PRINCIPLES OF INFO.SYS.(LL)>CUSTOM PKG<
PRINCIPLES OF INFO.SYS.(LL)>CUSTOM PKG<
12th Edition
ISBN: 9781337074674
Author: STAIR
Publisher: CENGAGE C
Question
Book Icon
Chapter 11.5, Problem 1CTQ
Program Plan Intro

Next Generation Identification (NGI):

The Next generation Identification is developed and deployed by Federal Bureau of Investigation (FBI).

  • NGI is a biggest biometric database on world.
  • Its goal is to make sure the public and national security, giving the biometric leadership in cooperation with state and local governments, enhance the efficacy of biometric data retrieval and investigation, make sure privacy and protection of data, and enable the smooth conversions among existing systems.
  • It provides the advance technology such as Facial recognition.
  • Its purpose is to minimize the crime rate and avoid the terrorist attacks by enabling the law enforcement.
  • The main privacy concerns in this project are compliance with ethical standards. That is, around 52 million images are in private. But only 46 million are criminal photos according to this case study.  Some advocates collects around 4.3 million are pictures at that time of criminal records. Need to know the details of remaining photos around 1.5 million.
  • Some companies like Lockheed Martin, IBM, and Accenture will have rights to access the databases which stocks the driver’s licenses, quick feeds, and closed circuit television (CCTV) investigation cameras recordings, biometric data, and criminal proceedings.

Blurred answer
Students have asked these similar questions
What techniques do social engineering hackers use in order to get knowledge about a user's login id and password information? What would be the differences between this approach if it were directed at an administrative assistant vs a data-entry clerk?
It has been questioned if users can maintain their privacy when utilising social networking sites like Facebook, which already contain a sizable amount of personally identifiable information.
When it comes to preventing trolls and cyberbullying, why aren't the standard protections included into every social media site sufficient?

Chapter 11 Solutions

PRINCIPLES OF INFO.SYS.(LL)>CUSTOM PKG<

Knowledge Booster
Background pattern image
Similar questions
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning