Soft Computing Tools in Credit card fraud & Detection Rashmi G.Dukhi G.H.Raisoni Institute of Information & Technology, Nagpur rashmidukhi25@gmail.
|
|
- Benjamin Black
- 8 years ago
- Views:
Transcription
1 Soft Computing Tools in Credit card fraud & Detection Rashmi G.Dukhi G.H.Raisoni Institute of Information & Technology, Nagpur Abstract Fraud is one of the major ethical issues in the credit card industry. The significance of the application of the techniques reviewed here is in the minimization of credit card fraud. Depending on the type of fraud faced by banks or credit card companies, various measures can be adopted and implemented. Neural Network is used to describe a statistical model that evaluates plastic card account and/or transaction data.the Neural Network Model generates a score for each account/transaction. The score separates those accounts/ transactions that are likely to be fraudulent from those that are not. Accounts/transactions that receive higher scores are more likely to be fraudulent.accounts/transactions that receive higher scores are more likely to be fraudelent. Keywords Credit card fraud, Detection techniques, Fraudster,Neural Network,Skimming I. INTRODUCTION Fraud means obtaining services/goods and/or money by unethical means, and is a growing problem all over the world nowadays. Fraud deals with cases involving criminal purposes that, mostly, are difficult to identify. Credit cards are one of the most famous targets of fraud. Credit card fraud may happen in various ways, which depend on the type of fraud concerned; it encapsulates bankruptcy fraud, theft fraud / counterfeit fraud, application fraud and behavioral fraud. Each of these sub-fraud categories has its own definition and specificity.section II describes the various types of frauds.section III explains how neural network can be applied for detecting fraudulent transactions. A. Perception of Risk One reason these numbers remain low is the perception of risk associated with the issuance of debit cards. This risk can be broken down into three categories: 1. Lost/stolen - Crime of opportunity, fraud is usually in small amounts and limited to one account 3. Friendly fraud - Fraud perpetrated by cardholders through system glitches, closing accounts before POS items clear and/or charge backs for valid transactions B. New Fraud Trends It is clear that issuers, especially smaller issuers, simply can't afford to be complacent. Often, criminals prey on institutions that they feel are less sophisticated in their risk management. New trends have emerged and are becoming more widespread in counterfeit fraud[10]. A few of the new methods that criminals are using to perpetuate fraud are: 1.Skimming - Criminals take valid cards and swipe them through a device that is about the size of a pager. The card information is then transferred and encoded onto any card with a magnetic stripe. The card could be a credit card that was recently stolen or found in the trash, any type of loyalty card or even a blank plastic card that can be purchased at a variety of places with no questions asked. The plastic is then used to perform transactions at locations where consumers swipe their own cards, such as gas stations, pay phones, and merchants where the customer passes their card through the POS terminal. Due to the fact that all of the valid track 2 data is reproduced, this type of fraud corrupts the CVV/CVC protection that card associations implemented just a few years ago[3]. ATM skimming is a type of fraud and figure 1 shows how PIN is captured by flashing light. 2.Account Generation Software - This type of software, available on the Internet, is used by criminals to obtain valid BINs and uses the proper algorithms to generate valid 16 digit account numbers that may or may not be issued. Criminals then take all of those valid account numbers and via computer or unmanned point of sale locations, start seeking vulnerable BIN. 2. Counterfeit - Process in which cards or accounts are created by criminals who have no association with the bank or cardholder 60
2 In other words, purchasers use credit cards knowing that they are not able to pay for their purchases. The bank will send them an order to pay. However, the customers will be recognized as being in a state of personal bankruptcy and not able to recover their debts. The bank will have to cover the losses itself. Usually, this type of fraud loss is not included in the calculation of the fraud loss provision as it is considered a chargeoff loss. The only way to prevent this bankruptcy fraud is by doing a pre-check with credit bureaux in order to be informed about the banking history of the customers. 2. Theft fraud/counterfeit fraud- Fig 1.An ATM skimming & Pin Capturing Device. The flashing light is easily observed. 3. Pinging - A method in which criminals try to get an authorization on the account numbers they have generated with account generation software. Once an authorization is given, multiple cards are produced and passed out to other members involved in the fraud ring. 4. Account Takeover - This type of fraud is becoming more prevalent. The criminal calls the bank to change the address on an account and then calls back a few days later explaining that their card was lost and requests a new debit card. Many technology controls and tools are being used today by financial institutions including card activation (cards are mailed inactive and can only be activated by VRU or PIN-based transactions at the ATM), address verification in non face-to-face transactions, CVC/CVV validation and expiration date checking[13]. With these tools in place, most instances of fraud can be avoided. However, it's the implementation of neural networks that has had the strongest effect on the reduction of fraud. 1. Bankruptcy fraud II. TYPES OF FRAUD Bankruptcy fraud is one of the most difficult types of fraud to predict. However, some methods or techniques may help in its prevention. Bankruptcy fraud means using a credit card while being insolvent. 61 Theft fraud means using a card that is not yours. The perpetrator will steal the card of someone else and use it as many times as possible before the card is blocked. The sooner the owner will react and contact the bank, the faster the bank will take measures to stop the thief. Counterfeit fraud occurs when the credit card is used remotely; only the credit card details are needed. At one point, one will copy your card number and codes and use it via certain web-sites, where no signature or physical cards are required On-line merchants are at risk because they have to offer their clients payment by credit card[5]. In cases where fraudsters use stolen or manipulated credit card data the merchant loses money because of so-called "charge-backs"2. Note that charge-backs are generated if credit card holders object to items on their monthly credit card statements because they were not responsible for the purchase transactions. A fraudulent transaction is difficult to detect and to define. Nevertheless, ATM transactions of large amounts are suspicious and demand contact with the customer. Purchases of goods for a larger amount than normal will also be notified to the customer as well as abnormal overseas spending patterns.fraudulent transactions are usually impossible to prevent as they occur in a really short period of time. However, once a card is identified, the card is blocked. 3. Application Fraud Application fraud is when someone applies for a credit card with false information. To detect application fraud, the solution is to implement a fraud system that allows identifying suspicious applications.
