Giving Consumers Identity Control
- Date:November 02, 2016
- Author(s):
- Test
- Kyle Marchini
- Report Details: 20 pages, 11 graphics
- Research Topic(s):
- Fraud & Security
- Fraud Management
- PAID CONTENT
Overview
This report investigates US-based consumers’ desire to have control over their own identities, and looks at the implications of the current lack of control they have over their own personally identifiable information (PII).
Key findings:
- Consumers want an active role in controlling their identity.
- Almost 50% of consumers want control over their information:
- 46 million consumers report that they have been denied a service or product at some point in their lives due to either mistaken identity or unverifiable identity.
- 30% of new account fraud victims discovered fraud through adverse events, which is three times the rate for all fraud victims.
Methodology
The consumer data in this report is based primarily on information collected in a survey of 1,000 consumers in a September 2016 survey. The margin of sampling error is ±3.10 percentage points at the 95% confidence level; the margin of error is larger for subsets of respondents.
Additional data came from a 5,111 respondent consumer survey conducted in October 2015. The margin of sampling error is ±1.37 percentage points at the 95% confidence level; the margin of error is larger for subsets of respondents.
Additionally, in-depth interviews were conducted with executives responsible for making decisions regarding customer and applicant identity verification.
Download Whitepaper Form
Related content
The Hidden Enemy: Iran’s Cyberthreat to U.S. Banks
Disinformation is among the leading cyber risks predicted in the wake of the June 21 U.S. strikes on Iran’s nuclear program. On June 22, the Department of Homeland Security issued ...
Account Takeover: Static Authentication Enables Access Without Confirmation
Account takeover (ATO) is surging, and the problem is getting dimensionally worse. Banks that rely on outdated, one-time authentication and static identity verification strategies ...
Zero Trust Hinges on Cyber Strategy, Not Technology
Compliance will never equate to security, and zero trust will never hinge on technology. Zero trust is built and secured via a solid corporate culture and cybersecurity strategy th...
Make informed decisions in a digital financial world