SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
BIOMETRIC PERCEPTIONS FOR CAMPUS ACCESS CONTROL
The purpose of this study was to understand the perceptions of Purdue faculty, staff, and students regarding the implementation of biometric access control
systems across the Purdue campus. This was accomplished by collecting data in the form of one survey from 44 participants. The survey was created to focus
on their knowledge of existing biometrics and their willingness to adopt biometrics for campus access control. The new survey results came from Purdue
University students in Dr. Elliott’s IT 345 course and researchers in the Purdue Biometrics Lab.
David Fritz, Kevin Chang, Alan Brown, Bob Santarossa, Jaspreet Singh, Stuart Kilgus, Dr. Stephen Elliott, Kevin O’Connor
OVERVIEW
INITIAL SURVEY RESULTS NEW SURVEY RESULTS
FUTURE RESEARCH AND DEVELOPMENT
Answer Response %
Yes 400 95%
No 20 5%
Would you be willing to use
biometrics at these facilities if you
forgot your student ID?
0
50
100
150
200
250
Fingerprint I have not
used
biometrics
Signature Voice Hand
geometry
Face Iris Retina
Have you used any of the following
biometrics?
0
50
100
150
200
250
Improperly swiped ID No problems Damaged ID Other
Have you ever experienced any of the
following problems with your student ID
when entering the RSC?
Answer Response %
Yes 298 66%
No 153 34%
Have you forgotten your student ID
when going to the RSC / AQUA?
Answer Response %
Yes 61 14%
No 386 86%
Have you ever had your student ID
lost or stolen at the RSC/AQUA?
Answer Response %
Yes 396 89%
No 48 11%
Would you like to see biometrics
incorporated on campus for building
security and/or access control?
Answer Response %
Yes 393 88%
No 52 12%
Would you like to use biometrics for
entrance to recreational facilities?
0
50
100
150
200
250
300
Fingerprint recognition Hand geometry Iris recognition Facial recognition
Which biometric application (body part)
do you think is least intrusive?
0
5
10
15
20
25
30
35
40
45
Fingerprint
recognition
Hand
geometry
Signature
verification
Voice
recognition
Facial
recognition
Iris
recognition
Other Retinal
scanning
I have not
used
biometrics
Have you used any of the following
biometrics?
0
5
10
15
20
25
I have not experienced
any problems
Improperly swiping your
ID
Being denied access - ID
damaged
Other
Have you ever experienced any of the
following problems with your PUID?
0
5
10
15
20
25
Hand geometry Fingerprint recognition Iris recognition Facial recognition
Which biometric application (body part)
do you think is least intrusive?
0
2
4
6
8
10
12
14
16
18
20
Convenient Somewhat
convenient
Not sure Somewhat harder Much harder
How much more convenient do you
perceive will be using biometrics over
your PUID?
Answer Response %
Yes 35 81%
No 8 19%
Would you like to see biometrics
incorporated on campus for building
security and/or access control?
0
5
10
15
20
25
30
35
Strongly Agree Agree Neither Agree nor
Disagree
Disagree Strongly Disagree
How confident are you that biometrics
is a safe and secure program?
With the data results backing up the idea that biometric use on campus would be accepted and successful, the next step would be to determine if it is cost
effective and would be a worthwhile investment for the University.
Answer Response %
Yes 28 64%
No 16 36%
Have you ever had your student ID
lost or stolen at the RSC/AQUA?
Answer Response %
Yes 28 64%
No 16 36%
Have you forgotten your student ID
when going to the RSC / AQUA?
ADDITIONAL SURVEY RESULTS
Answer Response %
Yes 36 82%
No 8 18%
Would you like to use biometrics for
entrance to recreational facilities?
Would you be willing to use
biometrics at these facilities if you
forgot your student ID?
Answer Response %
Yes 43 98%
No 1 2%
Answer Response %
Yes 41 93%
No 3 7%
Do you see biometric access as a
useful resource on campus?

Weitere ähnliche Inhalte

Ähnlich wie (Spring 2013) Biometric Perceptions for Campus Access Control

3Play on Campus: Research on Closed Captioning in Higher Ed
3Play on Campus: Research on Closed Captioning in Higher Ed3Play on Campus: Research on Closed Captioning in Higher Ed
3Play on Campus: Research on Closed Captioning in Higher Ed3Play Media
 
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Synopsys Software Integrity Group
 
TECHNICAL SEMINAR 517.pptx
TECHNICAL SEMINAR 517.pptxTECHNICAL SEMINAR 517.pptx
TECHNICAL SEMINAR 517.pptxvamshibanoth947
 
biometric technology presentation.pptx
biometric technology presentation.pptxbiometric technology presentation.pptx
biometric technology presentation.pptxnagasukanya1
 
Biometric authenticatiion technology
Biometric authenticatiion technologyBiometric authenticatiion technology
Biometric authenticatiion technologyNazeerKhan39
 
Study on authentication methods on the Internet
Study on authentication methods on the InternetStudy on authentication methods on the Internet
Study on authentication methods on the Internetmail.com
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentationZeca Boa
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014D2L Barry
 
