{"id":13676,"date":"2017-08-25T04:45:10","date_gmt":"2017-08-25T08:45:10","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=13676"},"modified":"2023-07-19T07:44:46","modified_gmt":"2023-07-19T11:44:46","slug":"biometrics-creating-efficiency-preventing-fraud-online","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/","title":{"rendered":"Biometrics: Creating Efficiency &#038; Preventing Fraud Online"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"i-amphtml-fill-content i-amphtml-replaced-content aligncenter\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/05\/philipp-katzenberger-iIJrUoeRoCQ-unsplash-600x400.jpg\" sizes=\"(min-width: 600px) 600px, 100vw\" alt=\"\" width=\"600\" height=\"400\" \/><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">Businesses rely increasingly on their e-commerce sites. The coronavirus crisis accelerated this trend, which means many sales will likely stay online. But issues still confront e-commerce businesses and other companies that sell online. It\u2019s a need that businesses must address in order to earn and keep shoppers\u2019 trust.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">You need passwords to access online accounts, whether it\u2019s for social media, banking, or online check outs. All these sites we use regularly require authentication, usually in the form of passwords. If you\u2019re anything like me or most Internet users, forgetting passwords for a site you haven\u2019t used in a while is a headache you\u2019d rather avoid. That\u2019s where biometrics comes in.<\/span><\/p>\n<h2><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">Biometrics &amp; E-Commerce Issues<\/span><\/h2>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">According to Oxford, biometrics is \u201cthe application of statistical analysis to biological data,\u201d and it can deal with many of these concerns. Let\u2019s first look at a few problems businesses and consumers face when transacting online, which include:<\/span><\/p>\n<ul>\n<li class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"> \u00a0 \u00a0 \u00a0 \u00a0 <\/span><b>Abandoned shopping carts<\/b><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"> \u2013 Visual Website Optimizer estimates 68% of online shoppers leave checkout without completing purchases, with 56% backing out due to unexpected checkout costs or tech-related reasons. <\/span><\/li>\n<li class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"> \u00a0 \u00a0 \u00a0 \u00a0 <\/span><b>Online fraud<\/b><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"> \u2013 hackers can easily gain access to people\u2019s accounts through malware and spyware, capturing customers\u2019 personal and payment information.<\/span><\/li>\n<li class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"> \u00a0 \u00a0 \u00a0 \u00a0 <\/span><b>Parochialism <\/b><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">\u2013 only 19% of US retailers translate their sites into other languages, and under half quote prices in users\u2019 home currencies. <\/span><\/li>\n<\/ul>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">Biometrics can help with all of these problems, but particularly when it comes to fraud prevention and identity theft. It\u2019s relatively easy for a hacker to gain access to someone\u2019s password, but much more complex to trick biometrically protected access. Fingerprints, for example, are more reliable at verifying identities than passwords or asking specific questions about your favorite food, where you went to school, or your first pet\u2019s name.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">It\u2019s important too that businesses protect their \u2013 and their customers\u2019 \u2013 financial data from illicit access. Because biometrics are individual-specific, they are invariably more difficult to bypass. And it\u2019s very important if you want to grow your company. Businesses that fail to protect against fraud will find their sales start to plummet. According to a report by marketing company Daymon Interactions, 40% of shoppers avoid retailers hit by data breaches and almost 50% believe retailers should invest in technology to prevent breaches.<\/span><\/p>\n<h2><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">Efficient Purchasing<\/span><\/h2>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">Nearly all e-commerce sites require passwords, and many online users utilize the same or similar passwords to identify themselves on multiple sites. Besides making it easy for hackers to gain access, forgotten passwords create a major roadblock for e-commerce sites. Customers \u2013 myself included \u2013 become frustrated and abandon the buying process if it becomes too difficult.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">Creating too many hoops through which a consumer must jump inevitably leads to lost sales. Biometric recognition systems are more convenient, easier to use, and more secure. Password-based access is antiquated and that \u2018username or password is incorrect\u2019 message frustrates those who regularly access multiple devices and online accounts.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">Last summer, Apple started testing a feature that allows users to sign into their iCloud accounts with fingerprint or facial identification on compatible Apple devices, in order to eliminate the need for passwords. Some competitors also introduced facial recognition systems, though with the COVID-19 outbreak and the increased wearing of protective masks in public many, including Apple, are returning to fingerprint recognition.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">Amazon and other big online retailers are also experimenting with biometrics, though Amazon is only enacting hand-recognition based payments at its brick-and-mortar locations \u2013 Whole Foods and Amazon Go. It\u2019s only a matter of time, however, before customers can just sign off with fingerprints, handprints, voice recognition, eye scans, or other biometric measures on handheld portable biometrics readers when they receive deliveries.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">Label-making companies<\/span><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">\u00a0are already on board and incorporating biometric technology into their labeling systems, supporting companies like UPS and FedEx in tracking packages. Cooperation between companies like Enko, couriers, and e-commerce businesses could create new sales opportunities, providing customers solutions to problems they didn\u2019t know they had.<\/span><\/p>\n<h2><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">Fighting Fraud<\/span><\/h2>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">One of the most important reasons companies turn to biometrics is to fight fraud. Online environments allow hackers easy access to consumer data, which scammers use for distributed denial of service attacks, phishing scams, bad bots, and other scams. These days, most people understand the need to protect their identities and, as a form of security, new biometric tech adds an extra layer to protect against identity theft and other forms of fraud. It\u2019s relatively easy to steal credit card or banking details, but much more difficult to mimic a person\u2019s voice or use their fingerprints.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">This goes along with what <\/span> Wavestone <span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"> \u2013 an IT consulting company that deals with fraud protection \u2013 anticipates will occur with how companies prevent, detect, and respond to fraud. Companies like Wavestone are at the forefront of dealing with anti-fraud efforts and already anticipating these new trends, including the use of biometrics to protect against fraud. Such companies constantly identify strategies to keep up with security challenges and new fraud detection techniques.