SlideShare a Scribd company logo
1 of 42
Download to read offline
The need for a secure &
trusted payment instrument in
e-commerce
Ali AlMeshal
Agenda
 Characteristics of Card
Present & CNP
 Did you Know ?
 Type of Fraud in E-comm.
 Commerce Partners & their
needs
 Conclusion
In Physical/Real World
 Hand over card
 Visual check
 Swipe in POS
 Online authorization
 Receipt with signature
panel
 Sign or Pin
 Check signature
Visa Card Security Features
Visa Card Security Features
Visa Card Security Features
Smart Card
Counterfeit Cards
Counterfeit Cards
Counterfeit Cards
In Virtual World
 Cardholder is remote
 Virtual shopper
 Card Not Present - CNP
Most Common Types of e-Channels
E-Commerce
Call Center/MOTO
Mobile Commerce
Did You Know…?
 Significant increases in card
not present fraud linked to
compromise of data and
greater opportunities for MOTO
and e-commerce
 Improved security for card
present transactions means a
greater emphasis by card
criminals on CNP fraud
 Large scale compromise of
cardholder and account data
affecting Members and
consumers worldwide
Did You Know…?
Research and advisory firm
Aite Group expects U.S.
card-not-present fraud
costs, which grew more
than 33% between 2011
and 2013 to continue to
rise. By 2018, it expects
such losses will reach $6.4
billion, more than three
times the $2.1 billion in
losses reported in 2011
Did You Know…?
 The value of fraud loss on one of
Credit Cards brands worldwide was
around $2.8 billion
 This figure represents 0.09% of
total brand sales volume worldwide
 When a Credit card is stolen the
average amount spent on that card
before detection is $650
Did You Know…?
Over 5 million Visa cardholders
make one or more purchases
every year without their card
ever being present at the point
of transaction
Did You Know…?
e-Commerce sales
worldwide will reach
$1.7 trillion in 2015
DIVANTE
BUSEINSS SERVICES
Did You Know…?
 International Order Risk 2 ½ Times
Higher Than Domestic Orders
On average, merchants say the
rate of fraud associated with
international orders is two-and-
one-half times as high as domestic
orders. Merchants also reject
international orders at a rate three
times higher than domestic orders.
CyberSource
ATM Fraud - “helpful bystander”
ATM Fraud - “helpful bystander”
ATM Fraud - “helpful bystander”
ATM Fraud - “helpful bystander”
ATM Fraud - “helpful bystander”
ATM Fraud - “helpful bystander”
ATM Fraud - “helpful bystander”
ATM Fraud - “helpful bystander”
ATM Fraud - “helpful bystander”
 Inadequate or total lack of specific
criminal legislation
 Weak sentencing
 High profit margins
 Ease of international travel
 Limited co-operation between Law
Enforcement in different countries &
jurisdiction issues
 Payment card fraud at present = low
risk, high reward
Why Is Fraud So Popular?
Fraud Distribution
 Lost cards & Stolen cards 26%
 Not received as issued (NRI) 2%
 Fraudulent application 2%
 Counterfeit cards 34%
 Miscellaneous 3%
 Fraudulent use of account (CNP) 33%
Types of E-commerce Fraud - Phishing attacks,
Gartner Survey Shows Phishing Attacks in
one year is More than $3 Billion Lost to
These Attacks .
Debit Cards Emerged as the Financial Instrument
Targeted Most by Fraudsters
 47 percent debit or check card
 32 percent a credit card
 24 percent bank account
“Friendly”
Fraud?
Types of E-commerce Fraud
Genuine Cardholder denies having
placed or received the order.
Consumer become aware of this
loophole in Credit card industry
Types of E-commerce Fraud
 Counterfeit
Duplicating the full plastic
data
 Account Number Generation
 Data Compromising
 Others….
Commerce Partners
(customers, merchants and financial organizations)
􀂃 What factors influence the level of trust
in the Internet?
􀂃 How does trust influence participation in
ecommerce?
Consumer eConfidence
Consumer eConfidence is a
cross-reference between the
degree of trust a consumer has
in a website or business and
the perceived level of security
that must be present on the
website before the consumer
will share any personal
information.
2 0 0 7 eCommerce Chargeback Report
Party Trust + Control Trust = Transaction Trust. The strength of control trust depends not
only on the control mechanisms used, but is also influenced by how much trust a party
Y. Tan, W. Thoen, A formal analysis of a generic model of trust for electronic commerce, Journal of Decision Support Systems, Vol 33,2002, pp. 233–246.
Commerce Partners
(customers, merchants and financial organizations)
Security tools for e-comm.
 PCI (Payment Card Industry)
 DSS (Data Security Standard)
 CVV2 & CVC2 (Card Verification Value /
Code )
 SSL – SET and 3DS ( 3 Domain Security)
Conclusion
 It is very much clear that all commerce partners need
batter tools, consistent guidelines, cooperation and
support from all concerns in the e-business. Trust and
security are the key requirement for the e-commerce
business which drive the confidence in sharing the
personal information on the net.
 Fraud and risk management in the payment industry
have always been the key concerns to the commerce
partners. However strong combined strategies from the
financial institutions, merchants and consumers, should
be able to address these new fraud phenomena and
challenges.
Thank You

