Security and Privacy Determinants in Biometric Application in Cyber Security in Banks in Eldoret Town, Kenya

Main Article Content

Misoi K. Thomas
Dr. James Ogalo
Dr. Ben Maake

Abstract

Biometric technology has been seen as a driving force for the future direction of strong authentication. Although Biometric has been deemed by many scholars as secure method of identification and verification, few banks in Kenya have implemented the use of biometric features such as fingerprints for customer and systems user identification. There are some that put in place the system but failed to fully utilize the system.What could be the key determinants to successful implementation or adoption of the biometric systems for identification and verification. What are the elements that makes it possible for a banking institution to effectively adopt and use the biometric systems for identification and verification. The study sought to determine the effect of security and privacy in biometric application for authorization and identification in cyber security in banks in Eldoret Town. The study was guided by the contingency theory, diffusion innovation theory, and unified theory of acceptance and use of technology. A descriptive survey design was used. The study comprised of 548 employees from 30 commercial banks in Eldoret Town. The study concludes that security and privacy influence biometric application in authorization and identification in cyber security in banks in Kenya. The study recommended that banks should provide convenient and more secured banking services to customers. Additionally, the study recommended a model for evaluation of biometric system before its implementation. The model will be used to ensure successful implementation and application of the system. The determinants are: security and privacy. Biometric technology in banks needs to integrate with the existing traditional security system which will help the banks the level of authorization and identification cyber security. 

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
Misoi K. Thomas, Dr. James Ogalo, and Dr. Ben Maake , Trans., “Security and Privacy Determinants in Biometric Application in Cyber Security in Banks in Eldoret Town, Kenya”, IJITEE, vol. 12, no. 8, pp. 28–33, Jul. 2023, doi: 10.35940/ijitee.H9657.0712823.
Section
Articles

How to Cite

[1]
Misoi K. Thomas, Dr. James Ogalo, and Dr. Ben Maake , Trans., “Security and Privacy Determinants in Biometric Application in Cyber Security in Banks in Eldoret Town, Kenya”, IJITEE, vol. 12, no. 8, pp. 28–33, Jul. 2023, doi: 10.35940/ijitee.H9657.0712823.
Share |

References

Glaser, A. (2016). Biometrics are Coming Along Serious Security Concerns. International Journal for Sucurity, 3(1), 21-34.

Richardson, A. (2013). Biometric Application and its Influence in the Organization Performance. International Journal on Information Security.

Spolaor, R., Li, Q., Monaro, M., Conti, M., Gamberini, L., & Sartori, G. (2016). Biometric Authentication Methods on Smartphones: A Survey. PsychNology Journal, 14(2).

Wayman, J. L. (2016). Biometrics in Identity Management Systems. IEEE Security and Privacy Magazine, 6(2), 30-37.

Iqbal, I., & Qadir, B. (2012). Biometric technology - Attitudes & influencing factors when trying to adopt this technology in Blekinge healthcare. Karlskrona: Blekinge Institute of Technology.

Vijayan, J. (2014). Corporate America Slow to Adopt Biometric Technologies. 38(32), 1-2.

Chandra, A., & Calderon, T. (2015). Challenges and constraints to the diffusion of biometrics in information systems. Commun. ACM, 48(12), 101-106.

Malla, A. H. (2018). A Gaze-Based Authentication System: From Authentication to Intrusion Detection. Thesis, Texas A&M University

Collins, D. (2016) Factors influencing adoption of electronic payments in banks in Mexico. International Journal in Information Technology, Volume 5: Pages 34-89.

Adebayo, T. & Olukenya, O. (2015) Determinants of adoption of biometric application for authorization and identification among patients in public hospitals in Ghana. International Journal of Computer Science and Information Security, 31(2), 56-71.

Amutebo, R. (2016) Factors influencing adoption of mobile banking in banks in Uganda. African Journal of Information and Communication Technology Research, 53(4), 121-142.

Mwai, N. M. (2015) Factors contributing to occurrence of cybercrime on E-banking in commercial banks in Nairobi Kenya. Unpublished Project, United States International University (USIU).

McNabb, D. E. (2015). Research methods for political science: Quantitative and qualitative methods. Routledge.

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 10 > >>