Tuesday, April 2, 2019

The Biometric Technology For Effective Payroll System

The Biometric Technology For Effective pay planing machine System payplane is one of a series of accounting transactions, dealing with the assist of compensable employees for services rendered, it is electronic softwargon, where t forbidden ensemble the employees study is recorded and captured. Companys experiences a sess of paysheet incision surgical incision pasquinadeulent returnring by utilizing this paysheet department department softw ar which affects the communitys capital referable to a high increased paysheet cost.Background and Motivation coin creation a valuable asset to the association, I confound elect to inquiry more(prenominal) on payroll and how plunder the effective trade protection measure department level be implemented to enhance the security on payroll by the put on of biometrics, as I believe in corporeal Attributes identification like finger prints, palm prints, and facial.To work on the security risks, biometrics technology (imp lemented in the ReCon Biometrics Keyless Identification Security System) uses material attributes to identify an soul. This solution is ideal because biometrics authentication does not assume the user to have any somebodyal entryway objects present or remember any fall disc all overwords. With ReCon Biometricss advanced facial recognition technology, we pot at a magazine overcome many problems that otherwise schemas have encountered in the past (Rogan, 2002). instead than using in- or soone identification because, as (Rogan, 2002) stated that in mortalal identification A Personal Identification Number (PIN) is another(prenominal)(prenominal)(prenominal) astray adopted means of authentication, and is a standard example that uses memorized passwords or pass codes. The advantage to this approach is that no physical means argon indispensable for authentication. However, this organisation still suffers from security risks if an un reliable individual gains access to an authorized users PIN. Further complications stinkpot arise when authorized users forget or fall back a PIN.Turner, a payroll specialist for a large Florida non-profit-making organization, was a sick man. Most employees who steal do so out of greed, but Turner had a different motive-he was HIV-positive and needed expensive drugs to curtail the disease. Turners duties complicated posting m and attention development to the enumerater scheme preparing payroll disbursement summaries. Adding and deleting employee master records were separate tasks, per material bodyed by another faculty member. As an additional safeguard, a supervisor approved all payroll disbursements, and the community deposited them estimately into employees personal bank accounts. When the coworker who added and deleted master records logged onto the scheme, Turner peeked over her shoulder and noted her user ID and password. This enabled him to add fake master records-for tinge employees to the system (Wells and Joseph, 2002). Where there is money to be made, double-tongued and unscrupulous individuals croup buzz off ways to bilk the system (Michaels, 1998).As with any monetary instrument, the key to success is prevention, and FIS continues to create new-fangled fraud prevention and observe tools as new trends develop (Mccann, 2008).A lot of money becomes wanting(p) and records organism edited because of unauthorized users who hack the payroll system or being able to retrieve the passwords into accessing the payroll system, so the purpose of this interrogation is to investigate the roots of hacking in the payroll so as to hap a lasting solution to it and eliminate ghost employees.It is intended that in this research a suitable biometric system get out be introduced providing great reliability and accountability, in severalise to enhance the security level of The INNOVATIONHUBS dignitary payroll and the staff.1.2 Problem statementPayroll encompasses every employee of a keep company who receives a regular wage or other compensation. near employees whitethorn be pay a steady salary objet dart others atomic number 18 paid for hours worked or the number of items produced. all(a) of these different payment methods atomic number 18 calculated by a payroll specialist utilizing a payroll system, and the appropriate pay plosive consonants argon issued.So for an employee to get their pay defy a time sheet is submitted so that the payroll specialist can capture the entropy on the time sheet example number of hours worked, and then compute the salary for the employee, so companies frequently use objective measuring tools such as time scorecards or timesheets completed by supervisors to determine the total substance of payroll due apiece pay period. Payroll system is an electronically softw ar that calculates employees salary.The problem is that when employees fill in their time sheets or timecards, they advantageously forge their attendance o f being present at work or working overtime knowing they did not, they do what is called blood brother punching which is when an employee punches a time card for another person. This is through with(p) by employees reason being earning more money, or earning money even though they did not work