenges which are analyzed in this research study. Based on the
challenges, solutions are also provided to improve the biometrics challenges. In this paper, an
overview is provided in field of biometrics and summarizes its different types and security
concerns.

3INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGY
Acknowledgement
Conducting the research study enhances me to improve my knowledge as well as analytical
ability. It gave me the chance to face challenges all the while and conquer them. It will not be
possible to conduct the research without the significant direction of my professors, companions
and every one of who have added to this advancing knowledge. I also want to thank my
supervisor __________ for helping me in my research work as well as give their full support
during the research process. I would also thank all the participants within this study for giving
their time and helping me out. From the support of people, I am inspired to work on the research
in this subject area. Finally, thank you to my family members those help me and encourage me.
Thank You.
Acknowledgement
Conducting the research study enhances me to improve my knowledge as well as analytical
ability. It gave me the chance to face challenges all the while and conquer them. It will not be
possible to conduct the research without the significant direction of my professors, companions
and every one of who have added to this advancing knowledge. I also want to thank my
supervisor __________ for helping me in my research work as well as give their full support
during the research process. I would also thank all the participants within this study for giving
their time and helping me out. From the support of people, I am inspired to work on the research
in this subject area. Finally, thank you to my family members those help me and encourage me.
Thank You.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGY
Table of Contents
Chapter 1: Introduction.....................................................................................................................9
1.1 Background of the study.........................................................................................................9
1.2 Research Aims and Objectives..............................................................................................10
1.2.1 Aims of the study...........................................................................................................10
1.2.2 Objectives of the study...................................................................................................10
1.3 Research Questions...............................................................................................................10
1.4 Problem Statement................................................................................................................11
1.5 Rationale of the study............................................................................................................11
1.6 Structure of the research study..............................................................................................12
1.7 Summary...............................................................................................................................14
Chapter 2: Literature Review..........................................................................................................15
2.1 Preface...................................................................................................................................15
2.2 Overview of biometric technology........................................................................................15
2.3 Applications of biometric technology...................................................................................20
2.4 Identity management by biometrics......................................................................................24
2.5 Advantages of using biometrics technology.........................................................................26
2.6 Operation of biometric system..............................................................................................31
2.7 Evaluation of different biometric technology and its comparison........................................33
2.8 Factors and criteria used to compare biometric technologies...............................................39
2.9 Comparison of different biometric technologies...................................................................40
2.10 Safe and secured biometric technology...............................................................................41
2.11 Challenges faced for using biometric technology...............................................................42
2.12 Overcome of challenges for using of biometric technology...............................................45
2.13 Summary of the project.......................................................................................................47
Chapter 3: Research Methodology..................................................................................................49
3.1 Preface...................................................................................................................................49
3.2 Research outline....................................................................................................................49
3.3 Research philosophy.............................................................................................................50
3.4 Research approach.................................................................................................................51
3.5 Research design.....................................................................................................................52
Table of Contents
Chapter 1: Introduction.....................................................................................................................9
1.1 Background of the study.........................................................................................................9
1.2 Research Aims and Objectives..............................................................................................10
1.2.1 Aims of the study...........................................................................................................10
1.2.2 Objectives of the study...................................................................................................10
1.3 Research Questions...............................................................................................................10
1.4 Problem Statement................................................................................................................11
1.5 Rationale of the study............................................................................................................11
1.6 Structure of the research study..............................................................................................12
1.7 Summary...............................................................................................................................14
Chapter 2: Literature Review..........................................................................................................15
2.1 Preface...................................................................................................................................15
2.2 Overview of biometric technology........................................................................................15
2.3 Applications of biometric technology...................................................................................20
2.4 Identity management by biometrics......................................................................................24
2.5 Advantages of using biometrics technology.........................................................................26
2.6 Operation of biometric system..............................................................................................31
2.7 Evaluation of different biometric technology and its comparison........................................33
2.8 Factors and criteria used to compare biometric technologies...............................................39
2.9 Comparison of different biometric technologies...................................................................40
2.10 Safe and secured biometric technology...............................................................................41
2.11 Challenges faced for using biometric technology...............................................................42
2.12 Overcome of challenges for using of biometric technology...............................................45
2.13 Summary of the project.......................................................................................................47
Chapter 3: Research Methodology..................................................................................................49
