DIGITAL IDENTITY MODELLING FOR DIGITAL FINANCIAL SERVICES IN ZAMBIA
Abstract
vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff1897280000000479010001000600
Identification and verification have always been at the heart of financial services and payments, which is even more the case in the digital age. So, while banks have long been trusted to keep money safe, is there a new role for them as stewards of digital identity? Governments should, in consultation with the private sector, develop a national identity strategy based on a federated-style model in which public and private sector identity providers would compete to supply trusted digital identities to individuals and businesses. Back then, when the world seemed smaller, slower and more local, physical identity documents were adequate for face-to-face transactions. However, the Internet changed everything. It shrank distances, created new business models and generally sped everything up. From the innovation lifecycle to access to information, processes and the clock-speed on risk, the Internet has accelerated everything. The use of Internet in doing business has grown over the years in Africa and Zambia in particular. As such, the incidences of online identity theft have grown too. Identity theft is becoming a prevalent and increasing problem in Zambia. An identity thief only requires certain identity information to decimate a victim's life and credit. This research proposes to identify and extract various forms of identity attributes from various sources used in the physical and cyberspace to identity users accessing the financial services through extracting identity attributes from the various forms of identity credentials and application forms. Finally, design a digital identity model based on Shannon’s Information theory and Euclidean metric based Euclidean Distance Geometry (EDG) to be used for quantifying, implementation and validating of extracted identity attributes from various forms of identity credentials and application forms, in an effective way.

Authors
Wakwinji Inambao1, Jackson Phiri2, Douglas Kunda3
Mulungushi University, Zambia1,2, University of Zambia, Zambia3

Keywords
Identity Theft, Identity Credential Attributes, Security, Digital Identity Model, Business
Yearly Full Views
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
002000000000
Published By :
ICTACT
Published In :
ICTACT Journal on Communication Technology
( Volume: 9 , Issue: 3 , Pages: 1829-1837 )
Date of Publication :
September 2018
Page Views :
190
Full Text Views :
2

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.