Integration and Future Work
For the system to be effective, it must integrate seamlessly with institutional workflows. Invigilators need
training to troubleshoot issues, and IT staff must maintain the server. Future improvements could include
battery backup, a local Wi-Fi access point and mobile admin apps. Larger-scale studies could test the
system in diverse conditions and measure long-term behavioural impacts. Multi-modal biometrics and
machine-learning-based anomaly detection may enhance security. Social scientists should continue to
explore how surveillance technologies reshape educational environments.
CONCLUSION
Reframing the original engineering project as a socio-technical system reveals both its benefits and
challenges. The biometric toilet monitoring system improved fairness and efficiency by automating
identity verification and logging. Empirical results showed high recognition accuracy and substantial time
savings. However, ethical issues around privacy, consent, surveillance culture and inclusivity require
careful consideration. Deploying such systems responsibly entails robust data protection, transparent
policies and accommodations for diverse users. Ongoing dialogue between engineers, educators,
policymakers and students is essential to ensure that technological solutions uphold educational values and
respect human dignity.
ACKNOWLEDGMENT
The authors would like to dedicate our appreciation to Universiti Teknikal Malaysia Melaka for supporting
this research. Our gratitude also goes to the Centre of Research and Innovation Management (CRIM)
UTeM and Centre for Telecommunication Research and Innovation (CeTRI) UTeM for providing the
facilities needed to conduct this study.
REFERENCES
1. A. K. Jain, A. Ross and K. Nandakumar, Introduction to Biometrics. Springer, 2011,
doi:10.1007/978-0-387-77326-1.
2. S. Ahmed, N. Khan and F. Alam, “Challenges in manual access control systems,” Journal of Security
Studies, vol. 12, no. 3, pp. 45–59, 2018.
3. R. Ali, P. Gupta and A. Sen, “Implementation of biometric access systems in educational institutions:
A case study,” Education and Information Technologies, vol. 26, no. 4, pp. 5327–5345, 2021,
doi:10.1007/s10639-021-10557-8.
4. S. Malathi and K. Umamaheswari, “Advancements in fingerprint recognition systems: A review,”
International Journal of Computer Applications, vol. 182, no. 30, pp. 1–5, Oct. 2019.
5. Y. Choi, J. Lee and H. Kim, “Deep learning techniques in fingerprint recognition: An overview,”
IEEE Access, vol. 11, pp. 252–265, Jan. 2023.
6. Z. Zheng and C. Valli, “Critical aspects of security and recognition accuracy in fingerprint systems,”
Journal of Information Security and Applications, vol. 46, pp. 121–132, Mar. 2019,
doi:10.1016/j.jisa.2019.03.016.
7. D. Lin, “Review of fingerprint sensor technologies,” Sensors, vol. 23, no. 5, p. 4679, May 2023,
doi:10.3390/s23054679.
8. S. Das and S. Sengupta, “Biometric systems integration in IoT: Challenges and solutions,” IEEE
Internet of Things Journal, vol. 8, no. 11, pp. 9297–9308, Nov. 2021,
doi:10.1109/JIOT.2021.3064907.
9. D. Lyon, Surveillance Studies: An Overview. Cambridge: Polity Press, 2007.
10. E. A. Whitley and I. N. Kroener, “Privacy practices and personal data: A critical review,”
Information Systems Journal, vol. 27, no. 1, pp. 1–27, 2017.
11. M. Foucault, Discipline and Punish: The Birth of the Prison. New York: Vintage Books, 1977.
12. J. Wajcman, TechnoFeminism. Cambridge: Polity, 2004.