3.1 Preface...................................................................................................................................49
3.2 Research outline....................................................................................................................49
3.3 Research philosophy.............................................................................................................50
3.4 Research approach.................................................................................................................51
3.5 Research design.....................................................................................................................52
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGY
3.6 Data collection processes and techniques.............................................................................54
3.6.1 Data Collection sources..................................................................................................54
3.6.2 Data collection techniques.............................................................................................55
3.7 Sample and sampling............................................................................................................55
3.8 Ethical considerations...........................................................................................................56
3.9 Timeline and project schedule...............................................................................................57
3.10 Gantt chart and WBS...........................................................................................................61
3.11 Milestones...........................................................................................................................63
3.12 Summary.............................................................................................................................63
Chapter 4: Data Analysis and Findings...........................................................................................64
4.1Preface....................................................................................................................................64
4.2 Data Analysis and Research Findings...................................................................................64
4.3 Summary...............................................................................................................................78
Chapter 5: Conclusion and Recommendations...............................................................................80
5.1 Conclusion.............................................................................................................................80
5.2 Recommendations.................................................................................................................82
5.3 Future scope and limitations of the research study...............................................................83
References.......................................................................................................................................85
Appendices......................................................................................................................................91
Survey questionnaire on “Increasing Network Security using Biometric Technology”.............91
3.6 Data collection processes and techniques.............................................................................54
3.6.1 Data Collection sources..................................................................................................54
3.6.2 Data collection techniques.............................................................................................55
3.7 Sample and sampling............................................................................................................55
3.8 Ethical considerations...........................................................................................................56
3.9 Timeline and project schedule...............................................................................................57
3.10 Gantt chart and WBS...........................................................................................................61
3.11 Milestones...........................................................................................................................63
3.12 Summary.............................................................................................................................63
Chapter 4: Data Analysis and Findings...........................................................................................64
4.1Preface....................................................................................................................................64
4.2 Data Analysis and Research Findings...................................................................................64
4.3 Summary...............................................................................................................................78
Chapter 5: Conclusion and Recommendations...............................................................................80
5.1 Conclusion.............................................................................................................................80
5.2 Recommendations.................................................................................................................82
5.3 Future scope and limitations of the research study...............................................................83
References.......................................................................................................................................85
Appendices......................................................................................................................................91
Survey questionnaire on “Increasing Network Security using Biometric Technology”.............91

6INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGY
List of tables
1.2.1 Aims of the study......................................................................................................10
1.2.2 Objectives of the study.............................................................................................10
Table 1: Comparison table of various biometric technologies..........................................41
Table 4.1: Gender of participants......................................................................................64
Table 4.2: Years of working..............................................................................................65
Table 4.3: Satisfaction level of employees........................................................................66
Table 4.4: Network security issues....................................................................................67
Table 4.5: Effectiveness of biometric technology.............................................................68
Table 4.6: Benefits of Biometric Technology...................................................................69
Table 4.7: Applications of biometric technology..............................................................71
Table 4.8: Factors for comparing biometric technologies.................................................72
Table 4.9: Issues in Biometric technology........................................................................73
Table 4.10: Recommendations to improve network security in your company................74
List of tables
1.2.1 Aims of the study......................................................................................................10
1.2.2 Objectives of the study.............................................................................................10
Table 1: Comparison table of various biometric technologies..........................................41
Table 4.1: Gender of participants......................................................................................64
Table 4.2: Years of working..............................................................................................65
Table 4.3: Satisfaction level of employees........................................................................66
Table 4.4: Network security issues....................................................................................67
Table 4.5: Effectiveness of biometric technology.............................................................68
Table 4.6: Benefits of Biometric Technology...................................................................69
Table 4.7: Applications of biometric technology..............................................................71
Table 4.8: Factors for comparing biometric technologies.................................................72
Table 4.9: Issues in Biometric technology........................................................................73
Table 4.10: Recommendations to improve network security in your company................74
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

7INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGY
List of figures
Figure 2.1: Different types of biometric technologies.......................................................20
Figure 2.2: Structure of Biometric System........................................................................21
Figure 2.3: Block diagram of enrollment phase................................................................33
Figure 2.4: Block diagram of verification phase...............................................................34
Figure 2.5: Block diagram of identification phase............................................................35
Figure 2.6: Block diagram of face recognition system......................................................37
Figure 2.7: Block diagram of fingerprint identification....................................................38
Figure 2.8: Block diagram of iris scans.............................................................................39
Figure 2.9: Block diagram of signature recognition system..............................................40
Figure 2.10: Voice recognition system..............................................................................41
Figure 1: Gantt chart..........................................................................................................63
Figure 2: Work breakdown structure.................................................................................64
Figure 4.1: Gender of participants.....................................................................................67
Figure 4.2: Years of working.............................................................................................67
Figure 4.3: Satisfaction level of employees.......................................................................68
Figure 4.4: Network security issues...................................................................................69
Figure 4.5: Effectiveness of biometric technology............................................................70
Figure 4.6: Benefits of Biometric Technology..................................................................71
Figure 4.7: Applications of biometric technology.............................................................73
Figure 4.8: Factors for comparing biometric technologies................................................74
Figure 4.9: Issues in Biometric technology.......................................................................75
List of figures
Figure 2.1: Different types of biometric technologies.......................................................20
Figure 2.2: Structure of Biometric System........................................................................21
Figure 2.3: Block diagram of enrollment phase................................................................33
Figure 2.4: Block diagram of verification phase...............................................................34
Figure 2.5: Block diagram of identification phase............................................................35
Figure 2.6: Block diagram of face recognition system......................................................37
Figure 2.7: Block diagram of fingerprint identification....................................................38
Figure 2.8: Block diagram of iris scans.............................................................................39
Figure 2.9: Block diagram of signature recognition system..............................................40
Figure 2.10: Voice recognition system..............................................................................41
Figure 1: Gantt chart..........................................................................................................63
Figure 2: Work breakdown structure.................................................................................64
Figure 4.1: Gender of participants.....................................................................................67
Figure 4.2: Years of working.............................................................................................67
Figure 4.3: Satisfaction level of employees.......................................................................68
Figure 4.4: Network security issues...................................................................................69
Figure 4.5: Effectiveness of biometric technology............................................................70
Figure 4.6: Benefits of Biometric Technology..................................................................71
Figure 4.7: Applications of biometric technology.............................................................73
Figure 4.8: Factors for comparing biometric technologies................................................74
Figure 4.9: Issues in Biometric technology.......................................................................75
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

8INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGY
Figure 4.10: Recommendations to improve network security in your company...............76
Chapter 1: Introduction
1.1 Background of the study
Biometric technology is one of the fastest gaining popularity in terms of security
measures for minimizing the cases of fraud and theft due to the use of physical characteristics
and traits for identifying individuals. Previous methods of biometric identification consisted
fingerprint as well as handwriting, whereas current inventories include iris or eye scan, voice
print, hand print and face scan (Gavrilova et al., 2017). On the other hand, biometric voice
recognition and technology for identification concentrates on training the particular system in
order to recognize unique voice characteristics of individuals. The technology lends well to
different types of utilization and application such as security access control for mobiles, ATM
manufacturers and automobile manufacturers (Gupta, Agrawal & Yamaguchi, 2016). On the
other hand, network security is protection for access, misuse and directories of network system.
Biometric technology is helpful for mitigating security issues in networking.
According to Acuity Market Intelligence, the market for biometrics core technology has
poised for making sustainable development with global revenues that has reached approximately
$11 billion annually by 2017. Moreover, biometric industry continues to increase that results
correlation to private sector starting to take off. On the other hand, private sector has been
accounted 41% of biometric revenues (Saevanee et al., 2015). The private sector has been
projected accounting 55% of industries revenues by 2017. It is going to outpace public sector for
advancements and new biometric applications in recent activities. The organizations are starting
Figure 4.10: Recommendations to improve network security in your company...............76
Chapter 1: Introduction
1.1 Background of the study
Biometric technology is one of the fastest gaining popularity in terms of security
measures for minimizing the cases of fraud and theft due to the use of physical characteristics
and traits for identifying individuals. Previous methods of biometric identification consisted
fingerprint as well as handwriting, whereas current inventories include iris or eye scan, voice
print, hand print and face scan (Gavrilova et al., 2017). On the other hand, biometric voice
recognition and technology for identification concentrates on training the particular system in
order to recognize unique voice characteristics of individuals. The technology lends well to
different types of utilization and application such as security access control for mobiles, ATM
manufacturers and automobile manufacturers (Gupta, Agrawal & Yamaguchi, 2016). On the
other hand, network security is protection for access, misuse and directories of network system.
Biometric technology is helpful for mitigating security issues in networking.
According to Acuity Market Intelligence, the market for biometrics core technology has
poised for making sustainable development with global revenues that has reached approximately
$11 billion annually by 2017. Moreover, biometric industry continues to increase that results
correlation to private sector starting to take off. On the other hand, private sector has been
accounted 41% of biometric revenues (Saevanee et al., 2015). The private sector has been
projected accounting 55% of industries revenues by 2017. It is going to outpace public sector for
advancements and new biometric applications in recent activities. The organizations are starting

9INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGY
utilization of biometrics for accessing employees, time as well as attendance. The use of
biometric technologies to add security on financial, research and health records is increasing
(Mainanwal, Gupta & Upadhayay, 2015). In addition, financial organizations have started the
use of voice recognition for banking over phone and add security on ATM.
