15,592 research outputs found

    A simple sequent calculus for nominal logic

    Full text link
    Nominal logic is a variant of first-order logic that provides support for reasoning about bound names in abstract syntax. A key feature of nominal logic is the new-quantifier, which quantifies over fresh names (names not appearing in any values considered so far). Previous attempts have been made to develop convenient rules for reasoning with the new-quantifier, but we argue that none of these attempts is completely satisfactory. In this article we develop a new sequent calculus for nominal logic in which the rules for the new- quantifier are much simpler than in previous attempts. We also prove several structural and metatheoretic properties, including cut-elimination, consistency, and equivalence to Pitts' axiomatization of nominal logic

    I Couldn\u27t Call

    Get PDF

    A geographical analysis of Stoneham, Massachusetts.

    Full text link
    Thesis (M.A.)--Boston Universit

    An examination of mobile banking and mobile payments: building adoption as experience goods?

    Get PDF
    This paper examines consumer adoption of mobile banking and mobile payments using the experience goods and learning by doing constructs as a framework to better understand adoption patterns in the United States and how these may differ in other world markets. Consumer experience and familiarity with mobile devices is considered along with three relatively new communication technologies – SMS text messaging, wireless Internet access, and near field communication (NFC) – that are making important contributions to mobile financial services. Online banking and contactless payments — and consumers’ experience with them — are also studied as “building blocks” to mobile financial services. Furthermore, this analysis considers other factors that are affecting adoption patterns, including financial inclusion opportunities, data security problems, and coordination issues. Together, the building blocks and these other factors will influence how markets for mobile financial services develop.

    Identity theft: do definitions still matter?

    Get PDF
    Despite a statutory definition of identity theft, there is a continuing debate on whether differences among the financial frauds associated with identity theft warrant further distinction and treatment, not only by lenders and financial institutions but also by consumers and regulatory and law enforcement agencies. In this Discussion Paper, Julia S. Cheney examines four types of financial fraud – fictitious identity fraud, payment card fraud, account takeover fraud, and true name fraud – that fall under the legal term identity theft to better understand how criminal behavior patterns, risks for consumers and lenders, and mitigation strategies vary depending upon the sort of data stolen, the type of account compromised, and the opportunity for financial gain. Three areas key to developing effective solutions that, in the view of the author, would benefit from further definitional delineations are identified: measuring the success (or failure) of efforts to fight this crime, educating consumers about the risks and responses to this crime, and coordinating mitigation strategies across stakeholders and geographies.Identity theft ; Fraud ; Credit cards

    Heartland Payment Systems: lessons learned from a data breach

    Get PDF
    On August 13, 2009, the Payment Cards Center hosted a workshop examining the changing nature of data security in consumer electronic payments. The center invited the chairman and CEO of Heartland Payment Systems (HPS or Heartland), Robert (Bob) Carr, to lead this discussion and to share his experiences stemming from the data breach at his company in late 2008 and, as important, to discuss lessons learned as a result of this event. The former director of the Payment Cards Center, Peter Burns, who is acting as a senior payments advisor to HPS, also joined the discussion to outline Heartland's post-breach efforts aimed at improving information sharing and data security within the consumer payments industry. In conclusion, Carr introduced several technology solutions that are under discussion in payment security circles as ways to better secure payment card data as they move among the different parties in the card payment systems: end-to-end encryption, tokenization, and chip technology. While HPS has been very supportive of end-to-end encryption, each of these alternatives offers its own set of advantages and disadvantages.Payment systems ; Data protection ; Electronic commerce

    Supply- and demand-side developments influencing growth in the debit market

    Get PDF
    On August 3, 2006, the Payment Cards Center of the Federal Reserve Bank of Philadelphia hosted a workshop led by Ronald Congemi, senior vice president of strategic industry relations for First Data Corporation, to examine developments on both the supply side and demand side that are influencing growth in the debit card market. On the supply side, Congemi addressed banks’ increasing recognition of the importance of payments-related revenues in their institutional profit and loss statements, the effect of differences in interchange fees between PIN and signature debit, and the greater focus on cost structures for debit card issuers. On the demand side, he considered how changes in consumer payment preferences and innovations in the debit market were influencing consumer behavior and payment choice and, ultimately, competition among payment alternatives.Debit cards

    Identity theft: a pernicious and costly fraud

    Get PDF
    On October 3, 2003, the Payment Cards Center of the Federal Reserve Bank of Philadelphia sponsored a workshop on identity theft to examine its growing impact on participants in our payments system. Avivah Litan, vice president and research director of financial services for Gartner Inc., led the workshop. The discussion began and this paper follows with a broad study of identity theft, at times compared with traditional payment fraud, and continues with an evaluation of its overall risk to consumers, merchants, and credit providers. The paper compares the incentives each such party has to address identity theft in concert with current market response to the crime. Finally, the paper concludes by posing several questions for further study. This paper supplements material from Litan’s presentation with additional research on the crime of identity theft.Fraud ; Identity theft

    Prepaid card models: a study in diversity

    Get PDF
    Summary: On January 13, 2005, the Payment Cards Center of the Federal Reserve Bank of Philadelphia sponsored a workshop led by Gary Palmer, chief operating officer and co-founder of WildCard Systems, to examine the developing market for prepaid card products. Palmer described several distinct types of prepaid card value propositions, each with its own set of operational needs and customer servicing requirements. In addition, Palmer described new roles that exist in prepaid card programs that are not present in traditional credit and debit card programs. He emphasized that the variety of these programs’ requirements and the breadth of third party participants create complexities not only in the servicing of these accounts but also in the economics of these programs and the regulation of this payments category.Stored-value cards
    corecore