Skip to main content
Top

2023 | OriginalPaper | Chapter

Effective Biometric Technology Used with Big Data

Authors : Abdulrahman S. Alenizi, Khamis A. Al-Karawi

Published in: Proceedings of Seventh International Congress on Information and Communication Technology

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The research has proposed a detailed study into the perceptive of government employees about the entry of the concept of biometric authentication like voice recognition at the respective workplaces in the State of Kuwait. Studies were carried out on employees regarding the factors that influence the employees to adopt any new technology, which helps in improved reception of biometric technology in the Big data applications. To derive the required data for this study, a mix of interviews and questionnaires was done; managers had to give the interviews, and employees had to complete questionnaires which were provided by four particular government organizations in the State of Kuwait to understand the perception of the employees using voice recognition biometrics. It was seen from the study that there was a notable cultural and digital space between the required authentication solutions issued by the management and the technological knowledge of the employees. Due to the situation of misuse, and mainly a lack of trust in the newly introduced technology and different management intentions, managers feel more responsible for minimizing the prevalent gaps. In the context of voice recognition implementation, it was more essential to tackle the employees’ resistance. It is highly recommended to have proper orientation and knowledge in voice biometrics much before introducing the technology into the organization.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference AlAwadhi SA (2007) E-government in Kuwait: attitudes and perceptions. Loughborough University AlAwadhi SA (2007) E-government in Kuwait: attitudes and perceptions. Loughborough University
2.
go back to reference Acton T, Hughes M, Scott M (2005) An assessment of biometric identities as a standard for e-government services Acton T, Hughes M, Scott M (2005) An assessment of biometric identities as a standard for e-government services
3.
go back to reference Alenizi AS, Al-karawi KA (2022) Cloud computing adoption-based digital open government services: challenges and barriers. In: Proceedings of sixth international congress on information and communication technology. Springer Alenizi AS, Al-karawi KA (2022) Cloud computing adoption-based digital open government services: challenges and barriers. In: Proceedings of sixth international congress on information and communication technology. Springer
4.
go back to reference Dearstyne BW (2001) E-business, e-government & information proficiency(cover story). Inf Manag J 35(4):16–23 Dearstyne BW (2001) E-business, e-government & information proficiency(cover story). Inf Manag J 35(4):16–23
5.
go back to reference Al-Karawi KA, Ahmed ST (2021) Model selection toward robustness speaker verification in reverberant conditions. Multimedia Tools App 1–18 Al-Karawi KA, Ahmed ST (2021) Model selection toward robustness speaker verification in reverberant conditions. Multimedia Tools App 1–18
6.
go back to reference McLindin BA (2005) Improving the performance of two dimensional facial recognition systems: the development of a generic model for biometric technology variables in operational environments McLindin BA (2005) Improving the performance of two dimensional facial recognition systems: the development of a generic model for biometric technology variables in operational environments
7.
go back to reference Al-Karawi KA (2020) Mitigate the reverberation effect on the speaker verification performance using different methods. Int J Speech Technol 1–11 Al-Karawi KA (2020) Mitigate the reverberation effect on the speaker verification performance using different methods. Int J Speech Technol 1–11
8.
go back to reference Giesing I (2003) User response to biometric. University of Pretoria, Pretoria, South Africa, pp 95–135 Giesing I (2003) User response to biometric. University of Pretoria, Pretoria, South Africa, pp 95–135
9.
go back to reference Ashbourn J (2015) Practical biometrics: From aspiration to implementation. SpringerCrossRef Ashbourn J (2015) Practical biometrics: From aspiration to implementation. SpringerCrossRef
10.
go back to reference Al-Karawi K (2018) Robust speaker recognition in reverberant condition-toward greater biometric security. University of Salford Al-Karawi K (2018) Robust speaker recognition in reverberant condition-toward greater biometric security. University of Salford
11.
go back to reference Mohammed DY et al (2020) Mitigate the Reverberant Effects on Speaker Recognition via Multi-training. Springer International Publishing, ChamCrossRef Mohammed DY et al (2020) Mitigate the Reverberant Effects on Speaker Recognition via Multi-training. Springer International Publishing, ChamCrossRef
12.
go back to reference Chen K, Xie D, Chi H (1996) Speaker identification using time-delay HMEs. Int J Neural Syst 7(01):29–43CrossRef Chen K, Xie D, Chi H (1996) Speaker identification using time-delay HMEs. Int J Neural Syst 7(01):29–43CrossRef
13.
