Effectiveness of Iphone’s Touch ID: KSA Case Study

Abstract

A new trend of incorporating Touch ID sensors in mobile devices is appearing. Last year, Apple released a new model of its famous iPhone (5s). One of the most anticipated and hailed features of the new device was its Touch ID. Apple advertised that the new technology will increase the security of its device, and it will also be used in different applications as a proof of identity. To make the issue more controversial, Apple announced a new financial service (Apple Pay) that allows iPhone 6 users to use their iPhone as a replacement to credit cards. The minute the new technology was introduced; many questions appeared that needed immediate answers. Users were concerned about how it will work? Is it easy to use? Is it really safe? And whether it will be effective in protecting their private data or not? In this paper we provide a comprehensive study of this feature. We discuss the advantages and disadvantages of using it. Then we analyze and share the results of a survey that we conducted to measure the effectiveness of such feature in the Kingdom of Saudi Arabia (KSA). In this study, we only focus on users from KSA, because if the device fails to protect mobile’s data, severe consequences might happen. Due to cultural believes in KSA, releasing mobile contents to unauthorized people could lead to crimes. Survey analysis revealed somewhat controversial results, while 76% of all participants believe that this technology will improve the device security, only 33% use it to lock/unlock their devices, and even a smaller percentage use it to make purchases.

Authors and Affiliations

Ahmad Al-Daraiseh, Diana Omari, Hadeel Hamid, Nada Hamad, Rawan Althemali

Keywords

Related Articles

Analysis of the Impact of Different Parameter Settings on Wireless Sensor Network Lifetime

The importance of wireless sensors is increasing day by day due to their large demand. Sensor networks are facing some issues in which battery lifetime of sensor node is critical. It depends on the nature and application...

Pricing Schemes in Cloud Computing: An Overview

Cloud Computing is one of the technologies with rapid development in recent years where there is increasing interest in industry and academia. This technology enables many services and resources for end users. With the r...

Time Series Analysis for Shortened Labor Mean Interval of Dairy Cattle with the Data of BCS, RFS, Weight, Amount of Milk and Outlook

MTime series analysis for shortened labor mean interval of dairy cattle with the data of Body Condition Score (BCS), Rumen Fill Score (RFS), Weight, Amount of Milk and Outlook is conducted. Method for shortened the labor...

Network Packet Classification using Neural Network based on Training Function and Hidden Layer Neuron Number Variation

Distributed denial of service (DDoS) is a structured network attack coming from various sources and fused to form a large packet stream. DDoS packet stream pattern behaves as normal packet stream pattern and very difficu...

 A Comprehensive Analysis of Materialized Views in a Data Warehouse Environment

 Data in a warehouse can be perceived as a collection of materialized views that are generated as per the user requirements specified in the queries being generated against the information contained in the wareh...

Download PDF file
  • EP ID EP94837
  • DOI 10.14569/IJACSA.2015.060122
  • Views 92
  • Downloads 0

How To Cite

Ahmad Al-Daraiseh, Diana Omari, Hadeel Hamid, Nada Hamad, Rawan Althemali (2015). Effectiveness of Iphone’s Touch ID: KSA Case Study. International Journal of Advanced Computer Science & Applications, 6(1), 154-161. https://europub.co.uk/articles/-A-94837