Credit Card Fraud Detection Using an Efficient Enhanced K- Mean Clustering Algorithm

Size: px
Start display at page:

Download "Credit Card Fraud Detection Using an Efficient Enhanced K- Mean Clustering Algorithm"

Transcription

1 International Journal Of Engineering And Computer Science ISSN: Volume 4 Issue 2 February 2015, Page No Credit Card Fraud Detection Using an Efficient Enhanced K- Mean Clustering Algorithm 1 Madhav Prasad Namdev, 2 Anil Kumar, 3 Varun Bansal 123s Asst. Prof, School of Computer Engineering & Information Technology Shobhit University Gangoh (India) ABSTRACTThe purpose of this paper is to study the Different types of frauds in credit card industry and the, effect of credit card frauds on card holders, merchants, issuers.as credit card becomes the most prevailing mode of payment for both online as well as regular purchase, fraud relate with it are also accelerating. Fraud detection is concerned with not only capturing the fraudulent events, but also capturing of such activities as quickly as possible. The use of credit cards is common in modern day society. Fraud is a millions dollar business and it is rising every year This will also signify how a comprehensive fraud detection system could help maintain the cost of detecting fraud, and Losses due to fraud, i.e., the total cost of fraud, under manageable levels. The main focushere will be mostly on Visa and MasterCard type transactions. KeywordsFraud detection; Electronic Commerce; Credit card fraud, Spending pattern; Credit card, fraud detection techniques I. INTRODUCTION Credit Card Fraud is one of the biggest threats to business establishments today.however, to combat the fraud effectively, it is important to first understand themechanisms of executing a fraud. Credit card fraudsters employ a large number ofmodus operandi to commit fraud. In simple terms, Credit Card Fraud is defined as:when an individual uses another individuals credit card for personal reasons while theowner of the card and the card issuer are not aware of the fact that the card is being used. Further, the individual using the card has no connection with the cardholder or issuer, and has no intention of either contacting the owner of the card or making repayments for the purchases made. Contrary to popular belief, merchants are far more at risk from credit card fraud than the cardholders. While consumers may face trouble trying to get a fraudulent charge reversed, merchants lose the cost of the product sold, pay chargeback fees, and fear from the risk of having their merchant account closed. Increasingly, the card not present scenario, such as shopping on the internet poses a greater threat as the merchant (the web site) is no longer protected with advantages of physical verification such as signature check, photo identification, etc. In fact, it is almost impossible to perform any of the physical world checks necessary to detect who is at the other end of the transaction. This makes the internet extremely attractive to fraud perpetrators. According to a recent survey, the rate at which internet fraud occurs is 12 to 15 times higher than physical world fraud. However, recent technical developments are showing some promise to check fraud in the card not present scenario. The Credit Card is a plastic card issued to number of users as one of the mode of payment. It allows cardholders to purchasing goods and services based on the cardholders promise. In China, credit card users are growing rapidly, but only a very few creditcard holders use credit cards for paying for day-to-day purchase comparatively with confidence and a sense of security. Reason is, credit card holder has no enoughconfidence to trust upon the payment system. Secure credit services of banks and development of E-business a reliable fraud detection system is essential to support safe credit card usage, Fraud detection based on analyzing existing purchase data of cardholder (current spending behavior) is a promising way for reducing the rate of credit card frauds. Fraud detection systems come into scenario when the fraudsters 1 Madhav Prasad Namdev, IJECS Volume 4 Issue 2 February, 2015 Page No Page 10367

2 exceed the fraud prevention systems and start fraudulent transactions. Along with the developments in the Information Technology and improvements in the communication channels, fraud is spreading all over the world with results of large amount of fraudulent loss. Anderson (2007) has identified and described the different types of fraud. Credit card frauds can be proceed in many different ways such as simple theft, counterfeit cards, Never Received Issue (NRI), application fraud and online/electronic fraud (where the card holder is not present). Credit card fraud detection is dreadfullydifficult, but also common problem for solution. As there is limited amount of data with the transactions being confided for example, transaction amount, merchant category code (MCC), acquirer number and date and time, address of the merchant. Various techniques in Knowledge Discovery, such as decision tree, neural network and case based reasoning have broadly been used for forming several fraud detection systems/ models. These techniques usually need adequate number of normal transactions and fraud transactions for learning fraud patterns. However, the ratio of fraudulent transactions to its normal transactions is low extremely, for an individual bank. 2. VARIOUS FRAUD TECHNIQUES As indicated above, there are many ways in which fraudsters execute a credit card fraud. As technology changes, so do the technology of fraudsters, and thus the way in which they go about carrying out fraudulent activities. Frauds can be broadly classified into three categories, i.e., traditional card related frauds, merchant related frauds and internet frauds. The different types of methods for committing credit card frauds are described below: 2.1. CARD RELATED FRAUDS Application Fraud This type of fraud occurs when a person falsifies an application to acquire a credit card.application fraud can be committed in three ways: Assumed identity, where an individual illegally obtains personal information of another individual and opens accounts in his or her name, using partially legitimate information. Financial fraud, where an individual provides false information about his or herfinancial status to acquire credit. Not-received items (NRIs) also called postal intercepts occur when a card is stolenfrom the postal service before it reaches its owner s destination Lost/ Stolen Cards A card is lost/stolen when a legitimate account holder receives a card and loses it orsomeone steals the card for criminal purposes. This type of fraud is in essence the easiestway for a fraudster to get hold of other individual's credit cards without investment intechnology. It is also perhaps the hardest form of traditional credit card fraud to tackle Account Takeover This type of fraud occurs when a fraudster illegally obtains a valid customers personalinformation. The fraudster takes control of (takeover) a legitimate account by eitherproviding the customers account number or the card number. The fraudster then contactsthe card issuer, masquerading as the genuine cardholder, to ask that mail be redirectedto a new address. The fraudster reports card lost and asks for a replacement to be sent Fake and Counterfeit Cards The creation of counterfeit cards, together with lost / stolen cards poses highest threat incredit card frauds. Fraudsters are constantly finding new and more innovative ways tocreate counterfeit cards. Some of the techniques used for creating false and counterfeitcards are listed below: Erasing the magnetic strip: A fraudster can tamper an existing card that has been acquired illegally by erasing the metallic strip with a powerful electromagnet. The fraudster then tampers with the details on the card so that they match the details of a valid card, which they may have attained, e.g., from a stolen till roll. When the fraudster begins to use the card, the cashier will swipe the card through the terminal several times, before realizing that the metallic strip does not work. The cashier will then proceed to manually input the card details into the terminal. This form of fraud has high risk because the cashier will be looking at the card closely to read 1 Madhav Prasad Namdev, IJECS Volume 4 Issue 2 February, 2015 Page No Page 10368

