payment card
Recently Published Documents


TOTAL DOCUMENTS

273
(FIVE YEARS 66)

H-INDEX

23
(FIVE YEARS 1)

2021 ◽  
Vol 10 (2) ◽  
Author(s):  
Dang Thi Dieu Thuy ◽  
Christopher Gan ◽  
Baiding Hu

As an important area in terms of biodiversity and fish stocks in Vietnam, Cu Lao Cham or Cham Islands (CLC) marine protected area (MPA) is under increasing threat from human activities. Conservation efforts have recently been implemented but economic analysis of the CLC MPA’s natural values did not investigate what may affect policy decisions on CLC MPA’s sustainable development. Using a structured questionnaire and a payment card technique (based on the contingent valuation method), we estimate visitors’ willingness to pay (WTP) for conservation of marine resources in the CLC MPA. The log-normal regression results indicate that the visitors’ WTP for conservation is affected by their characteristics, perceptions of environmental protection and conservation, and their assessment of the current CLC MPA entrance fee. Visitors are WTP an additional amount of US$2.26 per person for conservation while visiting the CLC MPA. This indicates that with the introduction of the proposed entrance fee (the mean WTP added to the current entrance fee), the CLC MPA management would not only have sufficient funds for their management and conservation programmes, but also that the number of visitors may decline slightly, which would reduce some of the pressure on the environment, natural resources, and coral reefs.


2021 ◽  
Vol 23 (11) ◽  
pp. 769-775
Author(s):  
Vipin Khattri ◽  
◽  
Sandeep Kumar Nayak ◽  

In an ancient era, physical resources used to apply for transacting messages, treaty content, monarchy schemes, and policies and associated national or territorial currency which consumes time duration in the heavy count with negligible security. But as time passes, technological advancement has tendered its valuable and qualitative inputs to make the conventional transaction more better at its highest level of the extent, and as a qualitative and progressive resultant, the world is breathing in the current era of the digital environment with high-security priority. The responsibility of researchers and concerned authorities is to protect the online digital transaction under the safe digital environment. Therefore continuous enhancement is required in the upgrade of the security of the transaction system to handle digital transaction fraud. This research study suggests an approach of deep autoencoder for identifying fraudulent payment card transactions. To assess the outcome and validity of the projected approach of deep autoencoder for identifying fraudulent payment card transactions, testing was executed with the help of two datasets. The first dataset is a real credit card fraud dataset that is public available in world and the second dataset are generated by collecting the data using payment card transaction including genuine transaction and fraudulent transactions. A comparative analysis performed which is based on a comparison with different method and used first dataset. The proposed integration approach performed exceptionally with the different method and accomplished the maximum performance with respect to area under receiver operating characteristic curve (AUC) (95.66%).


2021 ◽  
Vol 25 (3) ◽  
pp. 87-93
Author(s):  
Grzegorz Pawłowicz

The article presents the results of measurements and design changes to the certain electronic device, the purpose of which was to meet the requirements for the levels of electromagnetic disturbance emission from the device in accordance with the UNECE Regulation No. 10.06. The successive stages of the research are described. The subsequent modifications of the device in accordance to the research findings are also described. The subject of the research was the validator of paper and electronic tickets, enabling the purchase of tickets with the use of a contactless payment card and a city card. In the course of the research, the effectiveness of selected methods of ensuring the electromagnetic compatibility of the device was presented.


2021 ◽  
Vol 15 (2) ◽  
pp. 91-104
Author(s):  
Khairur Razikin ◽  
Agus Widodo

The use of technology in the era of the Industrial Revolution 4.0 is essential, marked by the use of technology in the economy and business. This situation makes many companies in the payment sector have to improve their information technology security systems. In Indonesia, Bank Indonesia and the Financial Services Authority (Otoritas Jasa Keuangan - OJK) are agencies that provide operational permits for companies by making Payment Card Industry-Data Security Standard (PCI-DSS) certification as one of the requirements for companies to obtain operating permits. However, not all companies can easily get PCI-DSS certification because many companies still do not meet the PCI-DSS requirements. The research offers a methodology for measuring the level of technology and information maturity using general cybersecurity requirements adopted from the cybersecurity frameworks of CIS, NIST, and Cobit. Then, the research also performs qualitative calculations based on interviews, observations, and data surveys conducted on switching companies that have been able to implement and obtain certification. PCI-DSS to produce practical cybersecurity measures, in general, can be used as a measure of the maturity of technology and information security. The results and discussion provide a model assessment tool on the procedures and requirements needed to obtain PCI-DSS certification. The maturity level value of PT XYZ is 4.0667 at maturity level 4, namely quantitatively managed, approaching level 5 as the highest level at maturity level.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Scott H. Belshaw ◽  
Brooke Nodeland

Purpose The purpose of this study is to examine the characteristics of gas stations where skimmer attacks occurred in a sample of Texas gas stations between 2019 and 2021. This paper seeks to contribute to the literature related to payment card fraud at the gas pump by providing one of the first examinations of the gas stations where gas pump skimming is known to have occurred. Design/methodology/approach Using data collected from a Texas state regulatory agency between 2021, the authors examine characteristics of gas stations where a gas pump skimming was detected. Findings Results suggest that the presence of a surveillance camera system was significantly related to gas pump skimmer detection for gas stations in both urban and rural areas. Europay chip readers were not present in any of the pumps where a skimmer attack was detected. Originality/value Gas pump skimming is a form of payment card fraud that costs upwards of US$11bn a year in the USA alone. Gas pump skimming occurs when electronic devices are illegally installed fuel pumps to capture data or record cardholders’ personal identification numbers. This is among the first studies to use data obtained from a state agency with specific information regarding each individual occurrence of gas pump skimming. As such, the paper makes a unique contribution by exploring specific characteristics of gas stations where skimming and ultimately payment card fraud, occurred.


