By 2015, 50% Of New Retail Customer Identities Will Be Based On Social Network Identities

gartnerAccording to a recent report by Gartner, Inc., by the end of 2015, 50 percent of new retail customer identities will be based on social network identities, up from less than 5 percent today. As per the report, along with federation technologies and mobile computing, social identity adoption will have a major impact on the practice of identity and access management (IAM) in 2013 and beyond.

Ant Allan, research vice president at Gartner said,”For an increasing number of Internet users, social networks are the Internet. Using ‘login with Facebook’ — or other popular social networks — reduces friction and therefore improves users’ experience of customer registration and subsequent login. For registration, the required personal information can be imported from users’ social profiles, reducing — if not eliminating — form filling. Moreover, using a social network identity means users don’t have to remember rarely used passwords or endure convoluted password reset processes when they forget them.”

He further added that organizations also benefit from the use of social identities for authentication. It reduces the number of abandoned registrations and logins, and makes it easier for customers to browse and buy. Therefore, it also helps organizations attract and retain customers.

The report also revealed the fact that lack of identity proofing and weak authentication for social network identities can expose merchants to more fraud. Service providers therefore have to defend themselves. They may allow social network registration, but augment the process with additional controls when a retail site provides access to sensitive data and monetary transactions. Alternatively, merchants may accept the increased risk without additional controls because of the potential increase in the number of customers and the volume of purchases; this approach “passes the buck” to payment card companies — but they already have robust fraud detection and management tools and processes in place.

Commenting on this, Mr. Allan said,”It’s important for IT leaders to remember that, despite the increased risk of fraud, social network identity proofing and user authentication are no worse than the practices currently used by many businesses. In fact, social network identities could offer better identity proofing than ‘raw’ customer registration. This is because social network analysis can potentially identify bogus social identities, and some vendors can exploit the ‘wisdom of crowds’ to verify claimed social network identities.” He further added that there will be increased demand for specialized vendors that support this use of social network identities, as well as for support for the OAuth and OpenID Connect specifications in traditional IAM vendors’ Web access management and federation products.

You Might Also Like

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>