SlideShare uma empresa Scribd logo
The role of biometric identification in the gig
economy
The gig economy is a market condition where freelancers and part-timers
are more in demand. Many companies today encourage gig workers. This
gives them more choice while reducing their expenses. For employees, it
gives them the freedom to choose their work as per their convenience.
It is estimated that gig workers could constitute half of the workforce by
2024 estimated Bahaa Abdul Hadi. Since gig workers are not part of the
organization, it creates many challenges. There is a risk of fraud with
impersonation and sharing of digital accounts being common problems.
The solution is to ensure effective verification of identity. Biometrics is the
best way to ensure this.
Using biometrics for identity verification
The identities of gig workers need to be verified before they are given
access to the company’s platform/workspace. When digital accounts are
issued, verifying the identity is a must. Failure to do so will lead to
unauthorized people gaining access. Similarly, periodic identity verification
can prevent impersonation and other such risks.
Here is how biometrics can help:
● Biometrics using fingerprint scanning or facial recognition is the best
and foolproof way of verifying identity. Images of the gig workers can
be captured and software can identify features from the photos. This
can then be compared at the time of accessing the account. Mobile
phones today have fingerprint scanners and facial recognition tools.
● An additional measure of security is to carry out a liveness check.
This helps to prevent spoofing where someone may use the photo of
a gig worker to pass the biometric identification. Software tools can
detect if the image being scanned is live or a still image.
● Gig workers working as cab drivers or delivery agents do not have
the time to use passwords for authentication or to access the
platform. Using biometrics is fast and convenient.
● A new technology known as passive biometrics has become popular.
It passively collects information about the worker to detect anomalies.
For eg: call centers record the employee’s voice and software can
detect changes.
● Behavioral biometrics is another technology that can be very helpful
in preventing fraud. A software that is behavioral biometrics enabled
can track the way a user types, movement of the mouse, preferences
for navigation, etc. This can be used to detect if there are any
anomalies in behavior of users. Whenever any anomaly is detected, a
liveness check can be carried out to confirm identity. This can help
prevent problems like sharing of accounts and impersonation.
Thank you for your interest in Bahaa Abdul Hadi blogs. For more
information, please stay tuned to www.bahaaabdulhadi.com

Mais conteúdo relacionado

Semelhante a The role of biometric identification in the gig economy.pdf

Trends in Biometric Identity Management.pdf
Trends in Biometric Identity Management.pdfTrends in Biometric Identity Management.pdf
Trends in Biometric Identity Management.pdf
Identity Herald
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
IDMERIT IDMERIT
 
Biometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdfBiometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdf
MobibizIndia1
 
Mobile Banking Trends That Your Application Must Have In 2023.docx
Mobile Banking Trends That Your Application Must Have In 2023.docxMobile Banking Trends That Your Application Must Have In 2023.docx
Mobile Banking Trends That Your Application Must Have In 2023.docx
CMARIX TechnoLabs
 
Enterprise Biometric Solution
Enterprise Biometric SolutionEnterprise Biometric Solution
Enterprise Biometric Solution
Tanvir Ahmed
 
6 use cases of machine learning in Finance
6 use cases of machine learning in Finance 6 use cases of machine learning in Finance
6 use cases of machine learning in Finance
Swathi Young
 
Facial Recognition Biometric Patterns
Facial Recognition Biometric PatternsFacial Recognition Biometric Patterns
Facial Recognition Biometric Patterns
Bahaa Abdulhadi
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
VLink Inc
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Jigisha Aryya
 
Biometric Analytics for Border Control..
Biometric Analytics for Border Control..Biometric Analytics for Border Control..
Biometric Analytics for Border Control..
Bahaa Abdulhadi
 
The role of biometric identification in smart cities.pdf
The role of biometric identification in smart cities.pdfThe role of biometric identification in smart cities.pdf
The role of biometric identification in smart cities.pdf
Bahaa Abdulhadi
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Dharmik
 
Contactless attendance system in 2022
Contactless attendance system in 2022Contactless attendance system in 2022
Contactless attendance system in 2022
nishiyath
 
Contactless attendance system in 2022
Contactless attendance system in 2022Contactless attendance system in 2022
Contactless attendance system in 2022
nishiyath
 
A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...
pradip patel
 
facial Recognization.pdf
facial Recognization.pdffacial Recognization.pdf
facial Recognization.pdf
gulfam ali
 
Automobile comapanies and institutions can boost safety and security with Bio...
Automobile comapanies and institutions can boost safety and security with Bio...Automobile comapanies and institutions can boost safety and security with Bio...
Automobile comapanies and institutions can boost safety and security with Bio...
Star Link Communication Pvt Ltd
 
