We accept

The Biometric Technology For Effective Payroll System

Payroll is one of some accounting transactions, working with the procedure of paying employees for services rendered, it is digital software, where all the employee's information is documented and captured. Company's activities a lot of payroll fraudulent occurring through the use of this payroll software which impacts the company's capital due to a high increased payroll cost.

Background and Motivation

Money being a valuable advantage to the company, I've chosen to analyze more on payroll and how do the effective security level be carried out to enhance the security on payroll by the use of biometrics, as I believe in Physical Features identification like finger prints, palm prints, and facial.

To solve the security hazards, biometrics technology (implemented in the ReCon Biometrics Keyless Id Security System) uses physical traits to identify a person. This solution is ideal because biometrics authentication will not require the user to own any physical gain access to objects present or keep in mind any passwords. With ReCon Biometrics's advanced cosmetic identification technology, we is now able to overcome many issues that other systems have came across in the past (Rogan, 2002).

Rather than using personal recognition because, as (Rogan, 2002) mentioned that in personal recognition A Personal Recognition Amount (PIN) is another widely adopted method of authentication, and it is a standard example that uses memorized passwords or pass codes. The benefit to this way is the fact no physical means are required for authentication. However, this technique still suffers from security hazards if an unauthorized specific gains usage of an authorized user's PIN. Further issues can happen when certified users neglect or misplace a PIN.

"Turner, a payroll specialist for a huge Florida nonprofit organization, was a ill man. Most employees who grab achieve this out of greed, but Turner had a different motive-he was HIV-positive and needed expensive drugs to control the disease. Turner's duties included posting time and attendance information to the computer system preparing payroll disbursement summaries. Adding and deleting staff master details were separate jobs, performed by another employee. As an additional safeguard, a supervisor approved all payroll disbursements, and the business deposited them directly into employees' personal bank accounts. When the coworker who added and deleted master documents logged onto the system, Turner peeked over her shoulder and observed her user ID and password. This enabled him to include fake professional records-for "ghost" employees-- to the system" (Wells and Joseph, 2002).

"Where there is money to be produced, dishonest and unscrupulous individuals can find ways to bilk the system" (Michaels, 1998).

"As with any financial device, the main element to success is reduction, and FIS continues to create new fraudulence protection and monitoring tools as new fads develop" (Mccann, 2008).

A lot of money becomes absent and records being edited because of unauthorized users who hack the payroll system or being able to retrieve the passwords into accessing the payroll system, therefore the reason for this research is to research the origins of hacking in the payroll in order to find a sustained means to fix it and eliminate ghost employees.

It is supposed that in this research a suitable biometric system will be released providing greater dependability and accountability, in order to improve the security degree of The INNOVATIONHUB'S VIP payroll and the personnel.

1. 2 Problem statement

Payroll encompasses every employee of a company who receives a regular income or other payment. Some employees may be paid a steady salary while others are payed for hours worked or the number of items produced. Many of these different repayment methods are computed by a payroll specialist employing a payroll system, and the correct paychecks are released.

So for a worker to get their paycheck a period sheet is submitted so that the payroll specialist can capture the data on enough time sheet example number of hours worked well, and then compute the salary for the worker, so companies often use objective measuring tools such as timecards or timesheets completed by supervisors to look for the total amount of payroll due each pay period. Payroll system can be an electronically software that calculates employees salary.

The problem is that when employee's fill in their time sheets or timecards, they easily forge their attendance of being present at the job or working overtime knowing they didn't, they do what is called "buddy punching" which is when an employee punches a time card for another person. That is done by employee's reason being getting more money, or earning money even though they didn't work for it, because we all need to get our hands on "money" this impacts the company's output and payroll cost.

However payroll specialists easily escape with fraudulence because, usual solutions to the condition of enhancing security is identification involve using systems that count on just what a legitimate user recognizes example, passwords or personal identification numbers or what a legitimate user offers example, ID credit cards or keys.

"However, these procedures are vunerable to scams and security hazards as they do not identify the individual but merely identify the information that is provided by that person" (Gupta, 2008).

Companies have to have an absolute rely upon the personal information of their employees, customers, and partners that is, they are actually who they say they are simply.

"Taylor Farm, a processing herb for bagging produce, was incurring 20 percent of payroll cost scheduled to buddy punching" (Gupta, 2008).

