Electronic Delivery of Financial Services: 1 Contents
Electronic Delivery of Financial Services: 1 Contents
1 Contents
Electronic Delivery of Financial Services......................................................................................................................1
Electronic Delivery of Financial Services......................................................................................................................1
Mustafa Ali Türker..........................................................................................................................................................1
AliTurker@garanti.com.tr.............................................................................................................................................1
1 Contents..........................................................................................................................................................................1
2 Introduction....................................................................................................................................................................2
3 Retail Banking................................................................................................................................................................2
4 Electronic Delivery Channels and Products................................................................................................................2
4.1 Alternative Channels................................................................................................................................................2
4.1.1 ATM..................................................................................................................................................................3
4.1.2 Telephony.........................................................................................................................................................3
4.1.3 Internet.............................................................................................................................................................5
4.1.4 Mobile phones..................................................................................................................................................6
4.1.5 TV banking........................................................................................................................................................7
4.2 Banking Products.....................................................................................................................................................8
4.2.1 Traditional products.........................................................................................................................................8
4.2.2 The new banking products ...............................................................................................................................8
4.2.3 Segmentation....................................................................................................................................................9
5 Banking Systems for Electronic Delivery....................................................................................................................9
5.1 Front-end and Presentation.....................................................................................................................................10
5.2 Middleware and Messaging...................................................................................................................................11
5.3 Back-end and the Business Rules...........................................................................................................................11
5.4 Security...................................................................................................................................................................12
5.4.1 Encryption......................................................................................................................................................13
5.4.2 Firewalls ........................................................................................................................................................13
5.4.3 Authentication.................................................................................................................................................14
6 Banking Organization for Electronic Delivery.........................................................................................................15
7 Future Trends..............................................................................................................................................................15
7.1 Breakdown of Geographic Barriers ......................................................................................................................15
7.2 Commoditization of Banking Products and New Competitors .............................................................................16
7.3 New Competitive Strategies for Banks..................................................................................................................16
7.4 Banking on Technology.........................................................................................................................................16
7.4.1 Customer relationship management - CRM...................................................................................................16
7.4.2 Virtual banks..................................................................................................................................................17
7.4.3 Data mining....................................................................................................................................................17
7.4.4 Intelligent agents............................................................................................................................................18
7.4.5 Biometrics.......................................................................................................................................................18
7.4.6 Mobile wireless access devices......................................................................................................................19
8 Conclusion....................................................................................................................................................................19
1
15 Eylül, 2000
9 Resources......................................................................................................................................................................19
2 Introduction
Basic economic functions can be identified as the answers to a set of questions -- what to produce, how to
produce it, and how to distribute the output. This functional perspective to banking has given rise to the
separation of the economic activities of banks into classes like commercial, corporate, small business, or
retail. Involving direct contact with customers, retail banking needs the strongest functionalities on its
distribution channels. Basic conditions for these channels to succeed can be given as :
1. Strong bank branding.
2. Unique value to customers.
3. Customer centric -- reflecting the customer relationship.
4. Must be easy to use and intuitive to the customer.
5. Finally, and most important, it must be secure!
The innovations in computing and telcommunications have improved all the functions in retail banking.
Computers have empowered the production and telecommunications have created new distribution channels
that have instantaneous and global reach. Of these new channels, internet is the least costly and with widest
reach. However, each channel has its own virtues and for the best benefit of a retail bank, they should co-
exist with a highly computerized strong back-end and a middleware to glue them all together.
3 Retail Banking
Using the functional perspective, a retail bank (or the business of "retail banking") is a particular
combination of functions performing the transfer of purchasing power across time and distance. Consider a
simple example: the savings account. This financial product transfers purchasing power from the present to
the future. But this savings function can be accomplished in other ways; for example, by investing in
common stock. There are risk differences between the instruments: the savings account comes with a
guarantee of principal, and in that regard is safer than stock. The functions provided by the savings account
remain the same (transferring purchasing power into the future, reducing risk), but they need not be
provided by a depository institution. This multiplicity is changing the nature of competition in retail
banking markets.
