[go: up one dir, main page]

Carpenter et al., 2008 - Google Patents

Using biometric authentication to improve fire ground accountability: An assessment of firefighter privacy concerns

Carpenter et al., 2008

View PDF
Document ID
5362802222381214547
Author
Carpenter D
McLeod Jr A
Clark J
Publication year
Publication venue
AMCIS 2008 Proceedings

External Links

Snippet

Two persistent resource management issues that arise in coordinated emergency response efforts are the timely delivery of accurate resource data to decision makers and effective methods for maintaining personnel accountability. Most emergency response agencies rely …
Continue reading at scholar.archive.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public service
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
    • G06Q40/025Credit processing or loan processing, e.g. risk analysis for mortgages

Similar Documents

Publication Publication Date Title
Carpenter et al. Privacy and biometrics: An empirical examination of employee concerns
US8068008B2 (en) Emergency responder credentialing system and method
Barkow Prosecutorial administration: Prosecutor bias and the Department of Justice
Hu Biometric ID cybersurveillance
Uys Rational loyalty and whistleblowing: The South African context
Rascoff The law of homegrown (counter) terrorism
Lalot et al. Distrustful complacency and the COVID‐19 vaccine: How concern and political trust interact to affect vaccine hesitancy
Hedricks et al. Web‐based multisource reference checking: An investigation of psychometric integrity and applied benefits
Britt et al. Self‐engagement magnifies the relationship between qualitative overload and performance in a training setting 1
Sprague Privacy Self‐Management: A Strategy to Protect Worker Privacy from Excessive Employer Surveillance in Light of Scant Legal Protections
Wuestewald A legitimacy crisis? Exploring the relationships between police self-legitimacy, employee engagement, and civic engagement
Rejman-Greene Privacy issues in the application of biometrics: A European perspective
Schweitzer Computers, business, and security: the new role for security
Steinmann et al. Embedding privacy and ethical values in big data technology
Carpenter et al. Using biometric authentication to improve fire ground accountability: An assessment of firefighter privacy concerns
Shaaban Enhancing the governance of information security in developing countries: the case of Zanzibar
Shaw et al. Insider risk evaluation and audit
Boyle et al. Measuring deception: A look at antecedents to deceptive intent
McLeod et al. Using Biometric Authentication to Improve Fire Ground Accountability: An Assessment of Firefighter Privacy Concerns
Istiqomah et al. The effect of intentions on behaviour to conduct whistleblowing
Hollis All Quiet on The Digital Front: The Unseen Psychological Impacts on Cybersecurity First Responders
Mui et al. In-Person and Remote Employees and Information Security Policy Compliance
Randolph Identifying the Role of Healthcare Leaders in Protecting Sensitive Information Within Their Sector
Xu et al. Individual swift trust and cooperation in emergency rescue team members
McLeod et al. Emergency Response Systems and Biometrics: Assessing Firefighter Privacy Concerns