1.2 Research Aims and Objectives
1.2.1 Aims of the study
The research aims to identify network security issues and find out effective techniques to
mitigate the issues. In addition, the role of biometric technology in order to increase network
security is evaluated in the present research.
1.2.2 Objectives of the study
The objectives of research can be described as followed.
To identify the network security issues found in present days’ business
To critically evaluate the effectiveness of using biometric technology in
increasing network security
To compare effectiveness of biometric technology with other related technology
To address the challenges faced for using biometric technology
To recommend solutions for overcoming the challenges
1.3 Research Questions
Research questions can be listed as followed.
What are the network security issues in present usage?
How effective of using biometric technology in increasing network security?
utilization of biometrics for accessing employees, time as well as attendance. The use of
biometric technologies to add security on financial, research and health records is increasing
(Mainanwal, Gupta & Upadhayay, 2015). In addition, financial organizations have started the
use of voice recognition for banking over phone and add security on ATM.
1.2 Research Aims and Objectives
1.2.1 Aims of the study
The research aims to identify network security issues and find out effective techniques to
mitigate the issues. In addition, the role of biometric technology in order to increase network
security is evaluated in the present research.
1.2.2 Objectives of the study
The objectives of research can be described as followed.
To identify the network security issues found in present days’ business
To critically evaluate the effectiveness of using biometric technology in
increasing network security
To compare effectiveness of biometric technology with other related technology
To address the challenges faced for using biometric technology
To recommend solutions for overcoming the challenges
1.3 Research Questions
Research questions can be listed as followed.
What are the network security issues in present usage?
How effective of using biometric technology in increasing network security?
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

10INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGY
What are the differences between biometric technologies with other related
technology?
What are the challenges faced for using biometric technology?
How the challenges for using biometric technology can be overcome?
1.4 Problem Statement
With technology infiltrating all aspects of modern living as well as world becoming
increasingly digitalize, protection of confidential information becomes more difficult. Passwords
and keys were considered adequate for providing data security. However, the number of attacks
in networks is increasing. Passwords are considered as the weakest link in security system of the
organizations. The reasons behind is sharable and possibility of cracking through strong entropy
and variety of methods. Current reports of network security breaches as well as identify thefts ca
affirm particular fact that a powerful method of authentication is required. It has put
concentration on biometric security as only effective method in order to prove an identity.
Biometric traits are considered as inherent as well as unique to every people and comprise
physical as well as behavioral characteristics like fingerprint, iris, voice and face. Thus,
biometric security system can be helpful to verify identity of individuals with utmost accuracy as
well as reliability since it is a part of daily activities.
1.5 Rationale of the study
The number of platforms as well as devices is connected to internet of things and it is
increasing day by day at exponential rate. In addition, there are an excess number of devices like
smart phones, tablets, sensors and cloud based services. It helps to send and receive information
constantly. Moreover, there is a need to keep data out of hands of being unauthorized access.
However, passwords become cumbersome and customer utilizes same passwords for several
What are the differences between biometric technologies with other related
technology?
What are the challenges faced for using biometric technology?
How the challenges for using biometric technology can be overcome?
1.4 Problem Statement
With technology infiltrating all aspects of modern living as well as world becoming
increasingly digitalize, protection of confidential information becomes more difficult. Passwords
and keys were considered adequate for providing data security. However, the number of attacks
in networks is increasing. Passwords are considered as the weakest link in security system of the
organizations. The reasons behind is sharable and possibility of cracking through strong entropy
and variety of methods. Current reports of network security breaches as well as identify thefts ca
affirm particular fact that a powerful method of authentication is required. It has put
concentration on biometric security as only effective method in order to prove an identity.
Biometric traits are considered as inherent as well as unique to every people and comprise
physical as well as behavioral characteristics like fingerprint, iris, voice and face. Thus,
biometric security system can be helpful to verify identity of individuals with utmost accuracy as
well as reliability since it is a part of daily activities.
1.5 Rationale of the study
The number of platforms as well as devices is connected to internet of things and it is
increasing day by day at exponential rate. In addition, there are an excess number of devices like
smart phones, tablets, sensors and cloud based services. It helps to send and receive information
constantly. Moreover, there is a need to keep data out of hands of being unauthorized access.
However, passwords become cumbersome and customer utilizes same passwords for several
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

11INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGY
devices. It makes the system more vulnerable for hacking as there is possibility of human error
that cannot be ruled out. Relying on passwords for authentication is considered as very risky as it
is easily stolen, copied or cracked. At present days, homes, gadgets and cards are hooked up to
internet of things and engage several sensitive sharing of information. Hence, it is evident that
robust technology and better security is needed for safeguard devices as well as sensitive data.
