Facial Authentication As A Bank Security Measure In Zimbabwe
DOI:
https://doi.org/10.35384/jemp.v10i1.522Keywords:
Facial authentication, Password, Bank Security, Personal identification number, customer confidenceAbstract
This paper reports on the findings of a research that was conducted in an endeavour to improve security within the banking sector. The research was triggered by an increase in the number of cyber-attacks on personal bank accounts resulting in the loss of huge sums of money and hence eroding bank confidence among customers. The main objectives of the study were to determine whether customers were aware of facial authentication as a bank security and to assess whether customers would accept facial authentication as a bank security measure. Further, the study was carried out to establish whether it was feasible for banks to implement such a biometric system as part of enhancing bank security and determine the extent to which customers are prone to cyber-attacks. Finally, the research aimed to outline the probable challenges that may be encountered in implementing facial authentication in the banking system. A survey of 70 bank employees and 200 bank customers were selected from two commercial banks using a purposive sampling method. Data was collected using interviews, questionnaires, and an experiment conducted to establish the vulnerability of customers to cyber-attacks. Findings revealed that customers and employees were aware of facial authentication as a measure of bank security and it was a preferred method for bank security in this digital transformation age. Customers were highly prone to attacks as they just clicked links to websites without a second thought. The technology was recommended for the possibility of improving bank security and hence boosting customer confidence and enhancing the security of customer data. However, whilst it was feasible for banks to implement the technology as they have adequate finances, likely challenges to be encountered included a lack of expertise to set up the system and a lack of knowledge on its use amongst customers. The study recommended banks consider facial authentication due to its advantages over other non-biometric methods. The technology is safer especially as it reduces human contact and does not depend on the need for customers to memorise passwords or codes nor does it require them to possess something like smart cards.
Keywords: Facial authentication, Password, Bank Security, Personal identification number, customer confidence
References
Rehman, A. A., & Alharthi, K. (2016). An introduction to research paradigms. International Journal of
Educational Investigations, 3(8), 51-59.
Al-Allaf, O. (2014). Review of Face Detection Systems Based Artificial Neural Networks Algorithms.
The International Journal of Multimedia & Its Applications. 6 (1), 1.
Alabdan, R. (2020). Phishing attacks survey: Types, vectors, and technical approaches. Future
internet, 12(10), 168.
Albalooshi, F., Smith-Creasey, M., Rajarajan, M. & Albastaki, Y. (2018). Facial Recognition System
for Secured Mobile Banking. Sustainability and Resilience Conference: Mitigating Risks and Emergency Planning: Kingdom of Bahrain. 3(7). 92.
Bani-Hani, A., Majdalweieh, M., & AlShamsi, A. (2019). Online authentication methods used
in banks and attacks against these methods. Procedia Computer Science, 151, 1052-1059.
Barkadehi, M. H., Nilashi, M., Ibrahim, O., Fardi, A. Z., & Samad, S. (2018). Authentication systems:
A literature review and classification. Telematics and Informatics, 35(5), 1491-1511.
Chowdhury, M., Gao, J., & Islam, R. (2017). Fuzzy rule based approach for face and facial feature
extraction in biometric authentication. In Proceedings of the 2016 International Conference on Image and Vision Computing New Zealand (IVCNZ), Palmerston North, New Zealand.
Desai, A. (2018). Cybercrime, cyber surveillance and state surveillance in South Africa. Acta
Criminologica: African Journal of Criminology & Victimology, 31(3), 149-160.
Fishbein, M., & Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior: An Introduction to Theory
and Research. Reading, MA: Addison-Wesley.
Fosse, G., Leo, S., Rodriguez, C. S. & Gratao, N. (2017). FEBRABAN survey on Banking
Technology, Technical Report.
Federal Financial Institutions Examination Council (FFIE), (2005). Authentication in an internet
banking environment, Financial Institution Letter - FIL-103-2005.
Galterio, M. G., Shavit, S.A., & Hayajneh, T., (2018). A review of facial biometrics security for smart
devices, Computers, 7(37).
Gates, K.A. (2011). Our Biometric Future Facial Recognition Technology and the Culture of
Surveillance; NYU Press: New York, USA,
Han, C. K., Lee, S. K., & You, Y. Y. (2016). The effect of intension to use biometric-based non-face-
to-face authentication system in financial transactions-Focusing on extended UTAUT model. Indian Journal of Science and Technology.
Hinton, G. E., Osindero, S., & Teh, Y.-W. (2006). A fast learning algorithm for deep belief nets. Neural
computation,18 (7), 1527–1554
Huang, Y., Huang, Z., Zhao, H., & Lai, X. (2013). A new one-time password method. IERI Procedia, 4,
-37.
