INNOVATIVE USE OF EMERGING BIOMETRIC TECHNOLOGY IN ENHANCING AIRPORT SECURITY AT JOMO KENYATTA INTERNATIONAL AIRPORT IN NAIROBI, KENYA

  • TRIZAH NZISA NZIOKA Kenyatta University, Kenya
  • DUNCAN O. OCHIENG, PhD Kenyatta University, Kenya
Keywords: unauthorized access, airport security, Aviation, Biometric Recognition, Identification

Abstract

Airports are becoming increasingly vulnerable to impersonation and unauthorized access to designated areas by various cadres of employees due to the diversity of numbers and roles of airport employees. Unauthorized individuals can approach an aircraft or gain access to the airside by exploiting flaws in airport access control methods. Airport employee entry points are perhaps the weakest and most complex to access control. The study's problem is that many authorities have long attempted to improve security standards in the aviation industry through various means. While maintaining a secure aviation industry has always been a top priority, there has been a renewed focus on aviation security and safety since September 11, 2001. More than 77 percent of airports and 71 percent of airline security use biometric technology. In 2018, global biometric systems generated around $21.8 billion in revenue, which was used to advance airlines and airports. As a result, the goal of this study was to explore and implement the utilization of emerging biometric technology as a means to enhance the airport security measures at Jomo Kenyatta International Airport in Nairobi, Kenya. The specific objectives were to assess the effectiveness of biometric face recognition, evaluate the adoption and applications of biometric fingerprint identification system and examine the adoption and applications of automated passport control systems in enhancing Airport security in JKIA, Kenya. The study adopted a descriptive survey research approach with a target population of 1000 airport employees from various departments. Questionnaires were administered to a statistically meaningful sample size of 230 respondents and analyzed using descriptive and inferential statistics. Key informant interviews were also carried out to corroborate the findings from the questionnaires. The study findings reveal that biometric facial recognition technology is considered to have a significant effect on airport security with correlation of 0.569. Further, biometric fingerprint recognition is highly correlated to airport security with a coefficient of 0.541. Automated passport control had a significant effect on airport security with a correlation coefficient of 0.541. Moreover, the findings concluded that adopting both biometric fingerprint and automated passport control technologies would boost airport security. The study recommended that more efforts should be put on facial recognition technology as it is efficient in enhancing airport security. Further, the study recommended that the three technologies should be put together for better results.

Author Biographies

TRIZAH NZISA NZIOKA, Kenyatta University, Kenya

Master of Arts in Security Management and Policing Studies Student, Department Security, Diplomacy and Peace Studies, School of Law, Arts and Social Sciences

DUNCAN O. OCHIENG, PhD, Kenyatta University, Kenya

Lecturer

References

Abdelbary, A. M. (2011). Exploration of factors affecting adoption of biometric technology by five-star Egyptian hotel employees. Iowa State University.

Adam, A. M. (2020). Sample size determination in survey research. Journal of Scientific Research and Reports, 90-97.

Alameri, T., Hammood, M. N., Mezaal, J. K., & Eneizan, B. (2022). E-Payment Model For The Iraqi Public Sector: A Passport Issuance E-System. Journal Of Engineering Science And Technology, 17(1), 0435-0451.

Aleksander, I., Clarke, T. J. W., & Braga, A. P. (1994). Binary neural systems: combining weighted and weightless properties. Intelligent Systems Engineering, 3(4), 211-221.

Al-Raisi, A. N., & Al-Khouri, A. M. (2008). Iris recognition and the challenge of homeland and border control security in UAE. Telematics and Informatics, 25(2), 117-132.

Anderson, M. S., & Steneck, N. H. (2011, January). The problem of plagiarism. In Urologic Oncology: Seminars and Original Investigations (Vol. 29, No. 1, pp. 90-94). Elsevier.

Anderson, R. (2017). Placing the Nation: The Politics of Spatial Production at Auckland Airport and Wellington Airport. Journal of Pacific Archaeology–Vol, 10(2).

Arif, M., Xinquan, Z., Rahman, M., & Kumar, S. (2013). A predictive model of the critical undeformed chip thickness for ductile–brittle transition in nano-machining of brittle materials. International Journal of Machine Tools and Manufacture, 64, 114-122.

Bager, L., Elsbernd, A., Nissen, A., Daugaard, G., & Pappot, H. (2018). Danish translation and pilot testing of the European Organization for Research and Treatment of Cancer QLQ-TC 26 (EORTC QLQ-TC26) questionnaire to assess health-related quality of life in patients with testicular cancer. Health and Quality of Life Outcomes, 16(1), 1-6.