2021 ◽  
Vol 19 (1) ◽  
Author(s):  
Ziping Ye ◽  
Fuyao Liu ◽  
Jia Ma ◽  
Ziyang Zhou ◽  
Chen Wang ◽  
...  

Abstract Background The payment card (PC) format and the open-ended (OE) format are common methods in eliciting willingness-to-pay (WTP) of one additional quality-adjusted life year (QALY). The aim of this research is to compare these two formats in eliciting the monetary value of a QALY. Methods A contingent valuation survey was carried out using a pre-designed questionnaire with various hypothetical scenarios. The difference between the PC and the OE formats was evaluated by a two-sample equality test. Furthermore, generalized linear models were carried out to control observed heterogeneity and to test theoretical validity. Results In total, 461 individuals were involved, among whom 235 (51%) answered the PC question, while 226 (49%) answered the OE question. Excluding zero response, the mean WTP values of these two formats for different scenarios varied dramatically, which was from 13,278 to 280,177 RMB for the PC, 18,119 to 620,913 RMB for the OE. The OE format tended to elicit lower values for less serious condition and higher values for more serious condition. However, equality test of mean and median demonstrated insignificant difference of these two formats for all scenarios. For both OE and PC format, most variables were found to have significant effect on the value of WTP/QALY. Moreover, joint estimation indicated a statistically significant positive effect on the OE results. Further analysis demonstrated that the imbalanced zero response distribution caused the main difference of these two formats. Conclusions This research indicated insignificantly different WTP/QALY estimates of the PC format and OE format with the grouped data whereas significantly higher estimates of the OE format from the pooled data. These two formats were found to be valid. More research about the difference and the validity of various WTP eliciting methods would be recommended for a robust estimation of WTP/QALY.


Author(s):  
Olena Samoilenko ◽  
Kateryna Titunina

The article proves that the separation of technologies for committing fraud on the Internet allows you to determine the causal complexes. As a result, it is possible to effectively influence the prevention and counteraction of the corresponding type of crime. The author concludes that it is necessary to introduce into the practice of law enforcement and other government agencies effective tools for preventing and combating Internet fraud. He sees such a tool as outreach activities and modes of action that will block the determinants of criminal behavior in cyberspace. In order to concretize the specified means of prevention, it also deepens the theoretical basis regarding the system for preventing Internet fraud. So, the author comes to the conclusion that counteraction is a system of measures and methods of activity not only of law enforcement agencies, but also of other state and non-state bodies, while among these measures there are measures to prevent certain types of crimes. The article indicates that in the process of implementing a certain type of cybercrimes by criminals, they talk about the technologies of criminal activity as complexes of interrelated crimes, united by a single criminal purpose. For the commission of Internet fraud in the technology of criminal activity, there are typically ways of committing crimes in the use of computers, systems and computer networks and telecommunication networks (provided for in Section XVI of the Criminal Code of Ukraine) and Art. 200 of the Criminal Code of Ukraine. As a result of the analysis of the materials of the forensic practice of investigating fraud on the Internet, two main technologies have been identified: 1) the seizure of funds using phishing sites (the methods of reporting false information from the victim and its content have been updated) 2) the seizure of funds using a bank payment card and / or ATM (the variability of the method of manipulating information has been updated)


2021 ◽  
Vol 23 (2(79)) ◽  
pp. 172-184
Author(s):  
KHAYALADDIN R. TAGHIYEV ◽  
TAMERLAN H. RUSTAMOV ◽  
ARAZ A. HASANZADE

Topicality. The trends of fraud and the history of fraud in general with the emergence of new gaps due to the rapid development of information technology is analysed in the article.The systematization of types and forms of fraudulent intervention, their consequences and ways of counteraction taking into account the interests of users is made.Aim and tasks. The causes of payment card fraud, the main forms and types of possible fraudulent transactions and areas of payment card fraud were further classified and investigated.Research results. The investigation revealed the most common cases, including lost and stolen payment cards, counterfeit cards and fraudulent transactions without a payment card, and identified measures to combat them. At the same time, the ways of using different methods for the implementation of fraudulent transactions were analyzed. In the context of the rapid growth of e-commerce during the global pandemic, widespread fraud and steps to be taken against them have been revealed. Another noteworthy part of the research is the continuation of research in the language of numbers based on statistical data, as well as the collection and accuracy of statistical reporting.Conclusion. Thus, first, the cases of fraud on payment card transactions in the European Union were disclosed, and then the correlation coefficient between payment transactions in the payment card market in the Republic of Azerbaijan and fraudulent transactions was calculated. An investigation was also conducted into the implementation of preventive measures against fraudulent transactions, which are important for financial institutions and payment service users, as well as and the steps to be taken in a consistent manner are explained in the article. The life cycle of payment cards is divided into three main stages, customer acceptance, identification and decision-making, the specific features of each stage and ways to prevent risks in these stages are noted in the article. In the end, the results of the research are reflected in the conclusion section of the article.


Author(s):  
Manjeevan Seera ◽  
Chee Peng Lim ◽  
Ajay Kumar ◽  
Lalitha Dhamotharan ◽  
Kim Hua Tan

Sign in / Sign up

Export Citation Format

Share Document