SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
The role of biometric identification in the gig
economy
The gig economy is a market condition where freelancers and part-timers
are more in demand. Many companies today encourage gig workers. This
gives them more choice while reducing their expenses. For employees, it
gives them the freedom to choose their work as per their convenience.
It is estimated that gig workers could constitute half of the workforce by
2024 estimated Bahaa Abdul Hadi. Since gig workers are not part of the
organization, it creates many challenges. There is a risk of fraud with
impersonation and sharing of digital accounts being common problems.
The solution is to ensure effective verification of identity. Biometrics is the
best way to ensure this.
Using biometrics for identity verification
The identities of gig workers need to be verified before they are given
access to the company’s platform/workspace. When digital accounts are
issued, verifying the identity is a must. Failure to do so will lead to
unauthorized people gaining access. Similarly, periodic identity verification
can prevent impersonation and other such risks.
Here is how biometrics can help:
● Biometrics using fingerprint scanning or facial recognition is the best
and foolproof way of verifying identity. Images of the gig workers can
be captured and software can identify features from the photos. This
can then be compared at the time of accessing the account. Mobile
phones today have fingerprint scanners and facial recognition tools.
● An additional measure of security is to carry out a liveness check.
This helps to prevent spoofing where someone may use the photo of
a gig worker to pass the biometric identification. Software tools can
detect if the image being scanned is live or a still image.
● Gig workers working as cab drivers or delivery agents do not have
the time to use passwords for authentication or to access the
platform. Using biometrics is fast and convenient.
● A new technology known as passive biometrics has become popular.
It passively collects information about the worker to detect anomalies.
For eg: call centers record the employee’s voice and software can
detect changes.
● Behavioral biometrics is another technology that can be very helpful
in preventing fraud. A software that is behavioral biometrics enabled
can track the way a user types, movement of the mouse, preferences
for navigation, etc. This can be used to detect if there are any
anomalies in behavior of users. Whenever any anomaly is detected, a
liveness check can be carried out to confirm identity. This can help
prevent problems like sharing of accounts and impersonation.
Thank you for your interest in Bahaa Abdul Hadi blogs. For more
information, please stay tuned to www.bahaaabdulhadi.com

Mais conteúdo relacionado

Semelhante a The role of biometric identification in the gig economy.pdf

Trends in Biometric Identity Management.pdf
Trends in Biometric Identity Management.pdfTrends in Biometric Identity Management.pdf
Trends in Biometric Identity Management.pdfIdentity Herald
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfIDMERIT IDMERIT
 
Biometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdfBiometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdfMobibizIndia1
 
Mobile Banking Trends That Your Application Must Have In 2023.docx
Mobile Banking Trends That Your Application Must Have In 2023.docxMobile Banking Trends That Your Application Must Have In 2023.docx
Mobile Banking Trends That Your Application Must Have In 2023.docxCMARIX TechnoLabs
 
Enterprise Biometric Solution
Enterprise Biometric SolutionEnterprise Biometric Solution
Enterprise Biometric SolutionTanvir Ahmed
 
6 use cases of machine learning in Finance
6 use cases of machine learning in Finance 6 use cases of machine learning in Finance
6 use cases of machine learning in Finance Swathi Young
 
Facial Recognition Biometric Patterns
Facial Recognition Biometric PatternsFacial Recognition Biometric Patterns
Facial Recognition Biometric PatternsBahaa Abdulhadi
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfVLink Inc
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachJigisha Aryya
 
Biometric Analytics for Border Control..
Biometric Analytics for Border Control..Biometric Analytics for Border Control..
Biometric Analytics for Border Control..Bahaa Abdulhadi
 
The role of biometric identification in smart cities.pdf
The role of biometric identification in smart cities.pdfThe role of biometric identification in smart cities.pdf
The role of biometric identification in smart cities.pdfBahaa Abdulhadi
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 
Contactless attendance system in 2022
Contactless attendance system in 2022Contactless attendance system in 2022
Contactless attendance system in 2022nishiyath
 
Contactless attendance system in 2022
Contactless attendance system in 2022Contactless attendance system in 2022
Contactless attendance system in 2022nishiyath
 
A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...pradip patel
 
facial Recognization.pdf
facial Recognization.pdffacial Recognization.pdf
facial Recognization.pdfgulfam ali
 
Automobile comapanies and institutions can boost safety and security with Bio...
Automobile comapanies and institutions can boost safety and security with Bio...Automobile comapanies and institutions can boost safety and security with Bio...
Automobile comapanies and institutions can boost safety and security with Bio...Star Link Communication Pvt Ltd
 
