New Technologies in E-Banking: Convenient and Trustworthy?

New Technologies in E-Banking: Convenient and Trustworthy?

Niels Jørgensen
Copyright: © 2007 |Pages: 16
ISBN13: 9781599041711|ISBN10: 1599041715|ISBN13 Softcover: 9781616927783|EISBN13: 9781599041735
DOI: 10.4018/978-1-59904-171-1.ch006
Cite Chapter Cite Chapter

MLA

Jørgensen, Niels. "New Technologies in E-Banking: Convenient and Trustworthy?." Managing Information Assurance in Financial Services, edited by H.R. Rao, et al., IGI Global, 2007, pp. 136-151. https://doi.org/10.4018/978-1-59904-171-1.ch006

APA

Jørgensen, N. (2007). New Technologies in E-Banking: Convenient and Trustworthy?. In H. Rao, M. Gupta, & S. Upadhyaya (Eds.), Managing Information Assurance in Financial Services (pp. 136-151). IGI Global. https://doi.org/10.4018/978-1-59904-171-1.ch006

Chicago

Jørgensen, Niels. "New Technologies in E-Banking: Convenient and Trustworthy?." In Managing Information Assurance in Financial Services, edited by H.R. Rao, Manish Gupta, and Shambhu J. Upadhyaya, 136-151. Hershey, PA: IGI Global, 2007. https://doi.org/10.4018/978-1-59904-171-1.ch006

Export Reference

Mendeley
Favorite

Abstract

In e-banking, user authentication with mobile phones and special-purpose cryptographic tokens is a promising alternative to conventional approaches, such as digital signatures on a personal computer (PC). Special-purpose tokens that do not have external connections avoid viruses transmitted via the Internet. Moreover, phones and tokens are mobile. The chapter assesses the potential of new technologies for user authentication (verification of the user’s identity) on the basis of a practical test and an analysis of trust. The practical test comprises a password generator, mobile phones with short message service (SMS), wireless application protocol (WAP), and third generation (3G), and (conventional) PC-based authentication, using digital signatures—all as used by a Danish e-bank. On the one hand, the test indicates that in some ways the hardware-based technologies are indeed easier to use. On the other hand, the trust analysis indicates that the secrecy of the new approaches may be a weakness, since there is no publicly available analysis of their security. The secrecy of the hardware-based technologies may be justified by the need to prevent various attacks, such as physically opening a password generator to determine its secret key. A prerequisite for consumer trust in the hardware-based technologies may be the introduction of security evaluation methods that do not disclose the secret parts of the technologies to the public and are conducted by public authorities or independent third parties.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.