The Tangible And Intangible Benefit

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Chapter 1:

Introduction

purpose

objectively of the system

problem and functionality of the system(must)

features of the system(optional)

overview

project title

project purpose

problem (Rationale)

system objective and functionality

This chapter introduced the proposed system, the main points to be discussed include:

Problem Context and Rationale: Origin of the IDEA

WHO are the Target Users?

Objective of the System

Functionalities of the System

Project Title and Purpose

Automated teller machine (ATM) is a mechanical device designed to perform the functions of a bank teller like balance inquiry, cash withdrawal, bill payments, funds transfer between own account, funds transfer to third party account and so on. Traditionally, ATMs in Malaysia are using personal identification numbers (PIN) for authentication purpose to access the restricted information.

However, with the rapid changing of technology in the world, traditional method no longer provide higher security as fraudulent tricks to ATM system are threat of society. Thus, Biometric Automated teller machine (ATM) Authentication System in Malaysia is proposed. It provides a better security as it using human’s physiological and behavioural characteristic to authenticate and this authentication method will replaced the traditional way. This system will be capable of minimizing fraudulent cases in Malaysia by integrate biometric with Automated Teller Machine.

Problem (Rationale)

According to Onyesolu & Ezeani (2012), crime at ATMs has become a global issue that faces by both customers and bank operators and this rises repeatedly in recent years. For instant, ATM’s card can be stolen, forged, lost or given away, PIN can be forgotten or compromised. Unauthorized person can always come up the correct personal codes when the ATM’s card is lost or stolen because people tend to choose their own PIN that related to their daily life and which easily predicted even though they are warned not to do so.

Besides that, people are forced to remember more than one PIN and password in this computerized world. Mobile phone, computer, web-based services like portal, forum, social network, online shopping account and so on. To increase the level of security, people are advised to change their PIN or password frequently, increase the length and these makes them find difficulty to remember and enter the correct PIN or password.

There are several banks in a country and different bank provides difference offers to get the attention of public. Thus, people nowadays usually carry more than one card in their purse or wallet, and it can take up at least 50% of the limited space. Carrying a numeral number of cards lead to the rising in percentage of card misplaced. Users are advised to set difference password for difference cards to minimize the percentage of unauthorized access but this method lead to conflict when the user forgot what password they set it themselves.

In addition, carrying much of cards in the purse or wallet might easily get the attentions to those who have the bad intentions and come up with bad thought. This action is seemed to be leaked them into a dangerous situation. Moreover, enter the PIN wrongly regularly and exceed the limits may make the account to be suspended. Card re-issuance and new password generation request put on burdens to the user as these may encounter user to long queues is troublesome for people nowadays especially who need to work and busy with their own life as bank’s operating hours are routinely same as their working hours.

There are many countries has been successfully implement Biometric ATM to combat ATM fraud such as Japan, Poland, Brazil USA, Chile, Mexico, India and Colombia as a result. Commonly, those banks implemented this technology capture the account holder’s fingerprint through the scanner in the system while account opening. However, banks in Malaysia do not have this advance technology currently.

In order to overcome the weaknesses that mentioned above, ATM which integrated with biometric as authentication method is proposed to combat fraud and therefore, increase the level of security. Biometric ATM Authentication System increases the level of security because it using human’s physiological and behavioural characteristic, it replaced the traditional way of authentication method.

Tangible and Intangible Benefit

Tangible Benefits:

Time and cost saving

Using the biometric as the authentication method, card re-issuance and new password generation request can be avoided as it is needless. By avoiding these, user does not need to queue all the way long for the card re-issuance process and pay the fine of cost for card replacement. In the other hand, the workload of bank’s staff is reduced and costs of card maintenance can be avoided.

Intangible Benefits:

Improvement on ATM Security

According to Onyesolu & Ezeani (2012), a person’s biometric data is non-transferable. It cannot be borrowed, stolen or easily forged. These might solve the problem when an unauthorized person can easily come up the correct personal codes, because the system does not know whether they are the person he or she claims to be. Biometric ATM Authentication System provides strong authentication as biometric data is undeniably connected to its owner.

Eliminate bulging wallet

People have more than one bank’s account and therefore they carrying more than one bank card in their wallet or purse. As a replacement of a PIN, this helps to eliminate the bulging wallet as the user does not need to carry bank’s ATM card anymore. User can now get more spaces in their wallet or purse.

