Geo-location is one of the technologies that is adapted by many companies to provide their merchants and thus the customers a secure environment to pursue business transactions. It has some advantages and disadvantages which shall also be discussed…
Another dimension that has been encapsulated as a part of the internet now, is the world of e-commerce. ECD  states that the concept of shopping online has become a norm for humans. Muir  explains that e-commerce basically involves the concept of online business transactions that usually involve payment by credit cards.
This new dimension of the internet has provided many opportunities for the customers and merchants. At the same time, created problems for the merchants as not all customers are genuine and honest. Russell  conducted a study and concluded that Americans have their identity stolen almost every minute and spend an average of 600 hours to recover from the effects of this crime.
According to a research by US Federal Trade Commission  in 2001; it was concluded that around 1000 complaints were lodged for online fraudulent activities, whereas this number increased to a huge number of 25000 by the year 2000. Patton et al  and Connolly et al  state that these kinds of figures have created an environment of mistrust between the merchants and the customers. Qi et al  writes that the main aim of the online shopping companies is to ensure that the customer is honest about his identity and minimize the manual work in terms of the decisions for the authenticity of the identity. Olsen  studied that companies tend to spend a good amount to maintain a secure environment for their online business.
Altendorf  has analyzed that much development has been done in this field to make e-commerce transactions safe from any fraudulent activities. One of the technologies that is gaining a name in this regard is ‘Geo-location’. ...
Cite this document
(“Technical Report: Security for Credit Card Fraud in E-commerce by Essay”, n.d.)
Retrieved from https://studentshare.net/miscellaneous/386091-technical-report-security-for-credit-card-fraud-in-e-commerce-by-using-geo-location
(Technical Report: Security for Credit Card Fraud in E-Commerce by Essay)
“Technical Report: Security for Credit Card Fraud in E-Commerce by Essay”, n.d. https://studentshare.net/miscellaneous/386091-technical-report-security-for-credit-card-fraud-in-e-commerce-by-using-geo-location.
Due to the security implication of transmitting data via the internet, the data (binary) can be encoded on transmission and decoded on retrieval. The use of cryptography in this case tries to prevent eavesdropping by unwelcome parties.Even with the use of cryptography to protect calls; hijacking of calls also proves to be a major threat.
This paper will provide a background about credit card use, credit card fraud, its implication, as well as recommendation to reduce commission of the crime. Use of credit card or plastic cards started in 1965 although Woolsey and Gerson (2009) traces the practice with issuance of proprietary cards by oil companies and department stores in 1900 whwrein the card is useful in the same business.
People can benefit from using the credit cards in many ways. For instance, they enable them to make payment on time. Additionally, some cards earn points each time a person purchases goods or services. One can redeem the points and use them to buy goods. One can also change the points into reward vouchers.
The author states that a large credit card debt and poor repayment history will follow the student and complicate their employment chances. While almost any job entails access to computers, sensitive files, and financial transactions, employers are naturally reluctant to hire anyone who may be perceived as a credit risk.
The study is an investigation of the status of credit card fraud as it is perpetrated in the United Arab Emirates. The various types of credit card fraud and the manner by which they are carried out are related,
The author in his article stated that e-commerce services deals in heavy transactions. So this attracts hackers. He tries ways to extract confidential data like Phishing. The term phishing describes a combination of techniques used by cyber crooks to bait people into giving up sensitive personal data such as credit card numbers, social security numbers.
The author states that e-commerce encapsulates the concept of buying and selling products online, which involves money transactions from around the world. Since these transactions are usually done through credit cards, therefore this raises a need to authenticate and verify the customers who are involved in purchasing goods online.
Credit card fraud is the most common internet crime these days. There has been much research on this subject and many solutions have been devised to make online business transactions more secure. Some of the solutions will be discussed that make the
her degree in any university and to the best of my knowledge and belief, contains no material previously published, written, or produced by another person, except where due reference is made in the text.
The study is an investigation of credit card fraud countermeasures as it
In this context, the transformation of cell phones to an indispensable tool of communication can be characterized as expected; cell phones today have become a necessity but the margins of their role have been expanded more than initially estimated. In fact, in their
10 Pages(2500 words)Essay
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Essay on topic Technical Report: Security for Credit Card Fraud in E-commerce by Using Geo-location for FREE!