Effectiveness of Iphone’s Touch ID: KSA Case Study
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 1
Abstract
A new trend of incorporating Touch ID sensors in mobile devices is appearing. Last year, Apple released a new model of its famous iPhone (5s). One of the most anticipated and hailed features of the new device was its Touch ID. Apple advertised that the new technology will increase the security of its device, and it will also be used in different applications as a proof of identity. To make the issue more controversial, Apple announced a new financial service (Apple Pay) that allows iPhone 6 users to use their iPhone as a replacement to credit cards. The minute the new technology was introduced; many questions appeared that needed immediate answers. Users were concerned about how it will work? Is it easy to use? Is it really safe? And whether it will be effective in protecting their private data or not? In this paper we provide a comprehensive study of this feature. We discuss the advantages and disadvantages of using it. Then we analyze and share the results of a survey that we conducted to measure the effectiveness of such feature in the Kingdom of Saudi Arabia (KSA). In this study, we only focus on users from KSA, because if the device fails to protect mobile’s data, severe consequences might happen. Due to cultural believes in KSA, releasing mobile contents to unauthorized people could lead to crimes. Survey analysis revealed somewhat controversial results, while 76% of all participants believe that this technology will improve the device security, only 33% use it to lock/unlock their devices, and even a smaller percentage use it to make purchases.
Authors and Affiliations
Ahmad Al-Daraiseh, Diana Omari, Hadeel Hamid, Nada Hamad, Rawan Althemali
A Brief Survey on 5G Wireless Mobile Network
The new upcoming technology of the fifth generation wireless mobile network is advertised as lightning speed internet, everywhere, for everything, for everyone in the nearest future. There are a lot of efforts and resear...
Internal Model Control of A Class of Continuous Linear Underactuated Systems
This paper presents an Internal Model Control (IMC) structure designed for a class of continuous linear underactuated systems. The study treats the case of Minimum Phase (MP) systems and those whose zero dynamics are not...
A General Model for Similarity Measurement between Objects
The problem to detect the similarity or the differ-ence between objects are faced regularly in several domains of applications such as e-commerce, social network, expert system, data mining, decision support system, etc....
Unifying Modeling Language-Merise Integration Approach for Software Design
Software design is the most crucial step in the software development process that is why it must be given a good care. Software designers must go through many modeling steps to end up with a good design that will allow f...
Use of Non-Topological Node Attribute Values for Probabilistic Determination of Link Formation
Here we propose a probabilistic model for determining link formation, using Naïve Bayes Classifier on non-topological attribute values of nodes, in a social network. The proposed model gives a score which helps to determ...