SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
BIOMETRIC PERCEPTIONS FOR CAMPUS ACCESS CONTROL
The purpose of this study was to understand the perceptions of Purdue faculty, staff, and students regarding the implementation of biometric access control
systems across the Purdue campus. This was accomplished by collecting data in the form of one survey from 44 participants. The survey was created to focus
on their knowledge of existing biometrics and their willingness to adopt biometrics for campus access control. The new survey results came from Purdue
University students in Dr. Elliott’s IT 345 course and researchers in the Purdue Biometrics Lab.
David Fritz, Kevin Chang, Alan Brown, Bob Santarossa, Jaspreet Singh, Stuart Kilgus, Dr. Stephen Elliott, Kevin O’Connor
OVERVIEW
INITIAL SURVEY RESULTS NEW SURVEY RESULTS
FUTURE RESEARCH AND DEVELOPMENT
Answer Response %
Yes 400 95%
No 20 5%
Would you be willing to use
biometrics at these facilities if you
forgot your student ID?
0
50
100
150
200
250
Fingerprint I have not
used
biometrics
Signature Voice Hand
geometry
Face Iris Retina
Have you used any of the following
biometrics?
0
50
100
150
200
250
Improperly swiped ID No problems Damaged ID Other
Have you ever experienced any of the
following problems with your student ID
when entering the RSC?
Answer Response %
Yes 298 66%
No 153 34%
Have you forgotten your student ID
when going to the RSC / AQUA?
Answer Response %
Yes 61 14%
No 386 86%
Have you ever had your student ID
lost or stolen at the RSC/AQUA?
Answer Response %
Yes 396 89%
No 48 11%
Would you like to see biometrics
incorporated on campus for building
security and/or access control?
Answer Response %
Yes 393 88%
No 52 12%
Would you like to use biometrics for
entrance to recreational facilities?
0
50
100
150
200
250
300
Fingerprint recognition Hand geometry Iris recognition Facial recognition
Which biometric application (body part)
do you think is least intrusive?
0
5
10
15
20
25
30
35
40
45
Fingerprint
recognition
Hand
geometry
Signature
verification
Voice
recognition
Facial
recognition
Iris
recognition
Other Retinal
scanning
I have not
used
biometrics
Have you used any of the following
biometrics?
0
5
10
15
20
25
I have not experienced
any problems
Improperly swiping your
ID
Being denied access - ID
damaged
Other
Have you ever experienced any of the
following problems with your PUID?
0
5
10
15
20
25
Hand geometry Fingerprint recognition Iris recognition Facial recognition
Which biometric application (body part)
do you think is least intrusive?
0
2
4
6
8
10
12
14
16
18
20
Convenient Somewhat
convenient
Not sure Somewhat harder Much harder
How much more convenient do you
perceive will be using biometrics over
your PUID?
Answer Response %
Yes 35 81%
No 8 19%
Would you like to see biometrics
incorporated on campus for building
security and/or access control?
0
5
10
15
20
25
30
35
Strongly Agree Agree Neither Agree nor
Disagree
Disagree Strongly Disagree
How confident are you that biometrics
is a safe and secure program?
With the data results backing up the idea that biometric use on campus would be accepted and successful, the next step would be to determine if it is cost
effective and would be a worthwhile investment for the University.
Answer Response %
Yes 28 64%
No 16 36%
Have you ever had your student ID
lost or stolen at the RSC/AQUA?
Answer Response %
Yes 28 64%
No 16 36%
Have you forgotten your student ID
when going to the RSC / AQUA?
ADDITIONAL SURVEY RESULTS
Answer Response %
Yes 36 82%
No 8 18%
Would you like to use biometrics for
entrance to recreational facilities?
Would you be willing to use
biometrics at these facilities if you
forgot your student ID?
Answer Response %
Yes 43 98%
No 1 2%
Answer Response %
Yes 41 93%
No 3 7%
Do you see biometric access as a
useful resource on campus?

Más contenido relacionado

Similar a (Spring 2013) Biometric Perceptions for Campus Access Control

3Play on Campus: Research on Closed Captioning in Higher Ed
3Play on Campus: Research on Closed Captioning in Higher Ed3Play on Campus: Research on Closed Captioning in Higher Ed
3Play on Campus: Research on Closed Captioning in Higher Ed3Play Media
 
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Synopsys Software Integrity Group
 
TECHNICAL SEMINAR 517.pptx
TECHNICAL SEMINAR 517.pptxTECHNICAL SEMINAR 517.pptx
TECHNICAL SEMINAR 517.pptxvamshibanoth947
 
biometric technology presentation.pptx
biometric technology presentation.pptxbiometric technology presentation.pptx
biometric technology presentation.pptxnagasukanya1
 
Biometric authenticatiion technology
Biometric authenticatiion technologyBiometric authenticatiion technology
Biometric authenticatiion technologyNazeerKhan39
 
Study on authentication methods on the Internet
Study on authentication methods on the InternetStudy on authentication methods on the Internet
Study on authentication methods on the Internetmail.com
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentationZeca Boa
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014D2L Barry
 
