A new trend of incorporating Touch ID sensors in mobile devices is appearing. Last year, Apple released a new model of its famous iPhone (5s). One of the most anticipated and hailed features of the new device was its Touch ID. Apple advertised that the new technology will increase the security of its device, and it will also be used in different applications as a proof of identity. To make the issue more controversial, Apple announced a new financial service (Apple Pay) that allows iPhone 6 users to use their iPhone as a replacement to credit cards. The minute the new technology was introduced; many questions appeared that needed immediate answers. Users were concerned about how it will work? Is it easy to use? Is it really safe? And whether it will be effective in protecting their private data or not? In this paper we provide a comprehensive study of this feature. We discuss the advantages and disadvantages of using it. Then we analyze and share the results of a survey that we conducted to measure the effectiveness of such feature in the Kingdom of Saudi Arabia (KSA). In this study, we only focus on users from KSA, because if the device fails to protect mobile's data, severe consequences might happen. Due to cultural believes in KSA, releasing mobile contents to unauthorized people could lead to crimes. Survey analysis revealed somewhat controversial results, while 76% of all participants believe that this technology will improve the device security, only 33% use it to lock/unlock their devices, and even a smaller percentage use it to make purchases. Keywords—IPhone 5s; IPhone 6; IPhone 6 plus; Fingerprint;
[1]
Steve Gold.
Meeting the biometrics payment security challenge
,
2013
.
[2]
Young B. Choi,et al.
iOS Security and Privacy: Authentication Methods, Permissions, and Potential Pitfalls with Touch ID
,
2014
.
[3]
Ming Gao,et al.
Fingerprint sensors in mobile devices
,
2014,
2014 9th IEEE Conference on Industrial Electronics and Applications.
[4]
Lorie M. Liebrock,et al.
Using Fingerprint Authentication to Reduce System Security: An Empirical Study
,
2011,
2011 IEEE Symposium on Security and Privacy.
[5]
Sonthonax Bolivar SaintGermain.
Is the Battle Over for Smart-Phones?
,
2014
.
[6]
K. Senathipathi,et al.
Fingerprint based license checking for auto-mobiles
,
2012,
2012 Fourth International Conference on Advanced Computing (ICoAC).
[7]
J. Hu.
Mobile fingerprint template protection: Progress and open issues
,
2008,
2008 3rd IEEE Conference on Industrial Electronics and Applications.
[8]
Norman Sadeh,et al.
Smartphone Fingerprint Authentication versus PINs: A Usability Study (CMU-CyLab-14-012)
,
2014
.