3 To detect application fraud, two different situations have to be distinguished: when applications come from a same individual with duplicates, and when applications come from different individuals with similar details, the so-called identity fraudsters.in most banks, to be eligible for a credit card, applicants need to complete an application form. This application form is mandatory except for social fields. The information required includes identification information, location information, contact information, confidential information and additional information. Recurrent information available would be for identification purposes, such as the full name and the date of birth. The applicant would inform the bank about his/her location details: the address, the postal code, the city and the country. The bank would also ask for contact details, such as address, land-line and mobile phone numbers. Confidential information will be the password. In addition, the gender will be given. All those characteristics may be used while searching for duplicates. To identify the so-called duplicates, cross-matching techniques are in common use. Rather than using statistical techniques, another method easy to implement is cross-matching. For instance, simple queries that give fast results are to cross-identify information with location details. Examples would be last name and date of birth and postal code and address or last name and address and and gender. By those queries, individuals with more than one card are identified. Those are quite simplistic queries but will remove most duplicates from the system. Note that duplicates may usually be genuine. Customers can reapply filling in a new address or spelling differently in one of the fields. By contrast, identity crime, as it is named, is perpetrated by real criminals filling wrong application data consciously. 4. Behavioral fraud - Behavioral fraud occurs when details of legitimate cards have been obtained\ fraudulently and sales are made on a cardholder present basis. These sales include telephone sales and e-commerce transactions, where only the card details are required.behavioral fraud can be detected by implementing a fraud scorecard predicting which customers are likely to default. Traditional credit scorecards are used to detect customers who are likely to default, and the reasons for this may include fraud.regarding the process, using scoring for fraud prevention is similar to any other use, including profit, default, and collection. The score reflects experience of past cases, and the result is a binary outcome: a genuine customer or a fraudster. III. NEURAL NETWORK APPROACH Neural networks are extremely important in today's banking world and provide many benefits. Unlike daily reports, all suspect activity is detected immediately and can be tied to the authorization system to deny after the first detection. In addition, neural networks are always adapting to new fraud trends. Criminals can by-pass all of the fraud methods discussed in some manner; however, neural networks are the only systems that help detect unusual activity when all other methods of fraud prevention have been circumvented. "Self-learning" software that builds and learns the characteristics of each cardholder can "predict" if a transaction may be fraudulent. The term for this type of fraud control is Predictive Modeling. This software takes every transaction and provides a score based on previous activity for that account. If the transaction has some element (amount, geography, merchant type, etc.) that causes the software to "predict" that it is probably fraudulent, it gives it a very high score. These neural networks can be installed in tandem with the bank processor's authorization system, so that transactions are scored immediately. Based on the score received, they can be further investigated or declined. In the world of plastic card fraud, the term Neural Network is used to describe a statistical model that evaluates plastic card account and/or transaction data. Typically, the Neural Network Model generates a score for each account/transaction. The score separates those accounts/ transactions that are likely to be fraudulent from those that are not. Accounts/transactions that receive higher scores are more likely to be fraudulent. A robust Neural Network Model helps a fraud investigator focus on those accounts/transactions that are MOST LIKELY to be fraudulent [14]. 62
4 A Neural Network Model is one component of a more complex Fraud Detection System. There are many other tools that are used to deliver and augment the score created by the Neural Network Model. These include: A. Rule Systems allow issuers and processors to focus more specifically on fraudulent accounts/transactions. Rule Systems typically incorporate a Neural Network Model score and allow the issuer to apply their own detailed knowledge to improve the process. For example: If an issuer that typically reviews cases with a Neural Network score of 800 suddenly experiences an outbreak of fraud at electronic stores in Madison, WI, a Rule System would allow them to create a rule that says: IF the MERCHANT is ELECTRONICS AND the zip code is between and AND the Neural Network Score is greater than 600 CREATE A CASE TO REVIEW In this case, the rule allows the issuer to focus on a specific fraud situation that