Sunteți pe pagina 1din 4

Benefits of biometrics

The rapid progress of biometric technologies and their expanded application in recent years
necessitates careful scrutiny from a data protection perspective2. A wide and uncontrolled
utilisations of biometrics raises concerns with regard to the protection of fundamental rights and
freedoms of individuals. This kind of data is of a special nature, as it relates to the behavioral and
physiological characteristics of an individual and may allow his or her unique identification3.
Biometric data processing is now often used in automated authentication/verification and
identification procedures, in particular for the control of entry to both physical and virtual areas (i.e.
access to particular electronic systems or services).

The use of biometrics was mainly confined to the areas of DNA and fingerprint testing. The
collection of fingerprints was used in particular for law enforcement purposes (e.g. criminal
investigation). If society encourages the development of fingerprint or other biometric databases for
further routine applications, it may increase the potential re-use by third parties as an element of
comparison and research in the framework of their own purposes, without such an objective having
initially been sought; these third parties may include law enforcement authorities.
A specific concern related to biometric data is that the public may become desensitised, through
the widening of the use of such data, to the effect their processing may have on daily life. For
example, the use of biometrics in school libraries can make children less aware of the data
protection risks that may impact upon them in later life.

Benefits of computerized payroll system

A Company needs a new system called, .Payroll System., to allow employees to


record timecard information electronically and automatically generate paychecks based
on the number of hours worked and total amount of sales(for commissioned employees).
The new system will be state of art and will have a Windows-based desktop interface to
allow employees to enter timecard information, enter purchase orders, change employee
preferences (such as payment method) and create various reports. The system will run on
individual employee desktops throughout the entire company.

The system will retain information on all employees in the company. The system
must pay each employee the correct amount, on time, by the method that they specify.
Some employees work by the hour and are paid an hourly rate. They submit timecards
that record the date and number of hours worked for a particular charge number. Some
employees are paid a flat salary. Even though they are paid a flat salary, they submit
timecards that record the date and hours worked. Some of the salaried employees also
receive a commission based on their sales. They submit purchase orders that reflect the
date and amount of the sale.

One of the most requested features of the new system is employee reporting.
Employees will be able to query the system for hours worked, totals of all hours billed to
a project, total pay received year to date, etc.,
Employees can choose their method of payment.

They can have their paychecks


mailed to the postal address of their choice, or they can request direct deposit and have
their paycheck deposited into a bank account of their choosing. The employee may also
choose to pick their paychecks up at the offices. The Payroll Administrator maintains
employee information.

He is responsible for adding new employees, deleting employees


and changing all employee information such as name, address and payment classification
(hourly, salaried, commissioned), as well as running administrative reports.
The Payroll application will run automatically every Friday and on the last
working day of month. It will pay the appropriate employees on those days.

The system will be told what date employees are to be paid, so it will generate payments for
records
from the last time the employee was paid to the specified date. The new system is being
designed so that the payroll will always be generated automatically and there will be need
for any manual intervention.

chapter II
Review of Related Literature and Studies
This chapter includes a discussion of the related literature, theoretical Framework and conceptual
framework as components of a faculty evaluation.

A. Conceptual Framework
In this research, the researchers to provide a better way of monitoring the
attendance of Omakase Japanese cuisine, where the staff and the manager can handle a faster
and easy way of recording and monitoring their daily Attendances and monthly Payroll. Only the
Admin, HR and Accounting department has the authority to use the system that can manipulate
there cords in the system. The system will provide a reliable and efficient way of Timekeeping
activity. The study aims to produce a result of Timekeeping and Payroll System that can cope up
with the needs of the company

