{"id":3943,"date":"2015-02-16T05:35:07","date_gmt":"2015-02-16T10:35:07","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=3943"},"modified":"2022-11-16T03:14:13","modified_gmt":"2022-11-16T08:14:13","slug":"importance-using-biometrics-eliminate-ghost-worker-fraud","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/","title":{"rendered":"The Importance of Using Biometrics to Eliminate Ghost Worker Fraud"},"content":{"rendered":"<p>Ghost worker fraud has been a chronic problem for many governments across the globe for many years. For most of these countries, billions of tax payer dollars are pumped out annually from the government treasury through salary payments to non-existing employees who have fraudulently been listed in the payroll system. Some of these employees may include retired civil servants, the deceased or pure fictitious names. One major reason behind the rise in unqualified, non-eligible individuals is the absence of accountability which allows corrupted civil servants to manipulate government expenditures through the placement of ghost workers on the payroll. As more governments around the world try to figure out a solution to the ghost worker issue, many are adopting <strong><a title=\"Biometrics for identification of employees\" href=\"https:\/\/www.m2sys.com\/rightpunch-biometric-time-clock\/?utm_source=eliminate%20ghost%20worker&amp;utm_medium=blog%20post&amp;utm_campaign=blog\" target=\"_blank\" rel=\"noopener noreferrer\">biometrics for identification of employees<\/a><\/strong> &#8212; a perfect tool for establishing accountability.<\/p>\n<h2>What is &#8220;Ghost Worker Fraud&#8221;?<\/h2>\n<p>A ghost employee is someone who is recorded on the <strong><a href=\"https:\/\/www.m2sys.com\/blog\/workforce-management\/do-biometrics-ensure-efficient-payroll-processing\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=efficient%20payroll%20processing\">payroll system<\/a><\/strong> but who does not work for the organization. The ghost can be a real person who knowingly or not is placed on the payroll, or a fictitious person invented by the fraudster.<\/p>\n<h2>How Is It Done?<\/h2>\n<p>There are three basic steps to ghost worker fraud. These are:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3945 size-medium\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/02\/ghost-worker-steps-300x167.png\" alt=\"ghost-worker-steps\" width=\"300\" height=\"167\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/02\/ghost-worker-steps-300x167.png 300w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/02\/ghost-worker-steps-606x338.png 606w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/02\/ghost-worker-steps.png 667w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<h2>The Effects of Ghost Worker Fraud<\/h2>\n<p>Ghost worker fraud is government theft. Individually, the amounts may appear small but over time they may add up to a significant amount, particularly if a number of ghosts are added and retired over time. Here are some stats on <strong><a href=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/eliminating-ghost-workers-biometric-identification-management\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=ghost%20identification%20management\">Ghost workers<\/a><\/strong> around the globe:<\/p>\n<ul>\n<li>According to the <em>Association of Certified Fraud Examiners<\/em>, in the U.S. it\u2019s the number one source of accounting fraud and employee theft.\u00a0(<strong><a title=\"In the U.S. it\u2019s the number one source of accounting fraud and employee theft\" href=\"https:\/\/www.forbes.com\/sites\/matthewgarrett\/2013\/09\/10\/payroll-fraud-a-big-threat-and-how-to-avoid-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">Source<\/a><\/strong>)<\/li>\n<li>In Cameroon &#8220;ghost workers&#8221; are believed to cost the country $12 million every month.<\/li>\n<li>A recent biometric auditing in the federal ministries of Nigeria, departments and agencies (MDAs) revealed 43,000 non-existent workers on the government payroll.<\/li>\n<li>In Kenya, a 2014 audit found that at least $1m (\u00a3600,000) a month was lost in payments to &#8220;ghost workers&#8221;.<\/li>\n<li>In Ghana 10 percent of the total amount spent on the salaries of both civil and public servants are lost every month through the insertion of ghost names on workers&#8217; payrolls.<\/li>\n<\/ul>\n<h2>How can biometric technology help eliminate ghost workers?<\/h2>\n<div align=\"center\"><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/qZo0vvgf8M0?rel=0&amp;showinfo=0\" width=\"560\" height=\"315\" frameborder=\"0\"><\/iframe><small style=\"font-size: 12px; font-style: italic; display: block; text-align: center;\">Affordable Biometric Time Clock Software<\/small><\/div>\n<p>The main advantages of using a biometric system is that it identifies a person by who the person is rather than what the person has, unlike most traditional authorization systems such as personal identification numbers (PINs), passwords, or ID cards. Unlike these solutions that rely on \u201cwhat you have,\u201d biometric credentials such as a <strong><a href=\"https:\/\/www.m2sys.com\/easyscan-optical-fingerprint-reader\/?utm_source=blog&amp;utm_medium=m2sys&amp;utm_campaign=easyscan\">fingerprint<\/a><\/strong>, finger vein, palm vein or <strong><a href=\"https:\/\/www.m2sys.com\/m2-auto-tilt-iris-recognition-camera\/?utm_source=blog&amp;utm_medium=m2sys&amp;utm_campaign=autotilt\">iris <\/a><\/strong>image cannot be lost, forgotten, guessed, or easily cloned.<\/p>\n<p>By utilizing a <strong><a title=\"Biometric identification\" href=\"https:\/\/www.m2sys.com\/rightpunch-biometric-time-clock\/?utm_source=eliminate%20ghost%20worker&amp;utm_medium=blog%20post&amp;utm_campaign=blog\" target=\"_blank\" rel=\"noopener noreferrer\">biometric identification<\/a><\/strong> system to eliminate ghost workers, governments and business organization employees can be uniquely identified, virtually eliminating duplicate registration in any form and eradicating ghost worker <strong><a href=\"https:\/\/www.m2sys.com\/blog\/workforce-management\/how-does-a-fingerprint-time-clock-eliminate-time-and-attendance-fraud\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=fingerprint%20time%20clock\">payroll fraud<\/a><\/strong> plus help establish accountability and punctuality among employees.<\/p>\n<p>Some of the benefits of using biometric technology include:<\/p>\n<ul>\n<li>Biometric identification eliminates fake employee registration into the payroll system.<\/li>\n<li>If <strong><a title=\"Biometric attendance\" href=\"https:\/\/www.m2sys.com\/rightpunch-biometric-time-clock\/?utm_source=eliminate%20ghost%20worker&amp;utm_medium=blog%20post&amp;utm_campaign=blog\" target=\"_blank\" rel=\"noopener noreferrer\">biometric attendance<\/a><\/strong> is implemented, the chance of fake time sheets or <strong><a href=\"https:\/\/www.m2sys.com\/blog\/workforce-management\/eliminate-buddy-punching-with-biometrics\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=eliminate%20bp\">buddy punching<\/a><\/strong> will reduce to nearly 0%.<\/li>\n<li>During salary and benefit distribution, biometric identification ensures accurate disbursement to the right employee.<\/li>\n<li>Biometric identification creates concrete audit trails for employee punctuality which in turn improves service quality.<\/li>\n<li>With ghost workers eliminated, governments and organizations will start generating higher return on investments (ROI).<\/li>\n<\/ul>\n<h2>Success stories of using biometrics for employee identification<\/h2>\n<p>As governments across the world are increasingly adopting biometric technology, more and more success stories are unfolding that demonstrate its effectiveness:<\/p>\n<ul>\n<li><strong>Kenya<\/strong>: The Kenyan government adopted biometric registration of employees and it uncovered 12,500 \u2018ghost workers\u2019 that failed to show up for a headcount. Only 160,012 employees out of the expected 172,522 showed up with their supporting papers. (<strong><a title=\"Only 160,012 employees out of the expected 172,522 showed up with their supporting papers\" href=\"https:\/\/www.planetbiometrics.com\/article-details\/i\/2414\/\" target=\"_blank\" rel=\"noopener noreferrer\">Source<\/a><\/strong>)<\/li>\n<li><strong>Nigeria<\/strong>: In Nigeria the government used fingerprint based biometric identification to eliminate an astonishing 43,000 ghost workers from the public payroll, for a savings of more than $75 million dollars. (<strong><a title=\"Eliminate an astonishing 43,000 ghost workers\" href=\"https:\/\/www.slate.com\/articles\/technology\/future_tense\/2011\/12\/how_biometric_ids_like_iris_scans_will_help_developing_countries_fight_corruption_and_bust_fake_workers_.html\" target=\"_blank\" rel=\"noopener noreferrer\">Source<\/a><\/strong>)<\/li>\n<li><strong>Liberia<\/strong>: Liberia\u2019s successful\u00a0switch to biometric identification for paying civil service employees saved the government $4 million annually. (<strong><a title=\"Liberia\u2019s successful switch to biometric identification for paying civil service employees saved the government $4 million annually.