{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:30Z","timestamp":1754157690732,"version":"3.41.2"},"reference-count":9,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2005,4,1]],"date-time":"2005-04-01T00:00:00Z","timestamp":1112313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005,4,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This paper aims to assist readers to develop a compelling business case, including quantifiable and non\u2010quantifiable costs and benefits, for the deployment of biometric technologies in information systems to enhance corporate security for access control, identification and verification applications.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The paper reviews the strengths and weaknesses of leading biometric technologies, while commenting on their practical applicability in real world implementations. In addition, the paper develops a process for ensuring that the best biometric applications are chosen, considering both the technology and related business issues.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The paper suggests that biometrics must be carefully selected to achieve a good fit to the security problem, giving examples of how a good fit might be evaluated by the user. The one\u2010time and recurring charges associated with the typical biometric implementation are evaluated, arguing that these costs must be offset by a formal risk evaluation. The paper presents a user's guide for sensible implementation evaluations. Finally, the paper emphasizes that the use of biometrics in systems security implementations is one tool among many, and must thus be viewed as only part of an overall information security management infrastructure.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>In order to select biometric technologies, buyers must choose solutions to business problems, solutions that demonstrate that the biometric makes sense from a cost\u2010benefit and business perspective. This paper, in a step\u2010by\u2010step manner, walks readers through the decision\u2010making process and assists them in making compelling business arguments for biometric applications.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09685220510589280","type":"journal-article","created":{"date-parts":[[2005,4,26]],"date-time":"2005-04-26T02:00:06Z","timestamp":1114480806000},"page":"89-105","source":"Crossref","is-referenced-by-count":10,"title":["The biometric technologies business case: a systematic approach"],"prefix":"10.1108","volume":"13","author":[{"suffix":"Jr","given":"Richard A.","family":"Riley","sequence":"first","affiliation":[]},{"given":"Virginia","family":"Franke Kleist","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012720274685800_b1","doi-asserted-by":"crossref","unstructured":"Ashbourn, J. (2000), Biometrics: Advanced Identity Verification: The Complete Guide, Springer\u2010Verlag, London.","DOI":"10.1007\/978-1-4471-0747-7"},{"key":"key2022012720274685800_b2","doi-asserted-by":"crossref","unstructured":"DeLone, W.H. and McLean, E.R. (1992), \u201cInformation systems success: the quest for the dependent variable\u201d, Information Systems Research, Vol. 3 No. 1, pp. 60\u201095.","DOI":"10.1287\/isre.3.1.60"},{"key":"key2022012720274685800_b4","doi-asserted-by":"crossref","unstructured":"Lucas, H.C. Jr (1999), Information Technology and the Productivity Paradox, Oxford University Press, New York, NY.","DOI":"10.1093\/oso\/9780195121599.001.0001"},{"key":"key2022012720274685800_b5","unstructured":"Most, M. (2003), \u201cInteractive workshop: developing a targeted biometrics market strategy\u201d, presented at the Biometrics Consortium Conference, Arlington, VA, September 22\u201024."},{"key":"key2022012720274685800_b6","unstructured":"Nanavati, S., Thieme, M. and Nanavati, R. (2002), Biometrics: Identity Verification in a Networked World, John Wiley & Sons, New York, NY."},{"key":"key2022012720274685800_b7","unstructured":"Reifer, D.J. (2001), Making the Software Business Case: Improvement by the Numbers, Pearson Education, London."},{"key":"key2022012720274685800_b8","doi-asserted-by":"crossref","unstructured":"Torbet, G.E., Marshall, I.M. and Jones, S. (1995), \u201cOne in the eye for plastic card fraud\u201d, International Journal of Retail & Distribution Management, Vol. 23 No. 5, pp. 3\u201010.","DOI":"10.1108\/09590559510089195"},{"key":"key2022012720274685800_b9","doi-asserted-by":"crossref","unstructured":"Weill, P. and Olson, M.H. (1989), \u201cManaging investment in information technology: mini case examples and implications\u201d, MIS Quarterly, March, pp. 3\u201017.","DOI":"10.2307\/248694"},{"key":"key2022012720274685800_frg1","unstructured":"Lester, R.K. (1998), The Productive Edge, W.W. Norton and Co., New York, NY."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220510589280","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220510589280\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220510589280\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:53Z","timestamp":1753402133000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/13\/2\/89-105\/183972"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,4,1]]},"references-count":9,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2005,4,1]]}},"alternative-id":["10.1108\/09685220510589280"],"URL":"https:\/\/doi.org\/10.1108\/09685220510589280","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2005,4,1]]}}}