Matches in SemOpenAlex for { <https://semopenalex.org/work/W3123723830> ?p ?o ?g. }
Showing items 1 to 79 of
79
with 100 items per page.
- W3123723830 endingPage "49" @default.
- W3123723830 startingPage "43" @default.
- W3123723830 abstract "Introduction and summary In absence of a significant (and right now unforeseeable) shift in retail payments landscape in United States, consumers will continue to reach consistently (and often) for their debit and credit cards. They will use these cards when paying for goods and services in face-to-face, Internet, mail order, and telephone order transactions. Likewise, criminals will continue to use tried-and-true tactics and will develop innovative methods to perpetrate payment card At intersection of consumers conducting legitimate card transactions and fraudsters pursuing their illegal ends is a tangled web of public laws and private card network rules. These laws and rules allocate fraud risk among consumers, card issuers, and merchants participating in card-based payment systems. In theory, one would hope that these laws and rules for payment card transactions are thoughtfully designed to encourage behavior that minimizes fraud losses to system as a whole. In reality, systemwide fraud reduction is often not principal objective behind particular public laws or private rules affecting fraud liability allocation. Consequently, these laws and rules may fail to promote efficient fraud avoidance; indeed, in some instances, they may actually discourage fraud avoidance. Defining issue The first step in evaluating efficiency of fraud liability allocation rules in current card-based payment systems is to define issue. Doing so requires an understanding of difference between identity theft and common payment card fraud, as well as an understanding of workings of card-based payment systems at issue. Identity theft versus fraud News stories abound about identity theft resulting from dumpster divers absconding with old bank statements and criminals rifling through mail and intercepting credit card offers. Further, email accounts are barraged with phishing attempts and other web-based schemes craftily designed to lure consumers into revealing personal identification information that can be used for nefarious purposes. Typically, fraudsters intend to use ill-gotten fruits of their snooping to impersonate their victims and access their credit or asset accounts. This is identity theft, and it is an increasingly pervasive problem in United States and throughout world. During 2007, Consumer Sentinel, a network that collects information about consumer fraud and identity theft from Federal Trade Commission and over 125 other organizations, recorded 258,427 identity theft complaints. (1) Identity theft is distinguishable from common financial Identity theft is generally defined as the use of personal identifying information to commit some form of fraud. (2) In contrast, fraud is simply [a] knowing misrepresentation of truth ... to induce another to act to his or her detriment. (3) As noted in definition of identity theft, fraud is typically end goal of identity theft. However, often fraud is committed without antecedent theft of Social Security numbers or other assumption of identity. Along with cases of identity theft reported in 2007, 555,472 cases of non-identity-theft-related fraud were reported during same year. (4) Given that card-based payment systems (and other payment systems, for that matter) seek to prevent monetary fraud perpetrated through system regardless of how information used to perpetrate fraud was obtained, here I focus on broader category of payments fraud--whether or not it is precipitated by identity theft. There is no need to steal another person's identity to perpetrate simple payment card fraud--all perpetrator needs to do is obtain a person's payment card or payment card information? Distinguishing fraud from identity theft is important to discussion that follows for two reasons. First, fraud is broader and more pervasive than identity theft. …" @default.
- W3123723830 created "2021-02-01" @default.
- W3123723830 creator A5023180033 @default.
- W3123723830 date "2009-03-22" @default.
- W3123723830 modified "2023-09-26" @default.
- W3123723830 title "An Examination of the Fraud Liability Shift in Consumer Card-Based Payment Systems" @default.
- W3123723830 hasPublicationYear "2009" @default.
- W3123723830 type Work @default.
- W3123723830 sameAs 3123723830 @default.
- W3123723830 citedByCount "4" @default.
- W3123723830 countsByYear W31237238302013 @default.
- W3123723830 countsByYear W31237238302014 @default.
- W3123723830 crossrefType "posted-content" @default.
