Consumer Behaviour and Neuromarketing (Assignment - 2) "A Review On Biometrics"
Consumer Behaviour and Neuromarketing (Assignment - 2) "A Review On Biometrics"
Consumer Behaviour and Neuromarketing (Assignment - 2) "A Review On Biometrics"
“A Review on Biometrics”
A report submitted towards the partial fulfilment of the course of Masters of Fashion Management
Submitted by:
Abhishek PP (MFM/19/960)
Submitted to:
Page | 2
CONTENT
S.No Title Page no
1 Introduction & history 5
2 Types of biometrics 7
3 Reliability of biometrics 9
4 Applications of biometrics 10
5 Application of biometrics in 14
marketing context
6 Privacy risks of using biometrics in 17
marketing context
7 How secure biometrics is? 19
Page | 3
Abstract
Neuromarketing uses brain research to gain a better understanding of consumer
behavior. It can provide insight into processes that we are unconsciously aware
of. That further lead our curiosity towards how to the implementation of
neuromarketing tool can provide fortunes to marketers and in the marketing
context.
Before getting to the usage of the neuromarketing tool, let me narrate a brief
history in marketing. Marketing was invented along with the advent of money.
Before the digital era, shop owners already displayed their products as appealing
as possible to increase sales. In the 80’s TV and radio, commercials appeared.
Later, researchers started conducting marketing research and developed
important theories and models. During the ’90s, the first interest in the brain for
marketing purposes arose. Ten years later, neuromarketing was born. The first
research on how the consumer’s brain works were presented. The term was
officially coined in 2002 by Professor Ale Smidts of Rotterdam University,
Netherlands.
There are many tools that are being widely used in neuromarketing. The most
prominent ones are eye-tracking pupillometry, eye tracking gaze, fMRI,
Electroencephalogram (EEG), Biometrics, Facial coding, and many more.
In this review paper, we’ll be in detail discussing about Biometrics.
Page | 4
1. Introduction & History
Biometrics, the term is derived from the Greek words “bio” (life) and “metrics”
(to measure). Biometrics are biological measurements — behavioral or physical
characteristics — that can be used to identify individuals digitally and to grant
access to their systems, devices, or data. Fingerprint mapping, facial recognition,
and retina scans are all forms of biometric technology, but these are just the most
recognized options. Researchers claim the shape of an ear, the way someone sits
and walks, unique body odors, the veins in one’s hands, and even facial contours
are unique identifiers. The reason is physical characteristics are relatively fixed
and individualized — even in the case of twins — they are being used to replace
or at least strengthen password systems for computers, phones, and restricted
access rooms and buildings. Examples of biometric identifiers are fingerprints,
facial patterns, voice, or typing modulation. Each of these identifiers is considered
unique to the individual, and they may be used in combination to ensure greater
accuracy of identification.
“Biometrics is the most relevant means of identifying and authenticating
individuals in a reliable and fast way through the use of unique biological
characteristics.”
Page | 5
While the earliest accounts of biometrics can be dated as far back as 500BC in the
Babylonian empire, the first record of a biometric identification system was in the
1800s, Paris, France. Alphonse Bertillon developed a method of specific body
measurements for the classification and comparison of criminals, known as
bertillonage. It is a form of anthropometry, a system by which measurements of
the body are taken for classification and comparison purposes. This required
numerous and precise measurements of the bony parts of a human’s anatomy for
identification. While this system was far from perfect, it got the ball rolling on
using unique biological characteristics to authenticate identity.
The firsthand geometry recognition systems became commercially available in the
early 1970s.
• The French police in Paris started to initiate the same process in 1888
with its Forensic Identification Unit (mug shot and anthropometry). Four
prints were instituted in 1894 and ten prints were added in 1904.
• In the U.K., the Metropolitan Police started the use of biometrics in
1901.
• In the U.S., The New York police in 1902 and by the FBI in 1924.
Page | 6
2. Types of Biometrics
Page | 7
3) Hand: This identifies users by the shape of their hands, palm veins and
remains the preferred technology for high-security applications.
