Matches in SemOpenAlex for { <https://semopenalex.org/work/W841630498> ?p ?o ?g. }
Showing items 1 to 81 of
81
with 100 items per page.
- W841630498 startingPage "47" @default.
- W841630498 abstract "In late 2013, a breach of the cashier system at a major retailer exposed information on 40 million debit and credit cards. That fraudsters can use the payment card numbers harvested in this breach to cre- ate fraudulent payments underscores one of many security weaknesses that can lead to payment fraud. The direct cost of fraud on Automated Clearinghouse (ACH), debit card, and credit card payments reached $6.1 billion in 2012. Investments and ongoing expenses for prevent- ing, detecting, monitoring, and responding to payment fraud add siderably to direct costs. Fraud and security weaknesses in payments can have an indirect cost as well if they cause concerned consumers and businesses to choose less efficient forms of payment. More broadly, the public's loss of confidence in payments has had significant nega- tive economic consequences in the past. A constant stream of news re- ports on data breaches, phishing attacks, spoofed websites, payment card skimmers, fraudulent ATM withdrawals, computer malware, and infiltrated retail point-of-sale systems should concern policymakers be- cause it indicates weak payment security and undermines confidence in payments.Payment participants-end-users who make payments, financial institutions and nonbanks that provide payment services, and networks and service providers that process payments-all have considerable in- centive to secure payments and deter fraud. They value the convenience of non-cash payments and wish to avoid the inconvenience and losses of payment fraud. Under ideal conditions, these incentives would pro- vide a level of payment security that best benefits society. Incentives do not work well, however, when accurate information about security solutions is unavailable, when the consequences of security failures spill over to innocent parties, or when effective security requires difficult coordination of many disparate parties.Consequently, public and private institutions have evolved a con- trol to ensure payment security and deter fraud. The control structure takes a variety of forms, such as setting rules that allocate losses resulting from payment fraud, regulating and supervising the ac- tivities of some payment participants, designing operational procedures that embed security protocols, and coordinating security efforts. Poli- cymakers must assess how well a payment system manages fraud risks given constantly changing threats and complex interdependencies that can cause misaligned incentives. A proper assessment is crucial because improvements to payment security are costly and often in fixed infra- structure that is hard to change.This article examines the problem of controlling payment fraud risk. The first section reviews methods of payment fraud, the levels and trends in the use of these methods, and the resulting losses. At various points, the section studies recent data breaches to illustrate how data useful to payment fraud is exposed and how a virtual fraud factory translates exposed data into payment fraud. The second section discusses how incentives influence payment security, describes the structures that networks and government have established to secure payments and trol payment fraud, and reviews insights from recent research on defense strategies for computer networks. The third section presents examples of changes that would strengthen payment security and deter fraud.The article finds the protection of sensitive data used to commit payment fraud is inadequate and payment participants should make immediate effort to improve data security. Medium-term priorities should target emerging weaknesses in check payment processing and card payment authorization. In the long term, policymakers and indus- try leaders should seek to strengthen the control structure over payment security by making security standards more effective and creating ap- propriate incentives to protect payments.I. THE PROBLEM OF PAYMENT FRAUD IN THE UNITED STATESFraudsters use a variety of methods leading to substantial direct losses to payment participants. …" @default.
- W841630498 created "2016-06-24" @default.
- W841630498 creator A5089983499 @default.
- W841630498 date "2014-06-22" @default.
- W841630498 modified "2023-09-24" @default.
- W841630498 title "Controlling Security Risk and Fraud in Payment Systems" @default.
- W841630498 cites W141849292 @default.
- W841630498 cites W1537414130 @default.
- W841630498 cites W1967757417 @default.
- W841630498 cites W2016855128 @default.
- W841630498 cites W2044660754 @default.
- W841630498 cites W2110522107 @default.
- W841630498 cites W2147583126 @default.
- W841630498 cites W2159957963 @default.
- W841630498 cites W2322673779 @default.
- W841630498 cites W2959792658 @default.
- W841630498 cites W3121548014 @default.
- W841630498 cites W3125987768 @default.
- W841630498 cites W77047371 @default.
- W841630498 hasPublicationYear "2014" @default.
- W841630498 type Work @default.
- W841630498 sameAs 841630498 @default.
- W841630498 citedByCount "0" @default.
- W841630498 crossrefType "posted-content" @default.
- W841630498 hasAuthorship W841630498A5089983499 @default.
- W841630498 hasConcept C10138342 @default.
- W841630498 hasConcept C144133560 @default.
- W841630498 hasConcept C145097563 @default.
- W841630498 hasConcept C162118730 @default.
- W841630498 hasConcept C162324750 @default.
- W841630498 hasConcept C165609540 @default.
- W841630498 hasConcept C175444787 @default.
- W841630498 hasConcept C185822510 @default.
- W841630498 hasConcept C21021354 @default.
- W841630498 hasConcept C2777303138 @default.
- W841630498 hasConcept C29122968 @default.
- W841630498 hasConcept C2983355114 @default.
- W841630498 hasConcept C38652104 @default.
- W841630498 hasConcept C41008148 @default.
- W841630498 hasConceptScore W841630498C10138342 @default.
- W841630498 hasConceptScore W841630498C144133560 @default.
- W841630498 hasConceptScore W841630498C145097563 @default.
- W841630498 hasConceptScore W841630498C162118730 @default.
- W841630498 hasConceptScore W841630498C162324750 @default.
- W841630498 hasConceptScore W841630498C165609540 @default.
- W841630498 hasConceptScore W841630498C175444787 @default.
- W841630498 hasConceptScore W841630498C185822510 @default.
- W841630498 hasConceptScore W841630498C21021354 @default.
- W841630498 hasConceptScore W841630498C2777303138 @default.
- W841630498 hasConceptScore W841630498C29122968 @default.
- W841630498 hasConceptScore W841630498C2983355114 @default.
- W841630498 hasConceptScore W841630498C38652104 @default.
- W841630498 hasConceptScore W841630498C41008148 @default.
- W841630498 hasLocation W8416304981 @default.
- W841630498 hasOpenAccess W841630498 @default.
- W841630498 hasPrimaryLocation W8416304981 @default.
- W841630498 hasRelatedWork W1576675952 @default.
- W841630498 hasRelatedWork W1606029113 @default.
- W841630498 hasRelatedWork W1996076764 @default.
- W841630498 hasRelatedWork W1998523314 @default.
- W841630498 hasRelatedWork W2081483343 @default.
- W841630498 hasRelatedWork W2096307185 @default.
- W841630498 hasRelatedWork W2159778196 @default.
- W841630498 hasRelatedWork W2165426838 @default.
- W841630498 hasRelatedWork W2359243630 @default.
- W841630498 hasRelatedWork W2363348952 @default.
- W841630498 hasRelatedWork W2366828863 @default.
- W841630498 hasRelatedWork W2488586126 @default.
- W841630498 hasRelatedWork W2774966565 @default.
- W841630498 hasRelatedWork W3122329186 @default.
- W841630498 hasRelatedWork W3125262066 @default.
- W841630498 hasRelatedWork W3125826719 @default.
- W841630498 hasRelatedWork W3183852683 @default.
- W841630498 hasRelatedWork W345959348 @default.
- W841630498 hasRelatedWork W67341392 @default.
- W841630498 hasRelatedWork W2625283619 @default.
- W841630498 isParatext "false" @default.
- W841630498 isRetracted "false" @default.
- W841630498 magId "841630498" @default.
- W841630498 workType "article" @default.