International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 111 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Case Studies | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014


Cybercrime in Credit Card Systems: Case Study on the 2014 Korean Credit Bureau Data Leak

Walter. T. Mambodza, Robert T. R. Shoniwa, V. M. Shenbagaraman


Abstract: As technology is advancing Credit card systems have become the corner stone of E-commerce-related payments. People have become dependent on online payment systems. The increase in its importance causes a lot of privacy and security concerns. The researchers performed a business case analysis on the 2014 internal attack on the Korean Credit Bureaus databases focusing on the stolen credit card details of customers. A study on literature review was conducted to identify the possible threats, formulate solutions and develop a framework as a countermeasure from future attacks.


Keywords: privacy, security, threats, ecommerce, framework


Edition: Volume 3 Issue 3, March 2014,


Pages: 530 - 534


How to Cite this Article?

Walter. T. Mambodza, Robert T. R. Shoniwa, V. M. Shenbagaraman, "Cybercrime in Credit Card Systems: Case Study on the 2014 Korean Credit Bureau Data Leak", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=20131201, Volume 3 Issue 3, March 2014, 530 - 534

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'privacy'

Downloads: 134

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Similar Articles with Keyword 'security'

Downloads: 118 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 134

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Similar Articles with Keyword 'threats'

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 863 - 865

Detection of Malicious URLs using Classification Algorithm

Muskan V. Jaiswal, Dr. Anjali B. Raut

Share this Article

Similar Articles with Keyword 'ecommerce'

Downloads: 112

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 495 - 500

Web Service Application to Access Climate Data from Cloud using Spring Framework

Vijayshree, Dr. Rekha Patil

Share this Article

Downloads: 113

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1391 - 1395

A Review on Automatic News Classification using the Probabilistic Classification Algorithms

Mandeep Kaur, Pravneet Kaur

Share this Article

Similar Articles with Keyword 'framework'

Downloads: 134

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this Article
Top