Reference Hub2
Biometric Technology Solutions to Countering Today's Terrorism

Biometric Technology Solutions to Countering Today's Terrorism

Israel Fianyi, Tanveer Zia
Copyright: © 2016 |Volume: 6 |Issue: 4 |Pages: 13
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781466692213|DOI: 10.4018/IJCWT.2016100103
Cite Article Cite Article

MLA

Fianyi, Israel, and Tanveer Zia. "Biometric Technology Solutions to Countering Today's Terrorism." IJCWT vol.6, no.4 2016: pp.28-40. http://doi.org/10.4018/IJCWT.2016100103

APA

Fianyi, I. & Zia, T. (2016). Biometric Technology Solutions to Countering Today's Terrorism. International Journal of Cyber Warfare and Terrorism (IJCWT), 6(4), 28-40. http://doi.org/10.4018/IJCWT.2016100103

Chicago

Fianyi, Israel, and Tanveer Zia. "Biometric Technology Solutions to Countering Today's Terrorism," International Journal of Cyber Warfare and Terrorism (IJCWT) 6, no.4: 28-40. http://doi.org/10.4018/IJCWT.2016100103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The purpose of this paper is to examine the relevance of biometric technologies in increasing the fight against terrorism and other related border security challenges such as identity dominance. Since the 11th September, 2001 catastrophe in USA the need for biometrics technology for identification purpose has become important. Consequently, the many ripostes that were renewed on identity management included enhanced use of biometrics to verify and authenticate travellers at various airports as well as the use of video surveillance equipped with facial recognition sensors. The growth in data and storage devices have also become a critical phenomenon in biometrics deployment, the swiftness and accuracy with which these biometrics details can be processed is a prevailing challenge. This paper provides an extensive review of literatures on prospects of biometric technologies and other interrelated technologies in the fight against terrorism. To date, there is relatively meagre academic research examining how biometric technologies enhance border security as well as individual security.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.