3 the numbers. Doctored cards are, as with many of the traditional methods ofcredit card fraud, becoming an outdated method of illicit accumulation of either funds or goods. (ii) Creating a fake card: A fraudster can create a fake card from scratch usingsophisticated machines. This is the most common type of fraud though fake cardsrequire a lot of effort and skill to produce. Modern cards have many security featuresall designed to make it difficult for fraudsters to make good quality forgeries.holograms have been introduced in almost all credit cards and are very difficult toforge effectively. Embossing holograms onto the card itself is another problem for card forgers. (iii) Altering card details: A fraudster can alter cards by either re-embossing them byapplying heat and pressure to the information originally embossed on the card by alegitimate card manufacturer or by reencoding them using computer software that encodes the magnetic stripe data on the card. (iv) Skimming: Most cases of counterfeit fraud involve skimming, a process where genuine data on a card s magnetic stripe is electronically copied onto another. Skimming is fast emerging as the most popular form of credit card fraud. Employees/cashiers of business establishments have been found to carry pocket skimming devices, a battery-operated electronic magnetic stripe reader, with which they swipe customer's cards to get hold of customer s card details. The fraudster does this whilst the customer is waiting for the transaction to be validated through the card terminal. Skimming takes place unknown to the cardholder and is thus very difficult, if not impossible to trace. In other cases, the details obtained by skimming are used to carry out fraudulent card-not-present transactions by fraudsters. Often, the cardholder is unaware of the fraud until a statement arrives showing purchases they did not make. (v) White plastic: A white plastic is a card-size piece of plastic of any colour that afraudster creates and encodes with legitimate magnetic stripe data for illegal transactions. This card looks like a hotel room key but contains legitimate magnetic stripe data that fraudsters can use at POS terminals that do not require cardvalidation or verification (for example, petrol pumps and ATMs). 3. MERCHANT RELATED FRAUDS There are two types of frauds in this category Merchant Collusion This type of fraud occurs when merchant owners and/or their employees conspire tocommit fraud using their customers (cardholder) accounts and/or personal information.merchant owners and/or their employees pass on the information about cardholders tofraudsters Triangulation The fraudster in this type of fraud operates from a web site. Goods are offered at heavilydiscounted rates and are also shipped before payment. The fraudulent site appears to bea legitimate auction or a traditional sales site. The customer while placing orders onlineprovides information such as name, address and valid credit card details to the site. Oncefraudsters receive these details, they order goods from a legitimate site using stolencredit card details. The fraudster then goes on to purchase other goods using the creditcard numbers of the customer. This process is designed to cause a great deal of initialconfusion, and the fraudulent internet company in this manner can operate long enoughto accumulate vast amount of goods purchased with stolen credit card numbers. 4. INTERNET RELATED FRAUDS The Internet has provided an ideal ground for fraudsters to commit credit card fraud inan easy manner. Fraudsters have recently begun to operate on a truly transnational level. With the expansion of trans-border or 'global' social, economic and political spaces, the internet has become a New World market, capturing consumers from most countries around the world. The most commonly used techniques in internet fraud are described below Site cloning: Site cloning is where fraudsters clone an entire site or just the pages from which you place your order. Customers have no reason to believe they are not dealing with the company that they wished to purchase goods or services 1 Madhav Prasad Namdev, IJECS Volume 4 Issue 2 February, 2015 Page No Page 10369

4 from because the pages that they are viewing are identical to those of the real site. The cloned or spoofed site will receive these details and send the customer a receipt of the transaction via just as the real company would. The consumer suspects nothing, whilst the fraudsters have all the details they need to commit credit card fraud False merchant sites: These sites often offer the customer an extremely cheap service. The site requests a customer s complete credit card details such as name and address in return for access to the content of the site. Most of these sites claim to be free, but require a valid credit card number to verify an individual age. These sites are set up to accumulate as many credit card numbers as possible. The sites themselves never charge individuals for the services they provide. The sites are usually part of a larger criminal network that either uses the details it collects to raise revenues or sells valid credit card details to small fraudsters Credit card generators: Credit card number generators are computer programs thatgenerate valid credit card numbers and expiry dates. These generators work by generating lists of credit card account numbers from a single account number. The software works by using the mathematical Luhn algorithm that card issuers use to generate other valid card number combinations. The generators allow users to illegally generate as many numbers as the user desires, in the form of any of the credit card formats, whether it be American Express, Visa or MasterCard. 5. FRAUD PREVENTION TECHNOLOGIES While fraudsters are using sophisticated methods to gain access to credit cardinformation and perpetrate fraud, new technologies are available to help merchants todetect and prevent fraudulent transactions. Fraud detection technologies enablemerchants and banks to perform highly automated and sophisticated screenings ofincoming transactions and flagging suspicious transactions. The various fraud prevention techniques are discussed below: 5.1. Manual ReviewThis method consists of reviewing every transaction manually for signs of fraudulentactivity and involves a exceedingly high level of human intervention. This can prove to bevery expensive, as well as time consuming. Moreover, manual review is unable to detectsome of the more prevalent patterns of fraud, such as use of a single credit card multipletimes on multiple locations (physical or web sites) in a short span Address Verification SystemThis technique is applicable in card-not-present scenarios. Address Verification System(AVS) matches the first few digits of the street address and the ZIP code informationgiven for delivering/billing the purchase to the corresponding information on record withthe card issuers. A code representing the level of match between these addresses isreturned to the merchant. AVS is not much useful in case of international transactions Card Verification MethodsThe Card Verification Method3 (CVM) consists of a 3- or 4-digit numeric code printed onthe card but is not embossed on the card and is not available in the magnetic stripe. Themerchant can request the cardholder to provide this numeric code in case of card-not-present transaction and submit it with authorization. The purpose of CVM is to ensurethat the person submitting the transaction is in possession of the actual card, since thecode cannot be copied from receipts or skimmed from magnetic stripe. Although CVMprovides some protection for the merchant, it doesn t protect them from transactionsplaced on physically stolen cards. Furthermore, fraudsters who have temporarypossession of a card could, in principle, read and copy the CVM code Negative and Positive ListsA negative list is a database used to identify high-risk transactions based on specific datafields. An example of a negative list would be a file containing all the card numbers thathave produced chargebacks in the past, used to avoid further fraud from repeatoffenders. Similarly a merchant can build negative lists based on billing names, streetaddresses, s and internet protocols (IPs) that have resulted in fraud or attemptedfraud, effectively blocking any further attempts. A merchant/acquirer could create andmaintain a list of high-risk countries and decide to review or restrict orders originatingfrom those countries. Positive files are typically used to recognize trusted customers, perhaps by their cardnumber or address, and therefore bypass certain checks. Positive files represent animportant tool to prevent unnecessary delays in processing valid orders Payer AuthenticationPayer authentication is an emerging technology that promises to bring in a new level ofsecurity to business-to-consumer internet commerce. The first 1 Madhav Prasad Namdev, IJECS Volume 4 Issue 2 February, 2015 Page No Page 10370

