Skip to main content
Log in

Using Trusted Email to Prevent Credit Card Frauds in Multimedia Products

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

This paper focuses on credit card fraud in Multimedia Products, which are soft-products. By soft-products, we mean intangible products that can be used and consumed without having them shipped physically, such as software, music and calling cards (calling time). The demand for soft-products, mainly Multimedia Products, on the Internet has grown in the last few years and is rapidly increasing. Credit card fraudulent transactions on such products are very easy to conduct, while very difficult to recover, compared to the fraud cases in hard-products transactions. This paper classifies the types of products sold on the Internet, and the usual fraud occurred in each type. It summarizes some of the existing best practices to prevent credit card fraud. Finally, it introduces the use of a Trusted Email as a way to authenticate the customer and to simulate his/her physical address (since on these products no actual shipping will happen).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. E. Aleskerov, B. Freisleben, and B. Rao, “CARDWATCH: A neural network based database mining system for credit card fraud detection,” in Computational Intelligence for Financial Engineering (CIFEr), Proceedings of the IEEE/IAFE 1997, 1997, pp. 220–226.

  2. R. Brause, T. Langsdorf, and M. Hepp, “Neural data mining for credit card fraud detection,” in Proceedings of 11th IEEE International Conference on Tools with Artificial Intelligence, 1999, pp. 103–106.

  3. M. Bruno, “Microsoft gives boost to surrogate card numbers,” Bank Technology News, http://www. breakbanktechnews.com/btn/articles/btnoct01-1.shtml

  4. P. K. Chan, W. Fan, A. L. Prodromidis, and S. J. Stolfo, “Distributed data mining in credit card fraud detection,” IEEE Intelligent Systems14(6), November–December 1999, pp. 67–74.

    Google Scholar 

  5. M. Duvall, “Consortium to facilitate Internet payments,” Interactive Week, September 24, 2001, 26.

  6. S. Ghosh and D. L. Reilly, “Credit card fraud detection with a neural-network,” in Proceedings of the Twenty-Seventh Hawaii International Conference on Information Systems: Decision Support and Knowledge-Based Systems, System Sciences, Vol. 8, 1994, pp. 621–630.

    Google Scholar 

  7. V. Hanagandi, A. Dhar, and K. Buescher, “Density-based clustering and radial basis function modeling to generate credit card fraud scores,” in Proceedings of the IEEE/IAFE 1996 Conference on Computational Intelligence for Financial Engineering, 1996, pp. 247–251.

  8. Ch. T. Heun, “Fear of fraud,” Information Week.com, March 4, 2002, http://www.information-week. com/story/IWK20020301S0002

  9. Vantage Card Services Inc., Prevent chargebacks, http://www.vantagecard.com/html/ preventchargebacks.html

  10. Yahoo, Merchant operating procedures guide, http://sg.store.yahoo.com/mopg.html

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Alfuraih, S.I., Sui (Alsawi), N.T. & McLeod, D. Using Trusted Email to Prevent Credit Card Frauds in Multimedia Products. World Wide Web 5, 245–256 (2002). https://doi.org/10.1023/A:1020940830716

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1020940830716

Navigation