This chapter presents the introduction, background of the study, theoretical framework, conceptual framework, statement of the problem, scope and limitation, significance of the study, and definition of terms of the proposed study. Introduction
The emerging technology of today’s generation brought up the advancement of processes in people’s lives. Information technology (I.T.) is a more specific term that stresses the role of unified communication and the integration of telecommunication and computers (Murray, 2011).
Specifically, computer is a general purpose device that can be programmed to carry out a finite set of arithmetic and logical operations. It lessens the tedious tasks carried out in manual based operations in the society. However, providing efficient security is still considered as one of the arising difficulties in information technology.
Security plays a vital role in one’s daily lives and as forms of protection are structure and process that provide or improve security as a condition, it is present in all aspects of life. At present, one of the devices used in maintaining a strict security especially in attendance monitoring and payroll generation is the biometric technology or simply biometrics.
The Essay on Information Technology security control
There are a number of Information Technology security controls. The three most common are: physical, technical, and administrative controls; however, many organizations break down administrative controls into two separate categories: procedural and legal controls. “Security controls are the means of enforcing security policies that reflect the organization’s business requirements, ...
Biometrics (MSU, 2012) refers to the automatic identification of a person based on his/her multiple scientific fields. One of which is his anatomical (e.g. fingerprint, iris) characteristics of traits. A biometric system made use of a fingerprint scanner, a sensor that employs the user to be present to enroll in the system so that his biometric template or reference can be captured. This template is securely stored in a central database or smart card issued to the user. The template is used for matching when an individual needs to be identified. Depending on the context, a biometric system can operate either in verification (authentication) or an identification mode. Thus, the identification mode of biometrics is frequently used in attendance monitoring in order to compute and generate payrolls.
Biometrics or biometric fingerprint scanner is used in monitoring the attendance that supervises the employee’s daily time log and are stored in a computerized database. It maintains a daily record of a person’s arrival and departure time from work which helps in generation of payrolls. Payroll is the sum of all financial records of salaries of an employee, wages, bonuses and deductions. Thus, the main purpose of a payroll system is to lessen the tedious tasks in salary computation in order to generate accurate and timely reports.