would have been missed using the Neural Network score of 800. The important distinction is that rules can be modified by the user, while the Neural Network Model cannot. B. Case Management Systems- refer to the PC workstation that a fraud analyst uses to review/work each case and determine the action that needs to be taken. A Case Management System usually allows the analyst to see recent transactions on the account, and provides the analyst with contact information so an attempt can be made to reach the cardholder. The Case Management System gives the fraud analyst enough information to make a decision in the event that a cardholder cannot be reached. C.Authorization Systems decide whether or not to approve or decline a transaction. The most basic Authorization Systems will make this decision using elements such as: Available Credit Limit/Account Balance Current Status (is the account overdue?) Open/Closed Indicator Expiration Date Check CVV Validation While the Neural Network Model can help predict which accounts/ transactions are most likely to be fraudulent, it requires followup action to verify the activity or to decide whether or not an account should be blocked. The other components of the Fraud Detection System and Authorization System help credit unions and processors take action to identify and stop fraudulent activity as quickly as possible. IV. CONCLUSION Credit card fraud is an act of criminal dishonesty. This article has reviewed recent findings in the credit card field. This paper has identified the different types of fraud, such as bankruptcy fraud, counterfeit fraud, theft fraud, application fraud and behavioral fraud, and discussed measures to detect them. Such measures have included neural networks. References [1]. Aleskerov, E., Freisleben, B. & B Rao CARDWATCH: A Neural Network-Based Database Mining System for Credit Card Fraud Detection, Proc. of the IEEE/IAFE on Computational Intelligence for Financial Engineering, [2]. Anderson, R The Credit Scoring Toolkit: theory and practice for retail credit risk management and decision automation. New York: Oxford University Press. [3]. APACS, Association for Payment Cleaning Services, no date. Card Fraud Facts and Figures Available at: s_and_figures.html (Accessed: December 2007). [4]. Bentley, P., Kim, J., Jung. G. & J Choi Fuzzy Darwinian Detection of Credit Card Fraud, Proc. of 14 th Annual Fall Symposium of the Korean Information Processing Society. [5]. Bolton, R. & Hand, D Statistical Fraud Detection: A Review. Statistical Science, 17; [6]. Brause R., Langsdorf T. & M Hepp. 1999a. Credit card fraud detection by adaptive neural data mining, Internal Report 7/99 (J. W. Goethe-University, Computer Science Department, Frankfurt, Germany). [7]. Brause, R., Langsdorf, T. & M Hepp. 1999b. Neural Data Mining for Credit Card Fraud Detection, Proc. of 11 th IEEE International Conference on Tools with Artificial Intelligence. 63
5 [8]. Caminer, B Credit card Fraud: The Neglected Crime. The Journal of Criminal Law and Criminology, 76; [9]. Chan, P., Fan, W. Prodromidis, A. & S Stolfo Distributed Data Mining in Credit Card Fraud Detection.IEEE Intelligent Systems, 14; [10]. Chan, P., Stolfo, S., Fan, D., Lee, W. & A Prodromidis Credit card fraud detection using meta learning: Issues and initial results, Working notes of AAAI Workshop on AI Approaches to Fraud Detection and Risk Management. [11]. Chepaitis, E Information Ethics Across Information Cultures. Business Ethics: A European Review, 6: 4, [12]. Chiu, C. & Tsai, C A Web Services-Based Collaborative Scheme for Credit Card Fraud Detection. Proc. Of 2004 IEEE International Conference on e-technology, e-commerce and e- Service. [13]. Clarke, M Fraud and the Politics of Morality. Business Ethics: A European Review, 3: 2, [14]. Dorronsoro, J. Ginel, F. Sanchez, C. & C Cruz Neural Fraud Detection in Credit Card Operations. IEEE Transactions on Neural Networks, 8; [15]. Encyclopedia Britannica, no date. Credit Card. Available at: card (Accessed: October 2008). [16]. Bolton, R. & Hand, D Unsupervised Profiling Methods for Fraud Detection, Credit Scoring and Credit Control VII. 64
Credit card fraud and detection techniques: a review
Banks and Bank Systems, Volume 4, Issue 2, 2009 Linda Delamaire (UK), Hussein Abdou (UK), John Pointon (UK) Credit card fraud and detection techniques: a review Abstract Fraud is one of the major ethical
More informationYour Single Source. for credit, debit and pre-paid services. Fraud Risk and Mitigation
Your Single Source for credit, debit and pre-paid services Fraud Risk and Mitigation Agenda Types of Fraud Fraud Identification Notifications Next Steps 11/8/2013 2 Types of Fraud Lost and Stolen Cards
More informationCredit Card Fraud Detection Using Hidden Markov Model
International Journal of Soft Computing and Engineering (IJSCE) Credit Card Fraud Detection Using Hidden Markov Model SHAILESH S. DHOK Abstract The most accepted payment mode is credit card for both online
More informationMitigating Fraud Risk Through Card Data Verification
Risk Management Best Practices 11 September 2014 Mitigating Fraud Risk Through Card Data Verification AP, Canada, CEMEA, LAC, U.S. Issuers, Processors With a number of cardholder payment options (e.g.,
More informationAcceptance to Minimize Fraud
