Effectiveness of Iphone’s Touch ID: KSA Case Study

Abstract

A new trend of incorporating Touch ID sensors in mobile devices is appearing. Last year, Apple released a new model of its famous iPhone (5s). One of the most anticipated and hailed features of the new device was its Touch ID. Apple advertised that the new technology will increase the security of its device, and it will also be used in different applications as a proof of identity. To make the issue more controversial, Apple announced a new financial service (Apple Pay) that allows iPhone 6 users to use their iPhone as a replacement to credit cards. The minute the new technology was introduced; many questions appeared that needed immediate answers. Users were concerned about how it will work? Is it easy to use? Is it really safe? And whether it will be effective in protecting their private data or not? In this paper we provide a comprehensive study of this feature. We discuss the advantages and disadvantages of using it. Then we analyze and share the results of a survey that we conducted to measure the effectiveness of such feature in the Kingdom of Saudi Arabia (KSA). In this study, we only focus on users from KSA, because if the device fails to protect mobile’s data, severe consequences might happen. Due to cultural believes in KSA, releasing mobile contents to unauthorized people could lead to crimes. Survey analysis revealed somewhat controversial results, while 76% of all participants believe that this technology will improve the device security, only 33% use it to lock/unlock their devices, and even a smaller percentage use it to make purchases.

Authors and Affiliations

Ahmad Al-Daraiseh, Diana Omari, Hadeel Hamid, Nada Hamad, Rawan Althemali

Keywords

Related Articles

Reduced Complexity Divide and Conquer Algorithm for Large Scale TSPs

The Traveling Salesman Problem (TSP) is the problem of finding the shortest path passing through all given cities while only passing by each city once and finishing at the same starting city. This problem has NP-hard com...

Arabic Text Classification using Feature-Reduction Techniques for Detecting Violence on Social Media

With the current increase in the number of online users, there has been a concomitant increase in the amount of data shared online. Techniques for discovering knowledge from these data can provide us with valuable inform...

Identification of Issues and Challenges in Romanized Sindhi Text

Now-a-days Sindhi language is widely used in internet for the various purposes such as: newspapers, Sindhi literature, books, educational/official websites and social networks communications, teaching and learning proces...

An Explorative Study for Laundry Mobile Application

With the current rapid development of technology, many services need redesigning in order to keep up with customer demands. Therefore, organizations nowadays resort to redesigning services and business processes in order...

A Survey on Models and Query Languages for Temporally Annotated RDF

In this paper, we provide a survey on the models and query languages for temporally annotated RDF. In most of the works, a temporally annotated RDF ontology is essentially a set of RDF triples associated with temporal co...

Download PDF file
  • EP ID EP94837
  • DOI 10.14569/IJACSA.2015.060122
  • Views 90
  • Downloads 0

How To Cite

Ahmad Al-Daraiseh, Diana Omari, Hadeel Hamid, Nada Hamad, Rawan Althemali (2015). Effectiveness of Iphone’s Touch ID: KSA Case Study. International Journal of Advanced Computer Science & Applications, 6(1), 154-161. https://europub.co.uk./articles/-A-94837