USING FRAUD TREES TO ANALYZE INTERNET CREDIT CARD FRAUD

被引:0
作者
Blackwell, Clive
机构
来源
ADVANCES IN DIGITAL FORENSICS X | 2014年 / 433卷
关键词
Credit card fraud; fraud tree; obstacles; card-not-present transactions; REQUIREMENTS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Because of the difficulties inherent in accurately identifying individuals on the Internet, online merchants reduce the risk of credit card fraud by increasing restrictions on consumers. The restrictions are often overly burdensome on consumers and may result in lost sales. This paper uses the concept of a fraud tree, an extension of an attack tree, to comprehensively model online fraud techniques and to suggest defensive obstacles for merchants to counter threats. The fraud tree model can advise merchants about the checks to be performed to reduce risk even in the presence of incomplete knowledge of the circumstances of the transactions. Since fraud cannot be completely avoided, the paper also describes auditing that can be performed to assist merchants in identifying the responsible parties and potentially limiting, if not avoiding, liability due to fraud.
引用
收藏
页码:17 / 29
页数:13
相关论文
共 16 条
[1]  
[Anonymous], P ACM S DES INT SYST
[2]  
[Anonymous], J LOGIC COMPUTATION
[3]  
[Anonymous], 1993, P 1 ACM C COMPUTER C, DOI [10.1145/168588.168615, DOI 10.1145/168588.168615]
[4]  
Aziz B., 2012, P 2 INT C CYB CRIM S
[5]   A Framework for Digital Forensics and Investigations: The Goal-Driven Approach [J].
Aziz, Benjamin ;
Blackwell, Clive ;
Islam, Shareeful .
INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2013, 5 (02) :1-22
[6]  
Blackwell C, 2013, IFIP ADV INF COMM TE, V410, P153
[7]  
Bond M.Choudary., 2012, CHIP SKIM CLONING EM
[8]   Assessing requirements-related risks through probabilistic goals and obstacles [J].
Cailliau, Antoine ;
van Lamsweerde, Axel .
REQUIREMENTS ENGINEERING, 2013, 18 (02) :129-146
[9]  
Edge K., 2007, IEEE, p144b
[10]  
Murdoch SJ, 2010, LECT NOTES COMPUT SC, V6052, P336, DOI 10.1007/978-3-642-14577-3_27