Biometric authentication: assuring access to information

Article Properties
Abstract
Cite
Harris, Austin Jay, and David C. Yen. “Biometric Authentication: Assuring Access to Information”. Information Management &Amp; Computer Security, vol. 10, no. 1, 2002, pp. 12-19, https://doi.org/10.1108/09685220210417463.
Harris, A. J., & Yen, D. C. (2002). Biometric authentication: assuring access to information. Information Management &Amp; Computer Security, 10(1), 12-19. https://doi.org/10.1108/09685220210417463
Harris AJ, Yen DC. Biometric authentication: assuring access to information. Information Management & Computer Security. 2002;10(1):12-9.
Description

Can biometric technology solve the problem of information security? This paper explores the role of biometrics in safeguarding information in the business world, defining biometric technology and its potential to enhance identification and authentication processes. It traces the evolution of authorization methods and explains the necessity for more robust security measures in today's environment. The author argues that biometric authentication offers a powerful solution for controlling access to valuable systems, considering factors that may influence the effectiveness of identification systems and assessing the feasibility of implementing biometric systems. While acknowledging that biometric authentication may not be suitable for every organization, the study points to its successful use in the Department of Defense community. For businesses, the study emphasizes the need to understand and adopt biometric technologies to protect sensitive information and systems. By grasping biometric authentication now, businesses can proactively enhance their security posture and mitigate risks in a volatile digital world.

Refrences
Citations
Citations Analysis
The first research to cite this article was titled Managing computer security issues: preventing and limiting future threats and disasters and was published in 2005. The most recent citation comes from a 2022 study titled Managing computer security issues: preventing and limiting future threats and disasters . This article reached its peak citation in 2018 , with 2 citations.It has been cited in 13 different journals, 15% of which are open access. Among related journals, the IEEE Access cited this research the most, with 1 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year