Academic literature on the topic 'Vulnerabilities of biometric system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Vulnerabilities of biometric system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Vulnerabilities of biometric system"

1

Sobabe, Abdou-Aziz, Tahirou Djara, and Antoine Vianou. "Biometric System Vulnerabilities: A Typology of Metadata." Advances in Science, Technology and Engineering Systems Journal 5, no. 1 (2020): 191–200. http://dx.doi.org/10.25046/aj050125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Yogendra Narain, and Sanjay Kumar Singh. "A taxonomy of biometric system vulnerabilities and defences." International Journal of Biometrics 5, no. 2 (2013): 137. http://dx.doi.org/10.1504/ijbm.2013.052964.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kumar, Govind, Mozakker Anam, Md Sajid, and Dr Sakthivel M. "Finger Print Voting System." International Research Journal of Computer Science 11, no. 04 (2024): 200–203. http://dx.doi.org/10.26562/irjcs.2024.v1104.11.

Full text
Abstract:
The field of biometrics, or the identification of people based on physiological or behavioral characteristics [6], has recently received a significant amount of attention in current research as a result of its applicability in the fields of information technology and security. With the increased usage of PIN numbers and passwords in everyday life, the vulnerabilities of these two technologies are becoming more apparent (e.g. password-cracking). Biometric authorization’s strengths are that it requires the user to be present and that it eliminates the hassles of passwords and PIN’s (or can be us
APA, Harvard, Vancouver, ISO, and other styles
4

S Prasad, Puja. "Vulnerabilities of Biometric Authentication Systems: A Survey." HELIX 8, no. 5 (2018): 4100–4103. http://dx.doi.org/10.29042/2018-4100-4103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Moorthy, Kohbalan, Kauthar Mohd Daud, Steven R. Arokiasamy, and Md Raihanul Islam Tomal. "HYBRID BIOMETRIC AUTHENTICATION FOR AUTOMATIC TELLER MACHINE." International Journal of Software Engineering and Computer Systems 10, no. 1 (2024): 32–39. http://dx.doi.org/10.15282/ijsecs.10.1.2024.3.0121.

Full text
Abstract:
Automated Teller Machines (ATMs) are a crucial part of modern life, providing users with the ability to conduct basic banking transactions electronically without the need for bank representatives. These machines are ubiquitous, particularly in developed countries, and their usage is expanding rapidly across the globe. However, this widespread adoption has highlighted significant security concerns for general users. Traditional security measures, such as Personal Identification Numbers (PINs), are increasingly proving insufficient due to issues like card theft, ATM scams, and other security bre
APA, Harvard, Vancouver, ISO, and other styles
6

Gupta, Sharad. "Anti-Spoofing: Liveness Detection System." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 4997–5003. https://doi.org/10.22214/ijraset.2025.70787.

Full text
Abstract:
Abstract: Face recognition systems became more susceptible to presentation attacks by digital screens, printed images, and 3D masks [3]. This paper introduces a full-fledged anti-spoofing solution based on the YOLO (You Only Look Once) frameworktoidentifyandthwart suchattemptsatspoofinginreal-time[14]. Oursystemintegrates effective object detection features with custom liveness evaluation features to form an effective security layer for biometric authentication systems. Experimental results show high accuracy in distinguishing between real users and spoofing attempts with real-time performance
APA, Harvard, Vancouver, ISO, and other styles
7

Kancherla, Tarun. "Fingerprint-Based Voting System Using C#: A Secure Biometric Approach to Modern Elections." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 158–60. https://doi.org/10.22214/ijraset.2025.68176.

Full text
Abstract:
Integrity in elections is fundamental to democratic processes, yet traditional voting systems face significant vulnerabilities such as rigging and voter fraud. This paper introduces a biometric voting so- lution leveraging fingerprint recognition to enhance electoral transparency developed using C# and SQL Server Studio to improve electoral transparency and security. The proposed system employs bio- metric authentication to uniquely identify voters, effectively eliminating impersonation and multiple voting incidents. System performance evaluations demonstrate a biometric matching accuracy of 9
APA, Harvard, Vancouver, ISO, and other styles
8

Khranovskyi, Mykola, and Andriy Kernytskyy. "Blockhain and Biometrics Challenges and Solutions." Computer Design Systems. Theory and Practice 6, no. 1 (2024): 189–98. http://dx.doi.org/10.23939/cds2024.01.189.

