New technologies are now being introduced into telecommunication systems. The increasing vulnerability of these systems, and enhancing securities of databases improved the security and reliability of databases. New technologies in iris technology recognition aims at being improved as a level of recognition technology, and has recently been introduced as a facilitated process of authentication.
At the same time, biometric recognition forms a strong bond between a person’s identity and a person’s biometric traits. These traits cannot be shared, cannot be lost, and cannot be duplicated. Biometric and iris recognition, is important in unauthorized access, protection, and information breaches. Although there are high costs to iris recognition, especially in allowances for the disabled, or who do not have irises, there is a potential for loss to secure information. In spite of the expenses, and the resources incurred, a database of private information is built. In doing so, the potential for loss of this information is high. And in respect to security, privacy and long-term storage with restricted access, physical security of this information is compromised.
I remember going to get lunch in college, and while standing in line, it was just habit to gaze at other students, or to gaze at their order. Other times you may see which group they were with for recognition, and sometimes, it was just to have something to do with your eyes. There really was no particular reason, or no logic; it was simply gazing about. I did happen to know some people paid with cash or credit card, and some paid with their “Louisiana Tech Express Card.” This card was actually a prepaid account the student would use on or off-campus to pay for goods and services. I don’t recall the exact year, but it was in the early 1990’s, Louisiana Tech University students and employees have used their Tech Express cards for on-campus services such as dining, textbooks and office supplies. A few years ago, the program moved throughout the city of Ruston, Louisiana. Since the cards were prepaid, the students, faculty and even the staff had the option to use their Tech Express campus debit and ID cards to pay for goods and services provided by a number of merchants in Ruston.
However, before then, I can remember standing food services in one of the lines, usually for me, it was Chick-fil-a, as I do love those wraps, waffle fries and a Diet Dr. Pepper. I would look around and those carrying sacks of something other than my chosen and think, “I could have gotten something different today!” Then again, there was no Johnny’s Pizza on campus, so “EAT MORE CHICKEN”, I did! I worked on campus at the time, and I would see others swipe their cards, and I would pull the cash from my pocket, and think about those days when my kids would be there, and how my oldest, bless her little heart, she barely gets out of the house with her clothes on, and keys in her hand. If she had to remember something like that to pay for lunch? She’d starve for certain. I can remember she was in town for a week working at a local attorney’s office. She came by every day for lunch. I thought to myself, “How lucky I am, my daughter wants to come eat lunch with me every day.” She was staying with a girlfriend of hers in town for that week. And, since she had forgotten to switch her money out of her purse, instead of making a big hassle and driving all the way back, to get the money from her other purse, she came to my office every day so we could have lunch every day, and I, of course, could pay for it.
I can’t complain, as I love my girls, and will take their company any way I can get it. Yet, I do worry about this behavior. Especially, when I read an article about such things as the program at (VCU), Virginia Commonwealth University, where the administrators say, “It’s all about convenience!” I guess it could be as my daughter would never leave her irises at home. However, I do have some concerns about security for my child, and others. I know there is a low risk of identity theft. I doubt she would leave them lying around on the bathroom sink, but it’s the system I do not feel as secure.
This is not a campus-wide effective plan, where all students will go to it. This will be for students who forget to bring their card with them when they come back from home over the holidays. Maybe a parent will drop that card in the mail, or bring it by their residence, and it will return to business-as-usual. It’s not that type of concern, it is the fact before you can have students place their iris up to the scanner, a system must be in effect. Basically, all students will scan their irises, in the event this happens to them, then this can help them.
In understanding biometric recognition, mapping these systems are important. First of all, biometrics involves algorithms. Just like when you type your identification code or password into your computer, this is a form of algorithm. The more sophisticated the algorithms, the more identifiable not only by the word or set of numbers or combination of characters used; there is also the understanding of identification by keystroke. Keystroke means application of the characters by pressure, length of time, and depth of application on the keypad, etc. No one will apply the same pattern of pressure as you; therefore, the accuracy of typed patterns confirmed with reproducible effects. For instance, if your password is BOSCO, then if you apply more pressure to the -B, the -S, and the -O, than to the other two letters in the sequence; the algorithm determined during the keystroke pattern, will be saved.
Biometric patterns for recognition, are saved with pressure points, such as when you place your eye in front of the sensor to have your iris read. Iris recognition uses mathematical pattern recognition. The irises of an individual’s eyes are so unique, that detection of a person’s identity are visible within the iris of an eye from computer vision, pattern recognition, statistical inference and optics. The iris is the colored ring around the pupil of every human being and like a snowflake, no two are the same. (Mudholkar, 2012) My concern for University systems and security are not foolproof. These things can get hacked as easy as anyone else. It’s just a matter of a few clicks, and the iris scanner copies the ring. I know there isn’t a huge iris scanner bank out there, but if there was ever a possibility for something financial related or otherwise; I would hate for this feature to be forfeited over something as miniscule now, as a cafeteria plan. “VCU’s director of campus services Stephen Barr says it’s as simple as a camera taking a picture of students’ eyes before entering the cafeteria. But John Whitehead of The Rutherford Institute says that’s an oversimplification and an intrusion of privacy.” (Kellogg, 2015) “None of this stuff is foolproof – it can be co-opted by hackers,” he maintains. “So this kind of information is going to be put out here online. One of the scary things is how somebody who’s unscrupulous may use this kind of material.” (Kellogg, 2015) Once considered is not only those who would use it, because of the devious mind; but those who would be unaware it was being used, as they felt they were being protected by these methods of sophisticated and mature extremes.