4) Iris: Iris scanning biometrics measure the unique patterns in the colored
circle of your eye to verify and authenticate your identity. It is the process
of using visible and near-infrared light that will illuminate the complex
blood vessels in a person’s eye, making them more visible than the
surrounding tissue. Just like fingerprints, no two persons will ever have the
same retinal pattern.
5) DNA: As DNA itself is remarkably unique for each single person, it is a useful
biometric, and is used most often in forensics and healthcare and are also
used primarily in law enforcement to identify suspects.
2. Behavioral: This consists of voice recognition, signature dynamics (speed of
movement of pen, gesture trails, accelerations, pressure exerted, inclination),
keystroke dynamics, the way we use objects, gait, the sound of steps, gestures,
etc.
This is further sub-divided into:
1) Keystroke: Every individual has a different typing style. (Example: The speed
at which they type, the length of time it takes to go from one letter to
another, the degree of pressure on the keyboard, gesture trails, spell check
etc.)
2) Signature: It can be operated in 2 ways;
Static: In this mode, users write their signature on paper, digitize it through
an optical scanner or a camera, and the biometric system recognizes the
signature by analyzing its shape.
Dynamic: In this mode, users write their signature in a digitizing tablet,
which acquires the signature in real time by means of stylus or finger.
(Used by Amazon.com during the product delivery)
3) Voice: Voice-based digital assistants and telephone-based service portals are
already using voice recognition to identify users and authenticate customers.
According to Spiceworks, 2 percent of companies use voice recognition for
authentication within the enterprise. Adobe released survey data in July
2019 and found that 48% of consumers are using voice for “general web
searches.’
Page | 8
3. Reliability of Biometrics
Authentication credentials such as fingerprint scans or voice recordings can leak
from devices, from company servers or from the software that is used to analyze
them. A facial recognition system might not recognize a user wearing makeup or
glasses, or one who is sick or tired. Voices also vary, people sound different when
they first wake up, when they try to use their phone in a crowded public setting or
when they're angry or impatient. Recognition systems can be fooled with masks,
photos and voice recordings, with copies of fingerprints, or tricked by trusted
family members or housemates when the legitimate user is asleep.
Solution?
Continuous improvement in the biometrics sector will be key to ensuring optimal
security and reliability – and recently there has been some biometrics
advancements. The vein biometrics is set to boom in the coming years and the
growth is currently being led by the banking, financial services and insurance
industries. It is predicted that the market for vein recognition biometrics is
expected to generate $1bn by 2029.
(For example, Hitachi recently developed a new finger vein recognition technology,
using the vein patterns in fingers as an authenticator. With a simple hand gesture
to a laptop webcam or a mobile phone camera, the technology enables fast and
secure user identification without the requirement of additional hardware. In
addition, finger veins are non-replicable and cannot be lost or stolen.)
Page | 9
4. Applications of Biometrics
1) Law enforcement and public security (criminal/suspect identification):
Biometrics in this application can include criminal ID solutions such as
Automated Fingerprint Identification Systems (AFIS). They store, search and
retrieve, fingerprint images, and subject records. Automated Biometric
Identification Systems (ABIS) which can create and store biometric
information that matches templates for face, finger, and iris. Live face
recognition for public security - the ability to perform face identification in a
crowd in real-time or post-event in cities, airports, at borders, stadiums or
places of worship. This application is used in many countries.
Contact tracing and biometric data have helped reduce the COVID-19
infection rate in U.S. Army Garrison Humphreys, which is reporting a total
infection rate of less than 1%. As of March 8, U.S. Army Garrison
Humphreys Commander Col. Michael F. Tremblay put together a task force
team of eight people to implement COVID-19 prevention and response
measures. - Contact tracing begin as soon as an individual is tested positive.
Not only the person is interviewed on movement history, but also on the
information to be checked for accuracy with surveillance footage and
Page | 10
Defense Biometric Identification System data. If the contaminated person
interacts with others, then they are also monitored and even quarantined
to contain the spread.
Intelligent Fingerprinting Ltd, a biometrics firm in England deployed a
portable fingerprint-reading technology could be used to diagnose
COVID-19 in 10 minutes. This collect and read chemicals in finger sweat.