Accurate Result

Besides that, user’s mind is free from setting and memorizing all the PINs and Passwords for ATM authentication purpose. They do not need to worry about happens of forgetting the PIN or wrong guessing. All they need to do is just follow the instructions on the ATM’s screen and place the biometric data on the reader machine. Biometric ATM Authentication System will then identifies, analyse and match the submitted biometric rather than authorized anyone come up with the correct PIN.

Reduce in criminal activity

With this system, fraud like card skimming, fake PIN pads can be tackled because it no longer using the card and PIN for account authentication. It minimizes the percentage of fraud because even though the one’s biometric is forged, the culprit will find difficulty to get into the correct bank as there is no symbolic on which bank the user using.

Improve on customer’s satisfaction

Of all of the tangible and in tangible benefits, Biometric ATM Authentication System will improve the customer’s satisfaction because of its efficiency. According to NELSON (2012), studies have found that the level of customer’s satisfaction has a positive effect on profitability. For instant, a totally satisfied customer contributes 2.6 times as much revenue to a company as a somewhat satisfied customer and research has shown that when a person is satisfied with a company or service they are likely to share their experience with other people to the order of perhaps five or six people. Bank that started to use the biometric authentication has the benefits on differentiations from other banks and increase their revenue.

Objectives of the system

The objectives of the proposed system are user convenience, it allow users to utilizes ATM function using biometric as authentication method rather than the traditional way, a bank card with a PIN numbers. User no longer has the worried about bulge wallet or purse because they does not need to carry any ATM’s bank card.

All they need to do is just go to the bank, stand in front of the ATM and place their biometric data according to which biometric the bank using. Besides that, user does not need to worried or panic when they forgot the password and where they misplaced their ATM’s card because the proposed system replaced the traditional authentication method.

Apart from that, the system provides a higher level security because it minimize the happens of criminal activity. Common criminal activities are like card forged, stolen or culprit get the PIN using a fake PIN pads and so on and it is all related to the used of ATM card and PIN as authentication method. Problems as stated above will be combat by the system proposed.

Last but not least, one of the objectives of the system is increase the satisfaction of customer, by using the Biometric ATM Authentication System, the bank will get lesser negative feedback in terms of convenience and ATM’s security. Thus, the bank can gain more profits as a result.

Features and Functionalities of the system

Biometric Reader

Use to identify human’s physiological and behavioural characteristic and compare the retrieved biometric data with the sample data stored in database. It captures the biometric data of the user submitted and compares it to the biometric sample stored in database.

Display Screen

User-friendly interface design of the system allow user to select the functionalities easily. Examples of functionalities are cash withdrawal, balance inquiry, fund transfer, bills payment and so on. Users are able to withdraw money when they chose the withdrawal function.

Keypad

Keypad on the ATM enables users to key in numeric number and section like clear, cancel and enters after they entered the input. For example, user chose to withdraw five thousands and they accidentally key in fifty thousand, user can clear the amount by cancel button on the keypad and re-enter the correct amount.

Receipt Printer

A paper receipt of the transactions made by the user is provided and printed by receipt printer. For example, user withdraw five thousands from the ATM, a paper receipt stated the details of transactions will be printed out. Details included time of transaction, location of transaction, amount of transaction, type of transaction, result of transaction such as accepted or rejected, and transaction reference number.

Cash Dispenser

The duty of cash dispenser is to count and dispense the amount entered by user.

Chapter 2:

Problem Description

Problem description (don't repeating the same point, problem of current system, use 'developer replaced i' )

Overview

Current system problem

Problem face by targeted audience

User requirements

This chapter describing the problems of this project in detail, the main points to be discussed includes:

Problem of Current System

Nature of Challenge

Problem of current System

"Malaysia lost more than RM40 million to ATM and credit card fraud in 2001," according to a report in The Star and there are more than 100 cases of ATM fraud and 29 cases of credit card fraud were reported between January and September. Datuk Arthur Edmonds, Penang State police chief said such incidents have increased dramatically in recent years and it proves by data collected in 1999 and 2000. "In 1999, these cases involved RM24 mil, while in 2000, it was RM28mil," he continues (Networld Media Group, 2002).

Morrison (2012) claims that, "a method of stealing both cards and cash from ATM machines came in second in a list of fraud concerns among ATM deployers around the world, according to the second annual ATM fraud survey conducted by the ATM Industry Association. (ATMIA)" ATMIA is a trade association that claims 3700 members in 60 countries. From the result of the survey, schemes which capture card and PIN numbers through a combination of hidden card readers and cameras remains as the top worldwide threat to ATM security. Few common attacks at ATM are explained below.

