7,095 research outputs found

    Technology Assessment for Cybersecurity Organizational Readiness: Case of Airlines Sector and Electronic Payment

    Get PDF
    Payment processing systems have advanced significantly in the airline business. Because e-payments are easy, they have captured the attention of many companies in the aviation industry and are quickly becoming the dominant means of payment. However, as technology advances, fraud grows at a comparable rate. Over the years, there has been a surge in payment fraud incidents in the airline sector, reducing the platform\u27s trustworthiness. Despite attempts to eliminate epayment fraud, decision-makers lack the technical expertise required to use the finest fraud detection and prevention assessments. This research recognizes the lack of an established decision model as a hurdle and seeks to fix the problem. In response, this research aims to develop a decision model for the airline industry to evaluate the e-payment fraud detection and prevention capabilities of airlines. The literature examines the scope of airline payment fraud to formulate the optimal framework to handle the problem. Guided by the results, the study proceeds to develop an HDM model from experts’ validation, quantification, and desirability inputs. The results of the factors’ validation and quantification show that the Economic and Financial, and the Security perspectives have the most impact on decision-making. Airline companies can use the developed framework to examine whether they are ready to adopt online fraud prevention technologies to increase their success rate. To measure payment organizations\u27 readiness for digital payment fraud protection technologies, a scoring methodology was developed in this research and applied to two case studies

    FundRaiser

    Get PDF
    We are thinking of creating a website that allows individuals to raise money for a variety of occasions, including life milestones like graduations and celebrations as well as difficult situations like accidents and diseases. Users must create an account in order to request money from website subscribers since many of them will assist those in need. The site has to be pushed more on social media platforms such Advertisement Instagram, YouTube, and Facebook Pages so that our website may reach more people online. Admin will handle the users and campaigns and receive a fee of 10% for each transaction. To promote this website, we have a distinct team, and one of its members will be employed in the field of digital marketing. The Framework we are using is .NET Framework, language we are using for Server-Side is C# and Front-End languages are HTML, JavaScript, jQuery, CSS, and Bootstrap. The three roles of this website are User, Donor, and Administrator. User-Any user may sign up on the website and raise money for a range of events, such as significant life events like graduations and celebrations as well as challenging circumstances like accidents and illnesses. Donors-We can attract a lot more donors by promoting private fundraising on social media for a person, a project, or a cause. This will allow donors to get payment URLs so they may donate. Administrator -The administrator will manage the campaigns and users and will be paid 10% of each transaction. Databases, we want to utilize Microsoft SQL Server to store all the data so that we can access, analyze, and notify donors of changes at any time. We are using .Net MVC Core to build a full-stack website

    FundRaiser

    Get PDF
    We are thinking of creating a website that allows individuals to raise money for a variety of occasions, including life milestones like graduations and celebrations as well as difficult situations like accidents and diseases. Users must create an account in order to request money from website subscribers since many of them will assist those in need. The site has to be pushed more on social media platforms such Advertisement Instagram, YouTube, and Facebook Pages so that our website may reach more people online. Admin will handle the users and campaigns and receive a fee of 10% for each transaction. To promote this website, we have a distinct team, and one of its members will be employed in the field of digital marketing. The Framework we are using is .NET Framework, language we are using for Server-Side is C# and Front-End languages are HTML, JavaScript, jQuery, CSS, and Bootstrap. The three roles of this website are User, Donor, and Administrator. User-Any user may sign up on the website and raise money for a range of events, such as significant life events like graduations and celebrations as well as challenging circumstances like accidents and illnesses. Donors-We can attract a lot more donors by promoting private fundraising on social media for a person, a project, or a cause. This will allow donors to get payment URLs so they may donate. Administrator -The administrator will manage the campaigns and users and will be paid 10% of each transaction. Databases, we want to utilize Microsoft SQL Server to store all the data so that we can access, analyze, and notify donors of changes at any time. We are using .Net MVC Core to build a full-stack website

    Computer Abuse -- Controld and Cases

    Get PDF

    Codex Enables Secure Offline Micropayments

    Get PDF
    This paper introduces a new micropayment scheme, suitable for all kinds of transactions, and does not require online transactions for either the payer or payee. The designed method uses an encrypted data structure called Codex which self replicates to represent the current values of both the payer and the payee. The model, while providing fraud detection also guarantees payment & loss recovery

    A New Model to Identify the Reliability and Trust of Internet Banking Users Using Fuzzy Theory and Data-Mining

    Get PDF
    As a result of changes in approach from traditional to virtual banking system, security in data exchange has become more important; thus, it seems essentially necessary to present a pattern based on smart models in order to reduce fraud in this field. A new algorithm has been provided in this article to improve security and to specify the limits of giving special services to Internet banking users in order to pave appropriate ground for virtual banking. In addition to identifying behavioral models of customers, this algorithm compares the behaviors of any customer with this model and finally computes the rate of trust in customer’s behavior. The hybrid data-mining and knowledge based structure has been adapted in this algorithm according to fuzzy systems. In this research, qualitative data was gathered from interviews with banking experts, analyzed by Expert Choice to identify the most important variables of customer behavior analysis, and to analyze customer behavior and customer bank Internet transaction data for a period of one year by MATLAB and Clementine. The results of this survey indicate that the potential of the given structure to recognize the rate of trust in Internet bank user’s behavior might be at reasonable level for experts in this area

    Foreword

    Get PDF

    Electronic security - risk mitigation in financial transactions : public policy issues

    Get PDF
    This paper builds on a previous series of papers (see Claessens, Glaessner, and Klingebiel, 2001, 2002) that identified electronic security as a key component to the delivery of electronic finance benefits. This paper and its technical annexes (available separately at http://www1.worldbank.org/finance/) identify and discuss seven key pillars necessary to fostering a secure electronic environment. Hence, it is intended for those formulating broad policies in the area of electronic security and those working with financial services providers (for example, executives and management). The detailed annexes of this paper are especially relevant for chief information and security officers responsible for establishing layered security. First, this paper provides definitions of electronic finance and electronic security and explains why these issues deserve attention. Next, it presents a picture of the burgeoning global electronic security industry. Then it develops a risk-management framework for understanding the risks and tradeoffs inherent in the electronic security infrastructure. It also provides examples of tradeoffs that may arise with respect to technological innovation, privacy, quality of service, and security in designing an electronic security policy framework. Finally, it outlines issues in seven interrelated areas that often need attention in building an adequate electronic security infrastructure. These are: 1) The legal framework and enforcement. 2) Electronic security of payment systems. 3) Supervision and prevention challenges. 4) The role of private insurance as an essential monitoring mechanism. 5) Certification, standards, and the role of the public and private sectors. 6) Improving the accuracy of information on electronic security incidents and creating better arrangements for sharing this information. 7) Improving overall education on these issues as a key to enhancing prevention.Knowledge Economy,Labor Policies,International Terrorism&Counterterrorism,Payment Systems&Infrastructure,Banks&Banking Reform,Education for the Knowledge Economy,Knowledge Economy,Banks&Banking Reform,International Terrorism&Counterterrorism,Governance Indicators
    • 

    corecore