for it, because we all want to get our draws on money this affects the companys productivity and payroll cost.However payroll specialists easily get away with fraud because, inveterate solutions to the problem of enhancing security is individuation involve using systems that rely on what a legitimate user knows example, passwords or personal identification poetry or what a legitimate user possesses example , ID cards or keys.However, these methods atomic number 18 susceptible to fraud and security threats as they do not identify the person but precisely identify the information that is provided by that person (Gupta, 2008).Companies need to have an absolute institutionalise in the i ndividuality of their employees, customers, and partners that is, they be really who they say they are.Taylor Farm, a processing plant for capture produce, was incurring 20 percent of payroll cost due to buddy punching (Gupta, 2008).Kahn et al (200257) found that the System provides an automated, concentrate back end payroll service with a full-featured web-based payroll system. Both aspects of the system have access to a central selective informationbase, which includes, for example profile information on employers and employees timesheet, salary and hourly wage data employee benefit data and information regarding third-party providers and mixed payee.According to Krons (2010109), the YMCA was committed to preserveing its payroll in-house and was looking for a tensile and configurable system that would enable it to do so efficiently. With Kronos, they have been able to bed payroll processing time by 50 percent more often than not due to the automation of payroll data from th e time and attendance system into payroll. With more than 1,800 full- and part-time employees at 12 facilities across Ohio, many employees often perform multiple jobs in the same pay period. With Kronos, the YMCA is able to keep track of position management and ensure that payment is applied correctly. aft(prenominal) implementing a new time and attendance system for its labor intensive operation, Fantasy Cookie Co. has realized a 90% reduction in payroll errors and return on investment of one division (Hitchcock, 199370).Some of the motivations to change payroll frequencies include best practice or fabrication standards, possible future sale or acquisition, cost savings, union weigh conveyments, or even employee requests (20108).My intention is to find a way by means of biometrics systems to enhance the security level on high-up payroll at The Innovation Hub and observe employees presence at work.1.3.1 coatingThe primary goal of this study is to introduce Biometrics System fo r the security of VIP payroll at The Innovation Hub.1.3.2. ObjectivesTo investigate the security problems being encountered at the payroll and monitoring employees timesheet or timecards of the Innovation HubTo find out what is the security system applied in the payroll of the Innovation Hub.To research the use of Biometric technology as a security system in this company to solve the security problems discovered.1.3.3 Research questionsWhat are the security problems being encountered at the payroll of the Innovation Hub?What is the security system applied in the payroll of this organization?How does Biometric system can be applied to solve the security problems identified?1.3 ScopeThere are lead roles of payroll systems the first being the manual payroll system typically serves dispirited medium and macro enterprise (SMME), and all this is through by hand with a manual payroll system.Secondly being the In-house Payroll a company with up to 60 employees can benefit from a computer ized in-house payroll system.Thirdly is the external Service (outsourcing) company with more than 60 employees normally hiring an external payroll service. They are a separate firm that specializes in payroll processing.The instauration of the definition supplied by Justice Buckley is that in order for a fraud to exist a lie must be told and something tangible obtained by virtue of the operation of that lie on the forefront of the person receiving the information. That premise has been extended through gross usage and the media so that now fraud is referred to as the obtaining of property through any dishonest means. Those means do not necessarily include the telling of a lie and can include what is considered corrupt legal action by a person in authority (Jarrod 2006).There is no easy hollow for Social Security. No silver bullet or miracle accounting leave behind painlessly fix the problem posed by our 70-year-old national retreat system. At a recent meeting in Washington, D .C., the ABA Government relations Council reaffirmed a strategy first advocated by ABA in 1999. It calls for ABA to act as diligence spokesman for reform, work with Congress on a bipartisan basis and support the creation of personal privacy accounts those special accounts that would allow jr. workers to place a portion of their payroll taxes in private retirement accounts they manage themselves (Duke 200520).Swart (20025-15) found that the payroll systems are cumbersome and problematic, they require the use of a middleman payroll service to every locate or calculate and send the employees net pay data