Giving Consumers Identity Control
- Date:November 02, 2016
- Author(s):
- Test
- Kyle Marchini
- Report Details: 20 pages, 11 graphics
- Research Topic(s):
- Fraud & Security
- Fraud Management
- PAID CONTENT
Overview
This report investigates US-based consumers’ desire to have control over their own identities, and looks at the implications of the current lack of control they have over their own personally identifiable information (PII).
Key findings:
- Consumers want an active role in controlling their identity.
- Almost 50% of consumers want control over their information:
- 46 million consumers report that they have been denied a service or product at some point in their lives due to either mistaken identity or unverifiable identity.
- 30% of new account fraud victims discovered fraud through adverse events, which is three times the rate for all fraud victims.
Methodology
The consumer data in this report is based primarily on information collected in a survey of 1,000 consumers in a September 2016 survey. The margin of sampling error is ±3.10 percentage points at the 95% confidence level; the margin of error is larger for subsets of respondents.
Additional data came from a 5,111 respondent consumer survey conducted in October 2015. The margin of sampling error is ±1.37 percentage points at the 95% confidence level; the margin of error is larger for subsets of respondents.
Additionally, in-depth interviews were conducted with executives responsible for making decisions regarding customer and applicant identity verification.
Download Whitepaper Form
Related content
Quishing and the Resurgence of BYOD Cyber-Attack Exposure
North Korean attackers’ latest efforts to target foreign policy experts through a technique known as quishing expose long-standing bring-your-own-device vulnerabilities that U.S. o...
Foolproof Payments: How AI is Revolutionizing Payment Fraud
Payment fraud is becoming harder to detect as transactions move faster and fraud tactics evolve. Fraud teams are being pushed to make quick decisions with limited context, leading ...
SMS Blasters: An Expanding Frontier in Smishing Attacks
Cybercriminals use SMS/text blasters in smishing attacks, sending a wide range of fraudulent messages. By mimicking legitimate cell towers, SMS/text blasters bypass carrier-level p...
Make informed decisions in a digital financial world