More Related Content

What's hot

Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensicswhbrown5
 
A42 banks race to defend from further reputational damage
A42   banks race to defend from further reputational damageA42   banks race to defend from further reputational damage
A42 banks race to defend from further reputational damageFreddie McMahon
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106Ted Richmond
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
ATM Fraud Prevention Management White Paper from ESQ
 ATM Fraud Prevention Management White Paper from ESQ ATM Fraud Prevention Management White Paper from ESQ
ATM Fraud Prevention Management White Paper from ESQESQ Business Services
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International PerspectiveSteve Mitchinson
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassThe ID Co.
 
E-commerce: who carries the risk of fraud?
E-commerce: who carries the risk of fraud?E-commerce: who carries the risk of fraud?
E-commerce: who carries the risk of fraud?blogzilla
 
EMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment ProcessEMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment Process- Mark - Fullbright
 
Verizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xgVerizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xgCMR WORLD TECH
 
Calculating the Real ROI of Implementing a Biometridc Authentic Solution
Calculating the Real ROI of Implementing a Biometridc Authentic SolutionCalculating the Real ROI of Implementing a Biometridc Authentic Solution
Calculating the Real ROI of Implementing a Biometridc Authentic SolutionSamsung SDS America
 
CNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsCNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsChristopher Uriarte
 
June 2017 - The Alternative Lending Report
June 2017 - The Alternative Lending ReportJune 2017 - The Alternative Lending Report
June 2017 - The Alternative Lending Reportclaytonroot
 

What's hot (17)

Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensics
 
A42 banks race to defend from further reputational damage
A42   banks race to defend from further reputational damageA42   banks race to defend from further reputational damage
A42 banks race to defend from further reputational damage
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
ATM Fraud Prevention Management White Paper from ESQ
 ATM Fraud Prevention Management White Paper from ESQ ATM Fraud Prevention Management White Paper from ESQ
ATM Fraud Prevention Management White Paper from ESQ
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce Masterclass
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
E-commerce: who carries the risk of fraud?
E-commerce: who carries the risk of fraud?E-commerce: who carries the risk of fraud?
E-commerce: who carries the risk of fraud?
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
 
EMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment ProcessEMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment Process
 
Internet fraud
Internet fraudInternet fraud
Internet fraud
 
Verizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xgVerizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xg
 
Calculating the Real ROI of Implementing a Biometridc Authentic Solution
Calculating the Real ROI of Implementing a Biometridc Authentic SolutionCalculating the Real ROI of Implementing a Biometridc Authentic Solution
Calculating the Real ROI of Implementing a Biometridc Authentic Solution
 
CNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsCNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift Cards
 
June 2017 - The Alternative Lending Report
June 2017 - The Alternative Lending ReportJune 2017 - The Alternative Lending Report
June 2017 - The Alternative Lending Report
 

Viewers also liked

Thinakaran_resume
Thinakaran_resumeThinakaran_resume
Thinakaran_resumethina karan
 
EMC_Mozy_Users_Guide
EMC_Mozy_Users_GuideEMC_Mozy_Users_Guide
EMC_Mozy_Users_GuideEric Roberson
 
Discipline Models
Discipline ModelsDiscipline Models
Discipline Modelsjkitt5
 
Low Self Esteem Research
Low Self Esteem ResearchLow Self Esteem Research
Low Self Esteem ResearchAshley Williams
 
