Tecnologías Biométricas aplicadas a la seguridad en las organizaciones
Keywords:
Biometrics technology, Security, organizations, vulnerability, identification, verification storage.Abstract
The present study to treat on the Biometry and the applications in our environment. The Informatic biometry, in the present time is considerate a sciences more import ants, the ultimate existing applications and studies of investigation, but nevertheless even exist themes as security for to investigate. In the last years the demand of the biometrics systems to increase oneself owing a the reputation and security in the organizations of knowledge society is more and more vulnerability and that cause danger and quantity economics loss, so that in the others aspects of to be human. The security is one aspect vital of importance that the government as the organizations to have obligation to se corporative to realice each one in their environment the physical control of the persons what enter to into of the installations as also the informatics security. The present study is theoretical investigation thus same the evaluations of the applications at the security in the victuals organizations and the propose of the Model on the implementation of the personnel control in the Engineer Of Systems and Informatics Faculty, applications of the biometrics technology.Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2009 Luzmila Pró Concepción, Juan Carlos Gonzáles Suárez, Walter Contreras Flores, Carlos Enrique Yañez Duran
![Creative Commons License](http://i.creativecommons.org/l/by-nc-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
AUTHORS RETAIN THEIR RIGHTS:
a. Authors retain their trade mark rights and patent, and also on any process or procedure described in the article.
b. Authors retain their right to share, copy, distribute, perform and publicly communicate their article (eg, to place their article in an institutional repository or publish it in a book), with an acknowledgment of its initial publication in the Revista de investigación de Sistemas e Informática.
c. Authors retain theirs right to make a subsequent publication of their work, to use the article or any part thereof (eg a compilation of his papers, lecture notes, thesis, or a book), always indicating its initial publication in the Revista de investigación de Sistemas e Informática (the originator of the work, journal, volume, number and date).