Best Practices for Credit Card Acceptance to Minimize Fraud By implementing best practices in credit card processing, you decrease the likelihood of fraudulent transactions and chargebacks. In general,
More informationPayment Fraud Statistics
Instrument No. of Fraud Payment Fraud Statistics - Summary of Results Fraud Perpetrated on Australian Issued Payment Instruments (Revised December 2013) Value ($) of Fraud Total No. of all (thousands)
More informationMarket Intelligence Cell. Fighting Financial Crime
Market Intelligence Cell Fighting Financial Crime 1 Market Intelligence Cell Our objective To investigate and suppress illegal, dishonorable and improper practices, market abuse and any potential breach
More informationMerchant Guide to the Visa Address Verification Service
Merchant Guide to the Visa Address Verification Service Merchant Guide to the Visa Address Verification Service TABLE OF CONTENTS Table of Contents Merchant Guide to the Visa Address Verification Service
More informationAUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA
Australian Payments Clearing Association AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA 214 Australian Payments Clearing Association Limited ABN 12 55 136 519 CONTENTS OVERVIEW 1 SECTION 1 Fraud rates 4 SECTION
More informationBinBase.com REPORT: credit card fraud
BinBase.com REPORT: credit card fraud Whether you are a security specialist, an e-commerce web developer, or an online merchant, a knowledge of how credit card fraud works and what you can do to prevent
More informationDesigning an Automated Distributed System for Credit Card Fraud Detection
Designing an Automated Distributed System for Credit Card Fraud Detection Somtoochukwu Ilo, Tochukwu Chiagunye and Amaechi Chineke, Computer Engineering Department Michael Okpara University of Agriculture,
More informationUsing Trusted Email to Prevent Credit Card Frauds in Multimedia Products
World Wide Web: Internet and Web Information Systems, 5, 245 256, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. Using Trusted Email to Prevent Credit Card Frauds in Multimedia
More informationPROBLEM REDUCTION IN ONLINE PAYMENT SYSTEM USING HYBRID MODEL
PROBLEM REDUCTION IN ONLINE PAYMENT SYSTEM USING HYBRID MODEL Sandeep Pratap Singh 1, Shiv Shankar P. Shukla 1, Nitin Rakesh 1 and Vipin Tyagi 2 1 Department of Computer Science and Engineering, Jaypee
More informationAvoiding Fraud. Learn to recognize the warning signs for fraud and follow these card acceptance guidelines to reduce your risk.
Avoiding Fraud Learn to recognize the warning signs for fraud and follow these card acceptance guidelines to reduce your risk. Intoduction Fraud comes in many forms and hurts merchants of all sizes. Whether
More informationCredit Card PIN & PAY Frequently Asked Questions (FAQ)
Credit Card PIN & PAY Frequently Asked Questions (FAQ) 1. What is a PIN & PAY card? PIN & PAY card is a PIN - enabled card that allows you to make purchase by keying in a 6-digit PIN, with no signature
More informationWith the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more
More informationAN UPDATE RESEARCH ON CREDIT CARD ON-LINE TRANSACTIONS
AN UPDATE RESEARCH ON CREDIT CARD ON-LINE TRANSACTIONS Falaki S. O. Alese B. K. Department of Computer Science, Federal University of Technology, Akure, Ondo State, Nigeria. Ismaila W. O. Department of
More informationSuzanne Lynch Professor of Practice Economic Crime Utica College sl6-15 1
Suzanne Lynch Professor of Practice Economic Crime Utica College sl6-15 1 The most significant trend is decreasing paper payments and increasing electronic payments. Many organizations are also seeing
More informationThe need for a secure & trusted payment instrument in e-commerce. Ali AlMeshal
The need for a secure & trusted payment instrument in e-commerce Ali AlMeshal In Physical/Real World Hand over card Visual check Swipe in POS Online authorization Receipt with signature panel Sign or Pin
More informationStatistics in Retail Finance. Chapter 7: Fraud Detection in Retail Credit
Statistics in Retail Finance Chapter 7: Fraud Detection in Retail Credit 1 Overview > Detection of fraud remains an important issue in retail credit. Methods similar to scorecard development may be employed,
More informationCredit/Debit Card Processing Requirements and Best Practices. Adele Honeyman Oregon State Treasury Training Specialist
Credit/Debit Card Processing Requirements and Best Practices Adele Honeyman Oregon State Treasury Training Specialist 1 What? What do I need to know about excepting credit cards? Who s involved, how it
More informationTo all GRSB debit and credit card customers:
To all GRSB debit and credit card customers: A data breach at the Target Corporation may have exposed 40 million credit/debit cards to potential fraudulent activity. If you made purchases in a Target store
More informationAIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009
AIS Webinar Payment Application Security Hap Huynh Business Leader Visa Inc. 1 April 2009 1 Agenda Security Environment Payment Application Security Overview Questions and Comments Payment Application
More informationMISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if
More informationEMV EMV TABLE OF CONTENTS
2 TABLE OF CONTENTS Intro... 2 Are You Ready?... 3 What Is?... 4 Why?... 5 What Does Mean To Your Business?... 6 Checklist... 8 3 U.S. Merchants 60% are expected to convert to -enabled devices by 2015.