Retail banks can serve their customers by bundling certain financial, or they can merge banking-like
services with non-banking-like services, such as tickets to concerts and sporting events, and vacation
planning. These firms may have electronic delivery vehicles and be accessed through the Internet.
Prosperous firms will be those that would find ways to deliver services that the public would need and
enjoy as an almost shopping like experience.
2
15 Eylül, 2000
totally revised customer value system. The first renaissance was profound but took about 20 years to fully
take hold. The second renaissance is driven by the Internet and is now in the early stages. The most striking
difference between the two periods is the financial customer. In the '70s and '80s, financial customers were
being led by the financial industry. Today, financial customers are waiting for the industry to catch up to
their expectation levels.
4.1.1 ATM
As the first replacement of a human teller in banking industry, ATM was a hard product for advertising
departments to develop public acceptance. They even used catchy names for these new machines in the
hopes that they would be thought of as more human by their customers:. Tillie the Teller, The Bread Box,
The Green Machine, Anne the Anytime Teller, Zippy, Millie, The Money Tree, The Cash Cow, etc. Finally,
The American Banker declared that they would hereafter refer to the full-function machine as an automated
teller machine" or "ATM". Responses to ATMs were mixed even in the bank industry. A bank manager is
popularly quoted to say : "Let me get this straight. You want me to poke a hole in the wall of my branch.
Then you want me to stick a one-ton machine through that wall. Then that machine is going to spit money
out onto the sidewalk. Do I have it right so far?" Another anecdote from 70’s is the “Seven Reasons Why
ATMs Will Never Catch On :”
1. Customers will never remember a 4 or 6-digit number.
2. Most people do not believe it is right to have such easy access to their money.
3. Not enough customers will carry the extra plastic card in their wallets.
4. There is no demand for 24-hour availability.
5. You can't ask customers to learn to use a machine
6. Customers will reject ATMs because they cannot record the transaction in their check register.
7. Customers will use their cards at the point of sale, and obviate the need for cash.
For one thing, these reasons did not turn out to be completely wrong. Even today, for a retail bank, an
average of 30% of consumers still do not use ATMs.
4.1.2 Telephony
Banks and other financial businesses implement call centers for one simple reason: profits. Call centers
automate the most basic exchanges, like requesting an account balance or making a deposit, so that agents
can devote more time to making sales or providing customers with more personalized service. Moreover,
with lower facility costs, a transaction fulfilled by a live agent over the phone can be as low as 1/6th of that
of the branch agent. Call centers also help to secure customers’ loyalty, ensuring that their individual needs
are met by an automated system or a live agent over the phone as quickly as possible. Companies in the
financial industry are collectively spending more money to improve their call centers with additional staff
and with new hardware and software. Datamonitor, a research and management consulting firm, estimates
that the number of agents working at call centers for banks and for retail financial businesses in US, will
rise from an estimated 183,000 agents in 1998 to 215,000 by 2003. Datamonitor estimates that labor
3
15 Eylül, 2000
accounts for 64% of the cost of running a call center, leaving managers with only the remaining 36% to
work with when purchasing new equipment and meeting any additional overhead costs. Datamonitor,
reports that banks have spent a total of $835 million on call center products and services by the end of 1999.
It is predicted that they will spend $1.07 billion this year and $1.35 billion in 2001; parallel trends in other
financial services sectors like insurance and brokerage firms.
As financial businesses expand their call centers, they must work within their budgets to create the most
reliable systems possible. There is a number of strategic issues in designing a call center :
1. Site selection : A center of large size may not necessarily find enough qualified labor in one location
alone and it would also be expensive to operate. Therefore a number of centers can be maintained and
the co-working or routing calls can be accomplished by intelligent networking. Prudential, a multi-
faceted financial firm based in Newark, NJ that offers investment, securities, insurance and real estate
services, established a network of 20 call centers to accommodate its expansive customer base in the
US and currently employs more than 4,000 agents, who handled approximately 20 million inbound and
outbound calls in 1999. Training and maintaining a high performer agent is not easy. Centers can also
employ remote agents who use telecommuting software that routes calls and tracks them from the call
center’s server.
