44 research outputs found

    An empiric path towards fraud detection and protection for NFC-enabled mobile payment system

    Get PDF
    The synthesis of NFC technology accompanying mobile payment is a state-of-the-art resolution for payment users. In view of rapid development in electronic payment system there is rise in fraudulent activity in banking transactions associated with credit cards and card-not-present transaction. M-Commerce aid the consumers and helps to bestow real-time information in payment system. Due to the familiarization of m-commerce there is cogent increase in the number of fraudulent activities, emerging in billions of dollar loss every year worldwide. To absolute the security breaches, payment transactions could be confined by considering various parameters like user and device authentication, consumer behavior pattern, geolocation and velocity. In this paper we formally assay NFC-enabled mobile payment fraud detection ecosystem using score-based evaluation method. The fraud detection ecosystem will provide a solution based on transaction risk-modeling, scoring transaction, business rule-based, and cross-field referencing. The score-based evaluation method will analyze the transaction and reckon every transaction for fraud risk and take pertinent decision

    An empiric path towards fraud detection and protection for NFC-enabled mobile payment system

    Get PDF
    The synthesis of NFC technology accompanying mobile payment is a state-of-the-art resolution for payment users. In view of rapid development in electronic payment system there is rise in fraudulent activity in banking transactions associated with credit cards and card-not-present transaction. M-Commerce aid the consumers and helps to bestow real-time information in payment system. Due to the familiarization of m-commerce there is cogent increase in the number of fraudulent activities, emerging in billions of dollar loss every year worldwide. To absolute the security breaches, payment transactions could be confined by considering various parameters like user and device authentication, consumer behavior pattern, geolocation and velocity. In this paper we formally assay NFC-enabled mobile payment fraud detection ecosystem using score-based evaluation method. The fraud detection ecosystem will provide a solution based on transaction risk-modeling, scoring transaction, business rule-based, and cross-field referencing. The score-based evaluation method will analyze the transaction and reckon every transaction for fraud risk and take pertinent decision. Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved

    Mobile commerce business models and technologies towards success

    Get PDF
    Mobile commerce is any transaction with a monetary value that is conducted via a mobile telecommunications network. This thesis tries to examine the factors leading to the success of mobile commerce as well as factors that may hinder its success. This research is separated into five parts: In the first part of this thesis, an analysis of wired e-commerce businesses is made; followed by advantages of mobile commerce over wired e-commerce. In the second part of this thesis, new wireless business models that are expected to generate substantial revenue flows as well as some successful examples of these business models are discussed. In the third part of this thesis, advances in wireless technologies that will lead to the success of mobile commerce are discussed. In the fourth part of this thesis, competition strategies and revenue structure of mobile commerce are discussed. And finally, in the fifth part of this thesis, drawbacks of wireless technologies towards the success of mobile commerce as well as how they can be overcome are discussed. The research and the conclusion suggest that although wireless technologies and their related business models are fairly new, they are growing at rapid speed. These are incredible sources of revenue. Once the factors hindering their usability, reliability, development and deployment are overcome, mobile technologies show great potential as revenue generators for both existing and newly developing businesse

    Primitive-based payment systems for flexible value transfer in the personal router