\" href=\"https:\/\/www.slate.com\/articles\/technology\/future_tense\/2011\/12\/how_biometric_ids_like_iris_scans_will_help_developing_countries_fight_corruption_and_bust_fake_workers_.html\" target=\"_blank\" rel=\"noopener noreferrer\">Source<\/a><\/strong>)<\/li>\n<li><strong>Malawi<\/strong>: Malawi is saving $2 million a month after abandoning cash salary payments. (<strong><a title=\"Malawi is saving $2 million a month after abandoning cash salary payments\" href=\"https:\/\/www.slate.com\/articles\/technology\/future_tense\/2011\/12\/how_biometric_ids_like_iris_scans_will_help_developing_countries_fight_corruption_and_bust_fake_workers_.html\" target=\"_blank\" rel=\"noopener noreferrer\">Source<\/a><\/strong>)<\/li>\n<li><strong>India<\/strong>: Within a week of introducing the system, employee attendance has zoomed up to 96 per cent from the earlier 60-70 per cent in some states. (<strong><a title=\"Employee attendance has zoomed up to 96 per cent from the earlier 60-70 per cent\" href=\"https:\/\/www.business-standard.com\/article\/economy-policy\/biometric-attendance-system-yields-good-result-in-uttarakhand-114090901415_1.html\" target=\"_blank\" rel=\"noopener noreferrer\">Source<\/a><\/strong>)<\/li>\n<\/ul>\n<p>All of these successes prove the importance of implementing <strong><a href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/future-ecommerce-strategy\/?utm_source=blog&amp;utm_medium=guest%20blog%20post&amp;utm_campaign=biometrics%20for%20ecommerce\">biometric technology<\/a><\/strong> to establish accountability and punctuality.<\/p>\n<h2>Conclusion<\/h2>\n<p>The problem of ghost workers is that they are often the main source of corruption in many countries. It\u2019s not easy to eradicate ghost workers without establishing accountability and a sense of punctuality among employees. Biometric technology can be the perfect tool to establish this and provide a cure to the chronic disease of \u201cghost worker fraud.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ghost worker fraud has been a chronic problem for many governments across the globe for many years. For most of<\/p>\n","protected":false},"author":383,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Ghost Worker","_yoast_wpseo_title":"Biometrics to Eliminate Ghost Workers Fraud","_yoast_wpseo_metadesc":"Governments around the world are adopting biometric to establish accountability and eliminate ghost worker fraud.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[1834],"tags":[39,548,547,549,15],"class_list":["post-3943","post","type-post","status-publish","format-standard","hentry","category-workforce-management","tag-biometric","tag-eliminate-ghost-worker","tag-ghost-worker","tag-ghost-worker-fraud","tag-time-and-attendance"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometrics to Eliminate Ghost Workers Fraud<\/title>\n<meta name=\"description\" content=\"Governments around the world are adopting biometric to establish accountability and eliminate ghost worker fraud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometrics to Eliminate Ghost Workers Fraud\" \/>\n<meta property=\"og:description\" content=\"Governments around the world are adopting biometric to establish accountability and eliminate ghost worker fraud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-16T10:35:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-16T08:14:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/02\/ghost-worker-steps-300x167.png\" \/>\n<meta name=\"author\" content=\"Matthew Bennett\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthew Bennett\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/\"},\"author\":{\"name\":\"Matthew Bennett\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4ee8a06d75140a7a10ac2b0f02c5e792\"},\"headline\":\"The Importance of Using Biometrics to Eliminate Ghost Worker Fraud\",\"datePublished\":\"2015-02-16T10:35:07+00:00\",\"dateModified\":\"2022-11-16T08:14:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/\"},\"wordCount\":792,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"biometric\",\"eliminate ghost worker\",\"ghost worker\",\"ghost worker fraud\",\"time and attendance\"],\"articleSection\":[\"Workforce Management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/\",\"name\":\"Biometrics to Eliminate Ghost Workers Fraud\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2015-02-16T10:35:07+00:00\",\"dateModified\":\"2022-11-16T08:14:13+00:00\",\"description\":\"Governments around the world are adopting biometric to establish accountability and eliminate ghost worker fraud.