Our Two Cents:
Louisiana Tech University is one of those universities with a high host enrollment to International Students. Therefore, these are only some of the students who may not know they have a choice in what the government says. They may feel the university is compelling them to abide by the actions of the U.S. Government. Just because a student is of International descent, does not mean they are not of a Christian religion. There are also students, right here, who may not realize their own rights under the governmental powers that be. So what do we do to protect the students who feel they do this, or not do this, or they may or may not have a choice, or a voice? Benjamin Franklin once said, “The longer I live, the more convincing proofs I see of this truth, that God governs in the affairs of man; and if a sparrow cannot fall to the ground without His notice, is it probable that an empire can rise without His aid?
Romans 13:1-7~
Verses 1-2: “Let every person be subject to the governing authorities. For there is no authority except from God, and those that exist have been instituted by God. Therefore whoever resists the authorities resists what God has appointed, and those who resist will incur judgment” –
Romans reminds us as Christians, we should not be rebellious against our leaders. Nothing happens that God does not authorize. Politicians who are in power are there because God has allowed it. Godly people will have good leaders, whereas people who reject God will not. God’s judgment is felt on those who have rejected Him.
Verses 3-4: “For rulers are not a terror to good conduct, but to bad. Would you have no fear of the one who is in authority? Then do what is good, and you will receive his approval, for he is God’s servant for your good. But if you do wrong, be afraid, for he does not bear the sword in vain. For he is the servant of God, an avenger who carries out God’s wrath on the wrongdoer.”
God’s representatives in preventing ‘bad conduct’ or ‘wrong-doing is no longer fulfilling its God-given purpose and the Christian is no longer obligated to obey it under an evil government. Severe consequence ‘bears a sword’ and, as history has revealed, is often too quick to utilize it.
Verses 5-7: “Therefore one must be in subjection, not only to avoid God’s wrath but also for the sake of conscience. For because of this you also pay taxes, for the authorities are ministers of God, attending to this very thing. Pay to all what is owed to them: taxes to whom taxes are owed, revenue to whom revenue is owed, respect to whom respect is owed, honor to whom honor is owed.”
A good government should be God’s servant, dispensing His wrath and His judgments. The believer’s conscience, guided by the Holy Spirit, must be involved in any response to government. If it is a good government, we should obey it for God’s sake. If it is a bad government, and they attempt to force us to violate our conscience, we are obligated to do God’s will, as our allegiance must be to God.
1 Timothy 2 1-3~
Verses 1-3: “I urge, then, first of all, that petitions, prayers, intercession and thanksgiving be made for all people— 2 for kings and all those in authority, that we may live peaceful and quiet lives in all godliness and holiness. 3 This is good, and pleases God our Savior.”
It is very clear that God is sovereign over everything that happens to us. The Bible tells us that we are to pray for our leaders, knowing in our heart, our mind, our strength, and our soul- we should rely upon the spiritual power coming from the Heavenly Father; instead, we all too often fall short, and we rely on the supposed political power instead. Surely if we are asked to do anything, we should lean on the Lord. If what we are to do is in conflict with what we are taught by scripture of what God wants us to do, we are to obey God, rather than obey man. If we are ever asked to violate our conscience, we should sit in judgement of ourselves, not to violate our conscience, as our conscience is controlled by the Holy Spirit- we should do what God would have us do.
Too many times, we feel by going to the polls, and voting for the best candidate, we have done all we need to do. For some of us, that is true. Is it true for all of us, not necessarily so. You see the Lord has instilled in each of us, many gifts. Those gifts are not the same for each and every one of us. We all have something that stands out about us, much more so than others. Each one of us, even a politician, will have something which will seem to be promising in his or her life. It will stand out, and this will guide them in the direction they will follow. Believe it or not, as Christians we will win in some ways and lose in others, regardless of who America Chooses as President and where he/she stands on the issues we face in this country. We must remember to take each situation, and remember what it is about.
For instance, security for each and every student, regardless if this is pertaining to International students, who have come here to pursue an education; or if this is a United States citizen attending Louisiana Tech University in the same educational field. As a representative of the Christian faith, it is up to you, to see that each of God’s children is treated fairly. Whether that child was born in the USA, or born in Uganda, protection of their personal information is the same as protection of their person. I remember once hearing, “We are called to love God and love people. However, this notion of judging people we don’t know while at the same time “lovingly” praying for them is inconsistent with what it means to love.” I try to always remember that. If you have ever found yourself, seeing or not seeing a person for who they are, because of some reason or another, whether it is political views, political party, or whatever reason; remember, we are all a child of God. We all have the same rights. Most of all
Galatians 3:28~
There is neither Jew nor Greek, there is neither bond nor free, there is neither male nor female: for ye are all one in Christ Jesus.
Or~
There is neither Democrats nor Republican, there is neither Black nor White, there is neither Conservatives nor Liberals, there is neither Right nor Left, for we are all one- we are Christians.