Content uploaded by Vikas Garg
Author content
All content in this area was uploaded by Vikas Garg on Nov 27, 2019
Content may be subject to copyright.
“A Study on transformation in technological based
Biometrics Attendance System: Human
Resource Management Practice”
Vikas Garg
Assistant Professor
Amity Business School
Amity University, Uttar Pradesh
Greater Noida Campus
vgarg@gn.amity.edu
Abhishek Singhal
Assistant Professor
Amity School of Engineering and Technology
Amity University, Uttar Pradesh
Noida Campus
asinghal1@amity.edu
Pooja Tiwari
Assistant Professor
ABES Engineering College Ghaziabad
Pooja2017@gmail.com
Abstract
In contemporary era, there is strong level of imitation practiced on a
regular basis in private sector as well as public. The prevalence of
ghost worker syndrome is observed across the three pillars of the
government. The employers are concerned about the absenteeism
among employees of the workforce and complexity in monitoring the
student’s attendance in the lectures. Biometric identification system
facilitated by fingerprint is a unique method utilized for a lifetime.
Biometric system comprises of the process of verifying identity of
individuals by analyzing the human body features which is utilized in
immense number of aspects utilizing different purposes, especially
workforce attendance; the nexus of this paper is to throw light on the
attendance monitoring software using fingerprint biometric
techniques in a university milieu. Although, there are the abundant
benefits that the biometric technique offers and the impact is felt
across various spheres, mostly the beneficiary come across the issue
of delineating the appropriate procedure while keeping the cost
benefit element in the focal. The study focuses on describing the
system of attendance management by subsuming the biometric
technique with the conventional workforce attendance monitoring
system which highly influences the efficiency and productive
capacity of firm. This study uses qualitative (exploratory) research
methodology, it is pure exploring study, where detailed knowledge of
Biometrics, Biometrics Attendance System and it’s usage in HR
practices has been shared. However the study shows that biometric
identifier is effective and economic for employee’s attendance
monitoring software for firms as a part of HR practices. Therefore,
the focus should be kept on the various factors prior to
recommending a biometric technique as the mode of improvising the
productive capacity of any organization’s business performance.
Keywords: Biometric, Employee Attendance, Verification,
Productivity, Human Resource Management, fingerprint, enrolment,
authentication.
1. Introduction
The expectation today is from any individual is that he/she
should have a unique identification or password in order to
authenticate his/her service. For instance, the pin of a Debit
card, the number on the driver’s license, insurance policy
number etc. However, the process of creating, carrying and
remembering different unique identities and passwords is a
problem organizations face today. In order to secure the
identification system and make the process of authentication
more reliable, the biometric figures are an integrated part of
the attendance monitoring software. Biometric technique
verifies the identity via features like fingerprints, facial
characteristics, arises, the retina, palm print, the voice
recognition, signatures writing etc. This technique uses the
data of physical characteristics and thus, it is receiving the
attention and the status as a individual authentication
methodology which brought convenience in comparison to the
conventional methodology such as unique password or an
identity card as it utilizes the data collected from the
measurements which makes it individualistic lifelong.
The unique mark innovation consequently turns into the
incomparable and acclaimed biometric procedure in
automatation of the individual recognizable proof framework.
The reason for the overall acknowledgment of the unique
mark biometric check framework is the wonderful uniqueness
of the fingerprints, its dependability and straightforwardness.
This investigation is an endeavour towards the predominance
of the monstrous level of the pantomime saw on standard
premise in different segments and the pervasiveness of the
phantom labourer disorder making rebellion and hazard
among the mainstays of open division, The businesses are
worried about the non-appearance among representatives of
the workforce and unpredictability in observing the
understudies participation in the addresses. Also, the
fingerprint Attendance Monitoring was created with a specific
end goal to encourage a one of a kind, steady, speedier, solid,
secure and effortlessly available strategy for client personality
check over the use of passwords as an ordinary technique.
