SciELO - Scientific Electronic Library Online

 
vol.22 issue1Management of intellectual capital held by Tanzania's higher learning institutions: Strategies and challengesTowards a multidimensional model for assessing e-government service gaps author indexsubject indexarticles search
Home Pagealphabetic serial listing  

Services on Demand

Article

Indicators

Related links

  • On index processCited by Google
  • On index processSimilars in Google

Share


South African Journal of Information Management

On-line version ISSN 1560-683X
Print version ISSN 2078-1865

Abstract

CHIGADA, Joel M.. A qualitative analysis of the feasibility of deploying biometric authentication systems to augment security protocols of bank card transactions. SAJIM (Online) [online]. 2020, vol.22, n.1, pp.1-9. ISSN 1560-683X.  http://dx.doi.org/10.4102/sajim.v22i1.1194.

BACKGROUND: This study investigated the end-users' perceptions about the feasibility of deploying biometric authentication systems as intervention solutions to ameliorate card fraud in the South African payment card industry. OBJECTIVES: The objective of the study was to determine if the existing banking technology and telecommunications infrastructure were capable of supporting biometric payment systems. METHOD: In this qualitative research, interviews were conducted with 30 sample elements selected from commercial banks, telecommunications companies and other service providers. The sample included individuals working with banking back-end technologies, telecommunications service providers and credit card fraud experts. RESULTS: The study established that banking technology and telecommunications infrastructure were capable of supporting biometric payment systems. It was revealed that the deployment of biometric systems would mitigate card fraud transactions. However, findings showed that introduction of zero-floor limits led to high traffic volumes, creating congestion on the telecommunications connectivity. Thus, there was a high likelihood that transaction processes would be slow during peak periods. CONCLUSION: The implementation of biometric systems required highly skilled information technology personnel to oversee and support these technologies. This was identified as a potential hindrance for banks. The study established that existing banking and telecommunications infrastructure was capable and supported biometric systems. Banks were not keen to invest in an outright biometric environment because of the huge costs that would be incurred in implementing advanced technologies.

Keywords : biometric authentication; card fraud; security protocol; telecommunications; cybersecurity.

        · text in English     · English ( pdf )

 

Creative Commons License All the contents of this journal, except where otherwise noted, is licensed under a Creative Commons Attribution License