ENG3329_Environmental_Writing_greening_of_datacenters
ENG3329_Environmental_Writing_greening_of_datacentersENG3329_Environmental_Writing_greening_of_datacenters
ENG3329_Environmental_Writing_greening_of_datacentersEric Roberson
 
Gevorg hayrapetyan
Gevorg hayrapetyanGevorg hayrapetyan
Gevorg hayrapetyanArm Igf
 
Vahan Hovsepyan - Internet of Things: Big Data and Big Opportunities for Econ...
Vahan Hovsepyan - Internet of Things: Big Data and Big Opportunities for Econ...Vahan Hovsepyan - Internet of Things: Big Data and Big Opportunities for Econ...
Vahan Hovsepyan - Internet of Things: Big Data and Big Opportunities for Econ...Arm Igf
 

Viewers also liked (17)

Thinakaran_resume
Thinakaran_resumeThinakaran_resume
Thinakaran_resume
 
Natali
NataliNatali
Natali
 
3 pictures
3 pictures 3 pictures
3 pictures
 
Wisdom
WisdomWisdom
Wisdom
 
EMC_Mozy_Users_Guide
EMC_Mozy_Users_GuideEMC_Mozy_Users_Guide
EMC_Mozy_Users_Guide
 
Discipline Models
Discipline ModelsDiscipline Models
Discipline Models
 
Report
ReportReport
Report
 
3.3.3 ppp slides
3.3.3 ppp slides3.3.3 ppp slides
3.3.3 ppp slides
 
Low Self Esteem Research
Low Self Esteem ResearchLow Self Esteem Research
Low Self Esteem Research
 
Evaluacion sitios web (1)
Evaluacion sitios web (1)Evaluacion sitios web (1)
Evaluacion sitios web (1)
 
La justicia de paz
La justicia de pazLa justicia de paz
La justicia de paz
 
ENG3329_Environmental_Writing_greening_of_datacenters
ENG3329_Environmental_Writing_greening_of_datacentersENG3329_Environmental_Writing_greening_of_datacenters
ENG3329_Environmental_Writing_greening_of_datacenters
 
Folder Evidence
Folder EvidenceFolder Evidence
Folder Evidence
 
Sustainability Hub Presentation
Sustainability Hub PresentationSustainability Hub Presentation
Sustainability Hub Presentation
 
Desarrollo de la ciencia
Desarrollo de la ciencia Desarrollo de la ciencia
Desarrollo de la ciencia
 
Gevorg hayrapetyan
Gevorg hayrapetyanGevorg hayrapetyan
Gevorg hayrapetyan
 
Vahan Hovsepyan - Internet of Things: Big Data and Big Opportunities for Econ...
Vahan Hovsepyan - Internet of Things: Big Data and Big Opportunities for Econ...Vahan Hovsepyan - Internet of Things: Big Data and Big Opportunities for Econ...
Vahan Hovsepyan - Internet of Things: Big Data and Big Opportunities for Econ...
 

Similar to Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015

Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008ClubHack
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments FraudChristopher Uriarte
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersEckoh
 
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?- Mark - Fullbright
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersCognizant
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayIRJET Journal
 
Credit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning AlgorithmCredit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning AlgorithmIRJET Journal
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...Elizabeth Dimit
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments FraudChristopher Uriarte
 
QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011jhatch9418
 
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...ijtsrd
 
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?Solutionreach
 
Fraud management - eCommerce fraud explained
Fraud management - eCommerce fraud explainedFraud management - eCommerce fraud explained
Fraud management - eCommerce fraud explainedAaronSmith41007
 
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The i-Capital Africa Institute
 
Ultimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptxUltimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptxFTx Identity
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptxdarrengracia
 
PCI Compliance Seminar
PCI Compliance SeminarPCI Compliance Seminar
PCI Compliance Seminardlinehan2
 
EBE 2019 - The end of passwords: Two-factor-authentication and biometrics are...
EBE 2019 - The end of passwords: Two-factor-authentication and biometrics are...EBE 2019 - The end of passwords: Two-factor-authentication and biometrics are...
EBE 2019 - The end of passwords: Two-factor-authentication and biometrics are...E-Commerce Berlin EXPO
 