Full text
Abstract:
Blockchain technology has garnered significant attention in recent years due to its ability to revolutionize conventional processes by providing faster, more secure, and cost-effective solutions. This study explores the symbiotic relationship between blockchain and biometrics, investigating how these technologies can mutually reinforce each other. The research makes a dual contribution: firstly, it comprehensively analyses blockchain and biometrics, highlighting their convergence's potential advantages and obstacles. Secondly, it delves deeper into utilising blockchain for safeguarding biometr
APA, Harvard, Vancouver, ISO, and other styles
9

Abbas, Alyaa A., and Zahraa Maan Sallal. "Hybrid biometric authentication for banks security improvements." Journal of Discrete Mathematical Sciences and Cryptography 28, no. 4-A (2025): 1037–50. https://doi.org/10.47974/jdmsc-2030.

Full text
Abstract:
As ATM cards, credit cards, and mobile banking become more convenient, online banking is becoming more popular around the world. Usernames, passwords, CVVs, and OTPs, although traditionally used for authentication, are susceptible to security vulnerabilities. The vulnerabilities of these systems can be exploited at will, resulting in unauthorized access to sensitive financial information. Biometric authentication, particularly the recognition of iris patterns, is proposed as a solution to these security challenges. Through the combination of traditional authentication methods and biometric tra
APA, Harvard, Vancouver, ISO, and other styles
10

Shuwandy, Moceheb Lazam, Rawan Adel Fawzi Alsharida, and Maytham M. Hammood. "Smartphone Authentication Based on 3D Touch Sensor and Finger Locations on Touchscreens via Decision-Making Techniques." Mesopotamian Journal of CyberSecurity 5, no. 1 (2025): 165–77. https://doi.org/10.58496/mjcs/2025/011.

Full text
Abstract:
Smartphone authentication systems must balance security and user convenience, which is a persistent challenge in the digital realm. Traditional biometrics, such as fingerprints and facial recognition, face vulnerabilities to spoofing and environmental conditions, limiting reliability. This study introduces a novel approach by integrating three-dimensional (3D) touch sensors with finger location data for authentication. The goal is to develop a system that improves accuracy while minimizing false positives and negatives, leveraging touch pressure and spatial interaction as unique biometric iden
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Vulnerabilities of biometric system"

1

Osoka, Agu. "Assessing and protecting against vulnerabilities of biometric systems." Thesis, University of Kent, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.509630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Higbee, Matthew Somers. "Deriving System Vulnerabilities Using Log Analytics." BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/6139.

Full text
Abstract:
System Administrators use many of the same tactics that are implemented by hackers to validate the security of their systems, such as port scanning and vulnerability scanning. Port scanning is slow, and can be highly inaccurate. After a scan is complete, the results of the scan must be cross checked with a vulnerability database to discover if any vulnerabilities are present. While these techniques are useful, they have severe limitations. System Administrators have full access to all of their machines. They should not have to rely exclusively on port scanning them from the outside of their ma
APA, Harvard, Vancouver, ISO, and other styles
3

Jayapal, Ranjith. "Biometric encryption system for increased security." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/746.

Full text
Abstract:
Security is very important in present day life. In this highly-interconnected world, most of our daily activities are computer based, and the data transactions are protected by passwords. These passwords identify various entities such as bank accounts, mobile phones, etc. People might reuse the same password, or passwords related to an individual that can lead to attacks. Indeed, remembering several passwords can become a tedious task. Biometrics is a science that measures an individual’s physical characteristics in a unique way. Thus, biometrics serves as a method to replace the cumbersome us
APA, Harvard, Vancouver, ISO, and other styles
4

Bansal, Mamta. "Face based multimodal biometric authentication system." Thesis, IIT Delhi, 2015. http://eprint.iitd.ac.in:80//handle/2074/8179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Swabey, Matthew A. "The human auditory system as a biometric." Thesis, University of Southampton, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.438725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Muthu, Rajesh. "Development of a secure biometric recognition system." Thesis, Northumbria University, 2016. http://nrl.northumbria.ac.uk/31618/.

