scholarly journals Design and development for detection and prevention of ATM skimming frauds

Author(s):  
Sultan Saleem Khalaf Al Hattali ◽  
Shaik Mazhar Hussain ◽  
Anilloy Frank

ATM Skimming is a major concern that needs to be addressed with a specific solution. ATM Skimming is done in two steps. One is stealing the Personal Information that is stored on the Debit card / Credit card using Rain cover connected to the card reader slot (ATM’s real card slot). The second is installing a Fake keypad that can capture the pin code when the card holder enters pin details. Few researchers have proposed solutions to address the issue using Image Processing techniques. However, it does not provide a complete solution in a long term. Hence it is of paramount importance to provide ATM with high security features. In order to solve the issue of ATM Skimming, An Embedded System design is proposed. The research is carried out in two phases. One is detection phase and the second is Prevention Phase. In the detection phase, Hardware components such as Arduino Mega, Force Sensing Resistor (FSR), GPS, GSM and Buzzer are used. Arduino Mega acts as a Central Processor that processes the information received from Force sensing resistor (FSR) and send SMS Messages to ROP and Bank Officials using GSM and informing them about the ATM Location using GPS where the Fraud is taking place. Buzzer can be used at the ATM Locations to alert nearby people. In the prevention Phase, as a preventive measure a Onetime password (OTP) technique is used. If a fraudster somehow succeeds in Fixing fake key pad and Rain Cover at ATM’s real card slot, When he tries to insert debit card, An OTP will be generated and is sent to the Card Holder which in turn he can know someone is trying to make Transactions and quickly he can ask bank officials to Block his account and inform ROP about the same. Expected findings of the proposed work is to detect  Fake keypads and Fake card readers using FSR placed at the edges of Original Keypad and card reader slot. Sending messages to ROP, BANK OFFICIALS and CARD HOLDER using GSM. ATM locations are identified using GPS. Buzzers are used to alert nearby people.

Author(s):  
James G. Williams ◽  
Wichian Premchaiswadi

As the volume of purchases for products and services on the Internet has increased and the chosen method of payment is a credit or debit card, e-commerce merchants must be capable of accepting such payment methods. Unfortunately, cyber-criminals have found ways to steal personal information found on credit cards and debit cards and fraudulently use this information to purchase products and services which costs merchants lost revenue and fees for chargebacks. This article discusses the process by which credit card payments are processed beginning with the e-commerce merchant’s web site to a credit card processor or service gateway to the credit card company’s network to the issuing bank’s network with an accept or decline response being returned to the merchant’s shopping cart system via the same networks. The article addresses the issue of credit card fraud in terms of how the cyber-criminals function and the potential solutions used to deter these attempts by the cybercriminals. A list of preventive measures that should be used by e-commerce merchants is provided.


Author(s):  
Alex Pettit ◽  
Anthony Caranna

Much has been written on the digital divide, whereby less af?uent citizens are (or will be) left out of the “next wave” of progress due to the ?nancial costs prohibiting their participation in the broadband society being formed. Little has been written about the transformation of the electronic payment receipt process, and how participation in e-payment requires a credit card or MasterCard/Visa debit card to complete online transactions. This has the effect of excluding the cash and check-based society from participation, and directly impacts not only the digital divide but also the ROI of these e-payment solutions to the government entity providing them. The City of Denton has worked


2020 ◽  
Author(s):  
Sumit Agarwal ◽  
Amit Bubna ◽  
Molly Lipscomb

We show that consumers spend 15% more per day in the first week following the receipt of a credit card statement than in the days just prior to the statement. This increase in spending includes both an increase in the likelihood that they use the credit card in the first weeks following their statement and an increase in transaction amount on days they use the credit card. In contrast to the effect on credit card spending, debit card spending is unaffected by credit card statement issuance, suggesting that consumers are not simply switching among modes of payment. Our estimates are based on exogenous variation from bank-assigned statement dates. We propose and test several alternative explanations to this spending puzzle: optimization of the free float, salience effect of the credit card statement, mental accounting, liquidity constraints, and automatic payments. We find that the consumers most apt to spend early in the credit card cycle tend to be those who do not revolve balances and are not close to their credit limit. Thus, this paper documents a puzzle with mixed support for several alternative explanations. This paper was accepted by David Simchi-Levi, finance.


1968 ◽  
Vol 22 (6) ◽  
pp. 713-718 ◽  
Author(s):  
Michel Desjardins ◽  
John A. Moore

An original computer program is applied to handle spark-source mass-spectrometry data. Computerized “Celidometry” (trace impurity measurement) increases the speed of data handling and also leaves complete freedom in interpretation of results. This article briefly describes the method utilized to obtain trace impurity concentrations by spark-source mass spectrometry and discusses in detail the computer program used to perform some of the operations. The computer program is written in DOS FORTRAN IV (E LEVEL SUBSET) supplied by IBM for System 360. The main program requires a card reader, a printer, and a 65K byte central processor. In addition, two magnetic tape drivers are used to provide off-line plotting of the calibration curve.


2019 ◽  
Vol 8 (4) ◽  
pp. 9192-9194

E-Commerce Is The Process Of Selling Or Purchasing Of Goods Via Utilizing Online Services. Nowadays, E-Commerce Has Become An Integral Part Of Business Websites. In This, Third Party Services Are Being Used Most Commonly, Which Offer Ready To Use Setup For The Companies. Numerous Services And Technologies Are Used By The Firms Such As Applications For Payment-Processing (These Can Also Be Offered By Third Parties). Sometimes, Business Companies May Also Develop Their Own Customised Software At Specialised Price Or May Use Their Personal Software By Combining It With Third Party Software. Therefore, E-Commerce Websites May Succeed By Providing Secure Services To Their Customers, Such As Their Personal Information, Cards Details Etc. Must Be Secured With Trusted Encryption Technologies. But, At The Same Time, Widespread Use Of E-Commerce Is Accompanied With Certain Security Related Challenges. Hackers Try To Find Loopholes In The System Using Several Techniques. Hence, Taking The Preventive Measure And Educating Customers About The Threats May Help In Keeping The Customer Faith On Websites. Otherwise, If A Website Has Poor Encryption Technologies, Then It May Fail To Gain Customer Trust.


Author(s):  
Aarti Chile ◽  
Mrunal Jadhav ◽  
Shital Thakare ◽  
Prof. Yogita Chavan

A fraud attempt to get sensitive and personal information like password, username, and bank details like credit/debit card details by masking as a reliable organization in electronic communication. The phishing website will appear the same as the legitimate website and directs the user to a page to enter personal details of the user on the fake website. Through machine learning algorithms one can improve the accuracy of the prediction. The proposed method predicts the URL based phishing websites based on features and also gives maximum accuracy. This method uses uniform resource locator (URL) features. We identified features that phishing site URLs contain. The proposed method employs those features for phishing detection. The proposed system predicts the URL based phishing websites with maximum accuracy.


Sign in / Sign up

Export Citation Format

Share Document