IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

New Technologies in E-Banking: Convenient and Trustworthy?

New Technologies in E-Banking: Convenient and Trustworthy?
View Sample PDF
Author(s): Niels Jørgensen (Roskilde University, Denmark)
Copyright: 2007
Pages: 16
Source title: Managing Information Assurance in Financial Services
Source Author(s)/Editor(s): H.R. Rao (University at Buffalo, State University of New York, USA), Manish Gupta (State University of New York, USA)and Shambhu J. Upadhyaya (University at Buffalo, State University of New York, USA)
DOI: 10.4018/978-1-59904-171-1.ch006

Purchase

View New Technologies in E-Banking: Convenient and Trustworthy? on the publisher's website for pricing and purchasing information.

Abstract

In e-banking, user authentication with mobile phones and special-purpose cryptographic tokens is a promising alternative to conventional approaches, such as digital signatures on a personal computer (PC). Special-purpose tokens that do not have external connections avoid viruses transmitted via the Internet. Moreover, phones and tokens are mobile. The chapter assesses the potential of new technologies for user authentication (verification of the user’s identity) on the basis of a practical test and an analysis of trust. The practical test comprises a password generator, mobile phones with short message service (SMS), wireless application protocol (WAP), and third generation (3G), and (conventional) PC-based authentication, using digital signatures—all as used by a Danish e-bank. On the one hand, the test indicates that in some ways the hardware-based technologies are indeed easier to use. On the other hand, the trust analysis indicates that the secrecy of the new approaches may be a weakness, since there is no publicly available analysis of their security. The secrecy of the hardware-based technologies may be justified by the need to prevent various attacks, such as physically opening a password generator to determine its secret key. A prerequisite for consumer trust in the hardware-based technologies may be the introduction of security evaluation methods that do not disclose the secret parts of the technologies to the public and are conducted by public authorities or independent third parties.

Related Content

V. V. Devi Prasad Kotni, Sujit Kumar Patra, Sunil Kumar. © 2024. 21 pages.
Adekunle Alexander Balogun, Gbenga Olorunmade. © 2024. 15 pages.
Ashwani Sharma, Nitpal Singh Rathod. © 2024. 15 pages.
Peterson K. Ozili. © 2024. 11 pages.
Yusuf Olatunji Oyedeko, Adesola Trust Gbadebo. © 2024. 15 pages.
Oladapo Fepetu, Pelumi Abdulmalik Adewumi. © 2024. 21 pages.
Rifkatu Nghargbu. © 2024. 16 pages.
Body Bottom