Chapter 7: Q16E (page 398)
Authorizing computer users with palm prints. Access to computers, email, and Facebook accounts is achieved via a password鈥攁 collection of symbols (usually letters and numbers) selected by the user. One problem with passwords is that persistent hackers can create programs that enter millions of combinations of symbols into a target system until the correct password is found. An article in IEEE Pervasive Computing (October-December 2007) investigated the effectiveness of using palm prints to identify authorized users. For example, a system developed by Palmguard, Inc. tests the hypothesis
\({H_0}\): The proposed user is authorized
\({H_a}\): The proposed user is unauthorized
by checking characteristics of the proposed user鈥檚 palm print against those stored in the authorized users鈥 data bank.
a. Define a Type I error and Type II error for this test. Which is the more serious error? Why?
Short Answer
- Type II error is the more serious