2. The office : Office layout is carefully designed to ensure that agents don’t feel isolated. Agent
psychology is an immediate concern for the center. Agents are provided with all means to achieve
higher performance. They use ergonomic desks and seating. They wear cordless headsets, with possibly
noise cancellation capabilities. Still, for an average call center, agent turnover may reach upto %40.
Since they are trained usually about a month, turnovers are very undesirable for the center.
3. Dialog flow scenarios : With the huge volume of calls that centers handle in a day, every second saved,
every dialog step skipped or covered by IVR, returns as hours of savings in terms of agent labor.
4. Interactive Voice Response (IVR) : These systems are used to eliminate the need for answering and
routing certain types of calls. For basic services like finding out what the customer’s balance is an IVR
provides a self service functionality. In general IVR can be utilized to manage upto 80% of investment
calls, 60% of securities calls, and 25% of retail banking calls.
5. Computer Telephony Interface(CTI) : This is the unit which initiates database queries or transactions by
calling functions on the back-end systems. It controls the dialogs and generates onscreen scripts that
prompt agents to perform all the necessary tasks such as asking questions to help them identify
customers, input account information in the right order etc.
6. Continuous Development : Today, call center technologies is a fast developing technology arena.
Developers offer numerous highly technical products to increase agent performance. Since the return of
investment is almost immediate, it is not at all hard to sell products. Some popular examples are :
• SmartRoute : Identifies callers by capturing the phone numbers they are calling from before
routing calls to agents.
• Sixth Sense : Receives data from the IVR system and the customer database, to display
screen pops on agents’ PCs with customers’ histories and other relevant information.
• Voice over IP : Makes use of internet as a free medium for speech communications to drop
the cost.
7. Evolving from a call center into a contact center: The latest trend that call centers are following to
ensure rapid customer service is to route and answer e-mail messages along with phone calls. Agents
can answer an average of 200 to 300 e-mail messages a day or as many as 1,000 during busy periods.
Call centers operate with less agents at night shifts. Customers who send e-mail during off-hours
receive an automated response to confirm that their messages arrived at the call center successfully and
that agents will help them by the next business day. An example product, Genesys Internet Suite,
4
15 Eylül, 2000
automatically responds to customer e-mail or suggests responses. It also enables agents to engage in
live on-line chat sessions with customers and speak with them through voice over IP.
8. Mergers and acquisitions : Technical innovations are not the only factors that affect call center
development for the financial sector. Mergers have been just as influential, particularly among banks.
Functionally, the technical infrastructure of a call center can be utilized to serve other banks or even
companies from other industries. Adding a new set of dialog scenarios require only agent training to
upscale a call centers to work for an additional company.
4.1.3 Internet
Internet banking belongs to the species of financial services variously known as home banking, remote
electronic banking, online banking, self-service banking, and other names indicating that customers do their
banking at home or at work. Over 1,200 European financial institutions offer Internet banking today, more
than twice as many as six months ago. In fact internet turns out to be the most economic delivery channel
for banks. So much so that in Sweden, where banks were the first to deliver internet access service, people
consider banks their portals and this enabled them to capture market share before the portals became big.
According to a study released in September 2000 by KPMG International, Financial institutions currently
derive 13% of their revenues from business done on the Internet, and that share is expected to jump to 28%
in the next 18 months.
The world's first Internet bank opened its virtual doors in the fall of 1995. Today, all banks in USA and
%80 of banks in Europe offer Internet based banking. Wells Fargo, a US bank who is a very aggressive
Internet player, claims 450,000 online customers as of Spring2000, up 50% from the start of last year.
Advantages of online banking to the customers can be listed as follows:
• Convenient
• Inexpensive
• Convenient bill paying medium
• 7/24 availability
• Bank from anywhere in the world (as long as you have access to a computer and the network)
Few disadvantages are :
• Requirement for basic computer and browser literacy.
• Need for a computer with network connection
• Security concerns
One of the two main problems, the computer literacy and internet access, is eroding away as more and more
people are starting to use internet everyday. A recent Gallup/American Banker survey found that Over 68%
of U.S. households have access to the internet and 63% of U.S. households now own personal computers,
but only 12% use them for banking transactions. American Banker concludes that “if not for the fact that
PC ownership is expanding, there would be no growth in online banking customers.” Nevertheless, PC
ownership is growing. By 2003, Europe is projected to have 170 million Internet users, about the number
forecast for the United States. Moreover, banking services over the Net is getting mature. Perhaps equally
telling in the Gallup survey, 69% of online customers said they were “very satisfied” with the service this
year, up from 59% in 1999.
