Preview

Criminology in the Future

Good Essays
Open Document
Open Document
590 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Criminology in the Future
Criminology in the Future
Everyone wanted security in life. Whether faced with threat or danger, people could use protection in any given situation. New technologies created to ease the worries of an individual. An example was biometrics. The tools refer to automatic identification or verification of living persons using his or her enduring physical or behavioral characteristics (Johnson, p. 92, 2004). Examples of applications were fingerprints and facial traits.
Many countries like the United States used the method to identify any individuals who entered the territory. Workers alerted if the person had any criminal records or are subject to a deportation. United Arab Emirate (UAE) has the world biggest iris recognition system (University of Phoenix, 2012). Anyone who entered the country had scanned his or her one side of the eye to the camera. The test may be for work related or the country’s protection from terrorist. The program prevented 54,000 people to re-enter UAE (University of Phoenix, 2012).
In exchange to the protection society yearns, civil rights were violated. “Biometrics is an area in which having mechanisms for making decisions that respect human rights is especially important (Johnson, p.92, 2004).” The privacy of a person was taken away once scanned by the machine to collect data. The accuracy of equipment may be questioned. “Ideally, biometric systems would always provide probability of verification of 100% with a false accept rate of 0% (NSTC, 2006).” Criminals who stole an identity of a different person can ruin the reputation the victim. Once the record indicated the criminal act of the person’s name, authorities can monitor the movement of an accused individual. The privacy of the victim violated because of the false verification of biometric system. “ A database with biometric data presents a natural target for theft, malicious, and fraudulent use (Johnson, p. 90, 2004).”
Another example violation of privacy right was given in the



References: Biometrics Testing and Statistics. (2006). Retrieved from http://www.biometrics.gov/documents/biotestingandstats.pdf Johnson, M. L. (2004). Biometric and Threat to Civil Liberties. The Profession, 37(4), 90-92. What is Biometrics. (2012). Retrieved from http://digital.films.com/play/VUC4L3#

You May Also Find These Documents Helpful

  • Better Essays

    Kudler Fine Foods

    • 1110 Words
    • 5 Pages

    References: Ex-Sight.Com. (n.d.). What is "Biometrics", and What Kind of Convenience and Security Can it Offer Us. Retrieved March 18, 2012, from Ex-Sight. Com: www.ex-sight.com/biometric.htm…

    • 1110 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The use of biometric data has created some security concerns. Biometric data is an array of information stemming from minimally non-invasive such as a fingerprint or iris scan to invasive such as a blood sample, taken to collect DNA. This data is not only very personal, but a single biometric can obtain a subjects biographical data, such as name, address, social security number, telephone number, e-mail address, booking and/or border crossing photos, gender, race, date of birth, immigration status, length of time in the United States and unique identifying numbers (i.e. driver’s license number). If one were willing to give their data to be used by the government, they want to ensure their information is protected. How can you convince someone that their information is secure and unable to become compromised? The most efficient way to protect biometric data from unauthorized users is encryption.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    Home and occupational users alike are using biometric security. Through a biometric element, such as a fingerprint, devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    A. Main Idea: Biometric technology has been traced back to the 14 century in China and through the 19 century developing more uniquely .…

    • 958 Words
    • 4 Pages
    Good Essays
  • Good Essays

    1984 Pros And Cons Essay

    • 631 Words
    • 3 Pages

    Since 9/11 and other tragedies such as the Boston Marathon bombing surveillance in many ways has increased significantly. One of the most significant ways is through the use and implementation of high-tech security systems, "As the volume and quality of cameras and sensors increases, cities are turning to more advanced face and object recognition software to make sense of the data"(CNN2). One of…

    • 631 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Technology affects our life daily, and it also affects the criminal justice system, especially in communication. The criminal justice system has different databases do to technology, and these databases operate faster than it would take humans could do. So, the biometrics technologies can measure and analyze the human body characteristics such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. (Rouse, 2015) The Biometrics is another word for the specialized database it has been around for hundreds of years and provided through the new technology over the years. The Biometric history back dates to 1858 when the first systematic capture of hand images for identification purpose was record. In 1992, the United States established the Biometric Consortium and in 2003 the formal U.S. Government coordination of Biometric activities began. Then in 2005 the Iris on the Move was announced at the Biometric Consortium Conference. Throughout the years many different changes and developments occurred.…

