{"id":13857,"date":"2005-08-03T06:08:03","date_gmt":"2005-08-03T10:08:03","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=13857"},"modified":"2022-06-20T05:56:19","modified_gmt":"2022-06-20T09:56:19","slug":"biometric-identification-and-human-factor-engineering","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/","title":{"rendered":"Biometric Identification and Human Factor Engineering"},"content":{"rendered":"<p><iframe loading=\"lazy\" title=\"Biometric Identification and Human Factor Engineering\" width=\"800\" height=\"600\" src=\"https:\/\/www.youtube.com\/embed\/Y6IzO7cFwa0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<hr \/>\n<p>Human factor engineering plays a vital role in the success of modern biometric identification deployments. Biometric technology vendors have a greater need to study the intersection of people, technology, policy, and work across multiple domains using an interdisciplinary approach that drew from cognitive psychology, organizational psychology, human performance, industrial engineering, and economic theory to design and implement biometric systems that are acceptable and successful in a commercial environment.<\/p>\n<p>Successful commercial biometric technology deployments that achieve the goals they are designed to accomplish tend to be constructed based upon the body of knowledge about human abilities and characteristics that are relevant to design and the application of this knowledge to the design of systems for safe, comfortable employee use. Identical governmental biometric systems simply can&#8217;t be automatically used in a commercial environment and companies that excel in human factor engineering will continue to be the leaders in biometric technology innovation.<\/p>\n<hr \/>\n<a href=\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/how-medical-identity-theft-can-affect-patients-and-physicians\/\" rel=\"prev\">Next Video: How Medical Identity Theft Can Affect Patients and Physicians &raquo;<\/a><br>\r\n<a href=\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/m2sys-m2-twoprint-dual-fingerprint-reader-training-video\/\" rel=\"next\">&laquo; Previous Video: M2SYS M2-TwoPrint Dual Fingerprint Reader Training Video<\/a>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"youtube-link\" youtubeid=\"Y6IzO7cFwa0\"><img decoding=\"async\" alt=\"Biometric Identification and Human Factor Engineering\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/custom-img\/videos-on-biometrics-thumbs\/Biometric-Identification-and-Human-Factor-Engineering.jpg\"><\/span><\/p>\n","protected":false},"author":413,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[54],"tags":[],"class_list":["post-13857","post","type-post","status-publish","format-standard","hentry","category-biometric-resources"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometric Identification and Human Factor Engineering - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometric Identification and Human Factor Engineering - Digital Transformation of Government Services\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2005-08-03T10:08:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-20T09:56:19+00:00\" \/>\n<meta name=\"author\" content=\"Abu Baker Siddique\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Abu Baker Siddique\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/\"},\"author\":{\"name\":\"Abu Baker Siddique\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/dc7d299a1c6095a8a13b043897fc97e7\"},\"headline\":\"Biometric Identification and Human Factor Engineering\",\"datePublished\":\"2005-08-03T10:08:03+00:00\",\"dateModified\":\"2022-06-20T09:56:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/\"},\"wordCount\":167,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Biometric Resources\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/\",\"name\":\"Biometric Identification and Human Factor Engineering - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2005-08-03T10:08:03+00:00\",\"dateModified\":\"2022-06-20T09:56:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Biometric Identification and Human Factor Engineering\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/dc7d299a1c6095a8a13b043897fc97e7\",\"name\":\"Abu Baker Siddique\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0e02f80239ae23aef958f279ab99f192?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0e02f80239ae23aef958f279ab99f192?s=96&d=mm&r=g\",\"caption\":\"Abu Baker Siddique\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/abubaker\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometric Identification and Human Factor Engineering - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/","og_locale":"en_US","og_type":"article","og_title":"Biometric Identification and Human Factor Engineering - Digital Transformation of Government Services","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2005-08-03T10:08:03+00:00","article_modified_time":"2022-06-20T09:56:19+00:00","author":"Abu Baker Siddique","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Abu Baker Siddique","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/"},"author":{"name":"Abu Baker Siddique","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/dc7d299a1c6095a8a13b043897fc97e7"},"headline":"Biometric Identification and Human Factor Engineering","datePublished":"2005-08-03T10:08:03+00:00","dateModified":"2022-06-20T09:56:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/"},"wordCount":167,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Biometric Resources"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/","name":"Biometric Identification and Human Factor Engineering - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2005-08-03T10:08:03+00:00","dateModified":"2022-06-20T09:56:19+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometric-identification-and-human-factor-engineering\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Biometric Identification and Human Factor Engineering"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/dc7d299a1c6095a8a13b043897fc97e7","name":"Abu Baker Siddique","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0e02f80239ae23aef958f279ab99f192?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0e02f80239ae23aef958f279ab99f192?s=96&d=mm&r=g","caption":"Abu Baker Siddique"},"url":"https:\/\/www.m2sys.com\/blog\/author\/abubaker\/"}]}},"modified_by":"Collin Williams","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13857"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/413"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=13857"}],"version-history":[{"count":2,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13857\/revisions"}],"predecessor-version":[{"id":17860,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13857\/revisions\/17860"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=13857"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=13857"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=13857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}