Theory-W Software Project Management Principles and Examples
IEEE Transactions on Software Engineering
Bridging E-Business and Added Trust: Keys to E-Business Growth
IT Professional
E-Commerce Trust Metrics and Models
IEEE Internet Computing
IEEE Internet Computing
Distributed Data Mining in Credit Card Fraud Detection
IEEE Intelligent Systems
Neural Data Mining for Credit Card Fraud Detection
ICTAI '99 Proceedings of the 11th IEEE International Conference on Tools with Artificial Intelligence
Comprehensive study on methods of fraud prevention in credit card e-payment system
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Hi-index | 0.00 |
Soft-products are intangible products that can be consumed without shipment, such as software, music and calling cards (calling time). The demand for soft-products on the Internet has been increasing for the past few years. At the same time, fraudulent credit card transactions have also increased. Compared to tangible products, fraudulent credit card transactions on soft-products are easier to conduct whilst difficult to recover. Fraudulent transactions are a major problem for e-commerce merchants, customers, and credit card issuers. The Trusted Email mechanism is new way to prevent fraudulent transactions on soft-products. Trusted Email is a custom email solution that can uniquely identify and authenticate the online customer, prevent unauthorized credit card transactions, and effectively resolve e-commerce disputes. In this paper we will study where the Trusted Email server should reside, who should handle it and why. In accordance with the best location of the Trusted Email server, Anonymous credit card transactions will be also studied in this paper and the new term "Selective Anonymity" will be introduced.