Effectiveness of Iphone’s Touch ID: KSA Case Study

Abstract

A new trend of incorporating Touch ID sensors in mobile devices is appearing. Last year, Apple released a new model of its famous iPhone (5s). One of the most anticipated and hailed features of the new device was its Touch ID. Apple advertised that the new technology will increase the security of its device, and it will also be used in different applications as a proof of identity. To make the issue more controversial, Apple announced a new financial service (Apple Pay) that allows iPhone 6 users to use their iPhone as a replacement to credit cards. The minute the new technology was introduced; many questions appeared that needed immediate answers. Users were concerned about how it will work? Is it easy to use? Is it really safe? And whether it will be effective in protecting their private data or not? In this paper we provide a comprehensive study of this feature. We discuss the advantages and disadvantages of using it. Then we analyze and share the results of a survey that we conducted to measure the effectiveness of such feature in the Kingdom of Saudi Arabia (KSA). In this study, we only focus on users from KSA, because if the device fails to protect mobile’s data, severe consequences might happen. Due to cultural believes in KSA, releasing mobile contents to unauthorized people could lead to crimes. Survey analysis revealed somewhat controversial results, while 76% of all participants believe that this technology will improve the device security, only 33% use it to lock/unlock their devices, and even a smaller percentage use it to make purchases.

Authors and Affiliations

Ahmad Al-Daraiseh, Diana Omari, Hadeel Hamid, Nada Hamad, Rawan Althemali

Keywords

Related Articles

Student Facial Authentication Model based on OpenCV’s Object Detection Method and QR Code for Zambian Higher Institutions of Learning

Facial biometrics captures human facial physiological data, converts it into a data item variable so that this stored variable may be used to provide information security services, such as authentication, integrity manag...

 GUI Database for the Equipment Store of the Department of Geomatic Engineering, KNUST

 The geospatial analyst is required to apply art, science, and technology to measure relative positions of natural and man-made features above or beneath the earth’s surface, and to present this information either g...

Cryptic Mining in Light of Artificial Intelligence

The analysis of cryptic text is hard problem”, and there is no fixed algorithm for generating plain-text from cipher text. Human brains do this intelligently. The intelligent cryptic analysis process needs learning algor...

A New Reliability Model for Evaluating Trustworthiness of Intelligent Agents in Vertical Handover 

Our previous works have proposed the deployment of mobile agents to assist vertical handover decisions in 4G. Adding a mobile agent in the 4G could lead to many advantages such as reduced consumption of network bandwidth...

A Novel Algorithm to Improve Resolution for Very Few Samples

This paper presents a new technic to improve resolution and direction of arrival (DOA) estimation of two closed source, in array processing, when only few samples of received signal are available. In these conditions, th...

Download PDF file
  • EP ID EP94837
  • DOI 10.14569/IJACSA.2015.060122
  • Views 63
  • Downloads 0

How To Cite

Ahmad Al-Daraiseh, Diana Omari, Hadeel Hamid, Nada Hamad, Rawan Althemali (2015). Effectiveness of Iphone’s Touch ID: KSA Case Study. International Journal of Advanced Computer Science & Applications, 6(1), 154-161. https://europub.co.uk/articles/-A-94837