Full text
Abstract:
Biometric based security systems are becoming an integral part of many security agencies and organisations. These systems have a number of applications ranging from national security, law enforcement, the identification of people, particularly for building access control, the identification of suspects by the police, driver’s licences and many other spheres. However, the main challenge is to ensure the integrity of digital content under different intentional and non-intentional distortions; along with the robustness and security of the digital content. This thesis focuses on improving the secu
APA, Harvard, Vancouver, ISO, and other styles
7

Shonubi, Felix, Ciara Lynton, Joshua Odumosu, and Daryl Moten. "Exploring Vulnerabilities in Networked Telemetry." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596435.

Full text
Abstract:
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV<br>The implementation of Integrated Network Enhanced Telemetry (iNET) in telemetry applications provides significant enhancements to telemetry operations. Unfortunately such networking brings the potential for devastating cyber-attacks and networked telemetry is also susceptible to these attacks. This paper demonstrates a worked example of a social engineering attack carried out on a test bed network
APA, Harvard, Vancouver, ISO, and other styles
8

Poon, Hoi Ting. "Towards a practical and secure biometric authentication system." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/28017.

Full text
Abstract:
The idea of merging biometrics technology with cryptography brought interesting possibilities in enhancing the security and privacy of biometrics systems. Conventional systems generally require large databases, which represent a security risk and raise privacy concerns. Biometric encryption is a method devised to hide biometric features along with a cryptographic key, which could remove the need for such biometric databases. The Fuzzy Vault scheme is one of the promising candidates for biometric encryption. This thesis analyzes the scheme and attempts to provide solutions to problems impeding
APA, Harvard, Vancouver, ISO, and other styles
9

McCracken, Wendy Margaret. "Service Delivery To Deaf Children : Vulnerabilities Within The System." Thesis, University of Manchester, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.518868.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brown, Allanah. "The fuel transportation system in British Columbia : attributes and vulnerabilities." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/59065.

Full text
Abstract:
Disasters can, and do lead to widespread disruption, often crippling transportation systems in complex ways. Transportation systems need to be designed not only to operate on an ordinary day; they need to be designed to respond to man-made and natural disasters. Proactive planning can allow transport to resume service, and deal with crises, as quickly as possible post-disaster. This thesis provides information to assist in the development of plans and protocols for emergency scenarios. Coastal communities throughout British Columbia (BC) are heavily dependent on maritime transportation for the
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Vulnerabilities of biometric system"

1

Dunstone, Ted, and Neil Yager, eds. Biometric System and Data Analysis. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-77627-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Elsworth, John T. Design and performance of biometric system. Nova Science Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chinhŭngwŏn, Hanʼguk Chŏngbo Poho, та Korea (South) Chŏngbo Tʻongsinbu, ред. Saengchʻe insik sisŭtʻem sihŏm kisul pʻyojunhwa yŏnʼgu =: A study on biometric system testing standardization. Chŏngbo Tʻongsinbu, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Piccolo, Jason J. Identifying criminal aliens within the United States criminal justice system. National University, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kuan, Hung-i. Evaluation of a biometric keystroke typing dynamics computer security system. Naval Postgraduate School, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Neil, Yager, ed. Biometric system and data analysis: Design, evaluation, and data mining. Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Office, United States Government Accountability. Homeland Security: Progress has been made to address the vulnerabilities exposed by 9/11, but continued federal action is needed to further mitigate security risks : report to congressional requesters, House of Representatives. U.S. Govt. Accountability Office, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Frost & Sullivan., ed. U.S. electronic access control system markets: High security requirements promote biometric identification. Frost & Sullivan, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Office, General Accounting. Aviation security: Vulnerabilities and potential improvements for the air cargo system : report to congressional requesters. U.S. General Accounting Office, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Vulnerabilities in the U.S. passport system can be exploited by criminals and terrorists: Hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Ninth Congress, first session, June 29, 2005. U.S. G.P.O., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Vulnerabilities of biometric system"

