Systematic review of authentication techniques in banking applications in Latin America
Descripción del Articulo
Computer security, especially authentication in banking applications, has become a critical issue to ensure the integrity and confidentiality of users’ financial information. The current situation presents significant challenges, such as vulnerability to attacks, lack of strong authentication, and l...
| Autores: | , , , |
|---|---|
| Formato: | objeto de conferencia |
| Fecha de Publicación: | 2024 |
| Institución: | Universidad Tecnológica del Perú |
| Repositorio: | UTP-Institucional |
| Lenguaje: | inglés |
| OAI Identifier: | oai:repositorio.utp.edu.pe:20.500.12867/14421 |
| Enlace del recurso: | https://hdl.handle.net/20.500.12867/14421 https://doi.org/10.18687/LACCEI2024.1.1.201 |
| Nivel de acceso: | acceso abierto |
| Materia: | Banking applications Computer security Latin America Multi-factor authentication https://purl.org/pe-repo/ocde/ford#2.02.04 |
| id |
UTPD_0254cbebc0c4799198cf7d8b347dfd29 |
|---|---|
| oai_identifier_str |
oai:repositorio.utp.edu.pe:20.500.12867/14421 |
| network_acronym_str |
UTPD |
| network_name_str |
UTP-Institucional |
| repository_id_str |
4782 |
| dc.title.es_PE.fl_str_mv |
Systematic review of authentication techniques in banking applications in Latin America |
| title |
Systematic review of authentication techniques in banking applications in Latin America |
| spellingShingle |
Systematic review of authentication techniques in banking applications in Latin America Puma Herencia, Luis R. Banking applications Computer security Latin America Multi-factor authentication https://purl.org/pe-repo/ocde/ford#2.02.04 |
| title_short |
Systematic review of authentication techniques in banking applications in Latin America |
| title_full |
Systematic review of authentication techniques in banking applications in Latin America |
| title_fullStr |
Systematic review of authentication techniques in banking applications in Latin America |
| title_full_unstemmed |
Systematic review of authentication techniques in banking applications in Latin America |
| title_sort |
Systematic review of authentication techniques in banking applications in Latin America |
| author |
Puma Herencia, Luis R. |
| author_facet |
Puma Herencia, Luis R. Merma Mayhua, Glenda Julia Alfaro Casas, Luis A. Nina Choquehuayta, Wilder |
| author_role |
author |
| author2 |
Merma Mayhua, Glenda Julia Alfaro Casas, Luis A. Nina Choquehuayta, Wilder |
| author2_role |
author author author |
| dc.contributor.author.fl_str_mv |
Puma Herencia, Luis R. Merma Mayhua, Glenda Julia Alfaro Casas, Luis A. Nina Choquehuayta, Wilder |
| dc.subject.es_PE.fl_str_mv |
Banking applications Computer security Latin America Multi-factor authentication |
| topic |
Banking applications Computer security Latin America Multi-factor authentication https://purl.org/pe-repo/ocde/ford#2.02.04 |
| dc.subject.ocde.es_PE.fl_str_mv |
https://purl.org/pe-repo/ocde/ford#2.02.04 |
| description |
Computer security, especially authentication in banking applications, has become a critical issue to ensure the integrity and confidentiality of users’ financial information. The current situation presents significant challenges, such as vulnerability to attacks, lack of strong authentication, and lack of cybersecurity coordination across the region. The objective is to provide a systematic review on the updated and comprehensive perspective on authentication security in banking applications in Latin America, identifying trends, gaps and research opportunities. The methodology used followed a clear approach, using the PICO strategy to formulate the research question. An exhaustive review was carried out on the studies, applying inclusion and exclusion criteria, and following PRISMA guidelines. Having 150 articles as a base quantity from 2019 to 2023, of which 20 articles were selected that met the criteria for inclusion in the systematic review. The results revealed various authentication techniques used in Latin American banking applications, such as microservices, biometrics, multi-factor authentication and tokenization. Multi-factor authentication proved to be the most secure, with an average success rate of 97.9%, on the other hand, knowledge factor authentication proved to be the least secure, with an average success rate of 58%. Trends show an increase in the use of biometrics and multi-factor authentication from 2019 to today. It is important to highlight the critical need for additional authentication systems to guarantee customer trust and the integrity of financial data in the region. |