Benefits of Digital Identity Verification - Bahaa Abdul Hadi.pdf
Benefits of Digital Identity Verification - Bahaa Abdul Hadi.pdfBenefits of Digital Identity Verification - Bahaa Abdul Hadi.pdf
Benefits of Digital Identity Verification - Bahaa Abdul Hadi.pdf
Bahaa Abdulhadi
 
Four ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsFour ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometrics
Manzurul Hassan Zumman
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
NIDHI SHARMA
 

Semelhante a The role of biometric identification in the gig economy.pdf (20)

Trends in Biometric Identity Management.pdf
Trends in Biometric Identity Management.pdfTrends in Biometric Identity Management.pdf
Trends in Biometric Identity Management.pdf
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
Biometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdfBiometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdf
 
Mobile Banking Trends That Your Application Must Have In 2023.docx
Mobile Banking Trends That Your Application Must Have In 2023.docxMobile Banking Trends That Your Application Must Have In 2023.docx
Mobile Banking Trends That Your Application Must Have In 2023.docx
 
Enterprise Biometric Solution
Enterprise Biometric SolutionEnterprise Biometric Solution
Enterprise Biometric Solution
 
6 use cases of machine learning in Finance
6 use cases of machine learning in Finance 6 use cases of machine learning in Finance
6 use cases of machine learning in Finance
 
Facial Recognition Biometric Patterns
Facial Recognition Biometric PatternsFacial Recognition Biometric Patterns
Facial Recognition Biometric Patterns
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
 
Biometric Analytics for Border Control..
Biometric Analytics for Border Control..Biometric Analytics for Border Control..
Biometric Analytics for Border Control..
 
The role of biometric identification in smart cities.pdf
The role of biometric identification in smart cities.pdfThe role of biometric identification in smart cities.pdf
The role of biometric identification in smart cities.pdf
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Contactless attendance system in 2022
Contactless attendance system in 2022Contactless attendance system in 2022
Contactless attendance system in 2022
 
Contactless attendance system in 2022
Contactless attendance system in 2022Contactless attendance system in 2022
Contactless attendance system in 2022
 
A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...
 
facial Recognization.pdf
facial Recognization.pdffacial Recognization.pdf
facial Recognization.pdf
 
Automobile comapanies and institutions can boost safety and security with Bio...
Automobile comapanies and institutions can boost safety and security with Bio...Automobile comapanies and institutions can boost safety and security with Bio...
Automobile comapanies and institutions can boost safety and security with Bio...
 
Benefits of Digital Identity Verification - Bahaa Abdul Hadi.pdf
Benefits of Digital Identity Verification - Bahaa Abdul Hadi.pdfBenefits of Digital Identity Verification - Bahaa Abdul Hadi.pdf
Benefits of Digital Identity Verification - Bahaa Abdul Hadi.pdf
 
Four ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsFour ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometrics
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 

Mais de Bahaa Abdulhadi

Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
Bahaa Abdulhadi
 
Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.
Bahaa Abdulhadi
 
Biometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare DomainBiometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare Domain
Bahaa Abdulhadi
 
Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.
Bahaa Abdulhadi
 
Biometric Analytics & Workplace Security
Biometric Analytics & Workplace SecurityBiometric Analytics & Workplace Security
Biometric Analytics & Workplace Security
Bahaa Abdulhadi
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen Authentication
Bahaa Abdulhadi
 
Biometric Analytics: The Future of Security
Biometric Analytics: The Future of SecurityBiometric Analytics: The Future of Security
Biometric Analytics: The Future of Security
Bahaa Abdulhadi
 
Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?
Bahaa Abdulhadi
 
Neural Biometrics for Healthcare
Neural Biometrics for HealthcareNeural Biometrics for Healthcare
Neural Biometrics for Healthcare
Bahaa Abdulhadi
 
Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?
Bahaa Abdulhadi
 
The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram) The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram)
Bahaa Abdulhadi
 
Next chapter in biometrics
Next chapter in biometrics Next chapter in biometrics
Next chapter in biometrics
Bahaa Abdulhadi
 
The Future of Biometric Patterns
The Future of Biometric PatternsThe Future of Biometric Patterns
The Future of Biometric Patterns
Bahaa Abdulhadi
 
Biometric Patterns in Healthcare
Biometric Patterns in HealthcareBiometric Patterns in Healthcare
Biometric Patterns in Healthcare
Bahaa Abdulhadi
 
Biometric Patterns & Security
Biometric Patterns & SecurityBiometric Patterns & Security
Biometric Patterns & Security
Bahaa Abdulhadi
 
Privacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric PatternsPrivacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric Patterns
Bahaa Abdulhadi
 