5 implementation of thistype of service is the Verified by Visa (VbV) or Visa Payer Authentication Service (VPAS)program, launched worldwide by Visa in The program is based on a PersonalIdentification Number (PIN) associated with the card, similar to those used with ATMcards, and a secure direct authentication channel between the consumer and the issuingbank. The PIN is issued by the bank when the cardholder enrolls the card with theprogram and will be used exclusively to authorize online transactions. can beovercome to some extent by prioritising the rules and fixing limits on number of filteredtransactions Risk Scoring TechnologiesRisk scoring tools are based on statistical models designed to recognize fraudulenttransactions, based on a number of indicators derived from the transactioncharacteristics. Typically, these tools generate a numeric score indicating the likelihood ofa transaction being fraudulent: the higher the score, the more suspicious the order Lockout MechanismAutomatic card number generators represent one of the new technological toolsfrequently utilized by fraudsters. These programs, easily downloadable from the Web, areable to generate thousands of valid credit card numbers. The traits of frauds initiated bya card number generator are the following: Multiple transactions with similar card numbers (e.g. same Bank Identification Number (BIN)) A large number of declines 5.7. Fraudulent MerchantsBoth MasterCard and Visa publish a list of merchants who have been known for beinginvolved in fraudulent transactions in the past. These lists (NMAS - from Visa and MATCH- from MasterCard) could provide useful information to acquirers right at the time ofmerchant recruitment preventing potential fraudulent transactions. 6. DEVELOPMENT IN FRAUD MANAGEMENT The technology for detecting credit card frauds is advancing at a rapid pace rules basedsystems, neural networks, chip cards and biometrics are some of the popular techniquesemployed by Issuing and Acquiring banks these days Simple Rule SystemFraud rules enable to automate the screening processes leveraging the knowledge gainedover time regarding the characteristics of both fraudulent and legitimate transactions.typically, the effectiveness of a rule-based system will increase over time, as more rulesare added to the system. It should be clear, however, that ultimately the effectiveness ofthe system depends on the knowledge and expertise of the person designing the rules.the disadvantage of this solution is that it can increase the probability of throwing manyvalid transactions as exceptions, however, there are ways by which this limitation 6.3.Neural Network TechnologiesA neural network is a computerized system that sorts data logically by performing the following tasks: Identifies cardholder s buying and fraudulent activity patterns. Processes data by trial and elimination (excluding data that is not relevant to the pattern). Finds relationships in the patterns and current transaction data. The advantages neural networks offer over other techniques are that these models areable to learn from the past and thus, improve results as time passes. They can alsoextract rules and predict future activity based on the current situation. By employingneural networks effectively, banks can detect fraudulent use of a card, faster and moreefficiently. 6.4.Biometrics is the name given to a fraud prevention technique that records a uniquecharacteristic of the cardholder like, a fingerprint or how he/she sign his/her name, so that it can be read by a computer. The computer can then compare the storedcharacteristic with that of the person presenting the card to make sure that the rightperson has the right card. There are many types of biometrics systems under development such as finger printverification, hand based verification, retinal and iris scanning and dynamic signatureverification. 6.5.Smart cardsto define in the simplest terms, a smart card is a credit card with some intelligence in theform of an embedded CPU. This card-computer can be programmed to perform tasks andstore information, but the intelligence is limited meaning that the smart card's powerfalls far short of a desktop computer. 7.Our Objectives The purpose of this thesis is to study: 1 Madhav Prasad Namdev, IJECS Volume 4 Issue 2 February, 2015 Page No Page 10371

6 State of the credit card industry, Different types of frauds, How fraudsters attempt to take advantage of loopholes, Impact of credit card fraud on card holders, merchants, issuers, How a comprehensive fraud detection system could help maintain the cost of detecting fraud, and Losses due to fraud, i.e., the total cost of fraud, under manageable levels. While the focus of the document will be mostly on Visa and MasterCard type transactions, the concepts and ideas generally prove valid with other credit cards such as American Express and Discover also. 7.1 Informal Explanation of Luhn Algorithm The formula generates a check digit, which is usually appended to a partial account number to generate the full account number. This account number must pass the following algorithm (and the check digit chosen and placed so that the full account number will)starting with the second to last digit and moving left, double the value of all the alternating digits. For any digits that thus become 10 or more, add their digits together. For example, 1111 becomes 2121, while 8763 becomes 7733 (from (1+6)7(1+2)3). Add all these digits together. For example, 1111 becomes 2121, then is 6; while 8763 becomes 7733, then is 20. although this requires a simple modification to the algorithm to determine an ending check digit given the rest of the account number. Algorithm The algorithm proceeds in three steps. Firstly, every second digit, beginning with the next-to-rightmost and proceeding to the left, is doubled. If that result is greater than nine, its digits are summed (which is equivalent, for any number in the range 10 though 18, of subtracting 9 from it). Thus, a 2 becomes 4 and a 7 becomes 5. Secondly, all the digits are summed. Finally, the result is divided by 10. If the remainder is zero, the original number is valid. The following is wikicode, a proposed pseudocode for use in many articles. function checkluhn(string purportedcc) { int sum := 0 int ndigits := length(purported CC) int parity := ndigits modulus 2 for I from 0 to ndigits - 1 { int digit := integer(purportedcc[i]) if I modulus 2 = parity digit := digit 2 if digit > 9 digit := digit - 9 sum := sum + digit } return (sum modulus 10) = 0 If the total ends in 0 (put another way, if the total modulus 10 } is 0), then the number is valid according to the LUHN formula, else it is not valid. So, 1111 is not valid (as shown above, it 8. K-MEAN CLUSTERING TECHNIQUE comes out to 6), while 8763 is valid (as shown above, it comes The following algorithm makes k-means more efficient by out to 20). removing the first limitation i.e. it limits the number of In the two examples above, if a check digit was to be added to computations to some extent. The idea makes k-means more the front of these numbers, then 4 might be added to 1111 to efficient, especially for dataset containing large number of make 41111, while 0 would be added to 8763 to make It clusters. Since, in each iteration, the k-means algorithm is usually the case that check digits are added to the end, computes the distances between data point and all canters, this 1 Madhav Prasad Namdev, IJECS Volume 4 Issue 2 February, 2015 Page No Page 10372

