SlideShare una empresa de Scribd logo
1 de 14
C H E N G W I N G L A M 
1 4 2 2 2 8 2 5 
2 4 O C T O B E R 2 0 1 4
Introduction of Security Innovation 
Objective 
Video 
Application 
Advantages 
Disadvantages 
Survey Results 
Mind map 
Conclusion
INTRODUCTION 
Using individual specific biological characteristic to verify 
identity for security
OBJECTIVE 
Compare familiarity and acceptance between teenagers and 
elder people when using biometrics innovation 
technology
HOW BIOMETRICS WORKS IN OUR LIFE
APPLICATIONS
ADVANTAGES 
- Safer and easier life 
- User-friendly 
- High levels of accuracy
DISADVANTAGES 
- High cost 
- Many variables during recognition
DATA ANALYSIS 
0 2 4 6 8 10 12 
10-20 
21-30 
31-40 
41-50 
51 or above 
Number of people 
Age group 
What is your age? 
10-20 
21-30 
31-40 
41-50 
51 or above
DATA ANALYSIS 
25 
20 
15 
10 
5 
0 
People's Recognition on Security Innovation 
Face perception Fingerprint recognition Automatic Speech 
Recognition 
Retinal scanning 
Face perception 
Fingerprint recognition 
Automatic Speech Recognition 
Retinal scanning
DATA ANALYSIS 
12 
10 
8 
6 
4 
2 
0 
People's opinion on security innovation 
reliable user-friendly 
Number of People 
Opinions 
Strongly disagree 
Disagree 
Neither disagree nor agree 
Agree 
Strongly agree
DATA ANALYSIS 
0 2 4 6 8 10 12 14 16 18 
Password 
Biometrics 
Number of People 
Choices 
People's Choice on Accessing Their Secure Properties 
Password 
Biometrics
MIND MAP
JOB DIVISION 
Content & Data Analysis: Yeung Pui Ling 
Frame Animation: Cheng Wing Lam 
Video sourcing: Luo Yi Lin

Más contenido relacionado

Destacado

Coöperatieve spelen 2: Doorgeven
Coöperatieve spelen 2: DoorgevenCoöperatieve spelen 2: Doorgeven
Coöperatieve spelen 2: DoorgevenBert van der Neut
 
Registros de los Microprocesadores
Registros de los MicroprocesadoresRegistros de los Microprocesadores
Registros de los Microprocesadoresjosep urdaneta
 
My home town sustainability
My home town sustainabilityMy home town sustainability
My home town sustainabilityAli Alshock
 
Ppt0000002
Ppt0000002Ppt0000002
Ppt0000002cip3028
 
I like how it feels
I like how it feelsI like how it feels
I like how it feelsRoyB
 
Interaktív oktatás - rajz mobileszközön
Interaktív oktatás - rajz mobileszközönInteraktív oktatás - rajz mobileszközön
Interaktív oktatás - rajz mobileszközönandreabedo
 
Az erdő a turista szemével
Az erdő a turista szemévelAz erdő a turista szemével
Az erdő a turista szemévelandreabedo
 

Destacado (9)

Coöperatieve spelen 2: Doorgeven
Coöperatieve spelen 2: DoorgevenCoöperatieve spelen 2: Doorgeven
Coöperatieve spelen 2: Doorgeven
 
Registros de los Microprocesadores
Registros de los MicroprocesadoresRegistros de los Microprocesadores
Registros de los Microprocesadores
 
Semantik
SemantikSemantik
Semantik
 
My home town sustainability
My home town sustainabilityMy home town sustainability
My home town sustainability
 
Ppt0000002
Ppt0000002Ppt0000002
Ppt0000002
 
I like how it feels
I like how it feelsI like how it feels
I like how it feels
 
Tanarseged
TanarsegedTanarseged
Tanarseged
 
Interaktív oktatás - rajz mobileszközön
Interaktív oktatás - rajz mobileszközönInteraktív oktatás - rajz mobileszközön
Interaktív oktatás - rajz mobileszközön
 
Az erdő a turista szemével
Az erdő a turista szemévelAz erdő a turista szemével
Az erdő a turista szemével
 

Similar a 14222825 pss7

Consumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite GroupConsumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite GroupTransUnion
 
Codesafe Voucher Report Final Feb
Codesafe Voucher Report Final FebCodesafe Voucher Report Final Feb
Codesafe Voucher Report Final FebDavid Broadhurst
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in EducationBloxx
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBloxx
 
Application-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdfApplication-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdfAnil
 
Application-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdfApplication-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdfAnil
 
The Case for Voice + Face Recognition
The Case for Voice + Face RecognitionThe Case for Voice + Face Recognition
The Case for Voice + Face Recognitionderektop
 
Implementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile IdentityImplementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile IdentityJeff Green
 
