Toward a Biometric Security Layer in Accounting Systems

This paper discusses theoretical and practical issues related to the use of a biometric‐enabled security layer in accounting systems aimed at enhancing user authentication and reducing control risk. Originating in criminology, biometric technology has matured over the years with applications in diverse disciplines. However, its use in business and accounting is still in its infancy, and many issues about its role in information systems security are unresolved. The paper proposes an access decision framework that draws from the strategy and risk assessment literature to model processes where biometrics might be used to reduce control risk. Despite its potential strengths, biometric technology is not a panacea and represents one element in a portfolio of security mechanisms needed to protect information resources. The paper discusses challenges in implementing biometric technology and identifies avenues for future research.

[1]  Doug Mahar,et al.  Perceived acceptability of biometric security systems , 1995, Comput. Secur..

[2]  Steven Furnell,et al.  Authentication and Supervision: A Survey of User Attitudes , 2000, Comput. Secur..

[3]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[4]  Doug McPhie AICPA/CICA SYSTRUST™ Principles and Criteria , 2000, J. Inf. Syst..

[5]  Sharath Pankanti,et al.  On the similarity of identical twin fingerprints , 2002, Pattern Recognit..

[6]  Doug McPhie,et al.  Reporting on Systems Reliability , 1999 .

[7]  Anil K. Jain,et al.  On-line signature verification, , 2002, Pattern Recognit..

[8]  Stephen M. Matyas,et al.  A Biometric Standard for Information Management and Security , 2000, Comput. Secur..

[9]  S. Garfinkel,et al.  Web security & commerce , 1997 .

[10]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[11]  Sue Newell,et al.  Managers′ Beliefs about Factors Affecting the Adoption of Technological Innovation , 1994 .

[12]  Gregory R. Ganger,et al.  Authentication confidences , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.