- W3123723830 hasAuthorship W3123723830A5023180033 @default.
- W3123723830 hasConcept C10138342 @default.
- W3123723830 hasConcept C108827166 @default.
- W3123723830 hasConcept C144133560 @default.
- W3123723830 hasConcept C145097563 @default.
- W3123723830 hasConcept C149071572 @default.
- W3123723830 hasConcept C165609540 @default.
- W3123723830 hasConcept C17744445 @default.
- W3123723830 hasConcept C185822510 @default.
- W3123723830 hasConcept C199539241 @default.
- W3123723830 hasConcept C21021354 @default.
- W3123723830 hasConcept C2777303138 @default.
- W3123723830 hasConcept C2777834853 @default.
- W3123723830 hasConcept C2779602731 @default.
- W3123723830 hasConcept C2983355114 @default.
- W3123723830 hasConcept C38652104 @default.
- W3123723830 hasConcept C41008148 @default.
- W3123723830 hasConcept C522325796 @default.
- W3123723830 hasConceptScore W3123723830C10138342 @default.
- W3123723830 hasConceptScore W3123723830C108827166 @default.
- W3123723830 hasConceptScore W3123723830C144133560 @default.
- W3123723830 hasConceptScore W3123723830C145097563 @default.
- W3123723830 hasConceptScore W3123723830C149071572 @default.
- W3123723830 hasConceptScore W3123723830C165609540 @default.
- W3123723830 hasConceptScore W3123723830C17744445 @default.
- W3123723830 hasConceptScore W3123723830C185822510 @default.
- W3123723830 hasConceptScore W3123723830C199539241 @default.
- W3123723830 hasConceptScore W3123723830C21021354 @default.
- W3123723830 hasConceptScore W3123723830C2777303138 @default.
- W3123723830 hasConceptScore W3123723830C2777834853 @default.
- W3123723830 hasConceptScore W3123723830C2779602731 @default.
- W3123723830 hasConceptScore W3123723830C2983355114 @default.
- W3123723830 hasConceptScore W3123723830C38652104 @default.
- W3123723830 hasConceptScore W3123723830C41008148 @default.
- W3123723830 hasConceptScore W3123723830C522325796 @default.
- W3123723830 hasIssue "1" @default.
- W3123723830 hasLocation W31237238301 @default.
- W3123723830 hasOpenAccess W3123723830 @default.
- W3123723830 hasPrimaryLocation W31237238301 @default.
- W3123723830 hasRelatedWork W1522899318 @default.
- W3123723830 hasRelatedWork W158900770 @default.
- W3123723830 hasRelatedWork W1608524891 @default.
- W3123723830 hasRelatedWork W1618106022 @default.
- W3123723830 hasRelatedWork W1790745963 @default.
- W3123723830 hasRelatedWork W2009178849 @default.
- W3123723830 hasRelatedWork W2018694710 @default.
- W3123723830 hasRelatedWork W2110269453 @default.
- W3123723830 hasRelatedWork W2153736800 @default.
- W3123723830 hasRelatedWork W2155344039 @default.
- W3123723830 hasRelatedWork W2155945226 @default.
- W3123723830 hasRelatedWork W2181706613 @default.
- W3123723830 hasRelatedWork W2379171910 @default.
- W3123723830 hasRelatedWork W2399942475 @default.
- W3123723830 hasRelatedWork W2631079577 @default.
- W3123723830 hasRelatedWork W2741879333 @default.
- W3123723830 hasRelatedWork W3123060566 @default.
- W3123723830 hasRelatedWork W3123725814 @default.
- W3123723830 hasRelatedWork W3123752842 @default.
- W3123723830 hasRelatedWork W3124399564 @default.
- W3123723830 hasVolume "33" @default.
- W3123723830 isParatext "false" @default.
- W3123723830 isRetracted "false" @default.
- W3123723830 magId "3123723830" @default.
- W3123723830 workType "article" @default.