to the bank, which increases cost to the employer. These cost are ultimately passed on to the employees and public, such systems in addition do noteworthy amounts of time to acquire, transfer, translate and process all of the data needful to determine and distribute net pay to the employee, and employees are therefore forced to wait one or two weeks before even receiving their paychecks another disadvantage of the prior art payroll system is the use of centralized data processing for calculation of net pay, such as apply by ADP.The allegations ranged from accepting kickbacks, committing bank larceny against the Orleans Parish Credit Union, and beat and passing bad checks, to theft, income tax violations, insurance and mail fraud, as advantageously as extortion.6 With encouragement from State Superintendent Picard, the New York-based firm of Alvarez Marsal was selected in July 2005, by the Orleans Parish School Board and the Louisiana Department of Education, to guide and resolve the districts numerous systemic monetary improprieties.7 Employees of Alvarez Marsal immediately found significant payroll discrepancies estimated to cost the district approximately $12 million per year (Pamela Frazier 2008). Systems that lack a secured authorization detector can end up being history to the owners and costly.HIGH-PROFILE payroll problems have plagued a $ 25 million PeopleSoft ERP implementation in the Palm Beach County School District in Florida after just five months of operation.Since the Oracle Corp. software went live in July, there have been numerous instances of employees being underpaid or not paid at all, said Mike Guay, a Carlsbad, Calif.-based consultant hired in early September to help fix the problems. In many cases, the payroll errors have caused significant hardship to workers, added Sharon Barmory-Munley, president of thse local egotism- confidence of the field Conference of Firemen Oilers, a union representing more than 4,000 school district employees.In September, payroll problems prompted some 300 bus drivers to picket the school board. Other employees have complained to the U.S. Department of Labor, said Barmory-Munley (Barton, 1992).Its horrible, she said. Some batch cant pay their bills, mortgage payments are late, and theyve ruined their address. This is disastrous (Marc, 2006), this report shows how seri ous and harmful the system can get if not resolved in time. Payroll conduct Corp., a company that provided paycheck cashing services for about 100 incarnate clients, has gone bankrupt, and owner Robert Felzenberg has been accused of diverting customers funds to its own uses. Payroll Express bank, United Jersey Bank (Hackensack, NJ), is being sued by some Payroll Express customers for not monitoring the business more c fall away and for allegedly ignoring and glossing over Payroll Express troubles. The bank says the charges are without deservingness (Barton, 1992).Not all of the IT specialist do the right job or what they are suppose to do, you find IT hackers who can do anything to get their pass on on money, money being an object that everyone wants to get their hands on.A large local employer in a slender town had its office burglarized. Nothing appeared to be taken but there was some vandalism. The company assumed it was just some kids. A few days later, on a late Friday aft ernoon, a group of about 20 people with heavy accents came into the local bank and cashed payroll checks drawn on the local employer. On Saturday, the same 20 people went back to each of the bank branches again cashing more checks. It was then discovered that these checks were forged. The blank checks had been stolen during the break-in. load-bearing(a) or requiring businesses to use a Positive Pay System get out prevent these losses. When using Positive Pay, the business customer provides the banks computer with check numbers and amounts before providing the checks to recipients (Towle, 201017).There is no end to Queenslands payroll lacing with a report finding it will take another sise months to make critical fixes to the system and 18 months for it to be fully re-implemented.Queensland nurses and midwives were time lag for a formal response from the states health department after a report recommended sticking with the flawed system (2010-201115).No matter what industry an or ganization serves, there is one common element the customer. That customer can be external or natural. The key focus in having spirit be part of everyones job is to make sure customer order is the primary purpose of the organization. Everyone in the organization should know the customers and what they consider important. All functions accounting, payroll, information systems, engineering, sales play a role in how these customers take hold of the work. Tools such as customer survey psychoanalysis, best practice studies and publisher customer audits are used to determine what customers really want, as are graphs of customer complaints over a specific time period (Whitarcre, 2001).1.4 heartyThis study is very significant in the sense that there is a serious implication of financial security to the survival of any organization specially the InnovationHub.Electronic security has also become a world(prenominal) issue