2015
DOI: 10.1108/ics-11-2014-0074
|View full text |Cite
|
Sign up to set email alerts
|

Investigating the possibility to use differentiated authentication based on risk profiling to secure online banking

Abstract: Purpose – The purpose of this paper was to determine factors that could be used to create different authentication requirements for diverse online banking customers based on their risk profile. Online security remains a challenge to ensure safe transacting on the Internet. User authentication, a human-centric process, is regarded as the basis of computer security and hence secure access to online banking services. The increased use of technology to enforce additional actions has the ability to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…• Something the user possesses: This category refers to the authentication process using objects, such as a device or token, to prove the user's identity. The token may be a dedicated item that is used for authenticating (e.g., a USB key), or it may be a digital certificate on a mobile device (Al-Ameen et al, 2016;Butler and Butler, 2015). • Something the user is: Biometrics are physical or behavioral characteristics of the user that are used to prove their identity.…”
Section: Overview Of User Authenticationmentioning
confidence: 99%
See 2 more Smart Citations
“…• Something the user possesses: This category refers to the authentication process using objects, such as a device or token, to prove the user's identity. The token may be a dedicated item that is used for authenticating (e.g., a USB key), or it may be a digital certificate on a mobile device (Al-Ameen et al, 2016;Butler and Butler, 2015). • Something the user is: Biometrics are physical or behavioral characteristics of the user that are used to prove their identity.…”
Section: Overview Of User Authenticationmentioning
confidence: 99%
“…Modern smartphones carry several means of authentication, such as fingerprint scanners, cameras for face recognition, and input for memory-based methods (Cho et al, 2020), as well as mobile connectivity for out-ofband authentication (Butler and Butler, 2015). As MFA requires extra effort from the user and could cause discontent, methods have been developed to reduce the effort in low-risk interactions.…”
Section: User Authentication Todaymentioning
confidence: 99%
See 1 more Smart Citation
“…Effective sales tactics are vital in building successful online strategies by encouraging interactions to enhance confidentiality and trust and generate a competitive advantage in the banking industry (Jaramillo and Marshall, 2004). The concept of online privacy and personal attitudes toward risk can be used as segmentation criteria by a bank to profile consumers and develop a sales strategy recognizing the privacy concerns (Butler and Butler, 2015). With the advancement of e-banking (Sekhon et al, 2010), bank managers should convince consumers of the availability of similar services online as offline environment, encouraging the use of online banking with assurance and confidence regarding confidentiality, privacy and security (Chong et al, 2010).…”
Section: Privacy Online Banking and Sales Strategymentioning
confidence: 99%
“…Risk-based authentication approaches based on basic communication information [49], such as the source-destination IP addresses, or frequency of transactions, performed by a user on her devices to determine risk, are easily exploitable. According to Traore [50], such systems could be exploited by polling or cloning users' devices.…”
Section: Risk-based Authentication Schemesmentioning
confidence: 99%