McLeod et al. - Google Patents
Using Biometric Authentication to Improve Fire Ground Accountability: An Assessment of Firefighter Privacy ConcernsMcLeod et al.
View PDF- Document ID
- 2769706715648394590
- Author
- McLeod A
- Carpenter D
- Clark J
External Links
Snippet
Two persistent resource management issues that arise in coordinated emergency response efforts are the timely delivery of accurate resource data to decision makers and effective methods for maintaining personnel accountability. Most emergency response agencies rely …
- 238000011160 research 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0639—Performance analysis
- G06Q10/06398—Performance of employee with respect to a job function
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public service
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0635—Risk analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
- G06Q40/025—Credit processing or loan processing, e.g. risk analysis for mortgages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance, e.g. risk analysis or pensions
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sarkar et al. | The influence of professional subculture on information security policy violations: A field study in a healthcare context | |
US8068008B2 (en) | Emergency responder credentialing system and method | |
Rezgui et al. | Information security awareness in higher education: An exploratory study | |
US8416083B2 (en) | Networking in a virtual space | |
Tanwar et al. | Ethical, legal, and social implications of biometric technologies | |
Zhang et al. | Facial recognition: Understanding privacy concerns and attitudes across increasingly diverse deployment scenarios | |
US20080004890A1 (en) | Interactive employment credential system and method | |
Lachney | An exploration of internal controls and their impact on employee fraud in small businesses | |
Lindsay et al. | The impact of mobile technology on a UK police force and their knowledge sharing | |
Schweitzer | Computers, business, and security: the new role for security | |
Sipior et al. | Information technology operational risk: A teaching case | |
Mutaqin et al. | Population Activation Service Through Digital Civil Identification App | |
McLeod et al. | Using Biometric Authentication to Improve Fire Ground Accountability: An Assessment of Firefighter Privacy Concerns | |
Carpenter et al. | Using biometric authentication to improve fire ground accountability: An assessment of firefighter privacy concerns | |
Pfeiffer | Managing Technology Risks Through Technological Proficiency: Guidance for Local Governments | |
Holbert | Factors contributing to security awareness of the end user | |
Larkey | Exploring the strategies cybersecurity specialist need to minimize security risks in non-profit organizations | |
Randolph | Identifying the Role of Healthcare Leaders in Protecting Sensitive Information Within Their Sector | |
Mui et al. | In-Person and Remote Employees and Information Security Policy Compliance | |
McLeod et al. | Emergency Response Systems and Biometrics: Assessing Firefighter Privacy Concerns | |
Jones | Improving Public Safety Through Law Enforcement and Private Security Partnerships | |
Reddick | Citizen-centric e-government | |
Boutros | Bridging the Gap Between Public Organizaions and Cybersecurity | |
Zureik et al. | Background paper for the globalization of personal data project international survey on privacy and surveillance | |
Boswell | The impact of perceived invasiveness and perceived objective on technology acceptance: An extension to the technology acceptance model |