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program, 2002.Includes bibliographical references (p. 149-154).This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.The Personal Router is a mobile communication device developed by the Advanced Network Architecture group at the MIT Laboratory for Computer Science. The Personal Router is able to select and negotiate connectivity with local providers for different kinds of services and interfaces. It needs payment procedures to support these services. As this device is designed to be used in many distinct unpredictable contexts, it cannot implement a single payment system. The complexity of existing payment systems has to be mapped into this new environment. A different payment system must be chosen each time, depending on many variables such as costs, environmental constraints, privacy, user and provider's needs and preferences. Privacy is a major issue for this device. In effect, getting wireless and mobile service everywhere will possibly leave an easily traceable trail; moreover, using this device supposes negotiating with many different untrusted providers and paying for the service. This can create huge potential threats for privacy and personal data management if this issue is not included in the early stage of the design. Legal requirements and user preferences and expectations for privacy in electronic transactions are therefore explored. Past attempts to enhance privacy in different environments are examined. Reasons why most of them have failed and some of them are struggling to stay alive are analyzed. New privacy threats faced by the Personal Router are considered. A new approach based on building blocks is made. Payment systems are split into primitive operations; each of them implements one step of a transaction. The combination of these building blocks replicates a payment protocol. The characteristics of a payment system can then be derived from the analysis of the implementation of each of these primitives. Users' preferences are defined by attributes. Payment systems can then be compared through their primitives and even slightly modified to be closer to users' ideal system by altering the primitives. The modular approach makes this easier. This framework is successfully tested on three major electronic payment systems. Several limitations of this approach and open issues related to the Personal Router are exposed.by Xavier F. Brucker.S.M

    Near Field Communication Applications

    Get PDF
    Near Field Communication (NFC) is a short-range, low power contactless communication between NFC-enabled devices that are held in the closed proximity to each other. NFC technology has been moving rapidly from its initial application areas of mobile payment services and contactless ticketing to the diversity of new areas. Three specific NFC tags highlighted in the thesis have different structures in terms of memory, security and usage in different applications. NFC information tags exploit the data exchange format NDEF standardized by NFC Forum. NFC applications are rapidly stepping into novel and diverse application areas. Often they are deployed in combination with different devices and systems through their integrability and adaptability features. The diverse application areas where NFC tags and cards are used cover smart posters, contactless ticketing, keys and access control, library services, entertainment services, social network services, education, location based services, work force and retail management and healthcare. In designing different NFC applications, it is necessary to take into consideration different design issues such as to choosing the NFC tools and devices according to the technical requirements of the application, considering especially the memory, security and price factors as well as their relation to the purpose and usage of the final product. The security aspect of the NFC tags is remarkably important in selecting the proper NFC device. The race between hackers attacking and breaking the security systems of programmable high level products and manufacturers to produce reliable secure systems and products seems to never end. This has proven to be case, for example, for trying MIFARE Ultralight and DESFire MF3ICD40 tags. An important consideration of studying the different applications of NFC tags and cards during the thesis work was to understand the ubiquitous character of NFC technology.LÀhitunnistus yhteys tekniikka (NFC) on lyhyen tÀhtÀimen, pienitehoinen, kontaktiton yhteydenpito NFC yhteensopivien laitteiden vÀlillÀ, jossa laitteet pidetÀÀn toistensÀ vÀlittömÀssÀ lÀheisyydessÀ tiedon siirtÀmiseksi niiden vÀlillÀ. NFC-teknologia on siirtynyt nopeasti sen alkuperÀisiltÀ toimialueilta eli mobiili maksupalvelujen ja kontaktittomien lippujen sovellusalueilta moninaisille uusille alueille. Kolmella NFC tagillÀ, joita on kÀsitelty tÀssÀ tutkielmassa, on muistin, turvallisuuden ja kÀytön kannalta erilaisiÀ rakenteita, joita kÀytetÀÀn eri sovelluksissa. NFC-tagit kÀyttÀvÀt tiedonvÀlityksessÀ NFC Forumin standardoimaa NDEF-tiedonvaihtoformaattia. NFC sovellukset esiintyvÀt yhÀ enenevÀssÀ mÀÀrin nopeasti kehyttyvillÀ, uudenlaisilla ja monipuolisilla sovellusalueilla, usein yhdessÀ eri laitteiden ja jÀrjestelmien kanssa. NFC on kÀytettÀvissÀ erinÀisten laitteiden kanssa erilaisissa jÀrjestelmÀympÀristöissÀ. Monipuoliset sovellusalueet, joissa muun muassa NFC-tagejÀ ja -kortteja kÀytetÀÀn sisÀltÀvÀt seuraavanlaisia sovelluksia: ÀlykkÀÀt julisteet, kontaktittomat liput, avaimet ja pÀÀsynvalvonta, kirjastopalvelut, viihdepalvelut, sosiaalisen verkoston palvelut, kasvatukseen ja koulutukseen liittyvÀt palvelut, sijaintiperustaiset palvelut, työvoiman ja vÀhittÀiskaupan hallinto-palvelut ja terveyspalvelut. Erilaisten NFC-sovelluksien suunnittelussa on vÀistÀmÀtöntÀ ottaa erilaisia suunnitteluasioita huomioon kuten valita NFC-työkalut ja laitteet sovelluksen teknisten vaatimusten mukaan. Erilaiset tÀrkeÀt tekijÀt kuten muisti, tietoturvallisuusominaisuudet ja hinta ja niiden kaikkien toimivuus lopputuotteen kannalta on otettava huomioon. TietoturvallisuusnÀkökohta on erityisen tÀrkeÀ oikean NFC laitteen valitsemisessa, sillÀ kÀynnissÀ on loputon kilpajuoksu hakkerien, jotka yrittÀvÀt rikkoa ohjelmoitavien korkeatasoisten laitteiden ja tuotteiden tietoturvajÀrjestelmiÀ, ja valmistajien, jotka pyrkivÀt tuottamaan luotettavia varmoja jÀrjestelmiÀ, vÀlillÀ. Tietoturvariskiin liittyviÀ ongelmia on löydetty esimerkiksi MIFARE Ultralight ja DESFire MF3ICD40 tageista. TÀrkeÀ havainto, joka saatiin erilaisten NFC sovelluksien tutkimisesta, oli oivaltaa NFCteknologian potentiaalinen kaikkialle ulottuva, yleiskÀyttöinen luonne