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">For more than a decade, biometrics have provided security and access control, including for computer systems and networks, and they will only become more common as biometric technology advances. While people will invariably continue to use passwords, they will become less important and easier to bypass, as they have proved unreliable as a security measure. Biometrics truly boast an advantage over other types of security, in that they: <\/span><\/p>\n<ul class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">\n<li class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">\u00b7<\/span><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"> \u00a0 \u00a0 \u00a0 \u00a0 <\/span><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">identify individuals<\/span><\/li>\n<li class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">\u00b7<\/span><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"> \u00a0 \u00a0 \u00a0 \u00a0 <\/span><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">control information access<\/span><\/li>\n<li class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">\u00b7<\/span><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"> \u00a0 \u00a0 \u00a0 \u00a0 <\/span><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">maintain data consistency, accuracy, and trustworthiness<\/span><\/li>\n<li class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">\u00b7<\/span><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"> \u00a0 \u00a0 \u00a0 \u00a0 <\/span><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">assure against denial of validity<\/span><\/li>\n<\/ul>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">It\u2019s an advantage too that biometrics are a constant part of each individual and directly correspond to a person\u2019s identity. It not only provides extremely strong access control, but it\u2019s currently the gold standard for anti-fraud security solutions. Fingerprint-based biometric security can significantly increase data security on electronic devices, including a company\u2019s desktop computers, and as costs for such measures decline, e-commerce sites will increasingly use them.<\/span><\/p>\n<h2><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">Identifying Preferences<\/span><\/h2>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">For businesses, identifying users and personalizing suggestions can help coax a customer into ordering. E-commerce businesses are recognizing the significant function that biometric technology can play, though it has yet to gain widespread use. With intimate knowledge about each other, the interaction between customer and vendor can help smooth transactions and help develop trust that allows a relationship to develop.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">We already have Facebook, Google, Apple, and other big tech companies involved in AI anticipating our wants and needs. Someday soon, a quick cornea scan could identify you as a LARP afficionado who lives in London and who has a penchant for Thai curries. A new version of Siri or Alexa could suggest a restaurant or holiday based on our preference. It might even automatically translate the site you\u2019re visiting into Russian, your preferred language, and calculate costs in pounds sterling.<\/span><\/p>\n<h2><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">Biometrics &amp; Consumers<\/span><\/h2>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">So, if biometric ID is the answer to smooth e-commerce, why hasn\u2019t it yet caught on? Perhaps it\u2019s because, although the checkout process is annoying, it\u2019s still less inconvenient than having to go out into the world to buy things. Businesses already accept the technology, so it\u2019s just a matter of time before consumers do too.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Businesses rely increasingly on their e-commerce sites. The coronavirus crisis accelerated this trend, which means many sales will likely stay<\/p>\n","protected":false},"author":398,"featured_media":12109,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[],"class_list":["post-13676","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometrics: Creating Efficiency &amp; Preventing Fraud Online - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometrics: Creating Efficiency &amp; Preventing Fraud Online - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"Businesses rely increasingly on their e-commerce sites. The coronavirus crisis accelerated this trend, which means many sales will likely stay\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-25T08:45:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-19T11:44:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2019\/10\/Biometric-Identification-as-a-Security-Concern-for-the-Coming-Days.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c\"},\"headline\":\"Biometrics: Creating Efficiency &#038; Preventing Fraud Online\",\"datePublished\":\"2017-08-25T08:45:10+00:00\",\"dateModified\":\"2023-07-19T11:44:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/\"},\"wordCount\":1195,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/\",\"name\":\"Biometrics: Creating Efficiency & Preventing Fraud Online - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2017-08-25T08:45:10+00:00\",\"dateModified\":\"2023-07-19T11:44:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Biometrics: Creating Efficiency &#038; Preventing Fraud Online\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometrics: Creating Efficiency & Preventing Fraud Online - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/","og_locale":"en_US","og_type":"article","og_title":"Biometrics: Creating Efficiency & Preventing Fraud Online - Digital Transformation of Government Services","og_description":"Businesses rely increasingly on their e-commerce sites. The coronavirus crisis accelerated this trend, which means many sales will likely stay","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2017-08-25T08:45:10+00:00","article_modified_time":"2023-07-19T11:44:46+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2019\/10\/Biometric-Identification-as-a-Security-Concern-for-the-Coming-Days.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c"},"headline":"Biometrics: Creating Efficiency &#038; Preventing Fraud Online","datePublished":"2017-08-25T08:45:10+00:00","dateModified":"2023-07-19T11:44:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/"},"wordCount":1195,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/","name":"Biometrics: Creating Efficiency & Preventing Fraud Online - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2017-08-25T08:45:10+00:00","dateModified":"2023-07-19T11:44:46+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-creating-efficiency-preventing-fraud-online\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Biometrics: Creating Efficiency &#038; Preventing Fraud Online"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Matthew Bennett","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13676"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=13676"}],"version-history":[{"count":2,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13676\/revisions"}],"predecessor-version":[{"id":19996,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13676\/revisions\/19996"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/12109"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=13676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=13676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=13676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}