Page | 11
Increased patience and employee safety:
Certain areas are restricted to both the patients and employees, and are
only accessible for privileged health personnel. How this works?
Biometrics will access only to those users with the particular permissions.
Therefore, sensitive information/equipment is only available to specific
individuals. Wind blowing the chances of malpractices.
Patient fraud:
Biometric authentication could shape the industry by eliminating any
possibilities of individuals attempting to pose as other patients for access to
treatments and medication. Therefore, the right individuals will receive the
proper care and treatment.
In the mobile world, smartphones now usually include fingerprint and facial
recognition features. The iPhone 5 was first to introduce fingerprint
recognition in 2013 (with TOUCH ID), and facial recognition became trendy
with the iPhone X introduced in November 2017 (with FACE ID).
Page | 12
According to Counterpoint, more than 1B smartphones with fingerprint
sensors were shipped in 2018, and those 1B smartphones will come with
face unlock solution in 2020.
Page | 13
5. Application of Biometrics on
Marketing Context
In the modern digital world, human attention towards conventional
marketing is shrinking, making marketing more difficult.
I. Eye tracking: With eye tracking technology, the businesses get to see
their website through the eyes of their audience. This allows them to
measure its visual impact and make improvements where necessary.
That being said, when a potential customer visits your website, where
do they look? Which areas catch their visual attention and which
elements do they ignore? Eye tracking technology measures optical
movement and visual attention to give us the answers to these
Page | 14
questions. Ultimately, this gives you the chance to identify key areas
of interest on your website, as well as areas with room for
improvement.
How it’s done?
• Heatmaps showing attention distribution
• Fixation & gaze points
• Areas of interest (AOI)
• Time spent
• Fixation sequences
Page | 15
IV. Taking the Customer’s Pulse: Lets review this down by taking in the
examples for the tech giants.
Google focus on facial recognition; trying to read our expressions to
judge how we are interacting with the content we’re consuming. This
may sound terrifying as it does interesting, but if we put aside the
question of whether people will want to share this information with
marketers, the potential for getting detailed feedback is huge.
Apple watch and Fit Bit (activity trackers) will help track your daily
activity in different ways. Imagine how useful it would be as an
advertiser to track the heart rate of someone watching one of their
ads.
(Example: apps like MyFitnessPal could, when you are on a low-calorie
diet, coordinate with your fitness tracking application and then feed
that information to advertisers so they can only show your health
options for food or activities).
Page | 16
6. Privacy risks of using
biometrics in marketing
context
What are the most prominent concerns you hear about the ethics of these
techniques?
The neuroscience research on its own isn’t the problem here, but companies
do need to consider the particular context whenever they start making
inferences about their customers. Because regardless of the research method
used (neuroscience, data mining based on purchase history, surveys),
consumers may perceive a violation of their right to privacy—particularly
when it seems that a company somehow knows more about them and what
they want to buy than they know themselves.
Consumers tend to be most concerned about their privacy. As customers, we
typically accept that our purchase behavior is public—at least in the sense
that it’s known to the company we’re buying from—but we think of our
brains and our thoughts as private. Consumers sometimes see companies that
use these methods as breaking an implicit promise not to invade their private
thoughts and feelings.
“There’s knowing what’s in my brain, and then there’s using that knowledge
to make me act differently—to buy more stuff.”
A lot of the concern about neuro marketing is based on a perceived
exaggeration of its power versus that of other kinds of marketing. All
marketing is about influencing people—of course you want to induce them to
buy your product instead of another product. But when neuroscience enters
the picture, people worry that they’re not just influenced, they’re forced to
do certain things. And though the influence of these techniques will grow as
they improve, forcing people to do things is just not on the horizon.
Page | 17
Take an example from the world of politics: In 2015 one of the main political
parties in Mexico used biometrics to learn more about voters’ interests, which
was seen by the Mexican citizenry as a government agency trying to read
their minds. The leader eventually had to promise that his party would revert
to more “old-fashioned” methods.