The word "biometrics" was generating from the Greek words
"bio" means life and "measurements" means specially
designed. Robotized biometric frameworks have just been
accessible for a couple of decades due to huge advances in PC
809
978-1-5386-1719-9/18/$31.00 c
2018 IEEE
preparing. Be that as it may, a significant number of these new
computerized systems depend on thoughts initially imagined
hundreds or even a great many years prior. One of the most
seasoned and most crucial cases of a trademark that is utilized
for human acknowledgment is the face. Since the start of
development, people have utilized appearances to recognize
the commonplace and non natural individuals. The idea of
entomb human acknowledgment is likewise found in the
dominating biometrics of conduct, for example, human
discourse and voice acknowledgment. People utilize these
attributes, in a to some degree oblivious path, to perceive
individuals well-known from everyday.
Table. 1
1858 First systematic capture of hand images for identification purpose was
recorded
1896 Henry develops a fingerprint classification system
1936 Concept of using the iris pattern for identification was proposed
1960 Face recognition becomes semi-automated
1965 Automated signature recognition research begins
1974 First commercial hand geometry systems become avai lable
1992 Biometric consortium is established within US government
2002 ISO/IEC standards committee on biometric is established
2010 U.S. national security apparatus utilizes b iometrics for terrorist
identification
2013 Apple includes fingerprint scanners into consumer target smart
phones
(Source: National Science and Technology Council Report)
1.1 Benefits of Biometrics
As we understand that the current security frameworks are rare
and they are based on unique passwords, unique identification
numbers, various new biometric methods which help us to
achieve a condition of accuracy and clarity in understanding
the concepts.
We are also using natural features like retina scan, thumb
impression in our main endeavors which help us to form a
unique and different proof system in different conditions. This
process cannot be copied from one system to another as
everybody is having a unique set of features.
The biometric system affects an individual and also an
organisation where an individual user can be associated to a
specific event. Biometrics is considered to be transparent and
unmistakable and they are mainly useful for security purposes,
majorly in case of monitoring system in schools, colleges and
offices.
The major use of biometrics is secure and also simple, because
it gives various innovative techniques to recover the database
of the people registered. The software can be easily utilised
and can be prepared by various steps.
Biometrics frameworks are nowadays introduced effectively
in various organisations and it is considered to be best
amongst the current tools as by the help of this companies and
organisations and are easily able to remove physical costly
heads. In this event, it is also beneficial for people who are not
able to maintain physical data efficiently and are not having an
expertise in letters, words, images etc. which makes them
difficult to prepare reports.
However, there would have been no requirement of biometric
characteristics, if there is no duplication of data,
misrepresentation of records, and illegal sharing of data. There
is no need of personal ID cards and their maintenance as in
case the ID card is lost which can be a problem to the
customer security strategies.
Fig. 1.
1.2 Biometrics and Attendance
The benefits of a major duration and excessive framework are
dealing with the current workforce. Without understanding the
use and extra time of a system we also require extra time for
finance costs and works costs and also a deep understanding
of the robotic system. We need to have a strong association
and HR issues about the management of the system and also a
thorough speculation and a constructive outcome for any
business. Majorly in a normal course, biometrics is related
with attendance in schools, colleges and organisation. It is also
used in army, hospitals, mining and also for invigilation
purposes.
Representatives are enabled when they approach their own
particular data through innovation like worker self-benefit.
That strengthening is a level of shared control between the
business and representative and improves for an association
with a beneficial outcome as an organization's way of life. The
advantages of connected with representatives are various.
Connected with representatives are energetic, contribute
thoughts, are idealistic about the organization and its future,
are once in a while missing from work, regularly remain with
the association longer, and are diplomats for the association.
In addition, a profoundly esteemed organization culture is a
noteworthy supporter of drawing in and holding top ability
workers.
The old procedures where this system is done manually
,human resource keeps huge measurement of paper work and
preparation of time sheets records for each representative
.Keeping this kind of data is very tedious and it is also waste
of time and energy for basically unproductive work. Then
moreover people have to deal with manpower and make them
work which is considered to be the toughest work in any
business. Worker self-benefit (ESS) usefulness is presently a
standard element of most time and participation and HR
arrangements, and ESS not just permits representatives access
to their own timekeeping and business information yet in
addition urges them to effectively take an interest in the
upkeep of this data, diminishing bottlenecks in forms and
810 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence)
engaging representatives to take responsibility for information.