Kahn et al (2002:57) discovered that the "System has an automated, centralized back end payroll service with a full-featured web-based payroll system. Both aspects of the system get access to a central database, which includes, for example: profile information on employers and employees; timesheet, salary and hourly wage data; employee gain data and information regarding third-party providers and miscellaneous payee".

According to Krons (2010:109), "the YMCA was committed to keeping its payroll in-house and was buying a versatile and configurable system that would enable it to take action effectively. With Kronos, they have been able to minimize payroll processing time by 50 percent generally because of the automation of payroll data from enough time and attendance system into payroll. With an increase of than 1, 800 full- and part-time employees at 12 facilities across Ohio, many employees often perform multiple careers in the same pay period. With Kronos, the YMCA can keep track of position management and ensure that payment is applied correctly".

"After implementing a new time and attendance system for its labor intensive procedure, Fantasy Cookie Co. has noticed a 90% reduction in payroll errors and profits on return of one season" (Hitchcock, 1993:70).

"Some of the motivations to improve payroll frequencies include best practice or industry standards, possible future deal or acquisition, cost savings, union agreement requirements, or even staff requests" (2010:8).

My goal is to find a way by means of biometrics systems to enhance the security level on VIP payroll at The Creativity Hub and monitoring employee's occurrence at the job.

1. 3. 1 Goal

The primary goal of this study is to add Biometrics System for the security of VIP payroll with the Technology Hub.

1. 3. 2. Objectives

To investigate the security problems being experienced at the payroll and monitoring employee's timesheet or timecards of the Innovation Hub

To find out what is the security system applied in the payroll of the Development Hub.

To explore the use of Biometric technology as a security system in the corporation to resolve the security problems observed.

1. 3. 3 Research questions

What will be the security problems being came across at the payroll of the Technology Hub?

What is the security system applied in the payroll of this organization?

How will Biometric system can be applied to resolve the security problems recognized?

1. 3 Scope

There are three types of payroll systems the first being the manual payroll system typically functions small medium and macro business (SMME), and all this is done yourself with a manual payroll system.

Secondly being the In-house Payroll a business with up to 60 employees can benefit from a computerized in-house payroll system.

Thirdly is the exterior Service (outsourcing) company with an increase of than 60 employees usually employing an external payroll service. They are really a separate organization that is an expert in payroll processing.

"The basis of the definition given by Justice Buckley is the fact that in order for a fraud to are present a lay must be told then one tangible obtained by virtue of the operation of that lie on your brain of the individual receiving the information. That premise has been lengthened through common consumption and the mass media so that now scam is referred to as the obtaining of property through any dishonest means. Those means do definitely not include the telling of a lay and include what's considered corrupt activity with a person in expert" (Jarrod 2006).

"There is no easy fix for Community Security. No silver precious metal bullet or magic accounting will painlessly fix the condition posed by our 70-year-old national retirement system. At a recently available meeting in Washington, D. C. , the ABA Authorities Relations Council reaffirmed a technique first advocated by ABA in 1999. It demands ABA to do something as industry spokesman for reform, work with Congress on a bipartisan basis and support the creation of personal retirement accounts - those special accounts that would allow younger personnel to place a portion of the payroll fees in private retirement life accounts they control themselves" (Duke 2005:20).

Swart (2002:5-15) discovered that the "payroll systems are troublesome and problematic, they might need the use of your middleman payroll service to either send or calculate and send the employee's net pay data to the bank, which raises costs to the employer. These cost are eventually offered to the employees and general public, such systems also take significant amounts of time to obtain, transfer, translate and process every one of the data required to determine and send out net pay to the worker, and employees are therefore pressured to wait a couple of weeks before even getting their paychecks another drawback of the last fine art payroll system is the use of centralized data processing for calculation of net pay, such as used by ADP".

The allegations ranged from agreeing to kickbacks, committing loan provider larceny against the Orleans Parish Credit Union, and forging and passing bad investigations, to theft, tax violations, insurance and email scams, as well as extortion. 6 With encouragement from Talk about Superintendent Picard, the New York-based company of Alvarez & Marsal was decided on in July 2005, by the Orleans Parish University Board and the Louisiana Department of Education, to handle and solve the district's numerous systemic financial improprieties. 7 Employees of Alvarez & Marsal immediately found significant payroll discrepancies predicted to cost the area approximately $12 million per yr (Pamela & Frazier 2008). Systems that lack a secured authorization detector can end up being background to the owners and costly.

"HIGH-PROFILE payroll problems have plagued a $25 million PeopleSoft ERP execution in the Hand Beach County College Area in Florida after just five weeks of operation. Because the Oracle Corp. software gone are in July, there were numerous instances of employees being underpaid or not paid at all, said Mike Guay, a Carlsbad, Calif. -based consultant hired in early Sept to help fix the problems. In many cases, the payroll mistakes have induced significant hardship to workers, added Sharon Barmory-Munley, chief executive of thse local office of the Country wide Seminar of Firemen & Oilers, a union representing more than 4, 000 institution district employees. In Sept, payroll problems prompted some 300 bus motorists to picket the institution board. Other employees have complained to the U. S. Office of Labor, said Barmory-Munley" (Barton, 1992).

"It's unpleasant, she said. Some people can't pay their expenses, mortgage repayments are past due, and they've ruined their credit. That is devastating" (Marc, 2006), this statement shows how serious and dangerous the system can get if not fixed in time. Payroll Exhibit Corp. , a corporation that provided paycheck cashing services for about 100 corporate clients, has gone bankrupt, and owner Robert Felzenberg has been accused of diverting customers' money to its uses. Payroll Express' bank, United Jersey Bank (Hackensack, NJ), has been sued by some Payroll Exhibit customers for not monitoring the business more closely and then for allegedly disregarding and glossing over Payroll Express' troubles. The lender says the charges are without merit" (Barton, 1992).

Not all of the IT specialist do the right job or what they are suppose to do, you find IT hackers who can do anything to get their hands on money, money being an object that everyone would like to get their hands on.

"A big local employer in a tiny town experienced its office burglarized. Nothing at all appeared to be taken but there was some vandalism. The company assumed it was just some kids. A couple of days later, on the late Friday evening, a group of about 20 people who have heavy accents arrived to the local loan provider and cashed payroll inspections drawn on the local employer. On Sunday, the same 20 people returned to each one of the standard bank branches again cashing more investigations. It was then discovered that these assessments were forged. The blank checks have been stolen during the break-in. Encouraging or demanding businesses to employ a Positive Pay System will prevent these losses. When working with Positive Pay, the business enterprise customer supplies the bank's computer with check amounts and quantities before providing the bank checks to recipients" (Towle, 2010:17).

"There is absolutely no end to Queensland's payroll debacle with a written report finding it will take another half a year to make critical fixes to the machine and 18 months for this to be fully re-implemented. Queensland nurses and midwives were waiting for a formal response from the state's health section after a written report recommended keeping the flawed system "(2010-2011:15).

"No matter what industry an organization serves, there exists one common factor - the client. That customer can be external or internal. The key focus in having quality participate everyone's job is to make sure customer value is the principal purpose of the organization. Everyone in the organization should know the customers and what they consider important. All functions - accounting, payroll, information systems, anatomist, sales - are likely involved in how these customers view the task. Tools such as customer review analysis, best practice studies and publisher customer audits are being used to determine what customers really want, as are graphs of customer claims over a specific time frame" (Whitarcre, 2001).

1. 4 Significant

This review is very significant in the sense that there surely is a serious implication of financial security to the success of any firm especially the InnovationHub.

Electronic security has also turn into a global concern in the discourse of a virile Information System, while the biometric system is a present security application of IT in the security system. The survey of the work will also add to literature on the express of the fine art applications of IT analysis while the solution can be applied in every payroll systems.

1. 5 Key words

Payroll, System, Access, Security, Biometric

Literature review

Companies need to in a position to have absolute rely upon the identity of the employees, they are really who they state they can be.

Fraud can occur in the payroll department in lots of ways. These range from (Journal of Trade, 2010):

phantom employees being paid;

fraudulent additions to approved time information;

increases in hourly rates;

payments of commissions, bonuses, or incentives that are added to an employee's normal paycheck;

deduction reversals that increase an employee's world wide web pay;

illegal advanced attained income credit payments; and

Child support garnishments that are mailed to a "custodial father or mother" but never deducted from a salary.

"Identification is a one-to-many matching process that ascertains the lifestyle of an individual in a repository. This process just determines that the person exists. If access control is predicated only on the living of an individual, then the specific is given usage of the system when the mandatory identifier is found to exist in the access database. There is no confirmation or proof that the person who is given access is indeed the individual who initiated the gain access to technique" (Chandra & Calderon, 2003).

Everyone is a potential scams, and only careful hiring and strong interior control are effective in preventing fraudulent to the business (Seidman, 1985).

Payroll accounting shows another area where authentication issues presume importance. The value for effective authentication prevails in at least three operations: time-keeping and attendance data, pick-up of paychecks, and linking employees to specific jobs in the organization.

"Three broad categories of factors that organizations use for robotic authentication-possession, knowledge, and biometrics. Authentication can be predicated on an individual factor (e. g. , a security password, a PIN, or a picture Identification) or on multiple factors (e. g. , security password and picture ID, or PIN and picture Identification). Vertical moves within the pyramid are associated with rises in the power and focused aspect of the authentication process. The likelihood that the verified identity is not that of the real owner also decreases with vertical motions in the pyramid" (Chandra & Calderon, 2003).

"The user must present a physical ownership (like a token or an integral) to be authenticated. Though obvious and usually portable, belongings can be lost, stolen, shared, duplicated, ignored, or demolished. Possession-based authentication factors provide guarantee that a user reveals a valid token or credit card. Within the context of an robotic authentication process, these factors do not provide direct assurance a user who's allowed gain access to into an information system is indeed the person she or he promises to be. In the second category, the user provides information about his/her knowledge (such as, security password, or passphrase). Passwords and other knowledge authentication factors are highly portable, invisible (unless on paper), can be altered often, and can be designed to be relatively secure. However, they could be forgotten, reused, stolen, guessed, or shared. Passwords offer guarantee that the person at the computer keyboard knows the password. They don't offer guarantee that the person at the key pad is indeed the person he/she purports to be" (Chandra & Calderon, 2003).

Fraud in payrolls always entails over statement of the full total of the payroll, and usually involves either (1986):

Padding the payroll by including names of new employees before they began to work, or brands of employees who've left, or titles of men who are simply just non-existent, or who are present but do not be employed by the company.

Overstating payroll footings, bring forwards etc

Failure to take into account unclaimed wages, overpayments. Etc.

One private sector problem is what is called "buddy punching" which is when a worker punches a period card for someone else. Taylor Farm, a processing vegetable for bagging produce, was incurring 20 percent of payroll cost scheduled to pal punching. (Gupta, 2008).

People are our business and handling such a huge workforce that operates on diverse customer sites is a challenge. We recognized a standard time and attendance system that could provide as many access options for clocking on as possible - biometric, internet, proximity, phone - yet could be monitored both centrally and remotely, was an important requirement for our business (Pollitt, 2008).

The real cushion against scams, however, is at the sort of individual employed. This implies concern not really much with an applicant's technical background, much like human background. Things like his setting of living, his interpersonal habits, his family troubles, his financial tensions and strains many of these are essential in the fraud potential (Seidman, 1985).

"The development foreman of a huge chemical company is accountable for a maintenance team of about fifty employees who include tradesmen and labourers. He is also responsible for the deployment of a large amount of tools and equipment for the repair and maintenance of the herb. The employees are allowed to work overtime. The foreman began his own handyman/small development company focusing on week end work. To handle this work he applied the tools and equipment of his employer and the time for the labour of the employees involved in this nefarious activity was payed for by the company by means of overtime for working on the weekend. The foreman certified their overtime cards, certifying they had performed the overtime for the business. Employees were payed for their work, however the foreman, who incurred his private clients, did not have to pay any costs of the building whatsoever.

The foreman's behaviour was such that he obtained a financial benefit because hedid not have to cover the labour of his employees or the tools and equipment he used onhis careers. He was convicted of deceiving his workplace into spending money on the labour cost" (Bowditch, 2006).

The paymaster of a huge technological company on the north shore was a trusted and valued employee until a co employee saw him driving a car a brand new Porsche on the week end. A study revealed that he previously been systematically paying himself overtime at the rate of five times his regular salary. No subterfuge, he was just authorizing the repayment to himself of more time overtime than there are hours in the week. The actual fact that he could have got away with this brazen fraud for over twelve months showed too little any kind of control by management in the running of the company, and certainly no thought to fraudulence control (Bowditch, 2006).

The state sales supervisor for a leading liquor distributor was offering the clients on his run a special discount for cash. He was satisfying the purchases and acquiring the cash and writing an invoice and receipt from a loop he had installed in the company computer which possessed an application to generating the invoices, receipts and stock upgrades. He received away with thousands of us dollars until a physical reconciliation was done between the stock and sales statistics and the crime uncovered (Bowditch, 2006).

American businesses lose nearly $12 billion each year to check fraud, and smaller businesses are recurrent victims of fraud music artists, who consider them easy prey (Blackwood, 1998).

Don't trust any person with money, check with them and then check more.

3. Theoretical shape work

Using Autopoietic theory as a platform for biometrics

"Autopoiesis is a pseudo Greek term coined from ± (automobile) for self applied and ±· (poiesis) for creation, creation or creating that was initially presented by the

Chilean biologists Humberto Maturana and Francisco Varela in 1973 to denote the kind of phenomenon that they had determined as a attribute that distinguishes living systems from other styles of systems. They claimed that living systems are autonomous entities that reproduce almost all their properties through their inside processes. Later on this term was launched into social theory as well as formal firm theory by Niklas Luhmann who said that sociable systems are systems of communication that emerge whenever an autopoietic communication circuit comes into being that is able to filtering itself out of the intricate environment" (Schatten, 2008).

"Luhman argues that there are three types of social systems: societal, interactional as well as organizational. Any communal system has its respective information subsystem defined through their communicative techniques. Systems that are not autopoietic (systems that produce something other than themselves) are considered to be allopoietic (technical) systems" (Schatten, 2008).

This is how the theory of Autopoietic will be applied to my research, the theory which signifies a construction for describing intricate non-linear and especially living systems is explained in a context of biometric characteristics. It really is argued that any living system by carrying out an internal procedure for reproducing its structural components yields physical biometric characteristics. Also any living system when structurally coupling to some other (eventually allopoietic) system yields a behavioral or mental feature of the living system (Schatten, 2008).

It is unveiled a system that may be regarded as autopoietic could be assessed, authenticated and or determined using biometric method, and so biometrics is appropriate to any autopoietic system it could be people, communal systems, organizations as well as information systems.

So biometric is a way of series, steps or activities conducted to apply biometric samples of some biometric feature usually to find the biometric feature's holder or a special feature of the biometric test.

A biometric template or extracted structure is a variety or group of quantities acquired by the conscious program of a biometric feature extraction or preprocessing method over a biometric test. These templates are usually stored in a biometric databases and used for research during the identification, training or enrolment operations of your biometric system (Schatten, 2008).

The diagram below illustrates the way the biometric technology will be intergrated with the payroll system, which is how the autopoietic theory will be employed to my study.

Diagram of payroll system included with iris biometric device

Back up a data center

The time sheet details is captured in the payroll system.

Time sheet (amount of time in and out) about the employee is registered.

Employee scans his / her Iris in the iris scan device.

The payroll specialist forwards the employees paycheck, using timesheet information from the captured payroll.

Paycheck is moved by the money division to the employee's accounts.

4. Methodology

This can be an exploratory research because it is the purpose of formulating problems more accurately, clarifying principles, gathering explanations, getting insight, eradicating impractical ideas, and building hypotheses.

The method of data collection that I'll use is qualitative method as "it is used whenever a question must be referred to and investigation in a few depth, or evaluating the meaning of an event" (Shields and Twycross).

How I will put together my research I will seek to interview those who are knowledgeable and who might be able to provide insight concerning the payroll system and monitoring of your energy sheets to verify employee's presence at the job.

I will interview 20% of the workers and all the personnel at the fund section and the payroll specialist, I'll use audio tracks tapes for recording my interviews and a method of transcripts of dialog.

Some of the questions I'll ask the workers:

Do you use any kind of access to enter into your office or the building of the business?

What screens your presence at the job?

Do you post weekly or regular monthly time sheet?

Who witness the time sheet?

Some of the questions I'll ask the payroll department:

What capabilities or information should you capture for a new employee?

How would you cope with information of ex girlfriend or boyfriend employee?

When will you do spin over of the payroll?

How are different leaves captured?

Some of the questions I'll ask the finance department:

When do the employees obtain their pay check?

How can you keep an eye on costs of payroll, after how much time?

I'm going to handle my research at The Innovation Hub focusing on their VIP payroll system, time bed linens and the clocking in and clocking out of work method used.

This is a short release of my solution framework

Biometrics refers to the process of automatically realizing a living person using his / her distinguishing, measurable qualities. Biometric systems identify the individual alternatively that what the individual has (like ID credit cards) or what they remember (like passwords). The term biometric identifies the statistical evaluation of biological phenomena and measurements and has been trusted to describe technologies used for personal id management (Gupta, 2008).

Biometrics technology uses unique, measureable, human characteristics to automatically recognize and verify an individual's identity.