2014 trends survey of Child health care professionals
2014 trends survey of Child health care professionals2014 trends survey of Child health care professionals
2014 trends survey of Child health care professionalsGRIVEAS ASSOCIATES
 
Software Advice IndustryView: Patient Perspectives on Telemedicine
Software Advice IndustryView: Patient Perspectives on TelemedicineSoftware Advice IndustryView: Patient Perspectives on Telemedicine
Software Advice IndustryView: Patient Perspectives on TelemedicineSoftware Advice
 
Facial Recognition Biometric Patterns
Facial Recognition Biometric PatternsFacial Recognition Biometric Patterns
Facial Recognition Biometric PatternsBahaa Abdulhadi
 
Impact of artificial intelligence on customer behavior
Impact of artificial intelligence on customer behaviorImpact of artificial intelligence on customer behavior
Impact of artificial intelligence on customer behaviorKathryn Mallari
 
CHC 2020 Telehealth Research Study
CHC 2020 Telehealth Research StudyCHC 2020 Telehealth Research Study
CHC 2020 Telehealth Research StudyCHC Connecticut
 
Turning numbers into data. workshop sample slides
Turning numbers into data. workshop sample slidesTurning numbers into data. workshop sample slides
Turning numbers into data. workshop sample slidesKeith Meadows
 
Syphilis Treatment Singapore: Why is HIV Testing Required for Work Permit Ren...
Syphilis Treatment Singapore: Why is HIV Testing Required for Work Permit Ren...Syphilis Treatment Singapore: Why is HIV Testing Required for Work Permit Ren...
Syphilis Treatment Singapore: Why is HIV Testing Required for Work Permit Ren...Anteh Dispensary
 

Ähnlich wie (Spring 2013) Biometric Perceptions for Campus Access Control (20)

3Play on Campus: Research on Closed Captioning in Higher Ed
3Play on Campus: Research on Closed Captioning in Higher Ed3Play on Campus: Research on Closed Captioning in Higher Ed
3Play on Campus: Research on Closed Captioning in Higher Ed
 
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
 
TECHNICAL SEMINAR 517.pptx
TECHNICAL SEMINAR 517.pptxTECHNICAL SEMINAR 517.pptx
TECHNICAL SEMINAR 517.pptx
 
biometric technology presentation.pptx
biometric technology presentation.pptxbiometric technology presentation.pptx
biometric technology presentation.pptx
 
Biometric authenticatiion technology
Biometric authenticatiion technologyBiometric authenticatiion technology
Biometric authenticatiion technology
 
Study on authentication methods on the Internet
Study on authentication methods on the InternetStudy on authentication methods on the Internet
Study on authentication methods on the Internet
 
14222825 pss7
14222825 pss714222825 pss7
14222825 pss7
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentation
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
 
2014 trends survey of Child health care professionals
2014 trends survey of Child health care professionals2014 trends survey of Child health care professionals
2014 trends survey of Child health care professionals
 
Software Advice IndustryView: Patient Perspectives on Telemedicine
Software Advice IndustryView: Patient Perspectives on TelemedicineSoftware Advice IndustryView: Patient Perspectives on Telemedicine
Software Advice IndustryView: Patient Perspectives on Telemedicine
 
Why Is Facial Recognition Better Than Fingerprint?
Why Is Facial Recognition Better Than Fingerprint?Why Is Facial Recognition Better Than Fingerprint?
Why Is Facial Recognition Better Than Fingerprint?
 
Facial Recognition Biometric Patterns
Facial Recognition Biometric PatternsFacial Recognition Biometric Patterns
Facial Recognition Biometric Patterns
 
Chapter four
Chapter fourChapter four
Chapter four
 
Biometric1
Biometric1Biometric1
Biometric1
 
Impact of artificial intelligence on customer behavior
Impact of artificial intelligence on customer behaviorImpact of artificial intelligence on customer behavior
Impact of artificial intelligence on customer behavior
 
CHC 2020 Telehealth Research Study
CHC 2020 Telehealth Research StudyCHC 2020 Telehealth Research Study
CHC 2020 Telehealth Research Study
 
Turning numbers into data. workshop sample slides
Turning numbers into data. workshop sample slidesTurning numbers into data. workshop sample slides
Turning numbers into data. workshop sample slides
 
Syphilis Treatment Singapore: Why is HIV Testing Required for Work Permit Ren...
Syphilis Treatment Singapore: Why is HIV Testing Required for Work Permit Ren...Syphilis Treatment Singapore: Why is HIV Testing Required for Work Permit Ren...
Syphilis Treatment Singapore: Why is HIV Testing Required for Work Permit Ren...
 

Mehr von International Center for Biometric Research

An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...International Center for Biometric Research
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...International Center for Biometric Research
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applicationsInternational Center for Biometric Research
 

Mehr von International Center for Biometric Research (20)

HBSI Automation Using the Kinect
HBSI Automation Using the KinectHBSI Automation Using the Kinect
HBSI Automation Using the Kinect
 
IT 34500
IT 34500IT 34500
IT 34500
 
An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...
 