More informationFIGHTING FRAUD: IMPROVING INFORMATION SECURITY TESTIMONY OF JOHN J. BRADY VICE PRESIDENT, MERCHANT FRAUD CONTROL MASTERCARD INTERNATIONAL
FIGHTING FRAUD: IMPROVING INFORMATION SECURITY TESTIMONY OF JOHN J. BRADY VICE PRESIDENT, MERCHANT FRAUD CONTROL MASTERCARD INTERNATIONAL Before the Subcommittee on Financial Institutions and Consumer
More informationEMV's Role in reducing Payment Risks: a Multi-Layered Approach
EMV's Role in reducing Payment Risks: a Multi-Layered Approach April 24, 2013 Agenda EMV Rationale Why is this worth the effort? Guides how we implement it EMV Vulnerability at the POS EMV Impact on CNP
More informationF I C O. February 22, 2011
F I C O Fair Isaac Corporation 901 Marquette Avenue, Suite 3200 Minneapolis, M N 5 5 4 0 2 U S A T 6 1 2-7 5 8-5 2 0 0 F 6 1 2-7 5 8-5 2 0 1 www.fico.com February 22, 2011 Jennifer J. Johnson, Secretary
More informationHow To Understand The Benefits Of It/Is
THE ROLE OF IT/IS IN COMBATING FRAUD IN THE PAYMENT CARD INDUSTRY Jan Devos, Ghent University Association, Howest Kortrijk, Belgium Igor Pipan, Ss. Cyril and Methodius University in Skopje, Macedonia Abstract
More informationINTRODUCTION. Identity Theft Crime Victim Assistance Kit
Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change
More informationIDENTITY THEFT FRAUD
FRAUD ALERT! SYNTHETIC IDENTITY THEFT FRAUD & n How to Protect Yourself n Data Breaches and You n Free Credit Reports SYNTHETIC IDENTITY THEFT and FRAUD It is hardly news that identity thieves and cybercriminals
More informationOpenEdge Research & Development Group April 2015
2015: Security, Merchant Readiness & the Coming Liability Shift OpenEdge Research & Development Group April 2015 solutions@openedgepay.com openedgepay.com 2015: Security, Merchant Table of Contents The
More informationFraud Prevention and Program Security Gord Jamieson Director Risk Management & Security Visa Canada Association
Fraud Prevention and Program Security Gord Jamieson Director Risk Management & Security Visa Canada Association Evolution of Risk Management Controls Presentation text goes here. Presentation text goes
More informationCREDIT CARD PROCESSING GLOSSARY OF TERMS
CREDIT CARD PROCESSING GLOSSARY OF TERMS 3DES A highly secure encryption system that encrypts data 3 times, using 3 64-bit keys, for an overall encryption key length of 192 bits. Also called triple DES.
More informationHeartland Secure. By: Michael English. A Heartland Payment Systems White Paper 2014. Executive Director, Product Development
A Heartland Payment Systems White Paper 2014 Heartland Secure. By: Michael English Executive Director, Product Development 2014 Heartland Payment Systems. All trademarks, service marks and trade names
More informationArtificial Neural Network and Location Coordinates based Security in Credit Cards
Artificial Neural Network and Location Coordinates based Security in Credit Cards 1 Hakam Singh, 2 Vandna Thakur Department of Computer Science Career Point University Hamirpur Himachal Pradesh,India Abstract
More informationEMV and Chip Cards Key Information On What This Is, How It Works and What It Means
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved
More informationFraud. Wrongful or criminal deception intended to result in financial or personal gain.
Fraud Wrongful or criminal deception intended to result in financial or personal gain. Fraud in the Taxi Industry Taxi services are unique our payments occur where the customers are, not at a single place
More informationPayPoint.net Gateway Guide to Identifying Fraud Risks
PayPoint.net Gateway Guide to Identifying Fraud Risks Copyright PayPoint.net 2010 This document contains the proprietary information of PayPoint.net and may not be reproduced in any form or disclosed to
More informationFraud Minimisation Guide ANZ Merchant Business Solutions
Fraud Minimisation Guide ANZ Merchant Business Solutions INTRODUCTION Fraud can occur in and is a risk for any business that accepts credit cards and it can have a significant financial impact on your
More informationRisk Management Service Guide. Version 4.2 August 2013 Business Gateway
Risk Management Service Guide Version 4.2 August 2013 Business Gateway This page is intentionally blank. Table Of Contents About this Guide... 1 Change History... 1 Copyright... 1 Introduction... 3 What
More informationIDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09
IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do
More informationThe Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online.