Benefits of Digital Identity Verification - Bahaa Abdul Hadi.pdf
Benefits of Digital Identity Verification - Bahaa Abdul Hadi.pdfBenefits of Digital Identity Verification - Bahaa Abdul Hadi.pdf
Benefits of Digital Identity Verification - Bahaa Abdul Hadi.pdfBahaa Abdulhadi
 
Four ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsFour ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsManzurul Hassan Zumman
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 

Semelhante a The role of biometric identification in the gig economy.pdf (20)

Trends in Biometric Identity Management.pdf
Trends in Biometric Identity Management.pdfTrends in Biometric Identity Management.pdf
Trends in Biometric Identity Management.pdf
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
Biometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdfBiometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdf
 
Mobile Banking Trends That Your Application Must Have In 2023.docx
Mobile Banking Trends That Your Application Must Have In 2023.docxMobile Banking Trends That Your Application Must Have In 2023.docx
Mobile Banking Trends That Your Application Must Have In 2023.docx
 
Enterprise Biometric Solution
Enterprise Biometric SolutionEnterprise Biometric Solution
Enterprise Biometric Solution
 
6 use cases of machine learning in Finance
6 use cases of machine learning in Finance 6 use cases of machine learning in Finance
6 use cases of machine learning in Finance
 
Facial Recognition Biometric Patterns
Facial Recognition Biometric PatternsFacial Recognition Biometric Patterns
Facial Recognition Biometric Patterns
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
 
Biometric Analytics for Border Control..
Biometric Analytics for Border Control..Biometric Analytics for Border Control..
Biometric Analytics for Border Control..
 
The role of biometric identification in smart cities.pdf
The role of biometric identification in smart cities.pdfThe role of biometric identification in smart cities.pdf
The role of biometric identification in smart cities.pdf
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Contactless attendance system in 2022
Contactless attendance system in 2022Contactless attendance system in 2022
Contactless attendance system in 2022
 
Contactless attendance system in 2022
Contactless attendance system in 2022Contactless attendance system in 2022
Contactless attendance system in 2022
 
A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...
 
facial Recognization.pdf
facial Recognization.pdffacial Recognization.pdf
facial Recognization.pdf
 
Automobile comapanies and institutions can boost safety and security with Bio...
Automobile comapanies and institutions can boost safety and security with Bio...Automobile comapanies and institutions can boost safety and security with Bio...
Automobile comapanies and institutions can boost safety and security with Bio...
 
Benefits of Digital Identity Verification - Bahaa Abdul Hadi.pdf
Benefits of Digital Identity Verification - Bahaa Abdul Hadi.pdfBenefits of Digital Identity Verification - Bahaa Abdul Hadi.pdf
Benefits of Digital Identity Verification - Bahaa Abdul Hadi.pdf
 
Four ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsFour ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometrics
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 

Mais de Bahaa Abdulhadi

Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBahaa Abdulhadi
 
Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.Bahaa Abdulhadi
 
Biometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare DomainBiometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare DomainBahaa Abdulhadi
 
Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.Bahaa Abdulhadi
 
Biometric Analytics & Workplace Security
Biometric Analytics & Workplace SecurityBiometric Analytics & Workplace Security
Biometric Analytics & Workplace SecurityBahaa Abdulhadi
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBahaa Abdulhadi
 
Biometric Analytics: The Future of Security
Biometric Analytics: The Future of SecurityBiometric Analytics: The Future of Security
Biometric Analytics: The Future of SecurityBahaa Abdulhadi
 
Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?Bahaa Abdulhadi
 
Neural Biometrics for Healthcare
Neural Biometrics for HealthcareNeural Biometrics for Healthcare
Neural Biometrics for HealthcareBahaa Abdulhadi
 
Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?Bahaa Abdulhadi
 
The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram) The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram) Bahaa Abdulhadi
 
Next chapter in biometrics
Next chapter in biometrics Next chapter in biometrics
Next chapter in biometrics Bahaa Abdulhadi
 
The Future of Biometric Patterns
The Future of Biometric PatternsThe Future of Biometric Patterns
The Future of Biometric PatternsBahaa Abdulhadi
 
Biometric Patterns in Healthcare
Biometric Patterns in HealthcareBiometric Patterns in Healthcare
Biometric Patterns in HealthcareBahaa Abdulhadi
 
Biometric Patterns & Security
Biometric Patterns & SecurityBiometric Patterns & Security
Biometric Patterns & SecurityBahaa Abdulhadi
 
Privacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric PatternsPrivacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric PatternsBahaa Abdulhadi
 
Understanding Biometric Patterns
Understanding Biometric PatternsUnderstanding Biometric Patterns
Understanding Biometric PatternsBahaa Abdulhadi
 
Role of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementRole of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementBahaa Abdulhadi
 
Biometrics & Citizen Services
Biometrics & Citizen ServicesBiometrics & Citizen Services
Biometrics & Citizen ServicesBahaa Abdulhadi
 

Mais de Bahaa Abdulhadi (20)

Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
 
Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.
 
Biometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare DomainBiometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare Domain
 
Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.
 
Biometric Analytics & Workplace Security
Biometric Analytics & Workplace SecurityBiometric Analytics & Workplace Security
Biometric Analytics & Workplace Security
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen Authentication
 
Biometric Analytics: The Future of Security
Biometric Analytics: The Future of SecurityBiometric Analytics: The Future of Security
Biometric Analytics: The Future of Security
 
Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?
 
Neural Biometrics for Healthcare
Neural Biometrics for HealthcareNeural Biometrics for Healthcare
Neural Biometrics for Healthcare
 
Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?
 
The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram) The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram)
 
Next chapter in biometrics
Next chapter in biometrics Next chapter in biometrics
Next chapter in biometrics
 
The Future of Biometric Patterns
The Future of Biometric PatternsThe Future of Biometric Patterns
The Future of Biometric Patterns
 
Biometric Patterns in Healthcare
Biometric Patterns in HealthcareBiometric Patterns in Healthcare
Biometric Patterns in Healthcare
 
Biometric Patterns & Security
Biometric Patterns & SecurityBiometric Patterns & Security
Biometric Patterns & Security
 
Privacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric PatternsPrivacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric Patterns
 
Understanding Biometric Patterns
Understanding Biometric PatternsUnderstanding Biometric Patterns
Understanding Biometric Patterns
 
BAHADI - AUG06.pdf
BAHADI - AUG06.pdfBAHADI - AUG06.pdf
BAHADI - AUG06.pdf
 
Role of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementRole of Biometrics in Law Enforcement
Role of Biometrics in Law Enforcement
 
Biometrics & Citizen Services
Biometrics & Citizen ServicesBiometrics & Citizen Services
Biometrics & Citizen Services
 

Último

Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 

Último (20)

Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 

The role of biometric identification in the gig economy.pdf

  • 1. The role of biometric identification in the gig economy The gig economy is a market condition where freelancers and part-timers are more in demand. Many companies today encourage gig workers. This gives them more choice while reducing their expenses. For employees, it gives them the freedom to choose their work as per their convenience. It is estimated that gig workers could constitute half of the workforce by 2024 estimated Bahaa Abdul Hadi. Since gig workers are not part of the organization, it creates many challenges. There is a risk of fraud with impersonation and sharing of digital accounts being common problems. The solution is to ensure effective verification of identity. Biometrics is the best way to ensure this. Using biometrics for identity verification The identities of gig workers need to be verified before they are given access to the company’s platform/workspace. When digital accounts are issued, verifying the identity is a must. Failure to do so will lead to unauthorized people gaining access. Similarly, periodic identity verification can prevent impersonation and other such risks. Here is how biometrics can help: ● Biometrics using fingerprint scanning or facial recognition is the best and foolproof way of verifying identity. Images of the gig workers can be captured and software can identify features from the photos. This can then be compared at the time of accessing the account. Mobile phones today have fingerprint scanners and facial recognition tools. ● An additional measure of security is to carry out a liveness check. This helps to prevent spoofing where someone may use the photo of a gig worker to pass the biometric identification. Software tools can detect if the image being scanned is live or a still image.
  • 2. ● Gig workers working as cab drivers or delivery agents do not have the time to use passwords for authentication or to access the platform. Using biometrics is fast and convenient. ● A new technology known as passive biometrics has become popular. It passively collects information about the worker to detect anomalies. For eg: call centers record the employee’s voice and software can detect changes. ● Behavioral biometrics is another technology that can be very helpful in preventing fraud. A software that is behavioral biometrics enabled can track the way a user types, movement of the mouse, preferences for navigation, etc. This can be used to detect if there are any anomalies in behavior of users. Whenever any anomaly is detected, a liveness check can be carried out to confirm identity. This can help prevent problems like sharing of accounts and impersonation. Thank you for your interest in Bahaa Abdul Hadi blogs. For more information, please stay tuned to www.bahaaabdulhadi.com