Systematic review of authentication techniques in banking applications in Latin America

Descripción del Articulo

Computer security, especially authentication in banking applications, has become a critical issue to ensure the integrity and confidentiality of users’ financial information. The current situation presents significant challenges, such as vulnerability to attacks, lack of strong authentication, and l...

Descripción completa

Detalles Bibliográficos
Autores: Puma Herencia, Luis R., Merma Mayhua, Glenda Julia, Alfaro Casas, Luis A., Nina Choquehuayta, Wilder
Formato: objeto de conferencia
Fecha de Publicación:2024
Institución:Universidad Tecnológica del Perú
Repositorio:UTP-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorio.utp.edu.pe:20.500.12867/14421
Enlace del recurso:https://hdl.handle.net/20.500.12867/14421
https://doi.org/10.18687/LACCEI2024.1.1.201
Nivel de acceso:acceso abierto
Materia:Banking applications
Computer security
Latin America
Multi-factor authentication
https://purl.org/pe-repo/ocde/ford#2.02.04
id UTPD_0254cbebc0c4799198cf7d8b347dfd29
oai_identifier_str oai:repositorio.utp.edu.pe:20.500.12867/14421
network_acronym_str UTPD
network_name_str UTP-Institucional
repository_id_str 4782
dc.title.es_PE.fl_str_mv Systematic review of authentication techniques in banking applications in Latin America
title Systematic review of authentication techniques in banking applications in Latin America
spellingShingle Systematic review of authentication techniques in banking applications in Latin America
Puma Herencia, Luis R.
Banking applications
Computer security
Latin America
Multi-factor authentication
https://purl.org/pe-repo/ocde/ford#2.02.04
title_short Systematic review of authentication techniques in banking applications in Latin America
title_full Systematic review of authentication techniques in banking applications in Latin America
title_fullStr Systematic review of authentication techniques in banking applications in Latin America
title_full_unstemmed Systematic review of authentication techniques in banking applications in Latin America
title_sort Systematic review of authentication techniques in banking applications in Latin America
author Puma Herencia, Luis R.
author_facet Puma Herencia, Luis R.
Merma Mayhua, Glenda Julia
Alfaro Casas, Luis A.
Nina Choquehuayta, Wilder
author_role author
author2 Merma Mayhua, Glenda Julia
Alfaro Casas, Luis A.
Nina Choquehuayta, Wilder
author2_role author
author
author
dc.contributor.author.fl_str_mv Puma Herencia, Luis R.
Merma Mayhua, Glenda Julia
Alfaro Casas, Luis A.
Nina Choquehuayta, Wilder
dc.subject.es_PE.fl_str_mv Banking applications
Computer security
Latin America
Multi-factor authentication
topic Banking applications
Computer security
Latin America
Multi-factor authentication
https://purl.org/pe-repo/ocde/ford#2.02.04
dc.subject.ocde.es_PE.fl_str_mv https://purl.org/pe-repo/ocde/ford#2.02.04
description Computer security, especially authentication in banking applications, has become a critical issue to ensure the integrity and confidentiality of users’ financial information. The current situation presents significant challenges, such as vulnerability to attacks, lack of strong authentication, and lack of cybersecurity coordination across the region. The objective is to provide a systematic review on the updated and comprehensive perspective on authentication security in banking applications in Latin America, identifying trends, gaps and research opportunities. The methodology used followed a clear approach, using the PICO strategy to formulate the research question. An exhaustive review was carried out on the studies, applying inclusion and exclusion criteria, and following PRISMA guidelines. Having 150 articles as a base quantity from 2019 to 2023, of which 20 articles were selected that met the criteria for inclusion in the systematic review. The results revealed various authentication techniques used in Latin American banking applications, such as microservices, biometrics, multi-factor authentication and tokenization. Multi-factor authentication proved to be the most secure, with an average success rate of 97.9%, on the other hand, knowledge factor authentication proved to be the least secure, with an average success rate of 58%. Trends show an increase in the use of biometrics and multi-factor authentication from 2019 to today. It is important to highlight the critical need for additional authentication systems to guarantee customer trust and the integrity of financial data in the region.