Here’s another example of forced buying: Neuro research has shown that
women are more drawn to purchasing “sexy” clothing and status symbols
such as cars and diamonds at specific points in their menstrual cycles. A
company could apply this finding to target women with ads when they are
most susceptible to temptation to buy the advertised product.
Page | 18
7. How secure biometrics is?
First, most consumers don’t have their brains scanned or give hormone
samples to researchers. What neuromarketers know about the thoughts of
consumers is based on what we can extrapolate from the small number of
people we do test in a research setting. A prediction about what all the other
consumers are thinking in a given situation is just an educated guess—we
don’t have access to their hormone levels, brain activation patterns, and so
on. Thus, there is no potential for a direct privacy violation for the average
consumer: Your thoughts are your own.
Furthermore, in well-directed studies, the few people who are subjects give
their overt, informed consent and agree that the data gathered in the study
can be used in specific ways. With such protection in place, this kind of data
gathering is really no different ethically from participating in a focus group,
because the participants are choosing to participate and are informed about
any potential risks and about how their data may be used.
“Brain scans in a controlled environment aren’t the “real world.”
A big disadvantage of fMRI is that it doesn’t give you “live” images.
Consumers might behave differently in the real world, unlike in a controlled
environment. Researchers might end up with a response bias—subjects are
aware that they’re being analyzed, which may affect their behavior.
Also, inside the lab, many variables are controlled; in the real world, we can’t
control those same variables—or the resulting behavior. Lab-derived
conclusions may not hold up elsewhere, especially when experiments rely on
small sample sizes.
Where risk & privacy questions arise?
Given here a hypothetical example with research based on drinking bottles.
People with a high BMI prefer a thin-shaped bottle, even if this drink is higher
in price. This would imply that soda manufacturers could sell more when
offering their drinks in thin-shaped bottles. Is this ethically acceptable? You
are not forcing anyone to buy your product. However, you are influencing
Page | 19
people –who already have an unhealthy BMI– in the direction of consuming
even more unhealthy products. This is an example of where some ethical
questions may arise. How far should you go with influencing vulnerable
people in an unhealthy direction? What if your influence is bad for the
environment? Or if you make people unhappy?
At the same time, this information could be used to support healthy
behavior. By offering healthy drinks in thinly shaped bottles, you could
increase the sale to people with an unhealthy BMI. Again, it’s not what
neuromarketing tells us, but what people do with this information.
Explaining further with two Ethical and Unethical cases:
UNETHICAL CASES.
1. Political campaigns:
There’s a big chance neuromarketing is used to shape the campaigns of
politicians. Like products, politicians will present themselves in the most
favorable way to get votes. During the US election of 2004, one study looked
at brain activity and political judgment. More recent research focuses on the
appearance of political candidates. If people look at a losing candidate, they
show more activity in the insula (a specific brain area associated with pain).
The researchers concluded that negative attributions play a critical role in the
elections. Furthermore, considerable neuroimaging work is done on the
perception of human faces. Researchers investigated facial symmetry, skin
color and attractiveness related to brain activity. Even though this research
might seem innocent now, it could have a major impact on the future. What
if important, corrupt politicians know what kind of picture will lead to the
most votes? Or how to shape a speech that will prime voters so strong they
will win the election no matter what? This is an example of a case where
neuromarketing might lead to unethical consequences.
2. Obese people
Research shows that people with a high BMI are prone to be more vulnerable
to visual aspects of a product. Because they make impulsive decisions, labels
or text will influence them more effectively. Due to the existence of fast
food, sugars and processed food, the group of overweight is growing.
Page | 20
According to the World Health Organization, 39% of the adults worldwide are
obese. This means a huge amount of people is easily being influenced in the
supermarket. A 2011 study shows that brains from obese people respond
differently to nutrition labels. When given an identical milkshake, they show
more brain activity in reward areas if the label reads ‘regular’ compared to
‘low-fat’. This evidence shows that consumers will behave differently
depending on the label or design of a product. Will obese people also
respond differently to color? An image, or touch? If marketers gain insight
into these findings, they might design and offer their unhealthy products in
such a way, that the vulnerable obese group will be more likely persuaded to
buy them.