Huang, L., Song, Y., Li, J., Zhen, Z., Yang, Z., & Liu, J. (2014). Individual differences in cortical face
selectivity predict behavioral performance in face recognition. Frontiers in human neuroscience, 8, 483.
Kshetri, N. (2019). Cybercrime and Cybersecurity in Africa, The Journal of Global Information
Technology Management. DOI: 10.1080/1097198x.2019.1603527
Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L. F., Hong, J., & Nunge, E. (2007). Protecting people from phishing: the design and evaluation of an embedded training email system. In Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 905-914).
Maddox, I., & Moschetto, K., (2019). Modern password security for users. User-focused
recommendations for creating and storing passwords. Accessed from: https://cloud.google.com/static/solutions/modern-password-security-for-users.pdf, accessed on 6/2/2024
Maithili, K., Vinothkumar, V., & Latha, P. (2018). Analyzing the security mechanisms to prevent unauthorized access in cloud and network security. Journal of Computational and Theoretical Nanoscience, 15(6-7), 2059-2063.
Majdalawieh, M., Bani-Hani, A., Hussain, M., & Alshamsi, A. (2022, December). Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking. In 2022 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 1039-1046). IEEE.
Mardikar, U. (2017). Systems and Methods for Authenticating Facial Biometric Data against Secondary
Sources. U.S. Patent 20170091533 A1,
Maphosa, V. (2023). An overview of cybersecurity in Zimbabwe’s financial services
sector. F1000Research, 12, 1251.
Meval, T. & Kumbharana, C. K., (2014). Study of different Trends and Techniques in Face Recognition.
International Journal of Computer Applications (0975 – 8887) IV (8), 96.
Muhamba, V. (2021). Ecocash US$100 million fraudsters arrested, Techzim, accessed on 27 April 2021
Ndubueze, P. N. (2020). Cybercrime and legislation in an African context. The Palgrave Handbook of
International Cybercrime and Cyberdeviance, 345-364.
Oliveira, J.S., Sounza, G.B, Rocha, A.R., Deus, F.E., & Marana, A.N., (2020). Cross-Domain Deep
Face matching for Real Banking Security Systems, ICEDEG Conference Proceedings.
Ometov, A., Bezzateev, S., Mäkitalo, N., & Andreev, S., (2018). Multi-Factor Authentication: A
Survey. Cryptography. 2(1).
Rubin, J. G., (2009). Methodological challenges in assessing general population: Reaction in the
immediate aftermath of a terrorist. International Journal of Methods Psychiatry research, 17, 29-35.
Rupapa T. (2021), Fraudsters appear in court, The Herald, viewed at 27 April 2021 05:06 am,
https://www.herald.co.zw/ecocash-fraudsters-appear-in-court/amp/.
Salahdine, F., & Kaabouch, N. (2019). Social engineering attacks: A survey. Future internet, 11(4), 89.
Saunders., M., Lewis, P., and Thornhill. A., (2007). Research Methods for Business Student, 4th
edition.
Shang-Hung, L., (2000). An Introduction to Face Recognition Technology. Informing Science Special
Issue on Multimedia Informing Technologies, 2 (3) 1
Srinivasan, R., & Chowdhury, A. R. (2015). Robust face recognition based on saliency maps of sigma
sets, in Proceedings of International Conference on Biometrics: Theory, Applications, and Systems.
Stephen, A. Ojeka,1., Egbide, B., & Edara-Obong, I. (2017). Cyber Security in the Nigerian Banking
Sector: An Appraisal of Audit Committee Effectiveness, International Review of Management and Marketing, 7(2), 340-346.
Sviatun, O., Goncharuk, O., Roman, C., Kuzmenko, O., & Kozych, I. V., (2021). Combating
cybercrime: economic and legal aspects. WSEAS Transactions on Business and Economics, 18, 751-762.
Szczodrak, M., & Czyżewski, A., (2017). Evaluation of Face Detection Algorithms for the Bank Client
Identity Verification. Foundations of Computing and Decision Sciences.42(2).
World Bank, (2017). The Global Findex Database 2017, available at
https://globalfindex.worldbank.org/.
Zimucha, T., Zanamwe, N., Chimwayi, K., Chakwizira, E., Mapungwana, P., & Maduku, T. (2012).
An Evaluation of the Effectiveness of E-banking Security Strategies in Zimbabwe: A Case Study of Zimbabwean Commercial Banks. Journal of internet banking and commerce, 17(3).
Zulfigar, M., Syed, F., Khan. M. J., & Khurshid, K., (2019). Deep Face Recognition for Biometric
Authentication, Proceedings of the 1st International Conference on Electrical Communication and Computer Engineering.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Margaret Mashizha, Englon
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work to acknowledge the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book) with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during submission. It can lead to productive exchanges and earlier and greater citation of published work.