The chapter 1 has set the background for this research, while chapters 2 and 3 discuss the biometrics measurements and the risk applications. The two latter chapters have given the foundation of the study, which are further explored by using the research methods suggested to capture the experiences and the views of businesses, governments and society. The chapter 4 focuses on the techniques of acquiring data and information for the procurement of knowledge. The methods and methodologies adopted aids in studying the subject matter. Both quantitative and qualitative processes of collecting data were employed which encourages a rich mixture of analysis and conclusive findings. The chapter 4 further presents SCSBAM and chapter 5 critically evaluates the research area. However, this chapter concludes with recommendation, contribution to knowledge and future work.


Identity Theft Unique Physical Attribute Biometric Measurement Internet Security Credit Card Fraud 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Delac, K., and Grgic, M., 2004, A survey of biometric recognition methods, 46th International Symposium Electronics in Marine, ELMAR-2004, June, Zadar, CroatiaGoogle Scholar
  2. Prabhakar, S., Pankanti, S., Jain, A.K., 2003, Biometric Recognition: Security and Privacy Concerns, IEEE Security & Privacy, March/April.Google Scholar
  3. Shoniregun, C.A., 2007, Lecture: Impacts of Biometrics on the Society, University of East London (UeL), London, UK.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Personalised recommendations