Facial Authentication As A Bank Security Measure In Zimbabwe

Authors

  • Margaret Mashizha University of Zimbabwe
  • Englon University of Zimbabwe

DOI:

https://doi.org/10.35384/jemp.v10i1.522

Keywords:

Facial authentication, Password, Bank Security, Personal identification number, customer confidence

Abstract

This paper reports on the findings of a research that was conducted in an endeavour to improve security within the banking sector. The research was triggered by an increase in the number of cyber-attacks on personal bank accounts resulting in the loss of huge sums of money and hence eroding bank confidence among customers. The main objectives of the study were to determine whether customers were aware of facial authentication as a bank security and to assess whether customers would accept facial authentication as a bank security measure. Further, the study was carried out to establish whether it was feasible for banks to implement such a biometric system as part of enhancing bank security and determine the extent to which customers are prone to cyber-attacks.  Finally, the research aimed to outline the probable challenges that may be encountered in implementing facial authentication in the banking system. A survey of 70 bank employees and 200 bank customers were selected from two commercial banks using a purposive sampling method. Data was collected using interviews, questionnaires, and an experiment conducted to establish the vulnerability of customers to cyber-attacks. Findings revealed that customers and employees were aware of facial authentication as a measure of bank security and it was a preferred method for bank security in this digital transformation age. Customers were highly prone to attacks as they just clicked links to websites without a second thought. The technology was recommended for the possibility of improving bank security and hence boosting customer confidence and enhancing the security of customer data. However, whilst it was feasible for banks to implement the technology as they have adequate finances, likely challenges to be encountered included a lack of expertise to set up the system and a lack of knowledge on its use amongst customers. The study recommended banks consider facial authentication due to its advantages over other non-biometric methods. The technology is safer especially as it reduces human contact and does not depend on the need for customers to memorise passwords or codes nor does it require them to possess something like smart cards.

 

Keywords: Facial authentication, Password, Bank Security, Personal identification number, customer confidence

References

Rehman, A. A., & Alharthi, K. (2016). An introduction to research paradigms. International Journal of

Educational Investigations, 3(8), 51-59.

Al-Allaf, O. (2014). Review of Face Detection Systems Based Artificial Neural Networks Algorithms.

The International Journal of Multimedia & Its Applications. 6 (1), 1.

Alabdan, R. (2020). Phishing attacks survey: Types, vectors, and technical approaches. Future

internet, 12(10), 168.

Albalooshi, F., Smith-Creasey, M., Rajarajan, M. & Albastaki, Y. (2018). Facial Recognition System

for Secured Mobile Banking. Sustainability and Resilience Conference: Mitigating Risks and Emergency Planning: Kingdom of Bahrain. 3(7). 92.

Bani-Hani, A., Majdalweieh, M., & AlShamsi, A. (2019). Online authentication methods used

in banks and attacks against these methods. Procedia Computer Science, 151, 1052-1059.

Barkadehi, M. H., Nilashi, M., Ibrahim, O., Fardi, A. Z., & Samad, S. (2018). Authentication systems:

A literature review and classification. Telematics and Informatics, 35(5), 1491-1511.

Chowdhury, M., Gao, J., & Islam, R. (2017). Fuzzy rule based approach for face and facial feature

extraction in biometric authentication. In Proceedings of the 2016 International Conference on Image and Vision Computing New Zealand (IVCNZ), Palmerston North, New Zealand.

Desai, A. (2018). Cybercrime, cyber surveillance and state surveillance in South Africa. Acta

Criminologica: African Journal of Criminology & Victimology, 31(3), 149-160.

Fishbein, M., & Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior: An Introduction to Theory

and Research. Reading, MA: Addison-Wesley.

Fosse, G., Leo, S., Rodriguez, C. S. & Gratao, N. (2017). FEBRABAN survey on Banking

Technology, Technical Report.

Federal Financial Institutions Examination Council (FFIE), (2005). Authentication in an internet

banking environment, Financial Institution Letter - FIL-103-2005.

Galterio, M. G., Shavit, S.A., & Hayajneh, T., (2018). A review of facial biometrics security for smart

devices, Computers, 7(37).

Gates, K.A. (2011). Our Biometric Future Facial Recognition Technology and the Culture of

Surveillance; NYU Press: New York, USA,

Han, C. K., Lee, S. K., & You, Y. Y. (2016). The effect of intension to use biometric-based non-face-

to-face authentication system in financial transactions-Focusing on extended UTAUT model. Indian Journal of Science and Technology.

Hinton, G. E., Osindero, S., & Teh, Y.-W. (2006). A fast learning algorithm for deep belief nets. Neural

computation,18 (7), 1527–1554

Huang, Y., Huang, Z., Zhao, H., & Lai, X. (2013). A new one-time password method. IERI Procedia, 4,

-37.