1

Adler, Andy. "Vulnerabilities in Biometric Encryption Systems." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11527923_114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Tajinder, Shashi Bhushan, Pooja Sharma, and Vishal Garg. "Examining the Vulnerabilities of Biometric Systems." In Leveraging Computer Vision to Biometric Applications. Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781032614663-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Adler, Andy, and Stephanie A. C. Schuckers. "Biometric Vulnerabilities: Overview." In Encyclopedia of Biometrics. Springer US, 2014. http://dx.doi.org/10.1007/978-3-642-27733-7_65-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Adler, Andy, and Stephanie A. C. Schuckers. "Biometric Vulnerabilities: Overview." In Encyclopedia of Biometrics. Springer US, 2014. http://dx.doi.org/10.1007/978-3-642-27733-7_65-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Adler, Andy, and Stephanie Schuckers. "Biometric Vulnerabilities, Overview." In Encyclopedia of Biometrics. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-73003-5_65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Adler, Andy, and Stephanie A. C. Schuckers. "Biometric Vulnerabilities, Overview." In Encyclopedia of Biometrics. Springer US, 2015. http://dx.doi.org/10.1007/978-1-4899-7488-4_65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Colonna, Liane, and Gianluigi M. Riva. "Smart Mirrors and Data Protection Regulation." In Intelligent Systems Reference Library. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-84158-3_12.

Full text
Abstract:
Abstract Smart mirrors have the potential to significantly enhance the quality of life for older adults by supporting their health, well-being, and social connectivity. However, they also introduce substantial legal and regulatory challenges, particularly in the realm of data protection. This paper aims to examine these challenges and contribute to the interdisciplinary discourse on smart mirrors, facilitating the integration of legal and technological considerations. At the outset, the paper provides an overview of smart mirrors to understand the technological foundation for which the law applies. It then explores various data protection concerns raised by smart mirrors, such as issues related to consent and transparency, security vulnerabilities, and the potential misuse of personal information. Next, the paper presents a taxonomy of key factors that influence how data protection rules apply to smart mirrors, such the physical location of the smart mirror, the context in which it is used (e.g., private home, public facility, healthcare environment), the status of the user (e.g., adult, minor, patient), the status of the service provider (e.g., manufacturer, third-party service), the involvement of any intermediaries in data processing, and the nature and sensitivity of the data being gathered (e.g., biometric data, personal health information). The paper concludes with an examination of the role of data protection by design (DPbD) in this context, highlighting the importance of incorporating regulatory compliance into smart mirrors from the beginning of its development and deployment.
APA, Harvard, Vancouver, ISO, and other styles
8

Lupu, E., and M. Cioban. "Voice Biometric System." In IFMBE Proceedings. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04292-8_53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wirtz, Brigitte. "Biometric System Security." In Securing Electronic Business Processes. Vieweg+Teubner Verlag, 2004. http://dx.doi.org/10.1007/978-3-322-84982-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Akula, Abhilash, Jeshwanth Ega, Kalyan Thota, and Gowtham. "Biometric Voting System." In Lecture Notes on Data Engineering and Communications Technologies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24643-3_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Vulnerabilities of biometric system"

1

M, Vaidehi, Mesith Chaimanee, and Mithileysh Sathiyanarayanan. "Investigate the Vulnerabilities and Improvements in Biometric Authentication Systems Using Deep Learning Techniques." In 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT). IEEE, 2025. https://doi.org/10.1109/ce2ct64011.2025.10939229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abdeen, Ahmad, Mahmoud Mohanna, Yusuf Mansur, and Elena Battini Sonmez. "Biometric Fraud Detection System." In 2024 8th International Artificial Intelligence and Data Processing Symposium (IDAP). IEEE, 2024. http://dx.doi.org/10.1109/idap64064.2024.10710778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