2014 trends survey of Child health care professionals
2014 trends survey of Child health care professionals2014 trends survey of Child health care professionals
2014 trends survey of Child health care professionalsGRIVEAS ASSOCIATES
 
Software Advice IndustryView: Patient Perspectives on Telemedicine
Software Advice IndustryView: Patient Perspectives on TelemedicineSoftware Advice IndustryView: Patient Perspectives on Telemedicine
Software Advice IndustryView: Patient Perspectives on TelemedicineSoftware Advice
 
Facial Recognition Biometric Patterns
Facial Recognition Biometric PatternsFacial Recognition Biometric Patterns
Facial Recognition Biometric PatternsBahaa Abdulhadi
 
Impact of artificial intelligence on customer behavior
Impact of artificial intelligence on customer behaviorImpact of artificial intelligence on customer behavior
Impact of artificial intelligence on customer behaviorKathryn Mallari
 
CHC 2020 Telehealth Research Study
CHC 2020 Telehealth Research StudyCHC 2020 Telehealth Research Study
CHC 2020 Telehealth Research StudyCHC Connecticut
 
Turning numbers into data. workshop sample slides
Turning numbers into data. workshop sample slidesTurning numbers into data. workshop sample slides
Turning numbers into data. workshop sample slidesKeith Meadows
 
Syphilis Treatment Singapore: Why is HIV Testing Required for Work Permit Ren...
Syphilis Treatment Singapore: Why is HIV Testing Required for Work Permit Ren...Syphilis Treatment Singapore: Why is HIV Testing Required for Work Permit Ren...
Syphilis Treatment Singapore: Why is HIV Testing Required for Work Permit Ren...Anteh Dispensary
 

Similar a (Spring 2013) Biometric Perceptions for Campus Access Control (20)

3Play on Campus: Research on Closed Captioning in Higher Ed
3Play on Campus: Research on Closed Captioning in Higher Ed3Play on Campus: Research on Closed Captioning in Higher Ed
3Play on Campus: Research on Closed Captioning in Higher Ed
 
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
 
TECHNICAL SEMINAR 517.pptx
TECHNICAL SEMINAR 517.pptxTECHNICAL SEMINAR 517.pptx
TECHNICAL SEMINAR 517.pptx
 
biometric technology presentation.pptx
biometric technology presentation.pptxbiometric technology presentation.pptx
biometric technology presentation.pptx
 
Biometric authenticatiion technology
Biometric authenticatiion technologyBiometric authenticatiion technology
Biometric authenticatiion technology
 
Study on authentication methods on the Internet
Study on authentication methods on the InternetStudy on authentication methods on the Internet
Study on authentication methods on the Internet
 
14222825 pss7
14222825 pss714222825 pss7
14222825 pss7
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentation
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
 
2014 trends survey of Child health care professionals
2014 trends survey of Child health care professionals2014 trends survey of Child health care professionals
2014 trends survey of Child health care professionals
 
Software Advice IndustryView: Patient Perspectives on Telemedicine
Software Advice IndustryView: Patient Perspectives on TelemedicineSoftware Advice IndustryView: Patient Perspectives on Telemedicine
Software Advice IndustryView: Patient Perspectives on Telemedicine
 
Why Is Facial Recognition Better Than Fingerprint?
Why Is Facial Recognition Better Than Fingerprint?Why Is Facial Recognition Better Than Fingerprint?
Why Is Facial Recognition Better Than Fingerprint?
 
Facial Recognition Biometric Patterns
Facial Recognition Biometric PatternsFacial Recognition Biometric Patterns
Facial Recognition Biometric Patterns
 
Chapter four
Chapter fourChapter four
Chapter four
 
Biometric1
Biometric1Biometric1
Biometric1
 
Impact of artificial intelligence on customer behavior
Impact of artificial intelligence on customer behaviorImpact of artificial intelligence on customer behavior
Impact of artificial intelligence on customer behavior
 
CHC 2020 Telehealth Research Study
CHC 2020 Telehealth Research StudyCHC 2020 Telehealth Research Study
CHC 2020 Telehealth Research Study
 
Turning numbers into data. workshop sample slides
Turning numbers into data. workshop sample slidesTurning numbers into data. workshop sample slides
Turning numbers into data. workshop sample slides
 
Syphilis Treatment Singapore: Why is HIV Testing Required for Work Permit Ren...
Syphilis Treatment Singapore: Why is HIV Testing Required for Work Permit Ren...Syphilis Treatment Singapore: Why is HIV Testing Required for Work Permit Ren...
Syphilis Treatment Singapore: Why is HIV Testing Required for Work Permit Ren...
 

Más de International Center for Biometric Research

An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...International Center for Biometric Research
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...International Center for Biometric Research
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applicationsInternational Center for Biometric Research
 

Más de International Center for Biometric Research (20)

HBSI Automation Using the Kinect
HBSI Automation Using the KinectHBSI Automation Using the Kinect
HBSI Automation Using the Kinect
 
IT 34500
IT 34500IT 34500
IT 34500
 
An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...
 