No more is the HR or finance office circling to gather paper
time cards toward the finish of a payroll interval.
Representatives are entering their own opportunity functioned
as they work it.
Fig. 2.
At this point of time, in order to have an ideal opportunity
about the workmanship in business by manual work is very
boring and it results in conflicts to deal with the human
resource and correcting and calculating the payroll system
often and on due to human error is very monotonous and
cumbersome. Regardless of the same the duty of an individual
five hours for every payroll means a considerable measure of
efficiency hours which is associated with cost .If we calculate
step wise then we can understand that maintaining a manual
procedure and regular collection of time cards, revised section
of information and important process to finance and refund
people for the organisation payroll system is very time
consuming and boring .It is important for companies to
consider manual time keeping and financial procedures and
reduce the time period from five hours to five and ten minutes
due to biometrics. This actually requires no investment and no
manual participation which can be done in minutes due to this
machine.
The profitability hours and workforce can be reallocated to
various other locations for productive purposes with minimum
cost. Computerised time enrolment and gathering
requirements for timekeeping can be used in a limited
timeframe .Due to this the payroll system which takes hours to
recover and complete now it can be done in 15-20 minutes.
Changing the time frame it takes financial software while
changing the information from manual to digital and making
the time keeping data prompt and effective.
2. RESEARCH OBJECTIVE
The primary objective of this research is to specifically
consider and understand the various areas of biometric
technology and what, where and how they have been used in
the past and present scenario, majorly on the issues of staff
attendance systems in many multinational organisations. The
major research areas of work productivity factor of employees
that are there as a result when implementing a biometric
system in the organization.
Fig. 3.
Fig. 4.
3.1 Detailed study of Existing Biometric Technology and
its major Benefits
Different forms of biometric technology already existed in the
past and different countries were using them for attendance
purpose. Initially the biometric system were used my most of
the public sector organization, but it is also beneficial to
2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence) 811
identify and verify crimes (Jiexun L.,Wang .A. and Chen H,
2011)[11]. The discovery of biometrics technology framework
has been started by people in general part; however biometrics
is additionally utilized for the ID and confirmation of crooks
as said by Jiexun L.,Wang .A. what's more, Chen H ,
2011[11].Other interesting streams where biometrics has
played a major role on its growth are areas like Banking,
Education and Health . For instance, rising application
markets incorporate biometrically empowered value-based
instalment arrangements and biometrically empowers remote
for business utilize. Some European banks utilize the 3Dfacial
acknowledgment of workers into bank structures, in this
manner wiping out the issue of keys been lost, stolen or
abused, as recommended by Capoor S. in 2006[5]. Moreover,
biometric application has been helpful in different divisions
which incorporate the administration utilizing it to stop fear
based oppressor assaults and battling wrongdoings. After the
9/11 massacre the Yeager Airport in Charleston started the
biometrics framework, which is beneficial to secure access to
its control tower as clarified by Dubin, C. in 2011[8].
Additionally, the biometrics framework has been
exceptionally valuable in the areas of education where it has
helped understudies in the obtaining and returning of various
books inside the library. The positive effect of biometrics to
the wellbeing segment can't be forgotten which has helped in
ceasing extortion in some social insurance charge for
administrations they never performed. A palm scanner which
peruses patient's novel vein design was executed in Sharp
Healthcare in San Diego to stop persistent data fraud, the
framework was known to be exceptionally secure and
performed effectively well for its motivation is been clarified
by Kreimer, .S., 2010 [12]. Besides, biometrics can be
coordinated with different frameworks for it to do its
motivation of recognizable proof. Whereas Zalud, B.,2010[22]
accentuation different country security databases require
utilizing a card get to framework incorporated with a
biometric innovation to obtain entrance.