1 February 2010 Volume 2, Issue 1 The Merchant Serving Florida State University s Payment Card Community Individual Highlights: Skimming Scam 1 Skimming at Work 2 Safe at Home 3 Read your Statement 4 Useful
More informationEMV and Small Merchants:
September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service
More informationDetecting Credit Card Fraud by Decision Trees and Support Vector Machines
Detecting Credit Card Fraud by Decision Trees and Support Vector Machines Y. Sahin and E. Duman Abstract With the developments in the Information Technology and improvements in the communication channels,
More informationCard Acceptance Best Practices Playing it Safe at the Point of Sale
White Paper Card Acceptance Best Practices Playing it Safe at the Point of Sale Fraudulent activity costs U.S. businesses billions. And that is just lost revenue. When you consider the associated damage
More informationApplication of Hidden Markov Model in Credit Card Fraud Detection
Application of Hidden Markov Model in Credit Card Fraud Detection V. Bhusari 1, S. Patil 1 1 Department of Computer Technology, College of Engineering, Bharati Vidyapeeth, Pune, India, 400011 Email: vrunda1234@gmail.com
More informationConsumer Decision Making Contest 2001-2002 Study Guide ATM/Debit Cards
Consumer Decision Making Contest 2001-2002 Study Guide ATM/Debit Cards The popularity of ATM (automated teller machine) and debit cards is rising. ATM cards have a longer history than debit cards, but
More informationIdentifying Security. Payment System. Federal Reserve Bank. Ellen Richey Chief Enterprise Risk Officer Visa Inc. Visa Public
Identifying Security Issues in the Retail Payment System Federal Reserve Bank Chicago Ellen Richey Chief Enterprise Risk Officer Visa Inc. June 5, 2008 Agenda 1. The Data Security Landscape 2. Recent Trends
More informationTHE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit
More informationThe 7 th Balkan Conference on Operational Research BACOR 05 Constanta, May 2005, Romania REDUCING FRAUD IN ELECTRONIC PAYMENT SYSTEMS
The 7 th Balkan Conference on Operational Research BACOR 05 Constanta, May 2005, Romania REDUCING FRAUD IN ELECTRONIC PAYMENT SYSTEMS DEJAN SIMIÃ University of Belgrade, Faculty of Organizational Sciences,
More informationMitigating Fraudulent CNP Transactions
Examination of Safeguards Electronic commerce has become a wildly successful channel for merchants and their customers. While the ability to shop online or through mail order catalogs is not new, the explosion
More informationFraud Prevention Issuer s Best Practice Guide
Issuer s Best Practice Guide Rev. March 2011 www.fisglobal.com Copyright 2006 by FIS Card Services, Inc., a wholly owned subsidiary of FIS, Inc. All rights reserved. Printed in the United States of America.
More informationAbout the Federal Reserve
About the Federal Reserve The Federal Reserve Bank of Philadelphia is one of 12 regional Reserve Banks in the United States that, along with the Board of Governors in Washington, D.C., make up the Federal
More informationT E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E
T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E A I D E N T I T Y T H E F T G U I D E Prepared and distributed as a Public
More informationimportant for me Postbank P.O.S. Transact
important for me Smooth, secure processing of card payments online, by phone or by fax. The benefits of being a Postbank partner for distance selling. Postbank P.O.S. Transact 2 At a glance The benefits
More informationI know what is identity theft but how do I know if mine has been stolen?
What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card
More informationATM FRAUD AND COUNTER MEASURES
ATM FRAUD AND COUNTER MEASURES GENESIS OF ATMs An automated teller machine was first introduced in 1960 by City Bank of New York on a trial basis. The concept of this machine was for customers to pay utility
More informationIntroducing the Credit Card
Introducing the Credit Card This program was designed with high school students in mind. It goes over everything you need to know before you get your first credit card so you can manage it wisely.» Key
More informationMARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with
More informationIDENTITY THEFT PREVENTION PROGRAM
IDENTITY THEFT PREVENTION PROGRAM Contents Welcome... 3 Overview... 4 Definitions... 5 Red Flags... 6 Red Flag 1 Alerts, Notifications or Warnings from a Consumer Reporting Agency... 7 Red Flag 2 Suspicious
More informationMeta Learning Algorithms for Credit Card Fraud Detection
International Journal of Engineering Research and Development e-issn: 2278-67X, p-issn: 2278-8X, www.ijerd.com Volume 6, Issue 6 (March 213), PP. 16-2 Meta Learning Algorithms for Credit Card Fraud Detection
More informationPlastic Card Claims Automation Specifications Document
Plastic Card Claims Automation Specifications Document Version: 1.3 Last modified: April 28, 2009 The Plastic Card Policy is underwritten by CUMIS Insurance Society, Inc., a member of the CUNA Mutual Group.
