Monday 9 November 2009

Harvard Style

For this design studies assignment we had to gather information from books and journals relating to the spider diagram from the previous assignment. My spider diagram was based on i.d cards so I looked further into this subject also gathering information on i.d theft and biometric systems such as fingerprint, iris and face recognition.
Once this information was gathered we had to compile a list of around 6 texts and present them using Harvard style with a short paragraph outlining what the text is about.
I actually found gathering the information extremely time consuming and more difficult than I thought. I used the online cross-search system to find journals. This took me ages and to be honest almost made me cross eyed starring at a computer screen for so long! I also went to the main library today to see what I could find in the way of books relating to this subject.
So here are my findings.

1 Cohn, L (jul 2009)What you need to know about identity theft, Kiplinger's personal finance, business source premier


This article examines identity theft and tips on how to prevent it such as always shredding documents with a cross shredding machine.
Also gives statistics on how much i.d theft costs the consumer each year.


2 Jain, A K (Sep 2008) Beyond finger printing, Scientific American, Business source premier

This article examines the development in biometric systems such as fingerprinting, face, voice and iris scanning in i.d theft prevention.
Also raises issues concerning privacy and biometric systems i.e where is the data stored and who has access to it.

3 Lyon, D (2009) Identifying Citizens. I.d cards as surveillance, Polity Press

In this book David Lyon examines i.d cards and the new technologies such as biometric systems and how they work. It also raises issues people have with i.d cards and how finding a more stable way of identifying an individual will be a long term process.

4 Quain, J R (21/02/2005) The password is fingertips, U.S News and world report, business source premier (EBSCO)

This article examines biometric fingerprint readers for computers in an attempt to combat i.d fraud. Gives details of various biometric fingerprint readers, how much they cost, how they work and the issues which arise when using such a device.

5 Wayman, J, Jain, A, Maltoni, D, Maio D (2005) Biometric systems technology, design and performance evaluation, Springer- Verlag London Limited

This book explores the current biometric systems and is meant as a reference book for anyone in design and management of biometric systems.
It concentrates on 3 types of biometric systems such as testing protocols and results, the legal and system considerations of biometric systems and also the key features such as fingerprints, speaker, iris and face recognition.

6 Wayner, P (Apr-June 99) Technology of anonymity : Names by other nyms, Information society, Taylor and Francis

This article examines why anonymity is important and how technology can help safe guard it.
It also identifies problems with the technology that is used to protect anonymity.


As part of this assignment we were also asked to compile a top 5 websites keeping us up to date in our discipline, in my case jewellery, and also a list of the top 5 websites out with our discipline. So here they are.

Top 5 Jewellery related websites

1 www.ganoskin.com

2 www.klimt02.net

3 www.objectfetish.com

4 www.whoswhoingoldandsilver.com

5 www.metalcyberspace.com


Top 5 websites out with my discipline

1 http://www.craftscotland.org/

2http://www.paperscissorsstone.info/

3 www.designweek.co.uk

4 www.vam.ac.uk

5http://www.spookyland.com/

No comments:

Post a Comment