DIGITAL IDENTITY MODELLING FOR DIGITAL FINANCIAL SERVICES IN ZAMBIA

ICTACT Journal on Communication Technology ( Volume: 9 , Issue: 3 )

Abstract

vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff1897280000000479010001000600
Identification and verification have always been at the heart of financial services and payments, which is even more the case in the digital age. So, while banks have long been trusted to keep money safe, is there a new role for them as stewards of digital identity? Governments should, in consultation with the private sector, develop a national identity strategy based on a federated-style model in which public and private sector identity providers would compete to supply trusted digital identities to individuals and businesses. Back then, when the world seemed smaller, slower and more local, physical identity documents were adequate for face-to-face transactions. However, the Internet changed everything. It shrank distances, created new business models and generally sped everything up. From the innovation lifecycle to access to information, processes and the clock-speed on risk, the Internet has accelerated everything. The use of Internet in doing business has grown over the years in Africa and Zambia in particular. As such, the incidences of online identity theft have grown too. Identity theft is becoming a prevalent and increasing problem in Zambia. An identity thief only requires certain identity information to decimate a victim's life and credit. This research proposes to identify and extract various forms of identity attributes from various sources used in the physical and cyberspace to identity users accessing the financial services through extracting identity attributes from the various forms of identity credentials and application forms. Finally, design a digital identity model based on Shannon’s Information theory and Euclidean metric based Euclidean Distance Geometry (EDG) to be used for quantifying, implementation and validating of extracted identity attributes from various forms of identity credentials and application forms, in an effective way.

Authors

Wakwinji Inambao1, Jackson Phiri2, Douglas Kunda3
Mulungushi University, Zambia1,2, University of Zambia, Zambia3

Keywords

Identity Theft, Identity Credential Attributes, Security, Digital Identity Model, Business

Published By
ICTACT
Published In
ICTACT Journal on Communication Technology
( Volume: 9 , Issue: 3 )
Date of Publication
September 2018
Pages
1829-1837

ICT Academy is an initiative of the Government of India in collaboration with the state Governments and Industries. ICT Academy is a not-for-profit society, the first of its kind pioneer venture under the Public-Private-Partnership (PPP) model

Contact Us

ICT Academy
Module No E6 -03, 6th floor Block - E
IIT Madras Research Park
Kanagam Road, Taramani,
Chennai 600 113,
Tamil Nadu, India

For Journal Subscription: journalsales@ictacademy.in

For further Queries and Assistance, write to us at: ictacademy.journal@ictacademy.in