in the discourse of a virile Information System, while the b iometric system is a current security application of IT in the security system. The report of this work will also add to literature on the state of the art applications of IT study while the solution can be applied in all payroll systems.1.5 Key wordsPayroll, System, Access, Security, Biometric books reviewCompanies need to able to have absolute trust in the personal identity of the employees, that they are really who they say they are. cheat can occur in the payroll department in many ways. These can include (Journal of Trade, 2010)phantom employees being paidfraudulent additions to approved time recordsincreases in hourly ratespayments of commissions, bonuses, or incentives that are added to an employees normal paycheck rebate reversals that add to an employees net payillegal advanced earned income credit payments andChild support garnishments that are mailed to a custodial nourish but never deducted from a paycheck.Identification is a one-to-many matching process that ascertain s the existence of an individual in a database. This process merely determines that the person exists. If access control is predicated only on the existence of an individual, then the individual is given access to the system when the required identifier is found to exist in the access database. There is no confirmation or proof that the person who is given access is so the person who initiated the access procedure (Chandra Calderon, 2003).Everyone is a potential fraud, and only careful hiring and strong internal control are effective in preventing fraudulent to the organization (Seidman, 1985).Payroll accounting shows another area where authentication issues assume importance. The importance for effective authentication exists in at least three processes time-keeping and attendance records, pick-up of paychecks, and linking employees to specific tasks in the organization. terce broad categories of factors that organizations use for automated authentication-possession, knowledge, a nd biometrics. Authentication can be predicated on a single factor (e.g., a password, a PIN, or a picture ID) or on multiple factors (e.g., password and picture ID, or PIN and picture ID). Vertical movements within the benefit are associated with increases in the strength and focused nature of the authentication process. The likelihood that the verified identity is not that of the true owner also decreases with vertical movements in the pyramid (Chandra Calderon, 2003).The user must present a physical possession (such as a token or a key) to be authenticated. Though transparent and usually portable, possessions can be lost, stolen, shared, duplicated, forgotten, or destroyed. Possession-based authentication factors provide self-assertion that a user presents a valid token or card. inside the context of an automated authentication process, these factors do not provide direct assurance that a user who is allowed access into an information system is indeed the person he or she clai ms to be. In the second category, the user provides information about his/her knowledge (such as, password, or passphrase). Passwords and other knowledge authentication factors are highly portable, invisible (unless written down), can be changed often, and can be designed to be relatively secure. However, they can be forgotten, reused, stolen, guessed, or shared. Passwords crevice assurance that the person at the keyboard knows the password. They do not offer assurance that the person at the keyboard is indeed the person he/she purports to be (Chandra Calderon, 2003).Fraud in payrolls always involves over statement of the total of the payroll, and usually involves either (1986)Padding the payroll by including names of new employees before they started to work, or names of employees who have left, or names of men who are simply non-existent, or who exist but do not work for the company.Overstating payroll footings, carry forwards etcFailure to account for unclaimed wages, overpayme nts. Etc. ane private sector problem is what is called buddy punching which is when an employee punches a time card for another person. Taylor Farm, a processing plant for bagging produce, was incurring 20 percent of payroll cost due to buddy punching. (Gupta, 2008).People are our business and managing such a large workforce that operates on divers(a) client sites is a challenge. We recognized that a standard time and attendance system that could provide as many access methods for time on as possible biometric, internet, proximity, telephone yet could be managed both centrally and remotely, was an essential requirement for our business (Pollitt, 2008).The real cushion against fraud, however, is in the type of individual employed. This means concern not so much with an applicants skillful background, as with serviceman background. Things like his mode of hold , his loving habits, his family troubles, his financial stresses and strains all of these are vital in the fraud poten tial (Seidman, 1985).The gimmick foreman of a large chemical company is responsible for a maintenance crew of about fifty employees who include tradesmen and labourers. He is also responsible for the deployment of a large amount of