Entropy of Fingerprints
Entropy of FingerprintsEntropy of Fingerprints
Entropy of Fingerprints
 
Biometric and usability
Biometric and usabilityBiometric and usability
Biometric and usability
 
Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4
 
Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6
 
Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2
 
Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1
 
Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3
 
Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
 
Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5
 
Standards and Academia
Standards and AcademiaStandards and Academia
Standards and Academia
 
Interoperability and the Stability Score Index
Interoperability and the Stability Score IndexInteroperability and the Stability Score Index
Interoperability and the Stability Score Index
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...
 
IT 54500 overview
IT 54500 overviewIT 54500 overview
IT 54500 overview
 
Ben thesis slideshow
Ben thesis slideshowBen thesis slideshow
Ben thesis slideshow
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications
 
ICBR Databases
ICBR DatabasesICBR Databases
ICBR Databases
 
Understanding Fingerprint Skin Characteristics and Image Quality
Understanding Fingerprint Skin Characteristics and Image QualityUnderstanding Fingerprint Skin Characteristics and Image Quality
Understanding Fingerprint Skin Characteristics and Image Quality
 

Kürzlich hochgeladen

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

(Spring 2013) Biometric Perceptions for Campus Access Control

  • 1. BIOMETRIC PERCEPTIONS FOR CAMPUS ACCESS CONTROL The purpose of this study was to understand the perceptions of Purdue faculty, staff, and students regarding the implementation of biometric access control systems across the Purdue campus. This was accomplished by collecting data in the form of one survey from 44 participants. The survey was created to focus on their knowledge of existing biometrics and their willingness to adopt biometrics for campus access control. The new survey results came from Purdue University students in Dr. Elliott’s IT 345 course and researchers in the Purdue Biometrics Lab. David Fritz, Kevin Chang, Alan Brown, Bob Santarossa, Jaspreet Singh, Stuart Kilgus, Dr. Stephen Elliott, Kevin O’Connor OVERVIEW INITIAL SURVEY RESULTS NEW SURVEY RESULTS FUTURE RESEARCH AND DEVELOPMENT Answer Response % Yes 400 95% No 20 5% Would you be willing to use biometrics at these facilities if you forgot your student ID? 0 50 100 150 200 250 Fingerprint I have not used biometrics Signature Voice Hand geometry Face Iris Retina Have you used any of the following biometrics? 0 50 100 150 200 250 Improperly swiped ID No problems Damaged ID Other Have you ever experienced any of the following problems with your student ID when entering the RSC? Answer Response % Yes 298 66% No 153 34% Have you forgotten your student ID when going to the RSC / AQUA? Answer Response % Yes 61 14% No 386 86% Have you ever had your student ID lost or stolen at the RSC/AQUA? Answer Response % Yes 396 89% No 48 11% Would you like to see biometrics incorporated on campus for building security and/or access control? Answer Response % Yes 393 88% No 52 12% Would you like to use biometrics for entrance to recreational facilities? 0 50 100 150 200 250 300 Fingerprint recognition Hand geometry Iris recognition Facial recognition Which biometric application (body part) do you think is least intrusive? 0 5 10 15 20 25 30 35 40 45 Fingerprint recognition Hand geometry Signature verification Voice recognition Facial recognition Iris recognition Other Retinal scanning I have not used biometrics Have you used any of the following biometrics? 0 5 10 15 20 25 I have not experienced any problems Improperly swiping your ID Being denied access - ID damaged Other Have you ever experienced any of the following problems with your PUID? 0 5 10 15 20 25 Hand geometry Fingerprint recognition Iris recognition Facial recognition Which biometric application (body part) do you think is least intrusive? 0 2 4 6 8 10 12 14 16 18 20 Convenient Somewhat convenient Not sure Somewhat harder Much harder How much more convenient do you perceive will be using biometrics over your PUID? Answer Response % Yes 35 81% No 8 19% Would you like to see biometrics incorporated on campus for building security and/or access control? 0 5 10 15 20 25 30 35 Strongly Agree Agree Neither Agree nor Disagree Disagree Strongly Disagree How confident are you that biometrics is a safe and secure program? With the data results backing up the idea that biometric use on campus would be accepted and successful, the next step would be to determine if it is cost effective and would be a worthwhile investment for the University. Answer Response % Yes 28 64% No 16 36% Have you ever had your student ID lost or stolen at the RSC/AQUA? Answer Response % Yes 28 64% No 16 36% Have you forgotten your student ID when going to the RSC / AQUA? ADDITIONAL SURVEY RESULTS Answer Response % Yes 36 82% No 8 18% Would you like to use biometrics for entrance to recreational facilities? Would you be willing to use biometrics at these facilities if you forgot your student ID? Answer Response % Yes 43 98% No 1 2% Answer Response % Yes 41 93% No 3 7% Do you see biometric access as a useful resource on campus?