ETHICAL CASES.
1. Anti –smoking messages
If you have travelled the world, you may have noticed the difference in
messages on cigarette or tobacco packaging. Here in the Netherlands, we see
shocking images of physical damage caused by smoking. In Australia, a
personal story about a man named Bryan is described. Bryan died six weeks
after starting smoking. Indonesia’s messages are almost comical: a smoking
man with a careless attitude and some skulls on the background is shown.
Although there are big differences, the goal of these messages is the same.
They need to inform smokers of the effect of smoking and support quitting.
The fact that there is so much variety in communication shows that we do
not agree on which message is the most effective.
Give step-by-step information to change behaviour
Despite the variety, there is a large group of countries that use scary images
and see a positive effect on changing behaviour. This effect is especially
present whenever the fear that the images create is taken away. Cialdini
describes that this happens because people often deny they will encounter
the dangers of smoking. However, when you give them step-by-step
information on how to change their bad habit, they face their fear and take
action.
Page | 21
Revealing important information
Knowing this, neuromarketing could add important insights about the brain
to improve campaigns even more. Neuroscience has already been active in
anti-smoking campaigns. In 2011, a study by Berkman and colleagues looked
at brain scans to predict what message would most likely get people to call a
quit-smoking line. They concluded that when looking at brain activity, they
could make better predictions about the effects of anti-smoke messages
compared to traditional surveys. This shows that people often give answers
to surveys that are not completely ‘true’ or reliable. Neuromarketing can
reveal this important information and complement existing marketing tools.
This can help in restricting unhealthy behaviour like smoking.
2. Charity donations
Another ethical practice of neuromarketing is to use it for charities. We often
see charity advertisements on television showing ill and starving children in
Africa that should persuade us to donate. However, does this make us
donate (more)? A recent study by Schlosser & Levy (2016) shows that we are
more willing to donate whenever we view ourselves as being better off than
someone else. This phenomenon is called downward comparison and is most
effective whenever a charity highlights the benefits of the donations for
others. This means that an advertisement that shows happy children who
are—due to the donation—able to go to school will be more effective in
raising donations. When looking at the brain, neuroscientists found that the
striatum is activated while donating and experiencing feelings of reward. This
means that donating or being kind to others results in more happiness for
the donator too. A win-win situation if you ask us!
Page | 22
8. Pros & Cons of Biometrics
I. Pros of biometrics:
1. Biometrics is extremely hard to fake. A biometric property such as a
fingerprint or an eye scanner is unique by definition for each individual.
2. It also provides an increase of convenience. Following all the best practices,
makes the passwords strong but at the same time makes it complex.
Changing it frequently for security reasons can cause some inconvenience
in terms of remembering and creating a new complex password every time.
3. Biometrics are stable and enduring, which means it changes very little over
the course of one’s life and can identify a person in spite of little variation
over time.
4. Biometrics provides strong authentication and accountability, which
someone cannot later renounce or reprobate having taken an action.
5. Using dynamic or behavioral biometric measure, advantage of two-factor
authentication can be taken
6. Easiness of use is another major advantage over password-based
authentication. People in general find fingerprint, retina and voice scanning
an easy option for authentication that too with minimal training (if
required).
7. The biometric servers usually require very less database memory, as the
templates use small storage.
8. Other advantages include safety as biometrics are non-transferable like
passwords and less time consuming. Average identification time for an
identity is 5 seconds. Also, the biometric attribute of an individual can only
be lost in case of major mishaps.
Page | 24
9. Recent Advancements in
the Biometrics
1. Biometric and AI-based Security Systems - With the growing
predominance of biometrics in security and surveillance applications
around the globe and advances in Artificial Intelligence (AI) along with
machine learning, AI-powered biometrics has begun crystallizing in 2019.
The US Govt. already started making utilization of AI cameras & biometric
systems for border control security to track those who are crossing
boundaries without legal documents. Let’s see how AI & biometrics change
the face of fintech, automotive, law enforcement, education, & healthcare
sectors across the globe in the upcoming year.