A major promise by online banking is the global reach. U.S. financial players are already seeking to expand
their presence in Europe. In addition, there is likely to be a proliferation of pan-European internet banks.
The quest to build an on-line European banking presence will no doubt be complicated by current laws and
5
15 Eylül, 2000
standards, which differ from country to country. In many instances, the pioneers in Europe make their
applications to the regulators on a case-by-case basis, taking their time to expand. An example is
Scandinavia's largest asset management bank, SEB, which is striving to play a larger role across Europe via
the Internet. SEB, with 305,000 on-line customers as of 2Q2000 in the Nordic region, hopes to have five
million customers banking via the Internet by 2004. It offers a full range of services that include banking,
brokerage, mutual funds, loans, mortgages, and bill pay and presentment.
6
15 Eylül, 2000
This explosive growth in mobile data will see wireless data communications eventually outpacing voice as
the mobile market's driving factor, with 70% of mobile subscribers worldwide using data in 2005.
Despite the business concerns, the big and growing size of the wireless internet market, pushes the players
from all industries to seek new service offerings beyond their traditional industry roles and establish
partnerships in order to maximize value creation and revenue generation.
Personalization of content and the optimization of the mobility, time and location sensitive features will
also prove crucial in the relevance and take up of wireless data services.
4.1.5 TV banking
Together with mobile phones, TV is the latest one of the emerging digital content delivery and access
platforms. Broadcasting the TV content in digital form provides at least 6 times capacity savings on the
allocated frequency bands of the delivery medium whether it is air, cable or satellite. Since these bands are
essentially natural resources for a country, in the past a few years, the governments of most European
countries and USA, have declared that Analog TV broadcasting will be switched-off with deadlines ranging
from 2010 to 2015. The indications of this is enormous : a global digital delivery medium to every TV set
will be established within a decade! 234.6 million households with a TV set, only in Europe, may give an
idea of the size of the market. Besides, an estimated 40% of these houses receive more than one means of
delivery (e.g. both satellite and cable) which means they can be served with digital content by more than
one operator. Forrester Research predicts that Interactive TV (iTV) will overtake internet as Europe's
primary e-commerce platform, and the subscriber base will be 80 million by 2005 (which was 18 million at
the end of 1999).
Case Study : United Kingdom
For the last 5 years UK almost turned into a test laboratory for all the interactive TV ideas in the
world. It is the only country where iTV is delivered using all the three known broadcast
mediums :
1. Satellite
2. Cable
3. Terrestrial (air)
BSkyB who is the satellite iTV operator, enjoys its first to market advantage with a market cap
of 50 billion$ as of March2000. However, the terrestrial operator ONdigital and the major cable
operators NTL and Telewest are not lagging far behind. All these operators are trying to
aggregate service providers and merchants on their TV commerce feature, but again the highest
return is on “Open” which is the shopping service platform owned 80% by BskyB. Latest news
on the company was the purchase of %35 of Open shares (worth of 590 million$) from HSBC
bank in August2000. HSBC bank who is known to have invested 100 million$ when Open had
been established a year ago, showed once again the leading role of financial institutes in
developing technology.
Open which is launched in October2000, was reported to have 750,000 email subscribers and
400,000 regular shoppers as of July2000. Domino Pizza, who is one of the 140 merchants (as of
July2000) on Open, claimed to have sales of 40,000 pizzas per week on Open.
Abbey National (Britain’s 6th largest bank) started in October2000 to serve on Open together
with HSBC. They were the first. In autumn 2000 there will be more than 20 financial institution
serving over UK digitalTV. Abbey National itself have started to serve over all the digitalTV
platforms in July and it announced that it expects 4 million homes to have TV banking available
by the end of 2000 and 9 million by 2003.
7
15 Eylül, 2000
Digital TV commerce is catching on in other European countries as well. Particularly in Holland, France
and Spain.
