scholarly journals UNDERSTANDING CYBER CRIME AND CYBER LAUNDERING: THREAT AND SOLUTION

Author(s):  
Dr.M.Suganya Aravazhi,

Cybercrime is an illegal action committed in the area of ITC and it is high speed, low cost and high tech offence. This kind of activity usually involves a modification of a conventional crime by using computers. The term ‘cyber-laundering’ is the practice of money laundering carried out in cyber space through online transactions. This article presents the meaning of cyber laundering dealing with offences concerned with the abuse of computers or other electronic gadgets. Cyber criminals also target at loopholes of mobile devices and the threats are growing faster than it does on personal computer. An effective legal frame work for combating cybercrime is important to develop the correct conceptual apparatus. Cyber criminals often favour those e-commerce portals and payment system where a great number of personal information and credit card data are being stored and processed. On the whole, an effective anti-cybercrime strategy is the need of the hour. KEY WORDS: Cybercrime, Money laundering, Information technology, Cyber security, Electronic gadgets, Financial services.

Author(s):  
James G. Williams ◽  
Wichian Premchaiswadi

As the volume of purchases for products and services on the Internet has increased and the chosen method of payment is a credit or debit card, e-commerce merchants must be capable of accepting such payment methods. Unfortunately, cyber-criminals have found ways to steal personal information found on credit cards and debit cards and fraudulently use this information to purchase products and services which costs merchants lost revenue and fees for chargebacks. This article discusses the process by which credit card payments are processed beginning with the e-commerce merchant’s web site to a credit card processor or service gateway to the credit card company’s network to the issuing bank’s network with an accept or decline response being returned to the merchant’s shopping cart system via the same networks. The article addresses the issue of credit card fraud in terms of how the cyber-criminals function and the potential solutions used to deter these attempts by the cybercriminals. A list of preventive measures that should be used by e-commerce merchants is provided.


2011 ◽  
pp. 699-717
Author(s):  
James G. Williams ◽  
Wichian Premchaiswadi

As the volume of purchases for products and services on the Internet has increased and the chosen method of payment is a credit or debit card, e-commerce merchants must be capable of accepting such payment methods. Unfortunately, cyber-criminals have found ways to steal personal information found on credit cards and debit cards and fraudulently use this information to purchase products and services which costs merchants lost revenue and fees for chargebacks. This article discusses the process by which credit card payments are processed beginning with the e-commerce merchant’s web site to a credit card processor or service gateway to the credit card company’s network to the issuing bank’s network with an accept or decline response being returned to the merchant’s shopping cart system via the same networks. The article addresses the issue of credit card fraud in terms of how the cyber-criminals function and the potential solutions used to deter these attempts by the cybercriminals. A list of preventive measures that should be used by e-commerce merchants is provided.


2018 ◽  
Vol 8 (1) ◽  
pp. 9-23 ◽  
Author(s):  
Federico Pigni ◽  
Marcin Bartosiak ◽  
Gabriele Piccoli ◽  
Blake Ives

In January 2014, the CEO of the renowned U.S. discount retailer Target wrote an open letter to its customers apologizing for the massive data breach the company experienced during the 2013 holiday season. Attackers were able to steal credit card data of 40 million customers and more were probably at risk. Share prices, profits, but above all reputation were all now at stake. How did it happen? What was really stolen? What happened to the data? How could Target win consumer confidence back? While the company managed the consequences of the attack, and operations were slowly back to normal, in the aftermath the data breach costs hundreds of million dollars. Customers, banks, and all the major payment card companies took legal action against Target. Some of these litigations remained unsettled 3 years later. The importance of the breach lays in its far broader consequences, rippling through the U.S. Congress, and raising consumer and industry awareness on cyber security. The case provides substantial data and information, allowing students to step into the shoes of Target executives as they seek answers to the above questions.


2020 ◽  
pp. 131-153
Author(s):  
Terri Friedline

This chapter explores how the rise of digital technologies enables new manifestations of racialization in financial services, using Google Fiber’s promises of low-cost high-speed Internet services in Nashville and Kansas City as examples. Akin to redlining in the lending market, Black and Brown communities may experience digital forms of redlining due to limited access to technologies such as high-speed Internet and smartphones that exist alongside the rising number of bank branch closures. At the nexus of financial and digital divides, banks’ overreliance on fintech can reproduce and amplify marginalization. Not only can fintech concentrate wealth, the computer algorithms on which fintech is built can further stitch whiteness into the financial system.