3.2 Attendance Management System
As per Bevan, S and Hayday, S. in 1998[1] participation
administration is the demonstration of overseeing participation
or nearness in a work setting to limit misfortune because of
representative downtime. Participation control has customarily
been moved toward utilizing time tickers and timesheets,
however participation administration goes past this to give a
workplace which amplifies and inspires representative
participation. Participation administration is a noteworthy
piece of the present human asset frameworks; take association
towards better human asset practice, frameworks and
perfection, subsequently standard participation and
dependability are anticipated from all representatives or
hopefuls inside an organisation. Unacceptable participation
caused due to unorganised and unlucky deficiencies and
lateness in light of the fact that a disturbance in work,
influences profitability, and makes spirit issues when
workloads are moved to different representatives as properly
clarified by McKeehan, D.A. in 2002[13].
4. SCOPE OF THE STUDY
This exploration covers the biometric innovation framework
which is been utilized with the end goal of staff participation
in various association. The biometric innovation framework
incorporated into this investigation are having the unique
mark, hand geometry, iris acknowledgment, voice
acknowledgment, faces acknowledgment and mark check
meters. The workers of the organization who utilize the
conventional method for recording worker participation has
constantly confronted inconvenience in numerous way like –
off base participation, influenced pay and so forth.
Biometrics has been specified successfully in a way, where
over ten years all the time and participation of a workforce
administration is acceptable. Inspire of all these benefits there
are some or the other problems and confusion about its
innovation and activities. These problems are majorly
separated when the main biometric or standard biometrics are
prepared, which are considered. The extent of study in this
paper demonstrates that this biometric has extreme level of
analysis and examination. The other investigation states that
biometric framework has extreme and unimaginative capacity
to increase work saves time that provides information and
gives a review that is without an error. Another issue is
biometric offers detailed relationship and a backend support to
collect the database And lastly, we also understand that in the
current scenario many organisations are having a robotics
approach and they are initiating immediate and backend work
in a limited period of time.
5. LIMITATION OF THE STUDY
A scanner which consists of a rare finger impression has
majorly two employments. To begin with one need to get a
picture of any individual finger and it checks the technicalities
and minute activities and it relates and compares the
technicalities of the individual finger once punched. It consists
of rare and unique mark which is encoded inside by a
biometric key or any numeric body. A unique mark can never
be duplicated as every individual has a unique code which is
considered for confirmation.
812 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence)
Fig. 5.
It is critical to take note of that Easy Clocking's biometric time
timekeepers don't in reality gather and store fingerprints.
Rather, it spares a numerical portrayal of the representative's
biometric information. At the point when the biometric time
clock filters a hand or finger amid a managed enlistment
process, just an encoded scientific portrayal of the unique
finger impression is put away. Subsequently, it's for all intents
and purposes difficult to copy the first picture from that
numerical portrayal. Furthermore, if representatives question
cleanliness, this worry ought not to be rejected. Rather, you
ought to guarantee representatives that the time clock's finger
zone isn't a hot zone for germs. Actually, it will be touched far
less every now and again than restroom entryway handles and
water cooler nozzles and so forth.
6. RECOMMENDATION AND CONCLUSION
Every biometric innovation can also include the
representatives of the association utilizing the major features
of an individual body in order to find out the distinguishing
proof and check; this however fulfils the way that the
framework will be manageable. Thus, biometric innovation is
without a doubt a worldwide ICT system that can be using to
upgrade staff participation. Along these lines, this
investigation has reached a conclusion that biometric
innovation framework is the best framework that can
economically take care of the waiting issue of staff
participation in the associations. This will take out pal
punching and increment staff profitability. It is along these
lines, prescribed that consideration ought to be paid to
workforce efficiency factors before suggesting biometric
innovation as a methods for enhancing the profitability of an
association business forms.
Bibliography
1. Bevan, S and Hayday, S. (1998): Attendance Management: a
Review of Good Practice" Report 353, Institute for Employment
Studies.
2. Bredin, K., Human Resource Management in Project-Based
Organisations. 2008 - Challenges, Changes, and Capabilities.
Doctoral thesis, Department of Management and Engineering,
Linköping University, Linköping.
3. Carat S. Chikkerur (2005): Online Fingerprint Verification System,
An MTech Thesis, Department of Electrical Engineering, and
Faculty of the Graduate School of the State University of New
York at Buffalo.