8
15 Eylül, 2000
4.2.3 Segmentation
Electronic delivery channels act upon digital data which is inherently portable and observable. Currently it
is an active project for every major bank with electronic channels, to aggregate this data in data-marts to
mine for information about general trends in their business.
Secondly, this ability to capture and analyze information, that has not been historically available, can be
used to prepare personalized user interfaces to the customers. Bank marketers, another group that will see
significant expansion as the banking business models change, will compete to use this kind of information
as a means to more targeted and effective marketing initiatives.
9
15 Eylül, 2000
decade. Overall customer availability will be 99.5 percent, increasing to 99.9 percent by the end of the
decade.
4. Shifting Focus : Directors must shift their focus from branch systems to virtual systems, and build a
single real-time customer-related view of data across the entire bank.
10
15 Eylül, 2000
11
15 Eylül, 2000
(middleware) through defined interfaces. This method is most common with an in-house developed
system where an object request broker or terminal emulation product is integrated to make calls to
engage the business rules on the back end.
2. Business rules maintained in the middle tier: With this method, for example the Internet transactional
business rules are maintained on the middle tier within the transaction platform. This is most common
with packaged application vendors or outsourcers in which the vendor has defined the Internet
financial services functions within its application and integrates to the back end only to retrieve
information and to update accounts.
Whether business rules are considered to be a part of it or not, back-end surely requires a potent computing
power. This power is mainly consumed by updating tables of databases with an enormous frequency. The
total aggregated transaction requests and the accompanying data is constantly fed to the back-end
computing facilities to be executed realtime or batch. For such computers used as transacting engines, it is
clear that Input/Output speed is more imperative than the calculation power.
It is expected that in short term the required power for the back-end will increase significantly because of
two major accelerators:
1. More computer transactions per business transaction : Convenience for the customer means more
complex business transactions, which result in more computer transactions to complete a single
business encounter
2. More compute power per computer transaction : Each computer transaction requires more compute
power because of the migration from batch to on-line transactions, richer functional design to improve
ease of use, additional security measures such as encryption, and use of advanced programming
techniques such as object-oriented design.
Accompanying the computational concentration the back-end invariably includes three facilities :
1. Storage : An array of high speed disk drives must be attached to augment the memory in the transacting
computing system.
2. Back-up : The state and the recent data processed by the transacting system must be backed-up on
digital tapes with frequent enough intervals. Institutions of middle or large size, usually chose to install
automated tape libraries which utilize robotic arms and can be managed/controlled by the same system
that controls the transactions.
3. Disaster Recovery : A major core competence of banks is the reliability. This customer expectation
enforces banks to take precautions against all kinds of disasters including natural catastrophes.
Common practice is to maintain or outsource the replica of the whole back-end system together with the
backed-up tapes. IBM, whose back-end systems are widely used in the banking world, provides this
service for all the banks that have deployed its products and would chose to outsource the disaster
recovery precautions.
5.4 Security
Security is the most important core competence of the financial institutions. These institutions are supposed
to be the ones that would menage the risk for people who would like to invest or deposit their money. With
the acceptance of electronic mediums to transfer the location of currency, security started to mean much
more that just strong building constructions and safe-deposit boxes.
Each electronic delivery channel comes with its own concerns of security. Since most segments of these
channels are used to transmit digital data, the kinds of attacks are rather technical then by force! When
considering the security of the channels two components must be identified :
1) The Network : The attacks on the network is generally in the form of tapping-in and stealing data. The
precaution is to use strong enough encryption of the data as it is being transferred over the network.
12
15 Eylül, 2000
2) The Facility : The attacks on the banking facility could be either to disable its functions (Denial of
Service – DoS attacks) or to login as an intruder for committing transactions or to spreading viruses to
corrupt. The precaution is to use firewalls at the point where the facility is connected to the network.
Aside from their core businesses, banks and brokerages have helped lead the e-business and e-commerce
charges over the past few years. This growth has also left them more vulnerable to a broader range of
threats and uncertainties. Consequently, spending on IT security in financial services has ballooned in
recent years. IDC reports that, worldwide security-vendor revenues in the finance/insurance sector grew
from 2.4 fold every year for the last 5. HSBC Securities, the brokerage unit of HSBC Holdings PLC of
London, has deployed a product called SurfinGate at a cost of around $100 per user.
