Biometrics in Banking and Payments: Versatile Voice Faces An Apple-Led Fingerprint Revolution
- Date:January 23, 2014
- Author(s):
- Test
- Report Details: 33 pages, 11 graphics
- Research Topic(s):
- Cybersecurity
- Fraud & Security
- Fraud Management
- Tech & Infrastructure
- PAID CONTENT
Overview
Biometric authentication has been a fixture of the public imagination for decades through frequent appearances in futuristic popular fiction. In the year 2014, these solutions may finally make the breakthrough from symbols of cutting edge technology which is constantly looming on the horizon to practical, accepted features of robust authentication systems. Several aspects of the consumer technology environment have conspired to facilitate biometrics’ deployment at the same time as providers are working out the kinks which have impeded their effectiveness. Mobile devices place biometric delivery mechanisms at consumers’ fingertips, while 3DSecure provides a platform to implement biometric authentication for online transactions. The major obstacle to the proliferation of biometrics will be consumer trust; fewer than half of consumers trust any business or institution with their sensitive biometric data. However, financial institutions, which face this challenge to a much lesser degree than retailers and other types of institutions, can partner with merchants to pave the way for wide scale acceptance.
Primary Questions:
- Which form of biometrics technology do consumers prefer?
- Which features do consumers consider important for biometric authentication?
- What issues are affecting the adoption of biometrics among financial institutions and merchants?
- How would the use of biometrics affect consumer online banking frequency?
- How would the use of biometrics affect consumer e‐commerce shopping frequency?
- Which biometric solutions are best suited to authenticate consumers during online applications?
Companies Mentioned:
Apple, Authentec, Authentify, CSID, EyeVerify, Facebanx, Fujitsu, Google, Hitachi, Jumio, LexisNexis, Microsoft, Motorola, RIM, ValidSoft, Victrio, Visa, VoiceVault
Methodology
- A random‐sample panel of 3,285 respondents to a July 2013 online survey.
- A random‐sample panel of 3,213 respondents to a September 2013 online survey.
- A random‐sample panel of 5,249 respondents to an October 2012 online survey.
Learn More About This Report & Javelin
Related content
The Hidden Enemy: Iran’s Cyberthreat to U.S. Banks
Disinformation is among the leading cyber risks predicted in the wake of the June 21 U.S. strikes on Iran’s nuclear program. On June 22, the Department of Homeland Security issued ...
Zero Trust Hinges on Cyber Strategy, Not Technology
Compliance will never equate to security, and zero trust will never hinge on technology. Zero trust is built and secured via a solid corporate culture and cybersecurity strategy th...
Fake Deals, Real Trouble: Cyber Risks in Online Marketplaces
Online purchasing continues to flourish, as brick-and-mortar options have dwindled in a post-pandemic economy. Larger e-commerce brands, such as Amazon and eBay, are targeted by cy...
Make informed decisions in a digital financial world