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Brunswick Group
 

Similar to Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015 (20)

Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments Fraud
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact Centers
 
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
 
Fraud management optimisation
Fraud management optimisation Fraud management optimisation
Fraud management optimisation
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
Credit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning AlgorithmCredit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning Algorithm
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments Fraud
 
QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011
 
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
 
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
 
Fraud management - eCommerce fraud explained
Fraud management - eCommerce fraud explainedFraud management - eCommerce fraud explained
Fraud management - eCommerce fraud explained
 
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
 
Ultimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptxUltimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptx
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
 
PCI Compliance Seminar
PCI Compliance SeminarPCI Compliance Seminar
PCI Compliance Seminar
 
EBE 2019 - The end of passwords: Two-factor-authentication and biometrics are...
EBE 2019 - The end of passwords: Two-factor-authentication and biometrics are...EBE 2019 - The end of passwords: Two-factor-authentication and biometrics are...
EBE 2019 - The end of passwords: Two-factor-authentication and biometrics are...
 
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
 

More from Arm Igf

Sorina Teleanu
Sorina TeleanuSorina Teleanu
Sorina TeleanuArm Igf
 
Michael Yakushev
Michael YakushevMichael Yakushev
Michael YakushevArm Igf
 
Lianna Galstyan
Lianna GalstyanLianna Galstyan
Lianna GalstyanArm Igf
 
Bagrat yengibaryan
Bagrat yengibaryanBagrat yengibaryan
Bagrat yengibaryanArm Igf
 
Vladimir Sahakyan - The National Research and Education Network. Problems and...
Vladimir Sahakyan - The National Research and Education Network. Problems and...Vladimir Sahakyan - The National Research and Education Network. Problems and...
Vladimir Sahakyan - The National Research and Education Network. Problems and...Arm Igf
 
Tigran Zargaryan - Digital Public Library of Armenia: a Dream or a Reality - ...
Tigran Zargaryan - Digital Public Library of Armenia: a Dream or a Reality - ...Tigran Zargaryan - Digital Public Library of Armenia: a Dream or a Reality - ...
Tigran Zargaryan - Digital Public Library of Armenia: a Dream or a Reality - ...Arm Igf
 
Ruben Muradyan - Cybersecurity - ArmIGF 2015
Ruben Muradyan - Cybersecurity - ArmIGF 2015Ruben Muradyan - Cybersecurity - ArmIGF 2015
Ruben Muradyan - Cybersecurity - ArmIGF 2015Arm Igf
 
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015Arm Igf
 
Lianna Galstyan - Internationalized Domain Name .հայ for Armenia - ArmIGF2015
Lianna Galstyan - Internationalized Domain Name .հայ for Armenia - ArmIGF2015Lianna Galstyan - Internationalized Domain Name .հայ for Armenia - ArmIGF2015
Lianna Galstyan - Internationalized Domain Name .հայ for Armenia - ArmIGF2015Arm Igf
 
Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015Arm Igf
 
Hayk Chobanyan - E-TOOLS FOR E-SERVICES - ArmIGF2015
Hayk Chobanyan - E-TOOLS FOR E-SERVICES - ArmIGF2015Hayk Chobanyan - E-TOOLS FOR E-SERVICES - ArmIGF2015
Hayk Chobanyan - E-TOOLS FOR E-SERVICES - ArmIGF2015Arm Igf
 
Grigori Saghyan - Multistakeholder Internet Governance possible solutions - ...
Grigori Saghyan - Multistakeholder Internet Governance  possible solutions - ...Grigori Saghyan - Multistakeholder Internet Governance  possible solutions - ...
Grigori Saghyan - Multistakeholder Internet Governance possible solutions - ...Arm Igf
 
Gagik sargsyan - The impact of Internet on further development of Armenian SM...
Gagik sargsyan - The impact of Internet on further development of Armenian SM...Gagik sargsyan - The impact of Internet on further development of Armenian SM...
Gagik sargsyan - The impact of Internet on further development of Armenian SM...Arm Igf
 
Armen Nazaryan - Oбщество Интернет и Инвалиды по зрению - ArmIGF 2015
Armen Nazaryan - Oбщество Интернет и Инвалиды по зрению - ArmIGF 2015Armen Nazaryan - Oбщество Интернет и Инвалиды по зрению - ArmIGF 2015
Armen Nazaryan - Oбщество Интернет и Инвалиды по зрению - ArmIGF 2015Arm Igf
 

