Biometrics Technologies Implementation in Internet Banking Reduce Security Issues?

被引:5
作者
Normalini, M. K. [1 ]
Ramayah, T. [1 ]
机构
[1] Univ Sains Malaysia, Sch Management, Minden 11700, Penang, Malaysia
来源
INTERNATIONAL CONGRESS ON INTERDISCIPLINARY BUSINESS AND SOCIAL SCIENCES 2012 (ICIBSOS 2012) | 2012年 / 65卷
关键词
Security; Biometrics technologies; Authentication; Phishing; Internet banking; ACCEPTANCE; SERVICES; ADOPTION;
D O I
10.1016/j.sbspro.2012.11.135
中图分类号
F [经济];
学科分类号
02 ;
摘要
Information security is a great concern to computer users, which is not only a technical problem, but also related to human factors. One of the main issues in Malaysia related to Internet banking is the weak security in Internet banking application. Therefore this study will investigate further the solution to enhance the security issues in Internet banking implementation. In today's high speed world, millions of transactions occur every minute. For these transactions, data need to be readily available for the genuine people who want to have access, and it must be kept securely from imposters. There are three basic approaches to the verification of an individual's identity: something you have (e.g. Debit card), something you know (e.g. password, PIN) and something you are (e.g. fingerprint), which is unique about yourself and cannot be shared. Moreover, the benefits of investigating biometric authentication systems in online banking will secure the log in process to the system and removes password vulnerabilities; enhanced convenience such as employees quickly log in using their finger; reduced help desk costs by eliminating calls for password resets. Many systems utilize a combination of these methods in order to increase the level of security. Thus, a possible option is to introduce biometric authentication, (C) 2012 Published by Elsevier Ltd.
引用
收藏
页码:364 / 369
页数:6
相关论文
共 22 条
[1]   Global benchmarking for internet and e-commerce applications [J].
Ahmed, A. M. ;
Zairi, M. ;
Alwabel, S. A. .
BENCHMARKING-AN INTERNATIONAL JOURNAL, 2006, 13 (1-2) :68-80
[2]   Towards an Understanding of User Acceptance to Use Biometrics Authentication Systems in E-Commerce: Using an Extension of the Technology Acceptance Model [J].
Al Harby, Fahad ;
Qahwaji, Rami ;
Kamala, Mumtaz .
INTERNATIONAL JOURNAL OF E-BUSINESS RESEARCH, 2010, 6 (03) :34-55
[3]  
AL-Harby F, 2010, COMM COM INF SC, V87, P254
[4]  
Alhussain T, 2009, IFIP ADV INF COMM TE, V305, P26
[5]  
Ashbourn J., 2004, Practical Biometrics - From Aspiration to Implementation
[6]  
Brobeck S., 2005, THESIS JONKOPING U
[7]  
Deitel H., 2001, E BUSINESSES E COMME
[8]  
Fahad A. H., 2008, IADIS INT C WWW INT
[9]  
Faiiad A. H., 2010, IGI GLOBAL, V87, P254
[10]   A framework for analyzing e-commerce security [J].
Kesh, Someswar ;
Ramanujan, Sam ;
Nerur, Sridhar .
Information Management and Computer Security, 2002, 10 (04) :149-158