Entropy of Fingerprints
Entropy of FingerprintsEntropy of Fingerprints
Entropy of Fingerprints
 
Biometric and usability
Biometric and usabilityBiometric and usability
Biometric and usability
 
Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4
 
Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6
 
Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2
 
Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1
 
Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3
 
Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
 
Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5
 
Standards and Academia
Standards and AcademiaStandards and Academia
Standards and Academia
 
Interoperability and the Stability Score Index
Interoperability and the Stability Score IndexInteroperability and the Stability Score Index
Interoperability and the Stability Score Index
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...
 
IT 54500 overview
IT 54500 overviewIT 54500 overview
IT 54500 overview
 
Ben thesis slideshow
Ben thesis slideshowBen thesis slideshow
Ben thesis slideshow
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications
 
ICBR Databases
ICBR DatabasesICBR Databases
ICBR Databases
 
Understanding Fingerprint Skin Characteristics and Image Quality
Understanding Fingerprint Skin Characteristics and Image QualityUnderstanding Fingerprint Skin Characteristics and Image Quality
Understanding Fingerprint Skin Characteristics and Image Quality
 

Último

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

(Spring 2013) Biometric Perceptions for Campus Access Control

  • 1. BIOMETRIC PERCEPTIONS FOR CAMPUS ACCESS CONTROL The purpose of this study was to understand the perceptions of Purdue faculty, staff, and students regarding the implementation of biometric access control systems across the Purdue campus. This was accomplished by collecting data in the form of one survey from 44 participants. The survey was created to focus on their knowledge of existing biometrics and their willingness to adopt biometrics for campus access control. The new survey results came from Purdue University students in Dr. Elliott’s IT 345 course and researchers in the Purdue Biometrics Lab. David Fritz, Kevin Chang, Alan Brown, Bob Santarossa, Jaspreet Singh, Stuart Kilgus, Dr. Stephen Elliott, Kevin O’Connor OVERVIEW INITIAL SURVEY RESULTS NEW SURVEY RESULTS FUTURE RESEARCH AND DEVELOPMENT Answer Response % Yes 400 95% No 20 5% Would you be willing to use biometrics at these facilities if you forgot your student ID? 0 50 100 150 200 250 Fingerprint I have not used biometrics Signature Voice Hand geometry Face Iris Retina Have you used any of the following biometrics? 0 50 100 150 200 250 Improperly swiped ID No problems Damaged ID Other Have you ever experienced any of the following problems with your student ID when entering the RSC? Answer Response % Yes 298 66% No 153 34% Have you forgotten your student ID when going to the RSC / AQUA? Answer Response % Yes 61 14% No 386 86% Have you ever had your student ID lost or stolen at the RSC/AQUA? Answer Response % Yes 396 89% No 48 11% Would you like to see biometrics incorporated on campus for building security and/or access control? Answer Response % Yes 393 88% No 52 12% Would you like to use biometrics for entrance to recreational facilities? 0 50 100 150 200 250 300 Fingerprint recognition Hand geometry Iris recognition Facial recognition Which biometric application (body part) do you think is least intrusive? 0 5 10 15 20 25 30 35 40 45 Fingerprint recognition Hand geometry Signature verification Voice recognition Facial recognition Iris recognition Other Retinal scanning I have not used biometrics Have you used any of the following biometrics? 0 5 10 15 20 25 I have not experienced any problems Improperly swiping your ID Being denied access - ID damaged Other Have you ever experienced any of the following problems with your PUID? 0 5 10 15 20 25 Hand geometry Fingerprint recognition Iris recognition Facial recognition Which biometric application (body part) do you think is least intrusive? 0 2 4 6 8 10 12 14 16 18 20 Convenient Somewhat convenient Not sure Somewhat harder Much harder How much more convenient do you perceive will be using biometrics over your PUID? Answer Response % Yes 35 81% No 8 19% Would you like to see biometrics incorporated on campus for building security and/or access control? 0 5 10 15 20 25 30 35 Strongly Agree Agree Neither Agree nor Disagree Disagree Strongly Disagree How confident are you that biometrics is a safe and secure program? With the data results backing up the idea that biometric use on campus would be accepted and successful, the next step would be to determine if it is cost effective and would be a worthwhile investment for the University. Answer Response % Yes 28 64% No 16 36% Have you ever had your student ID lost or stolen at the RSC/AQUA? Answer Response % Yes 28 64% No 16 36% Have you forgotten your student ID when going to the RSC / AQUA? ADDITIONAL SURVEY RESULTS Answer Response % Yes 36 82% No 8 18% Would you like to use biometrics for entrance to recreational facilities? Would you be willing to use biometrics at these facilities if you forgot your student ID? Answer Response % Yes 43 98% No 1 2% Answer Response % Yes 41 93% No 3 7% Do you see biometric access as a useful resource on campus?