Question

In: Computer Science

Describe some advantages of using computer technology (e.g., smart cards, databases, etc.) for identification cards and...

Describe some advantages of using computer technology (e.g., smart cards, databases, etc.) for identification cards and identification systems, as compared to the current Social Security card and number system. Describe some serious potential risks or problems of using computerized ID cards/systems. Consider both private and governmental uses.

Answer in 3 paragraphs. Like an essay.

Solutions

Expert Solution

Description of some advantages of using computer technology such as smart cards, databases, etc., for identification cards and identification systems, as compared to the current Social Security card and number system:

Using a digital or computerized identification system is always advantageous, beneficial, profitable, as compared to the current Social Security card and number system. In general, these digital or computerized identification systems using smart cards, databases, etc., for identification cards and identification systems purposes are, robust, flexible, seamless, reliable, highly available, quick, cheap, convenient, secured, simpler, and easier than the current systems.

These computerized identification systems work correctly, properly, completely, accurately, and precisely with no or negligible amount of errors, mistakes, or bugs- one in millions. These systems are trustworthy. These systems can be accessed and would be available across the globe for all those people who are authorized to use them. These systems are failure resistant or support fail-overs, providing redundancy in the services, resources, and data for the users.

For example, digital IDs provided to users are verified to a very high degree of assurance, unique, and are set up with every individual's consent, and these protect users' privacy and have control over data.

These computerized identification systems verify the identity of a person and store data in a database of a server that is durable, highly available, reliable, and work at a very high performance. These systems are very effective and even efficient. From the physical handling perspective, these are light weighted systems, thus easy to lift, carry, install, uninstall, and transport. Some of these computerized identification systems are very advanced, well-known, and use and are booming technologies. Some of these systems are biometric characteristics such as finger, hand, or iris recognition, facial recognition, voice identification, Optical Character Recognition (OCR), signature recognition, Radio-Frequency IDentification (RFID), and use bar codes. All these different characteristics have their own and unique capabilities and are effective for identification purposes. They account for a speedy process for identification, verification, authentication, authorization, and security checks.


For example, a microprocessor-based smart card is only a type of chip card and a plastic card which is embedded with a computer chip, with numerous applications, from transportation systems, identification purposes, systems, devices, applications login, access, usage purposes through authentication, identification, verification, and later authorization processes. Hence, this technology enables the secure identification of users and allows them to access authorized information and other physical accesses of systems. One of the examples of such a card is a SIM card in one's mobile phone. Which also supports GPS (Global Positioning System) to track where the person at a given point of time is, to see if the card is active and is in service or de-activated, suspended, or the service is terminated. It protects identity credentials which are the most secure means of authentication. Smart cards are integrated into company badges and university IDs making them personal, professional, and business-oriented.

Other examples: The Integrated Automated Fingerprint Identification System (IAFIS), is another computerized identification system.
Eurodac, is the European fingerprint database to identify asylum seekers and others.
Another example, eID, which is an electronic IDentification, which is another computerized and digital solution to prove identity of citizens.

All these systems use specialized databases, software and computers designed for their specific functions and capabilities. Also, these digital identification systems are used which require data about persons stored in computer systems, in databases, storage devices, and servers, which are linked to their civil, or national, identities, unifying all other government IDs or other relevant IDs into one.

Description of some serious potential risks or problems of using computerized ID cards or systems, considering both private and governmental uses:

Below risks and problems are seen in both, private and governmental uses, and in fact, general public uses as well.

* If an attacker or hacker hacks or breaches one server, or database server through certain and specific kinds of attacks, he/she can get (steal) all the information (personal, private, professional, and social) of all the users whose details and data are stored in the particular database or the server. Hence there would not be any security. There have been cases across the world where hackers hacked millions of records, SSNs, other identification numbers, credit card details, etc., of people, and misued the same for their monetary gains.

* Not all customers, people, users or end users, home users are aware of these computerized identification systems, nor many of them will understand despite training and awareness programs. Hence, it requires proper, detailed, easy to understand training, awareness, demonstration to be provided to all sets of people across the world.

* Hence, the biggest risk of any national ID system is the databases holding the critical and crucial data of the people of their respective IDs stored in those databases getting hacked.

* In the health sector, any incorrect, wrong, intentional, accidental, attack, or hack of these databases, any wrong manipulation of data would potentially cause dangerous errors in medications, transfusions, and testing, harming, hurting, and killing people or patients.

* Any lack of identification at any point of time by a user would be a major barrier to financial inclusion.

* Any and all technological failure will incur a loss and would slow the pace of computerized identification systems adoption and prevent the economic value from being realized. These could be due to software, hardware, or network issues, errors, or bugs.


Related Solutions

Data must possess some key characteristics. Using the example of Smart Cards or Automatic fare collection...
Data must possess some key characteristics. Using the example of Smart Cards or Automatic fare collection elaborate on the following: Reliable, Timely, Complete
Describe the emergence of strategic HRM and the influence of computer technology. What are some of...
Describe the emergence of strategic HRM and the influence of computer technology. What are some of the approaches used in HRM to facilitate the use of strategic HRM in a firm's business strategy?
What are The Advantages of Incorporating Radio Frequency Identification (RFID) Technology in Retail Stores?
What are The Advantages of Incorporating Radio Frequency Identification (RFID) Technology in Retail Stores?  
Discuss the advantages and disadvantages to using computer technology for managerial decision-making. Identify and discuss one...
Discuss the advantages and disadvantages to using computer technology for managerial decision-making. Identify and discuss one decision, personal or professional, you have utilized technology for forming your decision and why.
Find an article in a recent technical journal (e.g., Journal of Quality Technology, Quality Progress, etc.)...
Find an article in a recent technical journal (e.g., Journal of Quality Technology, Quality Progress, etc.) on the use of control chart for on-line quality control or experimental designs used for off-line quality control. Summarize the article in 100-150 words.
Please describe the advantages of using cryo-electron microscopy in structure determination and the technology advancement that...
Please describe the advantages of using cryo-electron microscopy in structure determination and the technology advancement that makes cryo-EM an attractive approach to resolve protein structure at atomic resolution.
Discuss the role of Information Technology in the healthcare setting? What are some of the advantages...
Discuss the role of Information Technology in the healthcare setting? What are some of the advantages and disadvantages? Give examples What would you like to see change or improve in the future?
Describe the role that Phosphoinositides (PIs) (e.g. PIP2, PIP3, etc) play in both membrane trafficking and...
Describe the role that Phosphoinositides (PIs) (e.g. PIP2, PIP3, etc) play in both membrane trafficking and cell signaling. Give a specific example of how they play a role for each.
Companies utilizing technology need to develop and select and implement hardware (server, computer, routers, etc.). Please...
Companies utilizing technology need to develop and select and implement hardware (server, computer, routers, etc.). Please complete a 500-word paper on your thoughts about how Hardware Management Plans are used. Explain what a hardware plan is. What role does that plan play into planning, control, coordination, and decision-making n business today? How will this hardware plan help a company succeed?
2. a) Describe some advantages of using cameras, ROVs, AUVs, and buoys compared to having manned...
2. a) Describe some advantages of using cameras, ROVs, AUVs, and buoys compared to having manned technologies. b) Shrimp fished at great depths survive but do not fish. Why? c) Describe what a research hypothesis is and what the researcher does after formulating a hypothesis. d) The picture shows a red coral that lives down to a depth of max. 300 meters. How does a fish or a human perceive the coral at 50 meters deep or below - as...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT