THE PROBLEM AND ITS BACKGROUND
This chapter presents the introduction, background of the study, theoretical framework, conceptual framework, statement of the problem, scope and limitation, significance of the study, and definition of terms of the proposed study. Introduction
The emerging technology of today’s generation brought up the advancement of processes in people’s lives. Information technology (I.T.) is a more specific term that stresses the role of unified communication and the integration of telecommunication and computers (Murray, 2011). Specifically, computer is a general purpose device that can be programmed to carry out a finite set of arithmetic and logical operations. It lessens the tedious tasks carried out in manual based operations in the society. However, providing efficient security is still considered as one of the arising difficulties in information technology.
Security plays a vital role in one’s daily lives and as forms of protection are structure and process that provide or improve security as a condition, it is present in all aspects of life. At present, one of the devices used in maintaining a strict security especially in attendance monitoring and payroll generation is the biometric technology or simply biometrics.
Biometrics (MSU, 2012) refers to the automatic identification of a person based on his/her multiple scientific fields. One of which is his anatomical (e.g. fingerprint, iris) characteristics of traits. A biometric system made use of a fingerprint scanner, a sensor that employs the user to be present to enroll in the system so that his biometric template or reference can be captured. This template is securely stored in a central database or smart card issued to the user. The template is used for matching when an individual needs to be identified. Depending on the context, a biometric system can operate either in verification (authentication) or an identification mode. Thus, the identification mode of...