More from Arm Igf (14)

Sorina Teleanu
Sorina TeleanuSorina Teleanu
Sorina Teleanu
 
Michael Yakushev
Michael YakushevMichael Yakushev
Michael Yakushev
 
Lianna Galstyan
Lianna GalstyanLianna Galstyan
Lianna Galstyan
 
Bagrat yengibaryan
Bagrat yengibaryanBagrat yengibaryan
Bagrat yengibaryan
 
Vladimir Sahakyan - The National Research and Education Network. Problems and...
Vladimir Sahakyan - The National Research and Education Network. Problems and...Vladimir Sahakyan - The National Research and Education Network. Problems and...
Vladimir Sahakyan - The National Research and Education Network. Problems and...
 
Tigran Zargaryan - Digital Public Library of Armenia: a Dream or a Reality - ...
Tigran Zargaryan - Digital Public Library of Armenia: a Dream or a Reality - ...Tigran Zargaryan - Digital Public Library of Armenia: a Dream or a Reality - ...
Tigran Zargaryan - Digital Public Library of Armenia: a Dream or a Reality - ...
 
Ruben Muradyan - Cybersecurity - ArmIGF 2015
Ruben Muradyan - Cybersecurity - ArmIGF 2015Ruben Muradyan - Cybersecurity - ArmIGF 2015
Ruben Muradyan - Cybersecurity - ArmIGF 2015
 
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
 
Lianna Galstyan - Internationalized Domain Name .հայ for Armenia - ArmIGF2015
Lianna Galstyan - Internationalized Domain Name .հայ for Armenia - ArmIGF2015Lianna Galstyan - Internationalized Domain Name .հայ for Armenia - ArmIGF2015
Lianna Galstyan - Internationalized Domain Name .հայ for Armenia - ArmIGF2015
 
Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015
 
Hayk Chobanyan - E-TOOLS FOR E-SERVICES - ArmIGF2015
Hayk Chobanyan - E-TOOLS FOR E-SERVICES - ArmIGF2015Hayk Chobanyan - E-TOOLS FOR E-SERVICES - ArmIGF2015
Hayk Chobanyan - E-TOOLS FOR E-SERVICES - ArmIGF2015
 
Grigori Saghyan - Multistakeholder Internet Governance possible solutions - ...
Grigori Saghyan - Multistakeholder Internet Governance  possible solutions - ...Grigori Saghyan - Multistakeholder Internet Governance  possible solutions - ...
Grigori Saghyan - Multistakeholder Internet Governance possible solutions - ...
 
Gagik sargsyan - The impact of Internet on further development of Armenian SM...
Gagik sargsyan - The impact of Internet on further development of Armenian SM...Gagik sargsyan - The impact of Internet on further development of Armenian SM...
Gagik sargsyan - The impact of Internet on further development of Armenian SM...
 
Armen Nazaryan - Oбщество Интернет и Инвалиды по зрению - ArmIGF 2015
Armen Nazaryan - Oбщество Интернет и Инвалиды по зрению - ArmIGF 2015Armen Nazaryan - Oбщество Интернет и Инвалиды по зрению - ArmIGF 2015
Armen Nazaryan - Oбщество Интернет и Инвалиды по зрению - ArmIGF 2015
 

Recently uploaded

Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 

Recently uploaded (20)

Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 

Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015

  • 1. The need for a secure & trusted payment instrument in e-commerce Ali AlMeshal
  • 2. Agenda  Characteristics of Card Present & CNP  Did you Know ?  Type of Fraud in E-comm.  Commerce Partners & their needs  Conclusion
  • 3. In Physical/Real World  Hand over card  Visual check  Swipe in POS  Online authorization  Receipt with signature panel  Sign or Pin  Check signature
  • 11.
  • 12. In Virtual World  Cardholder is remote  Virtual shopper  Card Not Present - CNP
  • 13. Most Common Types of e-Channels E-Commerce Call Center/MOTO Mobile Commerce
  • 14. Did You Know…?  Significant increases in card not present fraud linked to compromise of data and greater opportunities for MOTO and e-commerce  Improved security for card present transactions means a greater emphasis by card criminals on CNP fraud  Large scale compromise of cardholder and account data affecting Members and consumers worldwide
  • 15. Did You Know…? Research and advisory firm Aite Group expects U.S. card-not-present fraud costs, which grew more than 33% between 2011 and 2013 to continue to rise. By 2018, it expects such losses will reach $6.4 billion, more than three times the $2.1 billion in losses reported in 2011
  • 16. Did You Know…?  The value of fraud loss on one of Credit Cards brands worldwide was around $2.8 billion  This figure represents 0.09% of total brand sales volume worldwide  When a Credit card is stolen the average amount spent on that card before detection is $650
  • 17. Did You Know…? Over 5 million Visa cardholders make one or more purchases every year without their card ever being present at the point of transaction
  • 18. Did You Know…? e-Commerce sales worldwide will reach $1.7 trillion in 2015 DIVANTE BUSEINSS SERVICES
  • 19. Did You Know…?  International Order Risk 2 ½ Times Higher Than Domestic Orders On average, merchants say the rate of fraud associated with international orders is two-and- one-half times as high as domestic orders. Merchants also reject international orders at a rate three times higher than domestic orders. CyberSource
  • 20. ATM Fraud - “helpful bystander”
  • 21. ATM Fraud - “helpful bystander”
  • 22. ATM Fraud - “helpful bystander”
  • 23. ATM Fraud - “helpful bystander”
  • 24. ATM Fraud - “helpful bystander”
  • 25. ATM Fraud - “helpful bystander”
  • 26. ATM Fraud - “helpful bystander”
  • 27. ATM Fraud - “helpful bystander”
  • 28. ATM Fraud - “helpful bystander”
  • 29.  Inadequate or total lack of specific criminal legislation  Weak sentencing  High profit margins  Ease of international travel  Limited co-operation between Law Enforcement in different countries & jurisdiction issues  Payment card fraud at present = low risk, high reward Why Is Fraud So Popular?
  • 30. Fraud Distribution  Lost cards & Stolen cards 26%  Not received as issued (NRI) 2%  Fraudulent application 2%  Counterfeit cards 34%  Miscellaneous 3%  Fraudulent use of account (CNP) 33%
  • 31. Types of E-commerce Fraud - Phishing attacks, Gartner Survey Shows Phishing Attacks in one year is More than $3 Billion Lost to These Attacks . Debit Cards Emerged as the Financial Instrument Targeted Most by Fraudsters  47 percent debit or check card  32 percent a credit card  24 percent bank account
  • 32.
  • 33.
  • 34.
  • 35. “Friendly” Fraud? Types of E-commerce Fraud Genuine Cardholder denies having placed or received the order. Consumer become aware of this loophole in Credit card industry
  • 36. Types of E-commerce Fraud  Counterfeit Duplicating the full plastic data  Account Number Generation  Data Compromising  Others….
  • 37. Commerce Partners (customers, merchants and financial organizations) 􀂃 What factors influence the level of trust in the Internet? 􀂃 How does trust influence participation in ecommerce?
  • 38. Consumer eConfidence Consumer eConfidence is a cross-reference between the degree of trust a consumer has in a website or business and the perceived level of security that must be present on the website before the consumer will share any personal information. 2 0 0 7 eCommerce Chargeback Report
  • 39. Party Trust + Control Trust = Transaction Trust. The strength of control trust depends not only on the control mechanisms used, but is also influenced by how much trust a party Y. Tan, W. Thoen, A formal analysis of a generic model of trust for electronic commerce, Journal of Decision Support Systems, Vol 33,2002, pp. 233–246. Commerce Partners (customers, merchants and financial organizations)
  • 40. Security tools for e-comm.  PCI (Payment Card Industry)  DSS (Data Security Standard)  CVV2 & CVC2 (Card Verification Value / Code )  SSL – SET and 3DS ( 3 Domain Security)
  • 41. Conclusion  It is very much clear that all commerce partners need batter tools, consistent guidelines, cooperation and support from all concerns in the e-business. Trust and security are the key requirement for the e-commerce business which drive the confidence in sharing the personal information on the net.  Fraud and risk management in the payment industry have always been the key concerns to the commerce partners. However strong combined strategies from the financial institutions, merchants and consumers, should be able to address these new fraud phenomena and challenges.