Giving Consumers Identity Control
- Date:November 02, 2016
- Author(s):
- Test
- Kyle Marchini
- Report Details: 20 pages, 11 graphics
- Research Topic(s):
- Fraud & Security
- Fraud Management
- PAID CONTENT
Overview
This report investigates US-based consumers’ desire to have control over their own identities, and looks at the implications of the current lack of control they have over their own personally identifiable information (PII).
Key findings:
- Consumers want an active role in controlling their identity.
- Almost 50% of consumers want control over their information:
- 46 million consumers report that they have been denied a service or product at some point in their lives due to either mistaken identity or unverifiable identity.
- 30% of new account fraud victims discovered fraud through adverse events, which is three times the rate for all fraud victims.
Methodology
The consumer data in this report is based primarily on information collected in a survey of 1,000 consumers in a September 2016 survey. The margin of sampling error is ±3.10 percentage points at the 95% confidence level; the margin of error is larger for subsets of respondents.
Additional data came from a 5,111 respondent consumer survey conducted in October 2015. The margin of sampling error is ±1.37 percentage points at the 95% confidence level; the margin of error is larger for subsets of respondents.
Additionally, in-depth interviews were conducted with executives responsible for making decisions regarding customer and applicant identity verification.
Download Whitepaper Form
Related content
Data Transparency in the Age of Cyber and Privacy Risk
As open banking and new privacy regulations accelerate, financial institutions face rising pressure to enhance privacy and cybersecurity transparency to strengthen consumer trust. ...
Crypto Investment Scams: How Banks Can Disrupt These Criminal Operations
Cryptocurrency investment scams have evolved into organized, global operations that are stealing billions of dollars from consumers. Recent enforcement actions and platform disrupt...
Quishing and the Resurgence of BYOD Cyber-Attack Exposure
North Korean attackers’ latest efforts to target foreign policy experts through a technique known as quishing expose long-standing bring-your-own-device vulnerabilities that U.S. o...
Make informed decisions in a digital financial world