| publishDate |
2024 |
| dc.date.accessioned.none.fl_str_mv |
2025-11-05T20:22:30Z |
| dc.date.available.none.fl_str_mv |
2025-11-05T20:22:30Z |
| dc.date.issued.fl_str_mv |
2024 |
| dc.type.es_PE.fl_str_mv |
info:eu-repo/semantics/conferenceObject |
| dc.type.version.es_PE.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
| format |
conferenceObject |
| status_str |
publishedVersion |
| dc.identifier.issn.none.fl_str_mv |
2414-6390 |
| dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/20.500.12867/14421 |
| dc.identifier.journal.es_PE.fl_str_mv |
Proceedings of the LACCEI international Multi-conference for Engineering, Education and Technology |
| dc.identifier.doi.none.fl_str_mv |
https://doi.org/10.18687/LACCEI2024.1.1.201 |
| identifier_str_mv |
2414-6390 Proceedings of the LACCEI international Multi-conference for Engineering, Education and Technology |
| url |
https://hdl.handle.net/20.500.12867/14421 https://doi.org/10.18687/LACCEI2024.1.1.201 |
| dc.language.iso.es_PE.fl_str_mv |
eng |
| language |
eng |
| dc.rights.es_PE.fl_str_mv |
info:eu-repo/semantics/openAccess |
| dc.rights.uri.es_PE.fl_str_mv |
https://creativecommons.org/licenses/by-nc-sa/4.0/ |
| eu_rights_str_mv |
openAccess |
| rights_invalid_str_mv |
https://creativecommons.org/licenses/by-nc-sa/4.0/ |
| dc.format.es_PE.fl_str_mv |
application/pdf |
| dc.publisher.es_PE.fl_str_mv |
Latin American and Caribbean Consortium of Engineering Institutions |
| dc.source.es_PE.fl_str_mv |
Repositorio Institucional - UTP Universidad Tecnológica del Perú |
| dc.source.none.fl_str_mv |
reponame:UTP-Institucional instname:Universidad Tecnológica del Perú instacron:UTP |
| instname_str |
Universidad Tecnológica del Perú |
| instacron_str |
UTP |
| institution |
UTP |
| reponame_str |
UTP-Institucional |
| collection |
UTP-Institucional |
| bitstream.url.fl_str_mv |
https://repositorio.utp.edu.pe/backend/api/core/bitstreams/11eca2bd-cf4e-44e4-8e33-f409f7ff59d2/download https://repositorio.utp.edu.pe/backend/api/core/bitstreams/cac0d6d9-5527-4030-81d0-ef6f7d98ad70/download https://repositorio.utp.edu.pe/backend/api/core/bitstreams/4e346ec3-1c4f-43cd-9cd3-f579f5798383/download https://repositorio.utp.edu.pe/backend/api/core/bitstreams/340e2b5e-3b02-4192-a2eb-2b8079edd458/download https://repositorio.utp.edu.pe/backend/api/core/bitstreams/c7d47185-8b60-4b01-8312-607644d3dcb5/download https://repositorio.utp.edu.pe/backend/api/core/bitstreams/76d79cb5-78ae-4dfd-b8b4-89425fd3a167/download |
| bitstream.checksum.fl_str_mv |
bc1c1c91eb7ee3b4838aefd7d56a5f30 8a4605be74aa9ea9d79846c1fba20a33 a81351fd87890bf513e2f57958f7416e 6978882a2e5bc9176c0113fc5fd175aa 61a29044712d3e266f48fd970fc77538 ebedbe4069f83d3399e3415a553bda97 |
| bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 MD5 |
| repository.name.fl_str_mv |
Repositorio de la Universidad Tecnológica del Perú |
| repository.mail.fl_str_mv |
repositorio@utp.edu.pe |
| _version_ |
1852231962184384512 |
| spelling |
