Published July 30, 2023 | Version CC BY-NC-ND 4.0
Journal article Open

Security and Privacy Determinants in Biometric Application in Cyber Security in Banks in Eldoret Town, Kenya

  • 1. Student (M.Sc Information Systems) Department of Computing Sciences, School of Information Science and Technology, Kisii University Kenya.
  • 2. Lecturer, Department of Computing Sciences, School of Information Science and Technology, Kisii University, Kenya.

Contributors

Contact person:

  • 1. Student (M.Sc Information Systems) Department of Computing Sciences, School of Information Science and Technology, Kisii University Kenya.

Description

Abstract: Biometric technology has been seen as a driving force for the future direction of strong authentication. Although Biometric has been deemed by many scholars as secure method of identification and verification, few banks in Kenya have implemented the use of biometric features such as fingerprints for customer and systems user identification. There are some that put in place the system but failed to fully utilize the system. What could be the key determinants to successful implementation or adoption of the biometric systems for identification and verification. What are the elements that makes it possible for a banking institution to effectively adopt and use the biometric systems for identification and verification. The study sought to determine the effect of security and privacy in biometric application for authorization and identification in cyber security in banks in Eldoret Town. The study was guided by the contingency theory, diffusion innovation theory, and unified theory of acceptance and use of technology. A descriptive survey design was used. The study comprised of 548 employees from 30 commercial banks in Eldoret Town. The study concludes that security and privacy influence biometric application in authorization and identification in cyber security in banks in Kenya. The study recommended that banks should provide convenient and more secured banking services to customers. Additionally, the study recommended a model for evaluation of biometric system before its implementation. The model will be used to ensure successful implementation and application of the system. The determinants are: security and privacy. Biometric technology in banks needs to integrate with the existing traditional security system which will help the banks the level of authorization and identification cyber security.

Notes

Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP) © Copyright: All rights reserved.

Files

H96570712823.pdf

Files (477.7 kB)

Name Size Download all
md5:0ca78fb0db37d38aa92f72b140bceb94
477.7 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2278-3075 (ISSN)

References

  • Glaser, A. (2016). Biometrics are Coming Along Serious Security Concerns. International Journal for Sucurity, 3(1), 21-34.
  • Richardson, A. (2013). Biometric Application and its Influence in the Organization Performance. International Journal on Information Security.
  • Spolaor, R., Li, Q., Monaro, M., Conti, M., Gamberini, L., & Sartori, G. (2016). Biometric Authentication Methods on Smartphones: A Survey. PsychNology Journal, 14(2).
  • Wayman, J. L. (2016). Biometrics in Identity Management Systems. IEEE Security and Privacy Magazine, 6(2), 30-37.
  • Iqbal, I., & Qadir, B. (2012). Biometric technology - Attitudes & influencing factors when trying to adopt this technology in Blekinge healthcare. Karlskrona: Blekinge Institute of Technology.
  • Vijayan, J. (2014). Corporate America Slow to Adopt Biometric Technologies. 38(32), 1-2.
  • Chandra, A., & Calderon, T. (2015). Challenges and constraints to the diffusion of biometrics in information systems. Commun. ACM, 48(12), 101-106.
  • Malla, A. H. (2018). A Gaze-Based Authentication System: From Authentication to Intrusion Detection. Thesis, Texas A&M University.
  • Collins, D. (2016) Factors influencing adoption of electronic payments in banks in Mexico. International Journal in Information Technology, Volume 5: Pages 34-89.
  • Adebayo, T. & Olukenya, O. (2015) Determinants of adoption of biometric application for authorization and identification among patients in public hospitals in Ghana. International Journal of Computer Science and Information Security, 31(2), 56-71.
  • Amutebo, R. (2016) Factors influencing adoption of mobile banking in banks in Uganda. African Journal of Information and Communication Technology Research, 53(4), 121-142.
  • Mwai, N. M. (2015) Factors contributing to occurrence of cybercrime on E-banking in commercial banks in Nairobi Kenya. Unpublished Project, United States International University (USIU).
  • McNabb, D. E. (2015). Research methods for political science: Quantitative and qualitative methods. Routledge.

Subjects

ISSN: 2278-3075 (Online)
https://portal.issn.org/resource/ISSN/2278-3075#
Retrieval Number: 100.1/ijitee.H96570712823
https://www.ijitee.org/portfolio-item/H96570712823/
Journal Website: www.ijitee.org
https://www.ijitee.org/
Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
https://www.blueeyesintelligence.org/