B. Related literature
1.local literature
John Aquilan made a comparable thesis entitled Automation of time attendance System in
2004, it stated that the automation of the time attendance records, time in and
time out of every employee using barcode system. It tends to eliminate the manual recording
system of time and attendance and also include salary computation of each employee based on
the time and attendance reports. Ramon Floran in the Philippine Daily Inquirer, page 14
October2005 wrote on his article The Computer Edge of the New Employment and Opportunities
He stated that computer gives a different feeling about what is happening in the company.
Business will be highly competitive and innovative because the computer provides instant
information. According to Andrea Cantoma, March 2004 entitled Computer Library System for St.
James Academy stated that, in manual system in retrieving, maintaining security and piling record
stake place because of the years gone by. Furthermore, these files were only kept in envelopes
and folders in wooden rocks. There are also instances when the right information is given to a
wrong person, which affect quality of service. Biometrics Technology to be Implemented in PNP,
2009 The Philippine National Police (PNP) also made by the international crime detection
technologies in the market, the said Philippine agency decided to adopt NECs (mentioned above)
Automated Fingerprint Identification System. Via the technology, PNP staff and experts are able to
authenticate unique body demographics, such as fingerprints in the particular case. The
technology also allows an almost instantaneous identification. The technology was used however
by first building an initial database of 210,000 fingerprints. PNP actually used the said technology
in order to identify two chop-chop victims whose mutilated bodies were found dumped in several
areas in Quezon City and Muntinlupa. According to the mentioned above with the use
Biometrics technology the PNP was able to identify a suspect because of the fingerprints.
According to Mayor Jun Bernabe on the article Planet Biometrics, In August 2011 Paraaque City,
Philippines has replaced its existing biometric machines with a new fingerprint biometric
attendance registry system, which it says is more user-friendly and efficient. The citys mayor, Jun
Bernabe, says the new attendance machines will enable it to resolve the issues of long queues as
well as employee complaints. A total of 40 Model 628 Double Engine ZK Finger Print Stand Alone
Time Recorders were purchased. City hall took 15 units while the rest were installed in other local
government facilities. The upgrade was jointly run by the city governments Human Resource
Management Office and the Electronic Data Processing (EDP) Office. A side from cutting man
power downtime, it makes timekeeping and payroll preparation simpler, systematic and more
accurate. It also provides an additional way to identify, discipline and fire habitual later-comers,
absentees and ghost employees, says Mayor Bernabe. According to the article mentioned above,
with the use of biometric fingerprint scanner in the attendance system of the organization which is
also connected to the payroll system. Saves time in lining up in the Bundy clock.

2. Foreign literature
Columbia State Community (2006) uses computer identification account (Log in Name and
Password) for access to the institutions computer usage logs occurs electrically through the
individual users log in/out process. Users are also informed that they are responsible for any
computer files, database and/or internet sites that are accessed through their computer
identification account, notwithstanding their failure to adhere to the log in/out process, on their
voluntary publication of their account information to others. My Time Force (2006), It is a software
based time and attendance system that allows the user to collect and organize employee time data
simply and accurately. You can use Time Force to easily and efficiently track your employee time,
manage your time & attendance data and employee profiles, eliminate buddy punching, make
employee scheduling a breeze and reduce the headaches and time associated with payroll.

Theoretical concept
FIGURE 1.1 Operation of a biometric system.
The operational process typical for a biometric system is given in Figure 1.1. The main
components of the system for the purposes of this discussion are the capture (whereby the sensor
collects biometric data from the subject to be recognized), the reference database (where
previously enrolled subjects biometric data are held), the matcher (which compares presented
data to reference data in order to make a recognition decision), and the action (whereby the
system recognition decision is revealed and actions are undertaken based on that decision.
This diagram presents a very simplified view of the overall system. The operational efficacy of a
biometric system depends not only on its technical componentsthe biometric sample capture
devices (sensors) and the mathematical algorithms that create and compare referencesbut also
on the end-to-end application design, the environment in which the biometric sensor operates, and
any conditions that impact the behavior of the data subjects, that is, persons with the potential to
be sensed.
For example, the configuration of the database used to store references against which presented
data will be compared affects system performance. At a coarse level, whether the database is
networked or local is a primary factor in performance. Networked databases need secure
communication, availability, and remote access privileges, and they also raise more privacy
challenges than do local databases. Local databases, by contrast, may mean replicating the
reference database multiple times, raising security, consistency, and scalability challenges. In both
cases, the accuracy and currency of any identification data associated with reference

Issued reports that elaborate on biometrics systems with an eye to meeting government needs.
See, for example, The National Biometrics Challenge, available at
http://www.biometrics.gov/Documents/biochallengedoc.pdf, and NSTC Policy for Enabling the
Development, Adoption and Use of Biometric Standards, available at
http://www.biometrics.gov/Standards/NSTC_Policy_Bio_Standards.pdf.

The data capture portion of the process has the most impact on accuracy and throughput and has
perhaps been the least researched portion of the system. The capture process, which involves
human actions (even in covert applications) in the presence of a sensor, is not well understood.
While we may understand sensor characteristics quite well, the interaction of the subject with the
sensors merits further attention.

Technicality of the project


Our project is divided into two major parts. A JAVA part and a part on database. The JAVA
part is the primary and initiator part, which means that the entire program has to be run through
JAVA. The native part has the task of controlling a physical biometric unit. In our case: A fingerprint
reader

S-ar putea să vă placă și