Academia.eduAcademia.edu

Outline

Combating EFraud on Electronic Payment System

2011, International Journal of Computer Applications

https://doi.org/10.5120/3048-4144

Abstract

The rapid growth of the Internet over the past several years has been fueled mainly by the sharing and transferring of vast amounts of information. This comes from the increased use of the Internet for commercial business transactions, which gives birth to electronic fraud (e-fraud) problems. M ost business transactions are concerned with three types of security. First, they wish to ensure the positive identity of the customer, and that all transactions are sent to the right customer. Second, they want to protect sensitive customer information, such as credit card numbers, bank account numbers, or other personal and financial data. And third, they want to make sure that the data is not altered or changed as it is transmitted across the Internet. This study seeks to redress this situation through the development of a model of the process of e-fraud, using the existing literature as a guide. Based on a broad definition of both e-crime and e-fraud, the resultant model describes the five key elements of e-fraud: perpetrator, mode of attack, target system, target entity and impact. It is envisaged that the model will allow the mechanics and context of e-fraud to be more fully understood, thus assisting in the development and implementation of effective countermeasures.

References (17)

  1. REFERENCES
  2. M anning, R. (1998);
  3. "Electronic Commerce on the Internet" in Olumide, S. A and Falaki, S. O (2001): Electronic Commerce -Promises, Treats, Trust and payment Systems. Conference Proceedings, Computer Association of Nigeria (COAN)
  4. Wortington, T. (2000);
  5. "Internet Payments for Government Agencies Commonwealth of Australia, http://about.Business.gov.au/ipp/ipga.html
  6. Adeola F.O and Falaki S.O (1998); "An encryption/decryption software package based on enhanced vigenere cipher scheme", proceedings of the 14 th National Conference of Computer Association of Nigeria -vol. 9 pp 57
  7. Rivest R. L, Shamir A. and Alderman L. (1978);
  8. "A M ethod for Obtaining Digital Signatures and Public Key Cryptosystems", Comm.ACM , vol. 21 pp 294-299 Schnorr, C.
  9. Kalokata, R. and Whinston, A. (1997), " Electronic Payment System", Addison Wesley, Reading, M ass
  10. Graham, T (2002), "Dispute resolution: E-Fraud and Jurisdiction", viewed 4 February 2002, http://www.tjguk.com/topical/litigation/efraud_and_jurisdic tion_winter2001.html
  11. DOJ (2001a), "Former Cisco Systems, Inc. Accountants Sentenced for Unauthorized Access to Computer Systems to Illegally Issue Almost $8 M illion in Cisco Stock to Themselves", United States Department of Justice (DOJ), viewed 4 February 2003, http://www.cybercrime.gov/Osowski_TangSent.htm
  12. Graycar, A & Smith, R (2002), "Inquiry into Fraud and Electronic Commerce: Emerging trends and best practice responses", Parliament Of Victoria Drugs and Crime Prevention Committee, viewed 1 February 2003, <http://www.parliament.vic.gov.au/dcpc/Reports%20in%2 0PDF/Fraud%20Report_fina l_www.pdf>
  13. KPMG (2000), "E-commerce and Cyber Crime: New Strategies for M anaging the Risks of Exploitation", Forensic and Litigation Services, KPMG LLP, USA, viewed 3 February 2003, <http://www.kpmg.com/Rut2000_prod/Documents/9/Cybe rcrime.pdf>
  14. M alakedsuwan & Stevens A M odel of E-Fraud 7th Pacific Asia Conference on Information Systems, 10-13 July 2003, Adelaide, South Australia
  15. AusCert (2002), "2002 Australian Computer Crime and Security Survey", AusCert, Deloitte Touche Tohmatsu, NSW Police, viewed 31 January 2003, http://www.AusCert.org.au/Information/AusCert_info/2002 cs.pdf
  16. Alexander, M (1996), "The Underground Guide to Computer Security", Addison-Wesley Publishing
  17. Company, Reading, USA