4. Chris Velazco.2011.”Android Still Most Popular Smartphone OS,
iOS Holds Steady In Second Place”, (on-line), Techcrunch web.
http://techcrunch.com/2011/11/03/android-still-most-popular-os-
ios-holds-steady-in-second-place/. 13 Januari 2013.
5. Capoor S.(2006). ‘Biometrics as a Convenience
Security’,Business storyDecember 1, 48, 50. Retrieved
16thOctober, 2012
6. Darcey Lauren., & Conder Shane.2011. “Enable a Fingerprint
Scanner for Android on the Motorola ATRIX 4G”, (on-line),
developer.com web.
http://www.developer.com/ws/android/devices/enable-a-
fingerprint-scanner-for-android-on-the-motorola-atrix-4g.html. 13
Januari 2013
7. Dransfield, Robert. Human Resource Management. 2000:
Heinemann Educational Publisher.
8. Dubin, C. (2011). ‘Biometrics:HandsDown’, IDmanagement.
Security, February 1, 52, 54.
9. Dugelay, J.L., et al., Recent Advantages in Biometric Person
Authentication, in ICASSP International Conference on Acoustics,
Speech and Signal Processing. 2002: Orlando, Florida, USA.
10. HARRIS, A.J. and D.C. YEN, Biometric authentication: assuring
access to information. Information Management andComputer
Security, 2002.10 (1): p. 12-19.
11. Jiexun L.,Wang .A. andChenH(2011). ‘Identitymatching using
personal and social identity features’; 13:101– 113 Kreimer, .S.
(2010). ‘Matching the Right Patient to theRight Record’.Hospitals
& Health Networks,November 1, 12. Retrieved 17thDecember
2011.
12. Kreimer, .S. (2010). ‘Matching the Right Patient to theRight
Record’.Hospitals & Health Networks,November 1, 12. Retrieved
17thDecember 2011.
13. McKeehan, D.A. (2002): Attendance Management Program, The
City of Pleasanton, Human Resources.NSTCS, 2006. Biometrics
Technologies. National Science and Technology Council
Subcommittee on Biometrics. Retrieved 2nd July, 2012.
14. Mehtre, B. M. (1993): Fingerprint image analysis for automatic
identification. Machine Vision and Applications 6, 2 (1993), 124-
139.
15. Ononiwu G. C and Okorafor G. N (2012): Radio Frequency
Identification (RFID) Based Attendance System with Automatic
Door Unit, Academic Research International. Vol 2, No 2, March,
2012.
16. Ravi. J. K., Raja b. and Venugopal. K. R. (2009): Fingerprint
Recognition Using Minutia Score Matching, International Journal
of Engineering Science and Technology Vol.1 (2), 2009, 35-42.
17. Sandi Fajar Rodiyansyah.2011. “Arsitektur Sistem Operasi
Android”, (online),
educnologyweb.http://educnology.web.id/opensource/rodiyansyah/
arsitektur-sistem-operasi-android, 14 Januari 2013
18. Shehu V. and Dika A. (2011): Using Real Time Computer Vision
Algorithms in Automatic Attendance Management Systems.
Proceedings of the ITI 2010 32nd Int. Conf. on Information
Technology Interfaces, June 21-24, 2010, Caveat, Croatia.
19. Shoewu O., Olaniyi O.M. and Lawson A. (2011): Embedded
Computer-Based Lecture Attendance Management System.
African Journal of Computing and ICT. Vol 4, No. 3. P 27- 36,
September, 2011.
20. Tyler Lee.2011.”AuthenTec releases SDK for fingerprint sensor
applications on Android phones”, (on-line), Ubergizmo web.
http://www.ubergizmo.com/2011/08/authentec-releases-sdk-for-
fingerprint-sensor-applications-on-android-phones/. 13 Januari
2013.
21. Woodward, J.D., et al., Army Biometric Applications: Identifying
and Addressing Sociocultural Concerns. 2001
22. Zalud, B. (2010).‘Poor Sister No More: Access Enters Spotlight
Again’. Journal of Access management Security, August 1, 42,44-
45. Retrieved 28thApril 2011
2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence) 813