More informationPayment Cardholder Data Handling Procedures (required to accept any credit card payments)
Payment Cardholder Data Handling Procedures (required to accept any credit card payments) Introduction: The Procedures that follow will allow the University to be in compliance with the Payment Card Industry
More informationActorcard Prepaid Visa Card Terms & Conditions
Actorcard Prepaid Visa Card Terms & Conditions These Terms & Conditions apply to your Actorcard prepaid Visa debit card. Please read them carefully. In these Terms & Conditions: "Account" means the prepaid
More informationA Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business
A Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business Nucharee Premchaiswadi*, James G. Williams** and Wichian Premchaiswadi*** *Faculty of Information Technology Dhurakij
More informationVisa global Compromised Account
Visa global Compromised Account RECOVERY PROGRAM WHAT EVERY MERCHANT SHOULD KNOW ABOUT GCAR WHAT EVERY MERCHANT SHOULD KNOW ABOUT GCAR WHAT The Visa Global Compromised Account Recovery (GCAR) program offers
More informationIdentity Theft. Emergency Repair Kit
Identity Theft Emergency Repair Kit 2012 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Any duplication or reproduction is strictly prohibited. Identity Theft Emergency Repair
More informationFraud Management in the Credit Card Industry 1
Fraud Management in the Credit Card Industry 1 Peter Burns Anne Stanley April 2002 Summary: On November 16, 2001, the Payment Cards Center of the Federal Reserve Bank of Philadelphia sponsored a workshop
More informationSecurity enhancement on HSBC India Debit Card
Security enhancement on HSBC India Debit Card A Secure Debit Card HSBC India Debit Cards are more secure and enabled with the Chip and PIN technology. In addition to this you can restrict usage of the
More informationIDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority
MEMBER IDENTITY PROTECTION Protect Your Identity Security of Personal Information is Our Top Priority Imagine this Unexpectedly, you get turned down for a loan, you get a call from a collection agency
More informationNew Account Reference Guide
New Account Reference Guide Welcome to BBVA Compass Merchant Services Thank you for choosing BBVA Compass as your Merchant Services provider. BBVA Compass is dedicated to providing your business with the
More informationProtect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity
More informationUnsupervised Profiling Methods for Fraud Detection
Unsupervised Profiling Methods for Fraud Detection Richard J. Bolton and David J. Hand Department of Mathematics Imperial College London {r.bolton, d.j.hand}@ic.ac.uk Abstract Credit card fraud falls broadly
More information(M.S.), INDIA. Keywords: Internet, SQL injection, Filters, Session tracking, E-commerce Security, Online shopping.
Securing Web Application from SQL Injection & Session Tracking 1 Pranjali Gondane, 2 Dinesh. S. Gawande, 3 R. D. Wagh, 4 S.B. Lanjewar, 5 S. Ugale 1 Lecturer, Department Computer Science & Engineering,
More informationPlastic Fraud. Debit Cards Debit cards, unlike credit cards, automatically withdraw funds from your account at the time you make a transaction.
Getting a Handle on Debit and Credit Cards Plastic Fraud State-of-the-art thieves are concentrating on plastic cards. In the past, this type of fraud was not very common. Today, it is a big business for
More informationIdentity Theft: It CAN Happen to You
Aging Well: Healthier, Happier and Less Hassled An Educational Series for Seniors and their Caregivers Identity Theft: It CAN Happen to You How would you feel if you were stopped for a traffic violation
More informationSTATE EMPLOYEES CREDIT UNION VISA GIFT CARD TERMS AND CONDITIONS Effective September 2013
STATE EMPLOYEES CREDIT UNION VISA GIFT CARD TERMS AND CONDITIONS Effective September 2013 This Cardholder Agreement ( Agreement") sets forth the terms and conditions of your SECU Visa Gift Card ( Card
More informationHow To Understand The Law Of Credit Card Usage
Glossary Note: All definitions listed in this section are also available in the Course Glossary. You can access the course Glossary online by clicking the Glossary link in the Materials section of the
More informationWhy Data Security is Critical to Your Brand
Why Data Security is Critical to Your Brand Why security is critical to your brand Cybercriminals do not discriminate based on industry or business size. Security is expensive. At least, it is if you wait
More informationBest Practices for Internet Merchants
Best Practices for Internet Merchants The following best practices, taken from various experts, are offered to help you avoid being victimized by Internet fraud. Experience suggests that there are certain
More informationSending money abroad. Plain text guide
Sending money abroad Plain text guide Contents Introduction 2 Ways to make international payments 3 Commonly asked questions 5 What is the cost to me of sending money abroad? 5 What is the cost to the
More informationPrevention Is Better Than Cure EMV and PCI
Prevention Is Better Than Cure EMV and PCI Prevention Is Better Than Cure An independent view on the effectiveness of EMV and PCI in case of large-scale card compromise. Over the past couple of months,
More informationGuideline on Debit or Credit Cards Usage
CMSGu2012-04 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Debit or Credit Cards Usage National Computer Board Mauritius
More informationA multi-layered approach to payment card security.