Black, S., &Daéid, N. N. (2018). 30-Second Forensic Science: 50 key topics revealing criminal investigation from behind the scenes, each explained in half a minute. Ivy Press.

Bustard, J. D., Carter, J. N., & Nixon, M. S. (2013). Targeted impersonation as a tool for the detection of biometric system vulnerabilities. In Biometrics: Theory, Applications and Systems (BTAS), 2013 IEEE Sixth International Conference. IEEE.

CBP. (2016). Preclearance Guidance Fy-2016-Final U.S. Customs And Border Protection [Online] Available From. Https://Www.Cbp.Gov/Document/Guidance/Preclearanceguidance-Fy-2016-Final. [22 February 2021].

Chan, S. H., & Lay, Y. F. (2018). Examining the reliability and validity of research instruments using partial least squares structural equation modeling (PLS-SEM). Journal of Baltic Science Education, 17(2), 239.

Clarke, R. V. (2017). “Situational” crime prevention: Theory and practice. In Crime Opportunity Theories (pp. 471-482). Routledge.

Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American sociological review, 588-608.

Coupe, T., & Blake, L. (2006). Daylight and darkness targeting strategies and the risks of being seen at residential burglaries. Criminology, 44(2), 431-464.

Crumpler, W. (2020). How Accurate are Facial Recognition Systems–and Why Does It Matter. Center for Strategic and International Studies, 14.

Del Rio, J. S., Moctezuma, D., Conde, C., de Diego, I. M., & Cabello, E. (2016). Automated border control e-gates and facial recognition systems. Computers & security, 62, 49-72.

Dillingham, G.L. (2003). Aviation Security: Progress Since September 11, 2001, and the Challenges Ahead. In J. Zellan (Ed.), Aviation Security: Current Issues and Development (pp. 1-21). New York: Nova Science, Inc.

Dos Santos, C. E., & Schwartz, W. R. (2014, August). Extending face identification to open-set face recognition. In 2014 27th SIBGRAPI Conference on Graphics, Patterns and Images (pp. 188-195). IEEE.

Dubey, R., Luo, Z., Gunasekaran, A., Akter, S., Hazen, B. T., & Douglas, M. A. (2018). Big data and predictive analytics in humanitarian supply chains: Enabling visibility and coordination in the presence of swift trust. The International Journal of Logistics Management.

El-Abed, M., Giot, R., Hemery, B., & Rosenberger, C. (2010, October). A study of users' acceptance and satisfaction of biometric systems. In 44th Annual 2010 IEEE International Carnahan Conference on Security Technology (pp. 170-178). IEEE.

Ferrara, M., Franco, A., & Maltoni, D. (2016). On the effects of image alterations on face recognition accuracy. In Face recognition across the imaging spectrum (pp. 195-222). Springer, Cham.

Flynn, M., Smitherman, H. M., Weger, K., Mesmer, B., Semmens, R., Van Bossuyt, D., & Tenhundfeld, N. L. (2021, April). Incentive Mechanisms For Acceptance And Adoption Of Automated Systems. In 2021 Systems And Information Engineering Design Symposium (Sieds) (Pp. 1-6). Ieee.

Hoge, J. F.  & Rose, G. (2010). How Did This Happen? Terrorism and the New War. New York: Public Affairs.

Jain, A. K., Arora, S. S., Cao, K., Best-Rowden, L., & Bhatnagar, A. (2016). Fingerprint recognition of young children. IEEE Transactions on Information Forensics and Security, 12(7), 1501-1514.

Kamau, P. M. K. D. P., & Mireri, C. (2016). Assessment Of the Security Preparedness And Adherence To International Civil Aviation Standards At Wilson Airport, Kenya.

Kant, C., & Nath, R. (2009). Reducing process-time for fingerprint identification system. International Journals of Biometric and Bioinformatics, 3(1), 1-9.

Kenya Airport Authority. KAA. (2018).

Kenya Vision 2030 Blueprint, 2009.

Khan, N., & Efthymiou, M. (2021). The Use of Biometric Technology At Airports: The Case Of Customs And Border Protection (Cbp). International Journal Of Information Management Data Insights, 1(2), 100049.

Kirschenbaum, A. A. (2013). The cost of airport security: The passenger dilemma. Journal of Air Transport Management, 30, 39-45.

KivutiNjeru, S., & Oboko, R. (2016). Comparative analysis of minutiae-based fingerprint matching algorithms. AIRCC's International Journal of Computer Science and Information Technology, 8(6), 59-71.

Kosmerlj, M., Fladsrud, T., Hjelmås, E., & Snekkenes, E. (2006, January). Face recognition issues in a border control environment. In International Conference on Biometrics (pp. 33-39). Springer, Berlin, Heidelberg.