7 is computationally very expensive especially for huge datasets. Therefore, we do can benefit from previous iteration of k- means algorithm. For each data point, we can keep the distance to the nearest cluster. At the next iteration, we compute the distance to the previous nearest cluster. If the new distance is less than or equal to the previous distance, the point stays in its cluster, and there is no need to compute its distances to the other cluster centres. This saves the time required to compute distances to k 1 cluster centres. Following fig. explains the idea. When we examine Fig. 8 (b), in Clusters 1, 2 we note that, the most points become closer to their new centre, only one point in Cluster 1, and 2 points in Cluster 2 will be redistributed (their distances to all cancroids must be computed), and the final clusters are presented in Fig. 8 (c). Based on this idea, the proposed algorithm saves a lot of time. In the proposed method, we write two functions. The first function is the basic function of the k-means algorithm, that finds the nearest centre for each data point, by computing the distances to the k centres, and for each data point keeps its distance to the nearest centre. 8.1Algorithm- An Efficient Enhanced k-mean Clustering Algorithm Function distance() //assign each point to its nearest cluster 1. For i = 1 to n 2. For j = 1 to k 3. Compute squared Euclidean distance d 2 (xi, my); 4.end for 5. Find the closest centredmyto xi; 6.mj = mj+xi; nj = nj+1; Figure 8 (a) : Initial Cancroids to a dataset cancroids Figure 8 (b) : Recalculating the position of the 7. MSE = MSE + d 2 (xi, mj); 8.Clustered[I] = number of the closest centred; 9. Point is[i] = Euclidean distance to the closest centred; 10. endfor 11. For j = 1 to k 12. mj = mj/nj; 13.end for V. CONCLUSION Figure 8 (c) : Final position of the Cancroids As card business transactions increase, so too do frauds. Clearly, global networkingpresents as many new opportunities for criminals as it does for businesses. While offeringnumerous 1 Madhav Prasad Namdev, IJECS Volume 4 Issue 2 February, 2015 Page No Page 10373

8 advantages and opening up new channels for transaction business, theinternet has also brought in increased probability of fraud in credit card transactions.the good news is that technology for preventing credit card frauds is also improvingmany folds with passage of time. Reducing cost of computing is helping in introducingcomplex systems, which can analyse a fraudulent transaction in a matter of fraction of asecond. It is equally important to identify the right segment of transactions, which should besubject to review, as every transaction does not have the same amount of risk associatedwith it. Finding the optimally balanced total cost of fraud and other measures outlined inthis article can assist acquiring and issuing banks in combating frauds more efficiently. REFERENCES [1] Duncan M D G The Future Threat of Credit Card Crime, RCMP Gazette, 57 (10): [2] P Chan, W Fan, A Prodromidis & S Stolfo Distributed data mining in credit card fraud detection, IEEE Intelligent Systems, 14(6): [ Fraud Prevention Reference Guide, Anonymous, Certegy, September [4] Bill Rini White Paper on Controlling Online Credit Card Fraud, Window Six, January [5] Austin Jay Harris & David C Yen Biometric Authentication- Assuring access to Information,Information Management & Computer Security, 10(1): [6] Maguire S Identifying Risks During Information System Development: Managing theprocess, Information Management & Computer Security, 10(3): [7] Card Fraud Facts 2002, APACS (Administration) Ltd, Association for Payment ClearingServices (APACS), April [8]Neural Network Basics Datasheet, IBEX Process Technology Inc,july 2002, [9]ClearCommerce Fraud Prevention Guide, ClearCommerce Product Management,ClearCommerce Corporation, August [10] White Paper on Efficient Risk Management for Online Retail, ClearCommerce ProductManagement, Clear Commerce Corporation, September [11] Van Leuven A Surge in Credit Card Fraud, H. Financial Review, 24 September, p.49. [12] Online Fraud Report Online Credit Card Fraud Trends and Merchant s Response, Mind wareresearch Group, Cyber Source. 1 Madhav Prasad Namdev, IJECS Volume 4 Issue 2 February, 2015 Page No Page 10374

Understanding Credit Card Frauds

Understanding Credit Card Frauds Cards Business Review#2003 01 Understanding Credit Card Frauds Tej Paul Bhatla, Vikram Prabhu & Amit Dua June 2003 Tata Consultancy Services 2002. All rights reserved. CONTENTS OVERVIEW...1 INTRODUCTION...1

More information

Credit Card Fraud Detection using Hidden Morkov Model and Neural Networks

Credit Card Fraud Detection using Hidden Morkov Model and Neural Networks Credit Card Fraud Detection using Hidden Morkov Model and Neural Networks R.RAJAMANI Assistant Professor, Department of Computer Science, PSG College of Arts & Science, Coimbatore. Email: rajamani_devadoss@yahoo.co.in

More information

A Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business

A Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business A Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business Nucharee Premchaiswadi*, James G. Williams** and Wichian Premchaiswadi*** *Faculty of Information Technology Dhurakij

More information

Merchant Guide to the Visa Address Verification Service

Merchant Guide to the Visa Address Verification Service Merchant Guide to the Visa Address Verification Service Merchant Guide to the Visa Address Verification Service TABLE OF CONTENTS Table of Contents Merchant Guide to the Visa Address Verification Service

More information

CREDIT CARD FRAUDS AND MEASURES TO DETECT AND PREVENT THEM

CREDIT CARD FRAUDS AND MEASURES TO DETECT AND PREVENT THEM CREDIT CARD FRAUDS AND MEASURES TO DETECT AND PREVENT THEM MR.K.KATHIRVEL ASSISTANT PROFESSOR IN COMMERCE, KONGUNADU ARTS AND SCIENCE COLLEGE, COIMBATORE, TAMIL NADU, INDIA. ABSTRACT Growth in the electronic

More information

Acceptance to Minimize Fraud

Acceptance to Minimize Fraud Best Practices for Credit Card Acceptance to Minimize Fraud By implementing best practices in credit card processing, you decrease the likelihood of fraudulent transactions and chargebacks. In general,

More information

Mitigating Fraud Risk Through Card Data Verification

Mitigating Fraud Risk Through Card Data Verification Risk Management Best Practices 11 September 2014 Mitigating Fraud Risk Through Card Data Verification AP, Canada, CEMEA, LAC, U.S. Issuers, Processors With a number of cardholder payment options (e.g.,

More information

A multi-layered approach to payment card security.

A multi-layered approach to payment card security. A multi-layered approach to payment card security. CARD-NOT-PRESENT 1 A recent research study revealed that Visa cards are the most widely used payment method at Canadian websites, on the phone, or through

More information

PROTECT YOUR BUSINESS FROM LOSSES WHILE ACCEPTING CREDIT CARDS

PROTECT YOUR BUSINESS FROM LOSSES WHILE ACCEPTING CREDIT CARDS PROTECT YOUR BUSINESS FROM LOSSES WHILE ACCEPTING CREDIT CARDS TABLE OF CONTENTS Introduction...1 Preventing Fraud in a Card-Present Environment...2 How to Reduce Chargebacks in a Card-Present Environment...4

More information

Avoiding Fraud. Learn to recognize the warning signs for fraud and follow these card acceptance guidelines to reduce your risk.

Avoiding Fraud. Learn to recognize the warning signs for fraud and follow these card acceptance guidelines to reduce your risk. Avoiding Fraud Learn to recognize the warning signs for fraud and follow these card acceptance guidelines to reduce your risk. Intoduction Fraud comes in many forms and hurts merchants of all sizes. Whether

More information

Soft Computing Tools in Credit card fraud & Detection Rashmi G.Dukhi G.H.Raisoni Institute of Information & Technology, Nagpur rashmidukhi25@gmail.