A multi-layered approach to payment card security. CARD-NOT-PRESENT 1 A recent research study revealed that Visa cards are the most widely used payment method at Canadian websites, on the phone, or through
More informationAnother Legal Guide from Bonallack & Bishop Solicitors
Another Legal Guide from Bonallack & Bishop Solicitors 80 PRACTICAL TIPS TO HELP COMBAT ALL YOU NEED TO KNOW INTRODUCTION... Over the last few years, identity theft has become one of the fastest growing
More informationIDENTITY THEFT RESOURCE KIT
IDENTITY THEFT RESOURCE KIT TABLE OF CONTENTS Introduction 2 What To Do Now 3 Key Agencies to Contact 3 Other Important Contacts 4 Action Taken Form 6 Sample Letters 7 How Identity Theft Can Occur 9 What
More informationSample Credit Card Agreement
Credit Cards Sample Credit Card Agreement Please note this is a sample credit card agreement. It does not contain a credit limit, any interest rates, an APR or the Total Amount Payable as this information
More informationPayment Card Security
Payment Card Security January 31, 2008 Kieran Norton, Senior Manager Security & Privacy Services, Deloitte & Touche LLP Focus of the Presentation PCI Overview Background Current Environment Key Considerations
More informationClark Brands Payment Methods Manual. First Data Locations
Clark Brands Payment Methods Manual First Data Locations Table of Contents Introduction... 3 Valid Card Types... 3 Authorization Numbers, Merchant ID Numbers and Request for Copy Fax Numbers... 4 Other
More informationA+FCU GIFT CARD TERMS AND CONDITIONS
PO Box 14867 Austin, TX 78761-4867 512-302-6800 800-252-8148 www.aplusfcu.org A+FCU GIFT CARD TERMS AND CONDITIONS These terms and conditions ( Agreement ) govern the issuance and use of the A+ FCU Gift
More informationData Security, Fraud Prevention, and Cost Control. Mike Dorland, CPP Regional Marketing Representative Michigan Retailers Association
Data Security, Fraud Prevention, and Cost Control Mike Dorland, CPP Regional Marketing Representative Michigan Retailers Association Michigan Retailers Association Incorporated in 1940 Represent retail
More informationFAQ Credit Card (PIN & PAY)
FAQ Credit Card (PIN & PAY) Communication 1. When would communication go out to customers on the implementation? We are in the midst of preparing notification/letter to Cardhoder on the implementation
More informationEMV FAQs. Contact us at: CS@VancoPayments.com. Visit us online: VancoPayments.com
EMV FAQs Contact us at: CS@VancoPayments.com Visit us online: VancoPayments.com What are the benefits of EMV cards to merchants and consumers? What is EMV? The acronym EMV stands for an organization formed
More informationEDUCATION - TERMS 101
EDUCATION - TERMS 101 ACH (Automated Clearing House): A processing organization networked with others to exchange (clear and settle) electronic debit/credit transactions (no physical checks). ABA Routing
More informationFLIP IDENTITY THEFT. (Financial Literacy in Practice) February 2015 OVERVIEW TEACHER NOTES TEACHER NOTES
FLIP (Financial Literacy in Practice) February 2015 IDENTITY THEFT OVERVIEW This resource complements the material in Operation Financial Literacy. It has been written to address current issues which specifically
More informationUSDA: Handling Fraud and Disputes. Deanna Hanson CPS Fraud Support Analyst
USDA: Handling Fraud and Disputes Deanna Hanson CPS Fraud Support Analyst Agenda What is fraud? Fraud trends Fraud case lifecycle Fraud and dispute process Tips to prevent fraud 2 Fraud Overview and Trends
More informationThe Credit Card Fraud Detection Analysis With Neural Network Methods
The Credit Card Fraud Detection Analysis With Neural Network Methods 1 M.Jeevana Sujitha, 2 K. Rajini Kumari, 3 N.Anuragamayi 1,2,3 Dept. of CSE, A.S.R College of Engineering & Tech., Tetali, Tanuku, AP,
More informationHow to Help Prevent Fraud
TD Canada Trust How to Help Prevent Fraud Merchant Services tips to help protect your business Fraud Awareness All credit cards issued in Canada are designed with special security features to help deter
More informationFraud Detection in Credit Card Using DataMining Techniques Mr.P.Matheswaran 1,Mrs.E.Siva Sankari ME 2,Mr.R.Rajesh 3
Fraud Detection in Credit Card Using DataMining Techniques Mr.P.Matheswaran 1,Mrs.E.Siva Sankari ME 2,Mr.R.Rajesh 3 1 P.G. Student, Department of CSE, Govt.College of Engineering, Thirunelveli, India.
More information