    Digitale Transformation aus unternehmensĂŒbergreifender Perspektive: Management der Koevolution von Plattformbesitzern und Komplementoren in Plattformökosystemen

    Get PDF
    Digital platforms have the potential to transform how organizations are doing business in their respective ecosystems. Motivated by this transformation, the purpose of this thesis is to increase the understanding of digital transformation from an inter-organizational perspective. Therefore, this thesis clarifies the phenomenon of digital transformation, and models and analyzes multiple digital platform ecosystems. Building upon that, this dissertation reflects on multiple case studies on how platform owners can manage the co-evolution of their complementors in digital transformations in digital platform ecosystems.Digitale Plattformen haben das Potential, die Art und Weise, wie Unternehmen in ihren jeweiligen Ökosystemen GeschĂ€fte machen, zu verĂ€ndern. Motiviert durch diese Transformation, ist das Ziel dieser Arbeit, das VerstĂ€ndnis von digitaler Transformation aus einer inter-organisatorischen Perspektive zu erhöhen. Daher erlĂ€utert diese Arbeit das PhĂ€nomen der digitalen Transformation, und modelliert und analysiert mehrere digitale Plattformökosysteme. Darauf aufbauend reflektiert diese Dissertation in mehreren Fallstudien darĂŒber, wie Plattformbesitzer die Koevolution ihrer Komplementoren in digitalen Transformationen in digitalen Plattformökosystemen steuern können

    Towards a user centric model for identity and access management within the online environment

    Get PDF
    Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks to solve this problem through creating a digital identity that is exchangeable across organisational boundaries. Through the setup of collaboration agreements between multiple domains, users can easily switch across domains without being required to sign in again. However, use of this technology comes with risks of user identity and personal information being compromised. Criminals make use of spoofed websites and social engineering techniques to gain illegal access to user information. Due to this, the need for users to be protected from online threats has increased. Two processes are required to protect the user login information at the time of sign-on. Firstly, user’s information must be protected at the time of sign-on, and secondly, a simple method for the identification of the website is required by the user. This treatise looks at the process for identifying and verifying user information, and how the user can verify the system at sign-in. Three models for identity management are analysed, namely the Microsoft .NET Passport, Liberty Alliance Federated Identity for Single Sign-on and the Mozilla TrustBar for system authentication
    corecore