"This book deals with personal identification techniques facing security challenges by trying to answer the following question:How effective are the modern techniques for personal identification facing contemporary security challenges to verify the following objectives:• Identifying the most important contemporary security challenges facing the Kingdom of Saudi Arabia which require personal identification.• Identifying areas where modern techniques are used for personal identification facing contemporary security challenges.• Knowing the security implications of using modem personal identification techniques.• Identifying obstacles that prevent using personal identification techniques.• Illustrating statistically indication differences according to respondents’ views of the modern techniques of personal identification facing contemporary security challenges depending on the different personal and functional variables.The theme of the book is displayed through five chapters:The first chapter shows the problem of the study, and its questions, objectives, relevance, limits, concepts, and terminology.The second chapter shows the theoretical background of the study in terms of:• Contemporary security challenges.• Personal identification techniques.• The implications of using modern techniques in personal identifications.• Obstacles that prevent the use of personal identifications techniques facing contemporary challenges.The third chapter presents the methodological procedures of the study, while the fourth chapter discusses the study of data- presentation and analysis and discusses the results.The fifth chapter is specified to show the summary of the results, and the recommendations of the study, the most important of them are:• Providing border oulets and passport departments with personal identification techniques.• Conducting advanced training courses for workers in personal identification techniques.• personal identification techniques suppliers to train a group of passport employees on the use of those devices.• Put in writing a procedural manual that shows the steps of using personal identification techniques, and the penalties imposed for the misuse done by employees."
NA