Page | 25
behavioral biometrics, such as keystroke, swipe and mouse action tracking,
the company said. In November 2017, Crossmatch announced its
partnership with BehavioSec , a Sweden-based behavioral biometrics
company, which powers the behavioral biometric analyses functions of
DigitalPersona.
Page | 26
Google went one better with FaceNet. On the widely used Labeled Faces in
the Wild (LFW) dataset, FaceNet achieved a new record accuracy of 99.63%
(0.9963 ± 0.0009).
At the end of May 2018, the US Homeland Security Science and Technology
Directorate published the results of sponsored tests at the Maryland Test
Facility (MdTF) done in March. These real-life tests measured the
performance of 12 face recognition systems in a corridor measuring 2 m by
2.5 m.
Page | 27
The novel in-display fingerprint detection feature in modern smartphones
utilizes the cutting-edge ultrasonic fingerprint sensors to provide ultimate
speed and convenience to users. The technology is built into Samsung’s
flagship Galaxy S10 and Galaxy S10 Plus.
In December 2018, Qualcomm announced its 3D ultrasonic in-display
fingerprint sensor. This technology is enabled in devices using the
company’s Snapdragon 855 platform as an option if the manufacturer
wants to include the extra hardware.
The dress, modelled by celebrity Archie Panjabi, uses white fabric with
integrated lighting that covers the entire dress. The lighting uses AI
technology to make the colors and patterns made by the lighting change
depending on the mood of the person who is interacting with the wearer
of the gown. This uses Watson’s tone and emotion gaging software which
mixes with Gupta’s dress structure that brings to mind modern
architecture. The dress was the first of its kind in India.
Page | 28
10. How fashion industry use
biometrics in marketing
context
• FASHION SOLUTIONS STORE by IBM
IBM has also partnered with Italian luxury brands like Armani and Prada to
mesh luxury fashion retail with cutting-edge marketing technology. On the
outskirts of Milan, I.B.M. is working on a way to mesh retail and technology
that, if successful, will produce a new market for its technology and place
biometrics — automated ways of recognizing humans based on physical or
behavioral traits — in the forefront of retail marketing.
The I.B.M. solution, at this point, involves tracking biometrics through a mini
camera in a mannequin’s eye or placed somewhere in a store.
“We started with fashion because it is a creative and innovative industry, but
it’s clear that people have to be educated so they know their privacy will not be
compromised,” said Enrico Bozzi, the manager of I.B.M. Forum Milano, the
department that developed the technology. “It is a question of changing
people’s perception.”
At the pilot in a Milan fashion store, for example, the client noticed that
almost all Asian customers enter the store through one particular door, even
though five are available.
“We thought it was a mistake, but we checked it out and it was right and it
continues to happen,” Mr. Bozzi said. “We don’t know why yet but, in the
meantime, the store is considering positioning products by that door that are
known to appeal particularly to Asian shoppers.”
Once shoppers can be tracked, the next step could be advertisements selected
to match biometric triggers: A customer walks into a shop and a piped-in voice
Page | 29
asks if the jacket she bought last time has been satisfactory and would she like
to see something similar from a new line.
In a variation that might be appealing to cash-strapped designers, viewers can
watch a virtual fashion show, and then drag and drop clothing and accessories
onto models to style their own shows. The experience can be supplemented
with material like designers’ biographical data and lookbooks of previous
collections. And all the information can be forwarded wirelessly to a mobile
phone or computer, with an iPad application likely to debut soon.
Page | 30
11. Conclusion
Given in this discussion, developing an accurate and targeted marketing
strategy for consumers is the use of biometric technology. To unambiguously
associate a particular consumer with his/her profile, irrespective of the
number of individuals that share the same computing devices or login
credentials. This is promising, since due to security concerns and more
affordable cost levels, computer systems equipped with biometric devices,
such as a mouse equipped with a fingerprint scanner, will become more
common in the near future.