Usabiltyvs Security Case study of SmartPhone OS
Usabiltyvs Security Case study of SmartPhone OSUsabiltyvs Security Case study of SmartPhone OS
Usabiltyvs Security Case study of SmartPhone OSRajiv Ranjan Singh
 
DigiSight Technologies
DigiSight TechnologiesDigiSight Technologies
DigiSight TechnologiesHealthegy
 
Fingerprint technology in our lives
Fingerprint technology in our livesFingerprint technology in our lives
Fingerprint technology in our livescodykong
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesAdesh Singh
 
Transparency and Contracts: Continuous Integration and Delivery in the Automo...
Transparency and Contracts: Continuous Integration and Delivery in the Automo...Transparency and Contracts: Continuous Integration and Delivery in the Automo...
Transparency and Contracts: Continuous Integration and Delivery in the Automo...Eric Knauss
 
Top Biometric Scan Solution Providers | Trusted Experts
Top Biometric Scan Solution Providers | Trusted ExpertsTop Biometric Scan Solution Providers | Trusted Experts
Top Biometric Scan Solution Providers | Trusted ExpertsVensysco Infra
 
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...IRJET Journal
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile BankingVeridium
 

Similar a 14222825 pss7 (20)

Consumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite GroupConsumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite Group
 
Codesafe Voucher Report Final Feb
Codesafe Voucher Report Final FebCodesafe Voucher Report Final Feb
Codesafe Voucher Report Final Feb
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in Education
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for Education
 
Application-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdfApplication-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdf
 
Application-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdfApplication-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdf
 
The Case for Voice + Face Recognition
The Case for Voice + Face RecognitionThe Case for Voice + Face Recognition
The Case for Voice + Face Recognition
 
Three trends in cybersecurity
Three trends in cybersecurityThree trends in cybersecurity
Three trends in cybersecurity
 
Implementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile IdentityImplementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile Identity
 
Usabiltyvs Security Case study of SmartPhone OS
Usabiltyvs Security Case study of SmartPhone OSUsabiltyvs Security Case study of SmartPhone OS
Usabiltyvs Security Case study of SmartPhone OS
 
DigiSight Technologies
DigiSight TechnologiesDigiSight Technologies
DigiSight Technologies
 
Fingerprint technology in our lives
Fingerprint technology in our livesFingerprint technology in our lives
Fingerprint technology in our lives
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
Digital Assurance - Today & Tomorrow
Digital Assurance - Today & TomorrowDigital Assurance - Today & Tomorrow
Digital Assurance - Today & Tomorrow
 
Transparency and Contracts: Continuous Integration and Delivery in the Automo...
Transparency and Contracts: Continuous Integration and Delivery in the Automo...Transparency and Contracts: Continuous Integration and Delivery in the Automo...
Transparency and Contracts: Continuous Integration and Delivery in the Automo...
 
Top Biometric Scan Solution Providers | Trusted Experts
Top Biometric Scan Solution Providers | Trusted ExpertsTop Biometric Scan Solution Providers | Trusted Experts
Top Biometric Scan Solution Providers | Trusted Experts
 
merged_document
merged_documentmerged_document
merged_document
 
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 

Último

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 

Último (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

14222825 pss7

  • 1. C H E N G W I N G L A M 1 4 2 2 2 8 2 5 2 4 O C T O B E R 2 0 1 4
  • 2. Introduction of Security Innovation Objective Video Application Advantages Disadvantages Survey Results Mind map Conclusion
  • 3. INTRODUCTION Using individual specific biological characteristic to verify identity for security
  • 4. OBJECTIVE Compare familiarity and acceptance between teenagers and elder people when using biometrics innovation technology
  • 5. HOW BIOMETRICS WORKS IN OUR LIFE
  • 7. ADVANTAGES - Safer and easier life - User-friendly - High levels of accuracy
  • 8. DISADVANTAGES - High cost - Many variables during recognition
  • 9. DATA ANALYSIS 0 2 4 6 8 10 12 10-20 21-30 31-40 41-50 51 or above Number of people Age group What is your age? 10-20 21-30 31-40 41-50 51 or above
  • 10. DATA ANALYSIS 25 20 15 10 5 0 People's Recognition on Security Innovation Face perception Fingerprint recognition Automatic Speech Recognition Retinal scanning Face perception Fingerprint recognition Automatic Speech Recognition Retinal scanning
  • 11. DATA ANALYSIS 12 10 8 6 4 2 0 People's opinion on security innovation reliable user-friendly Number of People Opinions Strongly disagree Disagree Neither disagree nor agree Agree Strongly agree
  • 12. DATA ANALYSIS 0 2 4 6 8 10 12 14 16 18 Password Biometrics Number of People Choices People's Choice on Accessing Their Secure Properties Password Biometrics
  • 14. JOB DIVISION Content & Data Analysis: Yeung Pui Ling Frame Animation: Cheng Wing Lam Video sourcing: Luo Yi Lin