case study: Use of Biometrics and Authentication in the Development of Business.
The term Biometrics is commonly used today to refer to the authentication of a person by analysing physical characteristics, such as fingerprints, or behavioral characteristics, such as signatures. Since many physical and behavioral characteristics are unique to an individual, biometrics provides a more reliable system of authentication than ID cards, keys, passwords, or other traditional systems.Physical characteristics commonly used in biometric authentication include face, fingerprints, handprints, eyes, and voice. Biometric authentication can be used to control the security of computer networks, electronic commerce and banking transactions, and restricted areas in office buildings and factories. It can help prevent fraud by verifying identities of voters and holders of driver’s license or visas. In authentication, a sensor captures a digital image of the characteristic being used to verify the user’s identity.In this backdrop you are required to write a report to assess the benefits of Biometrics and Authentication in business.check the attached file for additional information and requirements2000 words
FACULTY OF BUSINESS AND MANAGEMENT STUDIES
UNDERGRADUATE BUSINESS PROGRAMME
ACADEMIC YEAR 2020-2021, 1st Semester
January – 2021
Programme Title: BMS, A&F, MM, BE, BIS
Module Title: Information Technology in Business
Module Code: GCO3000
Assessment Method: Report
Level: 3 Block: 1
Module Credits: 20 Weighting: 50%
Due Date: 24-Nov-2020, 9:00 PM Word Count: 2,000
Examiner(s): Mr. Aumir Shabbir & Mr. Jawad Tauheed
Date of Submission: November 24, 2020
Pg. 2 Version 1
Gulf College – Faculty of Business and Management Studies – In academic
Affiliation with CARDIFF SCHOOL OF MANAGEMENT
A. Written work
➢ A signed declaration that the work is your own (apart from otherwise referenced
acknowledgements) must be included after the reference page of your assignment
➢ Each page must be numbered.
➢ Where appropriate, a contents page, a list of tables/figures and a list of abbreviations
should precede your work.
➢ All referencing must adhere to School/Institutional requirements.
➢ A word count must be stated at the end of your work.
➢ Appendices should be kept to the minimum and be of direct relevance to the content of
➢ All tables and figures must be correctly numbered and labelled.
B. Other types of coursework/assignments
➢ Where coursework involves oral presentations, discussions, poster presentations, etc.,
specific instructions will be provided by your module leader/team.
Rewrite below part just after the References of your assignment.
I, [Name of Student], hereby declare that the uploaded Report through Turnitin is my own work. I
affirm that this has been researched and completed in accordance with the college rules and
regulations on plagiarism.
I acknowledge the advice given by the module tutors on proper referencing to avoid plagiarism and
the rules on the academic unfair practice.
I acknowledge that I read and understand the plagiarism guide written at the end of this
assessment. Any academic misconduct will be handled according to the rules and regulations of the
[Name of Student]
Pg. 3 Version 1
Report must be submitted online through Turnitin before due date.
The only circumstance in which assignments can be uploaded late via Turnitin is if a Mitigating
Circumstances (MC) form is submitted at the same time. In these circumstances work may be
submitted within five (5) working days. Make sure to secure MC form and submit the same to the
Write the number of words used, excluding references, at the end of your assignment. Provide the
list of sources you used at the last page of your assignment with proper label ‘References’. You may
include diagrams, figures etc. without word penalty. The number of words will be + or – 10% of the
total words allowed.
A work declaration must be included on the first page of your assignment. This ensures that you
prepare your work in good faith. Any form of collusion and/or academic unfair practice will be dealt
with according to the pertinent rules and regulations of the partner university. Please read carefully
the plagiarism guide.
Assessment Details and Guidelines to Students:
This Report comprises 50% of the total assessments’ marks. Make sure you reference (proper
Harvard Referencing should be observed) any sources you have used to complete this assessment.
Analytical skills. The reflection report enables the students to analyse and evaluate the benefits of
the different activities done in the class. This skill will eventually help them evaluate options
necessary to make decisions in the workplace.
14pt for heading
12pt for body text
(applicable to the source code as well)
Length of the contents (without the diagrams)
(include page numbers at the right-hand
bottom of each page)
In addition, the assessment will test the following learning outcomes:
1. Discuss the key functions of IT hardware and software and their application to business.
3. Discuss the role of Information Technology within business and its wider role within society.
Pg. 4 Version 1
CASE STUDY: Use of Biometrics and Authentication in the Development of Business.
The term Biometrics is commonly used today to refer to the authentication of a person by analysing
physical characteristics, such as fingerprints, or behavioral characteristics, such as signatures. Since
many physical and behavioral characteristics are unique to an individual, biometrics provides a
more reliable system of authentication than ID cards, keys, passwords, or other traditional systems.
Physical characteristics commonly used in biometric authentication include face, fingerprints,
handprints, eyes, and voice. Biometric authentication can be used to control the security of
computer networks, electronic commerce and banking transactions, and restricted areas in office
buildings and factories. It can help prevent fraud by verifying identities of voters and holders of
driver’s license or visas. In authentication, a sensor captures a digital image of the characteristic
being used to verify the user’s identity.