5.4.1 Encryption
Encryption is the process of converting information into a more secure format for transmission. In other
words the plain text is converted to scrambled code while being transmitted, and then decrypted back to
plain text at the receiving end of the transmission. It is comparable to writing a letter, converting it to code,
putting it in an envelope and mailing it with the recipient descrambling the code.
For encryption to work properly, both the sender and receiver have to know what rule, or cipher, was used
to transform the original information into its coded form, often called cipher text. A simple cipher might be
to shift all characters in a message by an arbitrary number of characters, say 5. As long as the receiver
knows that's what the sender did to the message, the receiver will subtract 5 characters from the message
received to extract the original text. (It is believed that this particular type of cipher was used by Julius
Caesar to communicate with his commanders.)
Currently, there are 2 levels of encryption generally available in web browsers: 40-bit encryption, and 128-
bit encryption. Most commonly available internet browsers use 128-bit encryption. Handheld devices or
smartcards usually provide the equivalents of 40-bit encryption. The difference between these two types of
encryption is one of capability. 128-bit encryption is exponentially more powerful than 40-bit encryption.
This encrypted channel between the customer and the institution is established just above the physical layer
of the network and hence called Secure Socket layer (SSL).
There are 3 ways to determine if the site on which you're banking is secure :
1. Go to your bank's homepage and log into your account by inputting your user-id and password. Notice
that the lettering in the URL address will change from "http" to "https." The extra "s" stands for
"security," and lets you know that the page is indeed secure.
2. At the bottom left corner of your screen, a padlock icon will appear.
3. You may also find a gold seal somewhere on the site that reads, "VeriSign Secure Site; Click to
Verify." VeriSign is a leading provider of Internet trust services, and its insignia is confirmation that
your bank is certified as a secure domain.
5.4.2 Firewalls
DoS attacks are just one of many invasion threats that banks and brokerages face. To counteract them,
institutions most commonly use firewalls, intrusion detectors like anti-virus software (also called malicious
code detectors) and vulnerability scanners.
Firewalls are installed between the institution's connection with the Internet and its own networks. They are
configured either by the user or the firewall itself to filter traffic passing into or out of the internal networks.
They can, for example, prevent programs from being downloaded off the Internet or block some kinds of
departing email.
Intrusion detectors identify and deactivate "malicious codes," or unwelcome online guests such as viruses,
so-called Trojan Horses, and Java applets and ActiveX controls. Trojan Horses enter systems because they
13
15 Eylül, 2000
are in the form of something that firewalls have been pre-configured to admit-generally an email message.
Java applets and Microsoft's competing version, ActiveX Controls, are known as "mobile code" because
they are automatically downloaded off the Internet and executed along with the application they are
attached to. This makes them difficult to be filtered out of a network.
In the case of banks and brokerages additional security means may also be necessary like firewalls
enhanced with intrusion-detection software. Integration of such additional software typically occurs at the
firewall level. Symantec recently developed Norton Antivirus for Firewalls 1.5, which can be installed on
IBM- and CVP-compliant firewalls. Computer Associates markets firewalls integrated with content filters
and malicious-code scanners that can be instantly upgraded when new invaders appear.
Unfortunately, most malicious-code detectors can only eliminate intruders that are already known. That's a
problem because a new fast-spreading code like that based on Java applets and ActiveX controls can do
enormous damage before "antibodies" can be generated.
A relatively new line of products against mobile malicious-code, resides on the firewall and protects
networks from all mobile code. It scans incoming traffic for mobile code, isolates it and tests the application
it will run in a pre-configured "sandbox." If the application is outside pre-set parameters, the entry is
blocked.
This would prevent, for example, a bank's network from being breached by a brand-new piece of malicious
mobile code, such as last year's Melissa email virus. Such prevention could save a bank both from having
its own and customers' data compromised and from incurring downtime expenses.