go back to reference Al-Karawi KA, Mohammed DY (2021) Improving short utterance speaker verification by combining MFCC and Entrocy in Noisy conditions. Multimedia Tools Appl 80(14):22231–22249CrossRef Al-Karawi KA, Mohammed DY (2021) Improving short utterance speaker verification by combining MFCC and Entrocy in Noisy conditions. Multimedia Tools Appl 80(14):22231–22249CrossRef
14.
go back to reference Blau A (2002) Access isn’t enough: merely connecting people and computers won’t close the digital divide. Am Libr 33(6):50–52 Blau A (2002) Access isn’t enough: merely connecting people and computers won’t close the digital divide. Am Libr 33(6):50–52
15.
go back to reference Al-Karawi KA et al (2015) Automatic speaker recognition system in adverse conditions-implication of noise and reverberation on system performance. Int J Inf Electron Eng 5(6):423 Al-Karawi KA et al (2015) Automatic speaker recognition system in adverse conditions-implication of noise and reverberation on system performance. Int J Inf Electron Eng 5(6):423
16.
go back to reference Alharbi SJ (2006) Perceptions of faculty and students toward the obstacles of implementing e-government in educational institutions in Saudi Arabia Alharbi SJ (2006) Perceptions of faculty and students toward the obstacles of implementing e-government in educational institutions in Saudi Arabia
17.
go back to reference Chen W-S et al (2005) Personal identification technique based on human iris recognition with wavelet transform. In: Proceedings of (ICASSP‘05) IEEE international conference on acoustics, speech, and signal processing 2005. IEEE Chen W-S et al (2005) Personal identification technique based on human iris recognition with wavelet transform. In: Proceedings of (ICASSP‘05) IEEE international conference on acoustics, speech, and signal processing 2005. IEEE
18.
go back to reference Al-Karawi KA, Mohammed DY (2019) Early reflection detection using autocorrelation to improve robustness of speaker verification in reverberant conditions. Int J Speech Technol 1–8 Al-Karawi KA, Mohammed DY (2019) Early reflection detection using autocorrelation to improve robustness of speaker verification in reverberant conditions. Int J Speech Technol 1–8
19.
go back to reference Reynolds DA (2002) An overview of automatic speaker recognition technology. In: 2002 IEEE international conference on acoustics, speech, and signal processing (ICASSP) Reynolds DA (2002) An overview of automatic speaker recognition technology. In: 2002 IEEE international conference on acoustics, speech, and signal processing (ICASSP)
20.
go back to reference Gish H, Schmidt M (1994) Text-independent speaker identification. IEEE Signal Process Mag 11(4):18–32CrossRef Gish H, Schmidt M (1994) Text-independent speaker identification. IEEE Signal Process Mag 11(4):18–32CrossRef
21.
go back to reference Al-Karawi KA, Mohammed DY (2019) Early reflection detection using autocorrelation to improve robustness of speaker verification in reverberant conditions. Int J Speech Technol 22(4):1077–1084CrossRef Al-Karawi KA, Mohammed DY (2019) Early reflection detection using autocorrelation to improve robustness of speaker verification in reverberant conditions. Int J Speech Technol 22(4):1077–1084CrossRef
22.
go back to reference Gudavalli M, Kumar DS, Raju SV (2014) Securing e-governance services through biometrics. Int J Secur Appl 8(1):103–112 Gudavalli M, Kumar DS, Raju SV (2014) Securing e-governance services through biometrics. Int J Secur Appl 8(1):103–112
23.
go back to reference Al-Karawi KA, Li F (2017) Robust speaker verification in reverberant conditions using estimated acoustic parameters—a maximum likelihood estimation and training on the fly approach. In: 2017 Seventh international conference on innovative computing technology (INTECH). IEEE Al-Karawi KA, Li F (2017) Robust speaker verification in reverberant conditions using estimated acoustic parameters—a maximum likelihood estimation and training on the fly approach. In: 2017 Seventh international conference on innovative computing technology (INTECH). IEEE
24.
go back to reference Bolle RM et al (2013) Guide to biometrics. Springer Science & Business Media Bolle RM et al (2013) Guide to biometrics. Springer Science & Business Media
25.
go back to reference Zhao X, Wang Y, Wang D (2014) Robust speaker identification in noisy and reverberant conditions Zhao X, Wang Y, Wang D (2014) Robust speaker identification in noisy and reverberant conditions
26.
go back to reference Maxwell JA (2012) Qualitative research design: an interactive approach. vol 41. Sage publications Maxwell JA (2012) Qualitative research design: an interactive approach. vol 41. Sage publications
27.
go back to reference Murray A, Pace R, Scott D (2004) Research: a commonsense approach. Thomson Social Science Press, Victoria Murray A, Pace R, Scott D (2004) Research: a commonsense approach. Thomson Social Science Press, Victoria
28.
go back to reference Frankel J, Wallen N (2000) How to evaluate & design research in education. McGraw-Hill, Boston, MA Frankel J, Wallen N (2000) How to evaluate & design research in education. McGraw-Hill, Boston, MA
Metadata
Title
Effective Biometric Technology Used with Big Data
Authors
Abdulrahman S. Alenizi
Khamis A. Al-Karawi
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-2394-4_22