Puma Herencia, Luis R.Merma Mayhua, Glenda JuliaAlfaro Casas, Luis A.Nina Choquehuayta, Wilder2025-11-05T20:22:30Z2025-11-05T20:22:30Z20242414-6390https://hdl.handle.net/20.500.12867/14421Proceedings of the LACCEI international Multi-conference for Engineering, Education and Technologyhttps://doi.org/10.18687/LACCEI2024.1.1.201Computer security, especially authentication in banking applications, has become a critical issue to ensure the integrity and confidentiality of users’ financial information. The current situation presents significant challenges, such as vulnerability to attacks, lack of strong authentication, and lack of cybersecurity coordination across the region. The objective is to provide a systematic review on the updated and comprehensive perspective on authentication security in banking applications in Latin America, identifying trends, gaps and research opportunities. The methodology used followed a clear approach, using the PICO strategy to formulate the research question. An exhaustive review was carried out on the studies, applying inclusion and exclusion criteria, and following PRISMA guidelines. Having 150 articles as a base quantity from 2019 to 2023, of which 20 articles were selected that met the criteria for inclusion in the systematic review. The results revealed various authentication techniques used in Latin American banking applications, such as microservices, biometrics, multi-factor authentication and tokenization. Multi-factor authentication proved to be the most secure, with an average success rate of 97.9%, on the other hand, knowledge factor authentication proved to be the least secure, with an average success rate of 58%. Trends show an increase in the use of biometrics and multi-factor authentication from 2019 to today. It is important to highlight the critical need for additional authentication systems to guarantee customer trust and the integrity of financial data in the region.Campus Arequipaapplication/pdfengLatin American and Caribbean Consortium of Engineering Institutionsinfo:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by-nc-sa/4.0/Repositorio Institucional - UTPUniversidad Tecnológica del Perúreponame:UTP-Institucionalinstname:Universidad Tecnológica del Perúinstacron:UTPBanking applicationsComputer securityLatin AmericaMulti-factor authenticationhttps://purl.org/pe-repo/ocde/ford#2.02.04Systematic review of authentication techniques in banking applications in Latin Americainfo:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionORIGINALL.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024.pdfL.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024.pdfapplication/pdf775927https://repositorio.utp.edu.pe/backend/api/core/bitstreams/11eca2bd-cf4e-44e4-8e33-f409f7ff59d2/downloadbc1c1c91eb7ee3b4838aefd7d56a5f30MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorio.utp.edu.pe/backend/api/core/bitstreams/cac0d6d9-5527-4030-81d0-ef6f7d98ad70/download8a4605be74aa9ea9d79846c1fba20a33MD52TEXTL.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024L.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024Extracted texttext/plain38300https://repositorio.utp.edu.pe/backend/api/core/bitstreams/4e346ec3-1c4f-43cd-9cd3-f579f5798383/downloada81351fd87890bf513e2f57958f7416eMD53L.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024.pdf.txtL.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024.pdf.txtExtracted texttext/plain38546https://repositorio.utp.edu.pe/backend/api/core/bitstreams/340e2b5e-3b02-4192-a2eb-2b8079edd458/download6978882a2e5bc9176c0113fc5fd175aaMD57THUMBNAILL.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024L.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024Generated Thumbnailimage/jpeg24827https://repositorio.utp.edu.pe/backend/api/core/bitstreams/c7d47185-8b60-4b01-8312-607644d3dcb5/download61a29044712d3e266f48fd970fc77538MD54L.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024.pdf.jpgL.Puma_G.Merma_L.Alfaro_W.Nina_Conference_Paper_2024.pdf.jpgGenerated Thumbnailimage/jpeg54796https://repositorio.utp.edu.pe/backend/api/core/bitstreams/76d79cb5-78ae-4dfd-b8b4-89425fd3a167/downloadebedbe4069f83d3399e3415a553bda97MD5820.500.12867/14421oai:repositorio.utp.edu.pe:20.500.12867/144212025-11-30 18:23:06.373https://creativecommons.org/licenses/by-nc-sa/4.0/info:eu-repo/semantics/openAccessopen.accesshttps://repositorio.utp.edu.peRepositorio de la Universidad Tecnológica del Perúrepositorio@utp.edu.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 |
| score |
13.934013 |
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).