The Role of Applicant Behavior in Identity Proofing
- Date:March 26, 2018
- Author(s):
- Test
- Kyle Marchini
- James Wilson
- Report Details: 22 pages, 7 graphics
- Research Topic(s):
- Fraud & Security
- Fraud Management
- PAID CONTENT
Overview
As account opening continues to transition from physical to digital channels, financial institutions, issuers, lenders, and other organizations must optimize the digital experience of applicants in order to compete. At the same time, fraud is on the rise as criminals have become more successful than ever, thanks to some of the same digital channel benefits enjoyed by consumers: convenience, speed, and ease of use. To achieve the necessary balance between preventing fraud and providing a delightful experience for consumers, an approach to identity proofing that accounts for the channel, product, customer, and threat environment is absolutely critical. But regardless of the approach, inconspicuous solutions — like those based on applicant behavior — have a distinct role to play in how institutions manage the risk of application fraud.
This original report, sponsored by BioCatch, explores the role that applicant behavior plays in assessing digital-channel identity risk within financial services.
This research report was independently produced by Javelin Strategy & Research. Javelin Strategy & Research maintains complete independence in its data collection, findings, and analysis.
Methodology
- A November 2017 survey of 5000 consumers. The maximum margin of sampling error is +/- 1.39 percentage points at the 95% confidence level for questions answered by all respondents. Margin of error is higher for questions answered by smaller segments of respondents.
- A July 2017 survey of 10,768 consumers. The maximum margin of sampling error is +/- 0.94% at the 95% confidence level for questions answered by all respondents. Margin of error is higher for questions answered by smaller segments of respondents.
Download Whitepaper Form
Related content
Quishing and the Resurgence of BYOD Cyber-Attack Exposure
North Korean attackers’ latest efforts to target foreign policy experts through a technique known as quishing expose long-standing bring-your-own-device vulnerabilities that U.S. o...
Foolproof Payments: How AI is Revolutionizing Payment Fraud
Payment fraud is becoming harder to detect as transactions move faster and fraud tactics evolve. Fraud teams are being pushed to make quick decisions with limited context, leading ...
SMS Blasters: An Expanding Frontier in Smishing Attacks
Cybercriminals use SMS/text blasters in smishing attacks, sending a wide range of fraudulent messages. By mimicking legitimate cell towers, SMS/text blasters bypass carrier-level p...
Make informed decisions in a digital financial world