P, Poovizhi, Pavithra D, Vijaya Kumar T, Nandhakumar M, Suryadharshini G, and Sheljin S G. "Multimodal Biometric Fusion System." In 2024 International Conference on Emerging Research in Computational Science (ICERCS). IEEE, 2024. https://doi.org/10.1109/icercs63125.2024.10895379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Deepa, G., A. Vennila, A. Sudhakar, S. J. Shubhashree, and J. V. Vishvadharshan. "Smart Biometric Cabinet Locking System." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gudur, Bheemesh K., Tejashwini Ivanagimath, and Tarunkumar Rathod. "Biometric Based Portable Student Attendance System." In 2024 International Conference on Innovation and Novelty in Engineering and Technology (INNOVA). IEEE, 2024. https://doi.org/10.1109/innova63080.2024.10846952.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Agrawal, Subhash Chand, and Rajesh Kumar Tripathi. "Biometric Attendance System Using Face Recognition." In 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0. IEEE, 2024. http://dx.doi.org/10.1109/otcon60325.2024.10688314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Menakadevi, B., D. Sathish Kumar, P. Nagasaratha, and K. Parimalam. "Biometric System Attacks-A Case Study." In 2025 International Conference on Computer, Electrical & Communication Engineering (ICCECE). IEEE, 2025. https://doi.org/10.1109/iccece61355.2025.10940734.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bustard, John D., John N. Carter, and Mark S. Nixon. "Targeted impersonation as a tool for the detection of biometric system vulnerabilities." In 2013 IEEE 6th International Conference on Biometrics: Theory, Applications and Systems (BTAS). IEEE, 2013. http://dx.doi.org/10.1109/btas.2013.6712744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Goicoechea-Telleria, Ines, Judith Liu-Jimenez, Raul Sanchez-Reillo, and Wendy Ponce-Hemandez. "Vulnerabilities of biometric systems integrated in mobile devices: An evaluation." In 2016 International Carnahan Conference on Security Technology (ICCST). IEEE, 2016. http://dx.doi.org/10.1109/ccst.2016.7815677.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zahid, Zainab, Ammar Haider, Nosheen Sabahat, and Asim Tanwir. "Vulnerabilities in Biometric Authentication of Smartphones." In 2020 IEEE 23rd International Multitopic Conference (INMIC). IEEE, 2020. http://dx.doi.org/10.1109/inmic50486.2020.9318094.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Vulnerabilities of biometric system"

1

Koskelo, Markku, Steven Kadner, and Steven Horowitz. Biometric Access Control System Industrialization. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1763279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hasnain, Saher. Vulnerabilities in the Animal By-Products Food System. Food Standards Agency, 2023. http://dx.doi.org/10.46756/sci.fsa.gud520.

Full text
Abstract:
This work was carried out by the Food Systems Transformation Group at the University of Oxford’s Environmental Change Institute and the University of York. This report has been produced by University of Oxford under a contract placed by the Food Standards Agency (the Agency). The views expressed herein are not necessarily those of the Agency. University of Oxford warrants that all reasonable skill and care has been used in preparing this report. Notwithstanding this warranty, University of Oxford shall not be under any liability for loss of profit, business, revenues or any special indirect or
APA, Harvard, Vancouver, ISO, and other styles
3

LeMay, Elizabeth, Karen Scarfone, and Peter Mell. The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities. National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.ir.7864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kemper, Bart. Developing the Role of the System Software Integrator to Mitigate Digital Infrastructure Vulnerabilities. SAE International, 2023. http://dx.doi.org/10.4271/epr2023028.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;Traditional physical infrastructure increasingly relies upon software. Yet, 75% of software projects fail in budget by 46% and schedule by 82%. While other systems generally have a “responsible-in-charge” (RIC) professional, the implementation of a similar system of accountability in software is not settled. This is a major concern, as the consequences of software failure can be a matter of life-or-death. Further, there has been a 742% average annual increase in software supply chain attacks on increasingly used open-sou
APA, Harvard, Vancouver, ISO, and other styles
5

Erol, Selman, and Michael Junho Lee. Financial System Architecture and Technological Vulnerability. Federal Reserve Bank of New York, 2024. http://dx.doi.org/10.59576/sr.1122.