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"The Importance of Using Biometrics to Eliminate Ghost Worker Fraud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4ee8a06d75140a7a10ac2b0f02c5e792\",\"name\":\"Matthew Bennett\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg\",\"caption\":\"Matthew Bennett\"},\"description\":\"The author leads the digital marketing team at M2SYS Technology and an occasional blogger. He is passionate about writing various government and enterprise biometric identity management technology adoption related topics and the changes it brings on the general people\u2019s lives.\",\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/shaon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometrics to Eliminate Ghost Workers Fraud","description":"Governments around the world are adopting biometric to establish accountability and eliminate ghost worker fraud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/","og_locale":"en_US","og_type":"article","og_title":"Biometrics to Eliminate Ghost Workers Fraud","og_description":"Governments around the world are adopting biometric to establish accountability and eliminate ghost worker fraud.","og_url":"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2015-02-16T10:35:07+00:00","article_modified_time":"2022-11-16T08:14:13+00:00","og_image":[{"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/02\/ghost-worker-steps-300x167.png"}],"author":"Matthew Bennett","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Matthew Bennett","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/"},"author":{"name":"Matthew Bennett","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4ee8a06d75140a7a10ac2b0f02c5e792"},"headline":"The Importance of Using Biometrics to Eliminate Ghost Worker Fraud","datePublished":"2015-02-16T10:35:07+00:00","dateModified":"2022-11-16T08:14:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/"},"wordCount":792,"commentCount":1,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["biometric","eliminate ghost worker","ghost worker","ghost worker fraud","time and attendance"],"articleSection":["Workforce Management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/","url":"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/","name":"Biometrics to Eliminate Ghost Workers Fraud","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2015-02-16T10:35:07+00:00","dateModified":"2022-11-16T08:14:13+00:00","description":"Governments around the world are adopting biometric to establish accountability and eliminate ghost worker fraud.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/workforce-management\/importance-using-biometrics-eliminate-ghost-worker-fraud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"The Importance of Using Biometrics to Eliminate Ghost Worker Fraud"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4ee8a06d75140a7a10ac2b0f02c5e792","name":"Matthew Bennett","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg","caption":"Matthew Bennett"},"description":"The author leads the digital marketing team at M2SYS Technology and an occasional blogger. He is passionate about writing various government and enterprise biometric identity management technology adoption related topics and the changes it brings on the general people\u2019s lives.","url":"https:\/\/www.m2sys.com\/blog\/author\/shaon\/"}]}},"modified_by":"Stanly Palma","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3943"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/383"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=3943"}],"version-history":[{"count":19,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3943\/revisions"}],"predecessor-version":[{"id":16590,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3943\/revisions\/16590"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=3943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=3943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=3943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}