tools and equipment for the repair and maintenance of the plant. The employees are permitted to work overtime. The foreman started his own handyman/small anatomical structure company specializing in week end work. To carry out this work he utilized the tools and equipment of his employer and the time for the labour of the employees engaged in this nefarious activity was paid for by the employer by way of overtime for working on the weekend. The foreman authorized their overtime cards, certifying they had worked the overtime for the company. Employees were paid for their work, but the foreman, who supercharged his private clients, did not have to pay any cost of the construction whatsoever.The foremans behaviour was such that he obtained a financial adv antage because hedid not have to pay for the labour of his workers or the tools and equipment he used onhis jobs. He was convicted of deceiving his employer into paying for the labour cost (Bowditch, 2006).The paymaster of a large technical company on the north shore was a trusted and valued employee until a co worker saw him driving a brand new Porsche on the week end. An investigation revealed that he had been systematically paying himself overtime at the rate of five times his regular salary. No subterfuge, he was just authorizing the payment to himself of more hours overtime than there are hours in the week. The fact that he could have got away with this brazen fraud for over twelve months showed a lack of any sort of control by management in the running of the company, and certainly no thought to fraud control (Bowditch, 2006).The state sales manager for a leading pot liquor distributor was offering the clients on his run a special can for cash. He was fulfilling the orders a nd obtaining the cash and writing an invoice and receipt from a curl up he had installed in the company computer which had a program to generating the invoices, improvement and stock upgrades. He got away with hundreds of thousands of dollars until a physical reconciliation was done between the stock and sales figures and the crime discovered (Bowditch, 2006).American businesses lose nearly $12 billion a year to check fraud, and small businesses are frequent victims of fraud artists, who consider them easy prey (Blackwood, 1998).Dont trust any person with money, always check on them and then check more.3. Theoretical frame workUsing Autopoietic possible action as a framework for biometricsAutopoiesis is a pseudo Greek word coined from (auto) for self and (poiesis) for creation, production or forming that was first introduced by theChilean biologists Humberto Maturana and Francisco Varela in 1973 to cite the type of phenomenon they had identified as a characteristic that distin guishes musical accompaniment systems from other types of systems. They claimed that living systems are autonomous entities that reproduce all their properties through their internal processes. Later on this term was introduced into companionable theory as well up as formal organization theory by Niklas Luhmann who claimed that social systems are systems of communication that emerge whenever an autopoietic communication cycle comes into being that is able to drivel itself out of a complex environment (Schatten, 2008).Luhman argues that there are three types of social systems societal, interactional as well as organizational. Any social system has its respective information subsystem described through their communicative processes. Systems that are not autopoietic (systems that produce something other than themselves) are considered to be allopoietic (technical) systems (Schatten, 2008).This is how the theory of Autopoietic will be applied to my research, the theory which represe nts a framework for describing complex non-linear and especially living systems is described in a context of biometric characteristics. It is argued that any living system by performing an internal process of reproducing its structural components yields physical biometric characteristics. Likewise any living system when structurally coupling to another (eventually allopoietic) system yields a behavioral or psychological characteristic of the living system (Schatten, 2008).It is revealed that a system that can be considered as autopoietic can potentially be measured, authenticated and or identified using biometric method, and then biometrics is appropriate to any autopoietic system it can be people, social systems, organizations as well as information systems.So biometric is a method of series, steps or activities conducted to practice biometric samples of some biometric feature usually to find the biometric features holder or a special feature of the biometric sample.A biometric te mplet or extracted structure is a quantity or set of quantities acquired by a conscious application of a biometric feature extraction or preprocessing method on a biometric sample. These templates are usually stored in a biometric database and used for reference during the recognition, training or enrolment processes of a biometric system (Schatten, 2008).The diagram below illustrates how the biometric technology will be intergrated with the payroll system, and this is how the autopoietic theory will be applied to my