Question: AUTHORIZING COMPUTER USERS WITH PALM PRINTS. Access to computers, email, and Facebook accounts is achieved via a password a collection of symbols ( usually letters

AUTHORIZING COMPUTER USERS WITH PALM PRINTS. Access to computers, email, and Facebook accounts is achieved via a passworda collection of symbols (usually letters and numbers) selected by the user. One problem with passwords is that persistent hackers can create programs that enter millions of combinations of symbols into a target system until the correct password is found. An article in the International Journal of Advanced Research in Electronics and Communication Engineering (June 2016) investigated the effectiveness of using palm prints to identify authorized users. For example, a system developed by Palmguard, Inc. tests the hypothesis
H
0
:
The proposed user is authorized
H
a
:
The proposed user is unauthorized
by checking characteristics of the proposed users palm print against those stored in the authorized users data bank.
Define a Type I error and Type II error for this test. Which is the more serious error? Why?
Palmguard reports that the Type I error rate for its system is less than 1%, whereas the Type II error rate is .00025%. Interpret these error rates.
Another successful security system, the EyeDentifyer, spots authorized computer users by reading the one-of-a-kind patterns formed by the network of minute blood vessels across the retina at the back of the eye. The EyeDentifyer reports Type I and II error rates of .01%(1 in 10,000) and .005%(5 in 100,000), respectively. Interpret these rates.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!