Skimming Attack

Skimmer, a card swipe device that capture information on ATM cards make easy for lawbreakers to forge an ATM cards. It allows the copy of personal data including account number, balance, and PIN number to anyone who used it to swipe an ATM card. Skimmer collected and stored up to 200 ATM cards before it being re-used (Lawan, 2011).

Card Trapping

ATM thieves using an external device directly over or into the ATM card reader slot. Card is being retrieves by the thieves when user leaves the ATM without their card to make a report or finding the solution (Lawan, 2011).

Shoulder Surfing

It happens when someone stay close in order to get information. Once PIN is compromised, fraudster may find ways to get the ATM card, for example, card trapping or pick-pocketing the wallet. Users are advised to be careful and ensure that there is no one stays near to see the PIN that they entered (Firstpost, 2012).

Phishing Attack

Commonly, an attackers uses email representing them as a bank and claiming that user account information is incomplete or they needs to update their account information to prevent account from being closed. Users are asked to input confidential details such as card numbers and PINs. Information been collected is used to create fraudulent cards (Lawan, 2011).

A 23-year-old victim of Malacca, Malaysia Tey Hock Lin loses RM5000 to online phishing scam. Tey claims that he received an email from a sender whose name and website interface was very familiar to that of a famous local bank and it requested him to update his account due to the inactivity on May 12. Tey keyed in his username and password and received a SMS with a transaction authorisation code number which was required to confirm the procedure on-line (Star Publications (M) Bhd, 2009).

Fake PIN Pads

A fake PIN pad is placed over the original keypad to captures the PIN that inserted by the victims and information are stored into its memory. Fraudster will then remove the PIN pad and get the information that stored in and make counterfeit ATM cards. In addition, this tool allows transactions proceed in a normal way and it prevent users be suspicious of ATM fraud (Diebold, 2002).

Nature of Challenge

There are several challenges to implement Biometric ATM Authentication System. Biometric is the automated use of physiological or behavioural characteristic to determine or verify identity (Olufemi, 2010). The main challenge to build this system is the accuracy in it. The accuracy of result that the system identifies, analyse and match the submitted biometric data.

Matching the submitted biometric data to authenticate against one or many templates may result failure in acceptance with the large database. There are three ways a match can fail which known as three key metrics and that are false match rate, false non match rate and failure to enrol rate.

User’s bank information and details are all confidentiality, there is a need to ensure the user’s database is safe. The biometric sample submitted has to be identified, analyzed and matched with the biometric store in the database with zero error-prone.

The other challenge of this project is to identify which biometric method should apply on the ATM to ensure the reliability and which programming language to apply in this project in order to get the best outcome. Research on types of biometric methods and programming languages will be carried out on chapter three of the documentation.

There will be a demo of the system with the biometric reader to ensure the user can have a clear picture of how the system works rather than listen about the functionalities of it. Thus, the challenge will be how well the system integrates with the biometric reader.

Last but not least, the concern on privacy and cost of development. There are some countries denied the launching of biometric ATM due to the privacy concern and the cost of development. The challenge of this project is to increase the percentage of user’s acceptance and reduce the cost of development. User does not believe in biometric technology just because biometric is still not common use in the world, they mind to give people their biometric sample, and this is the reason why biometric ATMs not being used in U.S. (NBCNews.com, 2005).

Chapter 3:

Literature Review

-domain research (research on current system) (5-10pages) 

-technology research (1-2 pages of each) 

@justification to programming language chosen (why u chose the java no comparison needed) 

@justification to database management system chosen (features of the dbms u chose)

@justify the system development methodology 

Overview

Domain research

Technical research

Domain Research

How ATM works

According to Bowen (n.d), an ATM is a data terminal with two input and four output devices. Internet Service Provider (ISP) acts as the gateway in-between networks and bank computer. The availability of host processor is required to build communication for user requesting the service. Leased-line or dial up machines is supported by most of the host processors.