2019 ◽  
Vol 8 (2S8) ◽  
pp. 1798-1802

In digital word cybersecurity is to help us to prevent attacks on network resources, private information and vital certifications of an association. The fundamental objective of this survey paper is to focus on the various types of cyber-attacks and their quick fix to how we can protect our self from such attacks. Other then, it also gives information about the various forms of cyber-crime and its protection worldwide. These days, with wide usage of internet services with low-cost everyone, is using the net. But many of them don't know about cyber fraud i.e.: how attackers steal their data or personal information and sell to others, this paper helps to create awareness of cybersecurity for such people. So as to determine digital security issues, the security specialist's locale including government segment, the scholarly community, the private part should cooperate to comprehend the rising dangers to the processing scene. This paper presents a specialized, social and moral association uninhibitedly sharing digital assault angle in the soul of worldwide co-task bridging geo-political fringes by conveying dynamic checking.


TAPPI Journal ◽  
2014 ◽  
Vol 13 (2) ◽  
pp. 17-25
Author(s):  
JUNMING SHU ◽  
ARTHAS YANG ◽  
PEKKA SALMINEN ◽  
HENRI VAITTINEN

The Ji’an PM No. 3 is the first linerboard machine in China to use multilayer curtain coating technology. Since successful startup at the end of 2011, further development has been carried out to optimize running conditions, coating formulations, and the base paper to provide a product with satisfactory quality and lower cost to manufacture. The key challenges include designing the base board structure for the desired mechanical strength, designing the surface properties for subsequent coating operations, optimizing the high-speed running of the curtain coater to enhance production efficiency, minimizing the amount of titanium dioxide in the coating color, and balancing the coated board properties to make them suitable for both offset and flexographic printing. The pilot and mill scale results show that curtain coating has a major positive impact on brightness, while smoothness is improved mainly by the blade coating and calendering conditions. Optimization of base board properties and the blade + curtain + blade concept has resulted in the successful use of 100% recycled fiber to produce base board. The optical, mechanical, and printability properties of the final coated board meet market requirements for both offset and flexographic printing. Machine runnability is excellent at the current speed of 1000 m/min, and titanium dioxide has been eliminated in the coating formulations without affecting the coating coverage. A significant improvement in the total cost of coated white liner production has been achieved, compared to the conventional concept of using virgin fiber in the top ply. Future development will focus on combining low cost with further quality improvements to make linerboard suitable for a wider range of end-use applications, including frozen-food packaging and folding boxboard.


2020 ◽  
Vol 3 (2) ◽  
Author(s):  
Muhamad Khoirul Umam

In view of Islamic law Ethereum as a digital asset that is traded in cyberspace.The value of cryptocurrency surges and fluctuates, it is influenced by buying and selling demand. Indodax exchange is an official digital asset site in Indonesia that trades more than 40 digital currencies.The purpose of this study is to analyze whether cryptocurrency is worthy of value as money having a certain value, and also seen from the Indonesian government through Bank Indonesia has issued regulation No. 16/8/PBI/2014, which explicitly prohibits the use of bitcoin, Ethereum and altcoin for use in financial transactions in cash. So that raises research questions how the cryptocurrency law in the form of coin ethereum in Islamic law. The results of this study explain ethereum has advantages and disadvantages. Among its advantages is that users can use exchanges or transactions without a third service (bank), and can be traded at merchandise stores.However, ethereum losses are more frequent, such as fluctuating values each time, not listed as commodities, not watched by the Financial Services Authority (OJK), they present elements of gharar (uncertainty) and maysir (gambling) or (betting), which are used for money laundering and purchase of illegal drugs.Keywords: Cryptocurrency, Ethereum, Digital asset


2007 ◽  
Author(s):  
R. E. Crosbie ◽  
J. J. Zenor ◽  
R. Bednar ◽  
D. Word ◽  
N. G. Hingorani

2018 ◽  
Vol 30 (3) ◽  
pp. 3-22
Author(s):  
Won-Seop Shim ◽  
Seung-Mook Choi ◽  
Chang-Sup Shim

Sign in / Sign up

Export Citation Format

Share Document