Biometrics can evaluate both physiological and behavioural characteristics. Physiological biometrics is dependant on precise and accurate measurements of unique features of the human body, and includes:

Finger check which fits the minutiae, structure, ultrasonic or moir fringe imprint, most popular of all devices (Chandra & Calderon, 2003).

Facial scan is designed primarily to find close complements of particular facial features such as eye, nose, mouth area, cheekbones, chin, and forehead against a data source of static facial images (Clodfelter, 2010).

Iris scan technology depends on the distinctly colored band that surrounds the pupil of the eye. Irises have around 266 distinctive characteristics, including a trabecular meshwork, striations, rings, furrows, a corona, and freckles. Typically, about 173 of these distinctive characteristics are used in creating the template. Irises form during the eighth month of pregnancy and are believed to remain steady throughout a person's life, barring injury (Rosenzweig, 2004).

Retina scan an electronic image of the retina of the attention is created to match the structure against a live sample, checking done by low-intensity light via an optical coupler (Chandra & Calderon, 2003).

Hand geometry relies on measurements of the width, height, and length of the fingers, distances between bones, and the shape of knuckles (Rosenzweig, 2004).

Behavioral biometrics (based on measurements and data derived from an action) include:

Voice recognition actions the wavelengths and frequencies of the voice (Chandra & Calderon, 2003).

Signature recognition traditional device, a behavioural device, it checks the way a person signals his / her name, and creates characters (Chandra & Calderon, 2003).

Keystroke identification a behaviourable biometric device, it steps the make applied and the design used to drive keys on the computer keyboard (Chandra & Calderon, 2003).

I will be utilizing the iris biometric system because:

Iris reputation technology is relatively easy to use and can process large numbers of men and women quickly.

The iris is the most unique identifier on the human body.

It is the most dependable form of biometrics. Iris habits are unique and stable, even over an extended period of time.

Furthermore, iris scanning and acknowledgement systems are extremely user-friendly.

Less intrusive than retina check out, higher matching performance, works well with glasses, across ethnic teams.

Biometrics technology analyses and options certain natural characteristics of a person to make unique identifiers that may be electronically stored and retrieved for positive id.

Biometrics is difficult to steal and directly linked with only one user. Furthermore, they cannot be forgotten or misplaced and, like knowledge, they are simply innate to an individual. The nontransferability feature (except with substitution surgery) provides entities that deploy biometrics a distinctive advantage in building end user confidence and rely upon identification and authentication services (Chandra & Calderon, 2003).

The process begins with customer enrollment, that involves verification of a person's individuality by using exogenous identifiers (such as guide characters, notarized documents, career records, photographs, and certificates), recording the individuals biometrics, and then developing a biometric template for this customer. The template is a numerical code which has the distinguishing features of an individual's biometrics. The template is referenced against an identifier (e. g. , a name, PIN, security password, token, etc. ) and stored either in a repository or on a portable medium such as a "smart greeting card. " The enrollment process and template quality are critical in obtaining great results during the verification process. However, efficiency of the enrollment and subsequent verification operations can be threatened by several factors, including consumer awareness, popularity, and rely upon the system (Nichols, 2000).

So I'll replace the monitoring system (timesheets) with an iris biometric system device that may verify the id of the staff, and the duration of his existence at work, it will be integrated with the payroll system so the employee's information of your energy sheet can be electronically modified in the payroll system. To eliminate buddy punching and unauthorized employee's and "ghost employees" existing in the payroll system.

Example of a time sheet

I believe that the efficiency of the task will improve when the system is introduced. The company will have exact records of employees' working time and can maintain its employee's budget better as a result.

Thieves can steal a debit card, or pilfer a personal identification quantity, but counterfeiting a face or a finger is a lot more difficult, if not impossible. For that reason, proponents of biometrics-methods that rely on a distinctive physical characteristic to recognize individuals-contend that the fight against fraudulence some day will swing toward their technology (1998).

Information from the systems can be utilized to measure the employee attendance for the computation of salary in the payroll system. The machine can also help in determining when to lock certain building entrances for security reasons. More and more companies are enthusiastic about some type of access device as prices decline.

Translations powered by LEC. LEC

The worker must log in and out using the iris check out, so it reports enough time duration of the employee for that day and the lunchtime the worker took is documented, in case of leave the worker must log in for leave so the system can record and catch this.

Such systems can reduce payroll costs related to time and attendance fraud and prevent unauthorized manager over rides.

More than 7 000 students trust us to do their work
90% of customers place more than 5 orders with us
Special price $5 /page
Check the price
for your assignment