In this backdrop you are required to write a report to assess the benefits of Biometrics and
Authentication in business. The report should contain the following:
1. Introduction: (400 words)
a) Explain the term Biometrics and Authentication along-with the various type of applications
of Biometrics and Authentication used today.
b) Explain how Biometrics and Authentication can improve business processes and
2. Background: (400 words)
a) Discuss the historical development of the Biometrics and Authentication along with its
advantages for the organisations.
b) Compare the business environment before and after the implementation of Biometrics and
3. Discussion Section. Based on the recommended Biometrics and Authentication applications
answer the following: (400 words)
a) Identify and explain the functions of software applications using in business related to the
Biometrics and Authentication.
b) Does the system require some specific hardware to implement it? Discuss the key functions
of the additional IT hardware requirements. If your answer is no, justify the reason.
4. Recommendations: (200 words)
a) Provide a secure computing environment that ensures data privacy and integrity which
mitigates cyber-security threats.
5. Include report summary: (400 words)
a) Discuss the role of Biometrics and Authentication in the economy of Oman.
b) Discuss the possible effect of the use of Biometrics and Authentication on Omani society.
a) Conclusion indicating that the report objectives have been met. (200 words)
Provide a list of minimum eight (6) references from different sources including books, e-books,
online sources, newspapers, journals and publications using the proper Harvard referencing system.
***END OF ASSIGNMENT TASK***
Pg. 5 Version 1
GCO3000 – Information Technology in Business
AY: 2020-2021 / 1st Semester
1. Introduction (include all the required points)
Explain the term Biometrics and Authentication along-with the various type of
applications of Biometrics and Authentication. 10
b. Explain how Biometrics and Authentication can improve business processes and
2. Background (Knowledge and Analysis)
Historical development of the Biometrics and Authentication along with its
advantages for the organisations. 10
b. Compare the business environment before and after the implementation of
Biometrics and Authentication. 10
3. Discussion Section (Application)
The key functions of software applications using in business related to the Biometrics
and Authentication. 10
b. Details of hardware requirements, if no hardware is required, justify the reason. 10
Provide a secure computing environment that ensures data privacy and integrity
which mitigates cyber-security threats. 10
5. Report Summary
a. Discussion on the role of the Biometrics and Authentication in the economy of Oman. 10
b. Discuss the possible effect of the use of Biometrics and Authentication on Omani
a. Conclusion indicating that report objectives have been met. 10
TOTAL MARKS 100
Pg. 6 Version 1
1. Plagiarism, which can be defined as using without acknowledgement another person’s words or
ideas and submitting them for assessment as though it were one’s own work, for instance by
copying, translating from one language to another or unacknowledged paraphrasing. Further
examples of plagiarism are given below:
Use of any quotation(s) from the published or unpublished work of other persons, whether
published in textbooks, articles, the Web, or in any other format, which quotations have not been
clearly identified as such by being placed in quotation marks and acknowledged.
Use of another person’s words or ideas that have been slightly changed or paraphrased to make it
look different from the original.
Summarising another person’s ideas, judgments, diagrams, figures, or computer programmes
without reference to that person in the text and the source in a bibliography or reference list.
Use of services of essay banks and/or any other agencies.
Use of unacknowledged material downloaded from the Internet.
Re-use of one’s own material except as authorised by the department.
2. Collusion, which can be defined as when work that has been undertaken by or with others is
submitted and passed off as solely as the work of one person. This also applies where the work of
one candidate is submitted in the name of another. Where this is done with the knowledge of the
originator both parties can be considered to be at fault.
3. Fabrication of data, making false claims to have carried out experiments, observations, interviews or
other forms of data collection and analysis, or acting dishonestly in any other way.
Plagiarism Detection Software (PDS) – Turnitin
As part of its commitment to quality and the maintenance of academic standards, the University reserves
the right to use Plagiarism Detection Software (PDS), including Turnitin. Such software makes no judgment
as to whether a piece of work has been plagiarised; it simply highlights sections of text that have been found
in other sources.
The use of plagiarism detection software fulfills two functions. The first is to enhance student learning (i.e. as
a developmental tool); the second is to guard against and identify unfair practice in assessment.
Further information and guidance can be found in the University’s policy on the Use of Plagiarism Detection
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason may is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Our essay writers are graduates with diplomas, bachelor, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college diploma. When assigning your order, we match the paper subject with the area of specialization of the writer.
We value our customers and so we ensure that what we do is 100% original..
With us you are guaranteed of quality work done by our qualified experts.Your information and everything that you do with us is kept completely confidential.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
The Product ordered is guaranteed to be original. Orders are checked by the most advanced anti-plagiarism software in the market to assure that the Product is 100% original. The Company has a zero tolerance policy for plagiarism.Read more
The Free Revision policy is a courtesy service that the Company provides to help ensure Customer’s total satisfaction with the completed Order. To receive free revision the Company requires that the Customer provide the request within fourteen (14) days from the first completion date and within a period of thirty (30) days for dissertations.Read more
The Company is committed to protect the privacy of the Customer and it will never resell or share any of Customer’s personal information, including credit card data, with any third party. All the online transactions are processed through the secure and reliable online payment systems.Read more
By placing an order with us, you agree to the service we provide. We will endear to do all that it takes to deliver a comprehensive paper as per your requirements. We also count on your cooperation to ensure that we deliver on this mandate.Read more