Soft Computing Tools in Credit card fraud & Detection Rashmi G.Dukhi G.H.Raisoni Institute of Information & Technology, Nagpur rashmidukhi25@gmail. Soft Computing Tools in Credit card fraud & Detection Rashmi G.Dukhi G.H.Raisoni Institute of Information & Technology, Nagpur rashmidukhi25@gmail.com Abstract Fraud is one of the major ethical issues

More information

EMV and Small Merchants:

EMV and Small Merchants: September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service

More information

EMV EMV TABLE OF CONTENTS

EMV EMV TABLE OF CONTENTS 2 TABLE OF CONTENTS Intro... 2 Are You Ready?... 3 What Is?... 4 Why?... 5 What Does Mean To Your Business?... 6 Checklist... 8 3 U.S. Merchants 60% are expected to convert to -enabled devices by 2015.

More information

Card Not Present Fraud Webinar Transcript

Card Not Present Fraud Webinar Transcript Card Not Present Fraud Webinar Transcript All right let s go ahead and get things started, and to do that, I d like to turn it over to Fae Ghormley. Fae? Thank you for giving us this opportunity to share

More information

CREDIT CARD PROCESSING GLOSSARY OF TERMS

CREDIT CARD PROCESSING GLOSSARY OF TERMS CREDIT CARD PROCESSING GLOSSARY OF TERMS 3DES A highly secure encryption system that encrypts data 3 times, using 3 64-bit keys, for an overall encryption key length of 192 bits. Also called triple DES.

More information

RSA Adaptive Authentication For ecommerce

RSA Adaptive Authentication For ecommerce RSA Adaptive Authentication For ecommerce Risk-based 3D Secure for Credit Card Issuers SOLUTION BRIEF RSA FRAUD & RISK INTELLIGENCE The Threat of ecommerce Fraud ecommerce fraud is a threat to both issuers

More information

What Merchants Need to Know About EMV

What Merchants Need to Know About EMV Effective November 1, 2014 1. What is EMV? EMV is the global standard for card present payment processing technology and it s coming to the U.S. EMV uses an embedded chip in the card that holds all the

More information

Visa Debit processing. For ecommerce and telephone order merchants

Visa Debit processing. For ecommerce and telephone order merchants Visa Debit processing For ecommerce and telephone order merchants Table of contents About this guide 3 General procedures 3 Authorization best practices 3 Status check transactions 4 Authorization reversals

More information

Frequently Asked Questions (FAQ) on HSBC Chip Credit Cards

Frequently Asked Questions (FAQ) on HSBC Chip Credit Cards Frequently Asked Questions (FAQ) on HSBC Chip Credit Cards Cards issued by The HongKong and Shanghai Banking Corporation Limited, India (HSBC) 1. What is EMV Chip Card? EMV (Europay MasterCard Visa) is

More information

CRM4M Accounting Set Up and Miscellaneous Accounting Guide Rev. 10/17/2008 rb

CRM4M Accounting Set Up and Miscellaneous Accounting Guide Rev. 10/17/2008 rb CRM4M Accounting Set Up and Miscellaneous Accounting Guide Rev. 10/17/2008 rb Topic Page Chart of Accounts 3 Creating a Batch Manually 8 Closing a Batch Manually 11 Cancellation Fees 17 Check Refunds 19

More information

Fraud Management in the Credit Card Industry 1

Fraud Management in the Credit Card Industry 1 Fraud Management in the Credit Card Industry 1 Peter Burns Anne Stanley April 2002 Summary: On November 16, 2001, the Payment Cards Center of the Federal Reserve Bank of Philadelphia sponsored a workshop

More information

AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA

AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA Australian Payments Clearing Association AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA 214 Australian Payments Clearing Association Limited ABN 12 55 136 519 CONTENTS OVERVIEW 1 SECTION 1 Fraud rates 4 SECTION

More information

The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online.

The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online. 1 February 2010 Volume 2, Issue 1 The Merchant Serving Florida State University s Payment Card Community Individual Highlights: Skimming Scam 1 Skimming at Work 2 Safe at Home 3 Read your Statement 4 Useful

More information

Cost-management strategies. Your guide to accepting card payments cost-effectively

Cost-management strategies. Your guide to accepting card payments cost-effectively Cost-management strategies Your guide to accepting card payments cost-effectively Table of Contents Guidance from Wells Fargo Merchant Services...3 The secret to better interchange rates...4 Why interchange

More information

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit

More information

Understand the Business Impact of EMV Chip Cards

Understand the Business Impact of EMV Chip Cards Understand the Business Impact of EMV Chip Cards 3 What About Mail/Telephone Order and ecommerce? 3 What Is EMV 3 How Chip Cards Work 3 Contactless Technology 4 Background: Behind the Curve 4 Liability

More information

Guide to credit card security

Guide to credit card security Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely

More information

Why Data Security is Critical to Your Brand

Why Data Security is Critical to Your Brand Why Data Security is Critical to Your Brand Why security is critical to your brand Cybercriminals do not discriminate based on industry or business size. Security is expensive. At least, it is if you wait

More information

FAQ on EMV Chip Debit Card and Online Usage

FAQ on EMV Chip Debit Card and Online Usage FAQ on EMV Chip Debit Card and Online Usage Security enhancement on HSBC India Debit Card A Secure Debit Card HSBC India Debit Cards are more secure and enabled with the Chip and PIN technology? You can

More information

Figure 1: Attacker home-made terminal can read some data from your payment card in your pocket

Figure 1: Attacker home-made terminal can read some data from your payment card in your pocket A Touchy Subject There are increasingly frequent claims that contactless smart payment cards are insecure because they can be read while in your wallet or pocket. Can this really be true? And if so, is

More information

Sending money abroad. Plain text guide

Sending money abroad. Plain text guide Sending money abroad Plain text guide Contents Introduction 2 Ways to make international payments 3 Commonly asked questions 5 What is the cost to me of sending money abroad? 5 What is the cost to the

More information

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved

More information

Security enhancement on HSBC India Debit Card

Security enhancement on HSBC India Debit Card Security enhancement on HSBC India Debit Card A Secure Debit Card HSBC India Debit Cards are more secure and enabled with the Chip and PIN technology. In addition to this you can restrict usage of the

More information

Fraud Prevention and Program Security Gord Jamieson Director Risk Management & Security Visa Canada Association

Fraud Prevention and Program Security Gord Jamieson Director Risk Management & Security Visa Canada Association Fraud Prevention and Program Security Gord Jamieson Director Risk Management & Security Visa Canada Association Evolution of Risk Management Controls Presentation text goes here. Presentation text goes

