Biometrics! Biometric Attendance Recording Pilot at Perth College UHI Facilitated by Derek Summers, Computing Lecturer.

Slides:



Advertisements
Similar presentations
Dorothy Brewster-Lee Senior Technical Advisor, Tanzania March 30, 2011 ICT4 Development Conference Lusaka, Zambia Improving OVC Programming with Mobile.
Advertisements

GCSE ICT Networks & Security..
NetPay provides best and effective solution for company Managers to maintain their employee scheduling task (including staff in/out details, overtime,
EventMarker The EventMarker system is designed to integrate seamlessly with your MIS database - recording and merging collected data directly into.
Class Capture at the Dr. Sue Clabaugh Asst. Director, Learning Technologies & Environments Division of Information Technology University of Maryland College.
Chapter 4 Infrastructure as a Service (IaaS)
e-Solutions for Access Control, CCTV, Attendance Monitoring, Personal Identification, Building Management and Fire Detection SECURITY & SAFETY IS ONE.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Biometric Time & Attendance Solutions
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
FIT3105 Smart card based authentication and identity management Lecture 4.
Introduction to Operating Systems What is an operating system? Examples How do many programs run at the same time, with one processor?
Online Surveys: Approach, Issues and Challenges Mohini Singh PhD School of BIT.
ISIDORE Project Progress, Performance and Future.
AUTOMATIC DATA CAPTURE  a term to describe technologies which aim to immediately identify data with 100 percent accuracy.
Biometric Daily Time Record
Certificate and Key Storage Tokens and Software
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Will you need your umbrella?.  Objective: Explain the Cloud In business terms, so you can see if it will benefit you.  Agenda: 12:00 – Welcome and Introductions.
The State of SAN Steve Terrill Manager of Systems Architecture Interstate National Insurance.
Today’s Lecture application controls audit methodology.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
The Impact of Physical Security on Network Security
Web Conferencing the Next Step in Online Educational Tools Tom Duda Walters State Community College.
Using Blackboard Communities for Student Government Elections and Orientation Presented by John Fritz & Bob Armstrong April 14, 2005.
Project Feasibility Presentation Helping People Be Healthy!
Security and backups GCSE ICT.
On-Line: Undergraduate Admissions Applications. College of Charleston Profile 13 th oldest college in the nation founded in 1770 Traditional Liberal Arts.
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
1. Don’t assume we are digitally literate Take care not to make assumptions about learners or specific groups e.g those taking certain subjects. Remember.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Welcome To Business Summary DiveIn Incorporated is a small company that specializes in the sales of swimming pools supplies to homeowners by mail order.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
UNSD Census Workshop Day 2 - Session 7 Data Capture: Intelligent Character Recognition Andy Tye – International Manager DRS are Worldwide specialists in.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Minted - Moodle Integration with Enterprise Data A JISC funded demonstrator project in the Toolkits and Demonstrators strand Carol Shergold and Paolo Oprandi.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Cmpe 471: Personnel and Legal Issues. Personnel Crime is a human issue not a technological one Hiring On-going management Unauthorised access Redundancy.
ICT in Education. Use of computers for school / college administration Schools and colleges employ staff, pay for goods and services, keep records of.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
English Functional Skills
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Unit 8 – Project Management Lesson 3 project proposal.
Controlsoft have 25 years experience in the development, manufacture and distribution of Access Control Solutions. With over 10,000 systems in daily use.
Unit 32 – Networked Systems Security
Physical Security Concerns for LAN Management By: Derek McQuillen.
Online School Management System Supervisor Name: Ashraful Islam Juwel Lecturer of Asian University of Bangladesh Submitted By: Bikash Chandra SutrodhorID.
The information systems lifecycle Far more boring than you ever dreamed possible!
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
Management Information Systems & School Registration 1.
Being a Canvas Early Implementer Lolita Alfred Lecturer, Faculty of Health and Social Care
BNU - HKBU United International College 信息科技服务中心 Information Technology Services Centre.
Nexbase Invites You To Our Special Products
Organizations: school, home, environment
Challenge/Response Authentication
UNSD Census Workshop Data Capture: Intelligent Character Recognition
Ascent Attendance Management Software
Selection and Use of Input Devices and Input Media High Volume Devices
Digital Learning at GCU
OCR GCSE ICT Data capture methods.
OCR GCSE ICT Data capture methods.
Chart of Accounts/ESSA School Level Reporting–What’s Next?
Nagios 3.0 Your Company Name.
Security of Data  
Module 2 OBJECTIVE 14: Compare various security mechanisms.
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Biometrics! Biometric Attendance Recording Pilot at Perth College UHI Facilitated by Derek Summers, Computing Lecturer

Perth College UHI

Context Project for computing students Ease problem for staff Hardware and software Pros and cons Student feedback Next steps

Computing Project Graduate students only initially A project with operational benefits Backup to usual attendance methods

Ease Problem for Staff Marking attendance online or manually Funded students responsible for own attendance Remove risk of buddy swiping or forgotten id cards Help students engage more

Hardware/Software Biometric readers Server hardware Software Supplied by M3 Biometrics Perth Scotland

Pros and Cons Positive Ease of use Can’t forget your finger Minimal intervention so less error risk for staff Robust data collection Students engaged actively in process Negative High quality finger print required “Big brother” concerns for some older students Some students aware it was backup and didn’t use it Potentially expensive to implement on large scale

Student Feedback To be aware of Easy to use Generally younger students had no problem with biometrics International students used the system dutifully Negative Some older students seemed concerned about “fingerprints being kept on file” A “good” fingerprint is needed, not suitable for all students Positive  When positioning readers make sure they’re accessible to wheelchair users

Next Steps Short term Expand system to encompass all computing students Integrate with CELCAT Attendance Offer wireless portable readers in certain areas Longer term Attach readers to door locks to allow certain students (e.g. PHD) to access the rooms outside of normal hours Eventually may be roll out system across college in conjunction with other data capture methods

Thank You