Harnessing the power of biometric technology in online marketing applications
will help marketers narrow the gap between what a consumer wants and what
their companies determine their consumers need. Improved marketing
strategies translate into further satisfied consumers and more effective and
responsive companies. While certain privacy issues associated with storing and
extracting an individual's biometric characteristics must be overcome, as trust
evolves with biometrics, the use of the technology will follow a path similar to
that of online transactions in recent years. The result of this application of
biometric technology. Biometric Marketing has the capability of becoming the
most common approach for marketers to target consumers with
advertisements that produce the greatest benefits for both their companies
and their consumers.
Page | 31
References
AI in Biometrics and Security – Current Business Applications. (2019, May 20).
Retrieved from Emerj: https://emerj.com/ai-sector-overviews/ai-in-
biometrics-current-business-applications/
Biometric authentication: The importance of transparency and trust. (2020, April
7). Retrieved from ITProPortal:
https://www.itproportal.com/features/biometric-authentication-the-
importance-of-transparency-and-trust/
Biometric Marketing and Social Media - Spectrum Group. (2018, February 9).
Retrieved from The Spectrum Group Online: https://online-sales-
marketing.com/biometric-marketing/
Biometrics Take on a New Style. (2011, February 23). Retrieved from The New
York Times: https://www.nytimes.com/2011/02/24/fashion/24iht-
ribm24.html
Biometrics Take on a New Style. (2011, Feb 23). Retrieved from The New York
Times: https://www.nytimes.com/2011/02/24/fashion/24iht-ribm24.html
Biometrics: authentication & identification (definition, trends, use cases, laws and
latest news) - 2020 review. (n.d.). Retrieved from Biometrics in 2020 (A
helpful illustrated overview):
https://www.thalesgroup.com/en/markets/digital-identity-and-
security/government/inspired/biometrics
Biometrics: authentication & identification (definition, trends, use cases, laws and
latest news) - 2020 review. (n.d.). Retrieved from Biometrics in 2020 (A
helpful illustrated overview):
https://www.thalesgroup.com/en/markets/digital-identity-and-
security/government/inspired/biometrics
Facial recognition: top 7 trends (tech, vendors, markets, use cases and latest
news). (n.d.). Retrieved from Facial recognition in 2020 (7 trends to watch):
https://www.thalesgroup.com/en/markets/digital-identity-and-
security/government/biometrics/facial-recognition
Page | 32
Gaurav Gupta steps into AI with IBM Watson. (n.d.). Retrieved from
FashionNetwork.com: https://in.fashionnetwork.com/news/gaurav-gupta-
steps-into-ai-with-ibm-watson,878650.html
Homeland Security. (n.d.). Retrieved from Biometrics - History:
https://www.globalsecurity.org/security/systems/biometrics-history.htm
How can biometrics benefit the healthcare industry? (2018, Dec 4). Retrieved from
ITProPortal: https://www.itproportal.com/features/how-can-biometrics-
benefit-the-healthcare-industry/
Rapid fingerprint test for drugs might detect COVID-19. (2020, May 4). Retrieved
from Biometric Update: https://www.biometricupdate.com/202005/rapid-
fingerprint-test-for-drugs-might-detect-covid-19
Top 8 Biometric Technology Innovations in 2019. (n.d.). Retrieved from Mantra
Softech India Pvt Ltd: https://blog.mantratec.com/top-biometric-
technology-innovations-2019
U.S. Army leverages biometrics and contact tracing to contain COVID-19 among
personnel. (2020, May 19). Retrieved from Biometric Update:
https://www.biometricupdate.com/202005/u-s-army-leverages-
biometrics-and-contact-tracing-to-contain-covid-19-among-personnel
Ultrasonic fingerprint scanners: how do they work? (2019, February 21). Retrieved
from Android Authority: https://www.androidauthority.com/how-do-
ultrasonic-fingerprint-scanners-work-666053/
What is Behavioral Biometrics? Everything you want to know. (2020, April 17).
Retrieved from Plurilock: https://www.plurilock.com/what-is-behavioral-
biometrics/#Chpt5
What is Biometrics? (2020, February 14). Retrieved from usa.kaspersky.com:
https://usa.kaspersky.com/resource-center/definitions/biometrics
Page | 33