Kramer, R. S., Mireku, M. O., Flack, T. R., & Ritchie, K. L. (2019). Face morphing attacks: Investigating detection with humans and computers. Cognitive research: principles and implications, 4(1), 1-15.

Kwakye, M. M., Boforo, H. Y., & Badzongoly, E. L. (2015). Adoption of Biometric Fingerprint Identification as an Accessible, Secured form of ATM Transaction Authentication. International Journal of Advanced Computer Science and Applications, 6(10), 253-265.

Lai, X., & Rau, P. L. P. (2021). Has facial recognition technology been misused? A public perception model of facial recognition scenarios. Computers in Human Behavior, 124, 106894.

Lazarick, R. (1998, June). Airport Vulnerability Assessment: An Analytical Approach. Proceedings of the NDIA Security Technology Symposium, pg: 218- 226.

Lee, G., Hollinger, R. C., & Dabney, D. A. (1999). The relationship between crime and private security at US shopping centers. American Journal of Criminal Justice, 23(2), 157-177.

Lombardi, S., Saragih, J., Simon, T., & Sheikh, Y. (2018). Deep appearance models for face rendering. ACM Transactions on Graphics (TOG), 37(4), 1-13.

Lyal, C. H., & Miller, S. E. (2020). Capacity of United States federal government and its partners to rapidly and accurately report the identity (taxonomy) of non-native organisms intercepted in early detection programs. Biological Invasions, 22(1), 101-127.

Lyamin, A. V., & Cherepovskaya, E. N. (2016). An approach to biometric identification by using low-frequency eye tracker. IEEE Transactions on Information Forensics and Security, 12(4), 881-891.

Madara, D. J. A., Okeyo, G., & Kimwele, M. (2017). A Fingerprint &Pin Authentication to Enhance Security At The Automatic Teller Machines.

Maheswari, S. U., & Chandra, E. (2013). An Efficient Fingerprint Denoiser for Fingerprint Recognition. International Journal of Computer Applications, 66(22).

Makrushin, A., Neubert, T., & Dittmann, J. (2019). Humans Vs. Algorithms: Assessment of Security Risks Posed by Facial Morphing to Identity Verification at Border Control. In VISIGRAPP (4: VISAPP) (pp. 513-520).

Mandala, M. (2016). Terrorist assassinations: a criminological perspective. The handbook of the criminology of terrorism, 353.

Menzel, D., & Hesterman, J. (2018). Airport security threats and strategic options for mitigation. Journal of Airport Management, 12(2), 118-131.

Milivojevic, S. (2019). Border Policing and Security Technologies: Mobility and Proliferation of Borders in the Western Balkans. Routledge.

Miltgen, C. L., Popovič, A., & Oliveira, T. (2013). Determinants of end-user acceptance of biometrics: Integrating the “Big 3” of technology acceptance with privacy context. Decision support systems, 56, 103-114.

Mohsin, A. H., Zaidan, A. A., Zaidan, B. B., Albahri, A. S., Albahri, O. S., Alsalem, M. A., & Mohammed, K. I. (2018). Real-time remote health monitoring systems using body sensor information and finger vein biometric verification: A multi-layer systematic review. Journal of medical systems, 42(12), 238.

Mugenda, O., & Mugenda, A. (2003). Research methods: Quantitative and qualitative approaches. 2nd. Rev. Ed. Nairobi.

Negri, N. A. R., Borille, G. M. R., & Falcão, V. A. (2019). Acceptance of biometric technology in airport check-in. Journal of Air Transport Management, 81, 101720.

Odhiambo, C. (2019). Use of Passenger Profiling to Enhance Aviation Security in Kenya (Doctoral dissertation, United States International University-Africa).

Patel, H., & Asrodia, P. (2012). Employee Attendance Management System Using Fingerprint Recognition. International Journal of Electrical, Electronics and Computer Engineering, 1(1), 37-40.

Perry, S. C. (2014). What are your airport access control’s weak links? LCN. http://www.lcnclosers.com/Whats_new_10_10_03.asp.

Plonsky, L., & Derrick, D. J. (2016). A meta‐analysis of reliability coefficients in second language research. The Modern Language Journal, 100(2), 538-553.

Putra, B. H., & Arifin, R. (2020). The Adoption Of Border Technology Of Immigration Control And Autogates In Indonesia. Sintech (Science And Information Technology) Journal, 3(2), 137-148.

Ramos, A. P., Gustafsson, O., Labert, N., Salecker, I., Nilsson, D. E., &Averof, M. (2019). Analysis of the genetically tractable crustacean Parhyalehawaiensis reveals the organisation of a sensory system for low-resolution vision. BMC biology, 17(1), 1-19.

