ITC571 Emerging Technologies: Biometrics Security Project Blogs

Verified

Added on  2023/04/10

|3
|671
|410
Project
AI Summary
This project blog documents the progress of a Biometrics Security project undertaken for the ITC571 Emerging Technologies and Innovation course. Week 1 focuses on project conceptualization, title selection, research rationale concerning cybercrimes, and proposal development. Week 2 involves project planning, finalizing the qualitative research methodology using grounded theory and case studies, and resource allocation via the RACI matrix. Weeks 3 and 4 detail the execution of the research, including primary data collection through interviews and observations in both IT and non-IT firms, focusing on the application of biometrics security to mitigate cyber threats. The blog entries also cite relevant research on cybercrime and biometrics authentication. Desklib provides students with access to similar project reports and study resources.
Document Page
Project Blogs
Project Blogs
Week 1
The first week of the project included the conceptualization phase of the project. In this week,
the first task that was done was the selection and confirmation of the project title. Biometrics
Security was selected as the title of the project. Research rationale was done in this week as
the next task. Cybercrimes have become a frequent occurrence in the business organizations.
Also, the individual users are impacted with such crimes resulting in adverse impacts. The
digital information is captured by the cyber criminals resulting in the violation of information
privacy and security. The organizations also suffer badly due to these incidents as there
negative implications, such as legal obligations, loss of customer trust, and poor market
reputation that arises. There was a research proposal that was developed in this week
comprising of the research details and methods. The approval from the supervisor was then
obtained on the research proposal.
Week 2
It was necessary to plan the research work adequately so that the research aims and objectives
could be achieved. The week started with the planning of the project and the research
methodology was finalized in this week. The research method used to find out about the
applications of Biometrics Security in the IT and non-IT fields for treating cybercrimes will
be done using qualitative research methods. The exploration of the research subject will be
done under this method to provide the answers to the research questions. Grounded theory
and case study will be used to carry out the research. The theory will be used to determine the
essence of the biometrics security measures in the IT and non-IT companies. The data
collection methods as interviews, observations, etc. were also finalized in this week and the
estimations & calculations were carried out. The resources were allotted their duties and roles
through the RACI matrix.
Week 3
The research execution kick started in this week of the project. It was necessary that the data
sets were gathered to analyse the information and come up with the research outcomes. The
primary data collection methods there were used for the research work were interviews and
observations. The research for the use and application of biometrics security was done for the
IT firms in this week. The interviews were conducted with the employees of the
organizations of various small, medium, and large-scale IT firms. The technical experts and
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Project Blogs
Biometric specialists were also interviewed to determine the possible use of the measure. The
cyber specialists were interviewed to determine the forms of these attacks and the threat
agents that are used. The observation of the existing systems and tools was done to
understand the attack patterns and mechanisms (Zhu, 2015). All of these data sets were then
compiled so that the analysis could be done properly.
Week 4
In this week, the data collection process for the IT firms continued for the initial days of the
week. The data collection process for the non-IT firms then began. The collection of the data
sets was done for the non-IT firms under several domains, such as healthcare, finance,
marketing, and several others. Interviews and observations were the primary measures that
were used. The interviews were conducted with the employees of the organizations of various
small, medium, and large-scale non-IT firms. The marketing associates and technical
employees were also interviewed to determine the possible use of the measure. The cyber
specialists were interviewed to determine the forms of these attacks and the threat agents that
are used (Parodi, 2013). The observation of the existing systems and tools was done to
understand the attack patterns and mechanisms. The compilation of all of these data sets was
then done to analyse the data sets.
2
Document Page
Project Blogs
References
Parodi, F. (2013). The Concept of Cybercrime and Online Threats Analysis. International
Journal Of Information Security And Cybercrime, 2(1), 59-66. doi:
10.19107/ijisc.2013.01.07
Zhu, H. (2015). One-time identity-password authenticated key agreement scheme based on
biometrics. Security And Communication Networks, 8(13), 2350-2360. doi:
10.1002/sec.1182
3
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]