1 / 26

Biometric Identification

Biometric Identification. By: Molly Murphy, RN. Objectives. Describe Biometric Identification. Provide examples of Biometric Identification. Review Hardware used in this trend. Explore Software used in this trend. Evaluate Usability. Evaluate Information System used in this trend.

morty
Télécharger la présentation

Biometric Identification

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Biometric Identification By: Molly Murphy, RN

  2. Objectives Describe Biometric Identification. Provide examples of Biometric Identification. Review Hardware used in this trend. Explore Software used in this trend. Evaluate Usability. Evaluate Information System used in this trend.

  3. Objectives Describe advantages/disadvantages in this trend. Describe legal/ethical issues related to this trend. Explore informatics competencies needed Discuss the role of the informatics nurse specialist using this trend

  4. What is Biometric Identification? Personal Identification Physical Characteristics identified Use of Technical Devices Software Programs

  5. Examples Fingerprinting Retinal Scanning Iris Scanning Voice Recognition Scent Recognition Hand Geometry DNA testing

  6. Airport Security Iris Scanning for check-in passengers First used in 2002 Location: Schiphol Airport, Amsterdam (Lyon, 2008).

  7. Hardware used in this trend… Hand Geometry Devices Fingerprint Recognition Devices Retinal Scanners Iris Scanners Voice Recognition Devices Electronic Nose Devices DNA testing devices and laboratory services

  8. Iris Scanning Devices Digital Image is obtained Color, Pattern, and Position of the Iris are Identified

  9. Software used in this trend… Application Software: Example: Biometric Service Provider (BSP) Software Development Kit Operating System Software: Example: Microsoft Windows

  10. Operating System Software Microsoft Windows: Numerous Capabilities and Functions Hardware and Software Management • Application Interface • Processor Management Memory Capabilities User Interface

  11. Usability Axiom 1 Meets Criteria User was key during interface design Axiom 2 Meets Criteria Minimal steps required Axiom 3 Meets Criteria Formal Evaluation took place during software design

  12. Information System used Electronic Medical Records (EMR) • NextGen Healthcare • Numerous features *Prebuilt templates *Specialty Specific *Image management *Email Capabilities ("Nextgen healthcare," 2010)

  13. Evaluation of NextGen Healthcare Clinical Information System Used by Numerous Members of the Care Team Workstation Configuration Workgroup for Electronic Data Exchange International Statistical and Classification of Diseases and Related Health Problems Certainly recommended for use in this trend

  14. Advantages Accurate Patient Identification Improved Patient Safety Quick and Simple to Use Concurrent Use with other Healthcare Trends Integrated use of Technology

  15. Disadvantages Inability to use with dysfunction of parts Requires continuous power source for operation Requires interaction with information system Potential for error

  16. Ethical/Legal Issues Potential Violation of Privacy Rights Potential Fraud and/or Stolen Identity (B, 2010).

  17. Informatics Competencies Ability to demonstrate proper usage of: • Hardware Devices • Software: *Application Software *Operating System Software • Information System *Electronic Medical Record

  18. Function and Responsibility of the Informatics Nurse using this Trend Serve as an expert in using trend. Provide education to staff using trend. Evaluate staff competencies. Assist in policy and procedure.

  19. In Summary… Biometric Identification is a growing trend It involves: • Patient Identification • Hardware Devices • Software Programs • Information Systems

  20. References Anglin, M.R. (9, September 2010). What is biometric identification?. Retrieved from http://www.wisegeek.com/what-is-biometric-identification.htm B, D. (2010, September 3). Biometric identification: ethical issues. Retrieved from http://www.brighthub.com/computing/enterprise-security/articles/85687.aspx .

  21. References Corey, K. (2009). Product review - nextgenemr. Retrieved from http://www.theprogressivephysician.com/reviews/product-review-nextgen-emr.htm Korotkaya, Z. (2003). Biometric person authentication: odor. Unpublished manuscript, Department of Information Technology, Lappeenranta University of Technology, Retrieved from http://www2.it.lut.fi/kurssit/03-04/010970000/seminars/Korotkaya.pdf

  22. References Lyon, David. (2008). Biometrics, identification, and surveillance. Bioethics, 22(9), Retrieved from http://onlinelibrary.wiley.com.ezaccess.libraries.psu.edu/doi/10.1111/j.1467-8519.2008.00697.x/full doi: 10.1111/j.1467-8519.2008.00697.x McGonigle, D., & Mastrian, K. (2009). Nursing Informatics and the Foundation of Knowledge. Sudbury, MA: Jones and Bartlett.

  23. References National Science and Technology Council, Committee on Technology. (2006). Hand Geometry Retrieved from http://www.biometrics.gov/Documents/HandGeometry.pdf National Science and Technology Council, Committee on Technology. (2006). Iris recognition Retrieved from http://www.biometrics.gov/Documents/IrisRec.pdf

  24. References Nextgen healthcare. (2010). Retrieved from http://www.nextgen.com/Products/ambulatory/EHR/EHR.aspx Questbiometrics, Initials. (n.d.). Dna as a biometric identifier. Retrieved from http://www.questbiometrics.com/article-1-biometrics-articles.html

  25. References Ruest, D, & Ruest, N. (2008). Microsoft window server 2008: the complete reference. Retrieved from http://books.google.com/books?id=qjtSlr75suYC&pg=PA18&lpg=PA18&dq=microsoft+windows+usability&source=bl&ots=6t9PFHERcs&sig=OjRLKEMQ4wDQLUesD5mIjwnvsTQ&hl=en&ei=FHzgTMH7JYP58AbH0o0W&sa=X&oi=book_result&ct=result&resnum=9&ved=0CEwQ6AEwCDgK#v=onepage&q=microsoft%20windows%20usability&f=false

  26. References Workgroup for electronic data interchange. (2004). Retrieved from http://www.wedi.org/public/articles/details.shtml (9, March 2007). Voice recognition. Retrieved from http://www.globalsecurity.org/security/systems/biometrics-voice.htm

More Related