1,911 research outputs found

    Biometric E-Commerce: Security in B2C (Business-to-Consumer)

    Get PDF
    Every e-commerce transaction done online seemed to be a secure transaction. However, many users do not realize the fraud that happens while doing transactions. Of course, there are ways to curd this rising problem. The objective of this project is to study the feasibility and the security of e-commerce by implementing fingerprint biometric during transaction. The key point is to create a safe and secure environment for users to do transactions on the Internet without the need to worry about fraud. The methodology used will be Retotype, a combination of research and prototype. A Retotype will be modeled to capture the most efficient and secure e-commerce transaction method. The final product would be a prototype of an e-commerce website incorporated with fingerprint biometric as an authentication method. An implementation strategy would be analyzed to weigh how practical can this system work in the real world. I

    Reforming the approach to e-banking in the Middle East

    Get PDF
    Over the past three decades, electronic banking (e-banking) has witnessed rapid growth and development in some countries like the U.S. and the U.K. This growth has resulted in an increase in banks’ revenues and customers’ savings and convenience. However this is not the case in the Middle East. Although banks do offer electronic services in this region, the technology has not reached the same growth rates as in developed countries. This problem is due to the quality of services banks offer and, more importantly, the level of protection they provide to their customers. It is also related to the people’s culture and acceptance of new and modern technologies, as well as infrastructure and the current banking systems. Using dynamic hypothesis to analyze the problem, it is found that e-banking security and protection are among the factors causing much of the trouble. In order to boost customers’ confidence in adopting e-banking technologies, security issues must be resolved. One possible solution proposed is the use of advanced technologies such as biometric-authentication. Additionally, central banks must set strategies and policies to boost the development of e-banking technologies in order to reap its benefits. Developing e-banking technologies will help improve the economy and increase the convenience of banking. It will also facilitate commerce and business due to cost reduction and increase in efficiency

    The Data Breach Dilemma: Proactive Solutions for Protecting Consumers’ Personal Information

    Get PDF
    Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the possibility of an attack. Each breach inevitably risks the release of consumers’ personally identifiable information and the strong possibility of identity theft. Unfortunately, current solutions for handling these incidents are woefully inadequate. Private litigation like consumer class actions and shareholder lawsuits each face substantive legal and procedural barriers. States have their own data security and breach notification laws, but there is currently no unifying piece of legislation or strong enforcement mechanism. This Note argues that proactive solutions are required. First, a national data security law—setting minimum data security standards, regulating the use and storage of personal information, and expanding the enforcement role of the Federal Trade Commission—is imperative to protect consumers’ data. Second, a proactive solution requires reconsidering how to minimize the problem by going to its source: the collection of personally identifiable information in the first place. This Note suggests regulating companies’ collection of Social Security numbers, and, eventually, using a system based on distributed ledger technology to replace the ubiquity of Social Security numbers

    Biometric Verification System for Automated Teller Machine (ATM)

    Get PDF
    Biometric Verification System for Automated Teller Machine (ATM) will serve as an alternative for the current verification system that uses ATM card and personal identification number (PIN) to protect against fraud and effectively eliminating most common attempts to gain unauthorized access. With biometric technology, customer can gain access to their account through smart card approach combined with biometric technology to automatically identify individuals using their distinct physical or behavioral characteristics. The main objective of this project is to solve the problems that arise from using PIN as the base of ATM verification system. These include unauthorized access into financial accounts, stealing money, ATM fraud and many more. To ensure a reliable project output, the author had outlined the scope of study for the proposed project. It involves the study of ATM system, biometrics technology, architecture, the benefits and the drawback of each approach and the current trend in the market. The development of this system will be based on the RAD methodology

    Security of Multifactor Authentication Model to Improve Authentication Systems

    Get PDF
    Multifactor authentication (MFA) is a security system in which more than one form of authentication is implemented to verify the legitimacy of a transaction. The goal of MFA is to create a layered defense and make it more difficult for an unauthorized person to access a computer system or network. Multifactor authentication is achieved by combining two or three independent credentials: what the user knows (knowledge-based authentication), what the user has (security token or smart card) and what the user is (biometric verification). Single-factor authentication (SFA), in contrast, only requires knowledge the user possesses. Although password-based authentication is well-suited for website or application access, it is not secure enough for online financial transactions. Keywords: authentication , multi-factor-authentication , biometric factor, knowledge factor . possession facto

    Review of personal identification systems

    Get PDF
    The growth of the use of biometric personal identification systems has been relatively steady over the last 20 years. The expected biometric revolution which was forecast since the mid 1970\u27s has not yet occurred. The main factor for lower than expected growth has been the cost and user acceptance of the systems. During the last few years, however, a new generation of more reliable, less expensive and better designed biometric devices have come onto the market. This combined with the anticipated expansion of new reliable, user friendly inexpensive systems provides a signal that the revolution is about to begin. This paper provides a glimpse into the future for personal identification systems and focuses on research directions, emerging applications and significant issues of the future
    • …
    corecore