publishDate 2024
dc.date.accessioned.none.fl_str_mv 2025-11-05T20:22:30Z
dc.date.available.none.fl_str_mv 2025-11-05T20:22:30Z
dc.date.issued.fl_str_mv 2024
dc.type.es_PE.fl_str_mv info:eu-repo/semantics/conferenceObject
dc.type.version.es_PE.fl_str_mv info:eu-repo/semantics/publishedVersion
format conferenceObject
status_str publishedVersion
dc.identifier.issn.none.fl_str_mv 2414-6390
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/20.500.12867/14421
dc.identifier.journal.es_PE.fl_str_mv Proceedings of the LACCEI international Multi-conference for Engineering, Education and Technology
dc.identifier.doi.none.fl_str_mv https://doi.org/10.18687/LACCEI2024.1.1.201
identifier_str_mv 2414-6390
Proceedings of the LACCEI international Multi-conference for Engineering, Education and Technology
url https://hdl.handle.net/20.500.12867/14421
https://doi.org/10.18687/LACCEI2024.1.1.201
dc.language.iso.es_PE.fl_str_mv eng
language eng
dc.rights.es_PE.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.uri.es_PE.fl_str_mv https://creativecommons.org/licenses/by-nc-sa/4.0/
eu_rights_str_mv openAccess
rights_invalid_str_mv https://creativecommons.org/licenses/by-nc-sa/4.0/
dc.format.es_PE.fl_str_mv application/pdf
dc.publisher.es_PE.fl_str_mv Latin American and Caribbean Consortium of Engineering Institutions
dc.source.es_PE.fl_str_mv Repositorio Institucional - UTP
Universidad Tecnológica del Perú
dc.source.none.fl_str_mv reponame:UTP-Institucional
instname:Universidad Tecnológica del Perú
instacron:UTP
instname_str Universidad Tecnológica del Perú
instacron_str UTP
institution UTP
reponame_str UTP-Institucional
collection UTP-Institucional
bitstream.url.fl_str_mv https://repositorio.utp.edu.pe/backend/api/core/bitstreams/11eca2bd-cf4e-44e4-8e33-f409f7ff59d2/download
https://repositorio.utp.edu.pe/backend/api/core/bitstreams/cac0d6d9-5527-4030-81d0-ef6f7d98ad70/download
https://repositorio.utp.edu.pe/backend/api/core/bitstreams/4e346ec3-1c4f-43cd-9cd3-f579f5798383/download
https://repositorio.utp.edu.pe/backend/api/core/bitstreams/340e2b5e-3b02-4192-a2eb-2b8079edd458/download
https://repositorio.utp.edu.pe/backend/api/core/bitstreams/c7d47185-8b60-4b01-8312-607644d3dcb5/download
https://repositorio.utp.edu.pe/backend/api/core/bitstreams/76d79cb5-78ae-4dfd-b8b4-89425fd3a167/download
bitstream.checksum.fl_str_mv bc1c1c91eb7ee3b4838aefd7d56a5f30
8a4605be74aa9ea9d79846c1fba20a33
a81351fd87890bf513e2f57958f7416e
6978882a2e5bc9176c0113fc5fd175aa
61a29044712d3e266f48fd970fc77538
ebedbe4069f83d3399e3415a553bda97
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio de la Universidad Tecnológica del Perú
repository.mail.fl_str_mv repositorio@utp.edu.pe
_version_ 1852231962184384512
spelling Puma Herencia, Luis R.Merma Mayhua, Glenda JuliaAlfaro Casas, Luis A.Nina Choquehuayta, Wilder2025-11-05T20:22:30Z2025-11-05T20:22:30Z20242414-6390https://hdl.handle.net/20.500.12867/14421Proceedings of the LACCEI international Multi-conference for Engineering, Education and Technologyhttps://doi.org/10.18687/LACCEI2024.1.1.201Computer security, especially authentication in banking applications, has become a critical issue to ensure the integrity and confidentiality of users’ financial information. The current situation presents significant challenges, such as vulnerability to attacks, lack of strong authentication, and lack of cybersecurity coordination across the region. The objective is to provide a systematic review on the updated and comprehensive perspective on authentication security in banking applications in Latin America, identifying trends, gaps and research opportunities. The methodology used followed a clear