[go: up one dir, main page]

McLeod et al. - Google Patents

Using Biometric Authentication to Improve Fire Ground Accountability: An Assessment of Firefighter Privacy Concerns

McLeod et al.

View PDF
Document ID
2769706715648394590
Author
McLeod A
Carpenter D
Clark J

External Links

Snippet

Two persistent resource management issues that arise in coordinated emergency response efforts are the timely delivery of accurate resource data to decision makers and effective methods for maintaining personnel accountability. Most emergency response agencies rely …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0639Performance analysis
    • G06Q10/06398Performance of employee with respect to a job function
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public service
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0635Risk analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
    • G06Q40/025Credit processing or loan processing, e.g. risk analysis for mortgages
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance, e.g. risk analysis or pensions

Similar Documents

Publication Publication Date Title
Sarkar et al. The influence of professional subculture on information security policy violations: A field study in a healthcare context
US8068008B2 (en) Emergency responder credentialing system and method
Rezgui et al. Information security awareness in higher education: An exploratory study
US8416083B2 (en) Networking in a virtual space
Tanwar et al. Ethical, legal, and social implications of biometric technologies
Zhang et al. Facial recognition: Understanding privacy concerns and attitudes across increasingly diverse deployment scenarios
US20080004890A1 (en) Interactive employment credential system and method
Lachney An exploration of internal controls and their impact on employee fraud in small businesses
Lindsay et al. The impact of mobile technology on a UK police force and their knowledge sharing
Schweitzer Computers, business, and security: the new role for security
Sipior et al. Information technology operational risk: A teaching case
Mutaqin et al. Population Activation Service Through Digital Civil Identification App
McLeod et al. Using Biometric Authentication to Improve Fire Ground Accountability: An Assessment of Firefighter Privacy Concerns
Carpenter et al. Using biometric authentication to improve fire ground accountability: An assessment of firefighter privacy concerns
Pfeiffer Managing Technology Risks Through Technological Proficiency: Guidance for Local Governments
Holbert Factors contributing to security awareness of the end user
Larkey Exploring the strategies cybersecurity specialist need to minimize security risks in non-profit organizations
Randolph Identifying the Role of Healthcare Leaders in Protecting Sensitive Information Within Their Sector
Mui et al. In-Person and Remote Employees and Information Security Policy Compliance
McLeod et al. Emergency Response Systems and Biometrics: Assessing Firefighter Privacy Concerns
Jones Improving Public Safety Through Law Enforcement and Private Security Partnerships
Reddick Citizen-centric e-government
Boutros Bridging the Gap Between Public Organizaions and Cybersecurity
Zureik et al. Background paper for the globalization of personal data project international survey on privacy and surveillance
Boswell The impact of perceived invasiveness and perceived objective on technology acceptance: An extension to the technology acceptance model