Huang, L., Song, Y., Li, J., Zhen, Z., Yang, Z., & Liu, J. (2014). Individual differences in cortical face

selectivity predict behavioral performance in face recognition. Frontiers in human neuroscience, 8, 483.

Kshetri, N. (2019). Cybercrime and Cybersecurity in Africa, The Journal of Global Information

Technology Management. DOI: 10.1080/1097198x.2019.1603527

Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L. F., Hong, J., & Nunge, E. (2007). Protecting people from phishing: the design and evaluation of an embedded training email system. In Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 905-914).

Maddox, I., & Moschetto, K., (2019). Modern password security for users. User-focused

recommendations for creating and storing passwords. Accessed from: https://cloud.google.com/static/solutions/modern-password-security-for-users.pdf, accessed on 6/2/2024

Maithili, K., Vinothkumar, V., & Latha, P. (2018). Analyzing the security mechanisms to prevent unauthorized access in cloud and network security. Journal of Computational and Theoretical Nanoscience, 15(6-7), 2059-2063.

Majdalawieh, M., Bani-Hani, A., Hussain, M., & Alshamsi, A. (2022, December). Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking. In 2022 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 1039-1046). IEEE.

Mardikar, U. (2017). Systems and Methods for Authenticating Facial Biometric Data against Secondary

Sources. U.S. Patent 20170091533 A1,

Maphosa, V. (2023). An overview of cybersecurity in Zimbabwe’s financial services

sector. F1000Research, 12, 1251.

Meval, T. & Kumbharana, C. K., (2014). Study of different Trends and Techniques in Face Recognition.

International Journal of Computer Applications (0975 – 8887) IV (8), 96.

Muhamba, V. (2021). Ecocash US$100 million fraudsters arrested, Techzim, accessed on 27 April 2021

:02am, https://www.techzim.co.zw/2021/04/ecocash-us100-million-fraudstersarrested/amp/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:%20techzim%20(Techzim).

Ndubueze, P. N. (2020). Cybercrime and legislation in an African context. The Palgrave Handbook of

International Cybercrime and Cyberdeviance, 345-364.

Oliveira, J.S., Sounza, G.B, Rocha, A.R., Deus, F.E., & Marana, A.N., (2020). Cross-Domain Deep

Face matching for Real Banking Security Systems, ICEDEG Conference Proceedings.

Ometov, A., Bezzateev, S., Mäkitalo, N., & Andreev, S., (2018). Multi-Factor Authentication: A

Survey. Cryptography. 2(1).

Rubin, J. G., (2009). Methodological challenges in assessing general population: Reaction in the

immediate aftermath of a terrorist. International Journal of Methods Psychiatry research, 17, 29-35.

Rupapa T. (2021), Fraudsters appear in court, The Herald, viewed at 27 April 2021 05:06 am,

https://www.herald.co.zw/ecocash-fraudsters-appear-in-court/amp/.

Salahdine, F., & Kaabouch, N. (2019). Social engineering attacks: A survey. Future internet, 11(4), 89.

Saunders., M., Lewis, P., and Thornhill. A., (2007). Research Methods for Business Student, 4th

edition.

Shang-Hung, L., (2000). An Introduction to Face Recognition Technology. Informing Science Special

Issue on Multimedia Informing Technologies, 2 (3) 1

Srinivasan, R., & Chowdhury, A. R. (2015). Robust face recognition based on saliency maps of sigma

sets, in Proceedings of International Conference on Biometrics: Theory, Applications, and Systems.

Stephen, A. Ojeka,1., Egbide, B., & Edara-Obong, I. (2017). Cyber Security in the Nigerian Banking

Sector: An Appraisal of Audit Committee Effectiveness, International Review of Management and Marketing, 7(2), 340-346.

Sviatun, O., Goncharuk, O., Roman, C., Kuzmenko, O., & Kozych, I. V., (2021). Combating

cybercrime: economic and legal aspects. WSEAS Transactions on Business and Economics, 18, 751-762.

Szczodrak, M., & Czyżewski, A., (2017). Evaluation of Face Detection Algorithms for the Bank Client

Identity Verification. Foundations of Computing and Decision Sciences.42(2).

World Bank, (2017). The Global Findex Database 2017, available at

https://globalfindex.worldbank.org/.

Zimucha, T., Zanamwe, N., Chimwayi, K., Chakwizira, E., Mapungwana, P., & Maduku, T. (2012).

An Evaluation of the Effectiveness of E-banking Security Strategies in Zimbabwe: A Case Study of Zimbabwean Commercial Banks. Journal of internet banking and commerce, 17(3).

Zulfigar, M., Syed, F., Khan. M. J., & Khurshid, K., (2019). Deep Face Recognition for Biometric

Authentication, Proceedings of the 1st International Conference on Electrical Communication and Computer Engineering.

Downloads

Published

2024-04-01
Abstract Views: 84 | File Downloads: 113