approach, using the PICO strategy to formulate the research question. An exhaustive review was carried out on the studies, applying inclusion and exclusion criteria, and following PRISMA guidelines. Having 150 articles as a base quantity from 2019 to 2023, of which 20 articles were selected that met the criteria for inclusion in the systematic review. The results revealed various authentication techniques used in Latin American banking applications, such as microservices, biometrics, multi-factor authentication and tokenization. Multi-factor authentication proved to be the most secure, with an average success rate of 97.9%, on the other hand, knowledge factor authentication proved to be the least secure, with an average success rate of 58%. Trends show an increase in the use of biometrics and multi-factor authentication from 2019 to today. It is important to highlight the critical need for additional authentication systems to guarantee customer trust and the integrity of financial data in the region.Campus Arequipaapplication/pdfengLatin American and Caribbean Consortium of Engineering Institutionsinfo:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by-nc-sa/4.0/Repositorio Institucional - UTPUniversidad Tecnológica del Perúreponame:UTP-Institucionalinstname:Universidad Tecnológica del Perúinstacron:UTPBanking applicationsComputer securityLatin AmericaMulti-factor authenticationhttps://purl.org/pe-repo/ocde/ford#2.02.04Systematic review of authentication techniques in banking applications in Latin Americainfo:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionORIGINALL.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024.pdfL.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024.pdfapplication/pdf775927https://repositorio.utp.edu.pe/backend/api/core/bitstreams/11eca2bd-cf4e-44e4-8e33-f409f7ff59d2/downloadbc1c1c91eb7ee3b4838aefd7d56a5f30MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorio.utp.edu.pe/backend/api/core/bitstreams/cac0d6d9-5527-4030-81d0-ef6f7d98ad70/download8a4605be74aa9ea9d79846c1fba20a33MD52TEXTL.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024L.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024Extracted texttext/plain38300https://repositorio.utp.edu.pe/backend/api/core/bitstreams/4e346ec3-1c4f-43cd-9cd3-f579f5798383/downloada81351fd87890bf513e2f57958f7416eMD53L.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024.pdf.txtL.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024.pdf.txtExtracted texttext/plain38546https://repositorio.utp.edu.pe/backend/api/core/bitstreams/340e2b5e-3b02-4192-a2eb-2b8079edd458/download6978882a2e5bc9176c0113fc5fd175aaMD57THUMBNAILL.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024L.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024Generated Thumbnailimage/jpeg24827https://repositorio.utp.edu.pe/backend/api/core/bitstreams/c7d47185-8b60-4b01-8312-607644d3dcb5/download61a29044712d3e266f48fd970fc77538MD54L.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024.pdf.jpgL.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024.pdf.jpgGenerated Thumbnailimage/jpeg54796https://repositorio.utp.edu.pe/backend/api/core/bitstreams/76d79cb5-78ae-4dfd-b8b4-89425fd3a167/downloadebedbe4069f83d3399e3415a553bda97MD5820.500.12867/14421oai:repositorio.utp.edu.pe:20.500.12867/144212025-11-30 18:23:06.373https://creativecommons.org/licenses/by-nc-sa/4.0/info:eu-repo/semantics/openAccessopen.accesshttps://repositorio.utp.edu.peRepositorio de la Universidad Tecnológica del Perúrepositorio@utp.edu.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
score 13.934013
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).