TRUSTED EMAIL - A Proposed Approach to Prevent Credit Card Fraud in Soft-Products E-Commerce

Nien T. Sui, Saleh I. Alfuraih, Dennis McLeod

2004

Abstract

Soft-products are intangible products that can be consumed without shipment, such as software, music and calling cards (calling time). The demand for soft-products on the Internet has been increasing for the past few years. At the same time, fraudulent credit card transactions have also increased. Compared to tangible products, fraudulent credit card transactions on soft-products are easier to conduct while difficult to recover. The fraudulent transaction is a major problem for e-commerce merchants, customers, and credit card issuers. In this paper, we classify the type of products sold on the Internet, and the common fraud that occurs for each type. We review some of the best existing credit card fraud prevention methods and introduce the Trusted email mechanism as a new way to prevent fraudulent transactions on soft-product. Trusted email is a custom email solution that can uniquely identify and authenticate the online customer, prevent unauthorized credit card transactions, and effectively resolve e-commerce disputes.

References

  1. Aleskerov, E., Freisleben, B., Rao, B. (1997) CARDWATCH: a neural network based database mining system for credit card fraud detection. Computational Intelligence for Financial Engineering (CIFEr), 1997., Proceedings of the IEEE/IAFE 1997 , 1997 Page(s): 220 -226
  2. Alfuraih, Saleh, Sui, Nien T. Sui, McLeod, Dennis (2002). Using trusted Email to Prevent Credit Card Frauds in Multimedia Products, World Wide Web 5(2): 245-262
  3. AntiFraud.com, Online Fraud Prevention Tips, (n.d.), Retrieved March 10, 2002, from http://www.antifraud.com/tips.htm
  4. Atif, Y. (2002), Building trust in e-commerce, Internet Computing, IEEE , Volume: 6 Issue: 1 , Jan/Feb 2002 Page(s): 18 -24
  5. Boehm, B.W.; Ross, R. (1989), Theory-W software project management principles and examples, IEEE Transactions on Software Engineering, Volume: 15 Issue: 7, Jul 1989 Page(s): 902 -916
  6. Boehm, B., Bose, P., Horowitz, E., Ming-June Lee (1994), Software requirements as negotiated win conditions, Proceedings of Requirements Engineering, 1994., 18- 22 Apr 1994 Page(s): 74 -83
  7. Brause, R., Langsdorf, T., Hepp, M. (1999) Neural data mining for credit card fraud detection. Proceedings of 11th IEEE International Conference on Tools with Artificial Intelligence, 1999 Page(s): 103 -106
  8. Bruno, Maria, (n.d) Microsoft Gives Boost to Surrogate Card Numbers. Bank Technology News, Retrieved March 10, 2002, from http://www.banktechnews.com/btn/articles/btnoct01- 1.shtml
  9. CCPS, Address Verification Service (n.d.), Retrieved March 10, 2002, from http://mcvisa.com/avs.html
  10. Chan, P.K., Fan, W., Prodromidis, A.L., Stolfo, S.J (1999), Distributed data mining in credit card fraud detection. IEEE Intelligent Systems Volume: 14 Issue: 6 , Nov.-Dec. 1999 Page(s): 67 -74
  11. Duvall, Mel, (2001) Consortium to Facilitate Internet Payments. Interactive Week September 24, 2001 Issue page 26
  12. Ghosh, S., Reilly, D.L.(1994) Credit card fraud detection with a neural-network. System Sciences, Proceedings of the Twenty-Seventh Hawaii International Conference on Information Systems: Decision Support and Knowledge-Based Systems, 1994 Vol.III Page(s): 621 -630
  13. Hanagandi, V.; Dhar, A.; Buescher, K. (1996) Densitybased clustering and radial basis function modeling to generate credit card fraud scores. Computational Intelligence for Financial Engineering, 1996., Proceedings of the IEEE/IAFE 1996 Conference on , 1996 Page(s): 247 -251
  14. Heun, Christopher T. (2002), Fear of Fraud InformationWeek.com (March 4, 2002), Retrieved March 10, 2002, from http://www.informationweek.com/story/IWK20020301 S0002
  15. Hsiung, H. Sheurich, S. and Ferrante, F. (2001), Bridging E-Business and Added Trust: Keys to E-Business Growth, IT Professional, vol. 3, no. 2, Mar. 2001, pp. 41-45.
  16. Lee, Zon-Yau, Yu, Hsiao-Cheng, Ku, Pei-Jen (2001), An analysis and comparison of different types of electronic payment systems, Management of Engineering and Technology, 2001. PICMET 7801, Volume: Supplement, 2001, Page(s): 38 -45 vol.2
  17. Manchala, D.W. (2000), E-Commerce Trust Metrics and Models, IEEE Internet Computing, vol. 4, no. 2, 2000, pp. 36-44.
  18. Moore, Geoffrey A. (1999), Crossing the Chasm: Marketing and Selling High-Tech Products to Mainstream Customers, HarperCollins Publishers, 1999
  19. PayPal, Fraud Prevention Tips For Sellers, (n.d.), Retrieved March 10, 2002, from http://www.paypal.com/cgibin/webscr?cmd=p/gen/fraud-tips-sellers-outside
  20. Postiva.com Trusted Sender Program, (n.d.), Retrieved June 10, 2003, from http://www.postiva.com/article/articlestatic/17/1/5/
  21. Syeda, M., Yan-Qing Zhang, Yi Pan, (2002) Parallel granular neural networks for fast credit card fraud detection, Fuzzy Systems, 2002. Proceedings of FUZZIEEE'02, Volume: 1, 2002 Page(s): 572 -577
  22. TRUSTe and ePrivacy Group, Trusted Sender program, (n.d.), Retrieved June 10, 2003, from http://www.truste.org/programs/pub_trustedsender.htm l
  23. Vantage Card Services, Inc, Prevent Chargebacks, (n.d) Retrieved Oct 1, 2003, from http://www.vantagecard.com/html/preventchargebacks. html
  24. VeriSign, Address Verification Service (AVS) Security Feature, (n.d.), Retrieved March 10, 2002, from http://www.verisign.com/support/payflow/genResource s/avs.html
Download


Paper Citation


in Harvard Style

T. Sui N., I. Alfuraih S. and McLeod D. (2004). TRUSTED EMAIL - A Proposed Approach to Prevent Credit Card Fraud in Soft-Products E-Commerce . In Proceedings of the Sixth International Conference on Enterprise Information Systems - Volume 4: ICEIS, ISBN 972-8865-00-7, pages 106-113. DOI: 10.5220/0002612101060113


in Bibtex Style

@conference{iceis04,
author={Nien T. Sui and Saleh I. Alfuraih and Dennis McLeod},
title={TRUSTED EMAIL - A Proposed Approach to Prevent Credit Card Fraud in Soft-Products E-Commerce},
booktitle={Proceedings of the Sixth International Conference on Enterprise Information Systems - Volume 4: ICEIS,},
year={2004},
pages={106-113},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002612101060113},
isbn={972-8865-00-7},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Sixth International Conference on Enterprise Information Systems - Volume 4: ICEIS,
TI - TRUSTED EMAIL - A Proposed Approach to Prevent Credit Card Fraud in Soft-Products E-Commerce
SN - 972-8865-00-7
AU - T. Sui N.
AU - I. Alfuraih S.
AU - McLeod D.
PY - 2004
SP - 106
EP - 113
DO - 10.5220/0002612101060113