    • 1728 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Criminology

    • 275 Words
    • 2 Pages

    1) What are the differences between quantitative and qualitative methods in the social sciences? What are the advantages and disadvantages of each method?…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Criminology

    • 586 Words
    • 3 Pages

    -Differential Association: Criminal behavior results from having more contact w/ individuals holding aattitudes favorable to crime than w/ those holding attitudes discouraging it.…

    • 586 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Criminology

    • 1251 Words
    • 4 Pages

    Carceral tours allow the public to walk through the halls of prison to obtain an understanding of incarceration. Carceral tours had numerous uses for architects, inspectors and officials throughout the nineteenth century, but recently the tours are used as an observational research opportunity for social science students who are interested in learning about the carceral institutions.i The articles, “Problematizing Carceral Tours,” by Justin Piche and Kevin Walby and “In Praise of the Carceral Tour: Learning from the Grendon Experience,” by David Wilson, Roy Spina and Joyce E. Canaan, had valid documentation for their arguments on opposing and supporting the effectiveness of carceral tours for research purposes.…

    • 1251 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    The new technologies of future policing provide a number of invaluable uses. Facial recognition would allow law enforcement to identify criminals in real time through facial recognition matched criminal databases, wanted posters,…

    • 673 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Criminology

    • 446 Words
    • 2 Pages

    Identify the Current Legislation, Guidelines, Policies and Procedures for Safeguarding the Welfare of Children and Young People, Including E-Safety.…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The current methods of fingerprinting that involve subjective comparison and matching of fingerprinting has led to disapproval of the method. Extensive testing has shown that the results of fingerprint testing are not valid (Schmalleger, 2011). Fingerprint matches are now being done by experts, those fingerprints that have been previously been examined to make identification of suspects were presented to the same experts in a different context and the results were different. Similarly, DNA evidence for identification of criminals has been marred by several problems. Surreptitious DNA collecting, presentation of partial DNA profiles, and fake DNA evidence; cast doubts on the DNA evidence presented in courts (Schmalleger, 2011).…

    • 593 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Criminology

    • 516 Words
    • 3 Pages

    One of the most significant problems in the world now is that of economic inequality, and the social problems it produces. And the most damaging impact may be in developed nations such as the U.S. and Canada. The U.S. in particular has the greatest gap in wealth among all developed nations, and the problem it is causing is becoming more apparent with each passing day. During the recession in the U.S., at least 6 million people have lost their jobs; 25 million are underemployed. Eight trillion dollars of middle class wealth has been destroyed in the housing collapse. One out of eight mortgage holders owe more money on their home than it is worth. Fifty million people live at the poverty level. One of out of 8 people is on food stamps. One out of 2 children will be on food stamps at some point in their lives.…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    The technology takes measurements of key features of the human body to store in storage within a database for later reviews. Each scan takes the relevant information and transmits the information to the police database. Law enforcement agencies refer to the data for any matches when conducting a background check. The communication between the databases and the officers conducting the scans are acceptable to error, if negligence occurs when inputting search parameters, the suspect could provide false information. Technology is an aid to human civilization not the replacement. Humans manage the technology so the database is not flawless. False information could be provided by an interviewee than positive identification becomes compromised (Police Technology, 2013). The new technology that appears to make the most impact in the criminal justice system would be facial recognition, and iris scan. The two types of technological advances can pinpoint where someone has been, and all relevant information pertaining to a possible suspect. Technology affects communication both in a positive and negative way. The negativity derives from human error opposed to a flaw in the systems data. Law enforcement officials welcome new technology in efforts to combat crime effectively crime. Law enforcement agencies relay upon technology to assist with questioning or…

    • 1199 Words
    • 5 Pages
    Better Essays