Carpenter et al., 2008 - Google Patents
Using biometric authentication to improve fire ground accountability: An assessment of firefighter privacy concernsCarpenter et al., 2008
View PDF- Document ID
- 5362802222381214547
- Author
- Carpenter D
- McLeod Jr A
- Clark J
- Publication year
- Publication venue
- AMCIS 2008 Proceedings
External Links
Snippet
Two persistent resource management issues that arise in coordinated emergency response efforts are the timely delivery of accurate resource data to decision makers and effective methods for maintaining personnel accountability. Most emergency response agencies rely …
- 230000004044 response 0 abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public service
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
- G06Q40/025—Credit processing or loan processing, e.g. risk analysis for mortgages
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Carpenter et al. | Privacy and biometrics: An empirical examination of employee concerns | |
US8068008B2 (en) | Emergency responder credentialing system and method | |
Barkow | Prosecutorial administration: Prosecutor bias and the Department of Justice | |
Hu | Biometric ID cybersurveillance | |
Uys | Rational loyalty and whistleblowing: The South African context | |
Rascoff | The law of homegrown (counter) terrorism | |
Lalot et al. | Distrustful complacency and the COVID‐19 vaccine: How concern and political trust interact to affect vaccine hesitancy | |
Hedricks et al. | Web‐based multisource reference checking: An investigation of psychometric integrity and applied benefits | |
Britt et al. | Self‐engagement magnifies the relationship between qualitative overload and performance in a training setting 1 | |
Sprague | Privacy Self‐Management: A Strategy to Protect Worker Privacy from Excessive Employer Surveillance in Light of Scant Legal Protections | |
Wuestewald | A legitimacy crisis? Exploring the relationships between police self-legitimacy, employee engagement, and civic engagement | |
Rejman-Greene | Privacy issues in the application of biometrics: A European perspective | |
Schweitzer | Computers, business, and security: the new role for security | |
Steinmann et al. | Embedding privacy and ethical values in big data technology | |
Carpenter et al. | Using biometric authentication to improve fire ground accountability: An assessment of firefighter privacy concerns | |
Shaaban | Enhancing the governance of information security in developing countries: the case of Zanzibar | |
Shaw et al. | Insider risk evaluation and audit | |
Boyle et al. | Measuring deception: A look at antecedents to deceptive intent | |
McLeod et al. | Using Biometric Authentication to Improve Fire Ground Accountability: An Assessment of Firefighter Privacy Concerns | |
Istiqomah et al. | The effect of intentions on behaviour to conduct whistleblowing | |
Hollis | All Quiet on The Digital Front: The Unseen Psychological Impacts on Cybersecurity First Responders | |
Mui et al. | In-Person and Remote Employees and Information Security Policy Compliance | |
Randolph | Identifying the Role of Healthcare Leaders in Protecting Sensitive Information Within Their Sector | |
Xu et al. | Individual swift trust and cooperation in emergency rescue team members | |
McLeod et al. | Emergency Response Systems and Biometrics: Assessing Firefighter Privacy Concerns |