Full text
Abstract:
This paper presents a framework to study of technological resiliency of financial system architecture. Financial market infrastructures, or platforms, compete with services critical functions along various stages in the lifecycle of a trade, and make investments in technological resiliency to guard against attackers seeking to exploit system weaknesses. Platforms’ financial network effects attenuate competition between platforms on security. Exposure to vulnerabilities is magnified in the presence of strategic adversaries. Private provision of technological resiliency is generally sub-optimal,
APA, Harvard, Vancouver, ISO, and other styles
6

Shepard, Blake. Using a Large CYC-Based Ontology to Model and Predict Vulnerabilities at the Real-World Info-System Boundary. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada388002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lilavanichakul, Apichaya. Sustainable Agri-Food System and Resilience in Thailand - Exploring Technology-Driven Solutions for a Resilient Future. Asian Productivity Organization, 2025. https://doi.org/10.61145/gthi4179.

Full text
Abstract:
The agri-food system faces critical challenges from climate change, food insecurity, and rising consumer demands for transparency. This report explores technology-driven solutions such as digital agriculture, vertical farming, and circular economy practices to enhance sustainability and resilience. It emphasizes the role of stakeholders in addressing systemic vulnerabilities exposed by the COVID-19 pandemic and climate disruptions. Adopting equitable practices and stringent climate policies can create a sustainable future for global food systems.
APA, Harvard, Vancouver, ISO, and other styles
8

Murphy, Maureen, Rachel Carey, and Leila Alexandra. The resilience of Melbourne's food system to climate and pandemic shocks. University of Melbourne, 2022. http://dx.doi.org/10.46580/124370.

Full text
Abstract:
This report from the Foodprint Melbourne project summarises the findings of an investigation into the resilience of Melbourne’s food system to shocks and stresses. It focuses particularly on the resilience of Melbourne’s food system to climate and pandemic shocks and stresses. However, it also considers longer term underlying stresses on Melbourne’s food system from declining supplies of natural resources and environmental degradation. The report discusses the impacts of shocks and stresses throughout the food system from food production to consumption and the generation of waste. It identifie
APA, Harvard, Vancouver, ISO, and other styles
9

Abdulrahim, Sawsan, Zeinab Cherri, May Adra, and Fahed Hassan. Beyond Kafala: Employer roles in growing vulnerabilities of women migrant domestic workers. Centre for Excellence and Development Impact and Learning (CEDIL), 2023. http://dx.doi.org/10.51744/ceb7.

Full text
Abstract:
Women migrant domestic workers (WMDWs) constitute 7.7 percent of migrant workers worldwide, of whom more than a quarter live and work in the Arab region. In Lebanon, as in other Arab countries, WMDWs are recruited through the sponsorship system, Kafala. Under this system, a potential migrant worker can only obtain legal residency and a work permit in the country of destination if she is sponsored by a specific employer. Once in the destination country, the worker cannot transfer to a new employer unless granted permission by the original sponsor. The system heightens the social, economic, and
APA, Harvard, Vancouver, ISO, and other styles
10

Miller, Andy, and Paul Higgins. Making Communities Stronger and More Secure. American Meteorological Society, 2019. https://doi.org/10.1175/strengthening-communities-2019.

Full text
Abstract:
Virtually every social and economic sector and every institution underlying modern civilization is dependent on and vulnerable to weather, water, and climate. Advances in Earth system observations, science, and services create an enormous opportunity for communities throughout the country to become stronger and more secure in the face of existing vulnerabilities and emerging risks due to climate change. This study reaffirms six areas of emphasis for strengthening communities and identifies four overarching findings that can further efforts to strengthen communities.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!