On-Line Credit and Debit Card Processing and Fraud Prevention for E-Business

Author(s):  
James G. Williams

As the number of purchases over the Internet has increased and the method of payment is a credit or debit card, e-commerce merchants must be able to accept on-line payment using the card data. Cyber-criminals have found ways to capture the information on credit and debit cards and use this information to make purchases and remove money from bank accounts which costs merchants lost revenue and chargebacks fees and cost consumers and banks lost funds.. The process by which credit and debit card payments are processed beginning with the e-commerce merchant's web site to a card processor or service gateway to the credit or debit card company's network to the issuing bank's network with an accept or decline response being returned to the merchant's shopping cart system via the same networks is discussed. The issue of credit and debit card fraud in terms of how cyber-criminals function and the solutions used to deter these attempts by the cyber-criminals is covered. The security standards and a list of preventive measures that should be used by e-commerce merchants are discussed.

Author(s):  
James G. Williams

As the number of purchases over the internet has increased and the method of payment is a credit or debit card, e-commerce merchants must be able to accept online payment using the card data. Cyber-criminals have found ways to capture the information on credit and debit cards and use this information to make purchases and remove money from bank accounts which costs merchants lost revenue and chargebacks fees and costs consumers and banks lost funds. The process by which credit and debit card payments are processed beginning with the e-commerce merchant's website to a card processor or service gateway to the credit or debit card company's network to the issuing bank's network with an accept or decline response being returned to the merchant's shopping cart system via the same networks is discussed. The issue of credit and debit card fraud in terms of how cyber-criminals function and the solutions used to deter these attempts by the cyber-criminals is covered. The security standards and a list of preventive measures that should be used by e-commerce merchants are discussed.


Author(s):  
James G. Williams ◽  
Wichian Premchaiswadi

As the volume of purchases for products and services on the Internet has increased and the chosen method of payment is a credit or debit card, e-commerce merchants must be capable of accepting such payment methods. Unfortunately, cyber-criminals have found ways to steal personal information found on credit cards and debit cards and fraudulently use this information to purchase products and services which costs merchants lost revenue and fees for chargebacks. This article discusses the process by which credit card payments are processed beginning with the e-commerce merchant’s web site to a credit card processor or service gateway to the credit card company’s network to the issuing bank’s network with an accept or decline response being returned to the merchant’s shopping cart system via the same networks. The article addresses the issue of credit card fraud in terms of how the cyber-criminals function and the potential solutions used to deter these attempts by the cybercriminals. A list of preventive measures that should be used by e-commerce merchants is provided.


2011 ◽  
pp. 699-717
Author(s):  
James G. Williams ◽  
Wichian Premchaiswadi

As the volume of purchases for products and services on the Internet has increased and the chosen method of payment is a credit or debit card, e-commerce merchants must be capable of accepting such payment methods. Unfortunately, cyber-criminals have found ways to steal personal information found on credit cards and debit cards and fraudulently use this information to purchase products and services which costs merchants lost revenue and fees for chargebacks. This article discusses the process by which credit card payments are processed beginning with the e-commerce merchant’s web site to a credit card processor or service gateway to the credit card company’s network to the issuing bank’s network with an accept or decline response being returned to the merchant’s shopping cart system via the same networks. The article addresses the issue of credit card fraud in terms of how the cyber-criminals function and the potential solutions used to deter these attempts by the cybercriminals. A list of preventive measures that should be used by e-commerce merchants is provided.


2001 ◽  
Vol 39 (1) ◽  
pp. 7-10
Author(s):  
Drucilla Ekwurzel ◽  
John McMillan

The internet is bringing profound changes in scholarly publishing. The American Economic Association maintains a web site ( www.AEAweb.org ) containing the three AEA journals, bibliographic information, links to various economics information, and various services for AEA members. This note surveys the AEA's on-line initiatives.


2014 ◽  
Vol 52 (4) ◽  
pp. 409-435 ◽  
Author(s):  
Suzana Stefanović ◽  
Milica Stanković

AbstractFranchising is a business format which is becoming a global phenomenon in the contemporary business. Franchise systems extensively use modern information and communication technology (ICT) to enhance communication among franchisors and franchisees, and to provide interaction with end users. The aim of the paper is to highlight the importance of using the modern technology in franchise systems globally and need for more intensive use of ICT in our country and in neighboring countries, based on the comparative analysis of using the ICT and Internet in developed and less developed economies. The research was conducted through a comprehensive on-line analysis of franchisors’ web sites. In this paper, it is analyzed whether there is a connection between the franchisors and franchisees linking through web site and the number of given franchise. Correlation analysis showed a statistically significant strong positive correlation between the use of the web site for linking franchisors and their franchisees and the number of franchise units. It can be concluded that less use of modern technology and the Internet in developing countries affects the slower expansion of the franchise units network than in developed countries where the use of ICT and the Internet is at a much higher level.


Author(s):  
Sheng-Uei Guan

With the development of the Internet, a great deal of information is on-line. Popular search sites could be visited million times daily and the sites related to your interest will often be visited by you. Although bookmarks can be used to record frequented Web sites, browsers discard most history and trail information. The explosion of information needs a more effective mechanism. Memex has been considered in this domain. Assisted by Memex, a Web surfer can retrieve the URL trails that a user visited several months ago. In this paper, we propose a mechanism Self-modifiable Color Petri Net - SCPN to simulate the Memex functions in a Web browser. In this mechanism, an SCPN instance is used to record a trail of a topic, a place in an SCPN instance represents a Web site.


2000 ◽  
Vol 632 ◽  
Author(s):  
James Marrow ◽  
Brian Derby

ABSTRACTThe Internet Microscope is an image library, with a difference. Its web site (http://www.umist.ac.uk/~intmic/) is dedicated to the explanation and illustration of the relationship between microstructure, properties and processing in materials science. A growing selection of the samples is aimed directly at schools and colleges.The microscope has been used with undergraduate teaching at the University in conjunction with computer presented multiple choice questions. It has replaced microscopy laboratories for a class of 100 engineering students, for whom materials science forms a small but important part of their syllabus. The microscope also allows students to test and revise their knowledge of phase diagrams.The Internet Electron Microscope is an exciting development of the existing web site. It makes use of the concept of “Learning by Doing”. It will give schools and colleges on-line control of a free, simple and easy to use scanning electron microscope. Samples will range from sugar cubes to silicon chips, offering a real experience of microscopy.


1999 ◽  
Vol 27 (1) ◽  
pp. 37-46 ◽  
Author(s):  
Susan Riley ◽  
David Veale

The potential uses of the Internet to behavioural and cognitive psychotherapists and researchers are manifold. This article summarizes what the Internet is, how to connect to it, searching the Web, on-line publishing, discussion forums, chat-rooms, literature searching, transfer of documents and creating a web-site. It considers the potential of Internet technology in therapy and enhancing patient/therapist contact. A web page containing links to many of the sites referred to in this article as well as additional links and resources is accessible through the BABCP website (www.babcp.org.uk).


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


Sign in / Sign up

Export Citation Format

Share Document