Robertson, D. J., Mungall, A., Watson, D. G., Wade, K. A., Nightingale, S. J., & Butler, S. (2018). Detecting morphed passport photos: A training and individual differences approach. Cognitive research: principles and implications, 3(1), 1-11.

Roncek, D. W., & Maier, P. A. (1991). Bars, blocks, and crimes revisited: Linking the theory of routine activities to the empiricism of “hot spots”. Criminology, 29(4), 725-753.

Ros, T., Enriquez-Geppert, S., Zotev, V., Young, K. D., Wood, G., Whitfield-Gabrieli, S., ... & Thibault, R. T. (2020). Consensus on the reporting and experimental design of clinical and cognitive-behavioural neurofeedback studies (CRED-nf checklist).

Roth, P. L., & Craig, A. (1998). Response rates in HRM/OB survey research: Norms and correlates, 1990–1994. Journal of management, 24(1), 97-117.

Sagawa, T., Murakami, T., Kano, T., Ito, W., Nakayama, M., & Ote, I. (2016). Integrated Physical Security Platform Concept Meeting More Diverse Customer Needs. Hitachi Review, 65(8), 353.

Schwarz, F., Schwarz, K., & Creutzburg, R. (2021). Improving Detection of Manipulated Passport Photos-Training Course for Border Control Inspectors to Detect Morphed Facial Passport Photos-Part I: Introduction, State-of-the-Art and Preparatory Tests and Experiments. Electronic Imaging, 2021(3), 136-1.

Sidiropoulos, G. K., & Papakostas, G. A. (2021, May). Machine Biometrics-Towards Identifying Machines in a Smart City Environment. In 2021 IEEE World AI IoT Congress (AIIoT) (pp. 0197-0201). IEEE.

Siyal, A. A., Junejo, A. Z., Zawish, M., Ahmed, K., Khalil, A., &Soursou, G. (2019). Applications of blockchain technology in medicine and healthcare: Challenges and future perspectives. Cryptography, 3(1), 3.

Siyal, A. A., Shamsuddin, M. R., Rabat, N. E., Zulfiqar, M., Man, Z., & Low, A. (2019). Fly ash based geopolymer for the adsorption of anionic surfactant from aqueous solution. Journal of Cleaner Production, 229, 232-243.

Smith, M. J., & Clarke, R. V. (2012). Situational crime prevention: Classifying techniques using “good enough” theory. The Oxford handbook of crime prevention, 291-315.

Smith, W. R., Frazee, S. G., & Davison, E. L. (2000). Furthering the integration of routine activity and social disorganization theories: Small units of analysis and the study of street robbery as a diffusion process. Criminology, 38(2), 489-524.

Tassabehji, R., & Kamala, M. A. (2009, December). Improving e-banking security with biometrics: Modelling user attitudes and acceptance. In 2009 3rd International Conference on New Technologies, Mobility and Security (pp. 1-6). IEEE.

Teodorović, S. (2016). The role of biometric applications in air transport security. Nauka, bezbednost, policija, 21(2), 139-158.

Trockel, M., Bohman, B., Lesure, E., Hamidi, M. S., Welle, D., Roberts, L., & Shanafelt, T. (2018). A brief instrument to assess both burnout and professional fulfillment in physicians: reliability and validity, including correlation with self-reported medical errors, in a sample of resident and practicing physicians. Academic Psychiatry, 42(1), 11-24.

Uchenna, C. P., Pascal, A., & Prince, O. (2018). Evaluation of a Fingerprint Recognition Technology for a Biometric Security System. American Journal of Computer Science and Technology, 1(4), 74-84.

Watson, R. (2015). Quantitative research. Nursing Standard (2014+), 29(31), 44.

Weisburd, D., Bushway, S., Lum, C., & Yang, S. M. (2004). Trajectories of crime at places: A longitudinal study of street segments in the city of Seattle. Criminology, 42(2), 283-322.

Westlake, B., Bouchard, M., & Frank, R. (2017). Assessing the validity of automated webcrawlers as data collection tools to investigate online child sexual exploitation. Sexual Abuse, 29(7), 685-708.

Widdowson, D. (2007). The Changing Role of Customs: Evolution or Revolution. World Customs Journal, 1(1), 31-37.

Wojtaszek, M. (2018). What You Touch Is (Not) What You See. The Haptic Unconscious and Digital In-corporeality in the Airport Space. PrzeglądKulturoznawczy, 38(4), 536-549.

Worrall, J. L. (2000). The routine activities of maritime piracy. Security Journal, 13(4), 35-52.
Published
2023-11-04
Section
Articles