Understanding Biometric Patterns
Understanding Biometric PatternsUnderstanding Biometric Patterns
Understanding Biometric Patterns
Bahaa Abdulhadi
 
BAHADI - AUG06.pdf
BAHADI - AUG06.pdfBAHADI - AUG06.pdf
BAHADI - AUG06.pdf
Bahaa Abdulhadi
 
Role of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementRole of Biometrics in Law Enforcement
Role of Biometrics in Law Enforcement
Bahaa Abdulhadi
 
Biometrics & Citizen Services
Biometrics & Citizen ServicesBiometrics & Citizen Services
Biometrics & Citizen Services
Bahaa Abdulhadi
 

Mais de Bahaa Abdulhadi (20)

Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
 
Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.
 
Biometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare DomainBiometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare Domain
 
Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.
 
Biometric Analytics & Workplace Security
Biometric Analytics & Workplace SecurityBiometric Analytics & Workplace Security
Biometric Analytics & Workplace Security
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen Authentication
 
Biometric Analytics: The Future of Security
Biometric Analytics: The Future of SecurityBiometric Analytics: The Future of Security
Biometric Analytics: The Future of Security
 
Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?
 
Neural Biometrics for Healthcare
Neural Biometrics for HealthcareNeural Biometrics for Healthcare
Neural Biometrics for Healthcare
 
Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?
 
The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram) The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram)
 
Next chapter in biometrics
Next chapter in biometrics Next chapter in biometrics
Next chapter in biometrics
 
The Future of Biometric Patterns
The Future of Biometric PatternsThe Future of Biometric Patterns
The Future of Biometric Patterns
 
Biometric Patterns in Healthcare
Biometric Patterns in HealthcareBiometric Patterns in Healthcare
Biometric Patterns in Healthcare
 
Biometric Patterns & Security
Biometric Patterns & SecurityBiometric Patterns & Security
Biometric Patterns & Security
 
Privacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric PatternsPrivacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric Patterns
 
Understanding Biometric Patterns
Understanding Biometric PatternsUnderstanding Biometric Patterns
Understanding Biometric Patterns
 
BAHADI - AUG06.pdf
BAHADI - AUG06.pdfBAHADI - AUG06.pdf
BAHADI - AUG06.pdf
 
Role of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementRole of Biometrics in Law Enforcement
Role of Biometrics in Law Enforcement
 
Biometrics & Citizen Services
Biometrics & Citizen ServicesBiometrics & Citizen Services
Biometrics & Citizen Services
 

Último

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 

Último (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 

The role of biometric identification in the gig economy.pdf

  • 1. The role of biometric identification in the gig economy The gig economy is a market condition where freelancers and part-timers are more in demand. Many companies today encourage gig workers. This gives them more choice while reducing their expenses. For employees, it gives them the freedom to choose their work as per their convenience. It is estimated that gig workers could constitute half of the workforce by 2024 estimated Bahaa Abdul Hadi. Since gig workers are not part of the organization, it creates many challenges. There is a risk of fraud with impersonation and sharing of digital accounts being common problems. The solution is to ensure effective verification of identity. Biometrics is the best way to ensure this. Using biometrics for identity verification The identities of gig workers need to be verified before they are given access to the company’s platform/workspace. When digital accounts are issued, verifying the identity is a must. Failure to do so will lead to unauthorized people gaining access. Similarly, periodic identity verification can prevent impersonation and other such risks. Here is how biometrics can help: ● Biometrics using fingerprint scanning or facial recognition is the best and foolproof way of verifying identity. Images of the gig workers can be captured and software can identify features from the photos. This can then be compared at the time of accessing the account. Mobile phones today have fingerprint scanners and facial recognition tools. ● An additional measure of security is to carry out a liveness check. This helps to prevent spoofing where someone may use the photo of a gig worker to pass the biometric identification. Software tools can detect if the image being scanned is live or a still image.
  • 2. ● Gig workers working as cab drivers or delivery agents do not have the time to use passwords for authentication or to access the platform. Using biometrics is fast and convenient. ● A new technology known as passive biometrics has become popular. It passively collects information about the worker to detect anomalies. For eg: call centers record the employee’s voice and software can detect changes. ● Behavioral biometrics is another technology that can be very helpful in preventing fraud. A software that is behavioral biometrics enabled can track the way a user types, movement of the mouse, preferences for navigation, etc. This can be used to detect if there are any anomalies in behavior of users. Whenever any anomaly is detected, a liveness check can be carried out to confirm identity. This can help prevent problems like sharing of accounts and impersonation. Thank you for your interest in Bahaa Abdul Hadi blogs. For more information, please stay tuned to www.bahaaabdulhadi.com