Thus, implication of biometric technology in order to increase network security is an issue.
At present days, organizations have realized the benefits of using biometric security
devices in order to protect work computers, business assets and server rooms. Biometric can
represent future of electronic systems where more companies as well as organizations are
embracing it. It is considered as utmost importance in a corporate environment that accessing
secure systems as well as networks. Due to compliance, it is essential for ensuring workflow
procedures are followed correctly as well as specific staffs accessing particular files. Thus,
passwords are not considered as good choices as it is shared among people. In addition, the
organizations are using fingerprint biometrics for regulating access to computers or server room
as it allows person with positive fingerprint match. Hence, use of biometric for securing network
is considered as an important aspect and becomes an issue to use it properly.
1.6 Structure of the research study
The research study has made a division of the selected research topic such that each of
the chapter of the study is provided in details. Based on the below five chapters, the entire
content of chapter is summarized as follows:
Chapter 1: Introduction
devices. It makes the system more vulnerable for hacking as there is possibility of human error
that cannot be ruled out. Relying on passwords for authentication is considered as very risky as it
is easily stolen, copied or cracked. At present days, homes, gadgets and cards are hooked up to
internet of things and engage several sensitive sharing of information. Hence, it is evident that
robust technology and better security is needed for safeguard devices as well as sensitive data.
Thus, implication of biometric technology in order to increase network security is an issue.
At present days, organizations have realized the benefits of using biometric security
devices in order to protect work computers, business assets and server rooms. Biometric can
represent future of electronic systems where more companies as well as organizations are
embracing it. It is considered as utmost importance in a corporate environment that accessing
secure systems as well as networks. Due to compliance, it is essential for ensuring workflow
procedures are followed correctly as well as specific staffs accessing particular files. Thus,
passwords are not considered as good choices as it is shared among people. In addition, the
organizations are using fingerprint biometrics for regulating access to computers or server room
as it allows person with positive fingerprint match. Hence, use of biometric for securing network
is considered as an important aspect and becomes an issue to use it properly.
1.6 Structure of the research study
The research study has made a division of the selected research topic such that each of
the chapter of the study is provided in details. Based on the below five chapters, the entire
content of chapter is summarized as follows:
Chapter 1: Introduction

12INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGY
This chapter provides details on selected research thesis topic such that the reader should
able to understand the main theme of the topic. In this chapter, the biometric technology is
described in brief. The research aims as well as objectives are also discussed which help in
acknowledging the research topic.
Chapter 2: Literature Review
In this particular chapter, different biometric technologies are defined which helps to
understand which of the biometric technologies are mainly used for the security purposes. The
concept related to biometric technologies help researcher to understand the topic along with the
area of study. The literature sources tried to evaluate the concept into proper as well as efficient
manner. The critical perspective of this research study helps to observe the advantage as well as
challenges of the particular research topic.
Chapter 3: Research Methodology
The research methods help to collect the data based on selected research topic. In this
chapter, research methodology helps to identify the methods, data collection and analysis
methods. Selection of philosophy, approach, design helps to analyze the collected data properly.
The selection of methods is based on proper justifications such that the tools are being chosen.
Chapter 4: Data Analysis
The researcher analyzes the sources such that proper research outcome is gained. Increase
of security related to biometric technologies is analyzed properly in this particular chapter such
that the researcher can gain of knowledge on the selected topic. Data analysis is done with help
This chapter provides details on selected research thesis topic such that the reader should
able to understand the main theme of the topic. In this chapter, the biometric technology is
described in brief. The research aims as well as objectives are also discussed which help in
acknowledging the research topic.
Chapter 2: Literature Review
In this particular chapter, different biometric technologies are defined which helps to
understand which of the biometric technologies are mainly used for the security purposes. The
concept related to biometric technologies help researcher to understand the topic along with the
area of study. The literature sources tried to evaluate the concept into proper as well as efficient
manner. The critical perspective of this research study helps to observe the advantage as well as
challenges of the particular research topic.
Chapter 3: Research Methodology
The research methods help to collect the data based on selected research topic. In this
chapter, research methodology helps to identify the methods, data collection and analysis
methods. Selection of philosophy, approach, design helps to analyze the collected data properly.
The selection of methods is based on proper justifications such that the tools are being chosen.
Chapter 4: Data Analysis
The researcher analyzes the sources such that proper research outcome is gained. Increase
of security related to biometric technologies is analyzed properly in this particular chapter such
that the researcher can gain of knowledge on the selected topic. Data analysis is done with help
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 91
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.