Location of trusted email for prevention of credit card fraud in soft-products e-commerce

  • Authors:
  • Saleh Alfuraih;Richard Snow

  • Affiliations:
  • School of Computing Science, University of Newcastle upon Tyne, Newcastle upon Tyne, UK;School of Computing Science, University of Newcastle upon Tyne, Newcastle upon Tyne, UK

  • Venue:
  • AIC'04 Proceedings of the 4th WSEAS International Conference on Applied Informatics and Communications
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Soft-products are intangible products that can be consumed without shipment, such as software, music and calling cards (calling time). The demand for soft-products on the Internet has been increasing for the past few years. At the same time, fraudulent credit card transactions have also increased. Compared to tangible products, fraudulent credit card transactions on soft-products are easier to conduct whilst difficult to recover. Fraudulent transactions are a major problem for e-commerce merchants, customers, and credit card issuers. The Trusted Email mechanism is new way to prevent fraudulent transactions on soft-products. Trusted Email is a custom email solution that can uniquely identify and authenticate the online customer, prevent unauthorized credit card transactions, and effectively resolve e-commerce disputes. In this paper we will study where the Trusted Email server should reside, who should handle it and why. In accordance with the best location of the Trusted Email server, Anonymous credit card transactions will be also studied in this paper and the new term "Selective Anonymity" will be introduced.