More information

The Comprehensive, Yet Concise Guide to Credit Card Processing

The Comprehensive, Yet Concise Guide to Credit Card Processing The Comprehensive, Yet Concise Guide to Credit Card Processing Written by David Rodwell CreditCardProcessing.net Terms of Use This ebook was created to provide educational information regarding payment

More information

Flaws & Frauds Hindering Credit Cards Security

Flaws & Frauds Hindering Credit Cards Security Flaws & Frauds Hindering Credit Cards Security Abhishek Maheshwari #1, S.K. Saritha *2 # Department of Computer Science & Engineering, Maulana Azad National Institute of Technology Bhopal, Madhya Pradesh,

More information

How to Help Prevent Fraud

How to Help Prevent Fraud TD Canada Trust How to Help Prevent Fraud Merchant Services tips to help protect your business Fraud Awareness All credit cards issued in Canada are designed with special security features to help deter

More information

Data Mining Application for Cyber Credit-card Fraud Detection System

Data Mining Application for Cyber Credit-card Fraud Detection System , July 3-5, 2013, London, U.K. Data Mining Application for Cyber Credit-card Fraud Detection System John Akhilomen Abstract: Since the evolution of the internet, many small and large companies have moved

More information

How To Spot & Prevent Fraudulent Credit Card Activity

How To Spot & Prevent Fraudulent Credit Card Activity Datalink Bankcard Services How To Spot & Prevent Fraudulent Credit Card Activity White Paper 2013 According to statistics from the U.S. Department of Justice and the Consumer Sentinel Network, credit card

More information

Merchant Services. How to help protect your business

Merchant Services. How to help protect your business Please immediately report any suspicious activity involving credit card or debit card use to TD Merchant Services at 1-800-6-116 For more information, visit www.tdmerchantservices.com Merchant Services

More information

Mitigating Fraudulent CNP Transactions

Mitigating Fraudulent CNP Transactions Examination of Safeguards Electronic commerce has become a wildly successful channel for merchants and their customers. While the ability to shop online or through mail order catalogs is not new, the explosion

More information

How To Understand The Benefits Of It/Is

How To Understand The Benefits Of It/Is THE ROLE OF IT/IS IN COMBATING FRAUD IN THE PAYMENT CARD INDUSTRY Jan Devos, Ghent University Association, Howest Kortrijk, Belgium Igor Pipan, Ss. Cyril and Methodius University in Skopje, Macedonia Abstract

More information

Fraud Prevention Guide

Fraud Prevention Guide W h i t e P a p e r Fraud Prevention Guide Abstract This Fraud Prevention Guide provides guidelines for online merchants on how to design and implement a best practice risk management process and in particular

More information

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud A CHASE PAYMENTECH WHITE PAPER Expanding internationally: Strategies to combat online fraud Fraud impacts nearly eight in every ten international online retailers 1. It hampers prospects for growth, restricts

More information

Merchant Business Solutions. Protecting business against credit card fraud.

Merchant Business Solutions. Protecting business against credit card fraud. Merchant Business Solutions. Protecting business against credit card fraud. Version 4.0 May 2011 Contents Protect your business 3 Authorisation 4 Chargebacks 5 Verification of Purchaser 6 Types of goods

More information

card not present fraud solutions

card not present fraud solutions how can you reduce risk when the Card is not present? card not present fraud solutions you can gain the advantage American Express offers strategies and tools to help mitigate fraud and potential chargebacks.

More information

Payments Transformation - EMV comes to the US

Payments Transformation - EMV comes to the US Accenture Payment Services Payments Transformation - EMV comes to the US In 1993 Visa, MasterCard and Europay (EMV) came together and formed EMVCo 1 to tackle the global challenge of combatting fraudulent

More information

Fraud Minimisation Guide ANZ Merchant Business Solutions

Fraud Minimisation Guide ANZ Merchant Business Solutions Fraud Minimisation Guide ANZ Merchant Business Solutions INTRODUCTION Fraud can occur in and is a risk for any business that accepts credit cards and it can have a significant financial impact on your

More information

Steps for staying PCI DSS compliant Visa Account Information Security Guide October 2009

Steps for staying PCI DSS compliant Visa Account Information Security Guide October 2009 Steps for staying PCI DSS compliant Visa Account Information Security Guide October 2009 The guide describes how you can make sure your business does not store sensitive cardholder data Contents 1 Contents

More information

Credit Card Fraud: Bang in E-Commerce

Credit Card Fraud: Bang in E-Commerce Credit Card Fraud: Bang in E-Commerce Khyati Chaudhary 1 Bhawna Mallick 2 1, 2 Galgotias College of Engg. & Technology, Greater Noida Abstract Recent decades have seen a gigantic expansion in the use of

More information

Market Intelligence Cell. Fighting Financial Crime

Market Intelligence Cell. Fighting Financial Crime Market Intelligence Cell Fighting Financial Crime 1 Market Intelligence Cell Our objective To investigate and suppress illegal, dishonorable and improper practices, market abuse and any potential breach

More information

Chargeback Reason Code List - U.S.

Chargeback Reason Code List - U.S. AL Airline Transaction Dispute AP Automatic Payment AW Altered Amount CA Cash Advance Dispute CD Credit Posted as Card Sale CR Cancelled Reservation This chargeback occurs because of a dispute on an Airline

More information

TOP TRUMPS Comparisons of how to pay for goods and services online

TOP TRUMPS Comparisons of how to pay for goods and services online Cash Cash is legal tender in the form of bank notes and coins Small value purchases e.g. cafes, shops Pocket money Repaying friends Cash is physically transferred from one person to the next, usually face-to-face

More information

Best Practices for Internet Merchants

Best Practices for Internet Merchants Best Practices for Internet Merchants The following best practices, taken from various experts, are offered to help you avoid being victimized by Internet fraud. Experience suggests that there are certain

More information

EMV in Hotels Observations and Considerations

EMV in Hotels Observations and Considerations EMV in Hotels Observations and Considerations Just in: EMV in the Mail Customer Education: Credit Card companies have already started customer training for the new smart cards. 1 Questions to be Answered

More information

360 Federal Credit Union Reloadable Prepaid Card Terms and Conditions

360 Federal Credit Union Reloadable Prepaid Card Terms and Conditions 360 Federal Credit Union Reloadable Prepaid Card Terms and Conditions These are your Prepaid Card Terms and Conditions: "Agreement" means these Visa Prepaid Card Terms and Conditions. "We" "us" and "our"

More information

Fraud Detection in Credit Card Transactions: Classification, Risks and Prevention Techniques

Fraud Detection in Credit Card Transactions: Classification, Risks and Prevention Techniques Fraud Detection in Credit Card Transactions: Classification, Risks and Prevention Techniques N.Sivakumar #1, Dr.R.Balasubramanian *2 #1 Research Scholar, *2 Research Supervisor, PG and Research Department

More information

Credit Card PIN & PAY Frequently Asked Questions (FAQ)