Leased-line ATM has a four-wire, point-to-point, dedicated telephone line in order to connecting it with the host processor while a normal phone line with a modem and toll-free number is required by dial-up ATM to connect to the host processor. Initial cost for a leased-line machine is half more than a dial-up machine due to its complexity (Bowen, n.d).

http://www.nec.com/en/global/onlinetv/en/society/hybridfingerid_h.html

How

Biometric method

Technical Research

Programming language –Visual Basic .NET (VB.NET)

There are various common programming languages in the world, such as C, C++, C#, Java, Visual Basic .NET (VB.NET) while VB.NET has lastly chosen to use in implementation on the Biometric ATM Authentication System. VB.NET is a programming environment with tools to create screen elements, write programming language statements

VB.NET was chosen because it is more compatible with Windows computer operating system. It includes everything that is necessary to write program for Windows (About.com, 2012). Noted that demo of Biometric ATM Authentication System will be running with computer and biometric reader device.

Besides that, it is a graphical user interface base programming language, thus, user-friendly to the developer. Developer drag the object from the toolbox into the Work Area, state each of the object’s properties rather than trying to program the user interface using code base.

Database management system- MS SQL Server 2008

Software development methodology

Software methodologies will be used for the proposed system are Waterfall and Prototype. The reason why these two methodologies will be applied is stated as below.

Waterfall methodology contains of five phases which are requirements analysis, design, implementation, testing and maintenance. It is a logical and systematic step-by-step approach, series if stages are carried out in sequence, which means the next step is allowed to start only when the previous steps are completed.

Waterfall model provides a good starting point for structuring the project, it able to deliver a formal and complete documentation. Each stage is given a fixed deadline and no stage is repeated unless a radical change of project scope. Outputs of each phase are visibly and evaluation can be done to check if the project is going as per desire.

Since two methodologies are using, Waterfall methodology will be applied for the analysis and design phase while Prototype methodology will be applied for the rest start from implementation. One of the reason why is because some phases can be done in parallel and this can be eliminated from time consuming for the whole project.

Prototype Methodology is not which based on strict planning, the system’s functionality improves because changing is made from time to time by user’s feedback. Incomplete version of system is shown to the testers, and they have a proper clarity of the system and modifications can be made from what testers suggested.

The Biometric ATM Authentication System will be used by the public which may not IT literate people, modifications can be made by which they expected it to be. Testers can express properly about their expectations after they viewed it because people might not well enough in specifying their expectations at first. Prototype methodology reduces risk of failure because potential risks can be identified in the earlier stage and this can test about the acceptance of user towards biometric authentication system

The two methodologies complement each and other to perform a best outcome. For instant, Prototype methodology reduces the iterations which might occur in Waterfall approach because it lack of user involvement. Failure might be detected in the last phase of Waterfall and all phases are going to re-do as the changes. Next, Waterfall approach which can deliver a well documentation can complement the lacks of strict planning for Prototype methodology.

Chapter 4:

Research Methods

Research method (what data collection method u gonna use, explain briefly observation/interview) justify the reason u choose the 1/2methods 

Designing of Questionnal 

Overview

Primary research

Qualitative and quantitative research

Interview

Questionnaires

This chapter reveals the primary researches that were conducted by the developer, the primary researches to be discussed include:

Questionnaire

Experiment

Chapter 5:

Analysis and Design

5.0.1 Data analysis 

-analysis the data collected through questional, finding for each question 

Conclusion (10-15lines) 

Analysis the data collected through interview(min 3 to interview) 

5.0.2 design

5.0.2.1 system design

5.0.2.2 database design

5.0.2.3 interface design

Overview

Analysis

System Design

This chapter discusses and analyzes the findings on Chapter 3 and 4 follow by the design of the proposed system. The main points to be discussed include:

Feasibility Study

Requirement Analysis

Logical Design – Context Diagram, DFD, and ERD

Interface Design

http://www.atmmarketplace.com/article/136446/Card-fraud-grows-in-Malaysia

http://www.ijcaonline.org/volume9/number10/pxc3871659.pdf

http://www.ipedr.com/vol1/71-G00018.pdf

http://www.firstpost.com/investing/how-to-escape-fraudsters-at-the-atm-463493.html

http://thestar.com.my/metro/story.asp?file=/2009/6/23/southneast/4140204&sec=southneast

http://wwwdev.cuna.org/download/diebold_fraudpaper.pdf

http://www.nbcnews.com/id/9660429/ns/technology_and_science-security/t/biometric-atms-not-being-used-us/#.USH2CB2otU_ (NBCNews.com, 2005).

http://visualbasic.about.com/od/applications/a/whatisvb.htm (About.com, 2012).

http://money.howstuffworks.com/personal-finance/banking/atm2.htm Bowen (n.d),

http://money.howstuffworks.com/personal-finance/banking/atm4.htm



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now