5.4.3 Authentication
More and more companies are conducting high-value transactions with their banks and brokerages over the
Internet, as well as conducting business with other companies through their financial services providers
online. That has pushed banks and brokerages to invest more heavily than other industries in cutting-edge
access contro technologies. Most forms of network access control involve some form of "user-
authentication" technologies. These allow both the sender and recipient of online transactions to verify
themselves and each other, most commonly by attaching a "digital certificate" or some other form of digital
signature, which could even be an electronic fingerprint.
The necessary infrastructure for user authentication, known as public key infrastructure, or PKI, consists of
two security "keys." One is the public key (the digital certificate), which is either downloaded from a
browser or called up from a hard drive and attached to the transaction command or document. By ratifying
the sender of the message as the subject of the request, it acts as a kind of digital driver's license that
identifies the sender of a transaction and provides certain details about him.
The other component is the private key, also called the RSA key, after RSA Security Inc., the company
whose subsidiary is the market leader in digital certificate supply. The private key sits on the hard drive of a
computer and, when activated by a user name and password, unlocks the user's PKI access.
On the other hand, some bankers and security analysts point out that the PKI-digital certificate system has
security weaknesses. They say the private key can still be reached by a clever hacker over the Internet, so
sealing entry to the private key with "just" a user name and password is no longer considered secure
enough. Security providers have developed a variety of solutions to this problem, collectively known as
"extended user-authentication." Essentially, these technologies, which can be hardware- or software-based,
require the user to enter some form of secured identification to access the password or the private key.
Tokens, also called "keys to the key," are external hardware devices plugged into the computer. They
generate a code that the user must enter into the system to unlock access to their private key. The device
adds to security by changing this code each time it is used.
Theoretically, to establish complete authentication three means are enough :
1. Something the user knows
14
15 Eylül, 2000
7 Future Trends
The competitive landscape for retail banking services in the future seems to have four prominent features :
15
15 Eylül, 2000
16
15 Eylül, 2000
17
15 Eylül, 2000
7.4.5 Biometrics
Traditionally banks have relied on very simple forms of identification such as passwords or personal
identification numbers for banking transactions. These methods are inaccurate and provide an opportunity
for unauthorized individuals to access banking accounts. However, vendors are producing new devices that
use biometrics technology for banking security. Currently almost all banks are investigating some form of
biometrics for their alternative, electronic delivery channels. This technology, though mature enough, is not
yet cost effective for the banks. However with the ever dropping prices of silicon chips, within a few years
various biometrics measures are expected to be commonplace in the banking services.
Table 3 Key Functions for Biometrics in Retail Banking Product and Service Distribution
18
15 Eylül, 2000
8 Conclusion
Technological innovations have dramatically changed retail banking in the world. Many banking business
functions, from product development to product servicing, have been automated. However, technological
advancements are and will continue to make the greatest impact on retail banking distribution, including
both making traditional channels, such as branches and ATMs, more efficient and supporting the emergence
of new channels, such as the Internet and call centers. As banks move into the twenty-first century, new
technology development will continue to mold the retail banking business. Technology will make it a more
frictionless world for money.
9 Resources
Bank Administration Institute (BAI) Online : http://www.bai.org/index.html
A financial portal : http://www.clearlybusiness.com/default.htm
American Bankers’ Association (ABA) : http://www.banking.com/aba/default_0700.asp
Banking in the On-Line World : http://www.rbrldn.demon.co.uk/online.htm
American Banker : http://www.americanbanker.com
The Financial Services Roundtable: http://www.fsround.org/
Technology Group for The Financial Services Roundtable: http://www.bitsinfo.org/
Links list of Independent Community Bankers of America : http://www.ibaa.org/links/links_pubfr.html
The Electronic Payments Association : http://www.nacha.org/
Banking Technology Magazine: http://www.bankingtech.com/
An article on Banking History : http://www.drennangroup.com/History/history.html
Retail Banking Taxonomy : http://www.towergroup.com/pages/retail.asp
A report on the new economy : http://www.esa.doc.gov/de2k.htm
A free publications from Institute for international economics :
http://www.iie.com/publications/publication.cfm?pub_id=318
A 1999 Report by the Federal Bank of Dallas : http://www.dallasfed.org/htm/pubs/annual/arpt99.html
19