Essay Undergraduate 464 words Human Written

Different Employee Identification Techniques

Last reviewed: ~3 min read Technology › Biometric
80% visible
Read full paper →
Paper Overview

Identification Methods In a physical security system, there are a number of different ways to identify employees for the purpose of granting them different levels of access to parts of a facility. In many instances, a combination of methods will be used for maximum effectiveness. Passcards are usually one of the lowest levels of identification. They are easy...

Writing Guide
Proper Note Taking Techniques

Taking notes may not seem like much fun, especially in a world where a person can just Google whatever he or she wants to know. Still, note taking is very important, and there are ways to do it right. Some instructors will request that you take notes and turn them in, just to make...

Related Writing Guide

Read full writing guide

Related Writing Guides

Read Full Writing Guide

Full Paper Example 464 words · 80% shown · Sign up to read all

Identification Methods In a physical security system, there are a number of different ways to identify employees for the purpose of granting them different levels of access to parts of a facility. In many instances, a combination of methods will be used for maximum effectiveness. Passcards are usually one of the lowest levels of identification. They are easy to create and implement, but they have a key weakness in that they are transferrable. As such, a passcard offers only the lowest level of security.

Because of this, security professionals look at things that are unique to an individual, but are not transferable. This typically involves some form of biometrics -- retina scans, iris texture scans, fingerprints, facial recognition, voice recognition or even the shape of your ear (Moren, 2014). Things like body shape and gait recognition have also been explored, as a means of identifying a person based on what are presumed to be unique traits (Boulgouris et al., 2005).

There have also been attempts to utilize things like handwriting analysis as a means of biometric analysis, based on analysis of texture (Zhu, Tan and Wang, 2000). Retina and fingerprint scans are among the more common biometric methodologies in use, however. Both are long-established technologies that are relatively cheap, and relatively foolproof. They are not entirely foolproof, however, which is why many companies prefer to utilize more than one method, such as combining a swipe card with a retina scan, or using multiple biometric methods.

There are concerns with these systems, however, as people might seek to gain access to the files containing critical biometric information, and find a way to replicate that information for input at an access point. Thus, even biometrics are posing a challenge for people involved in IT security. They are better than other methods, but not foolproof (de Chant, 2013). All told, most organizations are moving towards biometrics because they are effective.

The fact that fingerprints and facial recognition are in common use -- at borders, on electronic devices, has made the use of biometrics mainstream at this point, and companies are taking advantage of this to increase their use of such secure techniques. References Boulgouris, N., Hatzinakos, D. & Plataniotis, K. (2005). Gait recognition: A.

93 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
5 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Different Employee Identification Techniques" (2016, April 12) Retrieved April 19, 2026, from
https://www.paperdue.com/essay/different-employee-identification-techniques-2158515

Always verify citation format against your institution's current style guide.

80% of this paper shown 93 words remaining