A Novel Approach to Improve the Security of Automated Teller Machines (ATMs) in Namibia

Chucknorris Garikayi Madamombe

Abstract


Abstract - The purpose of the study was to identify and review the existing security features that influences the use of ATMs in Namibian perspective. Worldwide, fraud cases involving ATM card cloning have been increasing over the past decade. If this is not solved, it is a major concern as many customers will continue to lose their hard earned money to criminals. Various forms of fraud are perpetuated at ATMs when using PIN number based user authentication which are; card cloning, PIN theft and PIN cracking. In this study, qualitative research approach was used to collect data using a self-prepared interview schedule. In-depth interviews were conducted with thirteen (13) officials from the police department, various commercial banks and a university in Namibia. Results from the qualitative research study indicated that the current security features of ATMs in Namibia are; PIN numbers, placing of ATMs at secure locations, CCTV cameras and daily limit withdrawals on ATM machines. However, these security features are not enough to protect against ATM frauds. There is need to make use of biometric fingerprints together with PIN numbers to enhance security features of ATMs.

Keywords:

Automated Teller Machine (ATM), Biometrics, Personal Identification Number (PIN), Fingerprint.


Full Text:

PDF

References


Adeloye, L.A. (2008, September 14). E-banking as new frontiers for banks. Sunday Punch, P. 25.

Amin, N. F. M., Chong, S. E., Hashim, N. Z. A., & Chizari, H. (2015). Security issues in ATM smart card technology. International Journal of Mathematics and Computational Science, 11, 199–205.

Berg, B. L. (2011). Qualitative Research Methods for the Social Sciences (6th Edition). Needham Heights, MA: Allyn and Bacon.

Berkman, O., & Ostrovsky, O. M. (2015). The unbearable lightness of PIN cracking: In financial cryptography and data security. Journal of Internet Banking and Commerce, 4, 578-585.

Bhosale, S.T., & Sawant, B.S. (2012). Security in e-banking via card less biometric ATMs. International Journal of Advanced Technology & Engineering Research, 4, 256-264.

Biswas, S., Bardhan R.A., Ghosh K., & Dey, N. (2012). A biometric authentication based secured ATM banking system. International Journal of Advanced Research in Computer Science and Software Engineering, 2, 345-876.

Blanche, M. T., Durrhein, T., & Painter, D. (2008). Research in Practice (2nd Edition). Cape Town: UTC Press.

Brunner, A., Decressin, J. & Kudela, B. (2014). Germany’s Three-pillar banking system: cross country perspectives in Europe, International Journal of Scientific and Technology Research, 6, 94 – 99.

Card fraud cost Namibia N$8m in 2016. (2017, January 11). The Free Press of Namibia, p. 22.

Creswell, J. (2010). Research design: Qualitative, quantitative and mixed methods approaches (2nd Ed.) Thousand Oaks, CA: SAGE Publications.

Dhir, A., Kaur, P., Chen, S., & Lonka, K. (2016). Understanding online regret experience in Facebook use. Effects of brand participation, accessibility and problematic use. Computers in Human Behavior, 59, 420 – 430.

Diebold, I. (2012, August 21). ATM fraud and security. Nigeria Daily News, P. 18.

Gill, J., & Johnson, P. (2010). Research Methods for Managers (3rd Edition). London: Sage.

Henning, E., Rensburg, V., & Smith, M. (2009). Finding your way in qualitative research. Research: Pretoria: Van Schalk Publishers.

Hooda, K. (2016). ATM security. International Journal of Scientific and Research, 4, 159 – 166.

Jebaline, R., & Gomathi, S. (2015). A novel method to enhance the security of ATM using biometrics. International Conference on Circuit, Power and Computing Technologies, 11, 246-257.

Johnson, B., & Christensen L. (2010). Educational research: quantitative, qualitative and mixed approaches (2nd.). Boston: Pearson.

Kothari, C.R. (2009). Research methodology, methods and techniques. Second Revised Edition New Age International (P) Limited, Publishers

Kumar, A. C., Prasad, S.K.M., Rani, A.H., Gowthami, N., Impana, R., & Nalina, R. (2016). Biometric based novel automatic teller machine (ATM). International Journal of Advanced Research in Computer Science and Software Engineering, 6, 646 – 650.

Li, X., Niu, J. B., Maa, J., Wanga, W. D., & Liu, C. L. (2011). Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 34, 3–79.

Malviya, D. (2014). Face recognition technique: Enhanced safety approach for ATM. International Journal of Scientific and Research Publications, 10, 2250–2265.

Malviya, D. (2014). Face recognition technique: Enhanced safety approach for ATM. International Journal of Scientific and Research Publications, 10, 2250–2265.

Menges, W. (2009). Bank card forgery suspects face mammoth fraud. Retrieved from http://www.namibian.com.na/

Mohammed, L. A. (2011). Use of biometrics to tackle ATM fraud. International Conference on Business and Economics Research, 10, 456–465.

Mohammed, L. A. (2011). Use of biometrics to tackle ATM fraud. International Conference on Business and Economics Research, 10, 456–465.

Moses, O. O., & Ignatius, M. E. (2012). ATM security using fingerprint biometric identifier: An investigative study. International Journal of Advanced Computer Science and Applications, 3, 68 – 72.

Moses, O. O., & Ignatius, M. E. (2012). ATM security using fingerprint biometric identifier: An investigative study. International Journal of Advanced Computer Science and Applications, 3, 68 – 72.

Nawaz, A., Hossain, F.S., & Grihan K.M. (2013). An energy efficient ATM system using AES processor. Electrical Engineering Research (EER), 2, 42-47.

Obiano, W. (2009, June 21). How to fight ATM fraud. Nigeria Daily News. Retrieved from http://www.nytimes.com

Oko, S., & Oruh, J. (2012). Enhanced ATM security system using biometrics. International Journal of Computer Science, 13, 768–778.

Pienaar, R. (2016). N$38m lost to banking fraud. Retrieved from http://www.thevillager.com.na/

Praveen, P., Balaji, S., & Chakravarthy, A.S.N. (2012). A novel approach for enhancing security in smart cards using biometrics. International Journal of Computer Applications, 8, 37-42.

Ravi, J., Raja, K. B., & Venugopal, K. R. (2016). Fingerprint recognition using minutia score matching. International Journal of Engineering Science and Technology, 12, 235-242.

Richard, B., & Alemayehu, M. (2012). Developing e-banking capabilities in a Ghanaian bank: Preliminary lessons. Journal of Internet Banking and Commerce, 2, 678-685.

Roli, B., Priti S., & Punam B. (2011). Minutiae extraction from fingerprint images. International Journal of Computer Science Issues, 5, 694-0814.

Shinde, A., & Bendre, V. (2015). An embedded fingerprint authentication system. International Conference on Computing Communication Control and Automation, 8, 205-208.

Signh, S., Akhile, S., & Kumar, R. (2016). A constraint-based biometric scheme on ATM and swiping machine. International Conference on Computational Techniques in Information and Communication Technologies, 14, 813-827.

Sivasankari, N., & Muthukumar, A. (2016). A review on recent techniques in multimodal biometrics. International Conference on Computer Communication and Informatics, 9, 673-680.

Yadav, G. (2013). Applications of Biometrics in Secure Bank Transactions. International Journal of Scientific and Technology Research, 7, 124 – 127.

Yildrim, M. T., & Basturk, A. (2016). A detail preserving type-2 fuzzy logic filter for impulse noise removal from digital images. Fuzzy systems conference.

Yin, R. R. (2008). A case study research: design and methods. Newbury Park: Sage.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.