study.Diagram of payroll system merged with sword lily biometric deviceBack up a data messageThe time sheet detail is captured in the payroll system.Time sheet (time in and out) about the employee is recorded.Employee beholds his or her Iris in the iris scan device.The payroll specialist forwards the employees paycheck, using timesheet information from the captured payroll.Paycheck is transferred by the finance department to the employees accounts.4. MethodologyThis is an exploratory research because it is the goal of formulating problems more precisely, clarifying concepts, gathering explanations, gaining insight, eliminating impractical ideas, and forming hypotheses.The method of data collection that I will use is qualitative method as it is used when a question needs to be described and investigation in some depth, or examining the meaning of an experience (Shields and Twycross).How I will compile my research I will seek to call into question those who are knowledgeable and who great power be able to provide insight concerning the payroll system and monitoring of time sheets to allege employees presence at work.I will interview 20% of the staff members and all the staff at the finance department and the payroll specialist, I will use audio tapes for recording my interviews and a method of transcripts of conversation.Some of the questions Ill ask the staff membersDo you use any type of access to enter into your office or the grammatical construction of the company?What monitors your presence at work?Do you submit every week or monthly time sheet?Who witness the time sheet?Some of the questions Ill ask the payroll departmentWhat attributes or information do you need to capture for a new employee?How do you negociate information of ex employee?When do you do roll over of the payroll?How are different leaves captured?Some of the questions Ill ask the finance departmentWhen do the employees receive their pay check?How do you monitor costs of payroll, after how long?Im going to carry out my research at The Innovation Hub focusing on their VIP payroll system, time sheets and the clocking in and clocking out of work method used.This is a instruct introduction of my solution frameworkBiometrics refers to the process of automatically recognizing a living person using his or her distinguishing, measurable traits. Biometric systems identify the person rather that what the person has (like ID cards) or what they remember (l ike passwords). The term biometric refers to the statistical analysis of biological phenomena and measurements and has been widely used to describe technologies used for personal identity management (Gupta, 2008).Biometrics technology uses rum, measureable, human characteristics to automatically recognize and verify an individuals identity.Biometrics can measure both physiological and behavioural characteristics. physiologic biometrics is based on precise and accurate measurements of unique features of the human body, and includesFinger scan which matches the minutiae, pattern, ultrasonic or moir fringe imprint, most common of all devices (Chandra Calderon, 2003).Facial scan is designed primarily to find cockeyed matches of particular facial features such as eyes, nose, mouth, cheekbones, chin, and forehead against a database of silent facial shows (Clodfelter, 2010).Iris scan technology relies on the distinctly dreary ring that surrounds the pupil of the eye. Irises have appr oximately 266 distinctive characteristics, including a trabeculate meshwork, striations, rings, furrows, a corona, and freckles. Typically, about 173 of these distinctive characteristics are used in creating the template. Irises form during the eighth month of pregnancy and are thought to remain still throughout an individuals life, barring injury (Rosenzweig, 2004).Retina scan a digital image of the retina of the eye is created to match the pattern against a live sample, scanning done by low-intensity light via an optical coupler (Chandra Calderon, 2003).Hand geometry relies on measurements of the width, height, and aloofness of the fingers, distances between joints, and the shape of knuckles (Rosenzweig, 2004).Behavioral biometrics (based on measurements and data derived from an action) includeVoice recognition measures the wavelengths and frequencies of the voice (Chandra Calderon, 2003).Signature recognition traditionalistic device, a behavioural device, it checks the way a person signs his or her name, and writes garner (Chandra Calderon, 2003).Keystroke recognition a behaviourable biometric device, it measures the force applied and the pattern used to knife thrust keys on a keyboard (Chandra Calderon, 2003).I will be utilizing the iris biometric system becauseIris recognition technology is relatively easy to use and can process large numbers of people quickly. The iris is the most unique identifier on the human body. It is the most reliable form of biometrics. Iris patterns are unique and stable, even over a long period of time. Furthermore, iris scanning and recognition systems are very user-friendly. Less intrusive than retina scan, higher(prenominal) matching performance, works well with glasses, across ethnic groups.Biometrics

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.