Credit Card PIN & PAY Frequently Asked Questions (FAQ) Credit Card PIN & PAY Frequently Asked Questions (FAQ) 1. What is a PIN & PAY card? PIN & PAY card is a PIN - enabled card that allows you to make purchase by keying in a 6-digit PIN, with no signature

More information

Card Acceptance Best Practices Playing it Safe at the Point of Sale

Card Acceptance Best Practices Playing it Safe at the Point of Sale White Paper Card Acceptance Best Practices Playing it Safe at the Point of Sale Fraudulent activity costs U.S. businesses billions. And that is just lost revenue. When you consider the associated damage

More information

White paper. Biometrics and the mitigation of card-related fraud

White paper. Biometrics and the mitigation of card-related fraud White paper Biometrics and the mitigation of card-related fraud The Aadhaar scheme, primarily envisaged to provide every resident proof of identity, holds a great deal of promise for other applications

More information

BWA Merchant Services. Credit Card Fraud Protection User Guide

BWA Merchant Services. Credit Card Fraud Protection User Guide 1 BWA Merchant Services Credit Card Fraud Protection User Guide 2 Contents: 1. How to reduce the risk of card present fraud... 3 2. How to reduce the risk of card not present fraud... 5 3. Delivering the

More information

PayPoint.net Gateway Guide to Identifying Fraud Risks

PayPoint.net Gateway Guide to Identifying Fraud Risks PayPoint.net Gateway Guide to Identifying Fraud Risks Copyright PayPoint.net 2010 This document contains the proprietary information of PayPoint.net and may not be reproduced in any form or disclosed to

More information

Yes, your card will expire at a given date, which is printed on the front of your card.

Yes, your card will expire at a given date, which is printed on the front of your card. What is the Debenhams Prepaid Card? Debenhams Prepaid Card works in a similar way to a pay as you go mobile phone. You top up what you need, when you need it. You top the card up with money which can be

More information

A Brand New Checkout Experience

A Brand New Checkout Experience A Brand New Checkout Experience EMV Transformation EMV technology is transforming the U.S. payment industry, bringing a whole new experience to the checkout counter. Introduction What is EMV? It s 3 small

More information

A Brand New Checkout Experience

A Brand New Checkout Experience A Brand New Checkout Experience EMV Transformation EMV technology is transforming the U.S. payment industry, bringing a whole new experience to the checkout counter. Introduction What is EMV? It s 3 small

More information

Credit/Debit Card Processing Requirements and Best Practices. Adele Honeyman Oregon State Treasury Training Specialist

Credit/Debit Card Processing Requirements and Best Practices. Adele Honeyman Oregon State Treasury Training Specialist Credit/Debit Card Processing Requirements and Best Practices Adele Honeyman Oregon State Treasury Training Specialist 1 What? What do I need to know about excepting credit cards? Who s involved, how it

More information

Visa Student Card Terms and Conditions. These are your Student Card Terms and Conditions.

Visa Student Card Terms and Conditions. These are your Student Card Terms and Conditions. Visa Student Card Terms and Conditions These are your Student Card Terms and Conditions. "Agreement" means these Visa Student Card Terms and Conditions. "We" "us" and "our" refer to Bank-Fund Staff Federal

More information

The need for a secure & trusted payment instrument in e-commerce. Ali AlMeshal

The need for a secure & trusted payment instrument in e-commerce. Ali AlMeshal The need for a secure & trusted payment instrument in e-commerce Ali AlMeshal In Physical/Real World Hand over card Visual check Swipe in POS Online authorization Receipt with signature panel Sign or Pin

More information

Financial Transactions and Fraud Schemes

Financial Transactions and Fraud Schemes Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements Fraudulent Disbursement Schemes Register disbursement schemes Check tampering schemes Payroll schemes Billing schemes

More information

Catching Fraudsters In Real Time

Catching Fraudsters In Real Time Catching Fraudsters In Real Time Aaron Tietz aaron.tietz@tufts.edu Mentor: Ming Chow Abstract Unlike physical store retailers, e-retailers are responsible to repay customers for money lost due to fraudulent

More information

Global Bank Achieves Significant Savings and Increased Transaction Volume with Zero-Touch Authentication

Global Bank Achieves Significant Savings and Increased Transaction Volume with Zero-Touch Authentication CUSTOMER SUCCESS STORY JULY 2015 Global Bank Achieves Significant Savings and Increased Transaction Volume with Zero-Touch Authentication CLIENT PROFILE Company: Global Bank Industry: Financial Services

More information

Credit Card Acceptance & Chargeback Prevention

Credit Card Acceptance & Chargeback Prevention Credit Card Acceptance & Chargeback Prevention Tips for Travel Agents July 2010 About this Guidebook... 3 Credit Card Acceptance... 4 Fraud Prevention Tips... 7 Credit Card Chargebacks Tips...11 Payment

More information

The 7 th Balkan Conference on Operational Research BACOR 05 Constanta, May 2005, Romania REDUCING FRAUD IN ELECTRONIC PAYMENT SYSTEMS

The 7 th Balkan Conference on Operational Research BACOR 05 Constanta, May 2005, Romania REDUCING FRAUD IN ELECTRONIC PAYMENT SYSTEMS The 7 th Balkan Conference on Operational Research BACOR 05 Constanta, May 2005, Romania REDUCING FRAUD IN ELECTRONIC PAYMENT SYSTEMS DEJAN SIMIÃ University of Belgrade, Faculty of Organizational Sciences,

More information

EMV's Role in reducing Payment Risks: a Multi-Layered Approach

EMV's Role in reducing Payment Risks: a Multi-Layered Approach EMV's Role in reducing Payment Risks: a Multi-Layered Approach April 24, 2013 Agenda EMV Rationale Why is this worth the effort? Guides how we implement it EMV Vulnerability at the POS EMV Impact on CNP

More information

ING Vysya Bank Forex Travel Card is a pre-paid foreign currency chip card that offers you a safe, secure and

ING Vysya Bank Forex Travel Card is a pre-paid foreign currency chip card that offers you a safe, secure and Forex Travel Card FAQs: What is ING Vysya Bank Forex Travel Card? ING Vysya Bank Forex Travel Card is a pre-paid foreign currency chip card that offers you a safe, secure and convenient way to meet all

More information

Clark Brands Payment Methods Manual. First Data Locations

Clark Brands Payment Methods Manual. First Data Locations Clark Brands Payment Methods Manual First Data Locations Table of Contents Introduction... 3 Valid Card Types... 3 Authorization Numbers, Merchant ID Numbers and Request for Copy Fax Numbers... 4 Other

More information

Arab Bank Cards User Guide

Arab Bank Cards User Guide Arab Bank Cards User Guide 4600900 arabbank.jo A card to suit every lifestyle Coming to you from the largest Arab banking network, Arab Bank Cards entitle you to a host of benefits designed to offer you

More information

Consumer FAQs. 1. Who is behind the BuySafe initiative? 2. Why should I use a PIN? 3. Do all transactions need a PIN?

Consumer FAQs. 1. Who is behind the BuySafe initiative? 2. Why should I use a PIN? 3. Do all transactions need a PIN? Consumer FAQs 1. Who is behind the BuySafe initiative? The Industry Security Initiative (ISI)/BuySafe initiative comprises representatives of ten Australian financial institutions including all of the

More information

LOST, STOLEN OR SKIMMED

LOST, STOLEN OR SKIMMED LOST, STOLEN OR SKIMMED Overcoming credit card fraud in South Africa Trevor Budhram* budhrt@unisa.ac.za A credit card is a convenient method of payment, but it does carry risks. The enormous growth in

More information

Credit card: permits consumers to purchase items while deferring payment

Credit card: permits consumers to purchase items while deferring payment General Payment Systems Cash: portable, no authentication, instant purchasing power, allows for micropayments, no transaction fee for using it, anonymous But Easily stolen, no float time, can t easily

More information

Smart Cards for Payment Systems

Smart Cards for Payment Systems White Paper Smart Cards for Payment Systems An Introductory Paper describing how Thales e-security can help banks migrate to Smart Card Technology Background In this paper: Background 1 The Solution 2

More information

Electronic Commerce and E-wallet

Electronic Commerce and E-wallet International Journal of Recent Research and Review, Vol. I, March 2012 Electronic Commerce and E-wallet Abhay Upadhayaya Department of ABST,University of Rajasthan,Jaipur, India Email: abhayu@rediffmail.com

More information

Merchant Account Glossary of Terms

Merchant Account Glossary of Terms Merchant Account Glossary of Terms From offshore merchant accounts to the truth behind free merchant accounts, get answers to some of the most common and frequently asked questions. If you cannot find

More information

OpenEdge Research & Development Group April 2015

OpenEdge Research & Development Group April 2015 2015: Security, Merchant Readiness & the Coming Liability Shift OpenEdge Research & Development Group April 2015 solutions@openedgepay.com openedgepay.com 2015: Security, Merchant Table of Contents The

More information

Be*PINWISE Cardholder FAQs

Be*PINWISE Cardholder FAQs Be*PINWISE Cardholder FAQs 1. Who is behind the BuySafe initiative? The Industry Security Initiative (ISI)/BuySafe initiative comprises representatives of ten Australian financial institutions including

More information

Your Single Source. for credit, debit and pre-paid services. Fraud Risk and Mitigation

Your Single Source. for credit, debit and pre-paid services. Fraud Risk and Mitigation Your Single Source for credit, debit and pre-paid services Fraud Risk and Mitigation Agenda Types of Fraud Fraud Identification Notifications Next Steps 11/8/2013 2 Types of Fraud Lost and Stolen Cards

More information

Understanding and Combating Online Fraud in 2014

Understanding and Combating Online Fraud in 2014 Understanding and Combating Online Fraud in 2014 Fraud is pervasive online and high-risk merchants must be vigilant in employing a multi-layered, comprehensive approach to security and risk management.

More information

welcome to liber8:payment

welcome to liber8:payment liber8:payment welcome to liber8:payment Our self-service kiosks free up staff time and improve the overall patron experience. liber8:payment further enhances these benefits by providing the convenience

More information

Fraud Prevention Issuer s Best Practice Guide

Fraud Prevention Issuer s Best Practice Guide Issuer s Best Practice Guide Rev. March 2011 www.fisglobal.com Copyright 2006 by FIS Card Services, Inc., a wholly owned subsidiary of FIS, Inc. All rights reserved. Printed in the United States of America.

More information

How To Understand The Law Of Credit Card Usage

How To Understand The Law Of Credit Card Usage Glossary Note: All definitions listed in this section are also available in the Course Glossary. You can access the course Glossary online by clicking the Glossary link in the Materials section of the

More information

Payment Fraud Statistics

Payment Fraud Statistics Instrument No. of Fraud Payment Fraud Statistics - Summary of Results Fraud Perpetrated on Australian Issued Payment Instruments (Revised December 2013) Value ($) of Fraud Total No. of all (thousands)

More information

The State of Play in Cyber Payments Fraud Improving Security for Online & Card Not Present Transactions

The State of Play in Cyber Payments Fraud Improving Security for Online & Card Not Present Transactions The State of Play in Cyber Payments Fraud Improving Security for Online & Card Not Present Transactions Mark Greene, Ph.D CEO, FICO Federal Reserve Bank of Chicago 26 September 2011 Cybercrime Costs 431

More information

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems October 2014 EMV and Restaurants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service marks

More information

Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011

Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011 Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011 On 5 th March 2010, The Association of Banks in Singapore announced key measures to adopt a holistic

More information

Artificial Neural Network and Location Coordinates based Security in Credit Cards

Artificial Neural Network and Location Coordinates based Security in Credit Cards Artificial Neural Network and Location Coordinates based Security in Credit Cards 1 Hakam Singh, 2 Vandna Thakur Department of Computer Science Career Point University Hamirpur Himachal Pradesh,India Abstract

More information

The Canadian Migration to EMV. Prepared By:

The Canadian Migration to EMV. Prepared By: The Canadian Migration to EMV Prepared By: December 1993 Everyone But The USA Is Migrating The international schemes decided Smart Cards are the way forward Europay, MasterCard & Visa International Produced

More information

Securing the Payments System. The facts about fraud prevention

Securing the Payments System. The facts about fraud prevention Securing the Payments System The facts about fraud prevention Contents Introduction 3 Visa s Security Programme 4 Fraud Types and Threats 6 Fraud Statistics and Research 7 Visa s Security Agenda for New

More information

Plastic Fraud. Debit Cards Debit cards, unlike credit cards, automatically withdraw funds from your account at the time you make a transaction.

Plastic Fraud. Debit Cards Debit cards, unlike credit cards, automatically withdraw funds from your account at the time you make a transaction. Getting a Handle on Debit and Credit Cards Plastic Fraud State-of-the-art thieves are concentrating on plastic cards. In the past, this type of fraud was not very common. Today, it is a big business for

More information

Suzanne Lynch Professor of Practice Economic Crime Utica College sl6-15 1

Suzanne Lynch Professor of Practice Economic Crime Utica College sl6-15 1 Suzanne Lynch Professor of Practice Economic Crime Utica College sl6-15 1 The most significant trend is decreasing paper payments and increasing electronic payments. Many organizations are also seeing

More information

Fraud Mitigation and Identity Verification for Card Not Present Transactions Overview

Fraud Mitigation and Identity Verification for Card Not Present Transactions Overview Fraud Mitigation and Identity Verification for Card Not Present Transactions Overview Credit card fraud costs businesses over $11 Billion dollars annually. The percentage of revenue lost to fraud is rising;

More information